Self-Regulatory Organizations; The Options Clearing Corporation; Notice of Filing and Extension of Review Period of Advance Notice Relating to OCC's Adoption of Cloud Infrastructure for New Clearing, Risk Management, and Data Management Applications, 60503-60516 [2021-23816]

Download as PDF Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices necessitated by credit losses, liquidity shortfalls, losses from general business risk, or any other losses.19 OCC believes that the proposed changes to the RWD Plan are consistent with Rule 17Ad– 22(e)(3)(ii) 20 because they will help ensure that the plan accurately reflects the titles, responsibilities and reporting lines for OCC’s staff. (B) Clearing Agency’s Statement on Burden of Competition Section 17A(b)(3)(I) of the Act 21 requires that the rules of a clearing agency not impose any burden on competition not necessary or appropriate in furtherance of the purposes of the Act. OCC does not believe that the proposed rule change would have any impact or impose any burden on competition. The proposal relates only to changes to OCC’s internal management structure with respect to officers who hold the title of Vice President and its derivatives and to recognize OCC’s ‘‘Chief Financial Officer’’ and have no effect on OCC clearing members. OCC does not believe the proposal would affect access to OCC’s services. jspears on DSK121TN23PROD with NOTICES1 (C) Clearing Agency’s Statement on Comments on the Proposed Rule Change Received From Members, Participants or Others Written comments on the proposed rule change were not and are not intended to be solicited with respect to the proposed rule change, and none have been received. III. Date of Effectiveness of the Proposed Rule Change and Timing for Commission Action Pursuant to Section 19(b)(3)(A) 22 of the Act, and Rule 19b–4(f)(6) thereunder,23 the proposed rule change is filed for immediate effectiveness because it does not: (i) Significantly affect the protection of investors or the public interest; (ii) impose any significant burden on competition; and (iii) by its terms would not become operative for 30 days after the date of the filing, or such shorter time as the Commission may designate. As described above, the proposal would narrowly revise the titles of officers within OCC who are Vice Presidents or derivatives of Vice Presidents. In addition, the changes related to identifying the Chief Financial Officer 19 See Securities Exchange Act Release No. 34– 78961 (Oct. 13, 2016), 81 FR 70786, 70808 (Oct. 13, 2016) (File No. S7–03–14). 20 17 CFR 240.17Ad–22(e)(3)(ii). 21 15 U.S.C. 78q–1(b)(3)(I). 22 15 U.S.C. 78s(b)(3)(A)(iii). 23 17 CFR 240.19b–4(f)(6). VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 rather than Controller and Treasurer within the By-Laws serve to clarify the officer role that is responsible for OCC’s Corporate Finance Department. Furthermore, the proposed changes to OCC’s Rule-Filed Policies to align with the revised titles as well as make nonsubstantive updates do not impact the function of the Rule-Filed Policies. Accordingly, the proposal would not significantly affect the protection of investors or the public interest or impose any significant burden on competition because it is a change to OCC officer structure that has no direct effect on Clearing Members or other users of OCC’s services. Additionally, OCC provided the Commission with written notice of its intent to file the proposed rule change, along with a brief description and text of the proposed rule change, at least five business days prior to the date of filing of the proposed rule change or such shorter time as designated by the Commission. At any time within 60 days of the filing of the proposed rule change, the Commission summarily may temporarily suspend such rule change if it appears to the Commission that such action is necessary or appropriate in the public interest, for the protection of investors, or otherwise in furtherance of the purposes of the Act.24 IV. Solicitation of Comments Interested persons are invited to submit written data, views and arguments concerning the foregoing, including whether the proposed rule change is consistent with the Act. Comments may be submitted by any of the following methods: 60503 post all comments on the Commission’s internet website (https://www.sec.gov/ rules/sro.shtml). Copies of the submission, all subsequent amendments, all written statements with respect to the proposed rule change that are filed with the Commission, and all written communications relating to the proposed rule change between the Commission and any person, other than those that may be withheld from the public in accordance with the provisions of 5 U.S.C. 552, will be available for website viewing and printing in the Commission’s Public Reference Room, 100 F Street NE, Washington, DC 20549, on official business days between the hours of 10:00 a.m. and 3:00 p.m. Copies of such filing also will be available for inspection and copying at the principal office of OCC and on OCC’s website at https://www.theocc.com/CompanyInformation/Documents-and-Archives/ By-Laws-and-Rules#rule-filings. All comments received will be posted without change. Persons submitting comments are cautioned that we do not redact or edit personal identifying information from comment submissions. You should submit only information that you wish to make available publicly. All submissions should refer to File Number SR–OCC–2021–010 and should be submitted on or before November 23, 2021. For the Commission, by the Division of Trading and Markets, pursuant to delegated authority.25 J. Matthew DeLesDernier, Assistant Secretary. Electronic Comments [FR Doc. 2021–23815 Filed 11–1–21; 8:45 am] • Use the Commission’s internet comment form (https://www.sec.gov/ rules/sro.shtml); or • Send an email to rule-comments@ sec.gov. Please include File Number SR– OCC–2021–010 on the subject line. BILLING CODE 8011–01–P Paper Comments • Send paper comments in triplicate to Secretary, Securities and Exchange Commission, 100 F Street NE, Washington, DC 20549–1090. All submissions should refer to File Number SR–OCC–2021–010. This file number should be included on the subject line if email is used. To help the Commission process and review your comments more efficiently, please use only one method. The Commission will 24 Notwithstanding its immediate effectiveness, implementation of this rule change will be delayed until this change is deemed certified under CFTC Regulation 40.6. PO 00000 Frm 00063 Fmt 4703 Sfmt 4703 SECURITIES AND EXCHANGE COMMISSION [Release No. 34–93433; File No. SR–OCC– 2021–802] Self-Regulatory Organizations; The Options Clearing Corporation; Notice of Filing and Extension of Review Period of Advance Notice Relating to OCC’s Adoption of Cloud Infrastructure for New Clearing, Risk Management, and Data Management Applications October 27, 2021. Pursuant to Section 806(e)(1) of Title VIII of the Dodd-Frank Wall Street Reform and Consumer Protection Act, entitled Payment, Clearing and 25 17 E:\FR\FM\02NON1.SGM CFR 200.30–3(a)(12). 02NON1 60504 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices Settlement Supervision Act of 2010 (‘‘Clearing Supervision Act’’) 1 and Rule 19b–4(n)(1)(i) 2 under the Securities Exchange Act of 1934 (‘‘Exchange Act’’ or ‘‘Act’’),3 notice is hereby given that on October 8, 2021, the Options Clearing Corporation (‘‘OCC’’) filed with the Securities and Exchange Commission (‘‘SEC’’ or ‘‘Commission’’) an advance notice as described in Items I, II and III below, which Items have been prepared primarily by OCC. The Commission is publishing this notice to solicit comments on the advance notice from interested persons and to extend the review period of the advance notice. I. Clearing Agency’s Statement of the Terms of Substance of the Advance Notice This advance notice is submitted in connection with a proposed adoption of Cloud infrastructure for OCC’s new clearing, risk management, and data management applications with an ondemand network of configurable information technology resources running on virtual infrastructure hosted by a third party. The proposed changes are described in detail in Item II below. All terms with initial capitalization not defined herein have the same meaning as set forth in OCC’s By-Laws and Rules.4 II. Clearing Agency’s Statement of the Purpose of, and Statutory Basis for, the Advance Notice In its filing with the Commission, OCC included statements concerning the purpose of and basis for the advance notice and discussed any comments it received on the advance notice. The text of these statements may be examined at the places specified in Item IV below. OCC has prepared summaries, set forth in sections A and B below, of the most significant aspects of these statements. jspears on DSK121TN23PROD with NOTICES1 (A) Clearing Agency’s Statement on Comments on the Advance Notice Received From Members, Participants or Others Written comments were not and are not intended to be solicited with respect to the advance notice and none have been received. OCC will notify the Commission of any written comments received by OCC. 1 12 U.S.C. 5465(e)(1). CFR 240.19b–4(n)(1)(i). 3 15 U.S.C. 78a et seq. 4 OCC’s By-Laws and Rules can be found on OCC’s public website: https://www.theocc.com/ Company-Information/Documents-and-Archives/ By-Laws-and-Rules. 2 17 VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 (B) Advance Notices Filed Pursuant to Section 806(e) of the Payment, Clearing, and Settlement Supervision Act Description of the Proposed Change OCC is proposing to adopt an ondemand network of configurable information technology resources running on infrastructure (‘‘Cloud’’ or ‘‘Cloud Infrastructure’’) hosted by a third party (‘‘Cloud Service Provider’’ or ‘‘CSP’’) to support OCC’s new core clearing, risk management, and data management applications. OCC will provision logically isolated sections of the Cloud Infrastructure that will provide it with the virtual equivalent of physical data center resources (‘‘Virtual Private Cloud’’),5 including scalable resources that: (i) Handle various computationally intensive applications with load-balancing and resource management (‘‘Compute’’); (ii) provide configurable storage (‘‘Storage’’); and (iii) host network resources and services (‘‘Network’’). Additionally, OCC will maintain an on-premises data center to enable OCC to support core clearing, risk management, and data management applications in the event of a multiregion outage of Compute, Storage, and Network services impacting OCC operations at the CSP. Background ENCORE, consisting of OCC’s core clearing, risk management, and data management applications running in traditional data centers, was launched in 2000 and has operated as OCC’s realtime processing engine receiving trade and post-trade data from a variety of sources on a transaction-by-transaction basis, maintaining clearing member positions, calculating margin and clearing fund requirements, and providing reporting to OCC staff, regulators, and clearing members. Two geographically diverse on-premises data centers located in Illinois and Texas house the Compute, Storage, and Network resources required to run all of these applications.6 5 The Virtual Private Cloud is the virtual equivalent of a traditional data center, albeit with the scalability benefits of the CSP’s infrastructure. The Virtual Private Cloud will provide OCC with a dedicated and secure space within the Cloud for OCC to operate. 6 OCC is not proposing changes to these services in connection with this Advance Notice. As appropriate, OCC will file proposals related to processing enhancements contemplated by the new core clearing, risk management, and data management applications separately. See, e.g., Securities Exchange Act Release No. 88654 (Apr. 15, 2020), 85 FR 22197, 98 n.7 (Apr. 21, 2020) (File No. SR–OCC–2020–004) (stating that a proposed rule change was designed to help facilitate the ability to run OCC’s current clearing system, known as ENCORE, in parallel with a new clearing system on which OCC is working). PO 00000 Frm 00064 Fmt 4703 Sfmt 4703 As the platform running OCC’s core applications for approximately twenty years, ENCORE has accommodated growth in average daily transaction volumes 7 and OCC has managed periods of extreme market volatility and stress, including during the 2007–2008 financial crisis and the COVID–19 global pandemic of 2020–21, without incident. Nevertheless, as ENCORE was designed to operate in traditional onpremises data centers that require the acquisition and installation of additional hardware and systems software to accommodate scaled resources or new applications, the resiliency and scalability of the current infrastructure is less flexible than that offered by Cloud Infrastructure. OCC’s objective is the retirement of ENCORE and its replacement with a resilient solution that meets market participants’ needs and the regulatory expectations of a systemically important financial market utility (‘‘SIFMU’’). Given advances in Cloud technology and information security since 2000, OCC’s proposed adoption of Cloud Infrastructure will offer more resiliency, security, and scalability. Proposed Changes Proposed Cloud Infrastructure. Cloud implementation will enable OCC to leverage the Compute, Storage, and Network capabilities of a CSP, supplemented with compatible thirdparty vendor solutions, to maintain a modular architecture with delineated domains that will result in (i) improved resiliency, (ii) enhanced security, and (iii) increased scalability for OCC’s new core clearing, risk management, and data management applications.8 Additionally, OCC will maintain an onpremises data center to support core clearing, risk management, and data management services in the event of a multi-region outage at the CSP that impacts OCC operations. i. Improved Resiliency As a SIFMU, OCC must ensure core applications on the Cloud Infrastructure have resiliency and recovery capabilities commensurate with OCC’s 7 As of September 30, 2021, approximately 38,846,212 contracts per day were processed through the clearing and risk applications on ENCORE, an increase of over 34.6% of daily contract volume for the same date of the prior year, which itself represented approximately a 50% increase of daily contract volume from the prior year. 8 OCC has separately submitted a request for confidential treatment to the Commission regarding a diagram that depicts the future state architecture following conclusion of the proposed Cloud Implementation, which OCC has provided in confidential Exhibit 3a to File No. SR–OCC–2021– 802. E:\FR\FM\02NON1.SGM 02NON1 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices importance to the functioning of the US financial markets.9 As explained in more detail below, OCC believes the Cloud Implementation will enhance the resiliency of OCC’s core clearing, risk management, and data management applications by virtue of OCC’s architectural design decisions and the Cloud’s built-in redundancy, guarantee of persistent availability, and disciplined approach to deployment of Cloud Infrastructure. In particular, the Cloud Implementation will enhance OCC’s ability to withstand and recover from adverse conditions by provisioning redundant Compute, Storage, and Network resources in three zones in each of two autonomous and geographically diverse regions. This will afford OCC six levels of redundancy in the Cloud with a primary and secondary Virtual Private Cloud running in a hot/ warm configuration. The hot Virtual Private Cloud will be operational and accepting traffic, while the warm Virtual Private Cloud will simultaneously receive the same incoming data and receive replicated data from the hot Virtual Private Cloud with applications on stand-by. This solution significantly reduces operational complexity, mitigates the risk of human error, and provides resiliency and assured capacity. Finally, the on-premises data center will operate as a separate, logically isolated backup to the six levels of redundancy provided for in the Cloud—a backup to backups. The onpremises data center will also simultaneously receive incoming data and the replicated data from the CSP hosted Virtual Private Clouds. The onpremises data center is intended to be used only in the unlikely and extraordinary event that OCC completely loses access to the CSP. jspears on DSK121TN23PROD with NOTICES1 ii. Enhanced Security The physical and cyber security standards that OCC has designed to align with the National Institute of Standards and Technology (‘‘NIST’’), Cyber Security Framework (‘‘CSF’’), and Center for Internet Security (‘‘CIS’’) benchmarks will not change in the Cloud Infrastructure. OCC will add meaningful security capabilities and measures provided by the CSP and selected third-party tools to enhance the security of OCC’s core clearing, risk management, and data management 9 In this context, ‘‘resiliency’’ is the ‘‘ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that include cyber resources.’’ Systems Security Engineering: Cyber Resiliency Considerations for Engineering of Trustworthy Secure Systems, Spec. Publ. NIST SP No. 800–160, vol. 2 (2018). VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 applications.10 Given the scope of their service, CSPs leverage economies of scale and offer infrastructure and services with specialized configuration, monitoring, prevention, detection, and response tools.11 Furthermore, unique Cloud-specific capabilities, such as services for provisioning credentials and end-to-end configuration change management and scanning, will provide OCC enhanced levels of protection not available in traditional on-premises solutions. Finally, the on-premises data center will be physically isolated from other on-premises networks, such as the development network, with consistent controls and equivalent security tools to that of the Virtual Private Clouds. Specific security-based risks are examined in more detail below. iii. Increased Scalability The Cloud Implementation will allow for more scalability of Compute, Network, and Storage resources that support OCC’s core clearing, risk management, and data management applications.12 With a Cloud Infrastructure, OCC can quickly provision or de-provision Compute, Storage, or Network resources to meet demands, including elevated trade volumes, and provide more flexibility to model and create development and test environments for back testing and stress testing, as well as other systems development needs. For example, the CSP can support elastic workloads and scale dynamically without the need for OCC to procure, test, and install additional servers or other hardware. 10 Examples of enhanced cloud security capabilities include automated infrastructure deployment that is monitored for change, creating a standardized baseline; default separation between SCI and non-SCI operating domains; and automated and ubiquitous encryption. OCC has separately submitted a request for confidential treatment to the Commission regarding the Future State: CSP and On-Premises Security Architecture, which OCC has provided in confidential Exhibit 3b to File No. SR–OCC–2021– 802. 11 For example, CSPs generally build infrastructure capable of withstanding Distributed Denial of Service (‘‘DDoS’’) attacks to far greater magnitudes than any one company can. In February 2020, one CSP stated that its infrastructure was targeted by and withstood a sustained DDoS attack of up to 2.3 terabytes per second. 12 OCC will continue to follow existing policies and procedures regarding capacity planning and change management. OCC periodically performs capacity and availability planning analyses that result in capacity baselines and forecasts, as an input to technology delivery and strategic planning to ensure cost-justifiable support of operational business needs. These analyses are based on the collection of performance data, trending, scenarios, and periodic high-volume capacity stress tests and include storage capacity for log and record retention. Results are reported to technology and security leadership as input to performance management and investment planning. PO 00000 Frm 00065 Fmt 4703 Sfmt 4703 60505 This means that OCC may increase Compute capacity in one or both regions where it operates via manual or automated processes for core clearing, risk management, and data management applications. The rapid deployment of Compute capacity will allow OCC to obtain access to resources far more quickly than with existing physical data centers. The efficiency gains from the increased scalability of the Cloud Infrastructure will allow OCC to run certain back testing processes at a fraction of the time currently required. These and additional efficiency gains are discussed in more detail below. Implementation Timeframe OCC expects to launch the new core clearing, risk management, and data management applications into production no earlier than April 1, 2024. The proposed timeline to launch includes several milestones, such as connectivity testing in the first quarter of 2023, external testing in the second quarter of 2023, and certification of readiness from clearing members and exchanges in the first quarter of 2024. OCC will communicate frequently with stakeholders during this timeframe and will confirm the production implementation date of the proposed launch by Information Memorandum posted to its public website at least eight weeks prior to implementation.13 Anticipated Effect on and Management of Risk Federal Financial Institutions Examination Council Cloud Computing Guidance On April 30, 2020, the Federal Financial Institutions Examination Council (‘‘FFIEC’’) 14 issued a joint statement to address the use of Cloud computing services and security risk management principles in the financial services sector (‘‘FFIEC Guidance’’).15 While the FFIEC Guidance does not contain regulatory obligations, it highlights risk management practices that financial institutions should adopt for the safe and sound use of Cloud computing services in five broad areas 13 See, ‘‘Timeline to Launch,’’ available at: https://www.theocc.com/Participant-Resources. 14 The Council is a formal interagency body empowered to prescribe uniform principles, standards, and report forms for the federal examination of financial institutions by the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the National Credit Union Administration, the Office of the Comptroller of the Currency, and the Consumer Financial Protection Bureau, and to make recommendations to promote uniformity in the supervision of financial institutions. 15 Available at: https://www.ffiec.gov/press/ pr043020.htm. E:\FR\FM\02NON1.SGM 02NON1 60506 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices (‘‘FFIEC Risk Management Categories’’). As discussed in the next section, the OCC is implementing practices for its proposed Cloud deployment consistent with this guidance. • Governance: Strategies for using Cloud computing services as part of the financial institution’s information technology strategic plan and architecture. • Cloud Security Management: (i) Appropriate due diligence and ongoing oversight and monitoring of CSP’s security; (ii) contractual responsibilities, capabilities, and restrictions for the financial institution and CSP; (iii) inventory process for systems and information assets residing in the Cloud; (iv) security configuration, provisioning, logging, and monitoring; (v) identity and access management (‘‘IAM’’) and network controls; (vi) security controls for sensitive data; and (vii) information security awareness and training programs. • Change Management: (i) Change management and software development lifecycle processes and (ii) security and reliability of microservice 16 architecture. • Resiliency and Recovery: (i) Business resiliency and recovery capabilities and (ii) incident response capabilities. • Audit and Controls Assessment: (i) Regular testing of financial institution controls for critical systems; (ii) oversight and monitoring of CSPmanaged controls; and (iii) oversight and monitoring of controls unique to Cloud computing services, including those related to (a) management of the virtual infrastructure; (b) use of containers in the Cloud Infrastructure; (c) use of managed security services for the Cloud Infrastructure; (d) consideration of interoperability and portability of data and services; and (e) data destruction or sanitization. Governance jspears on DSK121TN23PROD with NOTICES1 OCC’s ongoing Cloud Implementation is a natural progression of its information technology strategy and aligns seamlessly with its overall corporate strategy. OCC’s information technology strategy fully supports OCC’s corporate strategy to: (i) Reinforce OCC’s foundational capabilities and deliver effective and efficient services; (ii) deliver product and service 16 OCC’s use of microservices include specialized third-party applications and a set of containers that work together to compose an application. A container ’holds’ both an application and all the elements the application needs to run properly, including system libraries, system settings, and other dependencies. See Application Container Security Guide, NIST SP 800–190. VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 enhancements that enable growth in OCC’s core capabilities and provide capital efficiencies to market participants; and (iii) demonstrate thought leadership in the delivery of innovative solutions that provide longterm value and efficiencies for OCC and its stakeholders. The corporate strategy is fortified by six guiding principles: (i) Operating solutions that deliver reliability, predictability, and integrity; (ii) designing efficiency into OCC processes through automation and nearfrictionless capabilities; (iii) providing outcome-focused solutions; (iv) prioritizing collaboration and accountability within the information technology team; (v) ensuring protection for OCC, its clearing members, and the broader financial market; and (vi) incorporating a ‘‘continuous learning’’ mindset. As a SIFMU and the only provider of clearance and settlement services for listed options in the US, it is vital that OCC’s critical services remain continuously available with sufficient security measures in place to detect and defend against possible security threats. The Cloud Implementation will present OCC with an agile operating environment that can scale throughput to match workloads nearly instantaneously and that will enable OCC to build a ‘‘secure by design’’ pervasive security methodology that incorporates the NIST Cybersecurity Framework’s functions, categories, and subcategories as a roadmap for Cloud security. Movement to an agile, Cloudbased operating environment further reinforces OCC’s commitment to building in a comprehensive and adaptable risk-based security methodology instead of a traditional perimeter-centric model. OCC’s Cloud Implementation does not alter OCC’s responsibility to maintain compliance with applicable regulations. Consistent with FFIEC Guidance, OCC’s plan for Cloud Implementation supports OCC’s ability to comply with the SEC’s Regulation Systems, Compliance, and Integrity (‘‘Reg SCI’’) 17 and the CFTC’s Systems Safeguards.18 Reg SCI imposes certain information security and incident reporting standards on OCC and requires OCC to adopt an information technology governance framework reasonably designed to ensure that ‘‘SCI systems,’’ and for purpose of security, ‘‘indirect SCI systems,’’ have adequate levels of capacity, integrity, resiliency, 17 17 18 17 PO 00000 CFR 242.1000 et seq. CFR 39.18 et seq. Frm 00066 Fmt 4703 Sfmt 4703 availability, and security.19 As the ‘‘SCI Entity,’’ OCC remains solely responsible for meeting all Regulation SCI obligations.20 Similarly, Systems Safeguards requires OCC to have cybersecurity programs with risk analysis and oversight that ensure automated systems are secure, reasonably reliable, and have adequate scalable capacity. Within its agreement with the CSP (‘‘Cloud Agreement’’), OCC has established obligations on the CSP to provide support for OCC’s compliance with all applicable regulations.21 OCC believes the combination of the following provides OCC reasonable assurance that the proposed Cloud Implementation would enable OCC to continue to fully satisfy its Regulation SCI obligations: (i) The Cloud Agreement; (ii) CSP’s compliance programs as described in its Whitepapers 22 and publicly available policies (e.g., its Penetration Testing Policy), user guides, and other documents; (iii) CSP’s Service Level Agreements; (iv) CSP’s Systems Organization Controls reports (e.g., SOC 1, SOC 2, SOC 3) and ISO certifications (e.g., ISO 27001); (v) CSP’s size, scale, and ability to deploy extensive resources to protect and secure its 19 See 17 CFR 242.1001(a). SCI Systems are ‘‘all computer, network, electronic, technical, automated, or similar systems of, or operated by or on behalf of, an SCI entity that, with respect to securities, directly support trading, clearance and settlement, order routing, market data, market regulation, or market surveillance.’’ Indirect SCI Systems are ‘‘systems of, or operated by or on behalf of, an SCI entity that, if breached, would be reasonably likely to pose a security threat to SCI systems.’’ 20 References herein to ‘‘Shared Responsibility’’ conveys the responsibility of OCC and the CSP visa`-vis each other from a business operations perspective and it not intended to suggest the CSP has taken on, or that OCC has relinquished, any of OCC’s Reg SCI compliance requirements. 21 OCC has separately submitted a request for confidential treatment to the Commission regarding the Cloud Agreement. OCC has provided these documents in confidential Exhibit 3c to File No. SR–OCC–2021–802, confidential Exhibit 3d to File No. SR–OCC–2021–802, confidential Exhibit 3e to File No. SR–OCC–2021–802, and confidential Exhibit 3f to File No. SR–OCC–2021–802. Among other things, the Cloud Agreement sets forth the CSP’s responsibility to maintain the hardware, software, networking, and facilities that run the Cloud services. See also the separately submitted Table of Reg SCI Provisions, confidential Exhibit 3g to File No. SR–OCC–2021–802 that provides a summary of the terms and conditions of the Cloud Agreement that OCC believes enables OCC to comply with Reg SCI. 22 OCC has separately submitted requests for confidential treatment to the Commission regarding two examples of CSP Whitepapers, which OCC has provided in confidential Exhibit 3h to File No. SR– OCC–2021–802 and confidential Exhibit 3i to File No. SR–OCC–2021–802. E:\FR\FM\02NON1.SGM 02NON1 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices jspears on DSK121TN23PROD with NOTICES1 facilities and services; 23 and (vi) CSP’s commercial incentive to perform. OCC and the CSP rely on the shared responsibility model, which differentiates between the security ‘‘of’’ the Cloud and security ‘‘in’’ the Cloud.24 The CSP maintains sole responsibility and control over the security ‘‘of’’ the Cloud, and their customers are responsible for the security ‘‘in’’ the Cloud; i.e., security of hosted applications and data. Thus, OCC remains responsible for managing and maintaining the operating system and all applications, including security and patching, running in the Cloud. There is no primary/secondary relationship as each partner has a specific set of responsibilities which, when combined, address the entire risk space. The CSP performs its own risk and vulnerability assessments of the CSP infrastructure on which OCC will run its core clearing, risk management, and data management applications. In published documentation and in meetings conducted with members of CSP’s staff, the CSP asserts that it maintains an industry-leading automated test system, with strong executive oversight, and conducts fullscope assessments of its hardware, infrastructure, internal threats, and application software. The CSP asserts that it has an aggressive program for conducting internal adversarial assessments (Red Team) designed not only to evaluate system security but also the processes used to monitor and defend its infrastructure. The CSP also uses external, third-party assessments as a cross-check against its own results and to ensure that testing is conducted in an independent fashion. Per the CSP’s documentation, results of these processes are reviewed weekly by the CSP CISO and the CEO with senior CSP leaders to discuss security and action plans.25 23 The OCC has contracted to work with a top-tier CSP that provides Cloud hosting services to Fortune 500 companies and the U.S. Government, amongst many others. 24 References herein to ‘‘Shared Responsibility’’ conveys the responsibility of OCC and the CSP visa`-vis each other from a business operations perspective and it not intended to suggest the CSP has taken on, or that OCC has relinquished, any of OCC’s Reg SCI compliance requirements. See supra, footnote 20. OCC has separately submitted a request for confidential treatment to the Commission regarding a diagram that provides a summary of the ‘‘shared responsibility’’ model between OCC and the CSP, which OCC has provided in confidential Exhibit 3j to File No. SR–OCC–2021–802. 25 The CSP does not provide assessment results to its customers, as doing so would constitute a breach of generally accepted security best practices. Instead, the CSP provides its customers with industry-standard reports—such as SOC2 Type II— prepared by an independent third-party auditor to VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 OCC has the responsibility to perform risk assessments and technical security testing, including control validation, penetration testing, and adversarial testing, of OCC applications running on the CSP. This includes testing of the application interface layer of some CSP provided services such as storage and key management. OCC’s security testing model will remain as it is for the onpremises operations: The Security Engineering team will define security control requirements and validate their correct implementation on OCC systems and deployed core clearing, risk management, and data management applications; automated tools will be used to scan OCC application code and open source for security defects during the development process; and automated vulnerability management tools will conduct periodic scans of deployed software and devices to ensure that security patches and fixes are correctly implemented within required timelines. As mentioned, OCC’s testing includes assessing the configuration of CSP provided services: Security Services will work with Information Technology staff to ensure that CSP tools are configured to appropriately manage and mitigate potential sources of risk and will assess the effectiveness of those configurations. The OCC Red Team will operate freely ‘‘in the Cloud,’’ attempting to subvert or circumvent controls; their testing will include probing of CSP provided services to look for weaknesses in OCC’s deployment of those tools. Security Services will routinely report test results to Enterprise Risk Management, appropriate functional Operations and Information Technology management, senior management, and the Board of Directors. Automated vulnerability scanning reports, source code analysis, and results of specific assessments will be risk-rated and assigned a priority for remediation in accordance with OCC policy. Management and oversight of the Cloud Implementation follows standard governing principles for large information technology projects. OCC’s Board of Directors has established a Technology Committee to assist the Board of Directors in overseeing OCC’s information technology strategy and other company-wide operational capabilities. The Risk and Technology Committees are responsible for different aspects of the oversight of the Cloud provide relevant contextual information to its customers. The CSP also conducts periodic audit meetings specifically designed to discuss security concerns with its customers discussed later during the ‘‘CSP Audit Symposium.’’ PO 00000 Frm 00067 Fmt 4703 Sfmt 4703 60507 Implementation. Information Technology and Security Services, in collaboration with Enterprise Risk Management, are responsible for the identification, management, monitoring, and reporting on the risks associated with the Cloud Implementation. To that end, management presents the Technology Committee (with copies to the Risk Committee and the Board of Directors) with reports on the status and progress of the Cloud Implementation on at least a quarterly basis. This report includes an overall risk and issue summary and an analysis of key risk indicators for the Cloud Implementation.26 Finally, OCC’s Internal Audit Department is responsible for auditing security controls and configurations, including those related to the Cloud, prior to OCC’s planned Cloud Implementation. Starting in 2021 and going forward, the Internal Audit Annual Plan is designed to assess important elements of the new core clearing, risk management, and data management application roll-out. For example, the 2021 Audit Plan includes an audit on the Cloud Implementation. These audits will help assess OCC’s readiness for the Cloud Implementation as discussed below, in ‘‘Audit and Controls Assessment.’’ Cloud Security Management OCC has established a robust Cloud security program to both: (i) Manage the security of the core clearing, risk management, and data management applications that will be running on the Cloud Infrastructure hosted by the CSP, and (ii) assess and monitor the CSP management of security of the Cloud Infrastructure that it operates. The security program is designed to encompass all OCC assets existing in OCC offices, data centers, and within the CSP’s Cloud Infrastructure. The security program is built upon enterprise security standards that establish requirements that apply to any technology system as well as any tool that provides technology services. The following paragraphs in this section describe elements of OCC’s Cloud security management in the areas of: (i) Network and IAM controls (e.g., determining who is accessing the systems, granting access to the 26 OCC has separately submitted a request for confidential treatment to the Commission regarding an example of this Cloud Implementation risk report, which OCC has provided in confidential Exhibit 3k to File No. SR–OCC–2021–802. OCC has also submitted a request for confidential treatment to the Commission regarding Risk Appetite Statements and Risk Tolerances for Cloud Services, which OCC has provided in confidential Exhibit 3l to File No. SR–OCC–2021–802. E:\FR\FM\02NON1.SGM 02NON1 60508 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices jspears on DSK121TN23PROD with NOTICES1 applications, and then controlling what information they can access); (ii) security governance and controls for sensitive data; (iii) security configuration, provisioning, logging, and monitoring; and (iv) security testing. i. Network and IAM Controls OCC recognizes that robust network security configuration and IAM will provide reasonable assurance that users—including OCC employees, market participants, and service accounts for systems 27—are granted least-privileged access 28 to the network, applications, and data. OCC will use third-party tools to automate appropriate role-based access to the core clearing, risk management, and data management applications running in the Cloud. By enforcing strict separation of duties and least-privileged access for infrastructure, applications, and data, OCC will protect the confidentiality, availability, and integrity of the data. The maintenance of an on-premises backup data center necessitates additional network controls. The onpremises data center will be physically separate from networks supporting routine business functions, which will make the overall protection of the environment easier simply by eliminating connectivity other than for critical operations. OCC will explicitly provision all connectivity and will manage and mitigate risks through use of jump hosts that are heavily monitored (e.g., data feeds in and out, provisioned mechanisms for the delivery of the software, and a minimum management interface that requires multi-factor authentication for access). This connection model, coupled with limited access via dedicated private circuits, eliminates the most common threat exposures such as internet connectivity and email. The default physical separation defined in the on-premises backup architecture will be overlaid with industry standard monitoring and blocking tools to ensure that lateral movement between SCI and non-SCI environments is controlled in accordance with the risk. OCC has established IAM requirements that build upon the leastprivileged model. As part of the IAM program, all users must be assigned an appropriate enterprise identification. Users will be granted access to systems via a standardized and auditable 27 Service accounts are non-interactive accounts that permit application access to support activities such as monitoring, logging, or backup. 28 Least-privileged access means users will have only the permissioning needed to perform their work, and no more. VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 approval process. The user identifications and granted access will be managed through their full lifecycle from a centralized IAM system maintained and administered by OCC. Role-, attribute-, and context-based access controls will be used as defined by internal standards consistent with industry recommended practices to promote the principles of leastprivileged access and separation of duties. OCC will use and manage third party tools not otherwise provided by nor managed by the CSP for single sign-on and least-privileged access. The network will also include hardware and software to limit and monitor ingress and egress traffic, encrypt data in transmission, and isolate traffic between OCC and the Virtual Private Cloud. Since OCC will continue to provide cryptographic services, including key management, the CSP and other network service providers will not be able to decrypt OCC data either at rest or while in transit. ii. Security Governance and Controls for Sensitive Data OCC’s data governance framework that applies to the Cloud Implementation is identified within the OCC Enterprise Security Standards.29 The Enterprise Security Standards address data moving between systems within the Cloud as well as data transiting and traversing both trusted and untrusted networks. For example, the Enterprise Security Standards require a system or Software as a Solution to: (i) Store data and information, including all copies of data and information in the system, in the United States throughout its lifecycle; (ii) be able to retrieve and access the data and information throughout its lifecycle; (iii) for data in the system hosted in the Cloud, encrypt such data with key pairs kept and owned by OCC; (iv) comply with United States federal and applicable state data regulations regarding data location; and (v) enable secure disposition of non-records in accordance with OCC’s Information Governance Policy.30 Furthermore, OCC policies establish the overall data governance framework 29 OCC has separately submitted a request for confidential treatment to the Commission regarding the Enterprise Security Standards, which OCC has provided in confidential Exhibit 3m to File No. SR– OCC–2021–802. OCC security controls and standards are created, published, and managed in accordance with applicable OCC policies. 30 OCC has separately submitted a request for confidential treatment to the Commission regarding the Information Governance Policy, which OCC has provided as confidential Exhibit 3n to File No. SR– OCC–2021–802. PO 00000 Frm 00068 Fmt 4703 Sfmt 4703 applied to the management, use, and governance of OCC information to include digital instantiations, storage media, or whether the information is located, processed, stored, or transmitted on OCC’s information systems and networks, public, private, or hybrid Cloud infrastructures, thirdparty data centers and data repositories, or Software-as-a-Service (SaaS) applications.31 The Information Classification and Handling Policy classifies OCC’s information into three categories. System owners of technology that enable classification and/or labeling of information are responsible for ensuring the correct classification level is designated in the system of record and the applicable controls are enforced. All information requiring disposal is required to be disposed of securely in accordance with all applicable procedures. Sensitive data must be handled in a manner consistent with requirements in the Information Classification and Handling Policy. OCC will implement key components of a ‘‘zero trust’’ control environment, namely ubiquitous authentication and encryption via use of an automated public key infrastructure, coupled with responsive, highly available authentication, authorization tools, and key management strategies to ensure appropriate industry standard security controls are in place for sensitive data both in transit and at rest. External connectivity to OCC systems hosted by the CSP will be provided as it is now, through dedicated private circuits or over encrypted tunnels through the internet. These network links will also have additional security controls, including encryption during transmission and restrictions on network access to and from the Virtual Private Cloud. Additionally, OCC will use dedicated redundant private network connections between OCC data centers and the CSP infrastructure. OCC currently maintains two data centers and will do so in the future to provide redundant, geographically diverse connectivity for market participants. All network communications between OCC and the Cloud Infrastructure will rely on industry standard encryption for traffic while in transit. Data at rest will be safeguarded through pervasive encryption. OCC’s Encryption Standards describe requirements for implementation of the minimum required strengths, encryption at rest, 31 OCC has separately submitted a request for confidential treatment to the Commission regarding the Information Classification and Handling Policy, which OCC has provided in confidential Exhibit 3o to File No. SR–OCC–2021–802. E:\FR\FM\02NON1.SGM 02NON1 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices jspears on DSK121TN23PROD with NOTICES1 and cryptographic algorithms approved for use in cryptographic technology deployments across OCC.32 All OCC identifying data is encrypted in transit using industry standard methods. The Key Management Service (‘‘KMS’’) Strategy dictates that all CSP endpoints support HTTPS for encrypting data in transit.33 OCC also secures connections to the endpoint service by using virtual private computer endpoints and ensures client applications are properly configured to ensure encapsulation between minimum and maximum Transport Layer Security (TLS) versions per OCC encryption standard. OCC will have exclusive control over the key management system; only OCC authorized users will be able to access that data. CSP systems and staff will not have access to the OCC certificate management and/or key management system.34 OCC is responsible for the application architecture, software, configuration and use of the CSP services, and for the maintenance of the environment, including ongoing monitoring of the application environment to achieve the appropriate security posture. To do this, OCC follows: (i) Existing security design and controls; (ii) Cloud-specific information security controls defined in ‘‘Enterprise Security Controls;’’ and (iii) regulatory compliance requirements detailed in sources or information technology practices that are widely available and issued by an authoritative body that is a U.S. governmental entity or agency including NIST–CSF, COBIT, and the FFIEC Guidelines. OCC uses third-party tools for CSP security compliance monitoring, security scanning, and reporting. Alerts and all API-level actions are gathered using both CSP provided and thirdparty monitoring tools. The CSP provided monitoring tool is enabled by default at the organization level to monitor all CSP services activity. Centralized logging provides near realtime analysis of events and contains information about all aspects of user and role management, detection of unauthorized, security relevant configuration changes, and inbound and outbound communication. 32 OCC has separately submitted a request for confidential treatment to the Commission regarding the Encryption Standards, which OCC has provided in confidential Exhibit 3p to File No. SR–OCC– 2021–802. 33 OCC has separately submitted a request for confidential treatment to the Commission regarding OCC Key Management Service (KMS) Strategy, which OCC has provided in confidential Exhibit 3q to File No. SR–OCC–2021–802. 34 Certificate management is the process of creating, monitoring, and handling digital keys (certificates) to encrypt communications. VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 As previously discussed, OCC uses a KMS Strategy to encrypt data in transit and at rest in the Cloud. KMS is designed so that no one, including CSP employees, can retrieve customer plaintext keys and use them. The Federal Information Processing Standards (‘‘FIPS’’) 140–2 validated Host Security Modules (HSMs) in KMS protect the confidentiality and integrity of OCC customer keys.35 Customer plaintext keys are never written to disk and only ever used in protected, volatile memory of the HSMs for the time needed to perform the customer’s requested cryptographic operation. KMS keys are never transmitted outside of the Cloud regions in which they were created. Updates to the KMS HSM firmware are controlled by quorumbased access control 36 that is audited and reviewed by an independent group within the CSP. This tightly controlled deployment process minimizes the risk that the security properties of the service will be changed as new software, firmware, or hardware is introduced. With these security measures, only users granted access by OCC to the core clearing, risk management, or data management applications will be able to interact with the information contained therein. 60509 iii. Security Configuration, Provisioning, Logging, and Monitoring Automated delivery of business and security capability via the use of ‘‘Infrastructure as Code’’ and continuous integration/continuous deployment pipeline methods will permit security controls to be consistently and transparently deployed on-demand. OCC will provision Cloud Infrastructure using pre-established system configurations that are deployed through infrastructure as code, then scanned for compliance to secure baseline configuration standards. OCC also employs continuous configuration monitoring and periodic vulnerability scanning. OCC will continue to perform regular reviews and testing of OCC systems running on the Cloud while relying upon information provided by the CSP through the CSP’s SOC2 and Audit Symposiums. Finally, configuration, security incident, and event monitoring will rely on a blend of CSP native and third-party solutions. OCC also plans to use tools offered by the CSP and third-parties to monitor the core clearing, risk management, and data management applications run on the Cloud Infrastructure. OCC will track metrics, monitor log files, set alarms, and have the ability to act on changes to OCC core clearing, risk management, and data management applications and the environment in which they operate.37 The CSP will provide a dashboard to reflect- general health (e.g., up/down status of a region) but will not give additional insights into performance of services and applications which run on those services. The OCC operated centralized logging system will provide for a single frame of reference for log aggregation, access, and workflow management by ingesting the CSP’s logs coming from native detective tools and OCC instrumented controls for logging, monitoring, and vulnerability management. This instrumentation will give OCC a real-time view into the availability of Cloud services as well as the ability to track historical data. By using the enterprise monitoring tools OCC has in place, OCC will be able to integrate the availability and capacity management of Cloud into OCC’s existing processes, whether hosted on the Cloud or running in the local onpremises backup, and respond to issues in a timely manner. OCC will also use specialized thirdparty tools, as discussed above, to programmatically configure Cloud services and deploy security infrastructure. This automation of configuration and deployment will ensure Cloud services are repeatably and consistently configured securely and validated. Change detection tools providing event logs into the incident management system are also vital for reacting to and investigating unexpected changes to the environment. Security has implemented tools for the core clearing, risk management, and data management applications and back office environments that will be hosted at the CSP; notably, the IAM system, monitoring and Security Information and Event Management (‘‘SIEM’’) systems, the workflow system of record for incident handling, KMS, and enterprise Data Loss Prevention (‘‘DLP’’). Most of these services can also be run on-premises in a fully Cloudindependent mode, and Security Services has identified potential alternatives for those that will be needed for isolated on-premises operations and cannot operate 35 The HSM is analogous to a safe that only OCC has knowledge of the combination and the ability to access the keys to locks stored within. 36 A quorum-based access mechanism requires multiple users to provide credentials over a fixed period in order to obtain access. 