HKMA Supervisory Policy Manual TM-E-1: Technology Risk Management
Hong Kong Monetary Authority's comprehensive technology risk management guideline for all authorised institutions. Covers IT governance, project management, change management, operations, IT resilience, information security, access control, cryptography, internet and mobile banking, ATM security, and outsourcing of technology services. Complemented by the Cyber Fortification Initiative (CFI) including iCAST intelligence-led penetration testing and the Cyber Resilience Assessment Framework (C-RAF).
| Clause | Title | SP 800-53 Controls |
|---|---|---|
| TME1.2.1 | Board and Senior Management Oversight of IT | |
| TME1.2.2 | IT Strategy and Planning | |
| TME1.2.3 | IT Risk Management Framework | |
| TME1.2.4 | IT Steering Committee and Organisational Structure | |
| TME1.2.5 | IT Policies and Standards | |
| TME1.2.6 | IT Audit | |
| TME1.3.1 | Project Governance and Methodology | |
| TME1.3.2 | System Development and Testing | |
| TME1.3.3 | Implementation and Post-Implementation Review | |
| TME1.3.4 | Package Software and Vendor Management | |
| TME1.4.1 | Change Control Process | |
| TME1.4.2 | Emergency Change Procedures | |
| TME1.4.3 | Release and Deployment Management | |
| TME1.5.1 | Data Centre Operations | |
| TME1.5.2 | System Monitoring and Job Scheduling | |
| TME1.5.3 | Capacity and Performance Management | |
| TME1.5.4 | Problem and Incident Management | |
| TME1.6.1 | Business Continuity Planning | |
| TME1.6.2 | Disaster Recovery Planning and RTO/RPO | |
| TME1.6.3 | BCP/DR Testing and Maintenance | |
| TME1.6.4 | Alternate Processing Sites | |
| TME1.6.5 | Data Backup and Recovery | |
| TME1.7.1 | Information Security Policy and Framework | |
| TME1.7.2 | Information Classification and Handling | |
| TME1.7.3 | Security Architecture and Controls | |
| TME1.7.4 | Vulnerability Assessment and Penetration Testing | |
| TME1.7.5 | Security Incident Management | |
| TME1.8.1 | User Access Management | |
| TME1.8.2 | Privilege Access Management | |
| TME1.8.3 | Authentication Mechanisms | |
| TME1.8.4 | Session Management and Timeout | |
| TME1.8.5 | Remote Access Security | |
| TME1.9.1 | Cryptographic Policy and Standards | |
| TME1.9.2 | Key Management | |
| TME1.9.3 | Digital Signatures and Certificates | |
| TME1.10.1 | Online Banking Security Controls | |
| TME1.10.2 | Mobile Banking Security | |
| TME1.10.3 | Electronic Payment Security | |
| TME1.10.4 | Two-Factor Authentication for Online Services | |
| TME1.11.1 | ATM Physical Security | |
| TME1.11.2 | ATM Transaction Security | |
| TME1.11.3 | Anti-Skimming and Fraud Prevention | |
| TME1.12.1 | Outsourcing Risk Assessment and Due Diligence | |
| TME1.12.2 | Contractual and SLA Requirements | |
| TME1.12.3 | Ongoing Monitoring and Oversight | |
| TME1.12.4 | Cloud Computing Governance | |
| TME1.12.5 | Sub-outsourcing and Concentration Risk |