Management: FFIEC Information Technology Examination Handbook
Management: FFIEC Information Technology Examination Handbook
Management
NOVEMBER 2015
FFIEC IT Examination Handbook Management
Contents
INTRODUCTION ............................................................................... 3
I ........................... GOVERNANCE............................................................. 4
I.A IT Governance ....................................................................................... 4
I.A.1 Board of Directors Oversight ................................................................... 4
I.A.2 IT Management ....................................................................................... 6
I.A.3 Enterprise Architecture ............................................................................ 9
I.B IT Responsibilities and Functions ..................................................... 10
I.B.1 IT Risk Management Structure.............................................................. 10
I.B.2 Information Security .............................................................................. 10
I.B.3 Project Management ............................................................................. 11
I.B.4 Business Continuity............................................................................... 12
I.B.5 Information Systems Reporting ............................................................. 12
I.B.6 Planning IT Operations and Investment ................................................ 14
I.B.7 Other Functions..................................................................................... 18
November 2015 1
FFIEC IT Examination Handbook Management
November 2015 2
FFIEC IT Examination Handbook Management
Introduction
The “Management” booklet is one of 11 booklets that make up the Federal Financial Institutions
Examination Council (FFIEC) Information Technology Examination Handbook (IT Handbook).
The “Management” booklet rescinds and replaces the June 2004 version. This booklet provides
guidance to examiners and outlines the principles of overall governance and, more specifically,
IT governance. Additionally, this booklet explains how risk management is a component of
governance and how IT risk management (ITRM) is a component of risk management. This
booklet describes the interaction of these components. The examination procedures in this
booklet assist examiners in evaluating the following:
IT supports most aspects of a financial institution’s business; therefore, effective ITRM is not
limited to technology. The IT department typically manages back-office operations, network
administration, and systems development and acquisition, and is involved in business continuity
and resilience, and third-party management. IT management provides expertise in choosing and
operating technology solutions for an institution’s lines of business (e.g., commercial credit and
asset management) or for enterprise-wide activities (e.g., security and business continuity
planning).
An institution’s IT systems may connect with affiliates, customers, internal lines of business,
third parties (e.g., third-party providers 2), and the public. IT creates interdependencies among
infrastructure, applications, and Web content. These interdependencies affect the decision-
making process necessary to support existing products and services and provide for the delivery
of new products and services. Timely, accurate, and secure information is critical to meeting
business requirements throughout the institution. Technology evolves rapidly, requiring
enhancements to existing systems and prompting new investment in infrastructure, systems, and
applications. New technology requires expertise, which creates competition for the necessary
1
The term “financial institution” includes national banks, federal savings associations, state savings associations,
state member banks, state nonmember banks, and credit unions, as well as technology service providers that provide
services to such entities. The term is used interchangeably with “institution” in this booklet. This booklet may refer
to technology service providers specifically in cases where the agencies do not mean to include financial institutions.
2
Third-party providers, also called third-party service providers, include technology service providers or other third
parties that perform critical business activities for or on behalf of an institution.
November 2015 3
FFIEC IT Examination Handbook Management
talent, knowledge, and skill sets. ITRM includes addressing new sources of risk that arise with
new or evolving technology.
I Governance
Action Summary
Financial institution boards of directors should oversee, while senior management should
implement, a governance structure that includes the following:
• Effective IT governance.
• Appropriate oversight of IT activities.
• Comprehensive IT management, including the various roles played by management.
• Effective enterprise architecture.
Governance refers to how financial institutions manage and control their institution. Governance
provides the structure through which an institution sets and pursues objectives while taking into
account the regulatory and market environment and culture of the institution. The governance
structure specifies the responsibilities for the board of directors, managers, auditors, and other
stakeholders and specifies the level of authority and accountability for decision making.
Governance also includes mechanisms for monitoring actions and decisions enterprise-wide.
I.A IT Governance
IT governance is “an integral part of governance and consists of the leadership and
organizational structures and processes that ensure that the organization’s IT sustains and
extends the organization’s strategies and objectives.” 3 IT governance objectives are to ensure
that IT generates business value for the institution and to mitigate the risks posed by using
technology.
The board of directors sets the tone and direction for an institution’s use of IT. The board should
approve the IT strategic plan, information security program, and other IT-related policies. To
carry out their responsibilities, board members should understand IT activities and risks. The
board or a board committee should perform the following:
• Review and approve an IT strategic plan that aligns with the overall business strategy and
includes an information security strategy to protect the institution from ongoing and
emerging threats, including those related to cybersecurity.
3
Board Briefing on IT Governance, 2nd edition, IT Governance Institute, 2003.
November 2015 4
FFIEC IT Examination Handbook Management
The board may delegate the design, implementation, and monitoring of specific IT activities to
management or a committee (e.g., IT steering committee). An IT steering committee 4 generally
comprises senior management and staff from the IT department and other business units.
Committee members do not have to be department heads, but members should understand IT
policies, standards, and procedures (collectively, policies 5). Each member should have the
authority to make and be held accountable for decisions within their respective business units. If
the institution has a formal risk management function, risk management staff should participate
in an advisory capacity.
The steering committee typically is responsible for reporting to the board on the status of IT
activities. The reports enable the board to make decisions without having to be involved in
routine activities. While the board may delegate the design, implementation, and monitoring of
certain IT activities to the steering committee, the board remains responsible for overseeing IT
activities and should provide a credible challenge 6 to management. The steering committee is
typically responsible for strategic IT planning, oversight of IT performance, and aligning IT with
business needs. The steering committee should have a charter that defines its responsibilities.
The steering committee should receive appropriate information from IT, lines of business, and
external sources. Additionally, it should coordinate and monitor the institution’s IT resources.
The steering committee should review and determine the adequacy of the institution’s training,
including cybersecurity training, for staff. The steering committee should also document meeting
minutes and decisions and inform the board of directors of the committee’s activities.
4
In smaller or less complex financial institutions that may not have steering committees, these functions would be
performed by management, IT department personnel, the board, or a board committee.
5
For the purposes of this booklet, policies generally include policies, standards, and procedures, unless stated
otherwise. When the booklet refers to policies and practices, it is the combination of the formal and approved
policies, standards, and procedures and the actual practices in place.
6
A credible challenge involves being actively engaged, asking thoughtful questions, and exercising independent
judgment.
November 2015 5
FFIEC IT Examination Handbook Management
I.A.2 IT Management
• Implement IT governance.
• Implement effective processes for ITRM, including those that relate to cybersecurity.
• Review and annually approve processes for ITRM.
• Assess the institution’s inherent IT risks across the institution.
• Provide regular reports to the board on IT risks, IT strategies, and IT changes.
• Establish and coordinate priorities between the IT department and lines of business.
• Establish a formal process to obtain, analyze, and respond to information on threats and
vulnerabilities 7 by developing a repeatable threat intelligence and collaboration program. 8
• Ensure that hiring and training practices are governed by appropriate policies to maintain
competent and trained staff.
Executive management, including the chief executive officer (CEO), the chief operating officer
(COO), and often the chief information officer (CIO), plays a significant role in IT management
at a financial institution. Executive management develops the strategic plans and objectives for
the institution and sets the budget for resources to achieve these objectives. To carry out its
responsibilities, executive management should understand at a high level the IT risks faced by
the institution and ensure that those risks are included in the institution’s risk assessments. In the
event that executive management is unable to implement an objective or agree on a course of
action, executive management should escalate that matter to the board for more guidance.
The CIO or chief technology officer (CTO) is responsible and should be held accountable for the
development and implementation of the IT strategy to support the institution’s business strategy
in line with its risk appetite. In less complex institutions, the IT manager may take on these
responsibilities. This position typically oversees the IT budget and maintains responsibility for
performance management, IT acquisition oversight, professional development, and training. In
addition, the CIO or CTO is responsible for implementing the IT architecture and participating in
planning activities. The IT management reporting structure should enable this position to
accomplish these activities and ensure accountability for security, business resilience, risk
reporting, and alignment of IT with business needs. The CIO or CTO should play a key role in
7
See the FFIEC’s “Cybersecurity Threat and Vulnerability Monitoring and Sharing Statement,” November 3, 2014.
8
For example, a repeatable threat intelligence and collaboration program could include internal resources, such as
audit reports and fraud detection tools, or external resources, such as information sharing networks like the Financial
Services–Information Sharing and Analysis Center (FS-ISAC) and the Federal Bureau of Investigation’s (FBI)
InfraGard.
November 2015 6
FFIEC IT Examination Handbook Management
the strategic planning as well as supporting activities of peers in various lines of business. The
position often has a leadership role on the steering committee.
The chief information security officer (CISO) is responsible for overseeing and reporting on the
management and mitigation of information security risks across the institution and should be
held accountable for the results of this oversight and reporting. Often, the CISO is responsible
for implementing an information security program satisfying the Interagency Guidelines
Establishing Information Security Standards 9 (Information Security Standards), which were
issued pursuant to the Gramm–Leach–Bliley Act (GLBA). While in the past the office of the
CISO was considered a technology function, the role has become a strategic and integral part of
the business management team. The CISO should be an enterprise-wide risk manager rather than
a production resource devoted to IT operations.
To ensure independence, the CISO should report directly to the board, a board committee, or
senior management and not IT operations management. While cost and benefit decisions will
always need to be made, IT security decisions and funding should not be unduly influenced by
operational ease or budgetary constraints. The reporting structure should demonstrate that the
CISO has the appropriate authority to carry out the responsibilities of that position and should
avoid conflicts of interest that could interfere with the ability of the CISO to make decisions in
line with the board’s risk appetite. The institution’s size and complexity plays a role in the
reporting structure. A smaller or less complex institution may have an information security
officer perform the responsibilities of the CISO and report to senior management. A larger or
more complex institution may have additional reporting lines for the CISO into other
independent functions, such as risk management.
• Implementing the information security strategy and objectives, as approved by the board of
directors, including strategies to monitor and address current and emerging risks.
• Engaging with management in the lines of business to understand new initiatives, providing
information on the inherent information security risk of these activities, and outlining ways to
mitigate the risks.
• Working with management in the lines of business to understand the flows of information,
the risks to that information, and the best ways to protect the information.
• Monitoring emerging risks and implementing mitigations.
• Informing the board, management, and staff of information security and cybersecurity risks
and the role of staff in protecting information.
• Championing security awareness and training programs.
9
12 CFR 30, appendix B (Office of the Comptroller of the Currency (OCC)); 12 CFR 208, appendix D-2 (Board of
Governors of the Federal Reserve System); 12 CFR 364, appendix B (Federal Deposit Insurance Corporation
(FDIC)); and 12 CFR 748, appendix A (National Credit Union Administration (NCUA)). Refer to appendix C of this
booklet for a listing of laws, regulations, and agency guidance.
November 2015 7
FFIEC IT Examination Handbook Management
IT line managers supervise the resources and activities of a specific IT function, department, or
subsidiary. They typically coordinate services between the data processing area and other
departments. They report to senior IT management on the plans, projects, and performance of
their specific systems or departments. Some IT functions that often rely on line managers include
data center operations, network services, application development, systems administration,
telecommunications, customer support, and disaster recovery. Frontline managers coordinate
daily activities, monitor current production, ensure adherence to established schedules, and
enforce appropriate policies and controls in their areas.
