Agency Information Collection Activities: Information Collection Renewal; Submission for OMB Review; FFIEC Cybersecurity Assessment Tool, 36659-36662 [2019-15964]

Download as PDF Federal Register / Vol. 84, No. 145 / Monday, July 29, 2019 / Notices effectiveness of the program. These requirements also ensure prudent institution management safety and soundness. Suspicious Activity Report (SAR) khammond on DSKBBV9HB2PROD with NOTICES In 1992, the Department of the Treasury was granted broad authority to require suspicious transaction reporting under the Bank Secrecy Act (BSA). See 31 U.S.C. 5318(g). The Financial Crimes Enforcement Network (FinCEN), which has been delegated the authority to administer the BSA, joined with the bank regulators in 1996 in requiring, on a consolidated form (i.e., SAR), reports of suspicious transactions. See 31 CFR 1020.320(a) (formerly 31 CFR 103.18(a)). The filing of SARs is necessary to prevent and detect crimes involving depository institution funds, institution insiders, criminal transactions, and money laundering. These requirements are necessary to ensure institution safety and soundness. Banks and savings associations are required to maintain a copy of any SAR filed and the original or business record equivalent of any supporting documentation for a period of five years. The documents are necessary for criminal investigations and prosecutions. FinCEN and the Federal financial institution supervisory agencies 2 adopted the SAR form to simplify the process through which depository institutions inform their regulators and law enforcement about suspected criminal activity. The SAR form was updated in 1998, 2000, 2003, 2006, 2011, 2012, 2015, and 2018. Affected Public: Business, for-profit institutions, and non-profit. Estimated Number of Respondents: 1,233. Estimated Total Annual Burden: 615,130 hours. The OCC issued a notice for 60 days of comment regarding this collection on May 6, 2019, 84 FR 19825. No comments were received. Comments continue to be invited on: (a) Whether the collection of information is necessary for the proper performance of the functions of the OCC, including whether the information shall have practical utility; (b) The accuracy of the OCC’s estimate of the burden of the collection of information; (c) Ways to enhance the quality, utility, and clarity of the information to be collected; (d) Ways to minimize the burden of the collection of information on respondents, including through the use of automated collection techniques or other forms of information technology, and (e) Estimates of capital or start-up costs and costs of operation, maintenance, and purchase of services to provide information. Dated: July 23, 2019. Theodore J. Dowd, Deputy Chief Counsel, Office of the Comptroller of the Currency. [FR Doc. 2019–15959 Filed 7–26–19; 8:45 am] BILLING CODE 4810–33–P DEPARTMENT OF THE TREASURY Procedures for Monitoring Bank Secrecy Act Compliance Office of the Comptroller of the Currency Under 12 CFR 21.21, national banks and savings associations are required to develop and provide for the continued administration of a program reasonably designed to assure and monitor their compliance with the BSA and applicable Treasury regulations. The compliance program must be in writing, approved by the board of directors, and reflected in the minutes of the national bank or savings association. These requirements are necessary to ensure institution compliance with the BSA and applicable Treasury regulations. Type of Review: Regular. Agency Information Collection Activities: Information Collection Renewal; Submission for OMB Review; FFIEC Cybersecurity Assessment Tool 2 The Federal financial institution supervisory agencies are the Office of the Comptroller of the Currency (OCC), Board of Governors of the Federal Reserve System (Board), Federal Deposit Insurance Corporation (FDIC), and National Credit Union Administration (NCUA). The Office of Thrift Supervision, which was in existence at the time the SAR was adopted, was integrated into the OCC in 2011. VerDate Sep<11>2014 16:54 Jul 26, 2019 Jkt 247001 Office of the Comptroller of the Currency (OCC), Treasury. ACTION: Notice and request for comment. AGENCY: The OCC, the Board of Governors of the Federal Reserve System (Board), the Federal Deposit Insurance Corporation (FDIC), and the National Credit Union Administration (NCUA) (collectively, the Agencies), as part of their continuing effort to reduce paperwork and respondent burden, invite the general public and other federal agencies to take this opportunity to comment on a continuing information collection as required by the Paperwork Reduction Act of 1995 (PRA). In accordance with the requirements of the PRA, the Agencies may not SUMMARY: PO 00000 Frm 00095 Fmt 4703 Sfmt 4703 36659 conduct or sponsor, and the respondent is not required to respond to, an information collection unless it displays a currently valid Office of Management and Budget (OMB) control number. The OCC is soliciting comment on behalf of the Agencies concerning renewal of the information collection titled, ‘‘FFIEC Cybersecurity Assessment Tool’’ (‘‘Assessment’’). The OCC also is giving notice that it has sent the collection to OMB for review. DATES: Comments must be submitted on or before August 28, 2019. ADDRESSES: Commenters are encouraged to submit comments by email, if possible. You may submit comments by any of the following methods: • Email: prainfo@occ.treas.gov. • Mail: Chief Counsel’s Office, Attention: Comment Processing, 1557– 0328, Office of the Comptroller of the Currency, 400 7th Street SW, Suite 3E– 218, Washington, DC 20219. • Hand Delivery/Courier: 400 7th Street SW, Suite 3E–218, Washington, DC 20219. • Fax: (571) 465–4326. Instructions: You must include ‘‘OCC’’ as the agency name and ‘‘1557– 0328’’ in your comment. In general, the OCC will publish comments on www.reginfo.gov without change, including any business or personal information provided, such as name and address information, email addresses, or phone numbers. Comments received, including attachments and other supporting materials, are part of the public record and subject to public disclosure. Do not include any information in your comment or supporting materials that you consider confidential or inappropriate for public disclosure. Additionally, please send a copy of your comments by mail to: OCC Desk Officer, 1557–0328, U.S. Office of Management and Budget, 725 17th Street NW, #10235, Washington, DC 20503 or by email to oira_submission@ omb.eop.gov. You may review comments and other related materials that pertain to this information collection 1 following the close of the 30-day comment period for this notice by any of the following methods: • Viewing Comments Electronically: Go to www.reginfo.gov. Click on the ‘‘Information Collection Review’’ tab. Underneath the ‘‘Currently under Review’’ section heading, from the dropdown menu select ‘‘Department of Treasury’’ and then click ‘‘submit.’’ This information collection can be located by 1 On April 5, 2019, the OCC published a 60-day notice for this information collection, 84 FR 13786. E:\FR\FM\29JYN1.SGM 29JYN1 36660 Federal Register / Vol. 84, No. 145 / Monday, July 29, 2019 / Notices searching by OMB control number ‘‘1557–0328’’ or ‘‘FFIEC Cybersecurity Assessment Tool.’’ Upon finding the appropriate information collection, click on the related ‘‘ICR Reference Number.’’ On the next screen, select ‘‘View Supporting Statement and Other Documents’’ and then click on the link to any comment listed at the bottom of the screen. • For assistance in navigating www.reginfo.gov, please contact the Regulatory Information Service Center at (202) 482–7340. • Viewing Comments Personally: You may personally inspect comments at the OCC, 400 7th Street SW, Washington, DC. For security reasons, the OCC requires that visitors make an appointment to inspect comments. You may do so by calling (202) 649–6700 or, for persons who are deaf or hearing impaired, TTY, (202) 649–5597. Upon arrival, visitors will be required to present valid government-issued photo identification and submit to security screening in order to inspect comments. FOR FURTHER INFORMATION CONTACT: Shaquita Merritt, OCC Clearance Officer, Carl Kaminski, Special Counsel, or Priscilla Benner, Attorney (202) 649– 5490, for persons who are deaf or hearing impaired, TTY, (202) 649–5597, Chief Counsel’s Office, Office of the Comptroller of the Currency, 400 7th Street SW, Suite 3E–218, Washington, DC 20219. SUPPLEMENTARY INFORMATION: Under the PRA (44 U.S.C. et seq.), federal agencies must obtain approval from OMB for each collection of information they conduct or sponsor. ‘‘Collection of information’’ is defined in 44 U.S.C. 3502(3) and 5 CFR 1320.3(c) to include Assessment burden estimate Estimated number of respondents less than $500 million @80 hours OCC National Banks and Federal Savings Associations. FDIC State Non-Member Banks and State Savings Associations. Board State Member Banks and Bank Holding Companies. NCUA Federally-Insured Credit Unions .... 823 × 80 = 65,840 hours. 2,689 × 80 = 215,120 hours. 2,768 × 80 = 221,440 hours. 4,830 × 80 = 386,400 hours. 157 × 120 hours. 760 × 120 hours. 766 × 120 hours. 536 × 120 hours. 11,110 × 80 = hours = 888,800. 2,219 × 120 hours = 266,280 hours. Total ................................................... khammond on DSKBBV9HB2PROD with NOTICES agency requests or requirements that members of the public submit reports, keep records, or provide information to a third party. The OCC, on behalf of the Agencies, asks that OMB extend its approval of the information collection in this notice for three years. Title: FFIEC Cybersecurity Assessment Tool. OMB Number: 1557–0328. Description: Cyber threats continue to evolve and increase exponentially with greater sophistication. Financial institutions 2 are exposed to cyber risks because they are dependent on information technology to deliver services to consumers and businesses every day. Cyber attacks on financial institutions may result in unauthorized access to, and the compromise of, confidential information, as well as the destruction of critical data and systems. Disruption, degradation, or unauthorized alteration of information and systems can affect a financial institution’s operations and core processes and undermine confidence in the nation’s financial services sector. Absent immediate attention to these rapidly increasing threats, financial institutions and the financial sector as a whole are at risk. For this reason, the Agencies, under the auspices of the Federal Financial Institutions Examination Council (‘‘FFIEC’’), have worked diligently to assess and enhance the state of the financial industry’s cyber preparedness and to improve the Agencies’ examination procedures and training to strengthen the oversight of financial industry cybersecurity readiness. The Agencies also have focused on providing financial institutions with Estimated number of respondents $500 million–$10 billion @120 hours = 18,840 = 91,200 = 91,920 = 64,320 resources that can assist in protecting them and their customers from the growing risks posed by cyber attacks. As part of these efforts, the Agencies developed the Assessment to assist financial institutions of all sizes in assessing their inherent cyber risks and their risk management capabilities. The Assessment allows a financial institution to identify its inherent cyber risk profile based on the technologies and connection types, delivery channels, online/mobile products and technology services that it offers to its customers, its organizational characteristics, and the cyber threats it is likely to face. Once a financial institution identifies its inherent cyber risk profile, it may use the Assessment’s maturity matrix to evaluate its level of cybersecurity preparedness based on the financial institution’s cyber risk management and oversight, threat intelligence capabilities, cybersecurity controls, external dependency management, and cyber incident management and resiliency planning. A financial institution may use the matrix’s maturity levels to identify opportunities for improving the financial institution’s cyber risk management based on its inherent risk profile. The Assessment also enables a financial institution to rapidly identify areas that could improve the financial institution’s cyber risk management and response programs, as appropriate. Use of the Assessment by financial institutions is voluntary. Type of Review: Regular. Frequency of Response: On occasion. Affected Public: Businesses or other for-profit. Burden Estimates: 3 Estimated number of respondents $10 billion–; $50 billion @160 hours Estimated number of respondents over $50 billion @180 hours Estimated total respondents and total annual burden hours 123 × 160 = 19,680 hours. 34 × 160 = 5,440 hours. 81 × 160 = 12,960 hours. 8 × 160 = 1,280 hours 82 × 180 = 14,760 hours. 6 × 180 = 1,080 hours 1,185 respondents, 119,120 hours. 3,489 respondents, 312,840 hours. 3,641 respondents, 331,000 hours. 5,375 respondents, 452,180 hours. 246 hours × 160 = 39,360 hours. 115 hours × 180 = 20,700 hours. 26 × 180 = 4,680 hours. 1 × 180 = 180 hours 13,690 Respondents, 1,215,140 hours. On April 5, 2019, the OCC, on behalf of the Agencies published a 60-day notice requesting comment on this collection of information.4 The OCC received two comments from industry trade associations and 2 For purposes of this information collection, the term ‘‘financial institution’’ includes banks, savings associations, credit unions, and bank holding companies. 3 Burden is estimated conservatively and assumes all institutions will complete the Assessment. Therefore, the estimated burden may exceed the actual burden because use of the Assessment by financial institutions is not mandatory. The burden estimates for financial institutions include technology service providers who may assist financial institutions in completing their Assessments. 