Sie sind auf Seite 1von 8

Cyber resilience of firms in

Australia's financial markets


November 2017
This is ASIC Report 555

Disclaimer

This report does not constitute legal advice. We encourage you to seek your own
professional advice to find out how the Corporations Act and other applicable laws
apply to you, as it is your responsibility to determine your obligations.

Examples in this report are purely for illustration; they are not exhaustive and are
not intended to impose or imply particular rules or requirements.

Australian Securities and Investments Commission


Overview
Cyber resilience is vital to all organisations
ASIC will
74%
operating in the digital economy, and nowhere is of organisations have
this more important than the financial markets well-managed IT
sector, where the trust between an organisation security processes and
and its clients is essential to its future. procedures
Raise awareness
of cyber risk across the financial
Over the past 24 months, 101 firms across the
markets sector by providing good
financial markets sector completed a self-
of organisations practice guidance and key questions

66%
assessment survey on their cyber resilience.
reported they have for boards
cyber incident
The results of these surveys show that while firms
are getting better at managing cyber risk, there's response plans in Measure and assess
still work to do. place the level of cyber resilience in financial
markets
Encouraging progress Engage and
What's next?
Understanding the cyber threat landscape and collaborate
making effective risk-based investments is a There is increasing recognition in the with regulated firms
continuous improvement process. industry that cyber security is a strategic,
enterprise-wide issue and that investment Conduct one-on-one
Large organisations with access to specialist skills in cyber risk management is a priority.
and resources demonstrate a relatively high conversations
degree of cyber resilience compared to small and Firms are prioritising investment based on with firms that appear to be
medium-sized enterprises (SMEs) some of which their individual assessments of cyber risk. challenged
are just beginning to develop their cyber Over the next 1218 months we are
resilience. expecting to see a significant increase in Review progress
cyber resilience across the financial
While there is opportunity for improvement across markets sector. made by firms against their target
the entire sector, this is particularly true for SMEs. maturity
About the survey
Survey participants were made up of a cross-section of
organisations in Australia's financial markets, including Current cyber resilience profile
stockbrokers, investment banks, market licensees, post-
trade infrastructure providers and credit ratings agencies. Information governance & risk
Information risk management
management
Twenty-nine large firms provided answers to the National
Institute of Standards in Technology Cybersecurity
Framework. Seventy-two SMEs answered the UK Cyber User access management
Essentials.

Using the surveys, firms assessed themselves against six Monitoring & detection
cyber resilience categories using a maturity scale of where
they are now (current) and where they intend to be in 12
18 months' time (target). User education & awareness

The cyber resilience categories included information


Protective IT security policies
governance and risk management, user access Protective security processes
& processes
management, monitoring and detection, user education and
awareness, protective IT security policies and processes, and
incident response. Incident response

Note: ASX Group and Chi-X were formally assessed by ASIC in 2016,
these results have been included in this analysis. 0 20 40 60 80 100

Adaptive
Partial Risk-informed Repeatable
Policies are continually
Policies are non-existent or not Policies are rarely Policies are formally approved and
evolving based on
formalised. Responses are ad hoc updated and are not regularly updated. Measures are in
changes to cyber
and sometimes reactive followed consistently place to ensure they are followed
security

Cyber resilience maturity scale


Cyber resilience of SMEs
Information governance & User access management Monitoring & detection
risk management User access management is the strongest area Almost 40% of SMEs reported shortcomings in
for SMEs with 83% reporting current maturity monitoring and detection practices. However,
Effective information risk management requires as 'repeatable' or 'adaptive'. Ninety-seven they are targeting a 32% improvement in the
formal governance, policies and procedures. SMEs percent reported a target of 'repeatable' or next 1218 months, which would leave only 7%
have found information risk management 'adaptive' over the next 1218 months, which with low maturity levels.
challenging with almost half reporting that they would leave only 3% at 'risk-informed'.
are currently at 'partial' or 'risk-informed' maturity One firm stated that there was 'no formal policy'
indicating significant room for improvement. A common principle identified in many in this area. They went on to explain that 'the
However, they are targeting a 39% improvement responses is the use of 'least privilege' (i.e. network is not a managed network where active
in the next 1218 months, which would leave only users are given the least amount of access monitoring could be implemented at the ISP
7% as 'partial' or 'risk informed'. necessary to perform their business role). This layer' but that it is 'in place at the network level'.
appears to be the standard for many SMEs. This demonstrates an understanding of the area
"whilst there are procedures in place for While some common themes were identified, it even though no formal policies are in place. The
cyber risk management, it has been is clear that SMEs are operating at a wide range next step for this organisation like many other
recognised that these need to be of maturity levels. SMEs is to review and formalise these policies.
documented, approved formally and
reviewed regularly" [Partial] More mature organisations reported that user
Retail stockbroker
access is managed by senior personnel and is
regularly updated. Others noted that user access
is 'not documented or formally approved'.