The specific technology roles in IT and business unit management may vary depending on the
institution’s approach to risk management and policy enforcement. Institutions can approach
technology management using either a centralized or a decentralized strategy.
November 2015 8
FFIEC IT Examination Handbook Management
more common in larger or more complex institutions, where IT management can expedite
decisions on IT services by transferring decision-making authority to strategically significant
departments. In this approach, business line management has a much greater responsibility for
ensuring that technology investments are consistent with enterprise-wide strategic plans.
Institutions should ensure system compatibility and enforcement of enterprise-wide policies in a
decentralized environment. IT management should still have a role in defining the institution’s
control requirements, but enforcement of enterprise-wide policies may be more difficult.
Enterprise architecture (EA) is the overall design and high-level plan that describes an
institution’s operational framework and includes the institution’s mission, stakeholders, business
and customers, work flow and processes, data processing, access, security, and availability. An
EA program facilitates the conceptual design and maintenance of the network infrastructure,
related IT controls, and policies. Management of financial institutions with highly complex
systems or those experiencing growing IT costs without corresponding benefits should consider
using or adjusting an EA program. As EA has evolved, different methodologies to implement EA
programs have been developed. The underlying principle for all EA programs is that business IT
requirements follow a predefined process that begins with a business need and ends with an IT
solution that conforms to the policies approved by senior management and the board of directors.
An effective EA program can result in the following:
Key considerations when developing an EA program include security, business resilience, data
management, external connectivity, and alignment with the institution’s goals and objectives. To
effectively implement an EA program, the institution should analyze the risks and potential
impact of threats to all of the institution’s activities. A comprehensive EA program based on
prudent practices can help an institution better develop processes to manage IT issues and
identify, measure, and mitigate technology-based risks and threats.
November 2015 9
FFIEC IT Examination Handbook Management
Action Summary
As part of the governance structure, financial institution management should ensure
development, implementation, and maintenance of the following:
The institution should have an adequate ITRM structure. Depending on the size and complexity
of the financial institution, this structure can take different forms. In a large or complex
institution, the ITRM function may be an independent business unit. 10 In a small or less complex
institution, ITRM may be integrated with functional areas, such as information security, business
continuity planning, third-party management, and regulatory compliance. Internal audit,
specifically IT audit, can provide independent assurance on the effectiveness of risk
management, but should not be responsible for its implementation. Regardless of the structure
used, management should ensure that lines of authority are established for enforcing and
monitoring controls.
The institution should have a comprehensive information security program that addresses all
technology and information assets and that complies with the Information Security Standards;
these standards and the GLBA are discussed in detail in the “Protecting Sensitive Customer
Information” section of this booklet. The information security program should include
appropriate administrative, technical, and physical safeguards based on the inherent risk profile
and the individual activities, products, and services of the institution. The board should delegate
responsibility to the CISO or other appropriate personnel for assessing whether IT operations
conform with policies. The CISO should ensure appropriate consideration of risks involved with
new products, emerging technologies, and information systems. Testing of the controls identified
in the information security program should be delegated to an independent auditor. 11
10
Some agencies have guidance on ITRM for larger, more complex financial institutions.
11
An independent audit function can include internal auditors with sufficient independence to perform an adequate
review, outside consultants or auditors, or a combination of both.
November 2015 10
FFIEC IT Examination Handbook Management
The institution should separate information security program management and monitoring from
the daily security duties of IT operations. The IT department should have personnel with daily
responsibility for implementing the institution’s security policy. Responsibility for making
changes and granting exceptions to policy should be segregated from the enforcement of the
controls. Refer to the IT Handbook’s “Information Security” booklet for more information.
Project teams should balance resource investments of time, money, and expertise with a project’s
priority, risk, and requirements. Management should monitor projects closely to control costs
and assure adherence to project management policies. A formal project management system, if
used, should employ well-defined and proven techniques for managing projects at all stages.
Regardless of the system used, management should include the following elements in its project
management process:
• Oversight by experienced and skilled project managers, whether they are employees of the
institution or consultants hired for specific projects.
• Accepted and standardized project management practices.
• Senior management support, including a review process around significant projects. 12
• Defined and monitored institution-wide project risk assessment methodology.
• Approval processes to ensure that projects are defined, go through a risk assessment process,
and meet requirements.
• Established project requirements with collaboration among stakeholders and project
management staff for each phase of the project.
• Target completion dates to track each task or phase of the project.
• Timely project status updates to compare actual completion dates with target dates.
• Procedures to track and measure project performance against requirements.
• A defined change management process, including approval requirements.
• Sufficient testing at all appropriate stages of the project to ensure that the new system or
process will not negatively impact existing systems.
• Training for end users and designated staff responsible for ongoing support.
• A well-managed process for transition in ownership from implementation teams to
operational teams.
12
The significance of projects will depend on the institution’s activities and its size and complexity.
November 2015 11
FFIEC IT Examination Handbook Management
Business continuity is defined as the ability to maintain operations and services, both technology
and business, in the event of a disruption to normal operations and services. The board of
directors should oversee implementation and approve policies relating to business continuity
planning. Senior management should establish and implement policies, standards, and
procedures and define responsibilities for enterprise-wide business continuity planning. Because
business continuity is important for both business processes as well as technology operations,
business continuity planning should be approached on an enterprise-wide basis. Business
continuity planners should assess the ability for all lines of business to remain resilient or recover
from disruptions or degradations. The business continuity function often resides in the risk
management organizational structure. A specific member of management should be assigned
responsibility for the oversight of the business continuity function, and both business and
technology departments should assign personnel to develop and maintain the individual business
unit plans. Refer to the IT Handbook’s “Business Continuity Planning” booklet for more
information.
A variety of systems can provide management with the information necessary to manage an
institution effectively. These systems are often referred to as management information systems,
decision support systems, and risk control self-assessments, to name just a few. While the precise
definitions vary, these information systems are used by management to assess the performance of
the business, report on the risks and challenges it faces, and assist management in the successful
operation of the business.
• Provide management with information that is timely, accurate, consistent, complete, and
relevant.
• Provide an objective system for recording and aggregating information.
• Provide key risk performance trends and indicators; and measure performance against risk
tolerances.
• Support the institution’s strategic plan.
• Ensure the confidentiality, integrity, and availability of data.
• Reduce labor-intensive manual activities.
• Enhance communication among staff.
Information systems reporting supplies decision makers with facts, supports and enhances the
overall decision-making process, and can improve job performance throughout an institution. At
the most senior levels, information systems reporting provides the data and information to help
November 2015 12
FFIEC IT Examination Handbook Management
the board and management make strategic decisions. At other levels, information systems
reporting allows management to monitor the institution’s activities and distribute information to
staff, customers, and members of management.
Advances in technology have increased the volume of data and information available to
management and directors for planning and decision making. Because report generation systems
can rely on manual data entry or extract data from many different financial and transaction
systems, management should establish appropriate control procedures to ensure that data and
information are correct and relevant. Because information systems reporting can originate from
multiple technology platforms, the controls should be designed to maintain the integrity of the
information and the processing environment.
To function effectively as a feedback tool for management and staff, information systems
reporting should meet five essential elements:
In a complex institution, information systems reporting can be highly structured and automated.
In a less complex institution, it can be informal and less dependent on sophisticated technology
systems. Institution management should adopt information systems reporting capabilities
commensurate with the size and complexity of the institution.
November 2015 13
FFIEC IT Examination Handbook Management
Action Summary
Financial institution boards should oversee, while senior management should
implement, an IT planning process with the following elements:
• Long-term goals and the allocation of IT resources to achieve them, usually within
a three- to five-year horizon.
• Alignment of the IT strategic plan with the enterprise-wide business plan.
• Identification and measurement of risk before changes or new investment in
technology are made.
• An IT infrastructure to support current and planned business operations.
• Integration of IT spending into the budgeting process and weighing of direct and
indirect benefits against the total cost of ownership of the technology.
Planning involves preparing for future activities by defining goals and the strategies used to
achieve them. Future activities may include releasing a new product or service, planning mergers
and acquisitions, or preparing for the end of service for an IT system. IT is an integral part of
financial institution operations. Therefore, institution management should integrate consideration
of IT resources and investments into the overall business planning process. Major investments in
IT resources have long-term implications on both the delivery and performance of an
institution’s products and services.
Plans may vary significantly depending on institutions’ size and structure. Management should
strive to achieve a planning process that constantly adjusts for new risks or opportunities and
maximizes IT’s value. Management should document its plan; a written plan, however, does not
guarantee an effective planning process. Management should measure the effectiveness of a
specific plan by whether the plan meets the institution’s business needs. A sound plan should
involve the board of directors, senior management, and staff in the planning process. The board
of directors should provide a credible challenge to management when the board reviews and
approves the plan. Senior management participates in formulating and implementing the plan.
The individual departments and functional areas identify specific business needs and, ultimately,
implement the plan.
An institution that uses third-party providers should verify that the provider can continue to
support the institution’s plans and that the plans and actions of the provider do not negatively
impact the institution. As part of the institution’s ongoing monitoring process, management
should participate in third-party provider client user groups. Institution management should also
consider a review of client portals, news articles, provider newsletters, and press releases to
maintain awareness of provider activities, changes in strategy and products, future plans, and
potential or actual service or security issues.
November 2015 14
FFIEC IT Examination Handbook Management
Strategic IT planning should address long-term goals and the allocation of IT resources to
achieve them. Strategic IT planning focuses on a three- to five-year horizon and helps ensure that
the institution’s technology plans are consistent and aligned with the institution’s business plan.
Effective strategic IT planning can ensure delivery of IT services that balance cost and
efficiency, while enabling the business units to meet the competitive demands of the
marketplace. The IT strategic plan should address the budget, periodic board reporting, and the
status of risk management controls.
Tactical plans support the larger IT strategic plan by defining specific steps necessary to fulfill it.
Tactical plans outline specific steps, personnel, tools, and timetables to achieve the goals laid out
in the IT strategic plan, typically using a one-year time frame. These tactical plans typically
address hardware and software architecture, end-user computing resources, and processing done
by third-party providers. These plans are often created by mid-level managers.
The operational IT plan is used to achieve the goals and objectives of both the tactical plans and
the larger strategic plan. It provides the detailed information to perform the tasks needed to
implement the tactical plans of an institution. The operational IT plan includes the milestones
and tasks that must be undertaken, the individuals who have responsibility for each milestone
and task, the timelines in which they must be completed, the conditions for success, and the
financial resources necessary to complete each milestone and task. Operational plans should flow
logically from both the tactical plans and the larger IT strategic plan. Front-line management
typically creates and revises operational plans as needed based on changes in the underlying
business needs.
• Marketplace conditions.
• Customer demographics.
• Institution growth targets.
• Mergers and acquisitions.
• Technology standards.
• Regulatory requirements (e.g., privacy, security, consumer disclosures, and other reporting
requirements).
