Financial Market Utilities, 60314-60326 [2022-21222]
Download as PDF
60314
Proposed Rules
Federal Register
Vol. 87, No. 192
Wednesday, October 5, 2022
This section of the FEDERAL REGISTER
contains notices to the public of the proposed
issuance of rules and regulations. The
purpose of these notices is to give interested
persons an opportunity to participate in the
rule making prior to the adoption of the final
rules.
FEDERAL RESERVE SYSTEM
12 CFR Part 234
[Regulation HH; Docket No. R–1782]
RIN No. 7100–AG40
Financial Market Utilities
Board of Governors of the
Federal Reserve System.
ACTION: Notice of proposed rulemaking.
AGENCY:
The Board of Governors of the
Federal Reserve System (Board) is
proposing to amend the requirements
relating to operational risk management
in the Board’s Regulation HH, which
applies to certain financial market
utilities that have been designated as
systemically important (designated
FMUs) by the Financial Stability
Oversight Council (FSOC) under Title
VIII of the Dodd-Frank Wall Street
Reform and Consumer Protection Act
(the Dodd-Frank Act or Act). The
proposal would update, refine, and add
specificity to the operational risk
management requirements in Regulation
HH to reflect changes in the operational
risk, technology, and regulatory
landscapes in which designated FMUs
operate since the Board last amended
this regulation in 2014. The proposal
would also adopt specific incidentnotification requirements.
DATES: Comments must be received by
December 5, 2022.
ADDRESSES: You may submit comments,
identified by Docket No. R–1782 and
RIN 7100–AG40, by any of the following
methods:
• Agency Website: https://
www.federalreserve.gov. Follow the
instructions for submitting comments at
https://www.federalreserve.gov/
generalinfo/foia/ProposedRegs.cfm.
• Email: regs.comments@
federalreserve.gov. Include docket and
RIN numbers in the subject line of the
message.
• FAX: 202–452–3819 or 202–452–
3102.
• Mail: Ann E. Misback, Secretary,
Board of Governors of the Federal
jspears on DSK121TN23PROD with PROPOSALS
SUMMARY:
VerDate Sep<11>2014
17:19 Oct 04, 2022
Jkt 259001
Reserve System, 20th Street and
Constitution Avenue NW, Washington,
DC 20551.
Instructions: All public comments are
available from the Board’s website at
https://www.federalreserve.gov/
generalinfo/foia/ProposedRegs.cfm as
submitted. Accordingly, comments will
not be edited to remove any identifying
or contact information. Public
comments may also be viewed
electronically or in paper in Room M–
4365A, 2001 C Street NW, Washington,
DC 20551, between 9:00 a.m. and 5:00
p.m. during Federal business weekdays.
For security reasons, the Board requires
that visitors make an appointment to
inspect comments. You may do so by
calling (202) 452–3684. Upon arrival,
visitors will be required to present valid
government-issued photo identification
and to submit to security screening in
order to inspect and photocopy
comments. For users of TTY–TRS,
please call 711 from any telephone,
anywhere in the United States.
FOR FURTHER INFORMATION CONTACT:
Emily Caron, Assistant Director (202–
452–5261) or Kathy Wang, Lead
Financial Institution and Policy Analyst
(202–872–4991), Division of Reserve
Bank Operations and Payment Systems;
or Cody Gaffney, Attorney (202–452–
2674), Legal Division. For users of TTY–
TRS, please call 711 from any
telephone, anywhere in the United
States.
SUPPLEMENTARY INFORMATION:
I. Background
A. Financial Market Utilities
A financial market utility (FMU) is a
person that manages or operates a
multilateral system for the purpose of
transferring, clearing, or settling
payments, securities, or other financial
transactions among financial
institutions or between financial
institutions and the person.1 FMUs
provide essential infrastructure to clear
and settle payments and other financial
transactions. Financial institutions,
including banking organizations,
participate in FMUs pursuant to a
common set of rules and procedures,
technical infrastructure, and riskmanagement framework.
If a systemically important FMU fails
to perform as expected or fails to
effectively measure, monitor, and
1 12
PO 00000
U.S.C. 5462(6).
Frm 00001
Fmt 4702
Sfmt 4702
manage its risks, it could pose
significant risk to its participants and
the financial system more broadly. For
example, the inability of an FMU to
complete settlement on time could
create credit or liquidity problems for its
participants or other FMUs. An FMU,
therefore, should have an appropriate
and robust risk-management framework,
including appropriate policies and
procedures to measure, monitor, and
manage the range of risks that arise in
or are borne by the FMU.
B. Title VIII of the Dodd-Frank Act
In recognition of the criticality of
FMUs to the stability of the financial
system, Title VIII of the Dodd-Frank Act
(the Dodd-Frank Act or Act) established
a framework for enhanced supervision
of certain FMUs. Section 804 of the
Dodd-Frank Act states that the FSOC
shall designate those FMUs that it
determines are, or are likely to become,
systemically important. Such a
designation by the FSOC makes an FMU
subject to the supervisory framework set
out in Title VIII of the Act.
Section 805(a)(1)(A) of the Act
requires the Board to prescribe riskmanagement standards governing the
operations related to payment, clearing,
and settlement activities of designated
FMUs.2 As set out in section 805(b) of
the Act, the applicable risk-management
standards must (1) promote robust risk
management, (2) promote safety and
soundness, (3) reduce systemic risks,
and (4) support the stability of the
broader financial system.3
A designated FMU is subject to
examination by the federal agency that
2 12 U.S.C. 5464(a)(1). The Act directs the Board
to ‘‘tak[e] into consideration relevant international
standards and existing prudential requirements’’
when it promulgates these risk-management
standards. Id. In addition, section 805(a)(2) of the
Act grants the U.S. Commodity Futures Trading
Commission (CFTC) and the U.S. Securities and
Exchange Commission (SEC) the authority to
prescribe such risk-management standards for a
designated FMU that is, respectively, a derivatives
clearing organization (DCO) registered under
section 5b of the Commodity Exchange Act, or a
clearing agency registered under section 17A of the
Securities Exchange Act of 1934. 12 U.S.C.
5464(a)(2).
3 Further, under section 805(c), the riskmanagement standards may address areas such as
(1) risk-management policies and procedures, (2)
margin and collateral requirements, (3) participant
or counterparty default policies, (4) the ability to
complete timely clearing and settlement of financial
transactions, (5) capital and financial resource
requirements for designated FMUs, and (6) other
areas that are necessary to achieve the objectives
and principles described above. 12 U.S.C. 5464(c).
E:\FR\FM\05OCP1.SGM
05OCP1
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
has primary jurisdiction over the FMU
under federal banking, securities, or
commodity futures laws (the
‘‘Supervisory Agency’’).4 At present, the
FSOC has designated eight FMUs as
systemically important, and the Board is
the Supervisory Agency for two of these
designated FMUs—The Clearing House
Payments Company, L.L.C. (on the basis
of its role as operator of the Clearing
House Interbank Payments System
(CHIPS)) and CLS Bank International.5
The risk-management standards in the
Board’s Regulation HH apply to Boardsupervised designated FMUs.6
C. Regulation HH Risk-Management
Standards for Designated FMUs
jspears on DSK121TN23PROD with PROPOSALS
Section 234.3 of Regulation HH
includes a set of 23 risk-management
standards addressing governance,
transparency, and the various risks that
can arise in connection with a
designated FMU’s payment, clearing,
and settlement activities, including
legal, financial, and operational risks.
These standards are based on and
generally consistent with the Principles
for Financial Market Infrastructures
(PFMI).7 The Regulation HH standards
generally employ a flexible, principlesbased approach. In several cases,
however, the Board adopted specific
minimum requirements that a
designated FMU must meet in order to
achieve the overall objective of a
particular standard.
4 The Act’s definition of ‘‘Supervisory Agency’’ is
codified at 12 U.S.C. 5462(8). Section 807 of the Act
authorizes the Supervisory Agencies to examine
and take enforcement actions against the
Supervisory Agencies’ respective designated FMUs.
The Act also describes certain authorities that the
Board has with respect to designated FMUs for
which it is not the Supervisory Agency, such as
participation in examinations and
recommendations on enforcement actions. 12
U.S.C. 5466.
5 The SEC is the Supervisory Agency for The
Depository Trust Company (DTC); Fixed Income
Clearing Corporation (FICC); National Securities
Clearing Corporation (NSCC); and The Options
Clearing Corporation (OCC). The CFTC is the
Supervisory Agency for the Chicago Mercantile
Exchange, Inc. (CME); and ICE Clear Credit LLC
(ICC). See U.S. Department of the Treasury,
Financial Market Utility Designations, https://
home.treasury.gov/policy-issues/financial-marketsfinancial-institutions-and-fiscal-service/fsoc/
designations.
6 The risk-management standards in Regulation
HH would also apply to any designated FMU for
which another Federal banking agency is the
Supervisory Agency. At this time, there are no such
designated FMUs.
7 The PFMI, published by the Committee on
Payment and Settlement Systems (now the
Committee on Payments and Market Infrastructures)
and the Technical Committee of the International
Organization of Securities Commissions in April
2012, is widely recognized as the most relevant set
of international risk-management standards for
payment, clearing, and settlement systems.
VerDate Sep<11>2014
17:19 Oct 04, 2022
Jkt 259001
1. Operational Risk Management
Section 234.3(a)(17) of Regulation HH
requires that a designated FMU manage
its operational risks by establishing a
robust operational risk-management
framework that is approved by its board
of directors.8 In this regard, the
designated FMU must (1) identify and
mitigate its plausible sources of
operational risk; (2) identify, monitor,
and manage the operational risks it may
pose to other FMUs and trade
repositories; (3) ensure a high degree of
security and operational reliability; (4)
have adequate, scalable capacity to
handle increasing stress volumes; (5)
address potential and evolving
vulnerabilities and threats; and (6)
provide for rapid recovery and timely
resumption of critical operations and
fulfillment of obligations, including in
the event of a wide-scale or major
disruption. Section 234.3(a)(17) also
contains several specific minimum
requirements for business continuity
planning, including a requirement for
the designated FMU to have a business
continuity plan that (1) incorporates the
use of a secondary site at a location with
a distinct risk profile from the primary
site; (2) is designed to enable critical
systems to recover and resume
operations no later than two hours
following disruptive events; (3) is
designed to enable it to complete
settlement by the end of the day of the
disruption, even in case of extreme
circumstances; and (4) is tested at least
annually.
Although the term ‘‘operational risk’’
is not defined in current Regulation HH,
when the Board proposed amendments
to § 234.3(a)(17) in 2014, it described
operational risk as the risk that
deficiencies in information systems,
internal processes, and personnel or
disruptions from external events will
result in the deterioration or breakdown
of services provided by an FMU.9
Consistent with an all-hazards view of
managing operational risk, the Board
believes operational risk could arise
internally and externally. Internal
sources of operational risk include the
designated FMU’s people, processes,
and technology.10 External sources of
8 In this notice, § 234.4(a)(17) will be informally
referred to as the ‘‘operational risk management
standard.’’
9 79 FR 3665, 3683 (Jan. 22, 2014). The Board also
incorporated this definition of ‘‘operational risk’’
into part I of the Federal Reserve Policy on Payment
System Risk (PSR policy) in 2014, see 79 FR 2838,
2845 (Jan. 16, 2014), and into its ORSOM rating
system in 2016, see 81 FR 58932, 58936 (Aug. 26,
2016). The PSR policy is available at https://
www.federalreserve.gov/paymentsystems/files/psr_
policy.pdf.
10 Deficiencies in assessing and managing these
sources of operational risk could cause errors or
PO 00000
Frm 00002
Fmt 4702
Sfmt 4702
60315
operational risk are those that fall
outside the direct control of a
designated FMU. For example, external
sources of operational risk can include
the designated FMU’s participants and
other entities, such as other FMUs,
settlement banks, liquidity providers,
and service providers, which may
transmit threats through their various
connections to the designated FMU.
External sources of operational risk also
include physical events, such as
pandemics, natural disasters, and other
destruction of property, as well as
information security threats, such as
cyberattacks and technology supply
chain vulnerabilities. These internal and
external sources of operational risk can
manifest in different scenarios
(including wide-scale or major
disruptions) and can result in the
reduction, deterioration, or breakdown
of services that a designated FMU
provides. A designated FMU must plan
for these types of scenarios and test its
systems, polices, procedures, and
controls against them.
Importantly, the Board believes that
effective operational risk-management,
in combination with sound governance
arrangements and effective management
of general business risk (including the
risk of losses from operational events),
promotes operational resilience, which
refers to the ability of an FMU to: (1)
maintain essential operational
capabilities under adverse conditions or
stress, even if in a degraded or
debilitated state; and (2) recover to
effective operational capability in a time
frame consistent with the provision of
critical economic services.11
2. Evolution in the Operational Risk,
Technology, and Regulatory Landscape
When the Board proposed the current
Regulation HH risk-management
standards in 2014, it recognized that
there was ongoing work and discussion
domestically and internationally on
developing operational riskmanagement standards and planning for
business continuity with respect to
cybersecurity and responses to
cyberattacks.12 For example, in 2016,
the Committee on Payments and Market
Infrastructures (CPMI) and Technical
Committee of the International
Organization of Securities Commissions
(IOSCO) published Guidance on cyber
resilience for financial market
infrastructures (Cyber Guidance), which
supplements the PFMI and provides
guidance on cyber resilience, including
delays in processing, systems outages, insufficient
capacity, fraud, data loss, and data leakage.
11 See § 234.3(a)(2) and (a)(15).
12 79 FR 3665, 3683 (Jan. 22, 2014).
E:\FR\FM\05OCP1.SGM
05OCP1
60316
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
in the context of governance, the
comprehensive management of risks,
and operational risk management.13 The
Cyber Guidance has informed the
Federal Reserve’s supervision of
designated FMUs.14
More recently, new challenges to
operational risk management have
emerged, including a global pandemic
and severe weather events. In addition,
certain types of cyberattacks that were
once thought to be extreme or ‘‘tail-risk’’
events, like attacks on the supply chain
and ransomware attacks, have become
more prevalent. Technology solutions
for the management of operational risk
have also advanced since 2014,
including the development of new
technologies that have the potential to
improve the resilience of designated
FMUs. Finally, the legal and regulatory
landscape in which designated FMUs
operate has evolved to reflect these
changes in the broader operational risk
environment. For example, in November
2021, the Board, the Office of the
Comptroller of the Currency (OCC), and
the Federal Deposit Insurance
Corporation (FDIC) adopted
requirements on computer-security
incident notifications for banking
organizations and bank service
providers (interagency notification
rule).15
The evolution in the operational risk,
technology, and regulatory landscape
motivated the Board to conduct a full
review of § 234.3(a)(17) to determine
whether updates are necessary.
Following this review, the Board
believes that the outcomes required by
the current operational risk management
standard are generally still relevant and
comprehensive. However, the Board has
identified several areas where it believes
updates to the rule are necessary.
jspears on DSK121TN23PROD with PROPOSALS
II. Explanation of Proposed Rule
The Board is proposing to amend its
operational risk management standard
to reflect changes in the operational risk
and threat landscape, as well as to
incorporate developments in designated
FMUs’ operations and technology usage
since the Board last amended
13 CPMI–IOSCO, Guidance on Cyber Resilience
for Financial Market Infrastructures (June 2016),
https://www.bis.org/cpmi/publ/d146.htm.
14 For example, when the Board finalized its
ORSOM rating system for designated FMUs in 2016,
it noted that the then-forthcoming Cyber Guidance
would guide the Board’s assessment of a designated
FMU with respect to operational risk and
cybersecurity policies and procedures. 81 FR 58932,
58934 (Aug. 26, 2016).
15 86 FR 66424 (Nov. 23, 2021). Congress also
recently enacted the Cyber Incident Reporting for
Critical Infrastructure Act of 2022, which requires
covered entities to report significant cyber incidents
to the Cybersecurity and Infrastructure Agency
(‘‘CISA’’). See H.R. 2471, 117th Cong. (2022).
VerDate Sep<11>2014
17:19 Oct 04, 2022
Jkt 259001
Regulation HH in 2014. The proposal
focuses on four areas: (1) review and
testing, (2) incident management and
notification, (3) business continuity
management and planning, and (4)
third-party risk management. The Board
is also proposing several technical or
clarifying amendments throughout
§§ 234.2 and 234.3(a).16
The Board believes that the proposal
continues to employ a flexible,
principles-based approach in Regulation
HH. Further, the Board believes the
proposed amendments are largely
consistent with existing measures that
designated FMUs take to comply with
Regulation HH and would create
minimal added burden for the
designated FMUs that are subject to
Regulation HH. Accordingly, the Board
is proposing that the proposed changes
would become effective and require
compliance 60 days from the date a final
rule is published in the Federal
Register.
The Board requests comment on all
aspects of the proposed amendments,
including the proposed effective and
compliance date. In addition, the Board
requests comment on the specific
questions below. Where possible,
commenters should provide both
quantitative data and detailed analysis
in their comments, particularly with
respect to suggested alternatives to the
proposed amendments. Commenters
should also explain the rationale for
their suggestions.
