You are on page 1of 21

Cyber Resilience Assessment Framework

Version 1.1

Date 16-Dec-19
Risk Score Risk Level
Company Name:
Inherent Risk Level #DIV/0! #DIV/0!
Assessment Date
Category 1 - Technology 0.00
Assess Person
Category 2 - Delivery Channels #DIV/0!
Title
Category 3 - Products and Technology Services #DIV/0!
Verified by
Category 4 - Business Size and Organisatoinal Characteristics #DIV/0!
Title
Category 5 - Tracked records on cyber threats #DIV/0!

Instruction Assessment Result

1) Throughout the tool, orange-filled cells require the company to provide input by assessing whether the specific
controls in each domain are designed and consistently operated in the organisation. Baseline Evolve Intermediate Advance Innovative

Cyber Risk Management 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet

Threats Intelligence 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet

Cybersecurity Controls 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet

External Dependency 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet

Cyber Incident Management 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet 0.00% Not Meet

2) Input guideline:-
- Yes (Y) : Control is designed and implemented by the organisation. The control is consistently and effectively
operated across opganisation and business units. Role and responsibilities of control owner or responsible staff
are recognised and well documented.
- Partial (P) : Control is partially designed or partially meet control objectives. Control is endorsed in some
specific part or business units in the organisation or control is occasionally operated or implemented. Staff is
acknowledge its roles and responsibilities, however, it may not formally documented as part of Organisation's
security policy, procedure, or standard documents.
- No (N) : Control is neither stated in the organisation policy nor put in place in IT and security operations.
- Not Applicable (N/a) : Control is not applicable as the company is not exposed to the risk. i.e. Wireless network
is not implementded or prohibited. As such, control relevant to Wireless security is not applicable.
Inherest risk assessment
No Descriptions Unit of measurement Responses
Category 1 - Technology
1 Total number of internet service provider (ISP) connections No. of connections
(including branch connections if not a leased line), which are
connected to the coporate network.

2 Total number of point-to-point connections via leased lines or No. of private leased line connections.
private connections technology between the company and external
parties (including service provider, customer, business partner,
affiliate firms, etc.).

3 Use of wireless network access. separation of access points for guest and corporate wireless
4 Non-coporate devices (Physical devices not owned by the company) No. of staffs who can get acces corporate resources using non-corporate ###
allowed to connect to the coporate network. device or BYOD
Mobile push mail
laptop/PC
Removable storage
Others
Total of staffs who are teleworkers or use company provided mobility No. of teleworkers
device.
Application permitted for BYOD access. Type of applications

5 Third parties (vendors and subcontractors) with access to internal No. of organisatioins
systems. Third party access method

6 Number of applications, which are classified as the critical business No. of critical applications
application per Nor Por.3/2559
7 Number of systems that have reached end-of-life (EOL) and have no No. of EOL system
further support/patch from vendor.

8 Network devices (e.g. switches, routers, firewalls, etc.), including No. of network devices
physical and vertialised devices.
9 Cloud computing services hosted externally to support critical Cloud provisioning model
activities No. of cloud computing services
Category 2 - Delivery Channels
10 Internet web presense (website or web application) Type of internet web-facing services
11 Mobile presense Type of services provided
12 Social media presense Type of services provided
13 Number electronic platforms (e.g. internet or mobile) for financially No. of applications
service provisioning.
14 Number of customer accounts on electronic platforms (e.g. internet No. of customer accounts
or mobile) .
Category 3 - Products and Technology Services
15 Monthly transaction value (on average) made through the electronic Transaction value (THB)
platforms (e.g. internet or mobile) .

Percentage of value of transactions made via electronic platforms Percentage


(e.g. internet or mobile).
Category 4 - Business Size and Organisatoinal Characteristics
16 Total number of branches No. of branches
17 Vaule of assets under management Value ( THB)
18 Number of direct employees No. of staffs
19 Number of IT staffs, including staff who take care of IT and No. of staffs
cybersecurity in all 3 lines of defences.
Percentage of IT outsource staffs to total number of IT staffs. Percentage

Turn over rate of IT staffs. Percentage


Category 5 - Tracked records on cyber threats
20 Number of attempted cyber attack events (e.g. SQL injection, social No. of attempts
engineering, etc.)
Number of successful but contained attacks without any direct or No. of attempts
indirect loss.
Number of breaches (bypassed all layer of defence architecture) and No. of attempts
caused direct or indirect loss.
Type of attacks - malware Malware detection point
Type of attacks - phishing Phishing target
Maturity
Baseline Evolve Intermediate Advance Innovative
Domains
Compile (%) #Controls #Controls Compile (%) #Controls #Controls Compile (%) #Controls #Controls Compile (%) #Controls #Controls Compile (%) #Controls #Controls