4 84 FR 13786. VerDate Sep<11>2014 18:04 Jul 26, 2019 Jkt 247001 PO 00000 Frm 00096 Fmt 4703 Sfmt 4703 E:\FR\FM\29JYN1.SGM 29JYN1 Federal Register / Vol. 84, No. 145 / Monday, July 29, 2019 / Notices one comment from the Financial Services Sector Coordinating Council (FSSCC). The comments, described below, address concerns related to the collection of information. khammond on DSKBBV9HB2PROD with NOTICES Usability and Format of the Assessment One industry group suggested changes to the format of the Assessment to increase usability. This industry group suggested that the FFIEC provide banks an automated or interactive document that banks can use to input information for the Assessment, as opposed to a static PDF document of questions and responses. The industry group added that many community banks are using the Financial Services Sector Coordinating Council’s automated Assessment spreadsheet to complete the Assessment in advance of their examinations. While this industry group asked the Agencies to provide the Assessment in a format that can be easily completed and provided to the examiner, if requested, the commenter also stated that none of the banks it represents reacted favorably to the questions in the notice inviting comment on the FFIEC agencies’ potential use of automated collection techniques or other forms of information technology to collect Assessment information. This industry group stated that several banks were concerned that automated collection would lead to a greater need to provide defensible answers during the examination review of the Assessment. The industry group also stated, however, that many banks find it useful to discuss the Assessment with the examiner on-site. The Agencies acknowledge the potential value of an automated or editable form of the Assessment for financial institutions that choose to use the Assessment. However, as the commenters noted, there are currently available a number of automated versions of the Assessment developed by financial institutions and industry groups. Automated versions are available publicly through trade associations, the Financial Services Information Sharing and Analysis Center, and the FSSCC. Accordingly, the Agencies do not intend to release an additional automated or editable version of the Assessment at this time. Utility of the Assessment One industry group commenter stated that the inherent risk review is very linear and could be better rooted in bank operations and market conditions. As an example, this commenter stated that many community banks engage cloud providers for data management, VerDate Sep<11>2014 16:54 Jul 26, 2019 Jkt 247001 and while cloud computing is a standard term, not all cloud computing companies are equal. They do not all have the same risks or mitigating controls. The commenter stated that when a community bank checks the ‘‘most’’ risk level due to the sheer number of cloud providers, the Assessment should allow for an additional level of risk mitigation, such as vendor management and vendor type, which could significantly reduce the risk. The Agencies appreciate the feedback and are continually seeking ways to update and improve the tools they use to assess cybersecurity. For example, in response to requests from financial institutions, the Agencies recently updated the Assessment to expand the response options for each declarative statement. With the additional response options, financial institutions’ management may include supplementary or complementary behaviors, practices, and processes that represent current practices of the institution in assessing declarative statements. Voluntary Nature of the Assessment Both industry groups and the FSSCC stated that most financial institutions employ the Assessment as one of the tools they use to assess their cybersecurity risk and maturity. However, they do not use the Assessment exclusively. Most use the Assessment in conjunction with other recognized technology frameworks. As such, the commenters said that examiners should not require the use of the Assessment nor require a financial institution to translate any other risk framework they use into the Assessment format. The commenters stated that if a regulator requires an examiner to complete the Assessment, then the examiner should translate the framework used by the institution into the Assessment format. The FSSCC and one industry group commenter stated that most of the financial institutions under the Agencies’ respective jurisdictions do not perceive the Assessment to be voluntary. To clarify this misperception, these commenters asked the Agencies to make a clear statement that other methodologies, such as NIST Cybersecurity Framework and the FSSCC Cybersecurity Profile, are acceptable inputs into the examination process. The FSSCC also stated that the Agencies should more closely align the Assessment with the NIST Cybersecurity Framework or a NISTbased standard, like the FSSCC Cybersecurity Profile, because the NIST PO 00000 Frm 00097 Fmt 4703 Sfmt 4703 36661 Cybersecurity Framework represents a leading approach to cybersecurity with an international community of users. One industry group commenter stated that several of its members expressed concern that examiners sometimes provide only a cursory review of the Assessment, if at all, with financial institution staff. This industry group asked the Agencies to clarify that if an institution takes the time to complete the Assessment, examiners should spend time reviewing it with the institution, and that if examiners complete the Assessment as part of the examination process, then the examinercompleted Assessment should be reviewed with the institution during the exam. The Agencies agree that the NIST Cybersecurity Framework is a valuable tool that provides a mechanism for cross-sector coordination. When developing the Assessment, the Agencies were informed by the NIST Cybersecurity Framework, the FFIEC Information Technology Examination Handbook, and industry accepted cybersecurity practices. In addition, Appendix B of the Assessment provides a mapping of the Assessment to the NIST Cybersecurity Framework. NIST reviewed and provided input on the mapping to ensure consistency with the NIST Cybersecurity Framework principles and to highlight the complementary nature of the two resources. The NIST Cybersecurity Framework is intended to address cybersecurity across many different sectors. The Agencies determined that developing an assessment, informed by the NIST Cybersecurity Framework but tailored to the specific risks and risk management and controls expectations within the banking industry, could help financial institutions to effectively assess their cybersecurity preparedness. Additionally, we note that prior to the development of the Assessment, the Agencies received many requests from financial institutions, particularly smaller financial institutions, to provide them with a meaningful way to assess cyber risks themselves based on financial sector-specific risks and mitigation techniques. The Agencies developed the Assessment, in part, to address those requests and received several positive comments about how the Assessment met this need. Thus, the Agencies believe the Assessment supports financial institutions by giving them a systematic way to assess their cybersecurity preparedness and evaluate their progress. Finally, as the Agencies stated when the Assessment was first published, use