Computer-Security Incident Notification Requirements
for US Banks

How to prepare your organization to comply with the US Financial Interagency Rule

The United States’ three federal bank regulatory agencies, the Office of the Comptroller of the Currency (OCC), the Board of Governors of the Federal Reserve System (Board), and the Federal Deposit Insurance Corporation (FDIC), approved requirements for US banks around reporting cybersecurity incidents.

Here is what every banking organization needs to know about incident notification.

Automate financial regulatory and contractual obligations with the BreachRx platform

Tailor your incident response plan in minutes so you know exactly what to do by when and take the legal crisis out of your incident response

Who Must Adhere to the Computer-Security Incident Notification Requirements

The Computer-Security Incident Notification Requirements apply to all banking organizations and bank service providers regulated by the OCC, the Board, and the FDIC, with the exception of designated financial market utilities.

What is a banking organization?The definition differs for each of the three agencies:

OCC: A national bank, federal savings association, or federal branch or agency of a foreign bank.

Board: A US bank holding company, US savings and loan holding company, state member bank, the US operations of foreign banking organizations, and an edge or agreement corporation.

SEC: An FDIC-supervised insured depository institution, including all insured state nonmember banks, insured state-licensed branches of foreign banks, and insured state savings associations.

What is a bank service provider?A bank service company or other person that performs “covered services,” which are services subject to the Bank Service Company Act.
How does the new rule get enforced?Each of the three agencies is responsible for enforcing the rule among the organizations under their supervisory authority. Depending on the agency, enforcement actions can typically include prompt corrective action directives, civil monetary penalties, and written agreements.

Incident Notification Requirements for US Banks

The US financial interagency rule defines two levels of incidents:

Computer-Security IncidentAn occurrence that (1) results in actual harm to the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits, or (2) violates or imminently threatens to violate security policies, security procedures, or acceptable use policies.
Notification IncidentAn occurrence that materially does or is likely to disrupt or degrade the ability to:

  • Carry out operations, activities, or processes, or the ability to deliver banking products and services to a material portion of customers in the ordinary course of business
  • Support business lines, including associated operations, services, functions, and support, that would result in a material loss of revenue, profit, or franchise value upon failure
  • Run operations, including associated services, functions, and support, that would pose a threat to the financial stability of the US upon failure

The types of incident that require a response and the type of response required differ for banking organizations and bank service providers as follows:

Banking OrganizationsBank Service Providers
Type of incident that requires a notificationNotification incidentComputer-security incident that materially disrupts or degrades covered services for four or more hours
Whom to notifyApplicable federal regulatorAt least one bank-designated point of contact at each affected banking organization (if not designated, then the CEO and CIO or two individuals of comparable responsibilities)
When to notify“As soon as possible” and no later than 36 hours after determining that a notification incident has occurredAs soon as possible after determining that a computer-security incident has occurred
How to issue the notificationTo the agency’s designated point of contact through email, telephone, or similar methods authorized by the regulatorTo an email address, phone number, or other means provided by the banking organization for the designated point of contact
What to include in the notificationGeneral information about the incidentGeneral information about the incident
Additional pointsThe 36 hour clock doesn’t start until the organization determines an incident has occurred and that it meets the threshold for notificationNo notification needs to be issued for disruptions of service due to scheduled maintenance, testing, or software updates if previously communicated

Examples of Incidents That Can Trigger a Notification Under the
US Financial Interagency Rule

For banking organizations, examples of notification incidents that can trigger a notification include:

ransomware

Ransomware Attack

An attack in which hackers use malware to steal data and hold it captive in exchange for a ransom payment. A ransomware attack that targets a core banking system or backup data qualifies as a notification incident.

tri-alert

Distributed Denial of Service (DDoS)

An attack that overwhelms a server, service, network or infrastructure with fake visitors to create a traffic jam. A DDoS attack that disrupts customer account access for more than four hours qualifies as a notification incident.

alert

Failed System Change

If a banking organization plans a system upgrade or change that fails and leads to widespread outages for customers and employees that prevents access to user accounts, then it qualifies as a notification incident.

For bank service providers, examples of computer-security incidents that require a notification include the following – if they cause actual harm, materially disrupt or degrade covered services, and do so for at least four hours:

Phishing malware or trojan

Watering Hole Attack

An attack in which hackers monitor individuals and infect websites they visit to access their computer and network, allowing the hacker to view, alter, steal, or destroy any data the victim can access.

stolen-records

Exfiltration

A part of most cyber attacks that occurs when hackers gain unauthorized access to move data to their own servers or devices.

data-theft

Drive-By Download

An attack in which hackers install a malicious program on a user’s computer (often by hiding it within a legitimate website or application) to gain access to hijack the device or steal data that lives on it.

How Banks Can Prepare to Comply with the
Computer-Security Incident Notification Requirements

The final rule from the US financial agencies is one of several guidelines banks must follow. It’s important to take a proactive approach to keeping track of these laws and maintaining response plans. This requires ensuring visibility into data and assigning responsibility over incident response. From there, it’s critical to prepare for three phases of incident response:

Readiness

Proactively prepare incident response plans before an incident occurs to be ready to meet response timelines and reduce the associated costs.

  • Review the requirements outlined in regulations and contracts.
  • Develop clear incident response plans for each one.

Response

Take action quickly when an incident occurs to maintain compliance with regulations and retain customer trust.

  • Identify what happened and when, and the potential impact.
  • Determine if it meets the threshold for notification.
  • Issue notifications as required.

Ongoing Management

Regularly revisit response plans to keep them up to date with the latest requirements and ensure that stakeholders know their responsibilities.

  • Introduce a dashboard to monitor and report on response plans and updates to regulations and contracts.
  • Provide stakeholders access to stay aligned on changes.

Prioritize Proactive Incident Management

Banking organizations and bank service providers are subject to a variety of regulations within the US and globally, making proactive preparation and tracking of these requirements a top priority.

These efforts should include understanding the requirements of each regulation, outlining incident response plans, and assigning responsibilities to be ready for a quick and confident response when an incident occurs.

Organizations must revisit these efforts regularly to keep up with changes to existing regulations and the addition of new ones.

Minimize your regulatory and contractual risk surface with the BreachRx platform

Stop using spreadsheets and documents to keep track of the legal tasks you need to accomplish during an incident response.

advanced-floating-content-close-btn

Headed to RSA?

 

Stop by to see us at our "Journey to Secure the Future" location at Fogo de Chão.

 

Book time with our team 👇


Schedule a Meeting