Cyber Risk Management & Governance Oversight 0.00% 0 3 0.00% 0 2 0.00% 0 6 0.00% 0 2 0.00% 0 2
Oversight Strategy / Policies 0.00% 0 5 0.00% 0 3 0.00% 0 4 0.00% 0 2 0.00% 0 1
IT Asset Management 0.00% 0 3 0.00% 0 4 0.00% 0 2 0.00% 0 4 0.00% 0 2
Risk Management Risk Management Program 0.00% 0 1 0.00% 0 3 0.00% 0 3 0.00% 0 3 0.00% 0 2
Risk Assessment 0.00% 0 3 0.00% 0 2 0.00% 0 1 0.00% 0 1 0.00% 0 1
Audit 0.00% 0 3 0.00% 0 3 0.00% 0 3 0.00% 0 1 0.00% 0 2
Resources Staffing 0.00% 0 2 0.00% 0 3 0.00% 0 1 0.00% 0 2 0.00% 0 1
Training & Culture Training 0.00% 0 3 0.00% 0 3 0.00% 0 3 0.00% 0 1 0.00% 0 1
Culture 0.00% 0 1 0.00% 0 2 0.00% 0 2 0.00% 0 1 0.00% 0 1
Threat Intelligence & Collaboration Threat Intelligence Threat Intelligence and Information 0.00% 0 2 0.00% 0 1 0.00% 0 2 0.00% 0 2 0.00% 0 1
Monitoring & Analyzing Monitoring and Analyzing 0.00% 0 2 0.00% 0 3 0.00% 0 2 0.00% 0 3 0.00% 0 2
Information Sharing Information Sharing 0.00% 0 3 0.00% 0 2 0.00% 0 2 0.00% 0 2 0.00% 0 2
Cybersecurity Controls Preventative Controls Infrastructure Management 0.00% 0 8 0.00% 0 5 0.00% 0 5 0.00% 0 2 0.00% 0 3
Access and Data Management 0.00% 0 14 0.00% 0 3 0.00% 0 4 0.00% 0 2 0.00% 0 2
Device / End-Point Security 0.00% 0 2 0.00% 0 4 0.00% 0 3 0.00% 0 2 0.00% 0 1
Secure Coding 0.00% 0 3 0.00% 0 1 0.00% 0 2 0.00% 0 3 0.00% 0 1
Detective Controls Threat and Vulnerability Detection 0.00% 0 3 0.00% 0 3 0.00% 0 2 0.00% 0 1 0.00% 0 2
Anomalous Activity Detection 0.00% 0 4 0.00% 0 4 0.00% 0 2 0.00% 0 3 0.00% 0 1
Event Detection 0.00% 0 4 0.00% 0 1 0.00% 0 2 0.00% 0 3 0.00% 0 1
Corrective Controls Patch Management 0.00% 0 3 0.00% 0 3 0.00% 0 1 0.00% 0 1 0.00% 0 1
Remediation 0.00% 0 1 0.00% 0 2 0.00% 0 2 0.00% 0 1 0.00% 0 1
External Dependency Management Connections Connections 0.00% 0 3 0.00% 0 3 0.00% 0 2 0.00% 0 2 0.00% 0 1
Relationship Management Due Diligence 0.00% 0 2 0.00% 0 1 0.00% 0 2 0.00% 0 1 0.00% 0 1
Contracts 0.00% 0 4 0.00% 0 2 0.00% 0 1 0.00% 0 1 0.00% 0 1
Ongoing Monitoring 0.00% 0 2 0.00% 0 2 0.00% 0 2 0.00% 0 2 0.00% 0 1
Cyber Incident Management and Incident Resilience Planning and Strategy Planning 0.00% 0 6 0.00% 0 5 0.00% 0 3 0.00% 0 1 0.00% 0 1
Resilience Testing 0.00% 0 2 0.00% 0 3 0.00% 0 2 0.00% 0 2 0.00% 0 2
Detection, Response, and Mitigation Detection 0.00% 0 2 0.00% 0 1 0.00% 0 3 0.00% 0 1 0.00% 0 1
Response and Mitigation 0.00% 0 1 0.00% 0 5 0.00% 0 2 0.00% 0 1 0.00% 0 2
Escalation and Reporting Escalation and Reporting 0.00% 0 4 0.00% 0 2 0.00% 0 3 0.00% 0 1 0.00% 0 1
1) Cyber Risk Management
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Governance Oversight 1.Designated members of management 4.At least annually, the board or an 6.The board or an appropriate board 12.The board or board committee 14.The board or an appropriate board
are held accountable by the board or an appropriate board committee reviews committee has cybersecurity expertise or approved cyber risk appetite statement is committee discusses ways for
appropriate board committee for and approves the institution’s engages experts to assist with oversight part of the enterprise-wide risk appetite management to develop cybersecurity
implementing and managing the cybersecurity program. responsibilities. statement. improvements that may be adopted
information security and business sector-wide.
continuity programs.

2.Information security risks are discussed 5.Cybersecurity tools and staff are 7.The standard board meeting package 13.The budget process for requesting 15.The board or an appropriate board
in management meetings when prompted requested through the budget process. includes reports and metrics that go additional cybersecurity staff and tools committee verifies that management’s
by highly visible cyber events or beyond events and incidents to address maps current resources and tools to the actions consider the cyber risks that the
regulatory alerts. threat intelligence trends and the cybersecurity strategy. institution poses to other critical
institution’s security posture. infrastructures (e.g., telecommunications,
energy).

3.Management provides a written report 8.The institution has a cyber risk appetite
on the overall status of the information statement approved by the board or an
security and business continuity appropriate board committee.
programs to the board or an appropriate
board committee at least annually.

9.Cyber risks that exceed the risk appetite


are escalated to management.
10.The board or an appropriate board
committee ensures management’s annual
cybersecurity self-assessment evaluates
the institution’s ability to meet its cyber
risk management standards.

11.The board or an appropriate board


committee reviews and approves
management’s prioritization and resource
allocation decisions based on the results
of the cyber assessments.

Governance Strategy / Policies 16.The institution has policies 21.The institution augmented its 24.The institution has a comprehensive 28.The cybersecurity strategy outlines the 30.The cybersecurity strategy identifies
commensurate with its risk and information security strategy to set of policies commensurate with its risk institution’s future state of and communicates the institution's role
complexity that address the concepts of incorporate cybersecurity and resilience. and complexity that address the concepts cybersecurity with short-term and long- as it relates to other critical
information technology risk management. of threat intelligence. term perspectives. infrastructures.

17.The institution has board-approved 22.The institution has a formal 25.Management periodically reviews the 29.Industry-recognized cybersecurity
policies commensurate with its risk and cybersecurity program that is based on cybersecurity strategy to address evolving standards are used as sources during the
complexity that address information technology and security industry cyber threats and changes to the analysis of cybersecurity program gaps.
security. standards or benchmarks. institution’s inherent risk profile.