A. Review and Testing
Currently, § 234.3(a)(17)(i) requires
designated FMUs to identify the
plausible sources of operational risk,
both internal and external, and mitigate
their impact through the use of
appropriate systems, policies,
procedures, and controls that are
reviewed, audited, and tested
periodically and after major changes.
This general review and testing
requirement applies broadly to the
systems, policies, procedures, and
controls that the designated FMU
develops to mitigate sources of
operational risk. For example,
designated FMUs need to design and
conduct appropriate tests on any
policies or systems that they develop to
ensure a high degree of security and
operational reliability (as required by
16 In
addition to the technical changes described
below in section II.E, the Board is also proposing
a technical change to the title of § 234.3. Currently,
the section is erroneously titled ‘‘Standards for
payment systems,’’ which is the legacy title from
the initial Regulation HH risk-management
standards published in 2012. The Board is
proposing to replace ‘‘payment systems’’ with
‘‘designated financial market utilities.’’
PO 00000
Frm 00003
Fmt 4702
Sfmt 4702
§ 234.3(a)(17)(iii)). Similarly, a
designated FMU needs to review and
test any arrangements it sets up to
achieve its planned business continuity
recovery and resumption objectives (as
required by § 234.3(a)(17)(vii)). This
general review and testing requirement
encompasses all reviews and tests the
designated FMU performs with respect
to such systems, policies, procedures,
and controls, including those performed
by the designated FMU’s business lines,
risk-management function, and audit
function. It does not, however, prescribe
specific types of tests that the
designated FMU must conduct.
The Board is proposing amendments
to the general review and testing
requirement that would provide more
specificity regarding its expectations.
Proposed § 234.3(a)(17)(i) would
emphasize that, just as the current
general review and testing requirement
applies broadly to the designated FMU’s
systems, policies, procedures, and
controls, the proposal’s requirements
would also apply broadly to the
systems, policies, procedures, and
controls developed to mitigate the
impact of the designated FMU’s sources
of operational risk.
1. Testing
Proposed § 234.3(a)(17)(i)(A)(1) would
require a designated FMU to conduct
tests of its systems, policies, procedures,
and controls in accordance with a
documented testing framework. The
documented testing framework would
need to address, at a minimum, the
scope and frequency of such testing,
who participates in such testing, and
how the results of such testing will be
reported. The testing framework would
also need to account for any
interdependencies between and among
the systems, policies, procedures, and
controls that are being tested.17 A
designated FMU could describe its
testing framework in either a single
document or in multiple documents, as
appropriate, and could leverage relevant
industry standards as it develops its
testing framework.18
Proposed § 234.3(a)(17)(i)(A)(2) would
require that the tests that a designated
FMU conducts assess whether its
systems, policies, procedures, or
controls function as intended. Such
tests could include capacity stress tests,
17 The proposal emphasizes the need for a
designated FMU to take a comprehensive and riskbased approach to its operational risk management
testing program, rather than focusing only on
testing individual (or groups of) systems, policies,
procedures, or controls (or components therein).
18 For example, a designated FMU could leverage
standards developed by the National Institute of
Standards and Technology (NIST) and the Federal
Financial Institutions Examination Council (FFIEC).
E:\FR\FM\05OCP1.SGM
05OCP1
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
crisis management tabletop exercises,
after-action reviews of incidents,
business continuity tests both internally
and with participants, vulnerability
assessments, cyber scenario-based
testing, penetration tests, and red team
tests. Importantly, as described further
below, a designated FMU would need to
remediate any deficiencies identified
during testing.
2. Review Scope
jspears on DSK121TN23PROD with PROPOSALS
Proposed § 234.3(a)(17)(i)(B) would
require a designated FMU to conduct a
review of the design, implementation,
and testing of relevant systems, policies,
procedures, and controls after the
designated FMU experiences any
material operational incidents (which
are discussed in section II.B.2 below). A
designated FMU would also need to
conduct such a review after significant
changes to the environment in which it
operates.19
The operational risk environment,
including sources of risk and the nature
or types of threats, can change
unexpectedly and quickly. The proposal
would ensure that designated FMUs
review and make timely changes to their
systems, policies, procedures, and
controls following such changes. For
example, the COVID–19 global
pandemic highlighted new risks and
challenges in the operational risk
environment that warrant a review of
relevant systems, policies, procedures,
and controls.
A designated FMU should consult
widely used and relevant industry
standards to inform its understanding of
how it should remediate any
deficiencies. These industry standards,
such as those published by the National
Institute of Standards and Technology
(NIST), the Federal Financial
Institutions Examination Council
(FFIEC), the Financial Services Sector
Coordinating Council (FSSCC), and the
International Organization for
Standardization (ISO), are updated
regularly and typically offer current and
specific information on operational risk
management practices.
4. Questions
With respect to proposed
§ 234.3(a)(17)(i)(A)–(C), the Board
requests comment on the following
specific questions:
1. Are the elements listed in
§ 234.3(a)(17)(i)(A)(1) the right elements
to include by rule in the testing
framework? What other elements should
be addressed in a rule for a testing
framework?
2. Are there challenges associated
with implementation of these proposed
requirements that the Board has not
considered?
B. Incident Management and
Notification
The Board is proposing to establish
incident management and notification
requirements in proposed
§ 234.3(a)(17)(vi).
3. Remediation of Identified
Deficiencies
1. Documented Incident Management
Framework
Finally, proposed § 234.3(a)(17)(i)(C)
would require a designated FMU to
remediate as soon as possible, following
established governance processes, any
deficiencies identified during tests and
reviews. A designated FMU would need
to assess whether such identified
deficiencies require urgent remediation
or are less urgent. In order to ensure that
remediation measures are effective, it
would be imperative for a designated
FMU to perform subsequent validation
to assess whether the remediation
measures have addressed deficiencies
without introducing new
vulnerabilities.
Proposed § 234.3(a)(17)(vi) would
require a designated FMU to establish a
documented framework for incident
management that provides for the
prompt detection, analysis, and
escalation of an incident; appropriate
procedures for addressing an incident;
and incorporation of lessons learned
following an incident.20
In line with the all-hazards approach
to operational risk management in this
standard, the Board believes it is
important for a designated FMU to be
prepared to detect, address, and learn
from any type of operational incident,
regardless of the scenario or source of
risk and the level of severity. Different
types of incidents may require different
levels of escalation internally or
externally. Different types of incidents
19 The Board is also proposing a technical
amendment to the requirement for the designated
FMU to review its recovery and orderly wind-down
plan under § 234.3(a)(3)(iii)(G) from ‘‘following’’ to
‘‘after’’ changes to the designated FMU’s systems
and environment. This conforms with the review
requirement under proposed § 234.3(a)(17)(i)(B).
The Board is also proposing a technical amendment
to the requirement for the designated FMU to
update its public disclosure under § 234.3(a)(23)(v)
from ‘‘following’’ to ‘‘to reflect’’ changes to its
systems and environment.
VerDate Sep<11>2014
17:19 Oct 04, 2022
Jkt 259001
20 These broad categories in incident management
are generally consistent with those identified in the
NIST computer-security incident handling guide.
See NIST, Computer Security Incident Handling
Guide (Special Publication 800–61, rev. 2), https://
nvlpubs.nist.gov/nistpubs/specialpublications/
nist.sp.800-61r2.pdf.
PO 00000
Frm 00004
Fmt 4702
Sfmt 4702
60317
may also require different strategies for
containment or eradication. For
example, given the increasing
prevalence of cyberattacks in the
financial sector, a designated FMU
should plan for an incident where a
participant (or another type of
connected entity), rather than the
designated FMU itself, is experiencing a
cyberattack. In this scenario, a
designated FMU should be
operationally prepared to take, and
should have a legal basis to take,
appropriate steps to mitigate the risk of
contagion to itself or other participants,
including but not limited to
disconnecting the participant from the
FMU if necessary. A designated FMU
should also have processes and
procedures to determine whether and
when it would be appropriate to allow
such a participant to reconnect to the
FMU.
The proposal would require that a
designated FMU’s incident management
framework include a plan for
notification and communication of
material operational incidents. This
plan would, among other things, need to
identify the entities that would be
notified of operational incidents,
including non-participants that could be
affected by material operational
incidents at the designated FMU and
appropriate industry informationsharing fora. Proposed
§ 234.3(a)(17)(vi)(A) and (B), which are
discussed further in sections II.B.2 and
II.B.3, would set forth more detailed
requirements for notification and
communication of material incidents to
ensure that the Board, the designated
FMU’s participants, and other relevant
entities receive timely notifications.
2. Incident Notification to the Board
Proposed § 234.3(a)(17)(vi)(A) would
require a designated FMU to notify the
Board of operational incidents.
In November 2021, the Board, FDIC,
and OCC jointly adopted the
interagency notification rule for banking
organizations and bank service
providers.21 The interagency
notification rule scoped out designated
FMUs, but the preamble to the
interagency rule explained that the
Board believes it is important for
designated FMUs to inform Federal
Reserve supervisors of operational
disruptions on a timely basis.22 The
preamble to the interagency rule also
noted that the Board would consider
proposing amendments to Regulation
21 86
FR 66424 (Nov. 23, 2021).
at 66428 (noting that ‘‘the Board has
generally observed such practice by designated
FMUs’’).
22 Id.
E:\FR\FM\05OCP1.SGM
05OCP1
60318
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
jspears on DSK121TN23PROD with PROPOSALS
HH in the future to formalize its
incident-notification expectations and
promote consistency between
requirements applicable to designated
FMUs that are supervised by the Board,
the U.S. Securities and Exchange
Commission (SEC), and the U.S.
Commodity Futures Trading
Commission (CFTC).23
Under proposed § 234.3(a)(17)(vi)(A),
a designated FMU would be required to
immediately notify the Board when it
activates its business continuity plan or
has a reasonable basis to conclude that
(1) there is an actual or likely
disruption, or material degradation, to
any of its critical operations or
services,24 or to its ability to fulfill its
obligations on time; or (2) there is
unauthorized entry, or the potential for
unauthorized entry, into the designated
FMU’s computer, network, electronic,
technical, automated, or similar systems
that affects or has the potential to affect
its critical operations or services. Given
the large volume and value of payment,
clearing, and settlement activity
processed by these entities and their
interconnectedness with financial
institutions and markets, material
operational issues occurring at these
designated FMUs could have financial
stability implications. It is therefore
critical for the Board to be notified
immediately of these types of issues.
Importantly, in addition to actual
disruptions, material degradation, or
unauthorized entries, the proposal
would also require immediate
notification to the Board if the
designated FMU has a reasonable basis
to conclude that a disruption or material
degradation is ‘‘likely’’ to occur or if
there is ‘‘potential’’ for unauthorized
entry into the designated FMU’s
computer, network, electronic,
technical, automated, or similar systems
that affects or has the potential to affect
its critical operations or services. For
example, a hurricane in the region
where the designated FMU is located
would not alone trigger notification;
23 Id. SEC-supervised designated FMUs are
subject to the SEC’s Regulation SCI, which
generally requires covered entities to notify the SEC
‘‘immediately’’ and their members or participants
‘‘promptly’’ of an SCI event. See 17 CFR 242.1000
(defining ‘‘SCI Event’’) and 242.1002 (imposing
notification requirements related to SCI Events).
Similarly, a CFTC-supervised designated FMU must
notify the CFTC ‘‘promptly’’ of an ‘‘exceptional
event’’. See 17 CFR 39.18(g). An ‘‘exceptional
event’’ includes ‘‘[a]ny hardware or software
malfunction, security incident, or targeted threat
that materially impairs, or creates a significant
likelihood of material impairment, of automated
system operation, reliability, security, or capacity;
or [a]ny activation of the designated FMU’s
business continuity and disaster recovery plan.’’ Id.
24 Critical operations and critical services are
discussed below in section II.E.2.
VerDate Sep<11>2014
17:19 Oct 04, 2022
Jkt 259001
however, if the designated FMU
concludes that such an event likely
would disrupt or materially degrade its
critical operations or services, then
notification would be required.
Similarly, in the case of potential
unauthorized entries, not all identified
vulnerabilities in its systems would
require an immediate notification.
However, if a designated FMU discovers
or becomes aware of an unexploited
vulnerability and determines that, if
exploited, such vulnerability could
result in a disruption or material
degradation of its critical operations or
service, the designated FMU would
need to notify the Board immediately of
such discovery.
The Board notes that ‘‘immediately’’
is meant to convey the urgency in
notifying the Board of these material
operational incidents; it does not mean
‘‘instantaneous’’ notification. The Board
would expect to be notified of an
operational incident once the
designated FMU activates its business
continuity plan or has a reasonable basis
to conclude that an incident meets any
of the criteria in proposed
§ 234.3(a)(17)(vi)(A)(1)–(2), even if the
designated FMU does not yet have
detailed information on the root cause
or measures for containment or
remediation. In these cases, the Board
would expect to receive any available
information that the designated FMU
has at the time of notification.
The Board recognizes that the
requirement for ‘‘immediate’’
notification to the Board would
establish a heightened requirement for
designated FMUs relative to banking
organizations.25 The proposed
requirement is consistent with the
systemic importance of designated
FMUs and with existing SEC and CFTC
incident notification requirements for
the designated FMUs for which either
the SEC or the CFTC is the Supervisory
Agency.
3. Incident Notification to Participants
and Other Relevant Entities
Proposed § 234.3(a)(17)(vi)(B) would
require a designated FMU to establish
criteria and processes, including the
appropriate methods of communication,
to provide for timely communication
and responsible disclosure of material
operational incidents to its participants
or other relevant entities that have been
identified in its notification and
communication plan.
25 Under the interagency notification rule, a
banking organization must notify its primary
Federal regulator of certain computer-security
incidents ‘‘as soon as possible and no later than 36
hours.’’ See 86 FR 66424, 66431–32 (discussing
timing of notification to agencies).
PO 00000
Frm 00005
Fmt 4702
Sfmt 4702
As proposed, this incident
notification requirement would arise in
two circumstances. First, a designated
FMU would need to notify affected
participants immediately in the event of
actual disruptions or material
degradation to its critical operations or
services or to its ability to fulfill its
obligations on time.26 This immediate
notification would ensure that affected
participants (e.g., participants
encountering delays or errors) are aware
that the issue originates from the
designated FMU and not their own
systems, in order to minimize confusion
in the markets that the designated FMU
serves and to allow participants to
assess the impact to their operations.
The term ‘‘immediately’’ is meant to
convey the urgency in notifying the
designated FMU’s participants of
disruptions or material degradation to
its services; it does not mean
‘‘instantaneous’’ notification.
Second, a designated FMU would
need to notify all participants and other
relevant entities 27 in a timely and
responsible manner of all other material
operational incidents that require
immediate notification to the Board.
When designing this part of its
communication plan, the Board would
expect a designated FMU to consider
the timing, content, recipients, and
method of notification for a range of
potential material operational incidents.
In determining the scope of disclosure
for a particular incident, the Board
would expect a designated FMU to
consider factors such as the riskmitigation benefits arising from early
warning to the financial system, the
safety and soundness of the designated
FMU, and any financial stability
implications of disclosure. The Board
recognizes that there might be risks to
providing early disclosures to a broad
audience regarding certain types of
material operational issues. For
example, if a designated FMU identifies
a cyber vulnerability, the designated
FMU might weigh the risk of disclosure
as sufficiently great to delay notification
or tailor the information provided to
avoid exposing the designated FMU to
a cyberattack.
26 The requirement for ‘‘immediate’’ notification
to affected participants would establish a
heightened requirement for designated FMUs
relative to those imposed on bank service providers
in the interagency rule (which requires notification
‘‘as soon as possible’’), consistent the systemic
importance of designated FMUs.
27 As described in section II.B.1, above, a
designated FMU would need to identify nonparticipant relevant entities in its plan for
notification and communication of material
operational incidents.
E:\FR\FM\05OCP1.SGM
05OCP1
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
4. Examples of Material Operational
Incidents
The following is a non-exhaustive list
of operational incidents that the Board
would consider to be material for
purposes of the proposal. The Board
would expect examples 1 and 2 to
trigger immediate notifications to the
Board and to the designated FMU’s
participants (and notification in a timely
manner to other relevant entities, as
applicable). The Board would expect
examples 3–5 to trigger immediate
notification to the Board, but believes
the designated FMU should determine
when they may trigger appropriately
timely notifications and disclosure to
participants and non-participant entities
based on the criteria in its notification
and communication plan.
(1) Large-scale distributed denial of
service attacks that prevent the
designated FMU from receiving its
participants’ payment instructions.
(2) A severe weather event or other
natural disaster that causes significant
damage to a designated FMU’s
production site and necessitates failover
to another site during the business day.
(3) Malware on a designated FMU’s
network that poses an imminent threat
to its critical operations or services
(such as its core payment, clearing, or
settlement processes, or collateral
management processes), or that may
require the designated FMU to
disengage any compromised products or
information systems that support the
designated FMU’s critical operations
and services from internet-based
network connections.
