Back to Blog

FDIC and OCC Joint Statement Key Takeaways – Part 2

By Finosec

May 25, 2021

Get notified on new insights from Finosec now!

Be the first to know about new Finosec blogs to grow your knowledge of the cybersecurity governance industry today!

The FDIC and OCC put out a joint statement on heightened cybersecurity risk concerns. This ‘heightened’ concern has bubbled up from the concerns in the Middle East and specifically, Iran. In our nation’s history, oceans have been one of our primary defenses, but in today’s interconnected world, barriers for state-sponsored cyberattacks have been removed. I spent some time discussing the 6 Questions to Answer in Part 1, and today I wanted to dive into Authentication.

Part 2 – Authentication

Here are three key points to understand on the joint statement specific to Authentication.

Two Factor Authentication

The regulators are aware of hackers getting around our password processes, and two-factor authentication (SMS or Application) makes getting around password risks more difficult. Credential stuffing is a real risk https://owasp.org/www-community/attacks/Credential_stuffing. Think about how many times have you reused a password or a similar password. How many times has your account password been compromised? (Remember this started years ago with your myspace account and yahoo account and continues to happen). Check out this website to see if your email address has been linked to passwords being compromised: https://haveibeenpwned.com/.

Regular User Reviews

A subtle change but a big impact – The regulators recommend to regularly review user access in the statement, but in previous guidance in the FFIEC Information Security Booklet and the Cybersecurity Assessment Toolkit, they have referenced periodic reviews. Focusing on more frequent user access reviews is the biggest change we found in our review.

Privileged Accounts

Limiting the number, restricting usage, and monitoring of privileged accounts is a critical step. “When” the bank is compromised, (I still like to say “if”, but it isn’t realistic today) hackers will target these privileged accounts.

Key Questions to Ask Your Team:

  1. When was the last time we performed our user review? How many systems do we have where we add employee access? What’s the process we have to go through to increase the frequency?
  2. How many administrator accounts do we have?
  3. Does each internal administrator have a regular user account and an administrator account?
  4. How do we manage and track our vendor accounts? Make sure to focus on vendors that have access (core, integration, managed services)
  5. Are there any systems that have the ability to implement two-factor authentication that we haven’t integrated?
  6. Does our managed services vendor leverage two-factor authentication for their access and support to the network and systems?

If you have six minutes more, I recorded a video summary on the statement as well:

FDIC FIL Joint Statement

More from Finosec

The Hidden Costs of Spreadsheets in Exam & Audit Preparation

The Hidden Costs of Spreadsheets in Exam & Audit Preparation

Preparing for audits and exams can be an unnerving task, especially when spreadsheets are at the heart of the process. While spreadsheets have long been a go-to tool for many organizations, they often come with hidden costs that hinder efficiency. In this blog, we'll...

Sunsetting Of The Cybersecurity Assessment Toolkit: Next Steps

Sunsetting Of The Cybersecurity Assessment Toolkit: Next Steps

The Risks of Spreadsheets in Cybersecurity and Why It’s Time to Move On As regulators phase out legacy tools like the Cybersecurity Assessment Toolkit (CAT), it’s the perfect opportunity for institutions to rethink their approaches to governance and risk management....

Talk To An Expert Now
Talk To An Expert Now 770.268.2765