Current Current Current

Target Target Target

0 25 50 75 100 0 25 50 75 100 0 25 50 75 100


Partial Risk-informed Repeatable Adaptive Partial Risk-informed Repeatable Adaptive Partial Risk-informed Repeatable Adaptive
Cyber resilience of SMEs
User education & awareness Protective IT security Incident response
User education and awareness is another area
policies & processes Significant improvements are required around
that requires work by SMEs. Currently, only 61% incident response management. More than 40%
of SMEs are at 'repeatable' or 'adaptive' maturity Protective IT security policies and processes are a of firms are currently at 'partial' or 'risk-informed'
in this area. While this number is far too low, it is relatively strong area for SMEs, although there is maturity. The common theme is a lack of
encouraging to see a targeted improvement of still room for improvement. Currently, 71% of formalised processes.
35% which would leave only 4% of SMEs at SMEs are at 'repeatable' or 'adaptive' maturity in
'partial' or 'risk-informed' maturity. this area, with targets of 93%. SMEs acknowledge the importance of this area
and are targeting a 35% improvement, which
"users have been educated on a casual Over 80% of SMEs reported that security would leave less than 10% as 'partial' or 'risk-
and ad-hoc basis. A more formal and management of servers, networks, and security informed'.
comprehensive education regime is testing was well managed with plans to
being developed" [Risk-Informed] improve this to 95% within the next assessment "No incident response plan exists for a
period. cyber security breach. A related entity in
Proprietary trader
the group recently experienced a denial
There are clear differences between well- However, substantial improvement is required of service attack. We are developing a
managed and less mature SMEs in this area. around mobile security and removable media framework from that experience, having
Some of the more mature SMEs identify user where 40% of SMEs reported a 'partial' or 'risk- worked through the issue with CERT
education as a 'top priority', referencing informed' maturity level for both areas. While Australia" [Partial]
'frequent trainings'. Less mature SMEs have a improvements in mobile security are set at a
healthy target of 35%, targeted improvements for Retail stockbroker
tendency towards training that is often provided
on an 'informal' or 'ad-hoc' basis. removable media controls need to be improved.

Current Current Current

Target Target Target

0 25 50 75 100 0 25 50 75 100 0 25 50 75 100


Partial Risk-informed Repeatable Adaptive Partial Risk-informed Repeatable Adaptive Partial Risk-informed Repeatable Adaptive
Cyber resilience of large firms
Information governance & User access management Monitoring & detection
risk management User access control is well managed by large Large firms generally demonstrate a high level of
firms. For example, user access to systems and maturity around the monitoring of activities on
All large firms understand their regulatory cyber data is permissions-based and physical access to networks. This includes detection and management
security obligations and have information and assets is controlled. of malicious software and anomalous user activity.
cyber security policies in place which are
communicated across the organisation and "[Firm] has a number of published and "External penetration tests ... are conducted
periodically reviewed and updated. approved policies and procedures every 6 months and internal penetration
regarding access control" [Repeatable] tests once every 12 months by a 3rd party
Forty-one percent of firms indicated that a Credit rating agency vendor. Results from the penetration tests
proper understanding of information flows across are remediated using a formal process"
the organisation was a work in progress. Forty- Senior management generally understand the [Repeatable]
five percent are still grappling with their threat landscape, and their roles and Australian market licensee
understanding of externally managed systems responsibilities within their organisation. Users that
and data. All firms indicated that these were have 'privileged' access to systems usually have a
Monitoring of unauthorised mobile software is
priority areas for the next investment period. clear understanding of their cyber security roles.
still an issue despite efforts to reduce risks.
Areas of improvement include: Ensuring third parties understand their cyber Areas of improvement include:
security roles as part of the supply chain is more
receiving and sharing threat information from establishing baselines for expected
challenging (e.g. 10% were 'partial' and 17%
external sources information flows over networks to allow
were 'risk-informed'). While there is a strong
anomalies to be detected
identification and prioritisation of asset appetite to improve status, 3% indicated they
vulnerabilities and risk responses. would aim to remain at 'partial' by the end of the aggregation of multiple information sources
next investment period. to improve threat detection and assessment.

Current Current Current

Target Target Target

0 25 50 75 100 0 25 50 75 100 0 25 50 75 100


Partial Risk-informed Repeatable Adaptive Partial Risk-informed Repeatable Adaptive Partial Risk-informed Repeatable Adaptive
Cyber resilience of large firms
User education & Protective IT security Incident response
awareness policies & processes Significant improvements are required around
incident response management. More than 40%
User education and awareness remains high on There has been a shift in the way data protection
of large firms are currently at 'partial' or 'risk-
the agenda for all large organisations, technology is being applied. For example, there is
informed' maturity. The common theme is a lack
particularly for the 21% that are currently increasing use of data encryption for data that is
of formalised processes.
'partial' or 'risk-informed'. All firms indicated stored and transmitted over networks.
that they plan to prioritise user training and Firms acknowledge the importance of adequate
Sixty-two percent of organisations indicated that
awareness going forward. incident response management and are targeting
they intend to improve their data protection
arrangements in the next 1218 months. a 35% improvement. This would leave less than
"[Firm] has a Security awareness program 10% of large entities as 'partial' or 'risk-
that includes mandatory 20 minute annual informed'.
training. Year around reinforcement "Removable media guidelines are
includes videos, monthly phishing provided and enforced through IT Use
simulations, intranet content" [Adaptive] Policy" [Repeatable]
Credit rating agency Credit rating agency

Current Current Current

Target Target Target

0 25 50 75 100 0 25 50 75 100 0 25 50 75 100


Partial Risk-informed Repeatable Adaptive Partial Risk-informed Repeatable Adaptive Partial Risk-informed Repeatable Adaptive

Das könnte Ihnen auch gefallen