• Cost containment.
• Process improvement and efficiency gains.
• Customer service and technology performance quality.
• Third-party relationship opportunities versus in-house expertise.
• Optimal infrastructure, including systems and software replacement.
• Ability to adopt and integrate new technology.
These factors should align with the institution’s business plans. Well-implemented IT plans
enable the institution to deliver business value in terms of market share, earnings, and capital
growth. If used, the IT steering committee’s cross-functional membership makes the committee
well-suited for balancing or aligning the institution’s IT investment with its strategic objectives.
November 2015 15
FFIEC IT Examination Handbook Management
Typically, institutions that align IT with changing business goals and objectives have more
effective operations.
Technology expenditures should be commensurate with the financial condition of the institution.
They should also be appropriate to meet the changing IT strategy, provide enterprise-wide value,
support necessary growth, ensure appropriate security and business resilience, and mitigate
technology incompatibilities. For example, delaying investments and spending too
conservatively on infrastructure or new products may lead to ineffective operations and service
levels. Without a full understanding of the available technology, the institution is not able to
update processes and products or achieve productivity gains or increased revenues. To create the
appropriate balance, institutions should link strategic and operational plans between IT and the
business units.
• Senior management participation: Senior management should understand and support the
IT strategic plan and established priorities.
• Role of IT: Management should clarify the role of IT and determine whether the current IT
planning process enables personnel to work toward achieving enterprise-wide goals and
objectives.
• Impact of IT infrastructure: Management or the IT steering committee should understand
the relationship between the IT infrastructure and applications and the business strategic and
operating plans. The IT infrastructure should directly support the goals and objectives of
these plans.
• Accurate scorecard on past performance: Management or the IT steering committee
should monitor past IT projects and initiatives after implementation to determine whether the
institution realized the anticipated costs and benefits. The scorecard should be based on a set
of objective measures.
Management should also create and maintain an alignment between IT and enterprise-wide
strategies by performing the following:
• Reviewing whether IT strategic plans are aligned with the business strategy.
• Reviewing whether IT performance supports the planned strategy.
• Ensuring that the IT department is delivering on time, within budget, and to specification.
• Balancing investments between systems that support current operations and systems that
transform operations and enable business units to grow and compete in new areas.
• Focusing IT resource decisions on specific business objectives, such as entry into new
markets, enhanced competitive position, revenue growth, improved customer satisfaction, or
customer retention.
I.B.6(b) IT Resources
Management should provide IT resources that are adequate to meet the current operational needs
of the institution. Operational planning should consider the impact of any changes on critical
business processes. Business processes are the integration of people, technology, and procedures
November 2015 16
FFIEC IT Examination Handbook Management
Management should consider sufficient capacity for current and future needs for each of these
elements.
I.B.6(c) Budgeting
Budgeting is another step in the operational planning process. The board should assess
management’s plans and its success in defining and meeting budgetary goals as one means of
evaluating management’s performance. The budget is a coordinated financial plan used to
estimate and control the institution’s activities. By assessing future economic developments and
conditions, management creates an action plan and records changes in the balance sheet accounts
and profitability (predicated on implementation of the plan). The budget not only projects
expected results, but also serves as an important check on management.
When considering new IT projects, management should look at the entry costs of the technology
and the post-implementation support costs. Increasingly, institutions are demanding, and third-
party providers are providing, information regarding the total cost of ownership (TCO) beyond
initial entry costs. IT projects often have undocumented costs, including the resources required to
configure, maintain, repair, support, upgrade, and manage the technology over its lifetime.
Readily available TCO models, as well as historical data, provide management with tools to
incorporate such costs into the selection and budgeting process.
In some instances, a separate subsidiary of the holding company manages the IT function. An IT
subsidiary can provide essential services at costs below those of third-party providers or
individual institutions. Some relationships, however, may not result in a cost savings. Any
November 2015 17
FFIEC IT Examination Handbook Management
transaction between the institution and its affiliates must comply with applicable laws and
regulations. 13 Refer to the IT Handbook’s “Outsourcing Technology Services” booklet for more
information.
Action Summary
The IT function at a financial institution is influenced by several other functions, which
should include the following:
• The human resources function should hire and maintain competent and motivated
IT staff.
• The IT audit function should validate appropriate controls to mitigate IT risk.
• The compliance function should validate that systems and applications adhere to
applicable laws and regulations.
Human resources (HR) supports the IT function’s ability to hire and maintain a competent and
motivated staff. IT management should integrate its management of HR with IT planning to
ensure optimum development and availability of IT skills.
An institution should have programs in place to ensure that staff members have the expertise
necessary to perform their jobs and achieve company goals and objectives. The institution may
need to look externally to find necessary expertise for specialized areas.
13
Sections 23A and 23B of the Federal Reserve Act, codified at 12 USC 371c and 12 USC 371c-1, govern
transactions between certain financial institutions, such as Federal Reserve member banks, national banks, and
federal savings associations, and the institutions’ affiliates. Specifically, section 23B(a) states that an institution and
its subsidiaries may engage in certain transactions with an affiliate, including the payment of money or the
furnishing of services to an affiliate under contract, lease, or otherwise. The transactions must be on terms and under
circumstances, including credit standards, that are substantially the same, or at least as favorable to such institution,
as those prevailing at the time for comparable transactions with or involving other nonaffiliated companies. In the
absence of comparable transactions, the statute requires that such transactions be on terms and under circumstances,
including credit standards, that in good faith would be offered to, or would apply to, nonaffiliated companies. See 12
USC 371c-1(a).
November 2015 18
FFIEC IT Examination Handbook Management
Management should develop training programs for new technology and products before their
deployment in the institution. The institution may use its own certification program or encourage
employees to obtain an external certification to ensure that the staff maintains the necessary
expertise to support the business.
The board and senior management should consider appropriate succession and transition
strategies for key managers and staff members. Some strategies include the use of employment
contracts, professional development plans, and contingency plans for interim staffing of key
management positions. Management should have backup staff for key positions and should
cross-train additional personnel. The objective is to provide for a smooth transition in the event
of turnover in vital IT management or IT operations.
I.B.7(b) IT Audit
The audit department should send IT audit reports to appropriate management and directly to the
board of directors or a designated board committee. The board of directors is responsible for
overseeing the IT auditors’ performance and compensation, including whether the IT auditors
have the necessary expertise and the audit coverage is adequate, timely, and independent.
Depending on the institution’s size and complexity, the board of directors may completely
outsource the IT audit function. In those cases, the outsourced auditor should be engaged by the
board or audit committee.
IT auditors should validate that IT controls are designed appropriately to mitigate risk and are
operating as management intended. IT audit should be completely independent, should have no
role in designing or implementing controls, and should not have primary responsibility for
enforcing policy. Management should have processes in place to monitor and enforce policy
compliance. IT audit should verify that those processes function effectively and report the results
to the board.
Senior management should ensure cooperation between business unit management and IT audit.
Management should also ensure timely and accurate response to audit concerns and exceptions
and ensure appropriate and timely corrective action.
I.B.7(c) Compliance
Senior management should ensure that compliance staff reviews new products, systems,
applications, or changes to ensure compliance with applicable laws and regulations. New
implementations or changes can cause noncompliance through, for example, inaccurate interest
rate calculations, inadequate or inaccurate disclosures, weak security controls over the creation,
storage, or transmission of customer information, or poor customer verification procedures.
November 2015 19
FFIEC IT Examination Handbook Management
II Risk Management
Financial institution management should understand and evaluate risk across the institution,
including the definitions and categories of risk. Risk is the potential that events, expected or
unanticipated, may have an adverse effect on a financial institution’s earnings, capital, or
reputation. For regulatory purposes, risk is categorized as operational, liquidity, interest rate,
credit, price, reputation, strategic, and compliance (legal). Although financial institution
management should be aware of all potential risks as part of its overall risk management
program, operational risk is the primary risk associated with IT.
Management should be aware of the implications of operational risk from IT, including the
following:
• Strategic risk can stem from inaccurate information or analysis that causes management to
make poor IT strategic decisions.
• Compliance risk can result from an institution’s inability to meet the regulatory and legal
requirements associated with its products and services. Compliance risk can also result from
an institution’s dependence on products and services to meet its operations and reporting
requirements.
• Reputation risk can stem from errors, delays, omissions, unauthorized access to IT systems,
or loss of confidential information that become public knowledge. Such occurrences may
directly affect business partners and customers and may result in a loss of customers,
customer withdrawal of funds, and loss of trust in the institution’s products or services.
Management should have a comprehensive view of operations and business processes that are
supported by technology. IT management should maintain an active role in institution strategic
planning to align IT with established business goals and strategies. Additionally, management
should ensure that effective IT controls exist throughout the institution, either through direct
oversight or by holding lines of business accountable for IT-related controls. From a control
standpoint, management should participate in the ITRM process to identify and measure risk
from the use of IT, support decisions on how to mitigate the risks, implement the mitigation
decisions, and monitor and report on the resulting outcomes.
November 2015 20
FFIEC IT Examination Handbook Management
Action Summary
Financial institution management should develop an effective ITRM process that
supports the broader risk management process. As part of the ITRM process,
management should perform the following:
• Identify risks to information and technology assets within the financial institution
or controlled by third-party providers.
• Measure the level of risk.
• Mitigate the risks to an acceptable residual risk level in conformance with the
board’s risk appetite.
• Monitor changing risk levels and report the results of the process to the board and
senior management.
The ITRM process supports the enterprise-wide risk management framework through four
activities: (1) risk identification, (2) risk measurement, (3) risk mitigation, and (4) risk
monitoring and reporting. Risk identification generally documents inventories of systems and
information necessary to financial institution operations and defines the potential threats to the
institution’s systems and operations. Risk measurement is a process of determining the
likelihood of an adverse event or threat occurring and the potential impact of such an event on
the institution. Risk mitigation includes the implementation of appropriate controls to reduce the
potential for risk and bring the level of risk in line with the board’s risk appetite. Monitoring and
reporting provide the board and senior management with regular updates demonstrating the
effectiveness of the risk management process.
Management should identify, measure, mitigate, monitor, and report IT risks that threaten the
safety and soundness of an institution. An effective ITRM process is regularly updated and
aligns IT and business objectives. This process should have a higher level of formality in more
complex institutions.
The ITRM process is not complete without consideration of the overall IT environment.
Management may need to consider risks associated with IT environments from two different
perspectives:
The following sections detail the processes involved in each of the ITRM activities.
November 2015 21
FFIEC IT Examination Handbook Management
Action Summary
Financial institution management should maintain a risk identification process that is
coordinated and consistent throughout the institution. Risk identification includes
ongoing data collection from existing activities and new initiatives.