E:\FR\FM\29JYN1.SGM 29JYN1 36662 Federal Register / Vol. 84, No. 145 / Monday, July 29, 2019 / Notices of the Assessment by financial institutions is voluntary. Therefore, financial institutions may choose to use the Assessment, the NIST Cybersecurity Framework, or any other risk assessment process or tool to assess cybersecurity risk. The Agencies’ examiners will not require a financial institution to complete the Assessment, nor will they require financial institutions to translate other risk frameworks into the Assessment format. However, if a financial institution has completed the Assessment, examiners may ask the financial institution for a copy, as they would for any risk selfassessment performed by a financial institution. khammond on DSKBBV9HB2PROD with NOTICES Benchmarking One industry group stated that an advantage to the broad collection of Assessment information across the entire financial services sector is the ability to compile information into useful benchmarking data for banks of comparable size and risk profiles so that peer institutions may become aware of their overall cybersecurity posture in the sector. The industry group stated that the information may be useful to an information security officer or board of directors, particularly when it comes time to discuss budget impacts of the financial institution’s security posture. Additionally, benchmarking may allow the Agencies insight into broad categories of risk and exposure in the financial services sector. Since use of the Assessment by financial institutions is voluntary and may vary across financial institutions, the Agencies do not to intend to publish or otherwise make publicly available the results of financial institutions’ use of the Assessment. Accuracy of Burden Estimate The Agencies estimated that, annually, it would take a financial institution between 80 and 180 burden hours, depending on the institution’s size, to complete the Assessment. All three commenters addressed the accuracy of the Agencies’ burden estimates. The FSSCC letter stated that the Agencies’ burden estimate understated the burden involved in completing the Assessment, and one of the industry groups referenced and endorsed the FSSCC’s conclusions in its letter. The FSSCC advised that to be more accurate, the Agencies’ burden hour estimates should include the time required to prepare for and complete the Assessment. The FSSCC stated that preparing to complete the Assessment includes the testing of controls and systems, gathering of materials as VerDate Sep<11>2014 16:54 Jul 26, 2019 Jkt 247001 evidence, and the accompanying education of staff that are not familiar with the Assessment. The FSSCC stated that the time required to collect evidence and review systems before the Assessment can begin is significant, and the hours required to review the Assessment’s more than 530 responses—usually by committee—is substantial. The FSSCC further stated that the hours required to complete responses to the Assessment, while concurrently completing assessments based on other industry-based standards (e.g., NIST Cybersecurity Framework) for other regulatory agencies (such as state or market regulators), is significant. The FSSCC added that the amount of time spent training cybersecurity professionals on the Assessment is underestimated. The other industry group stated that the Agencies overestimated the burden hours necessary for community banks to complete and subsequently update the Assessment. This industry group stated that its members reported the burden of completing an initial Assessment as being 40 hours or less. Members of this industry group reported that the burden of completing annual updates to the Assessment for subsequent evaluations could take between 15 and 20 hours. The Agencies do not believe that commenters provided any additional information that would result in the Agencies changing their burden estimates at this time. The PRA defines burden to include the ‘‘time, effort, or financial resources expended by persons to generate, maintain, or provide information to or for a federal agency.’’ 44 U.S.C. 3502(2). The Agencies note that the burden estimates assume that the Assessment is completed by knowledgeable individuals at the financial institution who have readilyavailable information to complete the Assessment. Additionally, while the Assessment’s User’s Guide provides that institutions may use the Assessment to prioritize improvement of their cybersecurity posture, completing the Assessment does not include development or implementation of action plans. The Agencies further note that completion of the Assessment does not include internal reporting. Any internal reporting that financial institutions may choose to undertake is therefore outside of the scope of the Assessment. Because reporting to committees, developing and implementing internal action plans, and preparing for examinations are not part of completing the Assessment, these activities do not constitute burden under the PRA. In addition, for financial institutions, reporting to boards and PO 00000 Frm 00098 Fmt 4703 Sfmt 4703 management generally constitutes a usual and customary business practice. Usual and customary business practices are excluded from the definition of burden under OMB regulations.5 The Agencies recognize that the size and complexity of a financial institution impacts the amount of time and resources necessary to complete the Assessment and, for that reason, the Agencies’ burden estimates vary based on financial institution asset size. The Agencies also appreciate that the time necessary for a particular financial institution to complete the Assessment can vary, potentially widely, based on whether the institution has readily available information to complete the Assessment. The Agencies will review their burden estimates from time to time and will update them in the future, if warranted. Comments continue to be invited on: (a) Whether the collection of information is necessary for the proper performance of the functions of the Agencies, including whether the information has practical utility; (b) The accuracy of the Agencies’ estimates of the burden of the collection of information; (c) Ways to enhance the quality, utility, and clarity of the information to be collected; (d) Ways to minimize the burden of the collection on respondents, including through the use of automated collection techniques or other forms of information technology; and (e) Estimates of capital or start-up costs and costs of operation, maintenance, and purchase of services to provide information. Dated: July 23, 2019. Theodore J. Dowd, Deputy Chief Counsel, Office of the Comptroller of the Currency. [FR Doc. 2019–15964 Filed 7–26–19; 8:45 am] BILLING CODE 4810–33–P DEPARTMENT OF THE TREASURY Office of the Comptroller of the Currency Agency Information Collection Activities: Information Collection Revision; Submission for OMB Review; Municipal Securities Dealers and Government Securities Brokers and Dealers—Registration and Withdrawal Office of the Comptroller of the Currency (OCC), Treasury. AGENCY: 55 E:\FR\FM\29JYN1.SGM CFR 1320.3(b). 29JYN1

