← Frameworks / Global Financial Standard

CPMI-IOSCO Guidance on Cyber Resilience for Financial Market Infrastructures

International guidance establishing cybersecurity and operational resilience expectations for financial market infrastructures (FMIs) including CCPs, CSDs, payment systems, and trade repositories. 5 risk categories covering governance, identification, protection, detection, and response/recovery with 3 maturity levels (evolving, advancing, innovating). Builds on CPMI-IOSCO PFMI Principle 17 and complements national supervisory frameworks.

Clause Title SP 800-53 Controls
DET-1 Detection — Comprehensive monitoring and logging
DET-2 Detection — Anomaly detection and baseline profiling
DET-3 Detection — Indicators of compromise and threat intelligence integration
DET-4 Detection — Monitoring controls implemented to assist containment and analysis
GOV-1 Governance — Cyber resilience framework establishment
GOV-2 Governance — Board and senior management oversight
GOV-3 Governance — Cyber risk appetite and tolerance
GOV-4 Governance — Roles, responsibilities, and cyber workforce
GOV-5 Governance — Engagement with participants, linked FMIs, and service providers
ID-1 Identification — Critical business functions, processes, and information assets
ID-2 Identification — Interconnections and dependencies mapping
ID-3 Identification — Cyber threat landscape and risk assessment
ID-4 Identification — Asset inventory and classification using automated tools
LE-1 Learning and Evolving — Post-incident review and lessons learned
LE-2 Learning and Evolving — Continuous improvement of the cyber resilience framework
LE-3 Learning and Evolving — Adoption of emerging standards and international best practices
PFMI-2 PFMI Principle 2 — Governance arrangements for cyber resilience
PFMI-3 PFMI Principle 3 — Comprehensive risk management framework for cyber risk
PFMI-17 PFMI Principle 17 — Operational risk management and 2hRTO for cyber scenarios
PFMI-20 PFMI Principle 20 — FMI links and interconnection cyber risk
PROT-1 Protection — Access control and privileged user management
PROT-2 Protection — Network segmentation and boundary protection
PROT-3 Protection — Data integrity and confidentiality controls
PROT-4 Protection — Security awareness and staff training
PROT-5 Protection — Physical security and environmental controls
PROT-6 Protection — Change management and secure development
PROT-7 Protection — Supply chain and third-party risk management
REG-1 Regulatory coordination — Engagement with overseers and regulators
RR-1 Response and Recovery — Incident response plan and procedures
RR-2 Response and Recovery — 2-hour recovery time objective (2hRTO)
RR-3 Response and Recovery — Settlement finality and transaction integrity preservation
RR-4 Response and Recovery — Communication and coordination during incidents
RR-5 Response and Recovery — Recovery plans based on current threat intelligence and plausible scenarios
SA-1 Situational Awareness — Proactive threat monitoring and intelligence
SA-2 Situational Awareness — Threat intelligence sharing with the financial sector
SA-3 Situational Awareness — Vulnerability management and assessment
TEST-1 Testing — Comprehensive cyber resilience testing programme
TEST-2 Testing — Threat-led penetration testing and red team exercises
TEST-3 Testing — Testing after significant system changes
TEST-4 Testing — Involvement of participants, linked FMIs, and critical service providers
TEST-5 Testing — Backup data integrity verification