All activities within a financial institution present a degree of risk. The nature of such risk,
before applying controls and other mitigations, is called inherent risk. Senior management should
ensure that IT risk identification efforts at the enterprise-wide level are coordinated and
consistent throughout the institution. Management should maintain inventories of assets (e.g.,
hardware, software, and information), event classes (e.g., natural disaster, cyber, and insider
abuse or compromise), threats (e.g., theft, malware, and social engineering), and existing
controls as an important part of effective risk identification. Inventories should include systems
and information hosted or maintained externally. Comprehensive IT risk identification should
include identification of cybersecurity risks as well as details gathered during information
security risk assessments required under guidelines implementing the GLBA. 14 Participation in
an information-sharing forum, such as FS–ISAC, 15 should be a component of the risk
identification process because sharing information may help the institution identify and evaluate
relevant cybersecurity threats and vulnerabilities. 16
Senior management should make risk management decisions based on a full understanding of
identified risks. Small institutions with less complex systems may have a more simplified risk
identification process. Regardless of the complexity, the process should be formal and adapt to
changes in the IT environment. The effectiveness of the risk identification process is
demonstrated by management’s understanding and awareness of risk, the adequacy of formal
risk assessments, and the effectiveness of the risk mitigation, including policies and internal
controls.
Understanding an institution’s environment is the first step in any risk identification process. In
identifying risks, management should collect and compile the following information regarding
the institution’s IT environment:
14
Refer to the “Information Security” booklet of the IT Handbook for more information on the GLBA and the
“Interagency Guidelines Establishing Information Security Standards.”
15
Refer to “FFIEC Releases Cybersecurity Assessment Observations, Recommends Participation in Financial
Services Information Sharing and Analysis Center,” November 3, 2014.
16
Ibid.
November 2015 22
FFIEC IT Examination Handbook Management
In the process of collecting and compiling this information, management should include the
potential cybersecurity risks associated with these areas of the financial institution’s IT
environment.
17
This term refers to the connections between networks that are owned and operated by different entities.
November 2015 23
FFIEC IT Examination Handbook Management
Action Summary
Financial institution management should develop risk measurement processes that
include the following elements:
Regardless of the method used, management should estimate the likelihood of occurrence and
severity of the impact of the identified risk. When analyzing the potential impact, management
should consider financial, reputation, or other impact to the institution. Organizational impacts
are highly variable and not always easy to quantify. They include such considerations as lost
revenue, data recovery and reconstruction expense, costs of litigation and potential judgments,
loss of market share, and increases to premiums or denials of insurance coverage.
There are a variety of techniques, including the use of applications, to measure risk. Applications
to provide measurement-related information may be developed in-house, acquired, or both. IT’s
role in development and acquisition should be consistent with the guidance in the IT Handbook’s
“Development and Acquisition” booklet.
November 2015 24
FFIEC IT Examination Handbook Management
The following are common types of risks that often have significant impact:
• Security breaches: Including internal and external breaches, weak program code used to
perpetrate fraud, and computer viruses.
• System failures: Including telecommunication failures, LAN and WAN failures, hardware
and software failures, interconnectivity failures, and backup system failures.
• External events: Including weather-related events, earthquakes, pandemics, terrorism, cyber
attacks, cut utility lines (e.g., telecommunication, water, and power), or widespread power
outages.
• Insider events: Including intentional or unintentional acts by staff, such as carelessness,
social engineering that results in inappropriate access or the installation of malware, and
improper changes to transactions, systems, or databases.
• Development and acquisition issues: Including strategic platform or supplier risk,
inappropriate definition of business requirements, incompatibility with existing systems,
inadequate project management, programming errors (internal or external), change
management issues, failure to integrate and/or migrate systems or applications successfully,
or obsolescence of software.
• Capacity planning issues: Including inadequate capacity planning or inaccurate forecasts of
growth.
• Third-party provider issues: Including deficiencies in the oversight of third-party providers
in areas such as reporting, breach notification, business continuity and resilience testing, and
subcontracting (fourth-party) risk management.
The institution should recognize that no risk exists in isolation; there are interdependencies
among risks. This reinforces the need for an integrated approach for risk management. To ensure
accurate risk measurement, management should ensure that risk assessments are updated
regularly, and as changes occur, to address new technologies, products, services, and connections
before deployment.
The IT department can have a specialized and unique role in the measurement and prioritization
of IT-related threats, based on its expertise in the development, application, and use of IT.
Institution management should use that expertise, as well as the expertise provided by others
(e.g., auditors, third-party providers, and other third parties), in the risk measurement process.
Once management identifies and measures the institution’s IT risk, it should rank the risks and
prioritize its response.
November 2015 25
FFIEC IT Examination Handbook Management
Action Summary
Financial institution management should implement effective control and risk transfer
practices as part of its overall IT risk mitigation strategy. These practices should
include the following:
Risk mitigation is the process of reducing risks through the introduction of specific controls.
Risk mitigation decisions are implemented through the use of controls or risk transfer. Risk
transfer can be accomplished through mechanisms such as insurance. After implementing
controls or transferring the risk, management should determine the level of residual risk, or the
risk that cannot be fully mitigated or avoided. Both controls and risk transfer should be
considered when evaluating whether a residual risk is within the financial institution’s risk
appetite. Risk appetite is the amount of risk a financial institution is prepared to accept when
trying to achieve its objectives.
Controls are implemented in financial institution activities and may be performed either
manually by staff or through automated systems. Controls can be classified by timing
(preventive, detective, corrective) or nature (administrative, technical, physical). Refer to the IT
Handbook’s “Information Security” booklet for more information. The IT department generally
implements controls within the institution for assets that are under the IT department’s control.
Non-IT-related controls implemented elsewhere in the financial institution should be coordinated
with the IT department to ensure their adequacy.
November 2015 26
FFIEC IT Examination Handbook Management
understanding of the exposure to existing, expected, and plausible (including potentially severe)
events, as well as the robustness of—or gaps in—controls or other risk mitigation.
Additionally, a control self-assessment should encompass external requirements, such as laws,
regulations, and widely accepted control standards and practices. 18 Failure to comply with
external requirements, whether in law, regulation, or contract, can result in compliance risk as
well as strategic, reputation, or other risks. Conformance with widely accepted control standards
and practices can demonstrate due care in the operation of IT and potentially reduce operational
risk.
Conformance with external requirements alone is not sufficient to ensure that the overall ITRM
process is adequate. The ITRM process encompasses risk posed by the operation of the financial
institution in its specific internal and external environment. Accordingly, the ITRM process
should consider whether the IT control structure, when combined with controls outside the IT
systems, adequately mitigates risk associated with the use of IT.
In general, a policy is a governing principle that provides the basis for standards and is adopted
by the board. The policy is an overall statement of the institution’s philosophy or intent.
Standards are mandatory criteria that ensure conformity with policy, government regulations,
and acceptable levels of control. Procedures are typically documents that describe, in detail, the
behavior or processes used to adhere to the criteria mandated by standards. Clearly written and
frequently communicated policies can establish clear assignments of duties, help staff coordinate
and perform their tasks effectively and consistently, and aid in training staff. Senior management
should ensure that policies, standards, and procedures are current, well documented, and
integrated with the institution’s information security strategy.
Institution management should create, document, maintain, and adhere to policies, standards, and
procedures to manage and control the institution’s IT risk. The level of detail depends on the
complexity of the IT environment but should enable management to monitor the identified risk
posture. Review of adherence to documented policies, standards, and procedures may be
performed internally, by a risk or compliance function in the institution, or through independent
audit. This review often helps to identify problems early so they can be corrected before they
become serious.
III.C.2 Personnel
The institution should mitigate risks posed by IT staff by performing appropriate background
checks and screening of new staff. The controls in this section also are relevant for third-party
provider staff, consultants, and temporary personnel who support the IT function. Typically, the
minimum verification considerations should include the following:
18
Examples of widely accepted industry standards include National Institute of Standards and Technology (NIST)
publications, the Control Objectives for Information and Related Technology (COBIT) framework, and the
Information Technology Infrastructure Library (ITIL).
November 2015 27
FFIEC IT Examination Handbook Management
The institution should use job descriptions, employment agreements (usually for higher-level or
higher-sensitivity positions), training, and awareness programs to promote understanding and
increase individual accountability. The job descriptions should detail duties and responsibilities
and be routinely updated by managers responsible for the positions with assistance from HR.
Management should document and confirm access privileges for each staff member based on his
or her job description. Additionally, management should establish a timely process to review,
update, and remove access privileges associated with any party when appropriate. The lack of
such a process may result in unauthorized or inappropriate activity. Failure to remove access
privileges when appropriate, particularly for those individuals with high levels of privilege,
represents significant risk.
The institution should protect the confidentiality of information about its customers and
organization by having new hires sign agreements covering confidentiality, nondisclosure, and
authorized use as a condition of their employment. Employment agreements set both the
expectations and limits associated with the staff member’s functions. Management should obtain
signed confidentiality and nondisclosure agreements before granting new staff members,
contractors, and temporary staff access to IT systems. In addition, management should require
periodic acknowledgement of acceptable use policies for the network, software applications,
Internet, e-mail, confidential data, and social media. Information security awareness and training
programs help support information security and other management policies.
Financial institutions are critically dependent on their information and technology assets—
hardware, software, and data. Management should protect information and technology assets to
ensure operational continuity, financial viability, and the trust of customers. The unauthorized
loss, destruction, or disclosure of confidential information can adversely affect a financial
institution’s reputation, earnings, and capital.
19
Section 19 of the Federal Deposit Insurance Act prohibits, without the prior written consent of the Federal Deposit
Insurance Corporation (FDIC), a person convicted of any criminal offense involving dishonesty or breach of trust or
money laundering (covered offenses), or who has agreed to enter into a pretrial diversion or similar program in connection
with a prosecution for such offense, from becoming or continuing as an institution-affiliated party, owning or controlling,
directly or indirectly an insured depository institution (insured institution), or otherwise participating, directly or
indirectly, in the conduct of the affairs of the insured institution, See 12 U.S.C. 1829.
November 2015 28
FFIEC IT Examination Handbook Management
security policies and a written information security program. Key elements that should be
addressed in the information security program include the following:
The information security program should be coordinated across the institution. To ensure the
effectiveness of the information security program throughout the institution, management should
have a process to hold staff accountable for complying with the information security program.
Institution management should perform the following:
• Develop and implement processes to identify and protect against security events and
incidents.
• Develop, implement, and periodically test incident response procedures, which should
address escalation, remediation, and reporting of events and incidents.
• Develop and implement a threat intelligence and collaboration process to identify and
respond to information on threats and vulnerabilities.
• Consider information security risks when developing, implementing, or updating products.
• Ensure that products are developed or updated in accordance with established information
security policies and procedures.
• Perform penetration tests before launching or making significant changes to critical systems,
including Internet- and client-facing applications. Management should review all findings
and develop processes to ensure the timely remediation of issues identified by the tests.
• Conduct initial due diligence and ongoing monitoring to fully understand the types of
connections and mitigating controls in place between the financial institution and its third-
party providers. In conjunction with this, management should require by contract that the
third-party providers notify the institution of the use of any subcontractors or changes to
subcontractor relationships. 20
• Implement a governance process to establish, monitor, maintain, and test controls to mitigate
interconnectivity risk.
• Develop a policy for escalating and reporting security incidents to the board, government
agencies, law enforcement, and the institution’s primary federal and state regulator based on
thresholds defined by the financial institution and applicable legal requirements. Relevant
thresholds could include significant financial impact, significant operational downtime,
operational or system breach, or loss of critical infrastructure.