Agencies

[Federal Register Volume 84, Number 145 (Monday, July 29, 2019)]
[Notices]
[Pages 36659-36662]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-15964]


-----------------------------------------------------------------------

DEPARTMENT OF THE TREASURY

Office of the Comptroller of the Currency


Agency Information Collection Activities: Information Collection 
Renewal; Submission for OMB Review; FFIEC Cybersecurity Assessment Tool

AGENCY: Office of the Comptroller of the Currency (OCC), Treasury.

ACTION: Notice and request for comment.

-----------------------------------------------------------------------

SUMMARY: The OCC, the Board of Governors of the Federal Reserve System 
(Board), the Federal Deposit Insurance Corporation (FDIC), and the 
National Credit Union Administration (NCUA) (collectively, the 
Agencies), as part of their continuing effort to reduce paperwork and 
respondent burden, invite the general public and other federal agencies 
to take this opportunity to comment on a continuing information 
collection as required by the Paperwork Reduction Act of 1995 (PRA).
    In accordance with the requirements of the PRA, the Agencies may 
not conduct or sponsor, and the respondent is not required to respond 
to, an information collection unless it displays a currently valid 
Office of Management and Budget (OMB) control number.
    The OCC is soliciting comment on behalf of the Agencies concerning 
renewal of the information collection titled, ``FFIEC Cybersecurity 
Assessment Tool'' (``Assessment''). The OCC also is giving notice that 
it has sent the collection to OMB for review.

DATES: Comments must be submitted on or before August 28, 2019.

ADDRESSES: Commenters are encouraged to submit comments by email, if 
possible. You may submit comments by any of the following methods:
     Email: [email protected].
     Mail: Chief Counsel's Office, Attention: Comment 
Processing, 1557-0328, Office of the Comptroller of the Currency, 400 
7th Street SW, Suite 3E-218, Washington, DC 20219.
     Hand Delivery/Courier: 400 7th Street SW, Suite 3E-218, 
Washington, DC 20219.
     Fax: (571) 465-4326.
    Instructions: You must include ``OCC'' as the agency name and 
``1557-0328'' in your comment. In general, the OCC will publish 
comments on www.reginfo.gov without change, including any business or 
personal information provided, such as name and address information, 
email addresses, or phone numbers. Comments received, including 
attachments and other supporting materials, are part of the public 
record and subject to public disclosure. Do not include any information 
in your comment or supporting materials that you consider confidential 
or inappropriate for public disclosure.
    Additionally, please send a copy of your comments by mail to: OCC 
Desk Officer, 1557-0328, U.S. Office of Management and Budget, 725 17th 
Street NW, #10235, Washington, DC 20503 or by email to 
[email protected].
    You may review comments and other related materials that pertain to 
this information collection \1\ following the close of the 30-day 
comment period for this notice by any of the following methods:
---------------------------------------------------------------------------

    \1\ On April 5, 2019, the OCC published a 60-day notice for this 
information collection, 84 FR 13786.
---------------------------------------------------------------------------

     Viewing Comments Electronically: Go to www.reginfo.gov. 
Click on the ``Information Collection Review'' tab. Underneath the 
``Currently under Review'' section heading, from the drop-down menu 
select ``Department of Treasury'' and then click ``submit.'' This 
information collection can be located by

[[Page 36660]]

searching by OMB control number ``1557-0328'' or ``FFIEC Cybersecurity 
Assessment Tool.'' Upon finding the appropriate information collection, 
click on the related ``ICR Reference Number.'' On the next screen, 
select ``View Supporting Statement and Other Documents'' and then click 
on the link to any comment listed at the bottom of the screen.
     For assistance in navigating www.reginfo.gov, please 
contact the Regulatory Information Service Center at (202) 482-7340.
     Viewing Comments Personally: You may personally inspect 
comments at the OCC, 400 7th Street SW, Washington, DC. For security 
reasons, the OCC requires that visitors make an appointment to inspect 
comments. You may do so by calling (202) 649-6700 or, for persons who 
are deaf or hearing impaired, TTY, (202) 649-5597. Upon arrival, 
visitors will be required to present valid government-issued photo 
identification and submit to security screening in order to inspect 
comments.