18.The institution has policies 23.The institution has policies 26.Management links strategic
commensurate with its risk and commensurate with its risk and cybersecurity objectives to tactical goals.
complexity that address the concepts of complexity that address the concepts of
external dependency or third-party threat information sharing.
management.

19.The institution has policies 27.A formal process is in place to cross-


commensurate with its risk and reference and simultaneously update all
complexity that address the concepts of policies related to cyber risks across
incident response and resilience. business lines.

20.A formal process is in place to update


policies as the institution’s inherent risk
profile changes.
1) Cyber Risk Management
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Governance IT Asset Management 31.An inventory of organizational assets 34.The asset inventory, including 38.Baseline configurations cannot be 40.Supply chain risk is reviewed before 44.A formal change management
(e.g., hardware, software, data, and identification of critical assets, is updated altered without a formal change request, the acquisition of mission-critical function governs decentralized or highly
systems hosted externally) is maintained. at least annually to address new, documented approval, and an assessment information systems including system distributed change requests and identifies
relocated, re-purposed, and sunset assets. of security implications. components. and measures security risks that may
cause increased exposure to cyber attack.

32.Organizational assets (e.g., hardware, 35.The institution has a documented 39.A formal IT change management 41.Automated tools enable tracking, 45.Comprehensive automated enterprise
systems, data, and applications) are asset life-cycle process that considers process requires cybersecurity risk to be updating, asset prioritizing, and custom tools are implemented to detect and block
prioritized for protection based on the whether assets to be acquired have evaluated during the analysis, approval, reporting of the asset inventory. unauthorized changes to software and
data classification and business value. appropriate security safeguards. testing, and reporting of changes. hardware.

33.A change management process is in 36.The institution proactively manages 42.Automated processes are in place to
place to request and approve changes to system EOL (e.g., replacement) to limit detect and block unauthorized changes to
systems configurations, hardware, security risks. software and hardware.
software, applications, and security tools.

37.Changes are formally approved by an 43.The change management system uses


individual or committee with appropriate thresholds to determine when a risk
authority and with separation of duties. assessment of the impact of the change is
required.

Risk Management Risk Management Program 46.An information security and business 47.The risk management program 50.The cybersecurity function has a clear 53.Independent risk management sets 56.The risk management function
continuity risk management function(s) incorporates cyber risk identification, reporting line that does not present a and monitors cyber-related risk limits for identifies and analyzes commonalities in
exists within the institution. measurement, mitigation, monitoring, conflict of interest. business units. cyber events that occur both at the
and reporting. institution and across other sectors to
enable more predictive risk management.

48.Management reviews and uses the 51.The risk management program 54.A process is in place to analyze the 57.A process is in place to analyze the
results of audits to improve existing specifically addresses cyber risks beyond financial impact cyber incidents have on financial impact that a cyber incident at
cybersecurity policies, procedures, and the boundaries of the technological the institution’s capital. the institution may have across the
controls. impacts (e.g., financial, strategic, financial sector.
regulatory, compliance).

49.Management monitors moderate and 52.Management uses the results of 55.The cyber risk data aggregation and
high residual risk issues from the independent audits and reviews to real-time reporting capabilities support
cybersecurity risk assessment until items improve cybersecurity. the institution’s ongoing reporting needs,
are addressed. particularly during cyber incidents.

Risk Management Risk Assessment 58.A risk assessment focused on 61.Risk assessments are used to identify 63.The risk assessment is adjusted to 64.An enterprise-wide risk management 65.The risk assessment is updated in real
safeguarding customer information the cybersecurity risks stemming from consider widely known risks or risk function incorporates cyber threat time as changes to the risk profile occur,
identifies reasonable and foreseeable new products, services, or relationships. management practices. analysis and specific risk exposure as part new applicable standards are released or
internal and external threats, the of the enterprise risk assessment. updated, and new exposures are
likelihood and potential damage of anticipated.
threats, and the sufficiency of policies,
procedures, and customer information
systems.

59.The risk assessment identifies 62.The risk assessment considers the risk
internet-based systems and high-risk of using EOL software and hardware
transactions that warrant additional components.
authentication controls.

60.The risk assessment is updated to


address new technologies, products,
services, and connections before
deployment.
1) Cyber Risk Management
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Risk Management Audit 66.Independent audit or review evaluates 69.The independent audit function 72.The independent audit function 75.A formal process is in place for the 76.A formal process is in place for the
policies, procedures, and controls across validates that the institution’s validates that the institution’s threat independent audit function to update its independent audit function to update its
the institution for significant risks and cybersecurity controls function is intelligence and collaboration are procedures based on changes to the procedures based on changes to the
control issues associated with the commensurate with the institution’s risk commensurate with the institution’s risk evolving threat landscape across the evolving threat landscape across other
institution's operations, including risks in and complexity. and complexity. sector. sectors the institution depends upon.
new products, emerging technologies, and
information systems.

67.Logging practices are independently 70.The independent audit function 73.Independent audits or reviews are 77.The independent audit function uses
reviewed periodically to ensure validates that the institution’s third-party used to identify gaps in existing security sophisticated data mining tools to
appropriate log management (e.g., access relationship management is capabilities and expertise. perform continuous monitoring of
controls, retention, and maintenance). commensurate with the institution’s risk cybersecurity processes or controls.
and complexity.

68.Issues and corrective actions from 71.The independent audit function 74.Independent audits or reviews are
internal audits and independent validates that the institution’s incident used to identify cybersecurity weaknesses,
testing/assessments are formally tracked response program and resilience are root causes, and the potential impact to
to ensure procedures and control lapses commensurate with the institution’s risk business units. (Reclass)
are resolved in a timely manner. and complexity.
1) Cyber Risk Management
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Resources Staffing 78.Information security roles and 80.Management with appropriate 83.The institution has a program for 84.The institution benchmarks its 86.The institution actively partners with
responsibilities have been identified. knowledge and experience leads the talent recruitment, retention, and cybersecurity staffing against peers to industry associations and academia to
institution's cybersecurity efforts. succession planning for the cybersecurity identify whether its recruitment, inform curricula based on future
and resilience staffs. retention, and succession planning are cybersecurity staffing needs of the
commensurate. industry.