20
Refer to the FFIEC IT Handbook’s “Outsourcing Technology Services” booklet.
November 2015 29
FFIEC IT Examination Handbook Management
The Information Security Standards require management to develop, and the board to approve,
an information security program to protect the security and confidentiality of customer
information. This program may be a component of the institution’s overall information security
program.
The institution should protect customer information from threats to security or integrity. The
institution should also protect customer information from unauthorized access or use that would
result in substantial harm or inconvenience to any customer. The board should also annually
review a written report, prepared by management, regarding the financial institution’s actions
toward GLBA compliance.
III.C.3(b) Cybersecurity
Institutions should take a comprehensive approach to maintain the security and resilience of their
IT infrastructure, including the establishment of cybersecurity controls. Although an institution is
not required to have a separate cybersecurity policy or program, its information security program
should identify, measure, mitigate, monitor, and report on the heightened risks associated with
cybersecurity. To address cybersecurity risk, the information security program should consider
the following:
The board should approve policies, while senior management should establish and implement
policies, procedures, and responsibilities for the enterprise-wide business continuity program.
The board should annually approve the institution’s business continuity program. Management
should document, maintain, and test the plans and backup systems periodically to mitigate the
consequences of system interruptions, natural and other disasters, and unauthorized intrusions
that could result in the loss, damage, or degradation of data, systems, or services. Management
should also provide to the board on an annual basis a written report on the overall status of the
business continuity program and the results of testing of the plan and backup systems. Refer to
the IT Handbook’s “Business Continuity Planning” booklet for more information.
21
Refer to the FFIEC Cybersecurity Assessment Tool, June 2015. Use of the Cybersecurity Assessment Tool by
institutions is optional.
November 2015 30
FFIEC IT Examination Handbook Management
Management should assess and mitigate operational risks associated with the development or
acquisition of software. Management should develop applicable policies that specify risk
management controls for the development and acquisition of systems. Management should guide
the development or acquisition of software by using a system development life cycle (SDLC) or
similar methodology appropriate for the specific IT environment. The extent or use of the SDLC
depends on the size and complexity of the institution and the type of development activities
performed. If the institution primarily acquires software, management should verify the effective
use of an SDLC by the third-party provider.
Each phase of the SDLC should have procedures that verify the maintenance and integrity of
controls before the start of the next phase. When identifying the controls to be implemented in
each phase, the institution should incorporate the fundamental principles of confidentiality,
integrity, and availability. Audit should review the SDLC to ensure that appropriate controls are
incorporated during development. Management should analyze the operational impact early in
the process to identify any additional cost and support issues.
Management should test new technology, systems, and products thoroughly before deployment.
Testing, which should include tests of security, validates that equipment and systems function
properly and produce the desired results. As part of the testing process, management should
verify whether new technology systems operate effectively with other technology components,
including vendor-supplied technology. Pilot programs or prototypes can be helpful in developing
new technology before management accepts the technology for use on a broad scale.
Management should conduct retesting periodically to help manage risk exposure on an ongoing
basis.
Institutions that outsource the development of software should have a process to review their
third-party provider’s control environment, reputation, and capabilities. Institutions often employ
structured acquisition methodologies similar to the SDLC when acquiring significant hardware
and software products.
Refer to the IT Handbook’s “Development and Acquisition” booklet for more information.
III.C.6 IT Operations
Management should be aware of and mitigate risks associated with IT operations. The institution
and its service providers may have one or more IT operations groups. The number and types vary
across institutions. Common examples of IT operations are data center or computer operations,
network services, distributed computing, personal or desktop computing, change management,
project management, security, resource management, and contingency and resiliency planning.
Many operations functions have significant risk factors that should be addressed through
effective management and control. Rapidly evolving threats require an effective monitoring and
response program to ensure that vulnerability remediation occurs in a timely manner. Ongoing
November 2015 31
FFIEC IT Examination Handbook Management
business-driven changes to applications should have effective change control programs to ensure
that application updates are implemented in a timely manner. The institution should have
controls over systems changes, including the following:
III.C.7 Insurance
The institution may rely on insurance policies as part of a mitigation strategy. Traditional
business insurance policies include coverage for errors and omissions, commercial general
liability, and directors’ and officers’ liability policies. Management should understand the
institution’s insurance needs and the limitations of insurance coverage. These policies generally
exclude, or may not include, liability for all areas of IT operations and cybersecurity.
In establishing an insurance program, management should recognize its exposure to loss, the
extent to which insurance is available to cover potential losses related to information assets and
technology, and the cost of such insurance. The insurance program should be commensurate with
the size, complexity, and risk of the institution. Management should weigh these factors to
determine how much risk the institution assumes directly. In assessing the extent of that residual
risk, the institution should analyze the potential effect of an uninsured loss on itself and any
affiliates or parent companies. Management should consider seeking the help of insurance
consultants, attorneys, and other professionals, as necessary, to fully identify and measure the
risk. Management should also review a company’s financial condition or credit rating when
deciding on an insurance company.
Management should understand that it cannot insure against all risks. Insurance complements,
but does not replace, an effective system of controls. Thus, an overall appraisal of the control
environment is important in assessing the adequacy of the insurance program.
Management can insure against risks covered in standard insurance policies. Insurance that
covers physical disasters often specifically excludes computer hardware and software. To the
extent that policies cover physical storage media, they generally omit the extra cost of
reconstructing the recorded information found on the media. Management should clearly
understand what is covered and document any gaps in coverage.
Before purchasing insurance, management should assess the costs of obtaining insurance.
Estimates of these costs enable management to choose the types and amounts of insurance to
carry. These estimates also allow management to determine to what extent the institution may
choose to self-insure against certain losses.
November 2015 32
FFIEC IT Examination Handbook Management
Insurance policies provide a variety of coverage for events that could affect an institution’s IT.
The policies can be adapted to a particular institution’s IT environment. The evolving threat
environment is contributing to increasing interest in and purchase of insurance related to cyber
risks. Insurance companies can provide coverage for items including the cost of conducting an
investigation into a breach, notifying customers, reputational and crisis management, business
interruption, credit monitoring for affected customers, and legal costs. Management should
exercise appropriate due diligence in the review of such policies, including policy exclusions to
ensure the coverage aligns with management’s goals.
As part of the decision to purchase insurance, management should consider the institution’s size
and complexity and the level and efficacy of controls in place to mitigate risk. Types of
insurance may include the following:
November 2015 33
FFIEC IT Examination Handbook Management
Action Summary
As part of a financial institution’s third-party management program, management
should ensure that third-party providers effectively provide support by doing the
following:
• Negotiating clear and comprehensive contracts with appropriate terms that meet the
institution’s requirements.
• Ensuring receipt of audited financial statements from third-party providers at least
annually.
• Reviewing results of independent audits of IT controls at third-party providers.
• Monitoring the responsiveness of third-party provider’s customer service, including
client user group support.
Financial institutions increasingly rely on third-party providers and software vendors. Larger or
more complex institutions are more likely to have institution-wide third-party management
programs that encompass all of these relationships. IT departments can contract with third-party
providers for several services, including data processing, software development, equipment
maintenance, business continuity, data storage, Internet access, and security management. In
smaller or less complex institutions with less formal third-party management programs, the
procurement of third-party services should be reviewed by institution staff familiar with the
operational, financial, security, and compliance requirements for such relationships. The
oversight of the relationship should be performed by staff with knowledge of the services
provided.
The board of directors should hold senior management responsible for ensuring appropriate
oversight of third-party relationships. Technology needed to support business objectives is often
a critical factor in deciding to outsource. Managing such relationships is not just a technology
issue; it is an enterprise-wide governance issue. An effective third-party management program
should provide the framework for management to identify, measure, mitigate, monitor, and
report risks associated with the use of third-party providers. Management should develop and
implement enterprise-wide policies and procedures to govern the third-party management
program, including establishing objectives and strategies, selecting a provider, negotiating the
contract, and monitoring the outsourced relationship.
Management should evaluate the quality of service, control environment, and financial condition
of the third parties providing the institution with critical IT services. Third parties can include
financial institution affiliates, other financial institutions, and third-party service providers. As
November 2015 34
FFIEC IT Examination Handbook Management
appropriate, these third parties should support the responsibilities of their financial institution
clients to adhere to all applicable laws, regulations, and supervisory guidance. Financial
institution management should expect third-party support at a level consistent with the criticality
of the services provided to the institution. Refer to the IT Handbook’s “Outsourcing Technology
Services” booklet for more information.
When financial institution management contracts with third-party providers for some or all IT
services, it should ensure that controls over outsourced activities provide the institution with the
same level of assurance as controls over those activities performed in-house. Management
should also consider additional oversight or controls over third-party providers that operate in
foreign locations. Management should have mitigation strategies that address risks related to
foreign-based third-party providers, if applicable. In the event that the financial institution
locates any of its own operations offshore and develops third-party relationships at those
locations, specific risk mitigation plans should be considered to address related foreign-based
third-party risks.
Management should address exposures from third-party risks through an effective third-party
management program. Some factors that management should consider or address include the
following:
• Assessing whether each third-party relationship supports the institution’s overall objectives
and strategic plans.
• Evaluating prospective third-party providers based on the scope and importance of the
services they provide.
• Tailoring the institution’s third-party management program based on an initial and ongoing
risk assessment of the institution’s third parties and the services they provide.
The time and resources devoted to managing third-party relationships effectively depend on
several factors, such as the critical nature of outsourced processes, staff knowledge, and
complexity of systems. Refer to the IT Handbook’s “Outsourcing Technology Services” booklet
for more information. Additionally, some agencies have specific guidance on third-party
relationships and managing third-party relationship risk. 22
Refer to the IT Handbook’s “Audit” booklet for more information on independent reviews of
third-party providers and to the “Business Continuity Planning” booklet, appendix J,
“Strengthening the Resilience of Outsourced Technology Services,” for guidance focusing on
cyber resilience.
22
“Third Party Risk: Guidance for Managing Third Party Risk,” FDIC FIL-44-2008, June 6, 2008; OCC Bulletin
2013-29, “Third-Party Relationships: Risk Management Guidance,” October 30, 2013; Federal Reserve Board
Supervision and Regulation Letter 13-19 “Guidance on Managing Outsourcing Risk,” December 5, 2013.
November 2015 35
FFIEC IT Examination Handbook Management
Action Summary
Financial institution management should ensure satisfactory monitoring and reporting
of IT activities and risk. These practices should include the following:
Risk monitoring provides information about the effectiveness of risk mitigation activity and
should address changing threat conditions in both the financial industry and in organizations that
use similar technology. Risk monitoring is ongoing within the lines of business and should
include reviews of metrics (e.g., threat intelligence), performance benchmarks, SLAs, and
compliance with internal policies. In addition, as part of the monitoring process, institution
management should review the effectiveness of controls and ensure that quality assurance and
control practices are appropriately included. Management should ensure that there is clear
assignment of responsibilities and accountability for both monitoring and escalation procedures.