37 OCC has separately submitted a request for confidential treatment to the Commission regarding the Draft Cloud Provider Logging and Alerting Test Environment, which OCC has provided in confidential Exhibit 3r to File No. SR–OCC–2021– 802. PO 00000 Frm 00069 Fmt 4703 Sfmt 4703 E:\FR\FM\02NON1.SGM 02NON1 60510 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices independently. All required technical controls deployed via or reliant on CSP services will be replaced or supplemented to ensure equivalent independent operation of the onpremises backup.38 Finally, the CSP prioritizes assurance programs and certifications, underscoring its ability to comply with financial services regulations and standards and to provide OCC with a secure Cloud Infrastructure.39 jspears on DSK121TN23PROD with NOTICES1 iv. Security Testing and Verification by the 2nd and 3rd Line Security testing is integrated into business-as-usual processes as outlined in relevant policy and procedures. These documents define how testing is initiated, executed, and tracked. For new assets and application (or code) releases, Security determines whether and what type of security testing is required through a risk-based analysis. If required, testing is conducted prior to implementation and the different testing techniques are outlined below: • Automated Security Testing: Using industry standard security testing tools and/or other security engineering techniques specifically configured for each test, Security will test to identify vulnerabilities and deliver payloads with the intent to break, change, or gain access to unauthorized areas within an application, data, or system. • Manual Penetration Testing: Using information gathered from automated testing and/or other information sources, Security will manually test to identify vulnerabilities and deliver payloads with the intent to break, change, or gain access to the unauthorized area within an application or system. • Blue Team Testing: The Blue Team identifies security threats and risks in the operating environment and analyzes the network, system, and SaaS environments and their current state of security readiness. Blue Team assessment results guide risk mitigation and remediation, validate the effectiveness of controls, and provide evidence to support authorization or approval decisions. Blue Team testing ensures that OCCs networks, systems, and SaaS solutions are as secure as 38 OCC has separately submitted a request for confidential treatment to the Commission regarding the Key Technologies, which OCC has provided in confidential Exhibit 3s to File No. SR–OCC–2021– 802. 39 The CSP has certifications for the following frameworks: NIST, Cloud Security Alliance, Control Objectives for Information and Related Technology (COBIT), International Organization for Standardization (ISO), and the Federal Information Security Management Act (FISMA). VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 possible before deploying to a production environment. The results of Security controls testing are risk-rated and managed to remediation via the Security Observation Risk Tracking process. Change Management Consistent with FFIEC Guidance, OCC’s use of the Cloud will have sufficient change management controls in place to effectively transition systems and information assets to the Cloud and will help ensure the security and reliability of microservices in the Cloud. OCC’s enterprise software development lifecycle processes help ensure the same control environment for all OCC resources, irrespective of whether they reside in an on-premises environment or in the Cloud. OCC has established baselines for design inputs and control requirements and enforces workload isolation and segregation through a Virtual Private Cloud using existing Cloud native technical controls and added new tools. OCC also plans to use other specialized platform monitoring tools for logging, scanning of configuration, and systems process scanning. OCC also has oversight as a code owner for the OCC infrastructure security containers and will have final review and approval for related changes and code merges before deployment of secure containers into production. Finally, OCC will periodically conduct static code scanning and perform vulnerability scanning for external dependencies prior to deployment in production, along with manual penetration testing of the provided application code. In addition, OCC will perform routine scans of Compute resources with the existing enterprise scanning tools. Any identified vulnerabilities will be reviewed for severity, prioritized, and logged for remediation tracking in upcoming development releases. OCC will create a ‘‘user acceptance plan’’ prior to promoting code to production. This user acceptance plan will include tests of all major functions, processes, and interfacing systems, as well as security tests. Through acceptance tests, OCC users will be able to simulate complete application functionality of the live environment. The change will move to the next stage of the OCC delivery model only after satisfying the criteria for this phase.40 OCC plans to use microservices in its use of the Cloud. OCC has internal projects that will address change 40 The ‘‘user acceptance plan’’ represents only one aspect of the overall change management program at the OCC. PO 00000 Frm 00070 Fmt 4703 Sfmt 4703 management of the various microservices. In particular, OCC runs a suite of supporting services that enable building, running, scaling, and monitoring of OCC’s business applications in the Cloud in an automated, resilient, and secure manner. The application platform relies on various CSP and third-party tools for different components, including Infrastructure as a Service, Infrastructure as Code, CI/CD, Container as a Service, Continuous Delivery, and Platform Monitoring. For example, OCC will use a third-party tool for managing containers and a different third-party tool for distributing containers and workloads to assist with platform automation. Security measures for planned production microservices are already incorporated within the overall security architecture and Enterprise Security Standards.41 With respect to software development in the Cloud, OCC has established a closed Virtual Private Cloud nonproduction environment that allows OCC to develop, test, and integrate new capabilities, including those related to security enhancements, while preventing direct external access to the development environment and tightly controlling on-premises access from OCC to the non-production environment. This OCC Virtual Private Cloud non-production environment (hosted in the Cloud) focuses on the foundational security, operations, and infrastructure requirements with the intent to take lessons learned to implement into future production. OCC developed and maintains a Cloud Reference Architecture that defines necessary capabilities and controls required to securely host core clearing, risk management, and data management applications on the CSP. The minimum foundational security requirements are based on the NIST CSF and CIS benchmarks and include the design and implementation requirements of a secure Cloud account structure within a multi-region Cloud environment. OCC maintains enterprise security requirements that provide structure for current and future development. As the Virtual Private Cloud environment is further developed and expanded, there is a comprehensive process to identify any incremental risks and develop and 41 The minimal security control architecture reflects awareness of the need to consider data storage and management outside of containers, configuration management to prevent unintended container interactions, and routine monitoring and replacement of containers when appropriate. E:\FR\FM\02NON1.SGM 02NON1 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices implement controls to manage and mitigate those risks.42 Resiliency and Recovery As noted earlier, given OCC’s role as a SIFMU, it is vital that OCC work to ensure operations moved to Cloud Infrastructure have appropriately robust resilience and recovery capabilities. Below is a discussion of how OCC has evaluated resiliency including: (i) The steps taken by OCC and the CSP to help ensure the persistent availability of Compute, Storage, and Network capabilities in the Cloud; (ii) the resiliency of the CSP’s method for deploying updates to help ensure that consequences of incidents are limited to the fullest extent possible; (iii) the onpremises backup; and (iv) the use of ‘‘store and forward’’ 43 messaging technology. i. Resiliency of the Cloud Infrastructure jspears on DSK121TN23PROD with NOTICES1 OCC believes the Cloud Implementation will enhance the resiliency of OCC’s core clearing, risk management, and data management applications by virtue of its built-in six levels of redundancy that will provide OCC with easy access to multiple zones within multiple and geographically diverse regions. The redundancy provided to OCC in the Cloud Infrastructure helps ensure that Compute, Storage, and Network resources will be available to OCC on a persistent basis. OCC will provision Compute, Storage, and Network resources in two autonomous and geographically diverse regions, in a hot/warm configuration to increase resources on demand, maintained by the CSP. Each region will maintain independent and identical copies of all applications that are deployed by OCC, allowing OCC to transition its core clearing, risk management, and data management applications from one region to another seamlessly. Production workloads would be run across and shifted between regions regularly to protect OCC against disruptions from regionalized incidents. In the unlikely event that a region is temporarily disabled as a result of an extreme event, OCC would failover to run core clearing, risk management, and data management applications in the other region. This 42 OCC has separately submitted a request for confidential treatment to the Commission discussing the status of security projects which OCC has provided in confidential Exhibit 3t to File No. SR–OCC–2021–802. 43 ‘‘Store and forward’’ messaging refers to messaging technology that retains copies of messages until confirmation of receipt, thus limiting the likelihood of loss during transmission. VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 will necessarily require that both regions be maintained with full and expansion capacity. At any point, OCC will have active primary and standby instances of the core clearing, risk management, and data management applications that can be moved to any of the six instances (i.e. three zones in each of the two regions). This is analogous to having six physical data centers with primary and backup running out of any two instances at a given point in time. Each region consists of three zones, each of which has a physical infrastructure with separate and dedicated connections to utility power, standalone backup power sources, independent mechanical services, and independent network connectivity. While not dependent on one another, zones are connected to one another with private fiber-optic networking, enabling the architecture of core clearing, risk management, and data management applications to automatically failover between zones without interruption. Since each zone can operate independently of one another but failover capability is near instantaneous, a loss of one zone will not affect operation in another zone; however, no core clearing, risk management, or data management application will be reliant on the functioning of a single zone. This structural framework offers OCC a wide expanse within which to run its core clearing, risk management, and data management applications while simultaneously restricting the effect of an incident at the CSP to the smallest footprint possible.44 As core clearing, risk management, and data management applications will be deployed in a primary (hot)/ secondary (warm) mode, each environment will be active, run the same software, and receive the same data, enabling a failover or switch from one region to another within two hours. Software and Infrastructure will be deployed via automated processes to ensure both are identical in each region. Additional capacity will always be available to support the resiliency of OCC’s core clearing, risk management, and data management applications by way of the six-way redundancy. OCC 44 To further ensure the resiliency of the Compute, Storage, and Network capabilities, the CSP’s services are divided into ‘‘data plane’’ and ‘‘control plane’’ services. OCC’s applications will run using data plane services; control plane services are used by the CSP to configure the environment. Resources and requests are further partitioned into cells, or multiple instantiations of a service that are isolated from each other and invisible to the CSP’s customers, on each plane, again minimizing the effect of a potential incident to the smallest footprint possible. PO 00000 Frm 00071 Fmt 4703 Sfmt 4703 60511 will continue to periodically test the CSP’s capacity scaling features and failover capabilities to ensure adequate capacity is always available to OCC.45 The CSP may not unilaterally terminate the relationship with OCC absent good cause or without sufficient notice to allow OCC to transition to an alternate CSP or to the on-premises solution for its Compute, Storage, and Network needs. The notice provision in the Cloud Agreement for terminations that are not for cause would give OCC sufficient time to consider and transition 46 its core clearing, risk management, and data management applications to another CSP or to its backup on-premises data center. Specifically, the CSP must provide notice OCC believes is sufficient to transition if it wishes to terminate the Cloud Agreement for convenience or if it wishes to terminate an individual CSP service offering on which OCC relies for all of its Cloud customers.47 The CSP is permitted to terminate the Cloud Agreement with shorter notice periods in the event of a critical breach or an uncured material breach of the Cloud Agreement. In the highly unlikely event that a critical breach or uncured material breach occurs, OCC would have sufficient notice to shift operations to the on-premises data center. Contract provisions that allow a party to terminate for uncured material breaches are designed to limit the types of actions that could lead to contract termination (typically, a breach is considered material only if it goes to the root of the agreement between the parties or is so substantial that it defeats the object of the parties in making the contract) and to establish a short period of time to resolve an aggrieved party’s claim (often 30 days). This gives the parties time and incentive to address the problem without having to resort to termination. Critical breaches are material breaches: (i) For which OCC knew its behavior would cause a material breach (such as a willful violation of Cloud Agreement 45 OCC will continue to perform periodic business continuity and disaster recovery tests to verify business continuity plans and disaster recovery infrastructure will support a two-hour recovery time objective for critical systems. 46 The possible transition of core clearing, risk management, and data management applications either from the CSP back to an on-premises solution or to another CSP is discussed below. 47 The CSP permits an exception to this sufficient notice provision in the event the CSP must terminate the individual service offering if necessary to comply with the law or requests of a government entity or to respond to claims, litigation, or los [sic] of license rights related to third-party intellectual property rights. In this event, the CSP must provide reasonable notice to OCC of the termination of the individual service offering. E:\FR\FM\02NON1.SGM 02NON1 60512 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices jspears on DSK121TN23PROD with NOTICES1 terms); (ii) that cause ongoing material harm to the CSP, its services, or its customers (e.g., criminal misuse of the services); or (iii) for undisputed nonpayment under the Cloud Agreement. Even if the CSP notifies OCC of an alleged breach (material or critical), termination of services is not immediate. OCC believes the risk of termination with a shorter notice period is mitigated by the following factors. In all cases of an alleged breach, the CSP must notify OCC in writing and provide time for OCC to cure the alleged breach (‘‘Notice Period’’). With respect to an alleged critical breach, OCC would use the Notice Period to attempt to cure the alleged critical breach while also preparing for a seamless transition to the on-premises data center. With respect to an alleged material breach, which requires the CSP to extend the Notice Period if OCC demonstrates a good faith effort to cure the alleged material breach, OCC would use the Notice Period to attempt to cure the alleged material breach while also preparing for a seamless transition to the on-premises data center. As a result, it is highly unlikely that a critical breach or a material breach would remain uncured beyond the Notice Period; if one does, however, OCC would have ample notice to shift operations to the on-premises data center to avoid a disruption to core clearing, risk management, and data management applications. ii. Resiliency of the Deployment of Cloud Infrastructure Updates The CSP will update the Cloud Infrastructure from time to time 48 using a conservative approach for update deployment that helps to ensure that any potential effects of possible incidents are contained to the greatest extent possible. The CSP achieves this by: (i) Fully automating the build and deployment process; and (ii) deploying services to production in a phased manner. CSP Services are first deployed to cells, which minimizes the chance that a disruption caused by a service update such as a patch in one cell would disrupt other cells. Following a successful cell-based deployment, service updates are next deployed to a specific zone, which limits the potential disruption caused by a service update to that particular zone. Following a successful zone deployment, service updates are then deployed in a staged 48 OCC will continue to retain responsibility for patching, configuration, and monitoring of the operating systems and applications in the Cloud. VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 manner to other zones starting with the same region and later within other regions until the process is complete. OCC will continue to meet regularly with staff of the CSP, in addition to formal quarterly Briefing Meetings with the CSP as described in the Reg SCI Addendum.49 The informal discussions and quarterly Briefing Meetings will permit OCC to gather information in advance of the quarterly Systems Change report. Most reportable systems changes will continue to occur based on changes to Compute, Storage, Network, or applications controlled by OCC. iii. Resiliency Through the Build Out of an On-Premises Data Center OCC will maintain an on-premises data center to provide the ability to support core clearing, risk management, and data management applications in the unlikely and extraordinary event of either the termination of the Cloud Agreement for uncured breach or a multi-region outage at the CSP that simultaneously impacts OCC operations within all three zones in both regions.50 OCC has designed the on-premises data center to operate 30 or more days to permit a smooth transition back to the Cloud (once the Cloud disruption is remediated) on a low volume day. From an architectural perspective, the onpremises data center is similar to adding a third CSP region with a single zone. While most technologies will remain the same with a failover to on-premises, there are several technologies that are only available at the CSP and for which alternative solutions must be devised. All equivalent on-premises core platform technologies that enable Compute, Network, and Storage will be operated by OCC with synchronous data replication between the Cloud and onpremises while member connectivity would remain unchanged.51 OCC will ensure adequate capacity in the onpremises data center for up to two and a half times observed peak volume. If the circumstances that required OCC to rely on the on-premises data center persist beyond seven days, OCC would 49 See confidential Exhibit 3f. with the assistance of an external consultant, conducted an analysis of the benefits and risks of a multi-CSP infrastructure. The key findings indicated that a multi-CSP infrastructure would not significant improver resiliency and could create additional risks, including: (i) Increased functionality and delivery risks; (ii) increased operational and cybersecurity risks; (iii) human capital risks; (iv) third-party and legal risks; and (v) general business risks. 51 OCC has separately submitted a request for confidential treatment to the Commission for a diagram that the presents draft Failover Architecture which OCC has provided in confidential Exhibit 3u to File No. SR–OCC–2021– 802. 50 OCC, PO 00000 Frm 00072 Fmt 4703 Sfmt 4703 take steps necessary to enhance its Storage to enable seamless operation of the on-premises data center for longer than 30 days. iv. Resiliency Through the Use of ‘‘Store and Forward’’ Messaging Technology OCC has designed the architecture to ensure it is able to support zero message loss and a quick recovery time. To meet these requirements the architecture places a premium on data integrity and throughput over the latency of any one transaction. The established techniques for this are ‘‘store and forward’’ messaging technology where messages are preserved until delivered to servers that consume the messages and synchronous writes to multiple servers. Unlike OCC’s current system, the core clearing, risk management, and data management applications do not rely on block storage replication across CSP regions. The solution is entirely message based and message replication achieves the data redundancy required to deliver high availability services. OCC will continue to rely on the existing ‘‘store and forward’’ messaging technology as the primary technology for exchanging messages with both exchanges & clearing members for the intake of clearing and settlement related information. The ‘‘store and forward’’ messaging technology manager is hosted on-premises and is replicated across all OCC on-premises data centers. The ‘‘store and forward’’ messaging technology will then forward messages to the hot/warm instances at the CSP and the redundant on-premises data center applications. Core clearing, risk management, and data management applications rely on a platform for managing containerized workloads and messaging services. This platform enables multi-region message replication with synchronous acknowledgement. The platform will treat the on-premises data center as another region, with messages being replicated to all three regions (the two Cloud regions and on-premises). The core clearing, risk management, and data management application architecture deployed across the two CSP regions and on-premises will maximize data integrity and throughput during routine operations and enhance failover should it be necessary. Audit and Controls Assessment OCC has a plan in place to continually test the Cloud security controls and OCC’s readiness for the Cloud Implementation, and also has processes in place to regularly audit and test security controls and E:\FR\FM\02NON1.SGM 02NON1 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices configurations,52 including by monitoring the CSP’s technical, administrative, and physical security controls that support OCC’s systems in the Cloud Infrastructure. i. Internal Risk Assessments In addition to existing OCC Third Party Vendor Risk Management activities, OCCs Third Party Risk Management department (‘‘TPRM’’) will assess the operational risks of the CSP as a critical vendor annually. Additionally, OCC conducts a technology risk assessment, which is an evaluation of risks to OCC’s critical systems, monitoring of key risk indicators (‘‘KRI’’), risk events, security events, and key controls, and which will encompass all risks presented by the CSP, on an annual basis.53 jspears on DSK121TN23PROD with NOTICES1 ii. External Risk Assessment OCC engaged a third-party familiar with Cloud Infrastructure best practices to conduct a design effectiveness review of the OCC’s proposed Cloud strategy, application architecture, and related security and resiliency controls.54 The External Risk Assessment focused on: (i) Cloud reference architecture, capabilities, and controls required to host applications in the Cloud; (ii) existing and planned resiliency capabilities to meet a two-hour recovery time objective of OCC’s critical services; and (iii) design of the existing and planned security controls during and after the Cloud Implementation.55 The External Risk Assessment identified strengths in OCC’s planned Cloud Implementation, including that OCC incorporated several leading security practices as well as support for elastic capacity and the ability to scale effectively into its plan. The External Risk Assessment also included recommendations to supplement OCC’s execution plan for the Cloud Implementation and were broadly categorized into six technical areas: (i) Workload isolation and networking; (ii) 52 Internal Audit will assess plans during the 2021 Cloud Transition Audit, and more in-depth in early 2022 when the processes are modified to operate in the Cloud. 53 This annual risk assessment is provided to the Board of Directors and the Technology Committee. 54 OCC has separately submitted a request for confidential treatment to the Commission regarding the External Risk Assessment, which OCC has provided in confidential Exhibit 3v to File No. SR– OCC–2021–802 and regarding OCC’s response to the External Risk Assessment recommendations, which OCC has provided in confidential Exhibit 3w to File No. SR–OCC–2021–802. 