79.Processes are in place to identify 81.Staff with cybersecurity 85.Dedicated cybersecurity staff develops,
additional expertise needed to improve responsibilities have the requisite or contributes to developing, integrated
information security defenses. qualifications to perform the necessary enterprise-level security and cyber
tasks of the position. defense strategies.

82.Employment candidates, contractors,


and third parties are subject to
background verification proportional to
the confidentiality of the data accessed,
business requirements, and acceptable
risk.

Training & Culture Training 87.Annual information security training 90.The institution has a program for 93.Management incorporates lessons 96.Independent directors are provided 97.Key performance indicators are used
is provided. continuing cybersecurity training and learned from social engineering and with cybersecurity training that addresses to determine whether training and
skill development for cybersecurity staff. phishing exercises to improve the how complex products, services, and lines awareness programs positively influence
employee awareness programs. of business affect the institution's cyber behavior.
risk.

88.Annual information security training 91.Management is provided cybersecurity 94.Cybersecurity awareness information
includes incident response, current cyber training relevant to their job is provided to retail customers and
threats (e.g., phishing, spear phishing, responsibilities. commercial clients at least annually.
social engineering, and mobile security),
and emerging issues.

89.Situational awareness materials are 92.Business units are provided 95.The institution routinely updates its
made available to employees when cybersecurity training relevant to their training to security staff to adapt to new
prompted by highly visible cyber events particular business risks. threats.
or by regulatory alerts.

Training & Culture Culture 98.Management holds employees 99.The institution has formal standards 101.Management ensures performance 103.Management ensures continuous 104.The institution leads efforts to
accountable for complying with the of conduct that hold all employees plans are tied to compliance with improvement of cyber risk cultural promote cybersecurity culture across the
information security program. accountable for complying with cybersecurity policies and standards in awareness. sector and to other sectors that they
cybersecurity policies and procedures. order to hold employees accountable. depend upon.

100.Employees have a clear 102.Cyber risk reporting is presented and


understanding of how to identify and discussed at the independent risk
escalate potential cybersecurity issues. management meetings.
2) Threats Intelligence
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Threat Intelligence Threat Intelligence and Information 105.The institution belongs or subscribes 107.Threat information received by the 108.A formal threat intelligence program 110.Threat intelligence is automatically 112.The institution is investing in the
to a threat and vulnerability information institution includes analysis of tactics, is implemented and includes subscription received from multiple sources in real development of new threat intelligence
sharing source(s) that provides patterns, and risk mitigation to threat feeds from external providers time. and collaboration mechanisms (e.g.,
information on threats (e.g., Financial recommendations. and internal sources. technologies, business processes) that will
Services Information Sharing and transform how information is gathered
Analysis Center [FS-ISAC], U.S. and shared.
Computer Emergency Readiness Team
[US-CERT], TCM Cert, Thai Cert, TB
Cert)

106.Threat information is used to 109.A read-only, central repository of 111.The institution’s threat intelligence
monitor threats and vulnerabilities. cyber threat intelligence is maintained. includes information related to
geopolitical events that could increase
cybersecurity threat levels.
Monitoring and AnalyzinMonitoring and Analyzing 113.Audit log records and other security 115.A process is implemented to monitor 118.A threat intelligence team is in place 120.A dedicated cyber threat 123.The institution uses multiple sources
event logs are reviewed and retained in a threat information to discover emerging that evaluates threat intelligence from identification and analysis committee or of intelligence, correlated log analysis,
secure manner. threats. multiple sources for credibility, relevance, team exists to centralize and coordinate alerts, internal traffic flows, and
and exposure. initiatives and communications. geopolitical events to predict potential
future attacks and attack trends.

114.Computer event logs are used for 116.Security processes and technology are 119.Threat intelligence is analyzed to 121.Emerging internal and external threat 124.IT systems automatically detect
investigations once an event has centralized and coordinated in a Security develop cyber threat summaries including intelligence and correlated log analysis configuration weaknesses based on threat
occurred. Operations Center (SOC) or equivalent. risks to the institution and specific are used to predict future attacks. intelligence and alert management so
actions for the institution to consider. actions can be prioritized.

117.Monitoring systems operate 122.Threat intelligence is used to update


continuously with adequate support for architecture and configuration standards.
efficient incident handling.
Information Sharing Information Sharing 125.Information security threats are 128.A formal and secure process is in 130.Information is shared proactively 132.Management communicates threat 134.A mechanism is in place for sharing
gathered and shared with applicable place to share threat and vulnerability with the industry, law enforcement, intelligence with business risk context cyber threat intelligence with business
internal employees. information with other entities. regulators, and information-sharing and specific risk management units in real time including the potential
forums. recommendations to the business units. financial and operational impact of
inaction.
126.Contact information for law 129.A representative from the institution 131.A process is in place to communicate 133.A network of trust relationships 135.A system automatically informs
enforcement and the regulator(s) is participates in law enforcement or and collaborate with the public sector (formal and/or informal) has been management of the level of business risk
maintained and updated regularly. information-sharing organization regarding cyber threats. established to evaluate information about specific to the institution and the progress
meetings. cyber threats. of recommended steps taken to mitigate
the risks.
127.Information about threats is shared
with law enforcement and regulators
when required or prompted.
3) Cybersecurity Controls
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Preventative Controls Infrastructure Management 136.Network perimeter defense tools 144.There is a firewall at each Internet 149.The enterprise network is segmented 154.Only one primary function is 156.The institution risk scores all of its
(e.g., border router and firewall) are used. connection and between any in multiple, separate trust/security zones permitted per server to prevent functions infrastructure assets and updates in real
Demilitarized Zone (DMZ) and internal with defense-in-depth strategies (e.g., that require different security levels from time based on threats, vulnerabilities, or
network(s). logical network segmentation, hard co-existing on the same server. operational changes.
backups, air-gapping) to mitigate attacks.