Management should also develop an IT risk reporting process that includes defined reporting
channels to ensure accurate, timely, and relevant reporting to appropriate levels of management.
III.D.1 Metrics
Metrics aid management in its ability to assess the overall IT environment. The specific metrics
reported, and the frequency with which they are reported, depend on the institution’s IT
environment. The following are common examples:
• Number of risk issues identified for IT activities (updated regularly to reflect new or
mitigated issues). This may include information gathered through the threat intelligence and
collaboration process.
• Number of risk acceptance issues approved by senior management. This information may be
maintained in a database or other repository of the descriptions, mitigation options, and
documentation of management acceptance.
November 2015 36
FFIEC IT Examination Handbook Management
• Number of current and historical events or issues (external and internal events that deviate
from the control standards).
• Number of current or outstanding (i.e., unresolved) issues identified by the business unit,
internal audit, external audit, or regulator.
Many tools can be used to provide management with metrics to facilitate risk monitoring, such as
key risk indicators 23 and key control indicators. 24 These are indicators that correlate with
changes in risk and control effectiveness. When developed and monitored correctly, metrics can
direct management’s attention to areas of potential problems. 25 As appropriate, certain metrics or
summary reports of metrics should be provided to the board.
Management should periodically review the institution’s IT functions and determine whether
plans, goals, and expectations are on target. Given the cost of and business reliance on IT
functions, failure to perform such monitoring could put an institution at risk. Management should
establish performance benchmarks or standards for IT functions and monitor them on a regular
basis. Such monitoring can provide assurance that IT functions are meeting the defined
benchmarks and can identify potential problem areas. Areas to consider include mainframe and
network availability, data center availability, system reruns, 26 out-of-balance conditions,
response time, error rates, data entry volumes, special requests, and problem reports.
Management should evaluate outsourced relationships by measuring performance against SLAs.
The institution should establish formal SLAs with its IT providers, including affiliates and third-
party providers. Larger or more complex institutions should consider establishing SLAs for
internally provided services, for example, by another division or department of the same
institution. SLAs establish mutual expectations and provide a baseline for measuring IT
performance. Management can tie SLAs to incentive and penalty actions. SLAs should be
comprehensive to provide the institution with a high level of comfort in setting expectations. The
use of performance benchmarks and outcome-based measurements could identify potential issues
with attaining expectations set in the SLAs.
Management should develop, implement, and monitor a process to measure IT compliance with
the institution’s established policies. In addition to the traditional reliance on internal and third-
23
A key risk indicator is a measure used to indicate the level of risk associated with an activity.
24
A key control indicator is a metric that indicates the potential for a control to fail within an organization.
25
Refer to the “Metrics” section of the IT Handbook’s “Information Security” booklet for more information.
26
A system rerun is a method of correcting an error that occurs during processing. An entire job or selection of jobs may
have to be rerun to correct the error.
November 2015 37
FFIEC IT Examination Handbook Management
party audit functions, the institution should perform periodic self-assessments. The scope and
frequency of self-assessments depend on the scale and historical performance of the IT function.
Self-assessments provide management with an understanding of whether the institution is in
compliance with the policies approved by the board.
Control testing should include the effectiveness of control design and implementation and take
into account the changing nature of the threats and the enforcement of control functions.
Management should monitor risk mitigation activities and controls to ensure that identified risks
are appropriately mitigated. Monitoring of the effectiveness of controls should be ongoing, and
departments should provide periodic progress reports to management. Ongoing monitoring
ensures that the risk management process is not a one-time or annual event.
Quality assurance (QA) is a process intended to ensure that a product or service under
development meets specified requirements. Management should oversee the establishment of a
QA process and update future planning with the results. QA may include internal performance
measures, focus groups, and customer surveys. Management should assess whether QA testing is
conducted on new or updated systems before implementation. Testing should be independent of
any programming function and should incorporate user acceptance testing programs. The
thorough QA testing of a new system can identify vulnerabilities or poor functionality.
Quality control (QC) is a procedure intended to ensure that a product or application adheres to a
defined set of quality criteria that meet the requirements of the end user. QC includes activities
that can be used to identify weaknesses or vulnerabilities in work products and to avoid the
resource drain and expense of repeating a task. The traditional goal of QC activities is to ensure
that a product conforms to specifications and is fit to use. QC helps to determine the following
about a product:
QA and QC reports are valuable tools for management and help document the control process for
the production environment.
III.D.7 Reporting
Management should develop an IT risk reporting process that assembles and reports IT risk
information in a manner that is timely, complete, transparent, and relevant to management
decisions. IT management should provide periodic reports based on risk to senior management or
the board as well as to necessary stakeholders. Recipients of IT risk reports should have the
authority and responsibility to act on the reported information, provide a credible challenge for
information contained in the reports, and be held accountable for the outcomes. The reporting
November 2015 38
FFIEC IT Examination Handbook Management
should be appropriate to the decisions the individual reviewing the report is responsible for
influencing. This reporting should be defined in accordance with the institution’s enterprise-wide
risk management program. Additionally, reporting should trigger appropriate, timely, and
reliable escalation procedures.
November 2015 39
FFIEC IT Examination Handbook Management
These examination procedures (also known as the work program) are intended to assist
examiners in determining the effectiveness of the institution’s IT management process.
Examiners may choose, however, to use only particular work steps of the following examination
procedures based on the size, complexity, and nature of the institution’s business. Examiners
should use these procedures to measure the adequacy of the institution’s cybersecurity risk
management processes.
Objective 1: Determine the appropriate scope and objectives for the examination.
1. Review past reports for outstanding issues or previous problems. Consider the following:
2. Review management’s response to issues raised during, or since, the last examination.
Consider the following:
November 2015 40
FFIEC IT Examination Handbook Management
f. Organizational charts that include reporting relationships between business units and
control functions (e.g., enterprise risk management, ITRM, and internal audit).
g. Credit or operating losses primarily attributable (or thought to be attributable) to IT (e.g.,
system problems, inadequate controls, improperly implemented changes to systems, and
fraud resulting from cybersecurity attacks, such as account takeover).
h. Changes to internal business processes.
i. Internal reorganizations.
Objective 2: Determine whether the board of directors oversees and senior management
appropriately establishes an effective governance structure that includes oversight of IT
activities.
1. Review the institution’s governance structure to determine the oversight of IT activities and
verify that it includes the following:
a. Board sets the tone and direction for the institution’s use of technology.
b. IT risks are adequately identified, measured, and mitigated.
c. Board approval of the information security program and other IT-related policies.
d. Board members are familiar with IT activities.
2. Review the activities performed by the board or a committee of the board to determine the
effectiveness of IT oversight. Specifically, review whether the board or a committee of the
board appropriately does the following:
a. Reviews and approves an IT strategic plan that aligns with the overall business strategy
and includes an information security strategy to safeguard against ongoing and emerging
threats, including cybersecurity threats.
b. Oversees the institution’s adoption of effective IT governance processes.
c. Oversees management processes for approving third-party providers that include an
assessment of financial condition and IT security posture of the third party, including on
cybersecurity.
d. Has an oversight process that includes receiving updates on major projects, IT budgets,
IT priorities, and overall IT performance; and has an approval process for critical projects
and activities.
e. Reviews the adequacy and allocation of IT resources in terms of funding and personnel.
f. Approves a policy to escalate and report significant security incidents to the board,
steering committee, government agencies, and law enforcement, as appropriate.
g. Holds management accountable for the identification, measurement, and mitigation of IT
risks.
h. Provides for independent, comprehensive, and effective audit coverage of the IT
program.
November 2015 41
FFIEC IT Examination Handbook Management
4. Review the membership list of board, steering committee, and/or relevant management
committees established to review IT activities. Determine whether board, senior
management, lines of business, audit, and IT personnel are represented appropriately, and
whether regular meetings are held and minutes are maintained.
5. Review the minutes of the board of directors and relevant committee meetings for evidence
of board support and supervision of IT activities.
6. If the board delegates certain activities regarding the oversight of IT to a committee, review
the membership, responsibilities, and activities of the committee. Specifically, determine
whether the committee does the following:
7. Review the board of directors and management oversight program for IT. Determine whether
the board has effective oversight of IT. Determine whether the board oversees and
management implements the following:
November 2015 42
FFIEC IT Examination Handbook Management
c. Assesses the institution’s inherent IT risks across lines of business and ensures IT risks
are included in enterprise-wide risk assessments.
d. Provides regular reports to the board on IT risks, IT strategies, and IT changes.
e. Coordinates priorities between the IT department and lines of business.
f. Establishes a formal process to obtain, analyze, and respond to information on threats and
vulnerabilities by developing a repeatable threat intelligence and collaboration program.
g. Ensures that hiring and training practices are governed by appropriate policies to
maintain competent and trained staff.
9. Review the roles and responsibilities of all levels of management, including executive
management, CIO or CTO, CISO, IT line management, and IT business unit management, to
ensure that there is a clear delineation between management and oversight functions and
operational duties.
10. Review the corporate and IT departmental organization charts to determine whether they
show the following:
11. Review the institution’s structure to determine whether the board established the following:
a. The organizational structure provides for effective IT support throughout the institution,
from IT management up through senior management and the board.
b. Defined roles and responsibilities for key IT positions, including executive management
(CEO and COO, and often CIO or CTO), and CISO.
c. An appropriate and effective executive management team or positions, such as CEO and
COO, to assist in the oversight and management of IT.
d. A defined and functioning role for the CIO or CTO to focus on strategic IT issues and the
overall effectiveness of the IT function.
e. A CISO or information security officer position responsible for the management and
mitigation of information security risks.
f. Involvement of frontline management in the IT oversight process.
g. Integration of business line managers into the IT oversight process.
12. Determine whether the reporting structure ensures that the CISO has the appropriate
authority to carry out its responsibilities and that there are no conflicts of interest in the
ability of the CISO to make decisions in line with the risk appetite.
13. Determine management’s need for, or effectiveness in, selecting and implementing
appropriate EA and assess whether the EA program serves the institution’s needs,
complexity, and future technology plans.
November 2015 43
FFIEC IT Examination Handbook Management
1. Review the institution’s established lines of authority for enforcing and monitoring controls.
3. Determine whether the institution has a project management function appropriate for the
complexity of the institution, and verify that this function contains the appropriate elements.
5. Determine whether the institution has a well-defined role for the implementation and use of
information systems reporting and that it produces accurate and useful reports. Determine the
effectiveness of the reports used by senior management or relevant management committees
to supervise and monitor the following IT functions:
a. Management reports that provide the status of software development and maintenance
activities.
b. Performance and problem reports prepared by internal user groups.
c. System use and planning reports prepared by operating managers.
d. Internal and external audit reports of IT activities.
6. Review information systems reports for management, and determine whether they provide
the information necessary to help manage the institution effectively. Determine the
following:
November 2015 44
FFIEC IT Examination Handbook Management
1. Determine whether the board oversees and management considers the following when
formulating the institution’s overall business strategy:
2. Review the strategic plan for IT activities. Determine whether the goals and objectives are
consistent with the institution’s overall business strategy. Document significant changes
made since the previous examination that affect (or any planned changes that may affect) the
institution’s organizational structure, hardware or software configuration, and overall
operational goals. Determine the following:
3. Determine whether the institution has adequate tactical and operational IT plans to support
the larger IT strategic plan.
