CPMI-IOSCO Guidance on Cyber Resilience for Financial Market Infrastructures
International guidance establishing cybersecurity and operational resilience expectations for financial market infrastructures (FMIs) including CCPs, CSDs, payment systems, and trade repositories. 5 risk categories covering governance, identification, protection, detection, and response/recovery with 3 maturity levels (evolving, advancing, innovating). Builds on CPMI-IOSCO PFMI Principle 17 and complements national supervisory frameworks.
| Clause | Title | SP 800-53 Controls |
|---|---|---|
| DET-1 | Detection — Comprehensive monitoring and logging | |
| DET-2 | Detection — Anomaly detection and baseline profiling | |
| DET-3 | Detection — Indicators of compromise and threat intelligence integration | |
| DET-4 | Detection — Monitoring controls implemented to assist containment and analysis | |
| GOV-1 | Governance — Cyber resilience framework establishment | |
| GOV-2 | Governance — Board and senior management oversight | |
| GOV-3 | Governance — Cyber risk appetite and tolerance | |
| GOV-4 | Governance — Roles, responsibilities, and cyber workforce | |
| GOV-5 | Governance — Engagement with participants, linked FMIs, and service providers | |
| ID-1 | Identification — Critical business functions, processes, and information assets | |
| ID-2 | Identification — Interconnections and dependencies mapping | |
| ID-3 | Identification — Cyber threat landscape and risk assessment | |
| ID-4 | Identification — Asset inventory and classification using automated tools | |
| LE-1 | Learning and Evolving — Post-incident review and lessons learned | |
| LE-2 | Learning and Evolving — Continuous improvement of the cyber resilience framework | |
| LE-3 | Learning and Evolving — Adoption of emerging standards and international best practices | |
| PFMI-2 | PFMI Principle 2 — Governance arrangements for cyber resilience | |
| PFMI-3 | PFMI Principle 3 — Comprehensive risk management framework for cyber risk | |
| PFMI-17 | PFMI Principle 17 — Operational risk management and 2hRTO for cyber scenarios | |
| PFMI-20 | PFMI Principle 20 — FMI links and interconnection cyber risk | |
| PROT-1 | Protection — Access control and privileged user management | |
| PROT-2 | Protection — Network segmentation and boundary protection | |
| PROT-3 | Protection — Data integrity and confidentiality controls | |
| PROT-4 | Protection — Security awareness and staff training | |
| PROT-5 | Protection — Physical security and environmental controls | |
| PROT-6 | Protection — Change management and secure development | |
| PROT-7 | Protection — Supply chain and third-party risk management | |
| REG-1 | Regulatory coordination — Engagement with overseers and regulators | |
| RR-1 | Response and Recovery — Incident response plan and procedures | |
| RR-2 | Response and Recovery — 2-hour recovery time objective (2hRTO) | |
| RR-3 | Response and Recovery — Settlement finality and transaction integrity preservation | |
| RR-4 | Response and Recovery — Communication and coordination during incidents | |
| RR-5 | Response and Recovery — Recovery plans based on current threat intelligence and plausible scenarios | |
| SA-1 | Situational Awareness — Proactive threat monitoring and intelligence | |
| SA-2 | Situational Awareness — Threat intelligence sharing with the financial sector | |
| SA-3 | Situational Awareness — Vulnerability management and assessment | |
| TEST-1 | Testing — Comprehensive cyber resilience testing programme | |
| TEST-2 | Testing — Threat-led penetration testing and red team exercises | |
| TEST-3 | Testing — Testing after significant system changes | |
| TEST-4 | Testing — Involvement of participants, linked FMIs, and critical service providers | |
| TEST-5 | Testing — Backup data integrity verification |