137.Up to date antivirus and anti- 145.Antivirus and intrusion 150.Security controls are used for remote 155.Anti-spoofing measures are in place 157.Automated controls are put in place
malware tools are used on key enterprise detection/prevention systems (IDS/IPS) access to all administrative consoles, to detect and block forged source IP based on risk scores to infrastructure
communication channel i.e. Server, Mail, detect and block actual and attempted including restricted virtual systems. addresses from entering the network. assets, including automatically
Internet) attacks or intrusions. disconnecting affected assets.

138.Systems configurations (for servers, 146.Technical controls prevent 151.Wireless network environments have 158.The institution proactively seeks to
desktops, routers, etc.) follow industry unauthorized devices, including rogue perimeter firewalls that are implemented identify control gaps that may be used as
standards and are enforced. wireless access devices and removable and configured to restrict unauthorized part of a zero-day attack.
media, from connecting to the internal traffic. (*N/A if there are no wireless
network(s). networks.)

139.Ports, functions, protocols and 147.A risk-based solution is in place at the 152.Wireless networks use strong
services are prohibited if no longer institution or Internet hosting provider to encryption with encryption keys that are
needed for business purposes. mitigate disruptive cyber attacks (e.g., changed frequently. (*N/A if there are no
DDoS attacks). wireless networks.)

140.Access to make changes to systems 148.Critical systems supported by legacy 153.The broadcast range of the wireless
configurations (including virtual technologies are regularly reviewed to network(s) is confined to institution-
machines and hypervisors) is controlled identify for potential vulnerabilities, controlled boundaries. (*N/A if there are
and monitored. upgrade opportunities, or new defense no wireless networks.)
layers.

141.System sessions are locked after a


pre-defined period of inactivity and are
terminated after pre-defined conditions
are met.

142.Wireless network environments


require security settings with strong
encryption for authentication and
transmission. (*N/A if there are no
wireless networks.)

143.Guest wireless networks are fully (at


least logically) segregated from the
internal network(s). (*N/A if there are no
wireless networks.)

Preventative Controls Access and Data Management 159.Employee access is granted to 173.Use of customer data in non- 176.The institution has implemented 180.Encryption of select data at rest is 182.Tokenization is used to substitute
systems and confidential data based on production environments complies with tools to prevent unauthorized access to or determined by the institution’s data unique values for confidential
job responsibilities and the principles of legal, regulatory, and internal policy exfiltration of confidential data. classification and risk assessment. information (e.g., virtual credit card).
least privilege. requirements for concealing or removing
of sensitive data elements.

160.Elevated privileges (e.g., 174.Physical access to high-risk or 177.Controls are in place to prevent 181.Customer authentication for high-risk 183.Real-time risk mitigation is taken
administrator privileges) are limited and confidential systems is restricted, logged, unauthorized escalation of user transactions includes methods to prevent based on automated risk scoring of user
tightly controlled (e.g., assigned to and unauthorized access is blocked. privileges. malware and man-in-the-middle attacks credentials.
individuals, not shared, and require (e.g., using visual transaction signing).
stronger password controls).
3) Cybersecurity Controls
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
161.User access reviews are performed 175.Controls are in place to prevent 178.All physical and logical access is
periodically for all systems and unauthorized access to cryptographic removed immediately upon notification
applications based on the risk to the keys. of involuntary termination and within 24
application or system. hours of an employee’s voluntary
departure.

162.Changes to physical and logical user 179.Confidential data are encrypted in


access, including those that result from transit across private connections (e.g.,
voluntary and involuntary terminations, frame relay and T1) and within the
are submitted to and approved by institution’s trusted zones.
appropriate personnel.

163.Identification and authentication are


required and managed for access to
systems, applications, and hardware.

164.Access controls include password


complexity, password expiration interval,
and limits to password attempts and
reuse.

165.All default passwords and


unnecessary default accounts are changed
before system implementation.

166.Physical security controls are used to


prevent unauthorized access to
information systems and
telecommunication systems.

167.All passwords are encrypted in


storage and in transit.

168.Confidential data are encrypted when


transmitted across public or untrusted
networks (e.g., Internet).

169.Mobile devices (e.g., laptops, tablets,


and removable media) are encrypted if
used to store confidential data. (*N/A if
mobile devices are not used.)

170.Administrative, physical, or technical


controls are in place to prevent users
without administrative responsibilities
from installing unauthorized software.

171.Customer service (e.g., the call center)


utilizes formal procedures to authenticate
customers commensurate with the risk of
the transaction or request.

172.Data is disposed of or destroyed


according to documented requirements
and within expected time frames.
3) Cybersecurity Controls
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Preventative Controls Device / End-Point Security 184.Controls are in place to restrict the 186.Tools automatically block attempted 190.Data loss prevention controls or 193.Employees’ and third parties’ devices 195.A centralized end-point management
use of removable media to authorized access from unpatched employee and devices are implemented for inbound and (including mobile) without the latest tool provides fully integrated patch,
personnel. third-party devices. outbound communications (e.g., e-mail, security patches are quarantined and configuration, and vulnerability
FTP, Telnet, prevention of large file patched before the device is granted management, while also being able to
transfers). access to the network. detect malware upon arrival to prevent an
exploit.

185.Antivirus and anti-malware tools are 187.Tools automatically block attempted 191.Mobile device management includes 194.Confidential data and applications on
deployed on end-point devices (e.g., access by unregistered devices to internal integrity scanning (e.g., jailbreak/rooted mobile devices are only accessible via a
workstations, laptops, and mobile networks. detection). (*N/A if mobile devices are secure, isolated sandbox or a secure
devices). not used.) container.