55 The External Risk Assessment included five discovery workshops, thirty design review sessions, discussions with over forty-eight OCC stakeholders, and review of one hundred sixty documents ranging from strategy materials to configuration builds. VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 automation and pipelines; (iii) data fabric and data lifecycle management; (iv) platform shared services and support model; (v) security shared services and support model; and (vi) resiliency. Recommendations were categorized across two dimensions: (i) Program priority (high, medium, or low) and (ii) implementation action (start, accelerate, or continue). A recommendation does not necessarily mean OCC would not have implemented the recommended action absent the recommendation, as several of the recommendations were for OCC to continue an activity it had already begun. OCC has a plan in place to address the recommendations provided in the External Risk Assessment and will track the plan to completion. iii. Internal Audit Department Plan Related to Cloud Implementation As mentioned above, starting in 2021 and going forward, the Internal Audit Annual Plan is designed to assess important elements of the new core clearing, risk management, and data management applications roll-out. For example, the 2021 Audit Plan includes an audit on the Cloud Implementation. This audit included an analysis of OCC’s disposition of the findings in the External Risk Assessment, determined if the risks associated with findings have been adequately addressed, evaluated OCC’s strategy in the event it needs to transition from the CSP at any time, evaluated the adequacy of OCC’s remediation plans and timelines, and OCC’s assessment of the third-party CSP attestation report (SOC). The Internal Audit Department plans to augment internal resources with co-source resources with specific expertise in Cloud-based controls and has conducted a department-wide training of Cloud auditing, with additional training to be conducted as necessary. iv. Audit Symposium and Access Rights The CSP hosts an annual Audit Symposium, which will allow OCC to review evidence supporting the CSP’s control environment. The CSP also hosts an annual Cloud security conference focused on Security, Governance, Risk and Compliance. OCC Information Technology staff currently meets with CSP representatives weekly to focus on technical issues related to OCC’s proposed Cloud environment. In addition, OCC will be holding compliance briefings with the CSP quarterly, wherein the CSP will provide OCC with documentation (e.g., SOC 2 Report) and assist OCC’s preparation for the Audit Symposium. OCC PO 00000 Frm 00073 Fmt 4703 Sfmt 4703 60513 management, including Security, Information Technology, and the Internal Audit Department, will coordinate to ensure appropriate representation during the planned briefings. TPRM will help initiate and orchestrate the annual reviews. v. Key Risk and Key Performance Indicators OCC has also established several key risk indicators (‘‘KRI’’) and key performance indicators (‘‘KPI’’) to evaluate OCC’s management of risk and the CSP’s performance during the Cloud implementation and ongoing operation.56 The KRIs are approved by and regularly reported to OCC’s Management Committee, Board of Directors, and the Risk Committee of the Board of Directors. OCC has developed Cloud KPIs and socialized these KPIs internally. The KRIs already exist for core clearing, risk management, and data management applications and are aligned to overall systems availability, capacity, data integrity, and security. The CSP KPIs feed into existing KRIs and will continue to be used to evaluate the CSP’s performance after the Cloud Implementation.57 KPIs will be added to monitor the performance and risks of the CSP services for which OCC has contracted. These post-Cloud Implementation KRIs and KPIs will allow OCC to assess its ongoing use of the CSP against its operational and security requirements and will demonstrate the effectiveness of risk controls and the CSP’s performance against commitments in the Service Level Agreements, and will be reported on a regular basis to OCC’s Management Committee, Board of Directors, and Technology and Risk Committees of the Board of Directors.58 56 These KRIs and KPIs are contained in the Cloud Implementation risk report. OCC has separately submitted a request for confidential treatment to the Commission regarding the Cloud Implementation risk report, which OCC has provided in confidential Exhibit 3k to File No. SR– OCC–2021–802. See supra note 26. 57 OCC has established metrics for monitoring CSP systems capacity and availability in each zone in Risk Appetite Statements and Risk Tolerance for Cloud Services which OCC has provided in confidential Exhibit 3l to File No. SR–OCC–2021– 802. Data integrity and systems incidents are monitored through OCC’s Quality Standards Program and Systems Incident Program, respectively. 58 OCC has separately submitted a request for confidential treatment to the Commission regarding metrics and reporting that OCC will use to monitor the security and performance of the CSP after adoption, which OCC has provided in confidential Exhibit 3x to File No. SR–OCC–2021–802. E:\FR\FM\02NON1.SGM 02NON1 60514 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices vi. Auditing the CSP Post CloudImplementation OCC’s Cloud Agreement gives OCC the right to attend the CSP Audit Symposium annually so that OCC may inspect and verify evidence of the design and effectiveness of the CSP’s control environment and physical security controls in place at the CSP’s data centers. Through preparation for and attendance at this symposium, OCC may also provide feedback and make requests of the CSP for future modifications of the control environment. The CSP is also required to maintain an information security program, including controls and certifications, that is as protective as the program evidenced by the CSP’s SOC– 2 report. The CSP must make available on demand to OCC its SOC–2 report as well as the CSP’s other certifications from accreditation bodies and information on its alignment with various frameworks, including NIST, CSF, and ISO.59 TPRM will coordinate an annual risk assessment of OCC’s relationship with the CPS. TPRM, Security, and Business Continuity will determine the adequacy and reasonableness of the documentation received to complete the Third-Party Risk Assessment. Finally, the Cloud Agreement provides that OCC’s regulators may visit the facilities of the CSP under specified conditions. OCC plans to use the CSP’s services combined with additional third-party tools to monitor systems deployed by ingesting logs into a security incident and event monitoring tool to provide a single pane of glass view into the Cloud Infrastructure (and the on-premises data center to the extent it is used). When incidents are detected, OCC will follow its existing incident response governance to identify, detect, contain, eradicate, and recover from incidents. jspears on DSK121TN23PROD with NOTICES1 Consistency With the Payment, Clearing and Settlement Supervision Act The stated purpose of the Clearing Supervision Act is to mitigate systemic risk in the financial system and promote financial stability by, among other things, promoting uniform risk management standards for systemically important financial market utilities and strengthening the liquidity of systemically important financial market utilities.60 Section 805(a)(2) of the 59 The FFIEC Guidance provides that OCC may obtain SOC reports, other independent audits, or ISO certification reports to gain assurance that the CSP’s controls are operating effectively. See FFIEC, Security in a Cloud Computing Environment, page 7. OCC reviews the CSP’s SOC–2 on an annual basis. 60 12 U.S.C. 5461(b). VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 Clearing Supervision Act 61 also authorizes the Commission to prescribe risk management standards for the payment, clearing and settlement activities of designated clearing entities, like OCC, for which the Commission is the supervisory agency. Section 805(b) of the Clearing Supervision Act 62 states that the objectives and principles for risk management standards prescribed under Section 805(a) shall be to: • Promote robust risk management; • promote safety and soundness; • reduce systemic risks; and • support the stability of the broader financial system. The Commission has adopted risk management standards under Section 805(a)(2) of the Clearing Supervision Act and the Exchange Act in furtherance of these objectives and principles.63 Rule 17Ad–22 requires registered clearing agencies, like OCC, to establish, implement, maintain, and enforce written policies and procedures that are reasonably designed to meet certain minimum requirements for their operations and risk management practices on an ongoing basis.64 Therefore, the Commission has stated 65 that it believes it is appropriate to review changes proposed in advance notices against Rule 17Ad–22 and the objectives and principles of these risk management standards as described in Section 805(b) of the Clearing Supervision Act.66 OCC believes that the proposed changes are consistent with Section 805(b)(1) of the Clearing Supervision Act 67 and the requirements of Rules 17Ad–22(e)(17) and (e)(21) under the Act because the Cloud Implementation would provide OCC with resilient, secure, and scalable core clearing, risk management, and data management systems that far exceeds what is 61 12 U.S.C. 5464(a)(2). U.S.C. 5464(b). 63 17 CFR 240.17Ad–22. See Exchange Act Release Nos. 68080 (October 22, 2012), 77 FR 66220 (November 2, 2012) (S7–08–11) (‘‘Clearing Agency Standards’’); 78961 (September 28, 2016), 81 FR 70786 (October 13, 2016) (S7–03–14) (‘‘Standards for Covered Clearing Agencies’’). 64 17 CFR 240.17Ad–22. 65 See e.g., Exchange Act Release No. 86182 (June 24, 2019), 84 FR 31128, 31129 (June 28, 2019) (SR– OCC–2019–803). 66 12 U.S.C. 5464(b). Reg SCI was not adopted under the Payment, Clearing and Settlement Supervision Act and thus is not analyzed in this section. However, an analysis of the compliance requirements of Reg SCI and the provisions of the Cloud Agreement that enable OCC to meet them are provided in confidential Exhibit 3d to File No. SR– OCC–2021–802, for which OCC has separately submitted a request for confidential treatment from the Commission. 67 12 U.S.C. 5464(b)(1). 62 12 PO 00000 Frm 00074 Fmt 4703 Sfmt 4703 currently possible in an on-premises infrastructure. Rule 17Ad–22(e)(17)(ii) requires OCC to establish, implement, maintain, and enforce written policies and procedures reasonably designed to manage OCC’s operational risk by ‘‘ensuring that systems have a high degree of security, resiliency, operational reliability, and adequate, scalable capacity.’’ 68 OCC maintains several policies specifically designed to manage the risks associated with maintaining adequate levels of system functionality, confidentiality, integrity, availability, capacity and resiliency for systems that support core clearing, risk management, and data management services.69 As stated above, resiliency of the Cloud Infrastructure is built into the system with functionality for OCC’s core clearing, risk management, and data management applications to run in multiple zones within multiple regions. Regions are isolated from one another and are designed in part to minimize the possibility of a multi-region outage. OCC has designed the infrastructure to have primary (hot)/secondary (warm) zones at all times ensuring Compute, Storage, and Network resources would be available in a new redundant region in the event of a primary region failure. As a result, the Cloud Infrastructure offers OCC multiple redundancies within which to run its core clearing, risk management, and data management applications while simultaneously restricting the effect of an incident at the CSP to the smallest footprint possible. Furthermore, in the unlikely and extraordinary event OCC loses access to each of the six levels of resiliency within the CSP environment, OCC can failover to an on-premises backup that will permit continued operations of core clearing, risk management, and data management applications. OCC has established a robust Cloud security program to manage the security of the core clearing, risk management, and data management applications that will be running in the Cloud and to monitor the CSP’s management of security of the Cloud Infrastructure that it operates. Processes are formally defined, automated to the fullest extent, repeatable with minimal variation, 68 17 CFR 240.17Ad–22(e)(17)(ii). has separately submitted a request for confidential treatment to the Commission regarding the IT Operational Risk Management Policy, which OCC has provided as confidential Exhibit 3y to File No. SR–OCC–2021–802, the Technology Operations Policy, which OCC has provided as confidential Exhibit 3z to File No. SR–OCC–2021–802, and the Business Continuity Procedure, which OCC has provided as confidential Exhibit 3aa to File No. SR– OCC–2021–802. 69 OCC E:\FR\FM\02NON1.SGM 02NON1 jspears on DSK121TN23PROD with NOTICES1 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices accessible, adhered to, and timely.70 The enterprise security program encompasses all OCC assets existing in OCC offices, data centers, and within the Cloud Provider’s Cloud Infrastructure, and IAM controls ensure least-privileged user access to applications on the Cloud. OCC has appropriate controls in place to ensure the security of confidential information in-transit between OCC data centers and the Cloud Infrastructure, between systems within the Cloud Infrastructure, and at-rest. All network communications between OCC and the Cloud will rely on industry standard encryption for traffic while in transit, and data at rest will be safeguarded through pervasive encryption. Finally, automated delivery of business and security capability via the use of the ‘‘Infrastructure as Code,’’ Cloud agnostic tools, and continuous integration/ continuous deployment pipeline methods ensure security controls are consistently and transparently deployed. Since additional computing power can be launched on demand, the scalability in a Cloud computing environment is considerable and instantaneous. OCC could provision or de-provision Compute, Storage, and Network resources to meet demand at any given point in time. In the current on-premises environment, immediate scalability is limited by the capacity of the on-premises hardware: OCC would need to obtain additional physical servers and network equipment to scale beyond the limits of the on-premises hardware, potentially affecting the ability to quickly adapt to evolving market conditions, including spikes in trading volume. Rule 17Ad–22(e)(21) requires OCC to establish, implement, maintain, and enforce written policies and procedures reasonably designed to ‘‘be efficient and effective in meeting the requirements of its participants and the markets it serves,’’ and to have OCC’s management regularly review the ‘‘efficiency and effectiveness of, [inter alia,] its (i) clearing and settlement arrangements and (ii) operating structure, including risk management policies, procedures, and systems.’’ 71 OCC maintains policies designed to enable the regular review of the efficiency and effectiveness of the arrangements and operating structures supporting OCC’s identified goals and 70 For example, vulnerability scanning, automated secrets management including certificate encryption, and incident triage management and handling process. 71 17 CFR 240.17Ad–22(e)(21). VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 objectives.72 There are several significant efficiency benefits to the Cloud Implementation, including: • Ad-hoc reporting capability with new filtering functionality and application programming interfaces to make it easier to procure and submit data to and from the system. • The capability to quickly add or remove Compute, Storage, or Network resources to meet changing application needs and market volatility. • The capability to (i) run certain back testing processes that used to take days to months in a few hours; (ii) manage multiple back testing processes the same time; and (iii) eliminate any undue delay in the evaluation of potential risk management enhancements for the industry. • The scalability to more efficiently meet historical data storage needs, provide data access through standard data services, and the ability to respond quickly to regulatory requests. • Easy and secure access to highquality, high-fidelity data, including a centralized, enterprise-wide repository to store and provide timely access to system of record data. Accordingly, the proposed changes: (i) Are designed to promote robust risk management; (ii) are consistent with promoting safety and soundness; and (iii) are consistent with reducing systemic risks and promoting the stability of the broader financial system. The proposed changes also ensure that OCC systems have a high degree of security, resiliency, operational reliability, and adequate, scalable capacity, and enable OCC to be efficient and effective in meeting the requirements of its participants and the markets it serves. For the foregoing reasons, OCC believes that the proposed changes are consistent with Section 805(b)(1) of the Clearing Supervision Act 73 and Rules 17Ad–22(e)(17) 74 and (e)(21) 75 under the Exchange Act. 72 OCC has separately submitted a request for confidential treatment to the Commission regarding the Annual Planning Policy, which OCC has provided as confidential Exhibit 3bb to File No. SR– OCC–2021–802, the Balanced Scorecard Procedure, which OCC has provided as confidential Exhibit 3cc to File No. SR–OCC–2021–802, the Enterprise Portfolio Management Procedure, which OCC has provided as confidential Exhibit 3dd to File No. SR–OCC–2021–802, the New Business and New Exchange Procedure, which OCC has provided as confidential Exhibit 3ee to File No. SR–OCC–2021– 802, and the New Product Procedure, which OCC has provided as confidential Exhibit 3ff to File No. SR–OCC–2021–802. 73 12 U.S.C. 5464(b). 74 17 CFR 240.17Ad–22(e)(17). 75 17 CFR 240.17Ad–22(e)(21). PO 00000 Frm 00075 Fmt 4703 Sfmt 4703 60515 III. Date of Effectiveness of the Advance Notice The proposed change may be implemented if the Commission does not object to the proposed change within 60 days of the later of (i) the date the proposed change was filed with the Commission or (ii) the date any additional information requested by the Commission is received.76 OCC shall not implement the proposed change if the Commission has any objection to the proposed change.77 OCC shall post notice on its website of proposed changes that are implemented. The proposal shall not take effect until all regulatory actions required with respect to the proposal are completed. IV. Solicitation of Comments Interested persons are invited to submit written data, views, and arguments concerning the foregoing, including whether the advance notice is consistent with the Clearing Supervision Act. Comments may be submitted by any of the following methods: Electronic Comments • Use the Commission’s internet comment form (https://www.sec.gov/ rules/sro.shtml); or • Send an email to rule-comments@ sec.gov. Please include File Number SR– OCC–2021–802 on the subject line. Paper Comments • Send paper comments in triplicate to Secretary, Securities and Exchange Commission, 100 F Street NE, Washington, DC 20549. All submissions should refer to File Number SR–OCC–2021–802. This file number should be included on the subject line if email is used. To help the Commission process and review your comments more efficiently, please use only one method. The Commission will post all comments on the Commission’s internet website (https://www.sec.gov/ rules/sro.shtml). Copies of the submission, all subsequent amendments, all written statements with respect to the advance notice that are filed with the Commission, and all written communications relating to the advance notice between the Commission and any person, other than those that may be withheld from the public in accordance with the provisions of 5 U.S.C. 552, will be available for website viewing and printing in the Commission’s Public Reference Room, 100 F Street NE, 76 12 77 12 E:\FR\FM\02NON1.SGM U.S.C. 5465(e)(1)(G). U.S.C. 5465(e)(1)(F). 02NON1 60516 Federal Register / Vol. 86, No. 209 / Tuesday, November 2, 2021 / Notices Washington, DC 20549 on official business days between the hours of 10:00 a.m. and 3:00 p.m. Copies of the filing also will be available for inspection and copying at the principal office of the self-regulatory organization. All comments received will be posted without change. Persons submitting comments are cautioned that we do not redact or edit personal identifying information from comment submissions. You should submit only information that you wish to make available publicly. jspears on DSK121TN23PROD with NOTICES1 V. Date of Timing for Commission Action Section 806(e)(1)(G) of the Clearing Supervision Act provides that OCC may implement the changes if it has not received an objection to the proposed changes within 60 days of the later of (i) the date that the Commission receives the Advance Notice or (ii) the date that any additional information requested by the Commission is received,78 unless extended as described below. Pursuant to Section 806(e)(1)(H) of the Clearing Supervision Act, the Commission may extend the review period of an advance notice for an additional 60 days, if the changes proposed in the advance notice raise novel or complex issues, subject to the Commission providing the clearing agency with prompt written notice of the extension.79 Here, as the Commission has not requested any additional information, the date that is 60 days after OCC filed the Advance Notice with the Commission is December 7, 2021. However, the Commission finds the issues raised by the Advance Notice complex because OCC proposes to migrate its clearing, risk management, and data management applications to a cloud infrastructure with an on-demand network of configurable information technology resources running on virtual infrastructure hosted by a third party. The Commission also finds the issues raised by the Advance Notice novel because the proposed migration of a covered clearing agency’s clearing, risk management, and data management applications to a third-party-hosted cloud infrastructure represents a novel circumstance in the U.S. markets that would require careful scrutiny and consideration of its associated risks. Therefore, the Commission finds it appropriate to extend the review period of the Advance Notice for an additional 78 12 79 12 U.S.C. 5465(e)(1)(G). U.S.C. 5465(e)(1)(H). VerDate Sep<11>2014 17:42 Nov 01, 2021 Jkt 256001 60 days under Section 806(e)(1)(H) of the Clearing Supervision Act.80 Accordingly, the Commission, pursuant to Section 806(e)(1)(H) of the Clearing Supervision Act,81 extends the review period for an additional 60 days so that the Commission shall have until February 5, 2022 to issue an objection or non-objection to advance notice SR– OCC–2021–802. All submissions should refer to File Number SR–OCC–2021–802 and should be submitted on or before November 23, 2021. For the Commission, by the Division of Trading and Markets, pursuant to delegated authority.82 J. Matthew DeLesDernier, Assistant Secretary. [FR Doc. 2021–23816 Filed 11–1–21; 8:45 am] BILLING CODE 8011–01–P SECURITIES AND EXCHANGE COMMISSION [Release No. 34–93434; File No. SR– NYSEArca–2021–65] Self-Regulatory Organizations; NYSE Arca, Inc.; Order Instituting Proceedings To Determine Whether To Approve or Disapprove a Proposed Rule Change To List and Trade Shares of the Sprott ESG Gold ETF Under NYSE Arca Rule 8.201–E (CommodityBased Trust Shares) October 27, 2021. I. Introduction On July 19, 2021, NYSE Arca, Inc. (‘‘NYSE Arca’’ or ‘‘Exchange’’) filed with the Securities and Exchange Commission (‘‘Commission’’), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (‘‘Act’’ or ‘‘Exchange Act’’) 1 and Rule 19b–4 thereunder,2 a proposed rule change to list and trade shares (‘‘Shares’’) of the Sprott ESG Gold ETF (‘‘Trust’’) under NYSE Arca Rule 8.201–E (‘‘CommodityBased Trust Shares’’). The proposed rule change was published for comment in the Federal Register on July 30, 2021.3 On September 2, 2021, pursuant to Section 19(b)(2) of the Act,4 the Commission designated a longer period within which to approve the proposed rule change, disapprove the proposed rule change, or institute proceedings to 80 Id. 81 Id. 82 17 CFR 200.30–3(a)(91). U.S.C. 78s(b)(1). 2 17 CFR 240.19b–4. 3 See Securities Exchange Act Release No. 92506 (July 26, 2021), 86 FR 41109. 4 15 U.S.C. 78s(b)(2). 1 15 PO 00000 Frm 00076 Fmt 4703 Sfmt 4703 determine whether to approve or disapprove the proposed rule change.5 The Commission has received no comments on the proposed rule change. The Commission is publishing this order to institute proceedings pursuant to Section 19(b)(2)(B) of the Act 6 to determine whether to approve or disapprove the proposed rule change. II. Description of the Proposed Rule Change 7 The Exchange proposes to list and trade Shares of the Trust 8 under NYSE Arca Rule 8.201–E, which governs the listing and trading of Commodity-Based Trust Shares 9 on the Exchange. The Sponsor of the Trust is Sprott Asset Management LP, a Canadian limited partnership (‘‘Sponsor’’). The Bank of New York Mellon serves as the Trust’s administrator (‘‘Administrator’’) and transfer agent (‘‘Transfer Agent’’). The Delaware Trust Company is the trustee of the Trust (‘‘Trustee’’).10 The Royal Canadian Mint is the custodian of the Trust’s gold (‘‘Gold Custodian’’ or ‘‘Mint’’).11 The Bank of New York 5 See Securities Exchange Act Release No. 92867, 86 FR 50568 (September 9, 2021). The Commission designated October 28, 2021, as the date by which the Commission shall approve or disapprove, or institute proceedings to determine whether to approve or disapprove, the proposed rule change. 6 15 U.S.C. 78s(b)(2)(B). 7 Additional information regarding the Trust and the Shares, including investment strategies, creation and redemption procedures, and portfolio holdings can be found in the Notice, supra note 3. 8 On February 11, 2021, the Trust submitted to the Commission on a confidential basis its draft registration statement on Form S–1 under the Securities Act of 1933, and on July 1, 2021, the Trust submitted to the Commission the most recent amendment to its draft registration statement (collectively, the ‘‘Registration Statement’’). The Registration Statement is not yet effective, and the Exchange will not commence trading in Shares until the Registration Statement becomes effective. 9 Commodity-Based Trust Shares are securities issued by a trust that represent investors’ discrete identifiable and undivided beneficial ownership interest in the commodities deposited into the Trust. The Exchange represents that the Shares will satisfy the requirements of NYSE Arca Rule 8.201– E and thereby qualify for listing on the Exchange and that the Trust relies on the exemption contained in Rule 10A–3(c)(7) regarding the application of Rule 10A–3 (17 CFR 240.10A–3) under the Act. 10 The Trustee is a fiduciary under the Trust Agreement and must satisfy the requirements of Section 3807 of the Delaware Statutory Trust Act. However, the fiduciary duties, responsibilities and liabilities of the Trustee are limited by, and are only those specifically set forth in, the Trust Agreement. The Trust does not have a Board of Directors or persons acting in a similar capacity. 11 The Mint operates pursuant to the Royal Canadian Mint Act (Canada) and is a Canadian Crown corporation. Crown corporations are corporations wholly-owned by the Government of Canada. The Mint is, for all its purposes, an agent of Her Majesty in right of Canada and, as such, its obligations generally constitute unconditional obligations of the Government of Canada. The Gold Custodian is responsible for safekeeping the gold E:\FR\FM\02NON1.SGM 02NON1

