FFIEC IT Examination Handbook — Information Security
US Federal Financial Institutions Examination Council handbook for examining information security at financial institutions. 51 examination objectives across governance, risk management, threat intelligence, security controls, network security, endpoint protection, access management, data security, resilience, incident response, and third-party security. Used by OCC, FDIC, Federal Reserve, NCUA, and state banking agencies for IT examinations.
Clauses: 51
Avg Coverage: 85.6%
Publisher: Federal Financial Institutions Examination Council (FFIEC) Version: 2024 | Clause | Title | SP 800-53 Controls |
|---|---|---|
| Appendix A | Examination Procedures | |
| I.A | Security Culture | |
| I.B | Responsibility and Accountability | |
| I.C | Resources | |
| II.A | Risk Identification | |
| II.A.1 | Threats | |
| II.A.2 | Vulnerabilities | |
| II.B | Risk Measurement | |
| II.C.1 | Policies, Standards, and Procedures | |
| II.C.2 | Technology Design | |
| II.C.3 | Control Types | |
| II.C.4 | Control Implementation | |
| II.C.5 | Inventory and Classification of Assets | |
| II.C.6 | Mitigating Interconnectivity Risk | |
| II.C.7 | User Security Controls | |
| II.C.7(a) | Security Screening in Hiring Practices | |
| II.C.7(b) | User Access Program | |
| II.C.7(c) | Segregation of Duties | |
| II.C.7(d) | Confidentiality Agreements | |
| II.C.7(e) | Training | |
| II.C.8 | Physical Security | |
| II.C.9 | Network Controls | |
| II.C.10 | Change Management Within the IT Environment | |
| II.C.11 | End-of-Life Management | |
| II.C.12 | Malware Mitigation | |
| II.C.13 | Control of Information | |
| II.C.13(a) | Storage | |
| II.C.13(b) | Electronic Transmission of Information | |
| II.C.13(c) | Disposal of Information | |
| II.C.13(d) | Transit of Physical Media | |
| II.C.13(e) | Rogue or Shadow IT | |
| II.C.14 | Supply Chain | |
| II.C.15 | Logical Security | |
| II.C.15(a) | Operating System Access | |
| II.C.15(b) | Application Access | |
| II.C.15(c) | Remote Access | |
| II.C.16 | Customer Remote Access to Financial Services | |
| II.C.17 | Application Security | |
| II.C.18 | Database Security | |
| II.C.19 | Encryption | |
| II.C.20 | Oversight of Third-Party Service Providers | |
| II.D | Risk Monitoring and Reporting | |
| III.A | Threat Identification and Assessment | |
| III.B | Threat Monitoring | |
| III.C | Incident Identification and Assessment | |
| III.D | Incident Response | |
| IV.A | Assurance and Testing | |
| IV.A.1 | Key Testing Factors | |
| IV.A.2 | Types of Tests and Evaluations | |
| IV.A.3 | Independence of Tests and Audits | |
| IV.A.4 | Assurance Reporting |