(4) A ransom malware attack that
encrypts a critical system or backup
data.
(5) A zero-day vulnerability on
software that the designated FMU uses
and has determined, if exploited, could
lead to a disruption to or material
degradation of its critical operations or
services.
jspears on DSK121TN23PROD with PROPOSALS
5. Questions
With respect to proposed
§ 234.3(a)(17)(vi), the Board requests
comment on the following specific
questions:
3. Do the requirements under
proposed § 234.3(a)(17)(vi)(A) strike the
proper balance between providing the
Board with early warning and allowing
designated FMUs sufficient time to
notify the Board?
4. How should the criteria for
determining whether operational
incidents are material enough to warrant
notification to the Board under
proposed § 234.3(a)(17)(vi)(A) be
modified, if at all?
VerDate Sep<11>2014
17:19 Oct 04, 2022
Jkt 259001
5. Should the Board provide
additional examples of material
operational incidents?
6. How should designated FMUs
provide notifications to the Board? For
example, should the Board establish a
centralized point of contact to receive
notifications, or should designated
FMUs notify their supervisory teams?
7. Is the proposed requirement on
planning for timely notification and
‘‘responsible disclosure’’ of material
operational incidents clear? Should a
term other than ‘‘responsible’’
disclosure be used, given the intention
of this proposed requirement, as
explained in section II.B.3 above?
8. Are there challenges associated
with implementing these proposed
requirements that the Board has not
considered?
C. Business Continuity Management and
Planning
Current § 234.3(a)(17)(vi) (which,
under the proposal, would be
renumbered as § 234.3(a)(17)(vii))
requires that a designated FMU have
business continuity management that
provides for rapid recovery and timely
resumption of its critical operations and
fulfillment of its obligations, including
in the event of a wide-scale or major
disruption. Current § 234.3(a)(17)(vii)
(which, under the proposal, would be
renumbered as § 234.3(a)(17)(viii))
elaborates on certain requirements for a
designated FMU’s business continuity
plan. Specifically, a business continuity
plan must incorporate the use of a
secondary site with a distinct risk
profile from the primary site; be
designed to enable critical systems to
recover and resume operations no later
than two hours following disruptive
events; be designed to complete
settlement by the end of the day of the
disruption, even in extreme
circumstances; and be tested at least
annually.
The proposed amendments to current
§ 234.3(a)(17)(vii) would provide further
detail in Regulation HH related to
business continuity management and
planning in order to promote robust risk
management, reduce systemic risks,
increase safety and soundness, and
support the stability of the broader
financial system.
1. Two Sites Providing for Sufficient
Redundancy
The proposal would amend current
§ 234.3(a)(17)(vii)(A) to update
terminology related to required backup
sites. Currently, § 234.3(a)(17)(vii)(A)
requires a designated FMU to have a
secondary site that is located at a
sufficient geographical distance from
PO 00000
Frm 00006
Fmt 4702
Sfmt 4702
60319
the primary site to have a distinct risk
profile. The Board proposes to replace
the references to ‘‘secondary site’’ and
‘‘primary site’’ with a general reference
to ‘‘two sites providing for sufficient
redundancy supporting critical
operations and services’’ that are located
at a sufficient geographical distance
from ‘‘each other’’ to have a distinct risk
profile (collectively, ‘‘two sites with
distinct risk profiles’’).
This proposed amendment would
accommodate data center arrangements
with multiple production sites, rather
than reflecting only the traditional
arrangement where one site is
considered ‘‘primary’’ and another site
is treated distinctly as a backup site.
The proposal would still require,
however, a minimum of two locations
that are sufficiently geographically
distant from each other to have a
distinct risk profile. Consistent with the
Board’s explanation when it adopted the
current text of Regulation HH in 2014,
the Board would consider sites to have
‘‘distinct risk profiles’’ if, for example,
they are not located in areas that would
be susceptible to the same severe
weather event (e.g., the same hurricane
zone) or on the same earthquake fault
line. These sites would likely also have
distinct power and telecom providers
and be operated by geographically
dispersed staff.
2. Recovery and Resumption
Current § 234.3(a)(17)(vi) establishes a
broad requirement for business
continuity management. Current
§ 234.3(a)(17)(vii)(B)–(C) sets specific
recovery and resumption objectives,
requiring that a designated FMU’s
business continuity plan be designed to
enable, respectively, recovery and
resumption no later than two hours
following disruptive events and
completion of settlement by the end of
the day of the disruption, even in case
of extreme circumstances.
Under the proposal, these
requirements would remain
substantively unchanged.28 Since the
Board established these requirements in
Regulation HH, the two-hour recovery
time objective has been a particular area
of focus during bilateral discussions
with Board-supervised designated
FMUs, as well as in broader domestic
and international fora, specifically in
the context of extreme cyber events. At
the center of those discussions is the
balance between timely recovery and
resumption of critical operations and
28 In addition to renumbering these sections as
§ 234.3(a)(17)(vii) and § 234.3(a)(17)(viii)(B)–(C),
respectively, the Board is proposing a technical
revision to § 234.3(a)(17)(vi), as described below in
section II.E.2.
E:\FR\FM\05OCP1.SGM
05OCP1
60320
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
jspears on DSK121TN23PROD with PROPOSALS
appropriate assurance that critical
operations are restored to a trusted state.
The Board continues to believe it is
imperative to financial stability that a
designated FMU be able to recover and
resume its critical operations and
services quickly after disruptive events,
physical and cyber, and to complete
settlement by the end of the day of the
disruption. In related discussions with
Board-supervised firms, and supported
by provisions in the CPMI–IOSCO Cyber
Guidance, Board staff has emphasized
that recovery time objectives are
necessary and critical targets around
which plans, systems, and processes
should be designed, enabling the firm to
meet the objective.29 However, these
recovery time objectives should not be
interpreted as a requirement for a
designated FMU to resume operations in
a compromised or otherwise untrusted
state.
Threats to designated FMUs’
operations continue to evolve, and the
Board expects that a designated FMU’s
business continuity planning will be a
dynamic process in which the
designated FMU works to update the
scenarios for which it plans on an
ongoing basis to meet its recovery and
resumption objectives. For many types
of disruptive scenarios, technology and
methods already exist to enable a
designated FMU to recover and resume
operations within two hours of the
disruption. For example, if an
earthquake damages a designated FMU’s
hardware and disrupts operations at one
data center, the designated FMU can fail
over to another location that is outside
the earthquake radius.
The Board recognizes, however, that
certain threats to designated FMUs’
operations, as well as the technology to
mitigate those threats, are continually
evolving. In areas where threats and
technology are still evolving, such as is
the case for extreme cyberattacks (e.g.,
where significant data loss or corruption
occurs across its data centers), the Board
recognizes that solutions are evolving
with the threat environment and require
a holistic approach that integrates
protective, detective, and containment
29 For example, paragraph 6.2.2 of the Cyber
Guidance notes that the objectives for resuming
operations set goals for, ultimately, the sound
functioning of the financial system, which should
be planned for and tested against. It further notes
the criticality of the recovery and resumption
objectives under Principle 17, Key Consideration 6
of the PFMI, while also acknowledging that
financial market infrastructures should exercise
judgment in effecting resumption so that risks to
itself or its ecosystem do not thereby escalate. For
additional details, see CPMI–IOSCO, Guidance on
Cyber Resilience for Financial Market
Infrastructures (June 2016) at section 6, https://
www.bis.org/cpmi/publ/d146.htm (‘‘Response and
Recovery’’).
VerDate Sep<11>2014
17:19 Oct 04, 2022
Jkt 259001
measures with response, recovery, and
resumption solutions. The Board
continues to expect that a designated
FMU’s business continuity planning
will be a dynamic process in which the
designated FMU works on an ongoing
basis to update its plan to recover and
resume operations to achieve its
objectives in light of these evolving
threats. Federal Reserve supervisors will
also continue to work with designated
FMUs through the supervisory process
as designated FMUs identify reasonable
approaches to prepare for and recover
from such attacks. As development of
adequate solutions for extreme
cyberattacks continues, designated
FMUs should also plan for contingency
scenarios in which planned recovery
and resumption objectives cannot be
achieved. Planning for such scenarios
would also be in accordance with
national policies aimed at improving the
cybersecurity posture of U.S. critical
infrastructures.30
reconnect to its participants and other
relevant entities. Given the current
threat landscape and the ability for
malware to spread, the Board believes it
is crucial for a designated FMU to be
prepared to balance the need for the
designated FMU to quickly recover and
resume its critical operations against the
risk of contagion to its ecosystem should
it resume operations in an unsafe state
(e.g., before an extremely harmful
computer virus is fully contained or
eradicated). For cyber incidents, it is
particularly important for a designated
FMU to be prepared to assure its
participants, other connected entities,
and regulator(s) that its remediation
efforts are complete and that it has
achieved a safe and trusted state.31 A
designated FMU should consider
establishing a phased approach to
reconnecting to the designated FMU’s
participants and other relevant entities,
transaction testing with selected
participants before full reconnection,
and heightened monitoring for an
appropriate period of time after
reconnection.
3. Reconnection After a Disruption to
the Designated FMU’s Critical
Operations or Services
Proposed § 234.3(a)(17)(viii)(D) would
require that the business continuity plan
set out criteria and processes that
address the reconnection of a designated
FMU to its participants and other
entities following a disruption to the
designated FMU’s critical operations or
services. In this context, the Board
would consider a disruption to a
designated FMU’s critical operations or
services broadly as a form of
‘‘disconnection’’ to external parties such
as the designated FMU’s participants.
This would include situations where a
designated FMU deliberately takes itself
offline such that participants cannot
access its services (e.g., if it experiences
a major cyberattack that it needs to
contain); it would also include
situations where a designated FMU
loses connection to its participants due
to another type of external event (e.g., if
its production site loses power due to a
severe weather event in its region).
The Board believes that the current
requirements to plan for recovery and
resumption include an implicit
expectation that a designated FMU plan
to reconnect to its participants and other
relevant entities following a disruption.
However, the Board is proposing to
make this expectation explicit in order
to emphasize the importance of ex ante
criteria and processes addressing when
and how a designated FMU will
4. Business Continuity Testing
The proposal would amend current
§ 234.3(a)(17)(vii)(D), which requires the
business continuity plan to be ‘‘tested at
least annually,’’ by separating it into
two requirements (proposed
§ 234.3(a)(17)(viii)(E) and (F)).
Proposed § 234.3(a)(17)(viii)(E) would
maintain the requirement for at least
annual testing and clarify that this
requirement covers the designated
FMU’s business continuity
arrangements, including the people,
processes, and technologies of the two
sites with distinct risk profiles.32 The
required testing would need to
demonstrate that the designated FMU is
able to run live production at the two
sites with distinct risk profiles; that its
solutions for data recovery and data
reconciliation enable it to meet its
objectives to recover and resume
operations two hours following a
disruption and enable settlement by the
end of the day of the disruption even in
case of extreme circumstances including
if there is data loss or corruption; and
that it has geographically dispersed staff
who can effectively run the operations
and manage the business of the
designated FMU.
The Board believes that a designated
FMU must be able to demonstrate these
particular capabilities in order verify
that its business continuity
30 See, e.g., Presidential Policy Directive/PPD–21,
Critical Infrastructure Security and Resilience (Feb.
12, 2013), https://obamawhitehouse.archives.gov/
the-press-office/2013/02/12/presidential-policydirective-critical-infrastructure-security-and-resil.
31 A designated FMU might consider leveraging
third-party experts to verify its remediation efforts.
32 These tests would be subject to the general
testing requirements described in section II.A.1
above.
PO 00000
Frm 00007
Fmt 4702
Sfmt 4702
E:\FR\FM\05OCP1.SGM
05OCP1
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
arrangements will function as intended
in achieving the recovery and
resumption objectives in its business
continuity plan. For example, given the
importance of developing effective
solutions for data recovery and
reconciliation to address extreme cyber
scenarios, the Board believes that
designated FMUs should expressly be
required to demonstrate that such
solutions function as intended.
Designated FMUs should also continue
to plan for and test other scenarios,
including wide-scale disruptions and
major disruptions, from which they may
need to recover.33
Proposed § 234.3(a)(17)(viii)(F) would
require a designated FMU to review its
business continuity plans, pursuant to
the general review requirements
described in section II.A.2 above, at
least annually. The objectives of this
review are twofold: (1) to incorporate
lessons learned from actual and averted
disruptions, and (2) to update the
scenarios considered and assumptions
built into the plan in order to ensure
responsiveness to the evolving risk
environment and incorporate new and
evolving sources of operational risk
(e.g., extreme cyber events).
jspears on DSK121TN23PROD with PROPOSALS
5. Questions
With respect to proposed
§ 234.3(a)(17)(viii), the Board requests
comment on the following specific
questions:
9. What are reasonable estimates of
the costs and other challenges
associated with proposed
§ 234.3(a)(17)(viii)?
10. Is the proposed formulation of
‘‘two sites providing for sufficient
redundancy supporting critical
operations’’ a clear and appropriate
replacement for references to ‘‘primary’’
and ‘‘secondary’’ sites in the current
rule?
11. Is the proposed requirement on
addressing ‘‘reconnection’’ of the
designated FMU after a disruption
clear? Should a different term be used,
given the intention of this proposed
requirement, as explained in section
II.C.3 above?
D. Third-Party Risk Management
The Board expects a designated FMU
to conduct its activities—whether
conducted directly by the designated
FMU or through a service provider—in
a safe and sound manner. The Board is
33 Scenarios-based testing allows a designated
FMU to address an appropriately broad scope of
scenarios, including simulation of extreme but
plausible events, and should be designed to
challenge the assumptions of response, resumption,
and recovery practices, including governance
arrangements and communication plans.
VerDate Sep<11>2014
17:19 Oct 04, 2022
Jkt 259001
proposing to add § 234.3(a)(17)(ix)
regarding the management of risks
associated with third-party
relationships. Proposed
§ 234.3(a)(17)(ix) would require a
designated FMU to have systems,
policies, procedures, and controls in
order to effectively identify, monitor,
and manage risks associated with thirdparty relationships. Additionally, for
any service that is performed for the
designated FMU by a third party, these
systems, policies, procedures, and
controls would need to ensure that risks
are identified, monitored, and managed
to the same extent as if the designated
FMU were performing the service itself.
Importantly, the risks associated with
third-party relationships would include
both the risks stemming from the third
party itself, as well as risks stemming
from the supply chain.
Additionally, the Board is proposing
to add ‘‘third party’’ as a defined term
in Regulation HH. Specifically,
proposed § 234.2(n) would define ‘‘third
party’’ as ‘‘any entity with which a
designated FMU maintains a business
arrangement, by contract or
otherwise.’’ 34 For the purposes of
proposed § 234.3(a)(17)(ix), the Board
would consider third-party
relationships to include vendor
relationships for products such as for
software and arrangements for any
services that third parties perform for a
designated FMU.35 Services can include
a wide variety of arrangements, from
HVAC services that support the physical
infrastructure of the designated FMU to
technology platforms or financial risk
management modeling that are essential
to executing the designated FMU’s
payment, clearing, or settlement
activities. The Board believes that where
a designated FMU outsources the
provision of services to a third party, the
designated FMU retains the
responsibility for meeting the riskmanagement standards in Regulation
HH.
34 Participants of designated FMUs would not be
considered third parties. This definition is
consistent with the definition of ‘‘third-party
relationship’’ in the proposed interagency guidance
on third-party relationships. See 86 FR 38182,
38186–87 (July 17, 2021). The Board views the
requirements of proposed § 234.3(a)(17)(ix) as
broadly consistent with the proposed interagency
guidance. In examining designated FMUs under
Regulation HH, Board examiners will continue to
reference guidance on third-party risk management.
35 Relatedly, the Board believes this proposal is
consistent with section 807(b) of the Dodd-Frank
Act, which provides each Supervisory Agency of a
designated FMU with authority examine the
provision of any service integral to the operation of
the designated FMU for compliance with applicable
law, rules, orders, and standards to the same extent
as if the designated FMU were performing the
service on its own premises. 12 U.S.C. 5466(b).
PO 00000
Frm 00008
Fmt 4702
Sfmt 4702
60321
The Board is proposing these
requirements because of the importance
of ensuring that a designated FMU’s
activities do not become less safe when
they are outsourced to third parties, and
because of the importance of managing
particular sources of operational risk
associated with third-party
relationships, including ‘‘supply chain
risk.’’ 36 Supply chain risk encompasses
the potential for harm or compromise to
a designated FMU that arises as a result
of security risks from its third parties’
subcontractors or suppliers, as well as
the subcontractors’ or suppliers’ supply
chains, and their products or services
(including software that may be used by
the third party or the designated
FMU).37
Further, proposed § 234.3(a)(17)(ix)
would require a designated FMU to
regularly conduct risk assessments of its
third-party relationships and establish,
as appropriate, information-sharing
arrangements with third parties.
Proposed § 234.3(a)(17)(ix) would also
require a designated FMU to include
third parties in business continuity
management and testing, as appropriate.
