The first point to note is a stronger focus on the practical effectiveness of implemented measures than on their documented design. Supervisors are also stressing the importance of a consistent end-to-end approach .
In the ICT risk management, the identification and evaluation of Critical or Important Functions (CIFs)is as much of a focus as the CIFs themselves. Key areas of interest include:
- What is the underlying methodology for identification and classification of CIFs?
- Is the CIF assessment effectively linked with the inventories of business processes and ICT assets?
- To what extent are CIFs provided by internal or external service providers?
- Is the dependency on ICT service providers sufficiently identified in the inventories for business processes and ICT assets?
- Have the banks derived target catalogues of IT security measures and implemented them according to the respective level of criticality?
- Is the internal control system considered from both the 1st and 2nd line perspectives, including its consistency with the company's regulatory framework and its contribution to ensuring the implementation of the requirements?
- Are resources appropriately allocated to CIFs’ three lines of defence, and why?
As before, one area of particular focus is core ICT security measures such as encryption, backup & recovery (including tests), and network segmentation. Special attention is paid to (A) the risk-based derivation of measures and their operationally effective implementation. Another focus area is key business continuity management (BCM) features, with financial institutions required to prove that calculated and actual achievable recovery and restart times match, including any involvement from ICT service providers.