Agencies

[Federal Register Volume 86, Number 209 (Tuesday, November 2, 2021)]
[Notices]
[Pages 60503-60516]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2021-23816]


-----------------------------------------------------------------------

SECURITIES AND EXCHANGE COMMISSION

[Release No. 34-93433; File No. SR-OCC-2021-802]


Self-Regulatory Organizations; The Options Clearing Corporation; 
Notice of Filing and Extension of Review Period of Advance Notice 
Relating to OCC's Adoption of Cloud Infrastructure for New Clearing, 
Risk Management, and Data Management Applications

October 27, 2021.
    Pursuant to Section 806(e)(1) of Title VIII of the Dodd-Frank Wall 
Street Reform and Consumer Protection Act, entitled Payment, Clearing 
and

[[Page 60504]]

Settlement Supervision Act of 2010 (``Clearing Supervision Act'') \1\ 
and Rule 19b-4(n)(1)(i) \2\ under the Securities Exchange Act of 1934 
(``Exchange Act'' or ``Act''),\3\ notice is hereby given that on 
October 8, 2021, the Options Clearing Corporation (``OCC'') filed with 
the Securities and Exchange Commission (``SEC'' or ``Commission'') an 
advance notice as described in Items I, II and III below, which Items 
have been prepared primarily by OCC. The Commission is publishing this 
notice to solicit comments on the advance notice from interested 
persons and to extend the review period of the advance notice.
---------------------------------------------------------------------------

    \1\ 12 U.S.C. 5465(e)(1).
    \2\ 17 CFR 240.19b-4(n)(1)(i).
    \3\ 15 U.S.C. 78a et seq.
---------------------------------------------------------------------------

I. Clearing Agency's Statement of the Terms of Substance of the Advance 
Notice

    This advance notice is submitted in connection with a proposed 
adoption of Cloud infrastructure for OCC's new clearing, risk 
management, and data management applications with an on-demand network 
of configurable information technology resources running on virtual 
infrastructure hosted by a third party. The proposed changes are 
described in detail in Item II below. All terms with initial 
capitalization not defined herein have the same meaning as set forth in 
OCC's By-Laws and Rules.\4\
---------------------------------------------------------------------------

    \4\ OCC's By-Laws and Rules can be found on OCC's public 
website: https://www.theocc.com/Company-Information/Documents-and-Archives/By-Laws-and-Rules.
---------------------------------------------------------------------------

II. Clearing Agency's Statement of the Purpose of, and Statutory Basis 
for, the Advance Notice

    In its filing with the Commission, OCC included statements 
concerning the purpose of and basis for the advance notice and 
discussed any comments it received on the advance notice. The text of 
these statements may be examined at the places specified in Item IV 
below. OCC has prepared summaries, set forth in sections A and B below, 
of the most significant aspects of these statements.

(A) Clearing Agency's Statement on Comments on the Advance Notice 
Received From Members, Participants or Others

    Written comments were not and are not intended to be solicited with 
respect to the advance notice and none have been received. OCC will 
notify the Commission of any written comments received by OCC.

(B) Advance Notices Filed Pursuant to Section 806(e) of the Payment, 
Clearing, and Settlement Supervision Act

Description of the Proposed Change
    OCC is proposing to adopt an on-demand network of configurable 
information technology resources running on infrastructure (``Cloud'' 
or ``Cloud Infrastructure'') hosted by a third party (``Cloud Service 
Provider'' or ``CSP'') to support OCC's new core clearing, risk 
management, and data management applications. OCC will provision 
logically isolated sections of the Cloud Infrastructure that will 
provide it with the virtual equivalent of physical data center 
resources (``Virtual Private Cloud''),\5\ including scalable resources 
that: (i) Handle various computationally intensive applications with 
load-balancing and resource management (``Compute''); (ii) provide 
configurable storage (``Storage''); and (iii) host network resources 
and services (``Network''). Additionally, OCC will maintain an on-
premises data center to enable OCC to support core clearing, risk 
management, and data management applications in the event of a multi-
region outage of Compute, Storage, and Network services impacting OCC 
operations at the CSP.
---------------------------------------------------------------------------

    \5\ The Virtual Private Cloud is the virtual equivalent of a 
traditional data center, albeit with the scalability benefits of the 
CSP's infrastructure. The Virtual Private Cloud will provide OCC 
with a dedicated and secure space within the Cloud for OCC to 
operate.
---------------------------------------------------------------------------

Background
    ENCORE, consisting of OCC's core clearing, risk management, and 
data management applications running in traditional data centers, was 
launched in 2000 and has operated as OCC's real-time processing engine 
receiving trade and post-trade data from a variety of sources on a 
transaction-by-transaction basis, maintaining clearing member 
positions, calculating margin and clearing fund requirements, and 
providing reporting to OCC staff, regulators, and clearing members. Two 
geographically diverse on-premises data centers located in Illinois and 
Texas house the Compute, Storage, and Network resources required to run 
all of these applications.\6\
---------------------------------------------------------------------------

    \6\ OCC is not proposing changes to these services in connection 
with this Advance Notice. As appropriate, OCC will file proposals 
related to processing enhancements contemplated by the new core 
clearing, risk management, and data management applications 
separately. See, e.g., Securities Exchange Act Release No. 88654 
(Apr. 15, 2020), 85 FR 22197, 98 n.7 (Apr. 21, 2020) (File No. SR-
OCC-2020-004) (stating that a proposed rule change was designed to 
help facilitate the ability to run OCC's current clearing system, 
known as ENCORE, in parallel with a new clearing system on which OCC 
is working).
---------------------------------------------------------------------------

    As the platform running OCC's core applications for approximately 
twenty years, ENCORE has accommodated growth in average daily 
transaction volumes \7\ and OCC has managed periods of extreme market 
volatility and stress, including during the 2007-2008 financial crisis 
and the COVID-19 global pandemic of 2020-21, without incident. 
Nevertheless, as ENCORE was designed to operate in traditional on-
premises data centers that require the acquisition and installation of 
additional hardware and systems software to accommodate scaled 
resources or new applications, the resiliency and scalability of the 
current infrastructure is less flexible than that offered by Cloud 
Infrastructure. OCC's objective is the retirement of ENCORE and its 
replacement with a resilient solution that meets market participants' 
needs and the regulatory expectations of a systemically important 
financial market utility (``SIFMU''). Given advances in Cloud 
technology and information security since 2000, OCC's proposed adoption 
of Cloud Infrastructure will offer more resiliency, security, and 
scalability.
---------------------------------------------------------------------------

    \7\ As of September 30, 2021, approximately 38,846,212 contracts 
per day were processed through the clearing and risk applications on 
ENCORE, an increase of over 34.6% of daily contract volume for the 
same date of the prior year, which itself represented approximately 
a 50% increase of daily contract volume from the prior year.
---------------------------------------------------------------------------

Proposed Changes
    Proposed Cloud Infrastructure. Cloud implementation will enable OCC 
to leverage the Compute, Storage, and Network capabilities of a CSP, 
supplemented with compatible third-party vendor solutions, to maintain 
a modular architecture with delineated domains that will result in (i) 
improved resiliency, (ii) enhanced security, and (iii) increased 
scalability for OCC's new core clearing, risk management, and data 
management applications.\8\ Additionally, OCC will maintain an on-
premises data center to support core clearing, risk management, and 
data management services in the event of a multi-region outage at the 
CSP that impacts OCC operations.
---------------------------------------------------------------------------

    \8\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding a diagram that depicts the 
future state architecture following conclusion of the proposed Cloud 
Implementation, which OCC has provided in confidential Exhibit 3a to 
File No. SR-OCC-2021-802.
---------------------------------------------------------------------------

i. Improved Resiliency
    As a SIFMU, OCC must ensure core applications on the Cloud 
Infrastructure have resiliency and recovery capabilities commensurate 
with OCC's

[[Page 60505]]

importance to the functioning of the US financial markets.\9\ As 
explained in more detail below, OCC believes the Cloud Implementation 
will enhance the resiliency of OCC's core clearing, risk management, 
and data management applications by virtue of OCC's architectural 
design decisions and the Cloud's built-in redundancy, guarantee of 
persistent availability, and disciplined approach to deployment of 
Cloud Infrastructure. In particular, the Cloud Implementation will 
enhance OCC's ability to withstand and recover from adverse conditions 
by provisioning redundant Compute, Storage, and Network resources in 
three zones in each of two autonomous and geographically diverse 
regions. This will afford OCC six levels of redundancy in the Cloud 
with a primary and secondary Virtual Private Cloud running in a hot/
warm configuration. The hot Virtual Private Cloud will be operational 
and accepting traffic, while the warm Virtual Private Cloud will 
simultaneously receive the same incoming data and receive replicated 
data from the hot Virtual Private Cloud with applications on stand-by. 
This solution significantly reduces operational complexity, mitigates 
the risk of human error, and provides resiliency and assured capacity. 
Finally, the on-premises data center will operate as a separate, 
logically isolated backup to the six levels of redundancy provided for 
in the Cloud--a backup to backups. The on-premises data center will 
also simultaneously receive incoming data and the replicated data from 
the CSP hosted Virtual Private Clouds. The on-premises data center is 
intended to be used only in the unlikely and extraordinary event that 
OCC completely loses access to the CSP.
---------------------------------------------------------------------------

    \9\ In this context, ``resiliency'' is the ``ability to 
anticipate, withstand, recover from, and adapt to adverse 
conditions, stresses, attacks, or compromises on systems that 
include cyber resources.'' Systems Security Engineering: Cyber 
Resiliency Considerations for Engineering of Trustworthy Secure 
Systems, Spec. Publ. NIST SP No. 800-160, vol. 2 (2018).
---------------------------------------------------------------------------

ii. Enhanced Security
    The physical and cyber security standards that OCC has designed to 
align with the National Institute of Standards and Technology 
(``NIST''), Cyber Security Framework (``CSF''), and Center for Internet 
Security (``CIS'') benchmarks will not change in the Cloud 
Infrastructure. OCC will add meaningful security capabilities and 
measures provided by the CSP and selected third-party tools to enhance 
the security of OCC's core clearing, risk management, and data 
management applications.\10\ Given the scope of their service, CSPs 
leverage economies of scale and offer infrastructure and services with 
specialized configuration, monitoring, prevention, detection, and 
response tools.\11\ Furthermore, unique Cloud-specific capabilities, 
such as services for provisioning credentials and end-to-end 
configuration change management and scanning, will provide OCC enhanced 
levels of protection not available in traditional on-premises 
solutions. Finally, the on-premises data center will be physically 
isolated from other on-premises networks, such as the development 
network, with consistent controls and equivalent security tools to that 
of the Virtual Private Clouds. Specific security-based risks are 
examined in more detail below.
---------------------------------------------------------------------------

    \10\ Examples of enhanced cloud security capabilities include 
automated infrastructure deployment that is monitored for change, 
creating a standardized baseline; default separation between SCI and 
non-SCI operating domains; and automated and ubiquitous encryption.
    OCC has separately submitted a request for confidential 
treatment to the Commission regarding the Future State: CSP and On-
Premises Security Architecture, which OCC has provided in 
confidential Exhibit 3b to File No. SR-OCC-2021-802.
    \11\ For example, CSPs generally build infrastructure capable of 
withstanding Distributed Denial of Service (``DDoS'') attacks to far 
greater magnitudes than any one company can. In February 2020, one 
CSP stated that its infrastructure was targeted by and withstood a 
sustained DDoS attack of up to 2.3 terabytes per second.
---------------------------------------------------------------------------

iii. Increased Scalability
    The Cloud Implementation will allow for more scalability of 
Compute, Network, and Storage resources that support OCC's core 
clearing, risk management, and data management applications.\12\ With a 
Cloud Infrastructure, OCC can quickly provision or de-provision 
Compute, Storage, or Network resources to meet demands, including 
elevated trade volumes, and provide more flexibility to model and 
create development and test environments for back testing and stress 
testing, as well as other systems development needs. For example, the 
CSP can support elastic workloads and scale dynamically without the 
need for OCC to procure, test, and install additional servers or other 
hardware. This means that OCC may increase Compute capacity in one or 
both regions where it operates via manual or automated processes for 
core clearing, risk management, and data management applications. The 
rapid deployment of Compute capacity will allow OCC to obtain access to 
resources far more quickly than with existing physical data centers. 
The efficiency gains from the increased scalability of the Cloud 
Infrastructure will allow OCC to run certain back testing processes at 
a fraction of the time currently required. These and additional 
efficiency gains are discussed in more detail below.
---------------------------------------------------------------------------

    \12\ OCC will continue to follow existing policies and 
procedures regarding capacity planning and change management. OCC 
periodically performs capacity and availability planning analyses 
that result in capacity baselines and forecasts, as an input to 
technology delivery and strategic planning to ensure cost-
justifiable support of operational business needs. These analyses 
are based on the collection of performance data, trending, 
scenarios, and periodic high-volume capacity stress tests and 
include storage capacity for log and record retention. Results are 
reported to technology and security leadership as input to 
performance management and investment planning.
---------------------------------------------------------------------------

Implementation Timeframe
    OCC expects to launch the new core clearing, risk management, and 
data management applications into production no earlier than April 1, 
2024. The proposed timeline to launch includes several milestones, such 
as connectivity testing in the first quarter of 2023, external testing 
in the second quarter of 2023, and certification of readiness from 
clearing members and exchanges in the first quarter of 2024. OCC will 
communicate frequently with stakeholders during this timeframe and will 
confirm the production implementation date of the proposed launch by 
Information Memorandum posted to its public website at least eight 
weeks prior to implementation.\13\
---------------------------------------------------------------------------

    \13\ See, ``Timeline to Launch,'' available at: https://www.theocc.com/Participant-Resources.
---------------------------------------------------------------------------

Anticipated Effect on and Management of Risk
Federal Financial Institutions Examination Council Cloud Computing 
Guidance
    On April 30, 2020, the Federal Financial Institutions Examination 
Council (``FFIEC'') \14\ issued a joint statement to address the use of 
Cloud computing services and security risk management principles in the 
financial services sector (``FFIEC Guidance'').\15\ While the FFIEC 
Guidance does not contain regulatory obligations, it highlights risk 
management practices that financial institutions should adopt for the 
safe and sound use of Cloud computing services in five broad areas

[[Page 60506]]

(``FFIEC Risk Management Categories''). As discussed in the next 
section, the OCC is implementing practices for its proposed Cloud 
deployment consistent with this guidance.
---------------------------------------------------------------------------

    \14\ The Council is a formal interagency body empowered to 
prescribe uniform principles, standards, and report forms for the 
federal examination of financial institutions by the Board of 
Governors of the Federal Reserve System, the Federal Deposit 
Insurance Corporation, the National Credit Union Administration, the 
Office of the Comptroller of the Currency, and the Consumer 
Financial Protection Bureau, and to make recommendations to promote 
uniformity in the supervision of financial institutions.
    \15\ Available at: https://www.ffiec.gov/press/pr043020.htm.
---------------------------------------------------------------------------

     Governance: Strategies for using Cloud computing services 
as part of the financial institution's information technology strategic 
plan and architecture.
     Cloud Security Management: (i) Appropriate due diligence 
and ongoing oversight and monitoring of CSP's security; (ii) 
contractual responsibilities, capabilities, and restrictions for the 
financial institution and CSP; (iii) inventory process for systems and 
information assets residing in the Cloud; (iv) security configuration, 
provisioning, logging, and monitoring; (v) identity and access 
management (``IAM'') and network controls; (vi) security controls for 
sensitive data; and (vii) information security awareness and training 
programs.
     Change Management: (i) Change management and software 
development lifecycle processes and (ii) security and reliability of 
microservice \16\ architecture.
---------------------------------------------------------------------------

    \16\ OCC's use of microservices include specialized third-party 
applications and a set of containers that work together to compose 
an application. A container 'holds' both an application and all the 
elements the application needs to run properly, including system 
libraries, system settings, and other dependencies. See Application 
Container Security Guide, NIST SP 800-190.
---------------------------------------------------------------------------

     Resiliency and Recovery: (i) Business resiliency and 
recovery capabilities and (ii) incident response capabilities.
     Audit and Controls Assessment: (i) Regular testing of 
financial institution controls for critical systems; (ii) oversight and 
monitoring of CSP-managed controls; and (iii) oversight and monitoring 
of controls unique to Cloud computing services, including those related 
to (a) management of the virtual infrastructure; (b) use of containers 
in the Cloud Infrastructure; (c) use of managed security services for 
the Cloud Infrastructure; (d) consideration of interoperability and 
portability of data and services; and (e) data destruction or 
sanitization.
Governance
    OCC's ongoing Cloud Implementation is a natural progression of its 
information technology strategy and aligns seamlessly with its overall 
corporate strategy. OCC's information technology strategy fully 
supports OCC's corporate strategy to: (i) Reinforce OCC's foundational 
capabilities and deliver effective and efficient services; (ii) deliver 
product and service enhancements that enable growth in OCC's core 
capabilities and provide capital efficiencies to market participants; 
and (iii) demonstrate thought leadership in the delivery of innovative 
solutions that provide long-term value and efficiencies for OCC and its 
stakeholders. The corporate strategy is fortified by six guiding 
principles: (i) Operating solutions that deliver reliability, 
predictability, and integrity; (ii) designing efficiency into OCC 
processes through automation and near-frictionless capabilities; (iii) 
providing outcome-focused solutions; (iv) prioritizing collaboration 
and accountability within the information technology team; (v) ensuring 
protection for OCC, its clearing members, and the broader financial 
market; and (vi) incorporating a ``continuous learning'' mindset.
    As a SIFMU and the only provider of clearance and settlement 
services for listed options in the US, it is vital that OCC's critical 
services remain continuously available with sufficient security 
measures in place to detect and defend against possible security 
threats. The Cloud Implementation will present OCC with an agile 
operating environment that can scale throughput to match workloads 
nearly instantaneously and that will enable OCC to build a ``secure by 
design'' pervasive security methodology that incorporates the NIST 
Cybersecurity Framework's functions, categories, and subcategories as a 
roadmap for Cloud security. Movement to an agile, Cloud-based operating 
environment further reinforces OCC's commitment to building in a 
comprehensive and adaptable risk-based security methodology instead of 
a traditional perimeter-centric model.
    OCC's Cloud Implementation does not alter OCC's responsibility to 
maintain compliance with applicable regulations. Consistent with FFIEC 
Guidance, OCC's plan for Cloud Implementation supports OCC's ability to 
comply with the SEC's Regulation Systems, Compliance, and Integrity 
(``Reg SCI'') \17\ and the CFTC's Systems Safeguards.\18\ Reg SCI 
imposes certain information security and incident reporting standards 
on OCC and requires OCC to adopt an information technology governance 
framework reasonably designed to ensure that ``SCI systems,'' and for 
purpose of security, ``indirect SCI systems,'' have adequate levels of 
capacity, integrity, resiliency, availability, and security.\19\ As the 
``SCI Entity,'' OCC remains solely responsible for meeting all 
Regulation SCI obligations.\20\ Similarly, Systems Safeguards requires 
OCC to have cybersecurity programs with risk analysis and oversight 
that ensure automated systems are secure, reasonably reliable, and have 
adequate scalable capacity. Within its agreement with the CSP (``Cloud 
Agreement''), OCC has established obligations on the CSP to provide 
support for OCC's compliance with all applicable regulations.\21\
---------------------------------------------------------------------------