The Board believes these specific
measures are critical to a designated
FMU’s ability to effectively manage
risks related to third-party relationships.
In general, the Board would expect a
designated FMU to take a rigorous
approach to identifying, monitoring,
and managing risks associated with
third-party relationships. To identify
and assess the risks from third parties
effectively, it would be prudent for the
designated FMU to understand ex ante
any risks associated with the third
party, including details on the services
or products the third party will provide
and the security controls that the third
party has in place. Before entering into
a third-party relationship, the
designated FMU should have a plan in
place to address how it will effectively
identify, monitor, and manage the
relationship and its associated risks, in
order to ensure that the designated FMU
can continue to meet the riskmanagement requirements in Regulation
HH. A designated FMU should conduct
36 The Board identified supply chain risk as a
threat on which the Board is focused in its report
on cybersecurity and financial system resilience.
See Board of Governors of the Federal Reserve
System, Report to Congress: Cybersecurity and
Financial System Resilience Report (September
2021), https://www.federalreserve.gov/publications/
files/cybersecurity-report-202109.pdf.
37 This definition is consistent with NIST’s
definition of ‘‘supply chain risk’’ in the NIST
computer-security incident handling guide. See
NIST, Computer Security Incident Handling Guide
(Special Publication 800–61, rev. 2), https://
nvlpubs.nist.gov/nistpubs/specialpublications/
nist.sp.800-61r2.pdf.
E:\FR\FM\05OCP1.SGM
05OCP1
60322
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
jspears on DSK121TN23PROD with PROPOSALS
appropriate due diligence on third
parties and should include, as
appropriate, provisions in service
contracts that establish informationsharing agreements based on the risk
level of the third party. Informationsharing arrangements should include,
where necessary, expectations related to
when the designated FMU would be
notified of material operational
incidents at the third party.
To assess risk levels of third parties
and monitor any changes in these risk
levels that may affect a designated FMU
and its ecosystem, the designated FMU
should ensure that it regularly conducts
risk assessments of its third-party
relationships and that its informationsharing agreements include, where
appropriate, information on the third
party’s information security controls
and operational resilience objectives
and capabilities. To manage risks posed
by third parties, a designated FMU
should adopt risk management practices
that are commensurate with the level of
risk posed by its third-party
relationships, as identified through the
risk assessments it conducts. For
example, to manage supply chain risks,
a designated FMU might require, in its
contracts with certain third parties that
are critical to its operations and
services, mandatory approval from the
designated FMU before the service
provider may outsource any material
elements of its service to another party.
In addition, a designated FMU should
include third parties in its business
continuity management and testing, as
appropriate. A designated FMU should
run scenario exercises with third parties
to ensure that the designated FMU can
effectively manage any instances in
which a third party experiences an
incident causing disruption or material
degradation to the designated FMU’s
critical operations or services. For
example, a designated FMU should be
prepared to react—such as by switching
to a contingency plan—to a cyberattack
on one of its third parties that causes
disruptions in that entity’s ability to
enable the designated FMU to fulfill its
obligations on time.
1. Questions
With respect to proposed
§ 234.3(a)(17)(ix), the Board requests
comment on the following specific
questions:
12. Are there other risk-management
measures that are essential to effective
management of third-party relationship
risks that the Board should consider
setting as an explicit minimum
requirement?
13. Is the proposed requirement on
managing risks associated with ‘‘third-
VerDate Sep<11>2014
17:19 Oct 04, 2022
Jkt 259001
party’’ relationships clear? Should a
different term be used, given the
intention of this proposed requirement,
as explained in section II.D above?
14. Are there challenges associated
with implementation of this proposed
requirement that the Board has not
considered?
15. Should the proposed requirements
related to third-party risk management
be codified in § 234.3(a)(17) as
proposed, or should the Board consider
an alternative placement for these
requirements in Regulation HH?
E. Technical Revisions
1. Definition of Operational Risk
Proposed § 234.2(h) would add
‘‘operational risk’’ as a defined term in
Regulation HH. Under the proposal, this
term is defined as ‘‘the risk that
deficiencies in information systems or
internal processes, human errors,
management failures, or disruptions
from external events will result in the
reduction, deterioration, or breakdown
of services provided by the designated
financial market utility.’’
The proposed definition of
‘‘operational risk’’ is consistent with the
definition for operational risk in the
PFMI and the Board’s definition in part
I of the Federal Reserve Policy on
Payment System Risk (PSR policy),
which sets out the Board’s views, and
related standards, regarding the
management of risks in financial market
infrastructures, including those
operated by the Reserve Banks.38 The
Board also provided this definition of
operational risk when it proposed the
current operational risk-management
standard in Regulation HH in 2014;
however, the Board did not believe a
defined term in the rule text was
necessary at that time. For clarifying
purposes, the Board is proposing to
adopt ‘‘operational risk’’ as a defined
term.
2. Definition of Critical Operations and
Critical Services
Proposed § 234.2(d) would add
‘‘critical operations’’ and ‘‘critical
services’’ as defined terms in Regulation
HH, in order to streamline references to
these terms. Under the proposal, these
terms are defined as ‘‘any operations or
services that the designated financial
market utility identifies under 12 CFR
234.3(a)(3)(iii)(A).’’ Under
§ 234.3(a)(3)(iii)(A), a designated FMU
must identify its critical operations and
services related to payment, clearing,
and settlement for purposes of
38 The Board revised concurrently the riskmanagement standards in Regulation HH and part
I of the PSR policy based on the PFMI in 2014.
PO 00000
Frm 00009
Fmt 4702
Sfmt 4702
developing its integrated plans for
recovery and orderly wind-down.
The Board’s proposed amendments to
§ 234.3(a)(17) related to review and
testing, incident management and
planning, and business continuity
management planning, refer to a
designated FMU’s critical operations
and/or services in multiple places.
Amending Regulation HH to include
definitions of ‘‘critical operations’’ and
‘‘critical services’’ would clarify that the
critical operations or services that the
designated FMU should consider under
paragraph (a)(17) are the same set of
critical operations and services that the
designated FMU has identified under
paragraph (a)(3). These technical
revisions are not expected to result in
changes to designated FMUs’ business
continuity management and planning.
3. Cross-Reference to ‘‘Other Entities’’
Identified in § 234.3(a)(3) on
Comprehensive Management of Risk
Current § 234.3(a)(17)(ii) requires a
designated FMU to identify, manage,
and monitor the risks that its operations
might pose to other ‘‘financial market
utilities and trade repositories, if any.’’
The Board proposes to streamline and
replace this reference with other
‘‘relevant entities such as those
referenced in paragraph (a)(3)(ii).’’ The
Board believes this requirement is
consistent with the current requirement
under subparagraph (a)(3)(ii) for the
designated FMU to identify, measure,
monitor, and manage the material risks
that it poses to other entities, such as
other FMUs, settlement banks, liquidity
providers, and service providers, as a
result of interdependencies. As a
conforming revision, the Board is
proposing to include ‘‘trade
repositories’’ in the list of entities listed
under paragraph (a)(3)(ii).39
4. Operational Capabilities To Ensure
High Degree of Security and Operational
Reliability
Current § 234.3(a)(17)(iii) requires a
designated FMU to have ‘‘policies and
systems’’ that are designed to achieve
clearly defined objectives to ensure a
high degree of security and operational
reliability. The Board expects a
designated FMU to establish clearly
defined objectives to ensure a high
degree of security and operational
reliability; to have systems designed to
achieve these objectives; and to have
policies, such as benchmarks, in place
39 Because of the differences in the definition for
financial market infrastructure in the PFMI, which
includes trade repositories, and the definition of
FMU in the Dodd-Frank Act, which does not, the
Board inadvertently excluded the reference to
‘‘trade repositories’’ in § 234.3(a)(3)(ii).
E:\FR\FM\05OCP1.SGM
05OCP1
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
for the designated FMU to evaluate its
systems’ performance against these
objectives.
A designated FMU is implicitly
required to have the operational
capability to achieve these objectives.
The Board is proposing to make this
requirement explicit by clarifying that a
designated FMU must have ‘‘operational
capabilities’’—in addition to policies
and systems—that are designed to
achieve clearly defined objectives to
ensure a high degree of security and
operational reliability. This additional
emphasis on having operational
capabilities in addition to policies and
systems is in line with proposed
§ 234.3(a)(17)(i)(A)(2), which
emphasizes the need for a designated
FMU to assess whether its relevant
systems, policies, procedures, and
controls function as intended.
5. Identify, Monitor, and Manage
Potential and Evolving Vulnerabilities
and Threats
Current § 234.3(a)(17)(v) requires a
designated FMU to have comprehensive
physical, information, and cyber
security policies, procedures, and
controls ‘‘that address’’ potential and
evolving vulnerabilities and threats. The
Board is proposing to replace the quoted
text with ‘‘that enable the designated
financial market utility to identify,
monitor, and manage’’ potential and
evolving vulnerabilities and threats. The
Board believes this is a technical change
that would clarify what it means to
‘‘address’’ potential and evolving
vulnerabilities and threats.
6. Questions
With respect to the proposed set of
technical amendments, the Board
requests comment on the following
specific question:
16. Would any of these proposed
amendments effect a substantive
change? If so, how?
jspears on DSK121TN23PROD with PROPOSALS
A. Regulatory Flexibility Act Analysis
The Regulatory Flexibility Act, 5
U.S.C. 601 et seq. (RFA), requires an
agency to consider the impact of its
proposed rules on small entities. In
connection with a proposed rule, the
RFA generally requires an agency to
prepare an Initial Regulatory Flexibility
Analysis (IRFA) describing the impact
of the rule on small entities, unless the
head of the agency certifies that the
proposed rule will not have a significant
economic impact on a substantial
number of small entities and publishes
such certification along with a statement
providing the factual basis for such
17:19 Oct 04, 2022
Jkt 259001
1. Reasons Action Is Being Considered
The Board is proposing to amend
Regulation HH to update current
standards related to operational risk
management in light of developments in
the operational risk, technology, and
regulatory landscape in which
designated FMUs operate. Further
discussion of the rationale for the
proposal is provided in section I.C,
above.
2. Objectives of the Proposed Rule
III. Administrative Law Matters
VerDate Sep<11>2014
certification in the Federal Register. An
IRFA must contain (1) a description of
the reasons why action by the agency is
being considered; (2) a succinct
statement of the objectives of, and legal
basis for, the proposed rule; (3) a
description of, and, where feasible, an
estimate of the number of small entities
to which the proposed rule will apply;
(4) a description of the projected
reporting, recordkeeping, and other
compliance requirements of the
proposed rule, including an estimate of
the classes of small entities that will be
subject to the requirement and the type
of professional skills necessary for
preparation of the report or record; (5)
an identification, to the extent
practicable, of all relevant Federal rules
that may duplicate, overlap with, or
conflict with the proposed rule; and (6)
a description of any significant
alternatives to the proposed rule that
accomplish its stated objectives.
The Board is providing an IRFA with
respect to the proposed rule. For the
reasons described below, the Board
believes that the proposal will not have
a significant economic impact on a
substantial number of small entities.
The Board invites public comment on
all aspects of its IRFA.
As described in section I.B, above,
section 805(a)(1)(A) of the Dodd-Frank
Act requires the Board to prescribe riskmanagement standards, taking into
consideration relevant international
standards and existing prudential
requirements, applicable to certain
designated FMUs. Pursuant to this
authority, the Board issued Regulation
HH in 2012 and significantly revised
Regulation HH in 2014. The Board is
now proposing revisions to the current
Regulation HH standards related to
operational risk management. The
Board’s objective is to promote effective
operational risk management practices
at and the operational resilience of
designated FMUs subject to Regulation
HH, and as a result, advance safety and
soundness and promote the stability of
the U.S. financial system.
PO 00000
Frm 00010
Fmt 4702
Sfmt 4702
60323
3. Description and Estimate of the
Number of Small Entities
Regulation HH applies to designated
FMUs other than derivatives clearing
organizations registered with the CFTC
and clearing agencies registered with
the SEC. At present, the FSOC has
designated eight FMUs as systemically
important; two of these designated
FMUs are subject to the Board’s
Regulation HH.
The Small Business Administration
(SBA) has adopted size standards for
determining whether a particular entity
is considered a ‘‘small entity’’ for
purposes of the RFA. The Board
believes that the most appropriate SBA
size standard to apply in determining
whether a designated FMU is a small
entity is the SBA size standard for
financial transactions processing,
reserve, and clearinghouse activities;
under this standard, a designated FMU
is considered a small entity if its annual
receipts are less than $41.5 million.40
When applying this SBA size standard,
the Board includes the assets of all
domestic and foreign affiliates in
determining whether to classify a
designated FMU as a small entity.41
After applying this SBA size standard,
the Board believes that neither of the
designated FMUs that are subject to
Regulation HH are considered small
entities.
4. Estimating Compliance Requirements
The proposal updates current
standards in Regulation HH related to
operational risk management in light of
developments in the operational risk,
technology, and regulatory landscape in
which designated FMUs operate. The
proposed revisions are discussed in
detail in section II, above. In general, the
proposed revisions would add
specificity to the current operational
risk management standards by codifying
existing practices of designated FMUs
into the regulation. Because the
proposed revisions do not represent a
significant change from existing
practices of designated FMUs, the Board
would not expect the proposed
revisions to have a significant economic
impact on those small entities.
40 13 CFR 121.201 (subsector 522320).
Alternatively, the SBA size standards for (1)
securities and commodities exchanges, (2) trust,
fiduciary, and custody activities, or (3) international
trade financing activities could also apply to certain
designated FMUs; these size standards are currently
the same as the size standard for financial
transactions processing, reserve, and clearinghouse
activities (i.e., annual receipts of less than $41.5
million). Id. (subsectors 523210, 523991, and
522293).
41 13 CFR 121.103.
E:\FR\FM\05OCP1.SGM
05OCP1
60324
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
5. Duplicative, Overlapping, and
Conflicting Rules
The Board is not aware of any federal
rules that may duplicate, overlap with,
or conflict with the proposed rule.
jspears on DSK121TN23PROD with PROPOSALS
6. Significant Alternatives Considered
The Board did not consider any
significant alternatives to the proposed
rule. The Board believes that updating
the current Regulation HH standards
related to operational risk management
in light of developments in the
operational risk, technology, and
regulatory landscape in which
designated FMUs operate is the best
way to achieve the Board’s objectives of
promoting effective operational risk
management practices at and the
operational resilience of designated
FMUs subject to Regulation HH, and as
a result, advancing safety and
soundness and promoting the stability
of the U.S. financial system.
B. Competitive Impact Analysis
As a matter of policy, the Board
conducts a competitive impact analysis
in connection with any operational or
legal changes that could have a
substantial effect on payment system
participants, even if competitive effects
are not apparent on the face of the
proposal. Pursuant to this policy, the
Board assesses whether proposed
changes ‘‘would have a direct and
material adverse effect on the ability of
other service providers to compete
effectively with the Federal Reserve in
providing similar services’’ and whether
any such adverse effect ‘‘was due to
legal differences or due to a dominant
market position deriving from such legal
differences.’’ If, as a result of this
analysis, the Board identifies an adverse
effect on competition, the Board then
assesses whether the associated
benefits—such as improvements to
payment system efficiency or integrity—
can be achieved while minimizing the
adverse effect on competition.42
Designated FMUs are subject to the
supervisory framework established
under Title VIII of the Dodd-Frank Act.
This proposed rule revises current
Regulation HH operational riskmanagement standards for certain
designated FMUs. At least one
designated FMU that is currently subject
to Regulation HH competes with a
similar service provided by the Reserve
Banks.
Under the Federal Reserve Act, the
Board has general supervisory authority
42 See Policies: The Federal Reserve in the
Payments System (issued 1984; revised 1990 and
January 2001), https://www.federalreserve.gov/
paymentsystems/pfs_frpaysys.htm.
VerDate Sep<11>2014
17:19 Oct 04, 2022
Jkt 259001
over the Reserve Banks, including the
Reserve Banks’ provision of payment
and settlement services. This general
supervisory authority is more extensive
in scope than the Board’s authority over
certain designated FMUs under Title
VIII. In practice, Board oversight of the
Reserve Banks goes beyond the typical
supervisory framework for privatesector entities, including the framework
provided by Title VIII. The Board is
committed to applying risk-management
standards to the Reserve Banks’ Fedwire
Funds Service and Fedwire Securities
Service (collectively, Fedwire Services)
that are at least as stringent as the
Regulation HH standards that are
applied to designated FMUs that
provide similar services. This would
continue to be the case if the proposed
revisions to the operational risk
management standards in Regulation
HH are adopted. Specifically, the
Fedwire Services are subject to in the
risk-management standards in part I of
the PSR policy, which (like those in
Regulation HH) are based on the PFMI.
The Board is be guided by its
interpretation of the corresponding
provisions of Regulation HH in its
application of the risk management
expectations in the PSR policy.43
Therefore, the Board does not believe
the proposed rule will have any direct
and material adverse effect on the
ability of other service providers to
compete with the Reserve Banks.