188.Controls are in place to prevent 192.Mobile devices connecting to the


unauthorized individuals from copying corporate network for storing and
confidential data to removable media. accessing company information allow for
remote software version/patch validation.
(*N/A if mobile devices are not used.)

189.The institution wipes data remotely


on mobile devices when a device is
missing or stolen. (*N/A if mobile devices
are not used.)
3) Cybersecurity Controls
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Preventative Controls Secure Coding 196.Developers working for the 199.Security testing occurs at all post- 200.The security of applications, 202.Vulnerabilities identified through a 205.Software code is actively scanned by
institution follow secure program coding design phases of the SDLC for all including Web-based applications static code analysis are remediated before automated tools in the development
practices, as part of a system applications, including mobile connected to the Internet, is tested implementing newly developed or environment so that security weaknesses
development life cycle (SDLC), that meet applications. (*N/A if there is no software against known types of cyber attacks (e.g., changed applications into production. can be resolved immediately during the
industry standards. development.) SQL injection, cross-site scripting, buffer design phase.
overflow) before implementation or
following significant changes.

197.The security controls of internally 201.Software code executables and scripts 203.All interdependencies between
developed software are periodically are digitally signed to confirm the applications and services have been
reviewed and tested. (*N/A if there is no software author and guarantee that the identified.
software development.) code has not been altered or corrupted.

198.The security controls in internally 204.Independent code reviews are


developed software code are completed on internally developed or
independently reviewed before migrating vendor-provided custom applications to
the code to production. (*N/A if there is ensure there are no security gaps.
no software development.)

Detective Controls Threat and Vulnerability Detection 206.Independent testing (including 209.Independent penetration testing of 212.Audit or risk management resources 214.Automated tool(s) proactively 215.User tasks and content (e.g., opening
penetration testing and vulnerability network boundary and critical Web- review the penetration testing scope and identifies high-risk behavior signaling an an e-mail attachment) are automatically
scanning) is conducted according to the facing applications is performed routinely results to help determine the need for employee who may pose an insider threat. isolated in a secure container or virtual
risk assessment for external- facing to identify security control gaps. rotating companies based on the quality environment so that malware can be
systems and the internal network. of the work. analyzed but cannot access vital data,
end-point operating systems, or
applications on the institution’s network.

207.Firewall rules are audited or verified 210.Independent penetration testing is 213.E-mails and attachments are 216.Weekly vulnerability scanning is
at least quarterly. performed on Internet-facing automatically scanned to detect malware rotated among environments to scan all
applications or systems before they are and are blocked when malware is present. environments throughout the year.
launched or undergo significant change. (Reclassed)

208.E-mail protection mechanisms are 211.Vulnerability scanning is conducted


used to filter for common cyber threats and analyzed before
(e.g., attached malware or malicious deployment/redeployment of
links). new/existing devices.

Detective Controls Anomalous Activity Detection 217.The institution is able to detect 221.Systems are in place to detect 225.Tools actively monitor security logs 227.An automated tool triggers system 230.The institution has a mechanism for
anomalous activities through monitoring anomalous behavior automatically during for anomalous behavior and alert within and/or fraud alerts when customer logins real-time automated risk scoring of
across the environment. customer, employee, and third-party established parameters. occur within a short period of time but threats.
authentication. from physically distant IP locations.

218.Logs of physical and/or logical access 222.Security logs are reviewed regularly. 226.Audit logs are backed up to a 228.A system is in place to monitor and
are reviewed following events. centralized log server or media that is analyze employee behavior (network use
difficult to alter. patterns, work hours, and known devices)
to alert on anomalous activities.

219.Access to critical systems by third 223.Logs provide traceability for all 229.Tags on fictitious confidential data or
parties is monitored for unauthorized or system access by individual users. files are used to provide advanced alerts
unusual activity. of potential malicious activity when the
data is accessed.

220.Elevated privileges are monitored. 224.Thresholds have been established to


determine activity within logs that would
warrant management response.
3) Cybersecurity Controls
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Detective Controls Event Detection 231.A normal network activity baseline is 235.A process is in place to correlate 236.Controls or tools (e.g., data loss 238.Automated tools detect unauthorized 241.The institution is leading efforts to
established. event information from multiple sources prevention) are in place to detect changes to critical system files, firewalls, develop event detection systems that will
(e.g., network, application, or firewall). potential unauthorized or unintentional IPS, IDS, or other security devices. correlate in real time when events are
transmissions of confidential data. about to occur.

232.Mechanisms (e.g., antivirus alerts, 237.Event detection processes are proven 239.Real-time alerts are automatically
log event alerts) are in place to alert reliable. sent when unauthorized software,
management to potential attacks. hardware, or changes occur.

233.Processes are in place to monitor for 240.Tools are in place to actively


the presence of unauthorized users, correlate event information from multiple
devices, connections, and software. sources and send alerts based on
established parameters.

234.Responsibilities for monitoring and


reporting suspicious systems activity have
been assigned.

Corrective Controls Patch Management 242.A patch management program is 245.A formal process is in place to 248.Patches for high-risk vulnerabilities 249.The institution monitors patch 250.Segregated or separate systems are in
implemented and ensures that software acquire, test, and deploy software patches are tested and applied when released or management reports to ensure security place that mirror production systems
and firmware patches are applied in a based on criticality. the risk is accepted and accountability patches are tested and implemented allowing for rapid testing and
timely manner. assigned. within aggressive time frames (e.g., 0-30 implementation of patches and provide
days). for rapid fallback when needed.

243.Patches are tested before being 246.An automated tool(s) is used to


applied to systems and/or software. identify missing security patches as well
as the number of days since each patch
became available.

244.Patch management reports are 247.Missing patches across all


reviewed and reflect missing security environments are prioritized and tracked.
patches.