    \17\ 17 CFR 242.1000 et seq.
    \18\ 17 CFR 39.18 et seq.
    \19\ See 17 CFR 242.1001(a). SCI Systems are ``all computer, 
network, electronic, technical, automated, or similar systems of, or 
operated by or on behalf of, an SCI entity that, with respect to 
securities, directly support trading, clearance and settlement, 
order routing, market data, market regulation, or market 
surveillance.'' Indirect SCI Systems are ``systems of, or operated 
by or on behalf of, an SCI entity that, if breached, would be 
reasonably likely to pose a security threat to SCI systems.''
    \20\ References herein to ``Shared Responsibility'' conveys the 
responsibility of OCC and the CSP vis-[agrave]-vis each other from a 
business operations perspective and it not intended to suggest the 
CSP has taken on, or that OCC has relinquished, any of OCC's Reg SCI 
compliance requirements.
    \21\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding the Cloud Agreement. OCC has 
provided these documents in confidential Exhibit 3c to File No. SR-
OCC-2021-802, confidential Exhibit 3d to File No. SR-OCC-2021-802, 
confidential Exhibit 3e to File No. SR-OCC-2021-802, and 
confidential Exhibit 3f to File No. SR-OCC-2021-802. Among other 
things, the Cloud Agreement sets forth the CSP's responsibility to 
maintain the hardware, software, networking, and facilities that run 
the Cloud services. See also the separately submitted Table of Reg 
SCI Provisions, confidential Exhibit 3g to File No. SR-OCC-2021-802 
that provides a summary of the terms and conditions of the Cloud 
Agreement that OCC believes enables OCC to comply with Reg SCI.
---------------------------------------------------------------------------

    OCC believes the combination of the following provides OCC 
reasonable assurance that the proposed Cloud Implementation would 
enable OCC to continue to fully satisfy its Regulation SCI obligations: 
(i) The Cloud Agreement; (ii) CSP's compliance programs as described in 
its Whitepapers \22\ and publicly available policies (e.g., its 
Penetration Testing Policy), user guides, and other documents; (iii) 
CSP's Service Level Agreements; (iv) CSP's Systems Organization 
Controls reports (e.g., SOC 1, SOC 2, SOC 3) and ISO certifications 
(e.g., ISO 27001); (v) CSP's size, scale, and ability to deploy 
extensive resources to protect and secure its

[[Page 60507]]

facilities and services; \23\ and (vi) CSP's commercial incentive to 
perform.
---------------------------------------------------------------------------

    \22\ OCC has separately submitted requests for confidential 
treatment to the Commission regarding two examples of CSP 
Whitepapers, which OCC has provided in confidential Exhibit 3h to 
File No. SR-OCC-2021-802 and confidential Exhibit 3i to File No. SR-
OCC-2021-802.
    \23\ The OCC has contracted to work with a top-tier CSP that 
provides Cloud hosting services to Fortune 500 companies and the 
U.S. Government, amongst many others.
---------------------------------------------------------------------------

    OCC and the CSP rely on the shared responsibility model, which 
differentiates between the security ``of'' the Cloud and security 
``in'' the Cloud.\24\ The CSP maintains sole responsibility and control 
over the security ``of'' the Cloud, and their customers are responsible 
for the security ``in'' the Cloud; i.e., security of hosted 
applications and data. Thus, OCC remains responsible for managing and 
maintaining the operating system and all applications, including 
security and patching, running in the Cloud. There is no primary/
secondary relationship as each partner has a specific set of 
responsibilities which, when combined, address the entire risk space.
---------------------------------------------------------------------------

    \24\ References herein to ``Shared Responsibility'' conveys the 
responsibility of OCC and the CSP vis-[agrave]-vis each other from a 
business operations perspective and it not intended to suggest the 
CSP has taken on, or that OCC has relinquished, any of OCC's Reg SCI 
compliance requirements. See supra, footnote 20.
     OCC has separately submitted a request for confidential 
treatment to the Commission regarding a diagram that provides a 
summary of the ``shared responsibility'' model between OCC and the 
CSP, which OCC has provided in confidential Exhibit 3j to File No. 
SR-OCC-2021-802.
---------------------------------------------------------------------------

    The CSP performs its own risk and vulnerability assessments of the 
CSP infrastructure on which OCC will run its core clearing, risk 
management, and data management applications. In published 
documentation and in meetings conducted with members of CSP's staff, 
the CSP asserts that it maintains an industry-leading automated test 
system, with strong executive oversight, and conducts full-scope 
assessments of its hardware, infrastructure, internal threats, and 
application software. The CSP asserts that it has an aggressive program 
for conducting internal adversarial assessments (Red Team) designed not 
only to evaluate system security but also the processes used to monitor 
and defend its infrastructure. The CSP also uses external, third-party 
assessments as a cross-check against its own results and to ensure that 
testing is conducted in an independent fashion. Per the CSP's 
documentation, results of these processes are reviewed weekly by the 
CSP CISO and the CEO with senior CSP leaders to discuss security and 
action plans.\25\
---------------------------------------------------------------------------

    \25\ The CSP does not provide assessment results to its 
customers, as doing so would constitute a breach of generally 
accepted security best practices. Instead, the CSP provides its 
customers with industry-standard reports--such as SOC2 Type II--
prepared by an independent third-party auditor to provide relevant 
contextual information to its customers. The CSP also conducts 
periodic audit meetings specifically designed to discuss security 
concerns with its customers discussed later during the ``CSP Audit 
Symposium.''
---------------------------------------------------------------------------

    OCC has the responsibility to perform risk assessments and 
technical security testing, including control validation, penetration 
testing, and adversarial testing, of OCC applications running on the 
CSP. This includes testing of the application interface layer of some 
CSP provided services such as storage and key management. OCC's 
security testing model will remain as it is for the on-premises 
operations: The Security Engineering team will define security control 
requirements and validate their correct implementation on OCC systems 
and deployed core clearing, risk management, and data management 
applications; automated tools will be used to scan OCC application code 
and open source for security defects during the development process; 
and automated vulnerability management tools will conduct periodic 
scans of deployed software and devices to ensure that security patches 
and fixes are correctly implemented within required timelines.
    As mentioned, OCC's testing includes assessing the configuration of 
CSP provided services: Security Services will work with Information 
Technology staff to ensure that CSP tools are configured to 
appropriately manage and mitigate potential sources of risk and will 
assess the effectiveness of those configurations. The OCC Red Team will 
operate freely ``in the Cloud,'' attempting to subvert or circumvent 
controls; their testing will include probing of CSP provided services 
to look for weaknesses in OCC's deployment of those tools.
    Security Services will routinely report test results to Enterprise 
Risk Management, appropriate functional Operations and Information 
Technology management, senior management, and the Board of Directors. 
Automated vulnerability scanning reports, source code analysis, and 
results of specific assessments will be risk-rated and assigned a 
priority for remediation in accordance with OCC policy.
    Management and oversight of the Cloud Implementation follows 
standard governing principles for large information technology 
projects. OCC's Board of Directors has established a Technology 
Committee to assist the Board of Directors in overseeing OCC's 
information technology strategy and other company-wide operational 
capabilities. The Risk and Technology Committees are responsible for 
different aspects of the oversight of the Cloud Implementation. 
Information Technology and Security Services, in collaboration with 
Enterprise Risk Management, are responsible for the identification, 
management, monitoring, and reporting on the risks associated with the 
Cloud Implementation. To that end, management presents the Technology 
Committee (with copies to the Risk Committee and the Board of 
Directors) with reports on the status and progress of the Cloud 
Implementation on at least a quarterly basis. This report includes an 
overall risk and issue summary and an analysis of key risk indicators 
for the Cloud Implementation.\26\ Finally, OCC's Internal Audit 
Department is responsible for auditing security controls and 
configurations, including those related to the Cloud, prior to OCC's 
planned Cloud Implementation. Starting in 2021 and going forward, the 
Internal Audit Annual Plan is designed to assess important elements of 
the new core clearing, risk management, and data management application 
roll-out. For example, the 2021 Audit Plan includes an audit on the 
Cloud Implementation. These audits will help assess OCC's readiness for 
the Cloud Implementation as discussed below, in ``Audit and Controls 
Assessment.''
---------------------------------------------------------------------------

    \26\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding an example of this Cloud 
Implementation risk report, which OCC has provided in confidential 
Exhibit 3k to File No. SR-OCC-2021-802.
    OCC has also submitted a request for confidential treatment to 
the Commission regarding Risk Appetite Statements and Risk 
Tolerances for Cloud Services, which OCC has provided in 
confidential Exhibit 3l to File No. SR-OCC-2021-802.
---------------------------------------------------------------------------

Cloud Security Management
    OCC has established a robust Cloud security program to both: (i) 
Manage the security of the core clearing, risk management, and data 
management applications that will be running on the Cloud 
Infrastructure hosted by the CSP, and (ii) assess and monitor the CSP 
management of security of the Cloud Infrastructure that it operates. 
The security program is designed to encompass all OCC assets existing 
in OCC offices, data centers, and within the CSP's Cloud 
Infrastructure. The security program is built upon enterprise security 
standards that establish requirements that apply to any technology 
system as well as any tool that provides technology services. The 
following paragraphs in this section describe elements of OCC's Cloud 
security management in the areas of: (i) Network and IAM controls 
(e.g., determining who is accessing the systems, granting access to the

[[Page 60508]]

applications, and then controlling what information they can access); 
(ii) security governance and controls for sensitive data; (iii) 
security configuration, provisioning, logging, and monitoring; and (iv) 
security testing.
i. Network and IAM Controls
    OCC recognizes that robust network security configuration and IAM 
will provide reasonable assurance that users--including OCC employees, 
market participants, and service accounts for systems \27\--are granted 
least-privileged access \28\ to the network, applications, and data. 
OCC will use third-party tools to automate appropriate role-based 
access to the core clearing, risk management, and data management 
applications running in the Cloud. By enforcing strict separation of 
duties and least-privileged access for infrastructure, applications, 
and data, OCC will protect the confidentiality, availability, and 
integrity of the data.
---------------------------------------------------------------------------

    \27\ Service accounts are non-interactive accounts that permit 
application access to support activities such as monitoring, 
logging, or backup.
    \28\ Least-privileged access means users will have only the 
permissioning needed to perform their work, and no more.
---------------------------------------------------------------------------

    The maintenance of an on-premises backup data center necessitates 
additional network controls. The on-premises data center will be 
physically separate from networks supporting routine business 
functions, which will make the overall protection of the environment 
easier simply by eliminating connectivity other than for critical 
operations. OCC will explicitly provision all connectivity and will 
manage and mitigate risks through use of jump hosts that are heavily 
monitored (e.g., data feeds in and out, provisioned mechanisms for the 
delivery of the software, and a minimum management interface that 
requires multi-factor authentication for access). This connection 
model, coupled with limited access via dedicated private circuits, 
eliminates the most common threat exposures such as internet 
connectivity and email. The default physical separation defined in the 
on-premises backup architecture will be overlaid with industry standard 
monitoring and blocking tools to ensure that lateral movement between 
SCI and non-SCI environments is controlled in accordance with the risk.
    OCC has established IAM requirements that build upon the least-
privileged model. As part of the IAM program, all users must be 
assigned an appropriate enterprise identification. Users will be 
granted access to systems via a standardized and auditable approval 
process. The user identifications and granted access will be managed 
through their full lifecycle from a centralized IAM system maintained 
and administered by OCC. Role-, attribute-, and context-based access 
controls will be used as defined by internal standards consistent with 
industry recommended practices to promote the principles of least-
privileged access and separation of duties.
    OCC will use and manage third party tools not otherwise provided by 
nor managed by the CSP for single sign-on and least-privileged access. 
The network will also include hardware and software to limit and 
monitor ingress and egress traffic, encrypt data in transmission, and 
isolate traffic between OCC and the Virtual Private Cloud. Since OCC 
will continue to provide cryptographic services, including key 
management, the CSP and other network service providers will not be 
able to decrypt OCC data either at rest or while in transit.
ii. Security Governance and Controls for Sensitive Data
    OCC's data governance framework that applies to the Cloud 
Implementation is identified within the OCC Enterprise Security 
Standards.\29\ The Enterprise Security Standards address data moving 
between systems within the Cloud as well as data transiting and 
traversing both trusted and untrusted networks. For example, the 
Enterprise Security Standards require a system or Software as a 
Solution to: (i) Store data and information, including all copies of 
data and information in the system, in the United States throughout its 
lifecycle; (ii) be able to retrieve and access the data and information 
throughout its lifecycle; (iii) for data in the system hosted in the 
Cloud, encrypt such data with key pairs kept and owned by OCC; (iv) 
comply with United States federal and applicable state data regulations 
regarding data location; and (v) enable secure disposition of non-
records in accordance with OCC's Information Governance Policy.\30\
---------------------------------------------------------------------------

    \29\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding the Enterprise Security 
Standards, which OCC has provided in confidential Exhibit 3m to File 
No. SR-OCC-2021-802. OCC security controls and standards are 
created, published, and managed in accordance with applicable OCC 
policies.
    \30\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding the Information Governance 
Policy, which OCC has provided as confidential Exhibit 3n to File 
No. SR-OCC-2021-802.
---------------------------------------------------------------------------

    Furthermore, OCC policies establish the overall data governance 
framework applied to the management, use, and governance of OCC 
information to include digital instantiations, storage media, or 
whether the information is located, processed, stored, or transmitted 
on OCC's information systems and networks, public, private, or hybrid 
Cloud infrastructures, third-party data centers and data repositories, 
or Software-as-a-Service (SaaS) applications.\31\ The Information 
Classification and Handling Policy classifies OCC's information into 
three categories. System owners of technology that enable 
classification and/or labeling of information are responsible for 
ensuring the correct classification level is designated in the system 
of record and the applicable controls are enforced. All information 
requiring disposal is required to be disposed of securely in accordance 
with all applicable procedures. Sensitive data must be handled in a 
manner consistent with requirements in the Information Classification 
and Handling Policy.
---------------------------------------------------------------------------

    \31\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding the Information Classification 
and Handling Policy, which OCC has provided in confidential Exhibit 
3o to File No. SR-OCC-2021-802.
---------------------------------------------------------------------------

    OCC will implement key components of a ``zero trust'' control 
environment, namely ubiquitous authentication and encryption via use of 
an automated public key infrastructure, coupled with responsive, highly 
available authentication, authorization tools, and key management 
strategies to ensure appropriate industry standard security controls 
are in place for sensitive data both in transit and at rest. External 
connectivity to OCC systems hosted by the CSP will be provided as it is 
now, through dedicated private circuits or over encrypted tunnels 
through the internet. These network links will also have additional 
security controls, including encryption during transmission and 
restrictions on network access to and from the Virtual Private Cloud. 
Additionally, OCC will use dedicated redundant private network 
connections between OCC data centers and the CSP infrastructure. OCC 
currently maintains two data centers and will do so in the future to 
provide redundant, geographically diverse connectivity for market 
participants. All network communications between OCC and the Cloud 
Infrastructure will rely on industry standard encryption for traffic 
while in transit. Data at rest will be safeguarded through pervasive 
encryption. OCC's Encryption Standards describe requirements for 
implementation of the minimum required strengths, encryption at rest,

[[Page 60509]]

and cryptographic algorithms approved for use in cryptographic 
technology deployments across OCC.\32\ All OCC identifying data is 
encrypted in transit using industry standard methods. The Key 
Management Service (``KMS'') Strategy dictates that all CSP endpoints 
support HTTPS for encrypting data in transit.\33\ OCC also secures 
connections to the endpoint service by using virtual private computer 
endpoints and ensures client applications are properly configured to 
ensure encapsulation between minimum and maximum Transport Layer 
Security (TLS) versions per OCC encryption standard. OCC will have 
exclusive control over the key management system; only OCC authorized 
users will be able to access that data. CSP systems and staff will not 
have access to the OCC certificate management and/or key management 
system.\34\ OCC is responsible for the application architecture, 
software, configuration and use of the CSP services, and for the 
maintenance of the environment, including ongoing monitoring of the 
application environment to achieve the appropriate security posture. To 
do this, OCC follows: (i) Existing security design and controls; (ii) 
Cloud-specific information security controls defined in ``Enterprise 
Security Controls;'' and (iii) regulatory compliance requirements 
detailed in sources or information technology practices that are widely 
available and issued by an authoritative body that is a U.S. 
governmental entity or agency including NIST-CSF, COBIT, and the FFIEC 
Guidelines.
---------------------------------------------------------------------------

    \32\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding the Encryption Standards, 
which OCC has provided in confidential Exhibit 3p to File No. SR-
OCC-2021-802.
    \33\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding OCC Key Management Service 
(KMS) Strategy, which OCC has provided in confidential Exhibit 3q to 
File No. SR-OCC-2021-802.
    \34\ Certificate management is the process of creating, 
monitoring, and handling digital keys (certificates) to encrypt 
communications.
---------------------------------------------------------------------------

    OCC uses third-party tools for CSP security compliance monitoring, 
security scanning, and reporting. Alerts and all API-level actions are 
gathered using both CSP provided and third-party monitoring tools. The 
CSP provided monitoring tool is enabled by default at the organization 
level to monitor all CSP services activity. Centralized logging 
provides near real-time analysis of events and contains information 
about all aspects of user and role management, detection of 
unauthorized, security relevant configuration changes, and inbound and 
outbound communication.
    As previously discussed, OCC uses a KMS Strategy to encrypt data in 
transit and at rest in the Cloud. KMS is designed so that no one, 
including CSP employees, can retrieve customer plaintext keys and use 
them. The Federal Information Processing Standards (``FIPS'') 140-2 
validated Host Security Modules (HSMs) in KMS protect the 
confidentiality and integrity of OCC customer keys.\35\ Customer 
plaintext keys are never written to disk and only ever used in 
protected, volatile memory of the HSMs for the time needed to perform 
the customer's requested cryptographic operation. KMS keys are never 
transmitted outside of the Cloud regions in which they were created. 
Updates to the KMS HSM firmware are controlled by quorum-based access 
control \36\ that is audited and reviewed by an independent group 
within the CSP. This tightly controlled deployment process minimizes 
the risk that the security properties of the service will be changed as 
new software, firmware, or hardware is introduced. With these security 
measures, only users granted access by OCC to the core clearing, risk 
management, or data management applications will be able to interact 
with the information contained therein.
---------------------------------------------------------------------------

    \35\ The HSM is analogous to a safe that only OCC has knowledge 
of the combination and the ability to access the keys to locks 
stored within.
    \36\ A quorum-based access mechanism requires multiple users to 
provide credentials over a fixed period in order to obtain access.
---------------------------------------------------------------------------

iii. Security Configuration, Provisioning, Logging, and Monitoring
    Automated delivery of business and security capability via the use 
of ``Infrastructure as Code'' and continuous integration/continuous 
deployment pipeline methods will permit security controls to be 
consistently and transparently deployed on-demand. OCC will provision 
Cloud Infrastructure using pre-established system configurations that 
are deployed through infrastructure as code, then scanned for 
compliance to secure baseline configuration standards. OCC also employs 
continuous configuration monitoring and periodic vulnerability 
scanning. OCC will continue to perform regular reviews and testing of 
OCC systems running on the Cloud while relying upon information 
provided by the CSP through the CSP's SOC2 and Audit Symposiums. 
Finally, configuration, security incident, and event monitoring will 
rely on a blend of CSP native and third-party solutions.
    OCC also plans to use tools offered by the CSP and third-parties to 
monitor the core clearing, risk management, and data management 
applications run on the Cloud Infrastructure. OCC will track metrics, 
monitor log files, set alarms, and have the ability to act on changes 
to OCC core clearing, risk management, and data management applications 
and the environment in which they operate.\37\ The CSP will provide a 
dashboard to reflect- general health (e.g., up/down status of a region) 
but will not give additional insights into performance of services and 
applications which run on those services. The OCC operated centralized 
logging system will provide for a single frame of reference for log 
aggregation, access, and workflow management by ingesting the CSP's 
logs coming from native detective tools and OCC instrumented controls 
for logging, monitoring, and vulnerability management. This 
instrumentation will give OCC a real-time view into the availability of 
Cloud services as well as the ability to track historical data. By 
using the enterprise monitoring tools OCC has in place, OCC will be 
able to integrate the availability and capacity management of Cloud 
into OCC's existing processes, whether hosted on the Cloud or running 
in the local on-premises backup, and respond to issues in a timely 
manner.
---------------------------------------------------------------------------

    \37\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding the Draft Cloud Provider 
Logging and Alerting Test Environment, which OCC has provided in 
confidential Exhibit 3r to File No. SR-OCC-2021-802.
---------------------------------------------------------------------------

    OCC will also use specialized third-party tools, as discussed 
above, to programmatically configure Cloud services and deploy security 
infrastructure. This automation of configuration and deployment will 
ensure Cloud services are repeatably and consistently configured 
securely and validated. Change detection tools providing event logs 
into the incident management system are also vital for reacting to and 
investigating unexpected changes to the environment.
    Security has implemented tools for the core clearing, risk 
management, and data management applications and back office 
environments that will be hosted at the CSP; notably, the IAM system, 
monitoring and Security Information and Event Management (``SIEM'') 
systems, the workflow system of record for incident handling, KMS, and 
enterprise Data Loss Prevention (``DLP''). Most of these services can 
also be run on-premises in a fully Cloud-independent mode, and Security 
Services has identified potential alternatives for those that will be 
needed for isolated on-premises operations and cannot operate

[[Page 60510]]

independently. All required technical controls deployed via or reliant 
on CSP services will be replaced or supplemented to ensure equivalent 
independent operation of the on-premises backup.\38\
---------------------------------------------------------------------------

    \38\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding the Key Technologies, which 
OCC has provided in confidential Exhibit 3s to File No. SR-OCC-2021-
802.
---------------------------------------------------------------------------