C. Paperwork Reduction Act Analysis
In accordance with the Paperwork
Reduction Act of 1995 (44 U.S.C. 3506;
5 CFR part 1320, Appendix A.1), the
Board reviewed the proposed rule under
the authority delegated to the Board by
the Office of Management and Budget.
For purposes of calculating burden
under the Paperwork Reduction Act, a
‘‘collection of information’’ involves 10
or more respondents. Any collection of
information addressed to all or a
substantial majority of an industry is
presumed to involve 10 or more
respondents (5 CFR 1320.3(c),
1320.3(c)(4)(ii)). The Board estimates
there are fewer than 10 respondents and
these respondents do not represent all
or a substantial majority of the
participants in payment, clearing, and
settlement systems. Therefore, no
collections of information under the
Paperwork Reduction Act are contained
in the proposed rule.
List of Subjects in 12 CFR Part 234
Banks, banking, Credit, Electronic
funds transfers, Financial market
utilities, Securities.
43 See
PO 00000
section I.B.1 of the PSR policy.
Frm 00011
Fmt 4702
Sfmt 4702
For the reasons set forth in the
preamble, the Board proposes to amend
part 234 of chapter II of title 12 of the
Code of Federal Regulations, as follows:
PART 234—DESIGNATED FINANCIAL
MARKET UTILITIES (REGULATION HH)
1. The authority citation for part 234
continues to read as follows:
■
Authority: 12 U.S.C. 5461 et seq.
■
2. Revise § 234.2 as follows:
§ 234.2
Definitions.
(a) Backtest means the ex post
comparison of realized outcomes with
margin model forecasts to analyze and
monitor model performance and overall
margin coverage.
(b) Central counterparty means an
entity that interposes itself between
counterparties to contracts traded in one
or more financial markets, becoming the
buyer to every seller and the seller to
every buyer.
(c) Central securities depository
means an entity that provides securities
accounts and central safekeeping
services.
(d) Critical operations and critical
services refer to any operations or
services that the designated financial
market utility identifies under 12 CFR
234.3(a)(3)(iii)(A).
(e) Designated financial market utility
means a financial market utility that is
currently designated by the Financial
Stability Oversight Council under
section 804 of the Dodd-Frank Act (12
U.S.C. 5463).
(f) Financial market utility has the
same meaning as the term is defined in
section 803(6) of the Dodd-Frank Act
(12 U.S.C. 5462(6)).
(g) Link means, for purposes of
§ 234.3(a)(20), a set of contractual and
operational arrangements between two
or more central counterparties, central
securities depositories, or securities
settlement systems, or between one or
more of these financial market utilities
and one or more trade repositories, that
connect them directly or indirectly,
such as for the purposes of participating
in settlement, cross margining, or
expanding their services to additional
instruments and participants.
(h) Operational risk means the risk
that deficiencies in information systems
or internal processes, human errors,
management failures, or disruptions
from external events will result in the
reduction, deterioration, or breakdown
of services provided by the designated
financial market utility.
(i) Orderly wind-down means the
actions of a designated financial market
utility to effect the permanent cessation,
sale, or transfer of one or more of its
E:\FR\FM\05OCP1.SGM
05OCP1
jspears on DSK121TN23PROD with PROPOSALS
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
critical operations or services in a
manner that would not increase the risk
of significant liquidity or credit
problems spreading among financial
institutions or markets and thereby
threaten the stability of the U.S.
financial system.
(j) Recovery means, for purposes of
§ 234.3(a)(3) and (15), the actions of a
designated financial market utility,
consistent with its rules, procedures,
and other ex ante contractual
arrangements, to address any uncovered
loss, liquidity shortfall, or capital
inadequacy, whether arising from
participant default or other causes (such
as business, operational, or other
structural weaknesses), including
actions to replenish any depleted
prefunded financial resources and
liquidity arrangements, as necessary to
maintain the designated financial
market utility’s viability as a going
concern and to continue its provision of
critical services.
(k) Securities settlement system means
an entity that enables securities to be
transferred and settled by book entry
and allows transfers of securities free of
or against payment.
(l) Stress test means the estimation of
credit or liquidity exposures that would
result from the realization of potential
stress scenarios, such as extreme price
changes, multiple defaults, and changes
in other valuation inputs and
assumptions.
(m) Supervisory Agency has the same
meaning as the term is defined in
section 803(8) of the Dodd-Frank Act
(12 U.S.C. 5462(8)).
(n) Third party means any entity with
which a designated financial market
utility maintains a business
arrangement, by contract or otherwise.
(o) Trade repository means an entity
that maintains a centralized electronic
record of transaction data, such as a
swap data repository or a security-based
swap data repository.
■ 3. Amend § 234.3 by:
■ (a) Revising the section heading;
■ (b) Adding the words ‘‘trade
repositories,’’ after the words ‘‘such as
other financial market utilities,’’ in
paragraph (a)(3)(ii);
■ (c) Removing the word ‘‘following’’
and adding in its place ‘‘after’’, in
paragraph
■ (a)(3)(iii)(G);
■ (d) Revising paragraph (a)(17); and
■ (e) Removing the word ‘‘following’’
and adding in its place ‘‘to reflect’’, in
paragraph (a)(23)(v).
The revisions read as follows:
§ 234.3 Standards for designated financial
market utilities.
(a) * * *
VerDate Sep<11>2014
17:19 Oct 04, 2022
Jkt 259001
(17) Operational risk. The designated
financial market utility manages its
operational risks by establishing a
robust operational risk-management
framework that is approved by the board
of directors. In this regard, the
designated financial market utility—
(i) Identifies the plausible sources of
operational risk, both internal and
external, and mitigates their impact
through the use of appropriate systems,
policies, procedures, and controls—
including those specific systems,
policies, procedures, or controls
required pursuant to this paragraph
(a)(17)—that are reviewed, audited, and
tested periodically and after major
changes such that—
(A) The designated financial market
utility conducts tests—
(1) In accordance with a documented
testing framework that addresses scope,
frequency, participation,
interdependencies, and reporting; and
(2) That assess whether the designated
financial market utility’s systems,
policies, procedures, or controls
function as intended;
(B) The designated financial market
utility reviews the design,
implementation, and testing of systems,
policies, procedures, and controls, after
material operational incidents,
including the material operational
incidents described in paragraph
(a)(17)(vi)(A) of this section, or after
significant changes to the environment
in which the designated financial
market utility operates; and
(C) The designated financial market
utility remediates as soon as possible,
following established governance
processes, any deficiencies in systems,
policies, procedures, or controls
identified in the process of review or
testing;
(ii) Identifies, monitors, and manages
the risks its operations might pose to
other relevant entities such as those
referenced in paragraph (a)(3)(ii) of this
section;
(iii) Has policies, systems, and
operational capabilities that are
designed to achieve clearly defined
objectives to ensure a high degree of
security and operational reliability;
(iv) Has systems that have adequate,
scalable capacity to handle increasing
stress volumes and achieve the
designated financial market utility’s
service-level objectives;
(v) Has comprehensive physical,
information, and cyber security policies,
procedures, and controls that enable the
designated financial market utility to
identify, monitor, and manage potential
and evolving vulnerabilities and threats;
(vi) Has a documented framework for
incident management that provides for
PO 00000
Frm 00012
Fmt 4702
Sfmt 4702
60325
the prompt detection, analysis, and
escalation of an incident, appropriate
procedures for addressing an incident,
and incorporation of lessons learned
following an incident. This framework
includes a plan for notification and
communication of material operational
incidents to identified relevant entities
that ensures the designated financial
market utility—
(A) Immediately notifies the Board
when the designated financial market
utility activates its business continuity
plan or has a reasonable basis to
conclude that—
(1) There is an actual or likely
disruption, or material degradation, to
any critical operations or services, or to
its ability to fulfill its obligations on
time; or
(2) There is unauthorized entry, or the
potential for unauthorized entry, into
the designated financial market utility’s
computer, network, electronic,
technical, automated, or similar systems
that affects or has the potential to affect
its critical operations or services;
(B) Establishes criteria and processes
providing for timely communication
and responsible disclosure of material
operational incidents to the designated
financial market utility’s participants
and other relevant entities, such that—
(1) Affected participants are notified
immediately of actual disruptions or
material degradation to any critical
operations or services, or to the
designated financial market utility’s
ability to fulfill its obligations on time;
and
(2) All participants and other relevant
entities, as identified in the designated
financial market utility’s plan for
notification and communication, are
notified in a timely manner of all other
material operational incidents that
require notification under paragraph
(a)(17)(vi)(A) of this section;
(vii) Has business continuity
management that provides for rapid
recovery and timely resumption of
critical operations and services and
fulfillment of its obligations, including
in the event of a wide-scale disruption
or a major disruption;
(viii) Has a business continuity plan
that—
(A) Incorporates the use of two sites
providing for sufficient redundancy
supporting critical operations that are
located at a sufficient geographical
distance from each other to have a
distinct risk profile;
(B) Is designed to enable critical
systems, including information
technology systems, to recover and
resume critical operations and services
no later than two hours following
disruptive events;
E:\FR\FM\05OCP1.SGM
05OCP1
jspears on DSK121TN23PROD with PROPOSALS
60326
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 / Proposed Rules
(C) Is designed to enable it to
complete settlement by the end of the
day of the disruption, even in case of
extreme circumstances;
(D) Sets out criteria and processes that
address the reconnection of the
designated financial market utility to
participants and other entities following
a disruption to the designated financial
market utility’s critical operations or
services;
(E) Provides for testing, pursuant to
the requirements under paragraphs
(a)(17)(i)(A) and (a)(17)(i)(C) of this
section, at least annually, of the
designated financial market utility’s
business continuity arrangements,
including the people, processes, and
technologies of the sites required under
paragraph (a)(17)(viii)(A), such that it
can demonstrate that—
(1) The designated financial market
utility can run live production at the
sites required under paragraph
(a)(17)(viii)(A);
(2) The designated financial market
utility’s solutions for data recovery and
data reconciliation enable it to meet its
recovery and resumption objectives
even in case of extreme circumstances,
including in the event of data loss or
data corruption; and
(3) The designated financial market
utility has geographically dispersed staff
who can effectively run the operations
and manage the business of the
designated financial market utility; and
(F) Is reviewed, pursuant to the
requirements under paragraphs
(a)(17)(i)(B) and (a)(17)(i)(C) of this
section, at least annually, in order to—
(1) Incorporate lessons learned from
actual and averted disruptions; and
(2) Update scenarios and assumptions
in order to ensure responsiveness to the
evolving risk environment and
incorporate new and evolving sources of
operational risk; and
(ix) Has systems, policies, procedures,
and controls that effectively identify,
monitor, and manage risks associated
with third-party relationships, and that
ensure that, for any service that is
performed for the designated financial
market utility by a third party, risks are
identified, monitored, and managed to
the same extent as if the designated
financial market utility were performing
the service itself. In this regard, the
designated financial market utility—
(A) Regularly conducts risk
assessments of third parties and
establishes information-sharing
arrangements, as appropriate, with third
parties; and
(B) Includes third parties in business
continuity management and testing, as
appropriate.
*
*
*
*
*
VerDate Sep<11>2014
20:55 Oct 04, 2022
Jkt 259001
By order of the Board of Governors of the
Federal Reserve System.
Margaret McCloskey Shanks,
Deputy Secretary of the Board.
[FR Doc. 2022–21222 Filed 10–4–22; 8:45 am]
BILLING CODE P
NATIONAL CREDIT UNION
ADMINISTRATION
12 CFR Part 702
[NCUA–2022–0138]
RIN 3133–AF43
Subordinated Debt
National Credit Union
Administration (NCUA).
ACTION: Proposed rule.
AGENCY:
The NCUA Board (Board) is
proposing to amend the Subordinated
Debt rule (the Current Rule), which the
Board finalized in December 2020 with
an effective date of January 1, 2022. This
proposal would make two changes
related to the maturity of Subordinated
Debt Notes (Notes) and Grandfathered
Secondary Capital (GSC). Specifically,
this proposal would replace the
maximum maturity of Notes with a
requirement that any credit union
seeking to issue Notes with maturities
longer than 20 years to demonstrate how
such instruments would continue to be
considered ‘‘debt.’’ This proposed rule
would also extend the Regulatory
Capital treatment of GSC to the later of
30 years from the date of issuance or
January 1, 2052. This proposed
extension would align the Regulatory
Capital treatment of GSC with the
maximum permissible maturity for any
secondary capital issued to the United
States Government or one of its
subdivisions (U.S. Government), under
an application approved before January
1, 2022. This proposed change would
benefit eligible low-income credit
unions (LICUs) that are either
participating in the U.S. Department of
the Treasury’s (Treasury) Emergency
Capital Investment Program (ECIP) or
other programs administered by the U.S.
Government. This change would also
cohere the requirements in the Current
Rule related to maturities and
Regulatory Capital treatment of Notes
and the Regulatory Capital treatment of
GSC, while continuing to ensure that
credit unions are operating within their
statutory authority. The Board is making
four other, minor modifications to the
Current Rule to make it more userfriendly and flexible. Specifically, the
Board is proposing to amend the
definition of ‘‘Qualified Counsel’’ to
SUMMARY:
PO 00000
Frm 00013
Fmt 4702
Sfmt 4702
clarify that such person(s) is not
required to be licensed to practice law
in every jurisdiction that may relate to
an issuance. The Board is also
proposing to amend two sections of the
Current Rule to remove the ‘‘statement
of cash flow’’ from the Pro Forma
Financial Statements requirement and
replace it with a requirement for ‘‘cash
flow projections.’’ This change would
better align the requirements of the
Current Rule with the customary way
credit unions develop Pro Forma
Financial Statements and ‘‘cash flow
projections.’’ Next, the Board is
proposing to revise the section of the
Current Rule on filing requirements and
inspection of documents. This proposed
changed would align this section of the
Current Rule with current agency
procedures. Finally, the Board is
proposing to remove a parenthetical
reference related to GSC that no longer
counts as Regulatory Capital. This
change would align the rule with recent
changes made to the Call Report.
DATES: Comments must be received on
or before December 5, 2022.
ADDRESSES: You may submit written
comments, identified by RIN 3133–
AF43, by any of the following methods
(Please send comments by one method
only):
• Federal eRulemaking Portal:
https://www.regulations.gov. Follow the
instructions for submitting comments
on Docket NCUA–2022–0138.
• Mail: Address to Melane ConyersAusbrooks, Secretary of the Board,
National Credit Union Administration,
1775 Duke Street, Alexandria, Virginia
22314–3428.
• Hand Delivery or Courier: Same as
mail address.
Public Inspection: You may view all
public comments on the Federal
eRulemaking Portal at https://
www.regulations.gov, as submitted,
except for those we cannot post for
technical reasons. The NCUA will not
edit or remove any identifying or
contact information from the public
comments submitted. Due to social
distancing measures in effect, the usual
opportunity to inspect paper copies of
comments in the NCUA’s law library is
not currently available. After social
distancing measures are relaxed, visitors
may make an appointment to review
paper copies by calling (703) 518–6540
or emailing OGCMail@ncua.gov.
FOR FURTHER INFORMATION CONTACT:
Policy: Tom Fay, Director of Capital
Markets, Office of Examination and
Insurance. Legal: Justin M. Anderson,
Senior Staff Attorney, Office of General
Counsel, 1775 Duke Street, Alexandria,
VA 22314–3428. Tom Fay can be
E:\FR\FM\05OCP1.SGM
05OCP1
Agencies
[Federal Register Volume 87, Number 192 (Wednesday, October 5, 2022)]
[Proposed Rules]
[Pages 60314-60326]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2022-21222]
========================================================================
Proposed Rules
Federal Register
________________________________________________________________________
This section of the FEDERAL REGISTER contains notices to the public of
the proposed issuance of rules and regulations. The purpose of these
notices is to give interested persons an opportunity to participate in
the rule making prior to the adoption of the final rules.
========================================================================
Federal Register / Vol. 87, No. 192 / Wednesday, October 5, 2022 /
Proposed Rules
[[Page 60314]]
FEDERAL RESERVE SYSTEM
12 CFR Part 234
[Regulation HH; Docket No. R-1782]
RIN No. 7100-AG40
Financial Market Utilities
AGENCY: Board of Governors of the Federal Reserve System.
ACTION: Notice of proposed rulemaking.
-----------------------------------------------------------------------
SUMMARY: The Board of Governors of the Federal Reserve System (Board)
is proposing to amend the requirements relating to operational risk
management in the Board's Regulation HH, which applies to certain
financial market utilities that have been designated as systemically
important (designated FMUs) by the Financial Stability Oversight
Council (FSOC) under Title VIII of the Dodd-Frank Wall Street Reform
and Consumer Protection Act (the Dodd-Frank Act or Act). The proposal
would update, refine, and add specificity to the operational risk
management requirements in Regulation HH to reflect changes in the
operational risk, technology, and regulatory landscapes in which
designated FMUs operate since the Board last amended this regulation in
2014. The proposal would also adopt specific incident-notification
requirements.
DATES: Comments must be received by December 5, 2022.