Corrective Controls Remediation 251.Issues identified in assessments are 252.Data is destroyed or wiped on 254.Remediation efforts are confirmed by 256.All medium and high risk issues 257.The institution is developing
prioritized and resolved based on hardware and portable/mobile media conducting a follow-up vulnerability scan. identified in penetration testing, technologies that will remediate systems
criticality and within the time frames when a device is missing, stolen, or no vulnerability scanning, and other damaged by zero-day attacks to maintain
established in the response to the longer needed. independent testing are escalated to the current recovery time objectives.
assessment report. board or an appropriate board committee
for risk acceptance if not resolved in a
timely manner.

253.Formal processes are in place to 255.Penetration testing is repeated to


resolve weaknesses identified during confirm that medium- and high-risk,
penetration testing. exploitable vulnerabilities have been
resolved.
4) External Dependency
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Connections Connections 258.The critical business processes that 261.Critical business processes have been 264.Monitoring controls cover all 266.The security architecture is validated 268.The institution's connections can be
are dependent on external connectivity mapped to the supporting external external connections (e.g., third-party and documented before network segmented or severed instantaneously to
have been identified. connections. service providers, business partners, connection infrastructure changes. prevent contagion from cyber attacks.
customers).

259.The institution ensures that third- 262.The network diagram is updated 265.Monitoring controls cover all internal 267.The institution works closely with
party connections are authorized. when connections with third parties network-to-network connections. third-party service providers to maintain
change or at least annually. and improve the security of external
connections.

260.A network diagram is in place and 263.Network and systems diagrams are
identifies all external connections. stored in a secure manner with proper
restrictions on access.

Relationship ManagemeDue Diligence 269.Risk-based due diligence is 271.A formal process exists to analyze 272.A process is in place to confirm that 274.A continuous process improvement 275.The institution is leading efforts to
performed on prospective third parties assessments of third-party cybersecurity the institution’s third-party service program is in place for third-party due develop new auditable processes and for
before contracts are signed, including controls. providers conduct due diligence of their diligence activity. conducting due diligence and ongoing
reviews of their background, reputation, third parties (e.g., subcontractors). monitoring of cybersecurity risks posed
financial condition, stability, and security by third parties.
controls.

270.A list of third-party service providers 273.Pre-contract, physical site visits of


is maintained. high-risk vendors are conducted by the
institution or by a qualified third party.

Relationship ManagemeContracts 276.Formal contracts that address 280.Responsibility for notification of 282.Third-party SLAs or similar means 283.Contracts require third-party service 284.The institution promotes a sector-
relevant security and privacy direct and indirect security incidents and are in place that require timely provider’s security policies meet or wide effort to influence contractual
requirements are in place for all third vulnerabilities is documented in contracts notification of security events. exceed those of the institution. requirements for critical third parties to
parties that process, store, or transmit or service-level agreements (SLAs). the industry.
confidential

277.Contracts acknowledge that the third 281.Contracts stipulate geographic limits


party is responsible for the security of the on where data can be stored or
institution’s confidential data that it transmitted.
possesses, stores, processes, or transmits.

278.Contracts stipulate that the third-


party security controls are regularly
reviewed and validated by an
independent party.

279.Contracts specify the security


requirements for the return or
destruction of data upon contract
termination.

Relationship ManagemeOngoing Monitoring 285.The third-party risk assessment is 287.A formal program assigns 289.Third-party employee access to the 291.Third-party employee access to 293.The institution is leading efforts to
updated regularly. responsibility for ongoing oversight of institution's confidential data are tracked confidential data on third-party hosted develop new auditable processes for
third- party access. actively based on the principles of least systems is tracked actively via automated ongoing monitoring of cybersecurity risks
privilege. reports and alerts. posed by third parties.

286.Audits, assessments, and operational 288.Monitoring of third parties is scaled, 290.Periodic on-site assessments of high- 292.Independent Audits of high-risk
performance reports are obtained and in terms of depth and frequency, risk vendors are conducted to ensure vendors are conducted on an annual
reviewed regularly validating security according to the risk of the third parties. appropriate security controls are in place. basis. (re-group)
controls for critical third parties.
5) Cyber Incident Management
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Incident Resilience PlanPlanning 294.The institution has documented how 300.The remediation plan and process 305.A strategy is in place to coordinate 308.Multiple systems, programs, or 309.The incident response process
it will react and respond to cyber outlines the mitigating actions, resources, and communicate with internal and processes are implemented into a includes detailed actions and rule- based
incidents. and time parameters. external stakeholders during or following comprehensive cyber resilience program triggers for automated response.
a cyber attack. to sustain, minimize, and recover
operations from an array of potentially
disruptive and destructive cyber
incidents.

295.Communication channels exist to 301.The corporate disaster recovery, 306.Plans are in place to re-route or
provide employees a means for reporting business continuity, and crisis substitute critical functions and/or
information security events in a timely management plans have integrated services that may be affected by a
manner. consideration of cyber incidents. successful attack on Internet-facing
systems.

296.Roles and responsibilities for 302.Alternative processes have been 307.Lessons learned from real-life cyber
incident response team members are established to continue critical activity incidents and attacks on the institution
defined. within a reasonable time period. and other organizations are used to
improve the institution's risk mitigation
capabilities and response plan.

297.The response team includes 303.Business impact analyses have been


individuals with a wide range of updated to include cybersecurity.
backgrounds and expertise, from many
different areas within the institution (e.g.,
management, legal, public relations, as
well as information technology).

298.A formal backup and recovery plan 304.Due diligence has been performed on
exists for all critical business lines. technical sources, consultants, or forensic
service firms that could be called to assist
the institution during or following an
incident.

299.The institution plans to use business


continuity, disaster recovery, and data
backup programs to recover operations
following an incident.