FOR FURTHER INFORMATION CONTACT: Shaquita Merritt, OCC Clearance 
Officer, Carl Kaminski, Special Counsel, or Priscilla Benner, Attorney 
(202) 649-5490, for persons who are deaf or hearing impaired, TTY, 
(202) 649-5597, Chief Counsel's Office, Office of the Comptroller of 
the Currency, 400 7th Street SW, Suite 3E-218, Washington, DC 20219.

SUPPLEMENTARY INFORMATION: Under the PRA (44 U.S.C. et seq.), federal 
agencies must obtain approval from OMB for each collection of 
information they conduct or sponsor. ``Collection of information'' is 
defined in 44 U.S.C. 3502(3) and 5 CFR 1320.3(c) to include agency 
requests or requirements that members of the public submit reports, 
keep records, or provide information to a third party. The OCC, on 
behalf of the Agencies, asks that OMB extend its approval of the 
information collection in this notice for three years.
    Title: FFIEC Cybersecurity Assessment Tool.
    OMB Number: 1557-0328.
    Description: Cyber threats continue to evolve and increase 
exponentially with greater sophistication. Financial institutions \2\ 
are exposed to cyber risks because they are dependent on information 
technology to deliver services to consumers and businesses every day. 
Cyber attacks on financial institutions may result in unauthorized 
access to, and the compromise of, confidential information, as well as 
the destruction of critical data and systems. Disruption, degradation, 
or unauthorized alteration of information and systems can affect a 
financial institution's operations and core processes and undermine 
confidence in the nation's financial services sector. Absent immediate 
attention to these rapidly increasing threats, financial institutions 
and the financial sector as a whole are at risk.
---------------------------------------------------------------------------

    \2\ For purposes of this information collection, the term 
``financial institution'' includes banks, savings associations, 
credit unions, and bank holding companies.
---------------------------------------------------------------------------

    For this reason, the Agencies, under the auspices of the Federal 
Financial Institutions Examination Council (``FFIEC''), have worked 
diligently to assess and enhance the state of the financial industry's 
cyber preparedness and to improve the Agencies' examination procedures 
and training to strengthen the oversight of financial industry 
cybersecurity readiness. The Agencies also have focused on providing 
financial institutions with resources that can assist in protecting 
them and their customers from the growing risks posed by cyber attacks.
    As part of these efforts, the Agencies developed the Assessment to 
assist financial institutions of all sizes in assessing their inherent 
cyber risks and their risk management capabilities. The Assessment 
allows a financial institution to identify its inherent cyber risk 
profile based on the technologies and connection types, delivery 
channels, online/mobile products and technology services that it offers 
to its customers, its organizational characteristics, and the cyber 
threats it is likely to face. Once a financial institution identifies 
its inherent cyber risk profile, it may use the Assessment's maturity 
matrix to evaluate its level of cybersecurity preparedness based on the 
financial institution's cyber risk management and oversight, threat 
intelligence capabilities, cybersecurity controls, external dependency 
management, and cyber incident management and resiliency planning. A 
financial institution may use the matrix's maturity levels to identify 
opportunities for improving the financial institution's cyber risk 
management based on its inherent risk profile. The Assessment also 
enables a financial institution to rapidly identify areas that could 
improve the financial institution's cyber risk management and response 
programs, as appropriate. Use of the Assessment by financial 
institutions is voluntary.
    Type of Review: Regular.
    Frequency of Response: On occasion.
    Affected Public: Businesses or other for-profit.
    Burden Estimates: \3\
---------------------------------------------------------------------------

    \3\ Burden is estimated conservatively and assumes all 
institutions will complete the Assessment. Therefore, the estimated 
burden may exceed the actual burden because use of the Assessment by 
financial institutions is not mandatory. The burden estimates for 
financial institutions include technology service providers who may 
assist financial institutions in completing their Assessments.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
                                           Estimated number of             Estimated number of            Estimated number of            Estimated number of
     Assessment burden estimate        respondents less than $500     respondents $500 million-$10   respondents $10 billion-; $50   respondents over $50 billion   Estimated total respondents
                                            million @80 hours              billion @120 hours              billion @160 hours                 @180 hours           and total annual burden hours
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
OCC National Banks and Federal       823 x 80 = 65,840 hours.......  157 x 120 = 18,840 hours......  123 x 160 = 19,680 hours.....  82 x 180 = 14,760 hours......  1,185 respondents, 119,120
 Savings Associations.                                                                                                                                              hours.
FDIC State Non-Member Banks and      2,689 x 80 = 215,120 hours....  760 x 120 = 91,200 hours......  34 x 160 = 5,440 hours.......  6 x 180 = 1,080 hours........  3,489 respondents, 312,840
 State Savings Associations.                                                                                                                                        hours.
Board State Member Banks and Bank    2,768 x 80 = 221,440 hours....  766 x 120 = 91,920 hours......  81 x 160 = 12,960 hours......  26 x 180 = 4,680 hours.......  3,641 respondents, 331,000
 Holding Companies.                                                                                                                                                 hours.
NCUA Federally-Insured Credit        4,830 x 80 = 386,400 hours....  536 x 120 = 64,320 hours......  8 x 160 = 1,280 hours........  1 x 180 = 180 hours..........  5,375 respondents, 452,180
 Unions.                                                                                                                                                            hours.
                                    ------------------------------------------------------------------------------------------------------------------------------------------------------------
    Total..........................  11,110 x 80 = hours = 888,800.  2,219 x 120 hours = 266,280     246 hours x 160 = 39,360       115 hours x 180 = 20,700       13,690 Respondents, 1,215,140
                                                                      hours.                          hours.                         hours.                         hours.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

    On April 5, 2019, the OCC, on behalf of the Agencies published a 
60-day notice requesting comment on this collection of information.\4\
---------------------------------------------------------------------------

    \4\ 84 FR 13786.
---------------------------------------------------------------------------

    The OCC received two comments from industry trade associations and

[[Page 36661]]

one comment from the Financial Services Sector Coordinating Council 
(FSSCC). The comments, described below, address concerns related to the 
collection of information.