ADDRESSES: You may submit comments, identified by Docket No. R-1782 and
RIN 7100-AG40, by any of the following methods:
Agency Website: https://www.federalreserve.gov. Follow the
instructions for submitting comments at https://www.federalreserve.gov/generalinfo/foia/ProposedRegs.cfm.
Email: [email protected]. Include docket
and RIN numbers in the subject line of the message.
FAX: 202-452-3819 or 202-452-3102.
Mail: Ann E. Misback, Secretary, Board of Governors of the
Federal Reserve System, 20th Street and Constitution Avenue NW,
Washington, DC 20551.
Instructions: All public comments are available from the Board's
website at https://www.federalreserve.gov/generalinfo/foia/ProposedRegs.cfm as submitted. Accordingly, comments will not be edited
to remove any identifying or contact information. Public comments may
also be viewed electronically or in paper in Room M-4365A, 2001 C
Street NW, Washington, DC 20551, between 9:00 a.m. and 5:00 p.m. during
Federal business weekdays. For security reasons, the Board requires
that visitors make an appointment to inspect comments. You may do so by
calling (202) 452-3684. Upon arrival, visitors will be required to
present valid government-issued photo identification and to submit to
security screening in order to inspect and photocopy comments. For
users of TTY-TRS, please call 711 from any telephone, anywhere in the
United States.
FOR FURTHER INFORMATION CONTACT: Emily Caron, Assistant Director (202-
452-5261) or Kathy Wang, Lead Financial Institution and Policy Analyst
(202-872-4991), Division of Reserve Bank Operations and Payment
Systems; or Cody Gaffney, Attorney (202-452-2674), Legal Division. For
users of TTY-TRS, please call 711 from any telephone, anywhere in the
United States.
SUPPLEMENTARY INFORMATION:
I. Background
A. Financial Market Utilities
A financial market utility (FMU) is a person that manages or
operates a multilateral system for the purpose of transferring,
clearing, or settling payments, securities, or other financial
transactions among financial institutions or between financial
institutions and the person.\1\ FMUs provide essential infrastructure
to clear and settle payments and other financial transactions.
Financial institutions, including banking organizations, participate in
FMUs pursuant to a common set of rules and procedures, technical
infrastructure, and risk-management framework.
---------------------------------------------------------------------------
\1\ 12 U.S.C. 5462(6).
---------------------------------------------------------------------------
If a systemically important FMU fails to perform as expected or
fails to effectively measure, monitor, and manage its risks, it could
pose significant risk to its participants and the financial system more
broadly. For example, the inability of an FMU to complete settlement on
time could create credit or liquidity problems for its participants or
other FMUs. An FMU, therefore, should have an appropriate and robust
risk-management framework, including appropriate policies and
procedures to measure, monitor, and manage the range of risks that
arise in or are borne by the FMU.
B. Title VIII of the Dodd-Frank Act
In recognition of the criticality of FMUs to the stability of the
financial system, Title VIII of the Dodd-Frank Act (the Dodd-Frank Act
or Act) established a framework for enhanced supervision of certain
FMUs. Section 804 of the Dodd-Frank Act states that the FSOC shall
designate those FMUs that it determines are, or are likely to become,
systemically important. Such a designation by the FSOC makes an FMU
subject to the supervisory framework set out in Title VIII of the Act.
Section 805(a)(1)(A) of the Act requires the Board to prescribe
risk-management standards governing the operations related to payment,
clearing, and settlement activities of designated FMUs.\2\ As set out
in section 805(b) of the Act, the applicable risk-management standards
must (1) promote robust risk management, (2) promote safety and
soundness, (3) reduce systemic risks, and (4) support the stability of
the broader financial system.\3\
---------------------------------------------------------------------------
\2\ 12 U.S.C. 5464(a)(1). The Act directs the Board to ``tak[e]
into consideration relevant international standards and existing
prudential requirements'' when it promulgates these risk-management
standards. Id. In addition, section 805(a)(2) of the Act grants the
U.S. Commodity Futures Trading Commission (CFTC) and the U.S.
Securities and Exchange Commission (SEC) the authority to prescribe
such risk-management standards for a designated FMU that is,
respectively, a derivatives clearing organization (DCO) registered
under section 5b of the Commodity Exchange Act, or a clearing agency
registered under section 17A of the Securities Exchange Act of 1934.
12 U.S.C. 5464(a)(2).
\3\ Further, under section 805(c), the risk-management standards
may address areas such as (1) risk-management policies and
procedures, (2) margin and collateral requirements, (3) participant
or counterparty default policies, (4) the ability to complete timely
clearing and settlement of financial transactions, (5) capital and
financial resource requirements for designated FMUs, and (6) other
areas that are necessary to achieve the objectives and principles
described above. 12 U.S.C. 5464(c).
---------------------------------------------------------------------------
A designated FMU is subject to examination by the federal agency
that
[[Page 60315]]
has primary jurisdiction over the FMU under federal banking,
securities, or commodity futures laws (the ``Supervisory Agency'').\4\
At present, the FSOC has designated eight FMUs as systemically
important, and the Board is the Supervisory Agency for two of these
designated FMUs--The Clearing House Payments Company, L.L.C. (on the
basis of its role as operator of the Clearing House Interbank Payments
System (CHIPS)) and CLS Bank International.\5\ The risk-management
standards in the Board's Regulation HH apply to Board-supervised
designated FMUs.\6\
---------------------------------------------------------------------------
\4\ The Act's definition of ``Supervisory Agency'' is codified
at 12 U.S.C. 5462(8). Section 807 of the Act authorizes the
Supervisory Agencies to examine and take enforcement actions against
the Supervisory Agencies' respective designated FMUs. The Act also
describes certain authorities that the Board has with respect to
designated FMUs for which it is not the Supervisory Agency, such as
participation in examinations and recommendations on enforcement
actions. 12 U.S.C. 5466.
\5\ The SEC is the Supervisory Agency for The Depository Trust
Company (DTC); Fixed Income Clearing Corporation (FICC); National
Securities Clearing Corporation (NSCC); and The Options Clearing
Corporation (OCC). The CFTC is the Supervisory Agency for the
Chicago Mercantile Exchange, Inc. (CME); and ICE Clear Credit LLC
(ICC). See U.S. Department of the Treasury, Financial Market Utility
Designations, https://home.treasury.gov/policy-issues/financial-markets-financial-institutions-and-fiscal-service/fsoc/designations.
\6\ The risk-management standards in Regulation HH would also
apply to any designated FMU for which another Federal banking agency
is the Supervisory Agency. At this time, there are no such
designated FMUs.
---------------------------------------------------------------------------
C. Regulation HH Risk-Management Standards for Designated FMUs
Section 234.3 of Regulation HH includes a set of 23 risk-management
standards addressing governance, transparency, and the various risks
that can arise in connection with a designated FMU's payment, clearing,
and settlement activities, including legal, financial, and operational
risks. These standards are based on and generally consistent with the
Principles for Financial Market Infrastructures (PFMI).\7\ The
Regulation HH standards generally employ a flexible, principles-based
approach. In several cases, however, the Board adopted specific minimum
requirements that a designated FMU must meet in order to achieve the
overall objective of a particular standard.
---------------------------------------------------------------------------
\7\ The PFMI, published by the Committee on Payment and
Settlement Systems (now the Committee on Payments and Market
Infrastructures) and the Technical Committee of the International
Organization of Securities Commissions in April 2012, is widely
recognized as the most relevant set of international risk-management
standards for payment, clearing, and settlement systems.
---------------------------------------------------------------------------
1. Operational Risk Management
Section 234.3(a)(17) of Regulation HH requires that a designated
FMU manage its operational risks by establishing a robust operational
risk-management framework that is approved by its board of
directors.\8\ In this regard, the designated FMU must (1) identify and
mitigate its plausible sources of operational risk; (2) identify,
monitor, and manage the operational risks it may pose to other FMUs and
trade repositories; (3) ensure a high degree of security and
operational reliability; (4) have adequate, scalable capacity to handle
increasing stress volumes; (5) address potential and evolving
vulnerabilities and threats; and (6) provide for rapid recovery and
timely resumption of critical operations and fulfillment of
obligations, including in the event of a wide-scale or major
disruption. Section 234.3(a)(17) also contains several specific minimum
requirements for business continuity planning, including a requirement
for the designated FMU to have a business continuity plan that (1)
incorporates the use of a secondary site at a location with a distinct
risk profile from the primary site; (2) is designed to enable critical
systems to recover and resume operations no later than two hours
following disruptive events; (3) is designed to enable it to complete
settlement by the end of the day of the disruption, even in case of
extreme circumstances; and (4) is tested at least annually.
---------------------------------------------------------------------------
\8\ In this notice, Sec. 234.4(a)(17) will be informally
referred to as the ``operational risk management standard.''
---------------------------------------------------------------------------
Although the term ``operational risk'' is not defined in current
Regulation HH, when the Board proposed amendments to Sec. 234.3(a)(17)
in 2014, it described operational risk as the risk that deficiencies in
information systems, internal processes, and personnel or disruptions
from external events will result in the deterioration or breakdown of
services provided by an FMU.\9\ Consistent with an all-hazards view of
managing operational risk, the Board believes operational risk could
arise internally and externally. Internal sources of operational risk
include the designated FMU's people, processes, and technology.\10\
External sources of operational risk are those that fall outside the
direct control of a designated FMU. For example, external sources of
operational risk can include the designated FMU's participants and
other entities, such as other FMUs, settlement banks, liquidity
providers, and service providers, which may transmit threats through
their various connections to the designated FMU. External sources of
operational risk also include physical events, such as pandemics,
natural disasters, and other destruction of property, as well as
information security threats, such as cyberattacks and technology
supply chain vulnerabilities. These internal and external sources of
operational risk can manifest in different scenarios (including wide-
scale or major disruptions) and can result in the reduction,
deterioration, or breakdown of services that a designated FMU provides.
A designated FMU must plan for these types of scenarios and test its
systems, polices, procedures, and controls against them.
---------------------------------------------------------------------------
\9\ 79 FR 3665, 3683 (Jan. 22, 2014). The Board also
incorporated this definition of ``operational risk'' into part I of
the Federal Reserve Policy on Payment System Risk (PSR policy) in
2014, see 79 FR 2838, 2845 (Jan. 16, 2014), and into its ORSOM
rating system in 2016, see 81 FR 58932, 58936 (Aug. 26, 2016). The
PSR policy is available at https://www.federalreserve.gov/paymentsystems/files/psr_policy.pdf.
\10\ Deficiencies in assessing and managing these sources of
operational risk could cause errors or delays in processing, systems
outages, insufficient capacity, fraud, data loss, and data leakage.
---------------------------------------------------------------------------
Importantly, the Board believes that effective operational risk-
management, in combination with sound governance arrangements and
effective management of general business risk (including the risk of
losses from operational events), promotes operational resilience, which
refers to the ability of an FMU to: (1) maintain essential operational
capabilities under adverse conditions or stress, even if in a degraded
or debilitated state; and (2) recover to effective operational
capability in a time frame consistent with the provision of critical
economic services.\11\
---------------------------------------------------------------------------
\11\ See Sec. 234.3(a)(2) and (a)(15).
---------------------------------------------------------------------------
2. Evolution in the Operational Risk, Technology, and Regulatory
Landscape
When the Board proposed the current Regulation HH risk-management
standards in 2014, it recognized that there was ongoing work and
discussion domestically and internationally on developing operational
risk-management standards and planning for business continuity with
respect to cybersecurity and responses to cyberattacks.\12\ For
example, in 2016, the Committee on Payments and Market Infrastructures
(CPMI) and Technical Committee of the International Organization of
Securities Commissions (IOSCO) published Guidance on cyber resilience
for financial market infrastructures (Cyber Guidance), which
supplements the PFMI and provides guidance on cyber resilience,
including
[[Page 60316]]
in the context of governance, the comprehensive management of risks,
and operational risk management.\13\ The Cyber Guidance has informed
the Federal Reserve's supervision of designated FMUs.\14\
---------------------------------------------------------------------------
\12\ 79 FR 3665, 3683 (Jan. 22, 2014).
\13\ CPMI-IOSCO, Guidance on Cyber Resilience for Financial
Market Infrastructures (June 2016), https://www.bis.org/cpmi/publ/d146.htm.
\14\ For example, when the Board finalized its ORSOM rating
system for designated FMUs in 2016, it noted that the then-
forthcoming Cyber Guidance would guide the Board's assessment of a
designated FMU with respect to operational risk and cybersecurity
policies and procedures. 81 FR 58932, 58934 (Aug. 26, 2016).
---------------------------------------------------------------------------
More recently, new challenges to operational risk management have
emerged, including a global pandemic and severe weather events. In
addition, certain types of cyberattacks that were once thought to be
extreme or ``tail-risk'' events, like attacks on the supply chain and
ransomware attacks, have become more prevalent. Technology solutions
for the management of operational risk have also advanced since 2014,
including the development of new technologies that have the potential
to improve the resilience of designated FMUs. Finally, the legal and
regulatory landscape in which designated FMUs operate has evolved to
reflect these changes in the broader operational risk environment. For
example, in November 2021, the Board, the Office of the Comptroller of
the Currency (OCC), and the Federal Deposit Insurance Corporation
(FDIC) adopted requirements on computer-security incident notifications
for banking organizations and bank service providers (interagency
notification rule).\15\
---------------------------------------------------------------------------
\15\ 86 FR 66424 (Nov. 23, 2021). Congress also recently enacted
the Cyber Incident Reporting for Critical Infrastructure Act of
2022, which requires covered entities to report significant cyber
incidents to the Cybersecurity and Infrastructure Agency (``CISA'').
See H.R. 2471, 117th Cong. (2022).
---------------------------------------------------------------------------
The evolution in the operational risk, technology, and regulatory
landscape motivated the Board to conduct a full review of Sec.
234.3(a)(17) to determine whether updates are necessary. Following this
review, the Board believes that the outcomes required by the current
operational risk management standard are generally still relevant and
comprehensive. However, the Board has identified several areas where it
believes updates to the rule are necessary.
II. Explanation of Proposed Rule
The Board is proposing to amend its operational risk management
standard to reflect changes in the operational risk and threat
landscape, as well as to incorporate developments in designated FMUs'
operations and technology usage since the Board last amended Regulation
HH in 2014. The proposal focuses on four areas: (1) review and testing,
(2) incident management and notification, (3) business continuity
management and planning, and (4) third-party risk management. The Board
is also proposing several technical or clarifying amendments throughout
Sec. Sec. 234.2 and 234.3(a).\16\
---------------------------------------------------------------------------
\16\ In addition to the technical changes described below in
section II.E, the Board is also proposing a technical change to the
title of Sec. 234.3. Currently, the section is erroneously titled
``Standards for payment systems,'' which is the legacy title from
the initial Regulation HH risk-management standards published in
2012. The Board is proposing to replace ``payment systems'' with
``designated financial market utilities.''
---------------------------------------------------------------------------
The Board believes that the proposal continues to employ a
flexible, principles-based approach in Regulation HH. Further, the
Board believes the proposed amendments are largely consistent with
existing measures that designated FMUs take to comply with Regulation
HH and would create minimal added burden for the designated FMUs that
are subject to Regulation HH. Accordingly, the Board is proposing that
the proposed changes would become effective and require compliance 60
days from the date a final rule is published in the Federal Register.
The Board requests comment on all aspects of the proposed
amendments, including the proposed effective and compliance date. In
addition, the Board requests comment on the specific questions below.
Where possible, commenters should provide both quantitative data and
detailed analysis in their comments, particularly with respect to
suggested alternatives to the proposed amendments. Commenters should
also explain the rationale for their suggestions.
A. Review and Testing
Currently, Sec. 234.3(a)(17)(i) requires designated FMUs to
identify the plausible sources of operational risk, both internal and
external, and mitigate their impact through the use of appropriate
systems, policies, procedures, and controls that are reviewed, audited,
and tested periodically and after major changes. This general review
and testing requirement applies broadly to the systems, policies,
procedures, and controls that the designated FMU develops to mitigate
sources of operational risk. For example, designated FMUs need to
design and conduct appropriate tests on any policies or systems that
they develop to ensure a high degree of security and operational
reliability (as required by Sec. 234.3(a)(17)(iii)). Similarly, a
designated FMU needs to review and test any arrangements it sets up to
achieve its planned business continuity recovery and resumption
objectives (as required by Sec. 234.3(a)(17)(vii)). This general
review and testing requirement encompasses all reviews and tests the
designated FMU performs with respect to such systems, policies,
procedures, and controls, including those performed by the designated
FMU's business lines, risk-management function, and audit function. It
does not, however, prescribe specific types of tests that the
designated FMU must conduct.
The Board is proposing amendments to the general review and testing
requirement that would provide more specificity regarding its
expectations. Proposed Sec. 234.3(a)(17)(i) would emphasize that, just
as the current general review and testing requirement applies broadly
to the designated FMU's systems, policies, procedures, and controls,
the proposal's requirements would also apply broadly to the systems,
policies, procedures, and controls developed to mitigate the impact of
the designated FMU's sources of operational risk.