4. Determine whether the board or board committee reviews and approves the following:
November 2015 45
FFIEC IT Examination Handbook Management
a. Infrastructure.
b. Hardware.
c. Operating software.
d. Application software.
e. Personnel.
6. Determine whether the board reviews management’s budget plans. Determine the
effectiveness of the budget process to estimate and control the institution’s activities.
a. Verifies that the third-party providers can continue to support current contract
requirements and future changes (e.g., that the third party has a satisfactory financial
condition).
b. Has a process to assess whether a third party’s actions may negatively affect the
institution (e.g., a review of the third-party plans to continue offering the necessary
products or services contracted by the institution).
c. Has an effective ongoing monitoring process of its third-party providers.
Objective 5: Along with the IT audit and compliance departments, the HR department can
serve as an influencing function for IT. Determine the adequacy of the institution’s HR
function to ensure its ability to attract and retain a competent workforce.
1. Determine the institution’s ability to attract and retain a competent workforce and the ability
of HR management to effectively meet the requirements for IT and the lines of business that
IT supports.
2. Identify key IT positions, review biographical data (e.g., résumés and training and
development records), and determine the following:
3. Review and evaluate written job descriptions to ensure that management performs the
following:
November 2015 46
FFIEC IT Examination Handbook Management
4. Determine whether the HR function has processes for compensation planning, performance
reviews, knowledge transfer mechanisms, training, and mentoring.
5. Determine whether the financial institution has a process to ensure that staff has the requisite
expertise to fulfill its roles. Review the adequacy of the process.
6. Determine the adequacy of the institution’s training programs. Determine whether the
institution has or supports the following:
7. Review turnover rates of IT staff and discuss staffing and retention issues with IT
management, or review turnover rates of IT management and discuss with senior
management. Identify root causes of any staffing or expertise shortages, including
compensation plans or other retention practices.
1. Consult with the examiner reviewing audit or IT audit to determine the adequacy of IT audit
coverage and management’s responsiveness to identified weaknesses.
2. Determine whether the board provides for the necessary expertise in the audit department and
that audit coverage is comprehensive, timely, and independent. Assess whether the board
requires audit reporting directly to the board or a designated committee.
3. Determine whether the board, or its committee, has appropriate oversight of audit through the
following:
November 2015 47
FFIEC IT Examination Handbook Management
5. Determine whether the compliance function has involvement in the institution’s review
oversight process, and assess the adequacy of its involvement.
6. Determine whether compliance staff reviews new products, systems, applications, or changes
to evaluate compliance with applicable laws and regulations.
1. Determine whether the institution has a risk management program and whether the program
includes an integrated approach for enterprise-wide risk management, including
identification, measurement, mitigation, monitoring, and reporting of risk. If applicable,
determine whether the structure conforms to regulatory requirements.
a. The board of directors has defined its risk appetite and the institution’s risk tolerance
levels.
b. The board of directors has applied sufficient resources to achieve its risk appetite and
remain within the institution’s risk tolerance levels.
c. Management has committed to support the board’s risk decisions.
4. Determine whether the institution maintains a risk assessment process to perform the
following:
a. Identify risks and threats from both internal and external sources.
b. Develop or update policies within the risk management function to guide risk
measurement activities.
c. Ensure the existence of a process to promote sound understanding and analysis of threats,
events, assets, and controls.
d. Maintain processes within the risk management function to help make risk mitigation
decisions.
e. Determine the entities that should have involvement in that decision-making process.
f. Ensure that the board and management understand the risk categories.
November 2015 48
FFIEC IT Examination Handbook Management
Objective 8: Determine whether the board of directors oversees and senior management
proactively mitigates operational risk.
1. Review the institution’s management of operational risk, and verify that the risk management
process includes aspects of operational risk across the institution, including the following:
3. Assess whether IT management maintains an active role in the institution’s strategic planning
to align IT with established business goals and strategies. Assess whether effective IT
controls exist throughout the institution, either through direct oversight or by holding lines of
business accountable for IT-related controls.
1. Review the role of IT management in the risk management process and identify whether it is
supportive and collaborative to the overall process.
a. A risk identification process to identify risks to information assets within the institution
and information assets controlled by third-party providers.
b. A risk measurement process using an evidence-based approach to measure the level of
risk and determine if it is in line with the board’s risk appetite.
c. A risk mitigation process to ensure that management mitigates the risks to an acceptable
residual risk level.
d. A risk monitoring and reporting process to monitor changing risk levels and report the
results of the process to the board and senior management.
November 2015 49
FFIEC IT Examination Handbook Management
Objective 10: Determine whether the institution maintains a risk identification process that is
coordinated and consistent across the enterprise.
1. Determine whether the institution has a comprehensive IT risk identification process that
includes the identification of cybersecurity risks. Specifically, determine whether
management performs the following:
2. Determine whether the institution’s risk identification process includes the ongoing
collection of information on the IT environment, including the following:
a. IT systems inventories.
b. IT strategic plans.
c. Interconnectivity documentation.
d. Information flow diagrams.
e. Business continuity and disaster recovery plans.
f. Third-party management program.
g. Call center data.
h. Department self-assessments.
i. IT audit findings.
j. Threat intelligence information.
November 2015 50
FFIEC IT Examination Handbook Management
2. Determine whether the risk measurement process is comprehensive and includes the
following types of risks that affect the institution:
a. Security breaches.
b. System failures.
c. External or insider events.
d. Development and acquisition issues.
e. Capacity planning issues.
f. Third-party provider issues.
3. Identify whether the institution has a proactive process in place to effectively update its
measurement of risk before implementing system changes, rolling out new products or
services, or confronting new external conditions.
1. Determine whether the institution has processes within enterprise-wide risk management to
assist IT management in making risk mitigation decisions, and determine which entities
should be involved in the decision-making process.
2. Determine whether management has adequate methods and tools, including control self-
assessments and scenario analysis, to evaluate controls for effectiveness against identified
threats.
3. Determine whether the ITRM process addresses risks with an effective IT control structure in
the institution’s IT environment and through conformance with external legal and regulatory
requirements.
a. Risk assessment.
b. Personnel administration.
November 2015 51
FFIEC IT Examination Handbook Management
5. Determine whether management has effective hiring and training practices that include the
following:
6. Determine whether the board has appropriate oversight and management has appropriate
responsibility for the implementation of the institution’s information security program.
7. For the information security program, verify that the board is responsible for the following:
8. Determine whether, as part of the institution’s information security program, the board of
directors oversees and management establishes a control structure that is intended to
specifically address cybersecurity risks and includes the following:
a. Developing and implementing processes to identify, protect against, detect, respond to,
and recover from security events and incidents.
b. Developing, implementing, and periodically testing incident response procedures.
c. Using a threat intelligence and collaboration process to identify and respond to
information on threats and vulnerabilities.
d. Including information security risks when developing, implementing, or updating
products.
e. Assigning “business owner” responsibility in product development or update processes.
November 2015 52
FFIEC IT Examination Handbook Management
9. Determine whether the board of directors approved policies and management established and
implemented policies, procedures, and responsibilities for an enterprise-wide business
continuity program, including the following:
a. Annual review and approval of the business continuity program by the board of directors.
b. Management responsibility to document, maintain, and test the plan and backup systems
periodically according to risk.
c. Annual reports by management of the results of the business continuity and disaster
recovery tests to the board of directors.
10. Determine whether management assesses and mitigates the operational risks associated with
the development or acquisition of software. Appropriate management of the risks should
include the following:
a. Policies documenting risk management controls for the development and acquisition of
systems.
b. System development life cycle or similar methodology based on the complexity and type
of development performed.
c. Tests of new technology, systems, and products before deployment to validate
functionality, controls, and interoperability.
d. Penetration tests of new or updated applications, particularly for Internet- or client-facing
applications, to detect and correct security flaws.
11. Review major acquisitions of hardware and software to determine if the acquisitions are
within the limits approved by the board of directors.
12. Determine whether management is aware of and mitigates operational risks associated with
IT operations, including the following:
November 2015 53
FFIEC IT Examination Handbook Management
g. Security.
h. Resource management.
i. Contingency and resiliency planning.
13. Review the financial institution’s insurance program and determine whether it is
commensurate with the size, complexity, risks, and mitigation strategy of the institution.
Determine the adequacy of insurance coverage (if applicable) for the following:
a. Employee fidelity.
b. IT equipment and facilities.
c. Media reconstruction.
d. Extra expenses, including backup site expenses.
e. E-banking activities.
f. Business interruption.
g. Valuable papers and records.
h. Errors and omissions.
i. Items in transit.
j. Other probable risks (unique or specific risks for a particular institution).
14. Review the financial institution’s third-party management program to ascertain the extent
and effectiveness of the oversight by the board of directors and management of risks
involved in the financial institution’s outsourced relationships. An effective third-party
management program should incorporate the following:
a. A framework for management to identify, measure, mitigate, and monitor the risks
associated with third-party relationships.
b. Board oversight and senior management development and implementation of enterprise-
wide policies to govern the third-party management program.
c. A review process of third-party providers to ensure that each relationship supports the
institution’s overall business objectives and strategic plans.
d. Evaluation of prospective third-party providers based on the scope and criticality of
services provided.
e. Tailoring of the monitoring program based on the initial and ongoing risk assessment of
the third party and the services provided.
15. As part of the examiner’s review of the institution’s third-party management program,
analyze the third party’s financial condition and note any potential weaknesses, including
measures to improve those weaknesses.
16. When reviewing information provided by the institution’s third-party providers, determine
whether the third-party provider enables adequate financial institution client access to
relevant information. Consider the following:
November 2015 54
FFIEC IT Examination Handbook Management
17. When reviewing information provided by the institution’s third-party providers, determine
the adequacy of third-party provider audit reports in terms of scope, independence, expertise,
frequency, and corrective actions taken on identified issues. Work with the examiner
reviewing the third-party management program to determine its adequacy.
18. When reviewing information provided by the institution’s third-party providers, determine
the quality of management’s follow-up and resolution of customer concerns and problems
with its third-party providers.
Objective 13: Determine whether IT management develops satisfactory measures for defining
and monitoring metrics, performance benchmarks, service level agreements, compliance with
policies, effectiveness of controls, and quality assurance and control. Determine whether
management developed satisfactory reporting of ITRM activities.
1. Determine whether management develops and uses metrics to help assess the overall IT
environment. Determine whether the metrics used and the frequency and monitoring of those
metrics are useful to direct management’s attention to emerging issues. Additionally,
determine whether necessary metrics or summary reports of metrics are provided to the
board.
2. Determine whether there are established performance benchmarks and standards for the IT
function and whether they serve to help management identify problem areas, particularly in
system or data center availability, operating conditions, response times, and error rates.
3. Review whether the institution has formal service level agreements with all of its third-party
providers. Determine whether the agreements provide the institution with assurance of
continued service.