Usability and Format of the Assessment

    One industry group suggested changes to the format of the 
Assessment to increase usability. This industry group suggested that 
the FFIEC provide banks an automated or interactive document that banks 
can use to input information for the Assessment, as opposed to a static 
PDF document of questions and responses. The industry group added that 
many community banks are using the Financial Services Sector 
Coordinating Council's automated Assessment spreadsheet to complete the 
Assessment in advance of their examinations.
    While this industry group asked the Agencies to provide the 
Assessment in a format that can be easily completed and provided to the 
examiner, if requested, the commenter also stated that none of the 
banks it represents reacted favorably to the questions in the notice 
inviting comment on the FFIEC agencies' potential use of automated 
collection techniques or other forms of information technology to 
collect Assessment information. This industry group stated that several 
banks were concerned that automated collection would lead to a greater 
need to provide defensible answers during the examination review of the 
Assessment. The industry group also stated, however, that many banks 
find it useful to discuss the Assessment with the examiner on-site.
    The Agencies acknowledge the potential value of an automated or 
editable form of the Assessment for financial institutions that choose 
to use the Assessment. However, as the commenters noted, there are 
currently available a number of automated versions of the Assessment 
developed by financial institutions and industry groups. Automated 
versions are available publicly through trade associations, the 
Financial Services Information Sharing and Analysis Center, and the 
FSSCC. Accordingly, the Agencies do not intend to release an additional 
automated or editable version of the Assessment at this time.

Utility of the Assessment

    One industry group commenter stated that the inherent risk review 
is very linear and could be better rooted in bank operations and market 
conditions. As an example, this commenter stated that many community 
banks engage cloud providers for data management, and while cloud 
computing is a standard term, not all cloud computing companies are 
equal. They do not all have the same risks or mitigating controls. The 
commenter stated that when a community bank checks the ``most'' risk 
level due to the sheer number of cloud providers, the Assessment should 
allow for an additional level of risk mitigation, such as vendor 
management and vendor type, which could significantly reduce the risk.
    The Agencies appreciate the feedback and are continually seeking 
ways to update and improve the tools they use to assess cybersecurity. 
For example, in response to requests from financial institutions, the 
Agencies recently updated the Assessment to expand the response options 
for each declarative statement. With the additional response options, 
financial institutions' management may include supplementary or 
complementary behaviors, practices, and processes that represent 
current practices of the institution in assessing declarative 
statements.

Voluntary Nature of the Assessment

    Both industry groups and the FSSCC stated that most financial 
institutions employ the Assessment as one of the tools they use to 
assess their cybersecurity risk and maturity. However, they do not use 
the Assessment exclusively. Most use the Assessment in conjunction with 
other recognized technology frameworks. As such, the commenters said 
that examiners should not require the use of the Assessment nor require 
a financial institution to translate any other risk framework they use 
into the Assessment format. The commenters stated that if a regulator 
requires an examiner to complete the Assessment, then the examiner 
should translate the framework used by the institution into the 
Assessment format.
    The FSSCC and one industry group commenter stated that most of the 
financial institutions under the Agencies' respective jurisdictions do 
not perceive the Assessment to be voluntary. To clarify this 
misperception, these commenters asked the Agencies to make a clear 
statement that other methodologies, such as NIST Cybersecurity 
Framework and the FSSCC Cybersecurity Profile, are acceptable inputs 
into the examination process. The FSSCC also stated that the Agencies 
should more closely align the Assessment with the NIST Cybersecurity 
Framework or a NIST-based standard, like the FSSCC Cybersecurity 
Profile, because the NIST Cybersecurity Framework represents a leading 
approach to cybersecurity with an international community of users.
    One industry group commenter stated that several of its members 
expressed concern that examiners sometimes provide only a cursory 
review of the Assessment, if at all, with financial institution staff. 
This industry group asked the Agencies to clarify that if an 
institution takes the time to complete the Assessment, examiners should 
spend time reviewing it with the institution, and that if examiners 
complete the Assessment as part of the examination process, then the 
examiner-completed Assessment should be reviewed with the institution 
during the exam.
    The Agencies agree that the NIST Cybersecurity Framework is a 
valuable tool that provides a mechanism for cross-sector coordination. 
When developing the Assessment, the Agencies were informed by the NIST 
Cybersecurity Framework, the FFIEC Information Technology Examination 
Handbook, and industry accepted cybersecurity practices. In addition, 
Appendix B of the Assessment provides a mapping of the Assessment to 
the NIST Cybersecurity Framework. NIST reviewed and provided input on 
the mapping to ensure consistency with the NIST Cybersecurity Framework 
principles and to highlight the complementary nature of the two 
resources.
    The NIST Cybersecurity Framework is intended to address 
cybersecurity across many different sectors. The Agencies determined 
that developing an assessment, informed by the NIST Cybersecurity 
Framework but tailored to the specific risks and risk management and 
controls expectations within the banking industry, could help financial 
institutions to effectively assess their cybersecurity preparedness. 
Additionally, we note that prior to the development of the Assessment, 
the Agencies received many requests from financial institutions, 
particularly smaller financial institutions, to provide them with a 
meaningful way to assess cyber risks themselves based on financial 
sector-specific risks and mitigation techniques. The Agencies developed 
the Assessment, in part, to address those requests and received several 
positive comments about how the Assessment met this need. Thus, the 
Agencies believe the Assessment supports financial institutions by 
giving them a systematic way to assess their cybersecurity preparedness 
and evaluate their progress.
    Finally, as the Agencies stated when the Assessment was first 
published, use

[[Page 36662]]

of the Assessment by financial institutions is voluntary. Therefore, 
financial institutions may choose to use the Assessment, the NIST 
Cybersecurity Framework, or any other risk assessment process or tool 
to assess cybersecurity risk. The Agencies' examiners will not require 
a financial institution to complete the Assessment, nor will they 
require financial institutions to translate other risk frameworks into 
the Assessment format. However, if a financial institution has 
completed the Assessment, examiners may ask the financial institution 
for a copy, as they would for any risk self-assessment performed by a 
financial institution.