1. Testing
Proposed Sec. 234.3(a)(17)(i)(A)(1) would require a designated FMU
to conduct tests of its systems, policies, procedures, and controls in
accordance with a documented testing framework. The documented testing
framework would need to address, at a minimum, the scope and frequency
of such testing, who participates in such testing, and how the results
of such testing will be reported. The testing framework would also need
to account for any interdependencies between and among the systems,
policies, procedures, and controls that are being tested.\17\ A
designated FMU could describe its testing framework in either a single
document or in multiple documents, as appropriate, and could leverage
relevant industry standards as it develops its testing framework.\18\
---------------------------------------------------------------------------
\17\ The proposal emphasizes the need for a designated FMU to
take a comprehensive and risk-based approach to its operational risk
management testing program, rather than focusing only on testing
individual (or groups of) systems, policies, procedures, or controls
(or components therein).
\18\ For example, a designated FMU could leverage standards
developed by the National Institute of Standards and Technology
(NIST) and the Federal Financial Institutions Examination Council
(FFIEC).
---------------------------------------------------------------------------
Proposed Sec. 234.3(a)(17)(i)(A)(2) would require that the tests
that a designated FMU conducts assess whether its systems, policies,
procedures, or controls function as intended. Such tests could include
capacity stress tests,
[[Page 60317]]
crisis management tabletop exercises, after-action reviews of
incidents, business continuity tests both internally and with
participants, vulnerability assessments, cyber scenario-based testing,
penetration tests, and red team tests. Importantly, as described
further below, a designated FMU would need to remediate any
deficiencies identified during testing.
2. Review Scope
Proposed Sec. 234.3(a)(17)(i)(B) would require a designated FMU to
conduct a review of the design, implementation, and testing of relevant
systems, policies, procedures, and controls after the designated FMU
experiences any material operational incidents (which are discussed in
section II.B.2 below). A designated FMU would also need to conduct such
a review after significant changes to the environment in which it
operates.\19\
---------------------------------------------------------------------------
\19\ The Board is also proposing a technical amendment to the
requirement for the designated FMU to review its recovery and
orderly wind-down plan under Sec. 234.3(a)(3)(iii)(G) from
``following'' to ``after'' changes to the designated FMU's systems
and environment. This conforms with the review requirement under
proposed Sec. 234.3(a)(17)(i)(B). The Board is also proposing a
technical amendment to the requirement for the designated FMU to
update its public disclosure under Sec. 234.3(a)(23)(v) from
``following'' to ``to reflect'' changes to its systems and
environment.
---------------------------------------------------------------------------
The operational risk environment, including sources of risk and the
nature or types of threats, can change unexpectedly and quickly. The
proposal would ensure that designated FMUs review and make timely
changes to their systems, policies, procedures, and controls following
such changes. For example, the COVID-19 global pandemic highlighted new
risks and challenges in the operational risk environment that warrant a
review of relevant systems, policies, procedures, and controls.
3. Remediation of Identified Deficiencies
Finally, proposed Sec. 234.3(a)(17)(i)(C) would require a
designated FMU to remediate as soon as possible, following established
governance processes, any deficiencies identified during tests and
reviews. A designated FMU would need to assess whether such identified
deficiencies require urgent remediation or are less urgent. In order to
ensure that remediation measures are effective, it would be imperative
for a designated FMU to perform subsequent validation to assess whether
the remediation measures have addressed deficiencies without
introducing new vulnerabilities.
A designated FMU should consult widely used and relevant industry
standards to inform its understanding of how it should remediate any
deficiencies. These industry standards, such as those published by the
National Institute of Standards and Technology (NIST), the Federal
Financial Institutions Examination Council (FFIEC), the Financial
Services Sector Coordinating Council (FSSCC), and the International
Organization for Standardization (ISO), are updated regularly and
typically offer current and specific information on operational risk
management practices.
4. Questions
With respect to proposed Sec. 234.3(a)(17)(i)(A)-(C), the Board
requests comment on the following specific questions:
1. Are the elements listed in Sec. 234.3(a)(17)(i)(A)(1) the right
elements to include by rule in the testing framework? What other
elements should be addressed in a rule for a testing framework?
2. Are there challenges associated with implementation of these
proposed requirements that the Board has not considered?
B. Incident Management and Notification
The Board is proposing to establish incident management and
notification requirements in proposed Sec. 234.3(a)(17)(vi).
1. Documented Incident Management Framework
Proposed Sec. 234.3(a)(17)(vi) would require a designated FMU to
establish a documented framework for incident management that provides
for the prompt detection, analysis, and escalation of an incident;
appropriate procedures for addressing an incident; and incorporation of
lessons learned following an incident.\20\
---------------------------------------------------------------------------
\20\ These broad categories in incident management are generally
consistent with those identified in the NIST computer-security
incident handling guide. See NIST, Computer Security Incident
Handling Guide (Special Publication 800-61, rev. 2), https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf.
---------------------------------------------------------------------------
In line with the all-hazards approach to operational risk
management in this standard, the Board believes it is important for a
designated FMU to be prepared to detect, address, and learn from any
type of operational incident, regardless of the scenario or source of
risk and the level of severity. Different types of incidents may
require different levels of escalation internally or externally.
Different types of incidents may also require different strategies for
containment or eradication. For example, given the increasing
prevalence of cyberattacks in the financial sector, a designated FMU
should plan for an incident where a participant (or another type of
connected entity), rather than the designated FMU itself, is
experiencing a cyberattack. In this scenario, a designated FMU should
be operationally prepared to take, and should have a legal basis to
take, appropriate steps to mitigate the risk of contagion to itself or
other participants, including but not limited to disconnecting the
participant from the FMU if necessary. A designated FMU should also
have processes and procedures to determine whether and when it would be
appropriate to allow such a participant to reconnect to the FMU.
The proposal would require that a designated FMU's incident
management framework include a plan for notification and communication
of material operational incidents. This plan would, among other things,
need to identify the entities that would be notified of operational
incidents, including non-participants that could be affected by
material operational incidents at the designated FMU and appropriate
industry information-sharing fora. Proposed Sec. 234.3(a)(17)(vi)(A)
and (B), which are discussed further in sections II.B.2 and II.B.3,
would set forth more detailed requirements for notification and
communication of material incidents to ensure that the Board, the
designated FMU's participants, and other relevant entities receive
timely notifications.
2. Incident Notification to the Board
Proposed Sec. 234.3(a)(17)(vi)(A) would require a designated FMU
to notify the Board of operational incidents.
In November 2021, the Board, FDIC, and OCC jointly adopted the
interagency notification rule for banking organizations and bank
service providers.\21\ The interagency notification rule scoped out
designated FMUs, but the preamble to the interagency rule explained
that the Board believes it is important for designated FMUs to inform
Federal Reserve supervisors of operational disruptions on a timely
basis.\22\ The preamble to the interagency rule also noted that the
Board would consider proposing amendments to Regulation
[[Page 60318]]
HH in the future to formalize its incident-notification expectations
and promote consistency between requirements applicable to designated
FMUs that are supervised by the Board, the U.S. Securities and Exchange
Commission (SEC), and the U.S. Commodity Futures Trading Commission
(CFTC).\23\
---------------------------------------------------------------------------
\21\ 86 FR 66424 (Nov. 23, 2021).
\22\ Id. at 66428 (noting that ``the Board has generally
observed such practice by designated FMUs'').
\23\ Id. SEC-supervised designated FMUs are subject to the SEC's
Regulation SCI, which generally requires covered entities to notify
the SEC ``immediately'' and their members or participants
``promptly'' of an SCI event. See 17 CFR 242.1000 (defining ``SCI
Event'') and 242.1002 (imposing notification requirements related to
SCI Events). Similarly, a CFTC-supervised designated FMU must notify
the CFTC ``promptly'' of an ``exceptional event''. See 17 CFR
39.18(g). An ``exceptional event'' includes ``[a]ny hardware or
software malfunction, security incident, or targeted threat that
materially impairs, or creates a significant likelihood of material
impairment, of automated system operation, reliability, security, or
capacity; or [a]ny activation of the designated FMU's business
continuity and disaster recovery plan.'' Id.
---------------------------------------------------------------------------
Under proposed Sec. 234.3(a)(17)(vi)(A), a designated FMU would be
required to immediately notify the Board when it activates its business
continuity plan or has a reasonable basis to conclude that (1) there is
an actual or likely disruption, or material degradation, to any of its
critical operations or services,\24\ or to its ability to fulfill its
obligations on time; or (2) there is unauthorized entry, or the
potential for unauthorized entry, into the designated FMU's computer,
network, electronic, technical, automated, or similar systems that
affects or has the potential to affect its critical operations or
services. Given the large volume and value of payment, clearing, and
settlement activity processed by these entities and their
interconnectedness with financial institutions and markets, material
operational issues occurring at these designated FMUs could have
financial stability implications. It is therefore critical for the
Board to be notified immediately of these types of issues.
---------------------------------------------------------------------------
\24\ Critical operations and critical services are discussed
below in section II.E.2.
---------------------------------------------------------------------------
Importantly, in addition to actual disruptions, material
degradation, or unauthorized entries, the proposal would also require
immediate notification to the Board if the designated FMU has a
reasonable basis to conclude that a disruption or material degradation
is ``likely'' to occur or if there is ``potential'' for unauthorized
entry into the designated FMU's computer, network, electronic,
technical, automated, or similar systems that affects or has the
potential to affect its critical operations or services. For example, a
hurricane in the region where the designated FMU is located would not
alone trigger notification; however, if the designated FMU concludes
that such an event likely would disrupt or materially degrade its
critical operations or services, then notification would be required.
Similarly, in the case of potential unauthorized entries, not all
identified vulnerabilities in its systems would require an immediate
notification. However, if a designated FMU discovers or becomes aware
of an unexploited vulnerability and determines that, if exploited, such
vulnerability could result in a disruption or material degradation of
its critical operations or service, the designated FMU would need to
notify the Board immediately of such discovery.
The Board notes that ``immediately'' is meant to convey the urgency
in notifying the Board of these material operational incidents; it does
not mean ``instantaneous'' notification. The Board would expect to be
notified of an operational incident once the designated FMU activates
its business continuity plan or has a reasonable basis to conclude that
an incident meets any of the criteria in proposed Sec.
234.3(a)(17)(vi)(A)(1)-(2), even if the designated FMU does not yet
have detailed information on the root cause or measures for containment
or remediation. In these cases, the Board would expect to receive any
available information that the designated FMU has at the time of
notification.
The Board recognizes that the requirement for ``immediate''
notification to the Board would establish a heightened requirement for
designated FMUs relative to banking organizations.\25\ The proposed
requirement is consistent with the systemic importance of designated
FMUs and with existing SEC and CFTC incident notification requirements
for the designated FMUs for which either the SEC or the CFTC is the
Supervisory Agency.
---------------------------------------------------------------------------
\25\ Under the interagency notification rule, a banking
organization must notify its primary Federal regulator of certain
computer-security incidents ``as soon as possible and no later than
36 hours.'' See 86 FR 66424, 66431-32 (discussing timing of
notification to agencies).
---------------------------------------------------------------------------
3. Incident Notification to Participants and Other Relevant Entities
Proposed Sec. 234.3(a)(17)(vi)(B) would require a designated FMU
to establish criteria and processes, including the appropriate methods
of communication, to provide for timely communication and responsible
disclosure of material operational incidents to its participants or
other relevant entities that have been identified in its notification
and communication plan.
As proposed, this incident notification requirement would arise in
two circumstances. First, a designated FMU would need to notify
affected participants immediately in the event of actual disruptions or
material degradation to its critical operations or services or to its
ability to fulfill its obligations on time.\26\ This immediate
notification would ensure that affected participants (e.g.,
participants encountering delays or errors) are aware that the issue
originates from the designated FMU and not their own systems, in order
to minimize confusion in the markets that the designated FMU serves and
to allow participants to assess the impact to their operations. The
term ``immediately'' is meant to convey the urgency in notifying the
designated FMU's participants of disruptions or material degradation to
its services; it does not mean ``instantaneous'' notification.
---------------------------------------------------------------------------
\26\ The requirement for ``immediate'' notification to affected
participants would establish a heightened requirement for designated
FMUs relative to those imposed on bank service providers in the
interagency rule (which requires notification ``as soon as
possible''), consistent the systemic importance of designated FMUs.
---------------------------------------------------------------------------
Second, a designated FMU would need to notify all participants and
other relevant entities \27\ in a timely and responsible manner of all
other material operational incidents that require immediate
notification to the Board. When designing this part of its
communication plan, the Board would expect a designated FMU to consider
the timing, content, recipients, and method of notification for a range
of potential material operational incidents. In determining the scope
of disclosure for a particular incident, the Board would expect a
designated FMU to consider factors such as the risk-mitigation benefits
arising from early warning to the financial system, the safety and
soundness of the designated FMU, and any financial stability
implications of disclosure. The Board recognizes that there might be
risks to providing early disclosures to a broad audience regarding
certain types of material operational issues. For example, if a
designated FMU identifies a cyber vulnerability, the designated FMU
might weigh the risk of disclosure as sufficiently great to delay
notification or tailor the information provided to avoid exposing the
designated FMU to a cyberattack.
---------------------------------------------------------------------------
\27\ As described in section II.B.1, above, a designated FMU
would need to identify non-participant relevant entities in its plan
for notification and communication of material operational
incidents.
---------------------------------------------------------------------------
[[Page 60319]]
4. Examples of Material Operational Incidents
The following is a non-exhaustive list of operational incidents
that the Board would consider to be material for purposes of the
proposal. The Board would expect examples 1 and 2 to trigger immediate
notifications to the Board and to the designated FMU's participants
(and notification in a timely manner to other relevant entities, as
applicable). The Board would expect examples 3-5 to trigger immediate
notification to the Board, but believes the designated FMU should
determine when they may trigger appropriately timely notifications and
disclosure to participants and non-participant entities based on the
criteria in its notification and communication plan.
(1) Large-scale distributed denial of service attacks that prevent
the designated FMU from receiving its participants' payment
instructions.
(2) A severe weather event or other natural disaster that causes
significant damage to a designated FMU's production site and
necessitates failover to another site during the business day.
(3) Malware on a designated FMU's network that poses an imminent
threat to its critical operations or services (such as its core
payment, clearing, or settlement processes, or collateral management
processes), or that may require the designated FMU to disengage any
compromised products or information systems that support the designated
FMU's critical operations and services from internet-based network
connections.
(4) A ransom malware attack that encrypts a critical system or
backup data.
(5) A zero-day vulnerability on software that the designated FMU
uses and has determined, if exploited, could lead to a disruption to or
material degradation of its critical operations or services.
5. Questions
With respect to proposed Sec. 234.3(a)(17)(vi), the Board requests
comment on the following specific questions:
3. Do the requirements under proposed Sec. 234.3(a)(17)(vi)(A)
strike the proper balance between providing the Board with early
warning and allowing designated FMUs sufficient time to notify the
Board?
4. How should the criteria for determining whether operational
incidents are material enough to warrant notification to the Board
under proposed Sec. 234.3(a)(17)(vi)(A) be modified, if at all?
5. Should the Board provide additional examples of material
operational incidents?
6. How should designated FMUs provide notifications to the Board?
For example, should the Board establish a centralized point of contact
to receive notifications, or should designated FMUs notify their
supervisory teams?
7. Is the proposed requirement on planning for timely notification
and ``responsible disclosure'' of material operational incidents clear?
Should a term other than ``responsible'' disclosure be used, given the
intention of this proposed requirement, as explained in section II.B.3
above?
8. Are there challenges associated with implementing these proposed
requirements that the Board has not considered?
C. Business Continuity Management and Planning
Current Sec. 234.3(a)(17)(vi) (which, under the proposal, would be
renumbered as Sec. 234.3(a)(17)(vii)) requires that a designated FMU
have business continuity management that provides for rapid recovery
and timely resumption of its critical operations and fulfillment of its
obligations, including in the event of a wide-scale or major
disruption. Current Sec. 234.3(a)(17)(vii) (which, under the proposal,
would be renumbered as Sec. 234.3(a)(17)(viii)) elaborates on certain
requirements for a designated FMU's business continuity plan.
Specifically, a business continuity plan must incorporate the use of a
secondary site with a distinct risk profile from the primary site; be
designed to enable critical systems to recover and resume operations no
later than two hours following disruptive events; be designed to
complete settlement by the end of the day of the disruption, even in
extreme circumstances; and be tested at least annually.
The proposed amendments to current Sec. 234.3(a)(17)(vii) would
provide further detail in Regulation HH related to business continuity
management and planning in order to promote robust risk management,
reduce systemic risks, increase safety and soundness, and support the
stability of the broader financial system.
1. Two Sites Providing for Sufficient Redundancy
The proposal would amend current Sec. 234.3(a)(17)(vii)(A) to
update terminology related to required backup sites. Currently, Sec.
