Back to Blog

FDIC and OCC Joint Statement Key Takeaways – Part 2

By Finosec

May 25, 2021

Get notified on new insights from Finosec now!

Be the first to know about new Finosec blogs to grow your knowledge of the cybersecurity governance industry today!

The FDIC and OCC put out a joint statement on heightened cybersecurity risk concerns. This ‘heightened’ concern has bubbled up from the concerns in the Middle East and specifically, Iran. In our nation’s history, oceans have been one of our primary defenses, but in today’s interconnected world, barriers for state-sponsored cyberattacks have been removed. I spent some time discussing the 6 Questions to Answer in Part 1, and today I wanted to dive into Authentication.

Part 2 – Authentication

Here are three key points to understand on the joint statement specific to Authentication.

Two Factor Authentication

The regulators are aware of hackers getting around our password processes, and two-factor authentication (SMS or Application) makes getting around password risks more difficult. Credential stuffing is a real risk https://owasp.org/www-community/attacks/Credential_stuffing. Think about how many times have you reused a password or a similar password. How many times has your account password been compromised? (Remember this started years ago with your myspace account and yahoo account and continues to happen). Check out this website to see if your email address has been linked to passwords being compromised: https://haveibeenpwned.com/.

Regular User Reviews

A subtle change but a big impact – The regulators recommend to regularly review user access in the statement, but in previous guidance in the FFIEC Information Security Booklet and the Cybersecurity Assessment Toolkit, they have referenced periodic reviews. Focusing on more frequent user access reviews is the biggest change we found in our review.

Privileged Accounts

Limiting the number, restricting usage, and monitoring of privileged accounts is a critical step. “When” the bank is compromised, (I still like to say “if”, but it isn’t realistic today) hackers will target these privileged accounts.

Key Questions to Ask Your Team:

  1. When was the last time we performed our user review? How many systems do we have where we add employee access? What’s the process we have to go through to increase the frequency?
  2. How many administrator accounts do we have?
  3. Does each internal administrator have a regular user account and an administrator account?
  4. How do we manage and track our vendor accounts? Make sure to focus on vendors that have access (core, integration, managed services)
  5. Are there any systems that have the ability to implement two-factor authentication that we haven’t integrated?
  6. Does our managed services vendor leverage two-factor authentication for their access and support to the network and systems?

If you have six minutes more, I recorded a video summary on the statement as well:

FDIC FIL Joint Statement

More from Finosec

The Critical Link Between Third-Party Risk Management (TPRM) and Access Management

The Critical Link Between Third-Party Risk Management (TPRM) and Access Management

As highlighted in a recent article from the Federal Reserve, managing third-party relationships and the access associated with those relationships is a critical component of Third-Party Risk Management (TPRM). The associated access third party vendors have to banking systems is known as Access Management and is foundational for mitigating risks associated with third-party relationships. Access Management may be easy to overlook because it does not always reside with the same person or team as TPRM; making it difficult to provide critical oversight.

With increased regulatory focus, how should institutions be thinking of Access Management? Here are five steps your institution can take today to strengthen your third-party governance.

The Critical Foundation of Managing Access to Banking Systems

The Critical Foundation of Managing Access to Banking Systems

Managing access to banking systems has become increasingly complex as financial institutions navigate legacy reporting systems, API access, and cloud solutions. These challenges, along with the risks posed by unmanaged systems, emphasize the need for maintaining a...

Why You Need to Know Every System for Every Employee

Why You Need to Know Every System for Every Employee

Are you confident that your bank has clear and thorough visibility to every employee’s physical and digital access to systems? If you’re like most banks we work with, the answer to this question is “no”. There are many challenges that make tracking employee access...

Talk To An Expert Now
Talk To An Expert Now 770.268.2765