    Finally, the CSP prioritizes assurance programs and certifications, 
underscoring its ability to comply with financial services regulations 
and standards and to provide OCC with a secure Cloud 
Infrastructure.\39\
---------------------------------------------------------------------------

    \39\ The CSP has certifications for the following frameworks: 
NIST, Cloud Security Alliance, Control Objectives for Information 
and Related Technology (COBIT), International Organization for 
Standardization (ISO), and the Federal Information Security 
Management Act (FISMA).
---------------------------------------------------------------------------

iv. Security Testing and Verification by the 2nd and 3rd Line
    Security testing is integrated into business-as-usual processes as 
outlined in relevant policy and procedures. These documents define how 
testing is initiated, executed, and tracked.
    For new assets and application (or code) releases, Security 
determines whether and what type of security testing is required 
through a risk-based analysis. If required, testing is conducted prior 
to implementation and the different testing techniques are outlined 
below:
     Automated Security Testing: Using industry standard 
security testing tools and/or other security engineering techniques 
specifically configured for each test, Security will test to identify 
vulnerabilities and deliver payloads with the intent to break, change, 
or gain access to unauthorized areas within an application, data, or 
system.
     Manual Penetration Testing: Using information gathered 
from automated testing and/or other information sources, Security will 
manually test to identify vulnerabilities and deliver payloads with the 
intent to break, change, or gain access to the unauthorized area within 
an application or system.
     Blue Team Testing: The Blue Team identifies security 
threats and risks in the operating environment and analyzes the 
network, system, and SaaS environments and their current state of 
security readiness. Blue Team assessment results guide risk mitigation 
and remediation, validate the effectiveness of controls, and provide 
evidence to support authorization or approval decisions. Blue Team 
testing ensures that OCCs networks, systems, and SaaS solutions are as 
secure as possible before deploying to a production environment.
    The results of Security controls testing are risk-rated and managed 
to remediation via the Security Observation Risk Tracking process.
Change Management
    Consistent with FFIEC Guidance, OCC's use of the Cloud will have 
sufficient change management controls in place to effectively 
transition systems and information assets to the Cloud and will help 
ensure the security and reliability of microservices in the Cloud. 
OCC's enterprise software development lifecycle processes help ensure 
the same control environment for all OCC resources, irrespective of 
whether they reside in an on-premises environment or in the Cloud. OCC 
has established baselines for design inputs and control requirements 
and enforces workload isolation and segregation through a Virtual 
Private Cloud using existing Cloud native technical controls and added 
new tools. OCC also plans to use other specialized platform monitoring 
tools for logging, scanning of configuration, and systems process 
scanning. OCC also has oversight as a code owner for the OCC 
infrastructure security containers and will have final review and 
approval for related changes and code merges before deployment of 
secure containers into production. Finally, OCC will periodically 
conduct static code scanning and perform vulnerability scanning for 
external dependencies prior to deployment in production, along with 
manual penetration testing of the provided application code. In 
addition, OCC will perform routine scans of Compute resources with the 
existing enterprise scanning tools. Any identified vulnerabilities will 
be reviewed for severity, prioritized, and logged for remediation 
tracking in upcoming development releases.
    OCC will create a ``user acceptance plan'' prior to promoting code 
to production. This user acceptance plan will include tests of all 
major functions, processes, and interfacing systems, as well as 
security tests. Through acceptance tests, OCC users will be able to 
simulate complete application functionality of the live environment. 
The change will move to the next stage of the OCC delivery model only 
after satisfying the criteria for this phase.\40\
---------------------------------------------------------------------------

    \40\ The ``user acceptance plan'' represents only one aspect of 
the overall change management program at the OCC.
---------------------------------------------------------------------------

    OCC plans to use microservices in its use of the Cloud. OCC has 
internal projects that will address change management of the various 
microservices. In particular, OCC runs a suite of supporting services 
that enable building, running, scaling, and monitoring of OCC's 
business applications in the Cloud in an automated, resilient, and 
secure manner. The application platform relies on various CSP and 
third-party tools for different components, including Infrastructure as 
a Service, Infrastructure as Code, CI/CD, Container as a Service, 
Continuous Delivery, and Platform Monitoring. For example, OCC will use 
a third-party tool for managing containers and a different third-party 
tool for distributing containers and workloads to assist with platform 
automation. Security measures for planned production microservices are 
already incorporated within the overall security architecture and 
Enterprise Security Standards.\41\
---------------------------------------------------------------------------

    \41\ The minimal security control architecture reflects 
awareness of the need to consider data storage and management 
outside of containers, configuration management to prevent 
unintended container interactions, and routine monitoring and 
replacement of containers when appropriate.
---------------------------------------------------------------------------

    With respect to software development in the Cloud, OCC has 
established a closed Virtual Private Cloud non-production environment 
that allows OCC to develop, test, and integrate new capabilities, 
including those related to security enhancements, while preventing 
direct external access to the development environment and tightly 
controlling on-premises access from OCC to the non-production 
environment. This OCC Virtual Private Cloud non-production environment 
(hosted in the Cloud) focuses on the foundational security, operations, 
and infrastructure requirements with the intent to take lessons learned 
to implement into future production. OCC developed and maintains a 
Cloud Reference Architecture that defines necessary capabilities and 
controls required to securely host core clearing, risk management, and 
data management applications on the CSP. The minimum foundational 
security requirements are based on the NIST CSF and CIS benchmarks and 
include the design and implementation requirements of a secure Cloud 
account structure within a multi-region Cloud environment. OCC 
maintains enterprise security requirements that provide structure for 
current and future development. As the Virtual Private Cloud 
environment is further developed and expanded, there is a comprehensive 
process to identify any incremental risks and develop and

[[Page 60511]]

implement controls to manage and mitigate those risks.\42\
---------------------------------------------------------------------------

    \42\ OCC has separately submitted a request for confidential 
treatment to the Commission discussing the status of security 
projects which OCC has provided in confidential Exhibit 3t to File 
No. SR-OCC-2021-802.
---------------------------------------------------------------------------

Resiliency and Recovery
    As noted earlier, given OCC's role as a SIFMU, it is vital that OCC 
work to ensure operations moved to Cloud Infrastructure have 
appropriately robust resilience and recovery capabilities. Below is a 
discussion of how OCC has evaluated resiliency including: (i) The steps 
taken by OCC and the CSP to help ensure the persistent availability of 
Compute, Storage, and Network capabilities in the Cloud; (ii) the 
resiliency of the CSP's method for deploying updates to help ensure 
that consequences of incidents are limited to the fullest extent 
possible; (iii) the on-premises backup; and (iv) the use of ``store and 
forward'' \43\ messaging technology.
---------------------------------------------------------------------------

    \43\ ``Store and forward'' messaging refers to messaging 
technology that retains copies of messages until confirmation of 
receipt, thus limiting the likelihood of loss during transmission.
---------------------------------------------------------------------------

i. Resiliency of the Cloud Infrastructure
    OCC believes the Cloud Implementation will enhance the resiliency 
of OCC's core clearing, risk management, and data management 
applications by virtue of its built-in six levels of redundancy that 
will provide OCC with easy access to multiple zones within multiple and 
geographically diverse regions. The redundancy provided to OCC in the 
Cloud Infrastructure helps ensure that Compute, Storage, and Network 
resources will be available to OCC on a persistent basis.
    OCC will provision Compute, Storage, and Network resources in two 
autonomous and geographically diverse regions, in a hot/warm 
configuration to increase resources on demand, maintained by the CSP. 
Each region will maintain independent and identical copies of all 
applications that are deployed by OCC, allowing OCC to transition its 
core clearing, risk management, and data management applications from 
one region to another seamlessly. Production workloads would be run 
across and shifted between regions regularly to protect OCC against 
disruptions from regionalized incidents. In the unlikely event that a 
region is temporarily disabled as a result of an extreme event, OCC 
would failover to run core clearing, risk management, and data 
management applications in the other region. This will necessarily 
require that both regions be maintained with full and expansion 
capacity. At any point, OCC will have active primary and standby 
instances of the core clearing, risk management, and data management 
applications that can be moved to any of the six instances (i.e. three 
zones in each of the two regions). This is analogous to having six 
physical data centers with primary and backup running out of any two 
instances at a given point in time.
    Each region consists of three zones, each of which has a physical 
infrastructure with separate and dedicated connections to utility 
power, standalone backup power sources, independent mechanical 
services, and independent network connectivity. While not dependent on 
one another, zones are connected to one another with private fiber-
optic networking, enabling the architecture of core clearing, risk 
management, and data management applications to automatically failover 
between zones without interruption. Since each zone can operate 
independently of one another but failover capability is near 
instantaneous, a loss of one zone will not affect operation in another 
zone; however, no core clearing, risk management, or data management 
application will be reliant on the functioning of a single zone. This 
structural framework offers OCC a wide expanse within which to run its 
core clearing, risk management, and data management applications while 
simultaneously restricting the effect of an incident at the CSP to the 
smallest footprint possible.\44\
---------------------------------------------------------------------------

    \44\ To further ensure the resiliency of the Compute, Storage, 
and Network capabilities, the CSP's services are divided into ``data 
plane'' and ``control plane'' services. OCC's applications will run 
using data plane services; control plane services are used by the 
CSP to configure the environment. Resources and requests are further 
partitioned into cells, or multiple instantiations of a service that 
are isolated from each other and invisible to the CSP's customers, 
on each plane, again minimizing the effect of a potential incident 
to the smallest footprint possible.
---------------------------------------------------------------------------

    As core clearing, risk management, and data management applications 
will be deployed in a primary (hot)/secondary (warm) mode, each 
environment will be active, run the same software, and receive the same 
data, enabling a failover or switch from one region to another within 
two hours. Software and Infrastructure will be deployed via automated 
processes to ensure both are identical in each region.
    Additional capacity will always be available to support the 
resiliency of OCC's core clearing, risk management, and data management 
applications by way of the six-way redundancy. OCC will continue to 
periodically test the CSP's capacity scaling features and failover 
capabilities to ensure adequate capacity is always available to 
OCC.\45\
---------------------------------------------------------------------------

    \45\ OCC will continue to perform periodic business continuity 
and disaster recovery tests to verify business continuity plans and 
disaster recovery infrastructure will support a two-hour recovery 
time objective for critical systems.
---------------------------------------------------------------------------

    The CSP may not unilaterally terminate the relationship with OCC 
absent good cause or without sufficient notice to allow OCC to 
transition to an alternate CSP or to the on-premises solution for its 
Compute, Storage, and Network needs. The notice provision in the Cloud 
Agreement for terminations that are not for cause would give OCC 
sufficient time to consider and transition \46\ its core clearing, risk 
management, and data management applications to another CSP or to its 
backup on-premises data center. Specifically, the CSP must provide 
notice OCC believes is sufficient to transition if it wishes to 
terminate the Cloud Agreement for convenience or if it wishes to 
terminate an individual CSP service offering on which OCC relies for 
all of its Cloud customers.\47\
---------------------------------------------------------------------------

    \46\ The possible transition of core clearing, risk management, 
and data management applications either from the CSP back to an on-
premises solution or to another CSP is discussed below.
    \47\ The CSP permits an exception to this sufficient notice 
provision in the event the CSP must terminate the individual service 
offering if necessary to comply with the law or requests of a 
government entity or to respond to claims, litigation, or los [sic] 
of license rights related to third-party intellectual property 
rights. In this event, the CSP must provide reasonable notice to OCC 
of the termination of the individual service offering.
---------------------------------------------------------------------------

    The CSP is permitted to terminate the Cloud Agreement with shorter 
notice periods in the event of a critical breach or an uncured material 
breach of the Cloud Agreement. In the highly unlikely event that a 
critical breach or uncured material breach occurs, OCC would have 
sufficient notice to shift operations to the on-premises data center. 
Contract provisions that allow a party to terminate for uncured 
material breaches are designed to limit the types of actions that could 
lead to contract termination (typically, a breach is considered 
material only if it goes to the root of the agreement between the 
parties or is so substantial that it defeats the object of the parties 
in making the contract) and to establish a short period of time to 
resolve an aggrieved party's claim (often 30 days). This gives the 
parties time and incentive to address the problem without having to 
resort to termination. Critical breaches are material breaches: (i) For 
which OCC knew its behavior would cause a material breach (such as a 
willful violation of Cloud Agreement

[[Page 60512]]

terms); (ii) that cause ongoing material harm to the CSP, its services, 
or its customers (e.g., criminal misuse of the services); or (iii) for 
undisputed non-payment under the Cloud Agreement. Even if the CSP 
notifies OCC of an alleged breach (material or critical), termination 
of services is not immediate.
    OCC believes the risk of termination with a shorter notice period 
is mitigated by the following factors. In all cases of an alleged 
breach, the CSP must notify OCC in writing and provide time for OCC to 
cure the alleged breach (``Notice Period''). With respect to an alleged 
critical breach, OCC would use the Notice Period to attempt to cure the 
alleged critical breach while also preparing for a seamless transition 
to the on-premises data center. With respect to an alleged material 
breach, which requires the CSP to extend the Notice Period if OCC 
demonstrates a good faith effort to cure the alleged material breach, 
OCC would use the Notice Period to attempt to cure the alleged material 
breach while also preparing for a seamless transition to the on-
premises data center. As a result, it is highly unlikely that a 
critical breach or a material breach would remain uncured beyond the 
Notice Period; if one does, however, OCC would have ample notice to 
shift operations to the on-premises data center to avoid a disruption 
to core clearing, risk management, and data management applications.
ii. Resiliency of the Deployment of Cloud Infrastructure Updates
    The CSP will update the Cloud Infrastructure from time to time \48\ 
using a conservative approach for update deployment that helps to 
ensure that any potential effects of possible incidents are contained 
to the greatest extent possible. The CSP achieves this by: (i) Fully 
automating the build and deployment process; and (ii) deploying 
services to production in a phased manner.
---------------------------------------------------------------------------

    \48\ OCC will continue to retain responsibility for patching, 
configuration, and monitoring of the operating systems and 
applications in the Cloud.
---------------------------------------------------------------------------

    CSP Services are first deployed to cells, which minimizes the 
chance that a disruption caused by a service update such as a patch in 
one cell would disrupt other cells. Following a successful cell-based 
deployment, service updates are next deployed to a specific zone, which 
limits the potential disruption caused by a service update to that 
particular zone. Following a successful zone deployment, service 
updates are then deployed in a staged manner to other zones starting 
with the same region and later within other regions until the process 
is complete.
    OCC will continue to meet regularly with staff of the CSP, in 
addition to formal quarterly Briefing Meetings with the CSP as 
described in the Reg SCI Addendum.\49\ The informal discussions and 
quarterly Briefing Meetings will permit OCC to gather information in 
advance of the quarterly Systems Change report. Most reportable systems 
changes will continue to occur based on changes to Compute, Storage, 
Network, or applications controlled by OCC.
---------------------------------------------------------------------------

    \49\ See confidential Exhibit 3f.
---------------------------------------------------------------------------

iii. Resiliency Through the Build Out of an On-Premises Data Center
    OCC will maintain an on-premises data center to provide the ability 
to support core clearing, risk management, and data management 
applications in the unlikely and extraordinary event of either the 
termination of the Cloud Agreement for uncured breach or a multi-region 
outage at the CSP that simultaneously impacts OCC operations within all 
three zones in both regions.\50\
---------------------------------------------------------------------------

    \50\ OCC, with the assistance of an external consultant, 
conducted an analysis of the benefits and risks of a multi-CSP 
infrastructure. The key findings indicated that a multi-CSP 
infrastructure would not significant improver resiliency and could 
create additional risks, including: (i) Increased functionality and 
delivery risks; (ii) increased operational and cybersecurity risks; 
(iii) human capital risks; (iv) third-party and legal risks; and (v) 
general business risks.
---------------------------------------------------------------------------

    OCC has designed the on-premises data center to operate 30 or more 
days to permit a smooth transition back to the Cloud (once the Cloud 
disruption is remediated) on a low volume day. From an architectural 
perspective, the on-premises data center is similar to adding a third 
CSP region with a single zone. While most technologies will remain the 
same with a failover to on-premises, there are several technologies 
that are only available at the CSP and for which alternative solutions 
must be devised. All equivalent on-premises core platform technologies 
that enable Compute, Network, and Storage will be operated by OCC with 
synchronous data replication between the Cloud and on-premises while 
member connectivity would remain unchanged.\51\ OCC will ensure 
adequate capacity in the on-premises data center for up to two and a 
half times observed peak volume. If the circumstances that required OCC 
to rely on the on-premises data center persist beyond seven days, OCC 
would take steps necessary to enhance its Storage to enable seamless 
operation of the on-premises data center for longer than 30 days.
---------------------------------------------------------------------------

    \51\ OCC has separately submitted a request for confidential 
treatment to the Commission for a diagram that the presents draft 
Failover Architecture which OCC has provided in confidential Exhibit 
3u to File No. SR-OCC-2021-802.
---------------------------------------------------------------------------

iv. Resiliency Through the Use of ``Store and Forward'' Messaging 
Technology
    OCC has designed the architecture to ensure it is able to support 
zero message loss and a quick recovery time. To meet these requirements 
the architecture places a premium on data integrity and throughput over 
the latency of any one transaction. The established techniques for this 
are ``store and forward'' messaging technology where messages are 
preserved until delivered to servers that consume the messages and 
synchronous writes to multiple servers. Unlike OCC's current system, 
the core clearing, risk management, and data management applications do 
not rely on block storage replication across CSP regions. The solution 
is entirely message based and message replication achieves the data 
redundancy required to deliver high availability services.
    OCC will continue to rely on the existing ``store and forward'' 
messaging technology as the primary technology for exchanging messages 
with both exchanges & clearing members for the intake of clearing and 
settlement related information. The ``store and forward'' messaging 
technology manager is hosted on-premises and is replicated across all 
OCC on-premises data centers. The ``store and forward'' messaging 
technology will then forward messages to the hot/warm instances at the 
CSP and the redundant on-premises data center applications.
    Core clearing, risk management, and data management applications 
rely on a platform for managing containerized workloads and messaging 
services. This platform enables multi-region message replication with 
synchronous acknowledgement. The platform will treat the on-premises 
data center as another region, with messages being replicated to all 
three regions (the two Cloud regions and on-premises).
    The core clearing, risk management, and data management application 
architecture deployed across the two CSP regions and on-premises will 
maximize data integrity and throughput during routine operations and 
enhance failover should it be necessary.
Audit and Controls Assessment
    OCC has a plan in place to continually test the Cloud security 
controls and OCC's readiness for the Cloud Implementation, and also has 
processes in place to regularly audit and test security controls and

[[Page 60513]]

configurations,\52\ including by monitoring the CSP's technical, 
administrative, and physical security controls that support OCC's 
systems in the Cloud Infrastructure.
---------------------------------------------------------------------------

    \52\ Internal Audit will assess plans during the 2021 Cloud 
Transition Audit, and more in-depth in early 2022 when the processes 
are modified to operate in the Cloud.
---------------------------------------------------------------------------

i. Internal Risk Assessments
    In addition to existing OCC Third Party Vendor Risk Management 
activities, OCCs Third Party Risk Management department (``TPRM'') will 
assess the operational risks of the CSP as a critical vendor annually. 
Additionally, OCC conducts a technology risk assessment, which is an 
evaluation of risks to OCC's critical systems, monitoring of key risk 
indicators (``KRI''), risk events, security events, and key controls, 
and which will encompass all risks presented by the CSP, on an annual 
basis.\53\
---------------------------------------------------------------------------

    \53\ This annual risk assessment is provided to the Board of 
Directors and the Technology Committee.
---------------------------------------------------------------------------

ii. External Risk Assessment
    OCC engaged a third-party familiar with Cloud Infrastructure best 
practices to conduct a design effectiveness review of the OCC's 
proposed Cloud strategy, application architecture, and related security 
and resiliency controls.\54\ The External Risk Assessment focused on: 
(i) Cloud reference architecture, capabilities, and controls required 
to host applications in the Cloud; (ii) existing and planned resiliency 
capabilities to meet a two-hour recovery time objective of OCC's 
critical services; and (iii) design of the existing and planned 
security controls during and after the Cloud Implementation.\55\
---------------------------------------------------------------------------

    \54\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding the External Risk Assessment, 
which OCC has provided in confidential Exhibit 3v to File No. SR-
OCC-2021-802 and regarding OCC's response to the External Risk 
Assessment recommendations, which OCC has provided in confidential 
Exhibit 3w to File No. SR-OCC-2021-802.
    \55\ The External Risk Assessment included five discovery 
workshops, thirty design review sessions, discussions with over 
forty-eight OCC stakeholders, and review of one hundred sixty 
documents ranging from strategy materials to configuration builds.
---------------------------------------------------------------------------