Incident Resilience PlanTesting 310.Business continuity testing involves 312.Recovery scenarios include plans to 315.Cyber-attack scenarios are analyzed 317.Resilience testing is comprehensive 319.The institution tests the ability to
collaboration with critical third parties. recover from data destruction and to determine potential impact to critical and coordinated across all critical shift business processes or functions
impacts to data integrity, data loss, and business processes. business functions. between different processing centers or
system and data availability. technology systems for cyber incidents
without interruption to business or loss of
productivity or data.

311.Systems, applications, and data 313.Widely reported events are used to 316.Resilience testing is based on analysis 318.Incident response testing evaluates 320.The institution has validated that it is
recovery is tested at least annually. evaluate and improve the institution's and identification of realistic and highly the institution from an attacker's able to remediate systems damaged by
response. likely threats as well as new and emerging perspective to determine how the zero-day attacks to maintain current
threats facing the institution. institution or its assets at critical third recovery time objectives.
parties may be targeted.

314.Information backups are tested


periodically to verify they are accessible
and readable.

Detection, Response, andDetection 321.Alert parameters are set for detecting 323.The institution has processes to 324.The incident response program is 327.Automated tools are implemented to 328.The institution is able to detect and
information security incidents that detect and alert the incident response triggered when anomalous behaviors and provide specialized security monitoring block zero-day attempts and inform
prompt mitigating actions. team when potential insider activity attack patterns or signatures are detected. based on the risk of the assets to detect management and the incident response
manifests that could lead to data theft or (eg IDS/IPS) and alert incident response teams in real team in real time.
destruction. time. (APT, WAF, DB Firewall, Behavior)

322.Tools and processes are in place to 325.Incidents are detected in real time
detect, analyse problem, assess through automated processes that include
impact, alert, and trigger the incident instant alerts to appropriate personnel
response program. who can respond.

326.Incident detection processes are


capable of correlating events across the
enterprise. (SIEM)
5) Cyber Incident Management
Domains Sub Domains Level 1 Level 2 Level 3 Level 4 Level 5
Detection, Response, andResponse and Mitigation 329.Appropriate steps are taken to 330.The incident response plan is 335.Processes are in place to ensure 337.The incident management function 338.The institution’s risk management of
contain and control an incident to prevent designed to prioritize incidents and assets affected by a security incident that collaborates effectively with the cyber significant cyber incidents results in
further unauthorized access to or use of analyse vulnerabilities, enabling a rapid cannot be returned to operational status threat intelligence function during an limited to no disruptions to critical
customer information. response for significant cybersecurity are quarantined, removed, disposed of, incident. services.
incidents or vulnerabilities. and/or replaced.

331.A process is in place to help contain 336.Processes are in place to ensure that 339.The technology infrastructure has
incidents and restore operations with restored assets are appropriately been engineered to limit the effects of a
minimal service disruption. reconfigured and thoroughly tested cyber attack on the production
before being placed back into operation. environment from migrating to the
backup environment (e.g., air-gapped
environment and processes).

332.Procedures include containment


strategies and notifying potentially
impacted third parties.

333.Processes are in place to trigger the


incident response program when an
incident occurs at a third party.

334.Records are generated to support


incident investigation and mitigation.

Escalation and Reportin Escalation and Reporting 340.A process exists to contact personnel 344.Criteria have been established for 346.Employees that are essential to 349.Detailed metrics, dashboards, and/or 350.A mechanism is in place to provide
who are responsible for analyzing and escalating cyber incidents or mitigate the risk (e.g., fraud, business scorecards outlining cyber incidents and instantaneous notification of incidents to
responding to an incident. vulnerabilities to the board and senior resilience) know their role in incident events are provided to management and management and essential employees
management based on the potential escalation. are part of the board meeting package. through multiple communication
impact and criticality of the risk. channels with tracking and verification of
receipt.

341.Procedures exist to notify customers, 345.Tracked cyber incidents are 347.A communication plan is used to
regulators, and law enforcement as correlated for trend analysis and notify other organizations, including third
required or necessary when the reporting. parties, of incidents that may affect them
institution becomes aware of an incident or their customers.
involving the unauthorized access to or
use of sensitive customer information.

342.The institution prepares an annual 348.An external communication plan is


report of security incidents or violations used for notifying media regarding
for the board or an appropriate board incidents when applicable.
committee.

343.Incidents are classified, logged, and


tracked.
Y
P
N
N/A

1) x < 6 1) x < 5 1) Physical1) x < 10 1) No acce1) x < 5 1) On-site 1) x < 5 1) x < 2


2) 6 <= x <= 12) 5 <= x <2) Logicall 2) 10 <= x 2) e-mail a2) 5 <= x <2) Leased 2) 5 <= x <2) 2 <= x <
3) x > 12 3) x > 25 3) No sepa3) x >= 10 3) e-mail a3) x > 10 3) Interne 3) x > 20 3) x > 5 o

Risk Score #DIV/0! #DIV/0!


40% 0.00
17.50% #DIV/0!
10% #DIV/0!
15% #DIV/0!
17.50% #DIV/0!
1) x < 50 1) No clou 1) No servi1) x < 10,01) x < THB1) x < 10%1) x < 20 1) x < THB1) x < 500
2) 50 <= x 2) Private 2) Informat2) 10,000 2) THB 1 Mi2) 10% <= 2) 20 <= x 2) THB 50 2M) 500 <=
3) x > 200 3) Public 3) Financia3) x > 100 3) x > 80,03) x > 70%3) x > 50 3) x > 400 T
3) x > 1,00
1) x > 30 1) No outs 1) x < 10%1) No atte 1) No atte 1) No atte 1) No malw1) No phishing attack
2) 10 <= x 2) Outsour2) 10% <= 2) Attempt 2) Attempt 2) Attempt 2) Malware2) Employee or customer received ra
3) x < 10 3) Outsour3) x > 30%3) Attempt 3) Attempt 3) Attempt 3) Malware3) Employee or customer received ta
hing attack
ee or customer received random phishing campaign
ee or customer received targeted or spear phishing campaign

You might also like