← Frameworks / Regulatory

FINMA Circular 2023/1 Operational Risk and Resilience — Banks

Swiss financial market supervisory authority circular covering technology infrastructure, cyber risk, critical data management, business continuity management, and outsourcing for banks and securities dealers. References use chapter and margin number format — e.g. IV.C(65) for cyber risk management margin 65 — across 114 margin numbers in 7 sections.

Clause Title SP 800-53 Controls
IV.A(23) ICT governance framework and policies
IV.A(24) ICT strategy alignment with business strategy
IV.A(25) ICT strategy documentation and updates
IV.A(28) ICT infrastructure management and operations
IV.A(29) ICT capacity and performance management
IV.A(30) ICT asset inventory
IV.A(31) ICT architecture documentation
IV.A(36) ICT change management framework
IV.A(37) Change control process and testing
IV.A(38) Change impact analysis
IV.A(39) Change approval and documentation
IV.A(40) Emergency change procedures
IV.A(41) Incident management framework
IV.A(42) Incident classification and prioritisation
IV.A(43) Incident response and escalation
IV.A(44) Incident monitoring and tracking
IV.A(45) Incident reporting to FINMA
IV.A(46) Incident notification to affected parties
IV.B.a(47) Incident lessons learned
IV.B.a(48) ICT personnel and security awareness framework
IV.B.a(49) ICT security training programme
IV.B.b(50) Security awareness for all staff
IV.B.b(51) Ongoing security awareness updates
IV.B.b(52) Threat intelligence and information sharing
IV.B.c(53) External threat intelligence sources
IV.B.c(54) ICT risk assessment framework
IV.B.c(55) ICT risk identification and analysis
IV.B.c(56) Vulnerability management
IV.B.c(57) Vulnerability scanning and assessment
IV.B.d(58) Risk assessment documentation and review
IV.B.d(59) Access control and security controls framework
IV.B.d(60) Identity and access management
IV.C(61) Authentication and session management
IV.C(62) Network security and segmentation
IV.C(63) Cryptography and data protection in transit
IV.C(64) Endpoint and software security
IV.C(65) Malware protection
IV.C(66) Logging and monitoring framework
IV.C(67) Security event logging
IV.C(68) Log analysis and correlation
IV.C(69) Automated monitoring and alerting
IV.C(70) Cyber incident response framework
IV.D(71) Cyber incident containment and recovery
IV.D(72) Cyber incident eradication
IV.D(73) Cyber incident reporting to FINMA
IV.D(74) Cyber incident notification to clients
IV.D(75) Security testing framework
IV.D(76) Penetration testing and vulnerability assessment
IV.D(77) Independent security testing
IV.D(78) Data classification and protection framework
IV.D(79) Data classification scheme
IV.D(80) Data handling and processing controls
IV.D(81) Data protection in storage and transit
IV.D(82) Data retention and archiving
IV.E(83) Secure data disposal
IV.E(84) Data quality and accuracy
IV.E(87) ICT business continuity management framework
IV.E(88) Business impact analysis for ICT
IV.E(89) ICT recovery capabilities
IV.E(90) ICT disaster recovery planning
IV.E(91) Recovery site and backup requirements
IV.E(92) Business continuity training
IV.E(93) Business continuity awareness
IV.E(94) Business continuity testing framework
IV.E(95) Disaster recovery testing
IV.E(96) Business continuity testing scenarios
IV.F(97) Business continuity test results and improvements
IV.F(98) Business continuity plan maintenance
IV.F(99) Business continuity plan distribution
IV.F(100) Outsourcing governance framework
V(101) Outsourcing risk assessment
V(102) Outsourcing contractual requirements
V(103) Outsourcing due diligence
V(104) Outsourcing ongoing monitoring
V(105) Sub-outsourcing controls
V(106) Sub-outsourcing notification and approval
V(107) Sub-outsourcing risk management
V(108) Sub-outsourcing audit rights
V(109) Supply chain provenance
V(110) Supply chain provenance verification
V(111) Acquisition strategy for ICT services
VI(112) Acquisition methods and tools
VII.A(113) Supplier assessment and review
VII.B(114) Supplier assessment frequency