    The External Risk Assessment identified strengths in OCC's planned 
Cloud Implementation, including that OCC incorporated several leading 
security practices as well as support for elastic capacity and the 
ability to scale effectively into its plan. The External Risk 
Assessment also included recommendations to supplement OCC's execution 
plan for the Cloud Implementation and were broadly categorized into six 
technical areas: (i) Workload isolation and networking; (ii) automation 
and pipelines; (iii) data fabric and data lifecycle management; (iv) 
platform shared services and support model; (v) security shared 
services and support model; and (vi) resiliency. Recommendations were 
categorized across two dimensions: (i) Program priority (high, medium, 
or low) and (ii) implementation action (start, accelerate, or 
continue). A recommendation does not necessarily mean OCC would not 
have implemented the recommended action absent the recommendation, as 
several of the recommendations were for OCC to continue an activity it 
had already begun. OCC has a plan in place to address the 
recommendations provided in the External Risk Assessment and will track 
the plan to completion.
iii. Internal Audit Department Plan Related to Cloud Implementation
    As mentioned above, starting in 2021 and going forward, the 
Internal Audit Annual Plan is designed to assess important elements of 
the new core clearing, risk management, and data management 
applications roll-out. For example, the 2021 Audit Plan includes an 
audit on the Cloud Implementation. This audit included an analysis of 
OCC's disposition of the findings in the External Risk Assessment, 
determined if the risks associated with findings have been adequately 
addressed, evaluated OCC's strategy in the event it needs to transition 
from the CSP at any time, evaluated the adequacy of OCC's remediation 
plans and timelines, and OCC's assessment of the third-party CSP 
attestation report (SOC). The Internal Audit Department plans to 
augment internal resources with co-source resources with specific 
expertise in Cloud-based controls and has conducted a department-wide 
training of Cloud auditing, with additional training to be conducted as 
necessary.
iv. Audit Symposium and Access Rights
    The CSP hosts an annual Audit Symposium, which will allow OCC to 
review evidence supporting the CSP's control environment. The CSP also 
hosts an annual Cloud security conference focused on Security, 
Governance, Risk and Compliance.
    OCC Information Technology staff currently meets with CSP 
representatives weekly to focus on technical issues related to OCC's 
proposed Cloud environment. In addition, OCC will be holding compliance 
briefings with the CSP quarterly, wherein the CSP will provide OCC with 
documentation (e.g., SOC 2 Report) and assist OCC's preparation for the 
Audit Symposium. OCC management, including Security, Information 
Technology, and the Internal Audit Department, will coordinate to 
ensure appropriate representation during the planned briefings. TPRM 
will help initiate and orchestrate the annual reviews.
v. Key Risk and Key Performance Indicators
    OCC has also established several key risk indicators (``KRI'') and 
key performance indicators (``KPI'') to evaluate OCC's management of 
risk and the CSP's performance during the Cloud implementation and 
ongoing operation.\56\ The KRIs are approved by and regularly reported 
to OCC's Management Committee, Board of Directors, and the Risk 
Committee of the Board of Directors.
---------------------------------------------------------------------------

    \56\ These KRIs and KPIs are contained in the Cloud 
Implementation risk report. OCC has separately submitted a request 
for confidential treatment to the Commission regarding the Cloud 
Implementation risk report, which OCC has provided in confidential 
Exhibit 3k to File No. SR-OCC-2021-802. See supra note 26.
---------------------------------------------------------------------------

    OCC has developed Cloud KPIs and socialized these KPIs internally. 
The KRIs already exist for core clearing, risk management, and data 
management applications and are aligned to overall systems 
availability, capacity, data integrity, and security. The CSP KPIs feed 
into existing KRIs and will continue to be used to evaluate the CSP's 
performance after the Cloud Implementation.\57\ KPIs will be added to 
monitor the performance and risks of the CSP services for which OCC has 
contracted. These post-Cloud Implementation KRIs and KPIs will allow 
OCC to assess its ongoing use of the CSP against its operational and 
security requirements and will demonstrate the effectiveness of risk 
controls and the CSP's performance against commitments in the Service 
Level Agreements, and will be reported on a regular basis to OCC's 
Management Committee, Board of Directors, and Technology and Risk 
Committees of the Board of Directors.\58\
---------------------------------------------------------------------------

    \57\ OCC has established metrics for monitoring CSP systems 
capacity and availability in each zone in Risk Appetite Statements 
and Risk Tolerance for Cloud Services which OCC has provided in 
confidential Exhibit 3l to File No. SR-OCC-2021-802. Data integrity 
and systems incidents are monitored through OCC's Quality Standards 
Program and Systems Incident Program, respectively.
    \58\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding metrics and reporting that OCC 
will use to monitor the security and performance of the CSP after 
adoption, which OCC has provided in confidential Exhibit 3x to File 
No. SR-OCC-2021-802.

---------------------------------------------------------------------------

[[Page 60514]]

vi. Auditing the CSP Post Cloud-Implementation
    OCC's Cloud Agreement gives OCC the right to attend the CSP Audit 
Symposium annually so that OCC may inspect and verify evidence of the 
design and effectiveness of the CSP's control environment and physical 
security controls in place at the CSP's data centers. Through 
preparation for and attendance at this symposium, OCC may also provide 
feedback and make requests of the CSP for future modifications of the 
control environment. The CSP is also required to maintain an 
information security program, including controls and certifications, 
that is as protective as the program evidenced by the CSP's SOC-2 
report. The CSP must make available on demand to OCC its SOC-2 report 
as well as the CSP's other certifications from accreditation bodies and 
information on its alignment with various frameworks, including NIST, 
CSF, and ISO.\59\ TPRM will coordinate an annual risk assessment of 
OCC's relationship with the CPS. TPRM, Security, and Business 
Continuity will determine the adequacy and reasonableness of the 
documentation received to complete the Third-Party Risk Assessment. 
Finally, the Cloud Agreement provides that OCC's regulators may visit 
the facilities of the CSP under specified conditions.
---------------------------------------------------------------------------

    \59\ The FFIEC Guidance provides that OCC may obtain SOC 
reports, other independent audits, or ISO certification reports to 
gain assurance that the CSP's controls are operating effectively. 
See FFIEC, Security in a Cloud Computing Environment, page 7. OCC 
reviews the CSP's SOC-2 on an annual basis.
---------------------------------------------------------------------------

    OCC plans to use the CSP's services combined with additional third-
party tools to monitor systems deployed by ingesting logs into a 
security incident and event monitoring tool to provide a single pane of 
glass view into the Cloud Infrastructure (and the on-premises data 
center to the extent it is used). When incidents are detected, OCC will 
follow its existing incident response governance to identify, detect, 
contain, eradicate, and recover from incidents.
Consistency With the Payment, Clearing and Settlement Supervision Act
    The stated purpose of the Clearing Supervision Act is to mitigate 
systemic risk in the financial system and promote financial stability 
by, among other things, promoting uniform risk management standards for 
systemically important financial market utilities and strengthening the 
liquidity of systemically important financial market utilities.\60\ 
Section 805(a)(2) of the Clearing Supervision Act \61\ also authorizes 
the Commission to prescribe risk management standards for the payment, 
clearing and settlement activities of designated clearing entities, 
like OCC, for which the Commission is the supervisory agency. Section 
805(b) of the Clearing Supervision Act \62\ states that the objectives 
and principles for risk management standards prescribed under Section 
805(a) shall be to:
---------------------------------------------------------------------------

    \60\ 12 U.S.C. 5461(b).
    \61\ 12 U.S.C. 5464(a)(2).
    \62\ 12 U.S.C. 5464(b).
---------------------------------------------------------------------------

     Promote robust risk management;
     promote safety and soundness;
     reduce systemic risks; and
     support the stability of the broader financial system.
    The Commission has adopted risk management standards under Section 
805(a)(2) of the Clearing Supervision Act and the Exchange Act in 
furtherance of these objectives and principles.\63\ Rule 17Ad-22 
requires registered clearing agencies, like OCC, to establish, 
implement, maintain, and enforce written policies and procedures that 
are reasonably designed to meet certain minimum requirements for their 
operations and risk management practices on an ongoing basis.\64\ 
Therefore, the Commission has stated \65\ that it believes it is 
appropriate to review changes proposed in advance notices against Rule 
17Ad-22 and the objectives and principles of these risk management 
standards as described in Section 805(b) of the Clearing Supervision 
Act.\66\
---------------------------------------------------------------------------

    \63\ 17 CFR 240.17Ad-22. See Exchange Act Release Nos. 68080 
(October 22, 2012), 77 FR 66220 (November 2, 2012) (S7-08-11) 
(``Clearing Agency Standards''); 78961 (September 28, 2016), 81 FR 
70786 (October 13, 2016) (S7-03-14) (``Standards for Covered 
Clearing Agencies'').
    \64\ 17 CFR 240.17Ad-22.
    \65\ See e.g., Exchange Act Release No. 86182 (June 24, 2019), 
84 FR 31128, 31129 (June 28, 2019) (SR-OCC-2019-803).
    \66\ 12 U.S.C. 5464(b). Reg SCI was not adopted under the 
Payment, Clearing and Settlement Supervision Act and thus is not 
analyzed in this section. However, an analysis of the compliance 
requirements of Reg SCI and the provisions of the Cloud Agreement 
that enable OCC to meet them are provided in confidential Exhibit 3d 
to File No. SR-OCC-2021-802, for which OCC has separately submitted 
a request for confidential treatment from the Commission.
---------------------------------------------------------------------------

    OCC believes that the proposed changes are consistent with Section 
805(b)(1) of the Clearing Supervision Act \67\ and the requirements of 
Rules 17Ad-22(e)(17) and (e)(21) under the Act because the Cloud 
Implementation would provide OCC with resilient, secure, and scalable 
core clearing, risk management, and data management systems that far 
exceeds what is currently possible in an on-premises infrastructure.
---------------------------------------------------------------------------

    \67\ 12 U.S.C. 5464(b)(1).
---------------------------------------------------------------------------

    Rule 17Ad-22(e)(17)(ii) requires OCC to establish, implement, 
maintain, and enforce written policies and procedures reasonably 
designed to manage OCC's operational risk by ``ensuring that systems 
have a high degree of security, resiliency, operational reliability, 
and adequate, scalable capacity.'' \68\ OCC maintains several policies 
specifically designed to manage the risks associated with maintaining 
adequate levels of system functionality, confidentiality, integrity, 
availability, capacity and resiliency for systems that support core 
clearing, risk management, and data management services.\69\ As stated 
above, resiliency of the Cloud Infrastructure is built into the system 
with functionality for OCC's core clearing, risk management, and data 
management applications to run in multiple zones within multiple 
regions. Regions are isolated from one another and are designed in part 
to minimize the possibility of a multi-region outage. OCC has designed 
the infrastructure to have primary (hot)/secondary (warm) zones at all 
times ensuring Compute, Storage, and Network resources would be 
available in a new redundant region in the event of a primary region 
failure. As a result, the Cloud Infrastructure offers OCC multiple 
redundancies within which to run its core clearing, risk management, 
and data management applications while simultaneously restricting the 
effect of an incident at the CSP to the smallest footprint possible. 
Furthermore, in the unlikely and extraordinary event OCC loses access 
to each of the six levels of resiliency within the CSP environment, OCC 
can failover to an on-premises backup that will permit continued 
operations of core clearing, risk management, and data management 
applications.
---------------------------------------------------------------------------

    \68\ 17 CFR 240.17Ad-22(e)(17)(ii).
    \69\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding the IT Operational Risk 
Management Policy, which OCC has provided as confidential Exhibit 3y 
to File No. SR-OCC-2021-802, the Technology Operations Policy, which 
OCC has provided as confidential Exhibit 3z to File No. SR-OCC-2021-
802, and the Business Continuity Procedure, which OCC has provided 
as confidential Exhibit 3aa to File No. SR-OCC-2021-802.
---------------------------------------------------------------------------

    OCC has established a robust Cloud security program to manage the 
security of the core clearing, risk management, and data management 
applications that will be running in the Cloud and to monitor the CSP's 
management of security of the Cloud Infrastructure that it operates. 
Processes are formally defined, automated to the fullest extent, 
repeatable with minimal variation,

[[Page 60515]]

accessible, adhered to, and timely.\70\ The enterprise security program 
encompasses all OCC assets existing in OCC offices, data centers, and 
within the Cloud Provider's Cloud Infrastructure, and IAM controls 
ensure least-privileged user access to applications on the Cloud. OCC 
has appropriate controls in place to ensure the security of 
confidential information in-transit between OCC data centers and the 
Cloud Infrastructure, between systems within the Cloud Infrastructure, 
and at-rest. All network communications between OCC and the Cloud will 
rely on industry standard encryption for traffic while in transit, and 
data at rest will be safeguarded through pervasive encryption. Finally, 
automated delivery of business and security capability via the use of 
the ``Infrastructure as Code,'' Cloud agnostic tools, and continuous 
integration/continuous deployment pipeline methods ensure security 
controls are consistently and transparently deployed.
---------------------------------------------------------------------------

    \70\ For example, vulnerability scanning, automated secrets 
management including certificate encryption, and incident triage 
management and handling process.
---------------------------------------------------------------------------

    Since additional computing power can be launched on demand, the 
scalability in a Cloud computing environment is considerable and 
instantaneous. OCC could provision or de-provision Compute, Storage, 
and Network resources to meet demand at any given point in time. In the 
current on-premises environment, immediate scalability is limited by 
the capacity of the on-premises hardware: OCC would need to obtain 
additional physical servers and network equipment to scale beyond the 
limits of the on-premises hardware, potentially affecting the ability 
to quickly adapt to evolving market conditions, including spikes in 
trading volume.
    Rule 17Ad-22(e)(21) requires OCC to establish, implement, maintain, 
and enforce written policies and procedures reasonably designed to ``be 
efficient and effective in meeting the requirements of its participants 
and the markets it serves,'' and to have OCC's management regularly 
review the ``efficiency and effectiveness of, [inter alia,] its (i) 
clearing and settlement arrangements and (ii) operating structure, 
including risk management policies, procedures, and systems.'' \71\ OCC 
maintains policies designed to enable the regular review of the 
efficiency and effectiveness of the arrangements and operating 
structures supporting OCC's identified goals and objectives.\72\ There 
are several significant efficiency benefits to the Cloud 
Implementation, including:
---------------------------------------------------------------------------

    \71\ 17 CFR 240.17Ad-22(e)(21).
    \72\ OCC has separately submitted a request for confidential 
treatment to the Commission regarding the Annual Planning Policy, 
which OCC has provided as confidential Exhibit 3bb to File No. SR-
OCC-2021-802, the Balanced Scorecard Procedure, which OCC has 
provided as confidential Exhibit 3cc to File No. SR-OCC-2021-802, 
the Enterprise Portfolio Management Procedure, which OCC has 
provided as confidential Exhibit 3dd to File No. SR-OCC-2021-802, 
the New Business and New Exchange Procedure, which OCC has provided 
as confidential Exhibit 3ee to File No. SR-OCC-2021-802, and the New 
Product Procedure, which OCC has provided as confidential Exhibit 
3ff to File No. SR-OCC-2021-802.
---------------------------------------------------------------------------

     Ad-hoc reporting capability with new filtering 
functionality and application programming interfaces to make it easier 
to procure and submit data to and from the system.
     The capability to quickly add or remove Compute, Storage, 
or Network resources to meet changing application needs and market 
volatility.
     The capability to (i) run certain back testing processes 
that used to take days to months in a few hours; (ii) manage multiple 
back testing processes the same time; and (iii) eliminate any undue 
delay in the evaluation of potential risk management enhancements for 
the industry.
     The scalability to more efficiently meet historical data 
storage needs, provide data access through standard data services, and 
the ability to respond quickly to regulatory requests.
     Easy and secure access to high-quality, high-fidelity 
data, including a centralized, enterprise-wide repository to store and 
provide timely access to system of record data.
    Accordingly, the proposed changes: (i) Are designed to promote 
robust risk management; (ii) are consistent with promoting safety and 
soundness; and (iii) are consistent with reducing systemic risks and 
promoting the stability of the broader financial system. The proposed 
changes also ensure that OCC systems have a high degree of security, 
resiliency, operational reliability, and adequate, scalable capacity, 
and enable OCC to be efficient and effective in meeting the 
requirements of its participants and the markets it serves. For the 
foregoing reasons, OCC believes that the proposed changes are 
consistent with Section 805(b)(1) of the Clearing Supervision Act \73\ 
and Rules 17Ad-22(e)(17) \74\ and (e)(21) \75\ under the Exchange Act.
---------------------------------------------------------------------------

    \73\ 12 U.S.C. 5464(b).
    \74\ 17 CFR 240.17Ad-22(e)(17).
    \75\ 17 CFR 240.17Ad-22(e)(21).
---------------------------------------------------------------------------

III. Date of Effectiveness of the Advance Notice

    The proposed change may be implemented if the Commission does not 
object to the proposed change within 60 days of the later of (i) the 
date the proposed change was filed with the Commission or (ii) the date 
any additional information requested by the Commission is received.\76\ 
OCC shall not implement the proposed change if the Commission has any 
objection to the proposed change.\77\
---------------------------------------------------------------------------

    \76\ 12 U.S.C. 5465(e)(1)(G).
    \77\ 12 U.S.C. 5465(e)(1)(F).
---------------------------------------------------------------------------

    OCC shall post notice on its website of proposed changes that are 
implemented. The proposal shall not take effect until all regulatory 
actions required with respect to the proposal are completed.

IV. Solicitation of Comments

    Interested persons are invited to submit written data, views, and 
arguments concerning the foregoing, including whether the advance 
notice is consistent with the Clearing Supervision Act. Comments may be 
submitted by any of the following methods:

Electronic Comments

     Use the Commission's internet comment form (https://www.sec.gov/rules/sro.shtml); or
     Send an email to [email protected]. Please include 
File Number SR-OCC-2021-802 on the subject line.

Paper Comments

     Send paper comments in triplicate to Secretary, Securities 
and Exchange Commission, 100 F Street NE, Washington, DC 20549.

All submissions should refer to File Number SR-OCC-2021-802. This file 
number should be included on the subject line if email is used. To help 
the Commission process and review your comments more efficiently, 
please use only one method. The Commission will post all comments on 
the Commission's internet website (https://www.sec.gov/rules/sro.shtml). 
Copies of the submission, all subsequent amendments, all written 
statements with respect to the advance notice that are filed with the 
Commission, and all written communications relating to the advance 
notice between the Commission and any person, other than those that may 
be withheld from the public in accordance with the provisions of 5 
U.S.C. 552, will be available for website viewing and printing in the 
Commission's Public Reference Room, 100 F Street NE,

[[Page 60516]]

Washington, DC 20549 on official business days between the hours of 
10:00 a.m. and 3:00 p.m. Copies of the filing also will be available 
for inspection and copying at the principal office of the self-
regulatory organization.
    All comments received will be posted without change. Persons 
submitting comments are cautioned that we do not redact or edit 
personal identifying information from comment submissions. You should 
submit only information that you wish to make available publicly.

V. Date of Timing for Commission Action

    Section 806(e)(1)(G) of the Clearing Supervision Act provides that 
OCC may implement the changes if it has not received an objection to 
the proposed changes within 60 days of the later of (i) the date that 
the Commission receives the Advance Notice or (ii) the date that any 
additional information requested by the Commission is received,\78\ 
unless extended as described below.
---------------------------------------------------------------------------

    \78\ 12 U.S.C. 5465(e)(1)(G).
---------------------------------------------------------------------------

    Pursuant to Section 806(e)(1)(H) of the Clearing Supervision Act, 
the Commission may extend the review period of an advance notice for an 
additional 60 days, if the changes proposed in the advance notice raise 
novel or complex issues, subject to the Commission providing the 
clearing agency with prompt written notice of the extension.\79\
---------------------------------------------------------------------------

    \79\ 12 U.S.C. 5465(e)(1)(H).
---------------------------------------------------------------------------

    Here, as the Commission has not requested any additional 
information, the date that is 60 days after OCC filed the Advance 
Notice with the Commission is December 7, 2021. However, the Commission 
finds the issues raised by the Advance Notice complex because OCC 
proposes to migrate its clearing, risk management, and data management 
applications to a cloud infrastructure with an on-demand network of 
configurable information technology resources running on virtual 
infrastructure hosted by a third party. The Commission also finds the 
issues raised by the Advance Notice novel because the proposed 
migration of a covered clearing agency's clearing, risk management, and 
data management applications to a third-party-hosted cloud 
infrastructure represents a novel circumstance in the U.S. markets that 
would require careful scrutiny and consideration of its associated 
risks. Therefore, the Commission finds it appropriate to extend the 
review period of the Advance Notice for an additional 60 days under 
Section 806(e)(1)(H) of the Clearing Supervision Act.\80\
---------------------------------------------------------------------------

    \80\ Id.
---------------------------------------------------------------------------

    Accordingly, the Commission, pursuant to Section 806(e)(1)(H) of 
the Clearing Supervision Act,\81\ extends the review period for an 
additional 60 days so that the Commission shall have until February 5, 
2022 to issue an objection or non-objection to advance notice SR-OCC-
2021-802.
---------------------------------------------------------------------------

    \81\ Id.
---------------------------------------------------------------------------

    All submissions should refer to File Number SR-OCC-2021-802 and 
should be submitted on or before November 23, 2021.
---------------------------------------------------------------------------

    \82\ 17 CFR 200.30-3(a)(91).

    For the Commission, by the Division of Trading and Markets, 
pursuant to delegated authority.\82\
J. Matthew DeLesDernier,
Assistant Secretary.
[FR Doc. 2021-23816 Filed 11-1-21; 8:45 am]
BILLING CODE 8011-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.