November 2015 55
FFIEC IT Examination Handbook Management
7. Review the monitoring and reporting specific to the institution’s ITRM activities.
Specifically, determine whether the institution has developed the following:
a. A process to adequately identify and monitor relevant external threats and vulnerabilities.
b. Effective risk monitoring that provides tangible feedback on the quality of the
implementation of controls and risk mitigation strategies.
c. A reporting process that assembles and reports IT risk-related information in a timely,
complete, transparent, and relevant manner.
d. Appropriate escalation procedures in place depending on the content of the reporting.
2. Discuss findings with management and obtain proposed corrective action for significant
deficiencies.
3. Document conclusions in a memorandum to the EIC that provides report-ready comments for
all relevant sections of the report of examination and guidance to future examiners.
4. Organize work papers to ensure clear support for significant findings by examination
objective.
November 2015 56
FFIEC IT Examination Handbook Management
Appendix B: Glossary
Access: The ability to physically or logically enter or make use of an IT system or area (secured
or unsecured). The process of interacting with a system.
Administrator privileges: Computer system access to resources that are unavailable to most
users. Administrator privileges permit execution of actions that would otherwise be restricted.
Application development: The process of designing and building code to create a computer
program (software) used for a particular type of job.
Confidentiality: Assuring that information will be kept secret, with access limited to appropriate
persons.
Corrective control: A mitigating technique designed to lessen the impact to the institution when
adverse events occur.
Data center: A facility that houses an institution’s most important information systems
components, including computer systems, telecommunications components, and storage systems.
Detective control: A mitigating technique designed to recognize an event and alert management
when events occur.
Due diligence: Technical, functional, and financial review to verify a service provider’s ability
to deliver the requirements specified in its proposal. The intent is to verify that the service
November 2015 57
FFIEC IT Examination Handbook Management
provider has a well-developed plan and adequate resources and experience to ensure acceptable
service, controls, systems backup, availability, and continuity of service to its clients.
Enterprise Architecture: The overall design and high-level plan that describes an institution’s
operational framework and includes the institution’s mission, stakeholders, business and
customers, work flow and processes, data processing, access, security, and availability.
Information security: The process by which an organization protects the creation, collection,
storage, use, transmission, and disposal of information.
Information systems: Electronic systems and physical components used to access, store,
transmit, protect, and eventually dispose of information. Information systems can include
networks (computer systems, connections to business partners and the Internet, and the
interconnections between internal and external systems). Other examples are backup tapes,
mobile devices, and other media.
November 2015 58
FFIEC IT Examination Handbook Management
Infrastructure: Describes what has been implemented by IT architecture and often include
support facilities such as power, cooling, ventilation, server and data redundancy and resilience,
and telecommunications lines. Specific architecture types may exist for the following: enterprise,
data (information), technology, security, and application.
Interdependencies: Where two or more departments, processes, functions, and/or third parties
affect or support one another.
Interoperability: The ability of a system to work with or use the parts or equipment of another
system.
IT architecture: A subset of enterprise architecture, with detail to support data processing and
access, including fundamental requirements for centralized or distributed computing, real or
virtual servers, devices and workstations, and networking design. Architecture plans may also
exist for data (information), security, and applications.
IT governance: An integral part of governance that consists of the leadership and organizational
structures and processes that ensure that the organization’s IT sustains and extends the
organization’s strategies and objectives.
IT system inventory: A list containing information about the information resources owned or
operated by an organization.
Malware: Software designed to secretly access a computer system without the owner’s informed
consent. The expression is a general term (short for malicious software) used to mean a variety
of forms of hostile, intrusive, or annoying software or program code. Malware includes computer
viruses, worms, trojan horses, spyware, dishonest adware, ransomware, crimeware, most
rootkits, and other malicious and unwanted software or programs.
November 2015 59
FFIEC IT Examination Handbook Management
Mobile financial services: A financial institution’s use of mobile devices to provide products
and services to its customers.
National Institute of Standards and Technology (NIST): An agency of the U.S. Department
of Commerce that works to develop and apply technology, measurements, and standards. NIST
developed a voluntary cybersecurity framework based on existing standards, guidelines, and
practices for reducing cyber risks to critical infrastructures.
Network: Two or more computer systems that are connected to share information, software, and
hardware.
Operating system: A system that supports and manages software applications. Operating
systems allocate system resources, provide access and security controls, maintain file systems,
and manage communications between end users and hardware devices.
Operational IT plan: Typically, the plans that are made by front-line, or low-level, IT
managers. Operational IT plans are focused on the specific procedures and processes that
implement the larger strategic plan.
Operational risk: The risk of failure or loss resulting from inadequate or failed processes,
people, or systems.
Penetration test: The process of using approved, qualified personnel to conduct real-world
attacks against a system to identify and correct security weaknesses before they are discovered
and exploited by others.
Principle of least privilege: The security objective of granting users only the access needed to
perform official duties.
Residual risk: The amount of risk remaining after the implementation of controls.
Resilience: The ability of an institution to recover from a significant disruption and resume
critical operations.
November 2015 60
FFIEC IT Examination Handbook Management
Risk: The potential that events, expected or unanticipated, may have an adverse effect on a
financial institution’s earnings, capital, or reputation.
Risk identification: The process of determining risks and existing safeguards. It generally
includes inventories of systems and information necessary to operations and defines the potential
threats to systems and operations.
Risk management: The total process required to identify, control, and minimize the impact of
uncertain events. The objective of a risk management program is to reduce risk and obtain and
maintain appropriate management approval at pre-defined stages in the life cycle.
Risk mitigation: The process of reducing risks through the introduction of specific controls and
risk transfer. It includes the implementation of appropriate controls to reduce the potential for
risk and bring the level of risk in line with the board’s risk appetite.
Scenario analysis: The process of analyzing possible future events by considering alternative
possible outcomes.
Security breach: A security event that results in unauthorized access of data, applications,
services, networks, or devices by bypassing underlying security mechanisms.
Security event: An event that potentially compromises the confidentiality, integrity, availability,
or accountability of an information system.
Security posture: The security status of an enterprise’s networks, information, and systems
based on information assurance resources (e.g., people, hardware, software, and policies) and
capabilities in place to manage the defense of the enterprise and to react as the situation changes.
Service level agreement (SLA): Formal documents between an institution and its third-party
provider that outline an institution’s predetermined requirements for a service and establish
November 2015 61
FFIEC IT Examination Handbook Management
incentives to meet, or penalties for failure to meet, the requirements. SLAs should specify and
clarify performance expectations, establish accountability, and detail remedies or consequences
if performance or service quality standards are not met.
Social engineering: A general term for trying to trick people into revealing confidential
information or performing certain actions.
Tactical plan: Typically, a short-term plan that establishes the specific steps needed to
implement a company’s strategic plan.
Third-party provider: Any type of company, including affiliated entities, nonaffiliated entities,
and alliances of companies providing products and services to a financial institution. Other terms
used to describe service providers include subcontractors, external service providers, application
service providers, and outsourcers. Also called a third-party service provider.
Third-party relationship: Any business arrangement between a financial institution and another
entity, by contract or otherwise.
Threat intelligence: The acquisition and analysis of information to identify, track, and predict
cyber capabilities, intentions, and activities that offer courses of action to enhance decision-
making.
Total cost of ownership (TCO): The true cost of ownership of a computer or other technology
system that includes: original cost of the computer and software; hardware and software
upgrades; maintenance; technical support; and training.
Vulnerability: A hardware, firmware, or software flaw that leaves an information system open
to potential exploitation; a weakness in automated system security procedures, administrative
controls, physical layout, internal controls, etc., that could be exploited to gain unauthorized
access to information or to disrupt critical processing.
November 2015 62
FFIEC IT Examination Handbook Management
Appendix C: References
Laws
12 USC 1464(d), Home Owners’ Loan Act
12 USC 1867(c), Bank Service Company Act
12 USC 1882, Bank Protection Act
15 USC 6801 and 6805(b), Gramm–Leach–Bliley Act
18 USC 1030, Computer Fraud and Abuse Act
Federal Reserve
Regulations
Guidance
12 CFR 364, appendix A, “Interagency Guidelines Establishing Standards for Safety and
Soundness”
12 CFR 364, appendix B, “Interagency Guidelines Establishing Information Security
Standards”
November 2015 63
FFIEC IT Examination Handbook Management
Guidance
Guidance
NCUA Letter to Credit Unions 02–CU–17, “E-Commerce Guide for Credit Unions”
(December 2002)
NCUA Letter to Credit Unions 01–CU–20, “Due Diligence Over Third–Party Service
Providers” (November 2001)
NCUA Letter to Credit Unions 00–CU–11, “Risk Management of Outsourced Technology
Services (with Enclosure)” (December 2000)
November 2015 64
FFIEC IT Examination Handbook Management
12 CFR 30, appendix A, “Interagency Guidelines Establishing Standards for Safety and
Soundness”
12 CFR 30, appendix B, “Interagency Guidelines Establishing Information Security
Standards”
Guidance
OCC Bulletin 2015–20, “Cybersecurity: Destructive Malware Joint Statement” (March 30,
2015)
OCC Bulletin 2015–19, “Cybersecurity: Cyber Attacks Compromising Credentials Joint
Statement” (March 30, 2015)
OCC Bulletin 2015–9, “FFIEC Information Technology Examination Handbook:
Strengthening the Resilience of Outsourced Technology Services, New Appendix for
Business Continuity Planning Booklet” (February 6, 2015)
OCC Bulletin 2014-45, “Heightened Standards for Large Banks; Integration of 12 CFR 30
and 12 CFR 170: Final Rules and Guidelines”
OCC Bulletin 2014–53, “Cybersecurity: Cybersecurity Assessment General Observations
and Statement” (November 3, 2014)
OCC Bulletin 2013–29, “Third-Party Relationships: Risk Management Guidance” (October
30, 2013)
OCC Bulletin 2006–26, “Disaster Planning: Hurricane Katrina—Lessons Learned” (June 15,
2006)
OCC Bulletin 2006–12, “Influenza Pandemic: Interagency Advisory” (March 15, 2006)
OCC Bulletin 2004–47, “FFIEC Guidance: Risk Management for the Use of Free and Open
Source Software” (October 27, 2004)
OCC Bulletin 2003–14, “Interagency White Paper on Sound Practices to Strengthen the
Resilience of the U.S. Financial System” (April 8, 2003)
OCC Bulletin 1998–3, “Technology Risk Management: Guidance for Bankers and
Examiners” (February 4, 1998)
Other References
FDIC FIL-28-2015 “Cybersecurity Assessment Tool” (July 2, 2015)
SR Letter 15-9, “FFIEC Cybersecurity Assessment Tool for Chief Executive Officers and
Boards of Directors” (July 2, 2015)
OCC Bulletin 2015-31, “FFIEC Cybersecurity Assessment Tool” (June 30, 2015)
Basel Committee on Banking Supervision, “Sound Practices for the Management and
Supervision of Operational Risk” (February 2003)
ISACA Control Objectives for Enterprise IT Governance (CoBIT)
November 2015 65