Benchmarking

    One industry group stated that an advantage to the broad collection 
of Assessment information across the entire financial services sector 
is the ability to compile information into useful benchmarking data for 
banks of comparable size and risk profiles so that peer institutions 
may become aware of their overall cybersecurity posture in the sector. 
The industry group stated that the information may be useful to an 
information security officer or board of directors, particularly when 
it comes time to discuss budget impacts of the financial institution's 
security posture. Additionally, benchmarking may allow the Agencies 
insight into broad categories of risk and exposure in the financial 
services sector.
    Since use of the Assessment by financial institutions is voluntary 
and may vary across financial institutions, the Agencies do not to 
intend to publish or otherwise make publicly available the results of 
financial institutions' use of the Assessment.

Accuracy of Burden Estimate

    The Agencies estimated that, annually, it would take a financial 
institution between 80 and 180 burden hours, depending on the 
institution's size, to complete the Assessment.
    All three commenters addressed the accuracy of the Agencies' burden 
estimates. The FSSCC letter stated that the Agencies' burden estimate 
understated the burden involved in completing the Assessment, and one 
of the industry groups referenced and endorsed the FSSCC's conclusions 
in its letter. The FSSCC advised that to be more accurate, the 
Agencies' burden hour estimates should include the time required to 
prepare for and complete the Assessment. The FSSCC stated that 
preparing to complete the Assessment includes the testing of controls 
and systems, gathering of materials as evidence, and the accompanying 
education of staff that are not familiar with the Assessment. The FSSCC 
stated that the time required to collect evidence and review systems 
before the Assessment can begin is significant, and the hours required 
to review the Assessment's more than 530 responses--usually by 
committee--is substantial. The FSSCC further stated that the hours 
required to complete responses to the Assessment, while concurrently 
completing assessments based on other industry-based standards (e.g., 
NIST Cybersecurity Framework) for other regulatory agencies (such as 
state or market regulators), is significant. The FSSCC added that the 
amount of time spent training cybersecurity professionals on the 
Assessment is underestimated.
    The other industry group stated that the Agencies overestimated the 
burden hours necessary for community banks to complete and subsequently 
update the Assessment. This industry group stated that its members 
reported the burden of completing an initial Assessment as being 40 
hours or less. Members of this industry group reported that the burden 
of completing annual updates to the Assessment for subsequent 
evaluations could take between 15 and 20 hours.
    The Agencies do not believe that commenters provided any additional 
information that would result in the Agencies changing their burden 
estimates at this time. The PRA defines burden to include the ``time, 
effort, or financial resources expended by persons to generate, 
maintain, or provide information to or for a federal agency.'' 44 
U.S.C. 3502(2). The Agencies note that the burden estimates assume that 
the Assessment is completed by knowledgeable individuals at the 
financial institution who have readily-available information to 
complete the Assessment. Additionally, while the Assessment's User's 
Guide provides that institutions may use the Assessment to prioritize 
improvement of their cybersecurity posture, completing the Assessment 
does not include development or implementation of action plans. The 
Agencies further note that completion of the Assessment does not 
include internal reporting. Any internal reporting that financial 
institutions may choose to undertake is therefore outside of the scope 
of the Assessment. Because reporting to committees, developing and 
implementing internal action plans, and preparing for examinations are 
not part of completing the Assessment, these activities do not 
constitute burden under the PRA. In addition, for financial 
institutions, reporting to boards and management generally constitutes 
a usual and customary business practice. Usual and customary business 
practices are excluded from the definition of burden under OMB 
regulations.\5\
---------------------------------------------------------------------------

    \5\ 5 CFR 1320.3(b).
---------------------------------------------------------------------------

    The Agencies recognize that the size and complexity of a financial 
institution impacts the amount of time and resources necessary to 
complete the Assessment and, for that reason, the Agencies' burden 
estimates vary based on financial institution asset size. The Agencies 
also appreciate that the time necessary for a particular financial 
institution to complete the Assessment can vary, potentially widely, 
based on whether the institution has readily available information to 
complete the Assessment. The Agencies will review their burden 
estimates from time to time and will update them in the future, if 
warranted.
    Comments continue to be invited on:
    (a) Whether the collection of information is necessary for the 
proper performance of the functions of the Agencies, including whether 
the information has practical utility;
    (b) The accuracy of the Agencies' estimates of the burden of the 
collection of information;
    (c) Ways to enhance the quality, utility, and clarity of the 
information to be collected;
    (d) Ways to minimize the burden of the collection on respondents, 
including through the use of automated collection techniques or other 
forms of information technology; and
    (e) Estimates of capital or start-up costs and costs of operation, 
maintenance, and purchase of services to provide information.

    Dated: July 23, 2019.
Theodore J. Dowd,
Deputy Chief Counsel, Office of the Comptroller of the Currency.
[FR Doc. 2019-15964 Filed 7-26-19; 8:45 am]
 BILLING CODE 4810-33-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.