FINMA Circular 2023/1 Operational Risk and Resilience — Banks
Swiss financial market supervisory authority circular covering technology infrastructure, cyber risk, critical data management, business continuity management, and outsourcing for banks and securities dealers. References use chapter and margin number format — e.g. IV.C(65) for cyber risk management margin 65 — across 114 margin numbers in 7 sections.
Clauses: 84
Avg Coverage: 77.2%
Publisher: Swiss Financial Market Supervisory Authority (FINMA) Version: 2023/1 | Clause | Title | SP 800-53 Controls |
|---|---|---|
| IV.A(23) | ICT governance framework and policies | |
| IV.A(24) | ICT strategy alignment with business strategy | |
| IV.A(25) | ICT strategy documentation and updates | |
| IV.A(28) | ICT infrastructure management and operations | |
| IV.A(29) | ICT capacity and performance management | |
| IV.A(30) | ICT asset inventory | |
| IV.A(31) | ICT architecture documentation | |
| IV.A(36) | ICT change management framework | |
| IV.A(37) | Change control process and testing | |
| IV.A(38) | Change impact analysis | |
| IV.A(39) | Change approval and documentation | |
| IV.A(40) | Emergency change procedures | |
| IV.A(41) | Incident management framework | |
| IV.A(42) | Incident classification and prioritisation | |
| IV.A(43) | Incident response and escalation | |
| IV.A(44) | Incident monitoring and tracking | |
| IV.A(45) | Incident reporting to FINMA | |
| IV.A(46) | Incident notification to affected parties | |
| IV.B.a(47) | Incident lessons learned | |
| IV.B.a(48) | ICT personnel and security awareness framework | |
| IV.B.a(49) | ICT security training programme | |
| IV.B.b(50) | Security awareness for all staff | |
| IV.B.b(51) | Ongoing security awareness updates | |
| IV.B.b(52) | Threat intelligence and information sharing | |
| IV.B.c(53) | External threat intelligence sources | |
| IV.B.c(54) | ICT risk assessment framework | |
| IV.B.c(55) | ICT risk identification and analysis | |
| IV.B.c(56) | Vulnerability management | |
| IV.B.c(57) | Vulnerability scanning and assessment | |
| IV.B.d(58) | Risk assessment documentation and review | |
| IV.B.d(59) | Access control and security controls framework | AC-01 AC-02 AC-03 AC-04 AC-05 AC-06 AC-07 AC-08 AC-09 AC-10 AC-11 AC-12 AC-13 AC-14 AC-17 AC-18 AC-19 AC-20 AU-09 CM-05 IA-01 IA-02 IA-03 IA-04 IA-05 IA-06 IA-07 MA-04 MP-02 PE-02 PE-03 PS-04 PS-05 PS-06 SA-08 SC-01 SC-05 SC-07 SC-10 SC-11 SC-14 SC-15 SC-18 SC-23 SI-01 SI-02 SI-03 SI-07 SI-08 CA-09 SC-24 SC-46 SC-48 |
| IV.B.d(60) | Identity and access management | |
| IV.C(61) | Authentication and session management | |
| IV.C(62) | Network security and segmentation | |
| IV.C(63) | Cryptography and data protection in transit | |
| IV.C(64) | Endpoint and software security | |
| IV.C(65) | Malware protection | |
| IV.C(66) | Logging and monitoring framework | |
| IV.C(67) | Security event logging | |
| IV.C(68) | Log analysis and correlation | |
| IV.C(69) | Automated monitoring and alerting | |
| IV.C(70) | Cyber incident response framework | |
| IV.D(71) | Cyber incident containment and recovery | |
| IV.D(72) | Cyber incident eradication | |
| IV.D(73) | Cyber incident reporting to FINMA | |
| IV.D(74) | Cyber incident notification to clients | |
| IV.D(75) | Security testing framework | |
| IV.D(76) | Penetration testing and vulnerability assessment | |
| IV.D(77) | Independent security testing | |
| IV.D(78) | Data classification and protection framework | |
| IV.D(79) | Data classification scheme | |
| IV.D(80) | Data handling and processing controls | |
| IV.D(81) | Data protection in storage and transit | |
| IV.D(82) | Data retention and archiving | |
| IV.E(83) | Secure data disposal | |
| IV.E(84) | Data quality and accuracy | |
| IV.E(87) | ICT business continuity management framework | |
| IV.E(88) | Business impact analysis for ICT | |
| IV.E(89) | ICT recovery capabilities | |
| IV.E(90) | ICT disaster recovery planning | |
| IV.E(91) | Recovery site and backup requirements | |
| IV.E(92) | Business continuity training | |
| IV.E(93) | Business continuity awareness | |
| IV.E(94) | Business continuity testing framework | |
| IV.E(95) | Disaster recovery testing | |
| IV.E(96) | Business continuity testing scenarios | |
| IV.F(97) | Business continuity test results and improvements | |
| IV.F(98) | Business continuity plan maintenance | |
| IV.F(99) | Business continuity plan distribution | |
| IV.F(100) | Outsourcing governance framework | |
| V(101) | Outsourcing risk assessment | |
| V(102) | Outsourcing contractual requirements | |
| V(103) | Outsourcing due diligence | |
| V(104) | Outsourcing ongoing monitoring | |
| V(105) | Sub-outsourcing controls | |
| V(106) | Sub-outsourcing notification and approval | |
| V(107) | Sub-outsourcing risk management | |
| V(108) | Sub-outsourcing audit rights | |
| V(109) | Supply chain provenance | |
| V(110) | Supply chain provenance verification | |
| V(111) | Acquisition strategy for ICT services | |
| VI(112) | Acquisition methods and tools | |
| VII.A(113) | Supplier assessment and review | |
| VII.B(114) | Supplier assessment frequency |