234.3(a)(17)(vii)(A) requires a designated FMU to have a secondary site
that is located at a sufficient geographical distance from the primary
site to have a distinct risk profile. The Board proposes to replace the
references to ``secondary site'' and ``primary site'' with a general
reference to ``two sites providing for sufficient redundancy supporting
critical operations and services'' that are located at a sufficient
geographical distance from ``each other'' to have a distinct risk
profile (collectively, ``two sites with distinct risk profiles'').
This proposed amendment would accommodate data center arrangements
with multiple production sites, rather than reflecting only the
traditional arrangement where one site is considered ``primary'' and
another site is treated distinctly as a backup site. The proposal would
still require, however, a minimum of two locations that are
sufficiently geographically distant from each other to have a distinct
risk profile. Consistent with the Board's explanation when it adopted
the current text of Regulation HH in 2014, the Board would consider
sites to have ``distinct risk profiles'' if, for example, they are not
located in areas that would be susceptible to the same severe weather
event (e.g., the same hurricane zone) or on the same earthquake fault
line. These sites would likely also have distinct power and telecom
providers and be operated by geographically dispersed staff.
2. Recovery and Resumption
Current Sec. 234.3(a)(17)(vi) establishes a broad requirement for
business continuity management. Current Sec. 234.3(a)(17)(vii)(B)-(C)
sets specific recovery and resumption objectives, requiring that a
designated FMU's business continuity plan be designed to enable,
respectively, recovery and resumption no later than two hours following
disruptive events and completion of settlement by the end of the day of
the disruption, even in case of extreme circumstances.
Under the proposal, these requirements would remain substantively
unchanged.\28\ Since the Board established these requirements in
Regulation HH, the two-hour recovery time objective has been a
particular area of focus during bilateral discussions with Board-
supervised designated FMUs, as well as in broader domestic and
international fora, specifically in the context of extreme cyber
events. At the center of those discussions is the balance between
timely recovery and resumption of critical operations and
[[Page 60320]]
appropriate assurance that critical operations are restored to a
trusted state. The Board continues to believe it is imperative to
financial stability that a designated FMU be able to recover and resume
its critical operations and services quickly after disruptive events,
physical and cyber, and to complete settlement by the end of the day of
the disruption. In related discussions with Board-supervised firms, and
supported by provisions in the CPMI-IOSCO Cyber Guidance, Board staff
has emphasized that recovery time objectives are necessary and critical
targets around which plans, systems, and processes should be designed,
enabling the firm to meet the objective.\29\ However, these recovery
time objectives should not be interpreted as a requirement for a
designated FMU to resume operations in a compromised or otherwise
untrusted state.
---------------------------------------------------------------------------
\28\ In addition to renumbering these sections as Sec.
234.3(a)(17)(vii) and Sec. 234.3(a)(17)(viii)(B)-(C), respectively,
the Board is proposing a technical revision to Sec.
234.3(a)(17)(vi), as described below in section II.E.2.
\29\ For example, paragraph 6.2.2 of the Cyber Guidance notes
that the objectives for resuming operations set goals for,
ultimately, the sound functioning of the financial system, which
should be planned for and tested against. It further notes the
criticality of the recovery and resumption objectives under
Principle 17, Key Consideration 6 of the PFMI, while also
acknowledging that financial market infrastructures should exercise
judgment in effecting resumption so that risks to itself or its
ecosystem do not thereby escalate. For additional details, see CPMI-
IOSCO, Guidance on Cyber Resilience for Financial Market
Infrastructures (June 2016) at section 6, https://www.bis.org/cpmi/publ/d146.htm (``Response and Recovery'').
---------------------------------------------------------------------------
Threats to designated FMUs' operations continue to evolve, and the
Board expects that a designated FMU's business continuity planning will
be a dynamic process in which the designated FMU works to update the
scenarios for which it plans on an ongoing basis to meet its recovery
and resumption objectives. For many types of disruptive scenarios,
technology and methods already exist to enable a designated FMU to
recover and resume operations within two hours of the disruption. For
example, if an earthquake damages a designated FMU's hardware and
disrupts operations at one data center, the designated FMU can fail
over to another location that is outside the earthquake radius.
The Board recognizes, however, that certain threats to designated
FMUs' operations, as well as the technology to mitigate those threats,
are continually evolving. In areas where threats and technology are
still evolving, such as is the case for extreme cyberattacks (e.g.,
where significant data loss or corruption occurs across its data
centers), the Board recognizes that solutions are evolving with the
threat environment and require a holistic approach that integrates
protective, detective, and containment measures with response,
recovery, and resumption solutions. The Board continues to expect that
a designated FMU's business continuity planning will be a dynamic
process in which the designated FMU works on an ongoing basis to update
its plan to recover and resume operations to achieve its objectives in
light of these evolving threats. Federal Reserve supervisors will also
continue to work with designated FMUs through the supervisory process
as designated FMUs identify reasonable approaches to prepare for and
recover from such attacks. As development of adequate solutions for
extreme cyberattacks continues, designated FMUs should also plan for
contingency scenarios in which planned recovery and resumption
objectives cannot be achieved. Planning for such scenarios would also
be in accordance with national policies aimed at improving the
cybersecurity posture of U.S. critical infrastructures.\30\
---------------------------------------------------------------------------
\30\ See, e.g., Presidential Policy Directive/PPD-21, Critical
Infrastructure Security and Resilience (Feb. 12, 2013), https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil.
---------------------------------------------------------------------------
3. Reconnection After a Disruption to the Designated FMU's Critical
Operations or Services
Proposed Sec. 234.3(a)(17)(viii)(D) would require that the
business continuity plan set out criteria and processes that address
the reconnection of a designated FMU to its participants and other
entities following a disruption to the designated FMU's critical
operations or services. In this context, the Board would consider a
disruption to a designated FMU's critical operations or services
broadly as a form of ``disconnection'' to external parties such as the
designated FMU's participants. This would include situations where a
designated FMU deliberately takes itself offline such that participants
cannot access its services (e.g., if it experiences a major cyberattack
that it needs to contain); it would also include situations where a
designated FMU loses connection to its participants due to another type
of external event (e.g., if its production site loses power due to a
severe weather event in its region).
The Board believes that the current requirements to plan for
recovery and resumption include an implicit expectation that a
designated FMU plan to reconnect to its participants and other relevant
entities following a disruption. However, the Board is proposing to
make this expectation explicit in order to emphasize the importance of
ex ante criteria and processes addressing when and how a designated FMU
will reconnect to its participants and other relevant entities. Given
the current threat landscape and the ability for malware to spread, the
Board believes it is crucial for a designated FMU to be prepared to
balance the need for the designated FMU to quickly recover and resume
its critical operations against the risk of contagion to its ecosystem
should it resume operations in an unsafe state (e.g., before an
extremely harmful computer virus is fully contained or eradicated). For
cyber incidents, it is particularly important for a designated FMU to
be prepared to assure its participants, other connected entities, and
regulator(s) that its remediation efforts are complete and that it has
achieved a safe and trusted state.\31\ A designated FMU should consider
establishing a phased approach to reconnecting to the designated FMU's
participants and other relevant entities, transaction testing with
selected participants before full reconnection, and heightened
monitoring for an appropriate period of time after reconnection.
---------------------------------------------------------------------------
\31\ A designated FMU might consider leveraging third-party
experts to verify its remediation efforts.
---------------------------------------------------------------------------
4. Business Continuity Testing
The proposal would amend current Sec. 234.3(a)(17)(vii)(D), which
requires the business continuity plan to be ``tested at least
annually,'' by separating it into two requirements (proposed Sec.
234.3(a)(17)(viii)(E) and (F)).
Proposed Sec. 234.3(a)(17)(viii)(E) would maintain the requirement
for at least annual testing and clarify that this requirement covers
the designated FMU's business continuity arrangements, including the
people, processes, and technologies of the two sites with distinct risk
profiles.\32\ The required testing would need to demonstrate that the
designated FMU is able to run live production at the two sites with
distinct risk profiles; that its solutions for data recovery and data
reconciliation enable it to meet its objectives to recover and resume
operations two hours following a disruption and enable settlement by
the end of the day of the disruption even in case of extreme
circumstances including if there is data loss or corruption; and that
it has geographically dispersed staff who can effectively run the
operations and manage the business of the designated FMU.
---------------------------------------------------------------------------
\32\ These tests would be subject to the general testing
requirements described in section II.A.1 above.
---------------------------------------------------------------------------
The Board believes that a designated FMU must be able to
demonstrate these particular capabilities in order verify that its
business continuity
[[Page 60321]]
arrangements will function as intended in achieving the recovery and
resumption objectives in its business continuity plan. For example,
given the importance of developing effective solutions for data
recovery and reconciliation to address extreme cyber scenarios, the
Board believes that designated FMUs should expressly be required to
demonstrate that such solutions function as intended. Designated FMUs
should also continue to plan for and test other scenarios, including
wide-scale disruptions and major disruptions, from which they may need
to recover.\33\
---------------------------------------------------------------------------
\33\ Scenarios-based testing allows a designated FMU to address
an appropriately broad scope of scenarios, including simulation of
extreme but plausible events, and should be designed to challenge
the assumptions of response, resumption, and recovery practices,
including governance arrangements and communication plans.
---------------------------------------------------------------------------
Proposed Sec. 234.3(a)(17)(viii)(F) would require a designated FMU
to review its business continuity plans, pursuant to the general review
requirements described in section II.A.2 above, at least annually. The
objectives of this review are twofold: (1) to incorporate lessons
learned from actual and averted disruptions, and (2) to update the
scenarios considered and assumptions built into the plan in order to
ensure responsiveness to the evolving risk environment and incorporate
new and evolving sources of operational risk (e.g., extreme cyber
events).
5. Questions
With respect to proposed Sec. 234.3(a)(17)(viii), the Board
requests comment on the following specific questions:
9. What are reasonable estimates of the costs and other challenges
associated with proposed Sec. 234.3(a)(17)(viii)?
10. Is the proposed formulation of ``two sites providing for
sufficient redundancy supporting critical operations'' a clear and
appropriate replacement for references to ``primary'' and ``secondary''
sites in the current rule?
11. Is the proposed requirement on addressing ``reconnection'' of
the designated FMU after a disruption clear? Should a different term be
used, given the intention of this proposed requirement, as explained in
section II.C.3 above?
D. Third-Party Risk Management
The Board expects a designated FMU to conduct its activities--
whether conducted directly by the designated FMU or through a service
provider--in a safe and sound manner. The Board is proposing to add
Sec. 234.3(a)(17)(ix) regarding the management of risks associated
with third-party relationships. Proposed Sec. 234.3(a)(17)(ix) would
require a designated FMU to have systems, policies, procedures, and
controls in order to effectively identify, monitor, and manage risks
associated with third-party relationships. Additionally, for any
service that is performed for the designated FMU by a third party,
these systems, policies, procedures, and controls would need to ensure
that risks are identified, monitored, and managed to the same extent as
if the designated FMU were performing the service itself. Importantly,
the risks associated with third-party relationships would include both
the risks stemming from the third party itself, as well as risks
stemming from the supply chain.
Additionally, the Board is proposing to add ``third party'' as a
defined term in Regulation HH. Specifically, proposed Sec. 234.2(n)
would define ``third party'' as ``any entity with which a designated
FMU maintains a business arrangement, by contract or otherwise.'' \34\
For the purposes of proposed Sec. 234.3(a)(17)(ix), the Board would
consider third-party relationships to include vendor relationships for
products such as for software and arrangements for any services that
third parties perform for a designated FMU.\35\ Services can include a
wide variety of arrangements, from HVAC services that support the
physical infrastructure of the designated FMU to technology platforms
or financial risk management modeling that are essential to executing
the designated FMU's payment, clearing, or settlement activities. The
Board believes that where a designated FMU outsources the provision of
services to a third party, the designated FMU retains the
responsibility for meeting the risk-management standards in Regulation
HH.
---------------------------------------------------------------------------
\34\ Participants of designated FMUs would not be considered
third parties. This definition is consistent with the definition of
``third-party relationship'' in the proposed interagency guidance on
third-party relationships. See 86 FR 38182, 38186-87 (July 17,
2021). The Board views the requirements of proposed Sec.
234.3(a)(17)(ix) as broadly consistent with the proposed interagency
guidance. In examining designated FMUs under Regulation HH, Board
examiners will continue to reference guidance on third-party risk
management.
\35\ Relatedly, the Board believes this proposal is consistent
with section 807(b) of the Dodd-Frank Act, which provides each
Supervisory Agency of a designated FMU with authority examine the
provision of any service integral to the operation of the designated
FMU for compliance with applicable law, rules, orders, and standards
to the same extent as if the designated FMU were performing the
service on its own premises. 12 U.S.C. 5466(b).
---------------------------------------------------------------------------
The Board is proposing these requirements because of the importance
of ensuring that a designated FMU's activities do not become less safe
when they are outsourced to third parties, and because of the
importance of managing particular sources of operational risk
associated with third-party relationships, including ``supply chain
risk.'' \36\ Supply chain risk encompasses the potential for harm or
compromise to a designated FMU that arises as a result of security
risks from its third parties' subcontractors or suppliers, as well as
the subcontractors' or suppliers' supply chains, and their products or
services (including software that may be used by the third party or the
designated FMU).\37\
---------------------------------------------------------------------------
\36\ The Board identified supply chain risk as a threat on which
the Board is focused in its report on cybersecurity and financial
system resilience. See Board of Governors of the Federal Reserve
System, Report to Congress: Cybersecurity and Financial System
Resilience Report (September 2021), https://www.federalreserve.gov/publications/files/cybersecurity-report-202109.pdf.
\37\ This definition is consistent with NIST's definition of
``supply chain risk'' in the NIST computer-security incident
handling guide. See NIST, Computer Security Incident Handling Guide
(Special Publication 800-61, rev. 2), https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf.
---------------------------------------------------------------------------
Further, proposed Sec. 234.3(a)(17)(ix) would require a designated
FMU to regularly conduct risk assessments of its third-party
relationships and establish, as appropriate, information-sharing
arrangements with third parties. Proposed Sec. 234.3(a)(17)(ix) would
also require a designated FMU to include third parties in business
continuity management and testing, as appropriate. The Board believes
these specific measures are critical to a designated FMU's ability to
effectively manage risks related to third-party relationships.
In general, the Board would expect a designated FMU to take a
rigorous approach to identifying, monitoring, and managing risks
associated with third-party relationships. To identify and assess the
risks from third parties effectively, it would be prudent for the
designated FMU to understand ex ante any risks associated with the
third party, including details on the services or products the third
party will provide and the security controls that the third party has
in place. Before entering into a third-party relationship, the
designated FMU should have a plan in place to address how it will
effectively identify, monitor, and manage the relationship and its
associated risks, in order to ensure that the designated FMU can
continue to meet the risk-management requirements in Regulation HH. A
designated FMU should conduct
[[Page 60322]]
appropriate due diligence on third parties and should include, as
appropriate, provisions in service contracts that establish
information-sharing agreements based on the risk level of the third
party. Information-sharing arrangements should include, where
necessary, expectations related to when the designated FMU would be
notified of material operational incidents at the third party.
To assess risk levels of third parties and monitor any changes in
these risk levels that may affect a designated FMU and its ecosystem,
the designated FMU should ensure that it regularly conducts risk
assessments of its third-party relationships and that its information-
sharing agreements include, where appropriate, information on the third
party's information security controls and operational resilience
objectives and capabilities. To manage risks posed by third parties, a
designated FMU should adopt risk management practices that are
commensurate with the level of risk posed by its third-party
relationships, as identified through the risk assessments it conducts.
For example, to manage supply chain risks, a designated FMU might
require, in its contracts with certain third parties that are critical
to its operations and services, mandatory approval from the designated
FMU before the service provider may outsource any material elements of
its service to another party.
In addition, a designated FMU should include third parties in its
business continuity management and testing, as appropriate. A
designated FMU should run scenario exercises with third parties to
ensure that the designated FMU can effectively manage any instances in
which a third party experiences an incident causing disruption or
material degradation to the designated FMU's critical operations or
services. For example, a designated FMU should be prepared to react--
such as by switching to a contingency plan--to a cyberattack on one of
its third parties that causes disruptions in that entity's ability to
enable the designated FMU to fulfill its obligations on time.
1. Questions
With respect to proposed Sec. 234.3(a)(17)(ix), the Board requests
comment on the following specific questions:
12. Are there other risk-management measures that are essential to
effective management of third-party relationship risks that the Board
should consider setting as an explicit minimum requirement?
13. Is the proposed requirement on managing risks associated with
``third-party'' relationships clear? Should a different term be used,
given the intention of this proposed requirement, as explained in
section II.D above?
14. Are there challenges associated with implementation of this
proposed requirement that the Board has not considered?
15. Should the proposed requirements related to third-party risk
management be codified in Sec. 234.3(a)(17) as proposed, or should the
Board consider an alternative placement for these requirements in
Regulation HH?
E. Technical Revisions
1. Definition of Operational Risk
Proposed Sec. 234.2(h) would add ``operational risk'' as a defined
term in Regulation HH. Under the proposal, this term is defined as
``the risk that deficiencies in information systems or internal
processes, human errors, management failures, or disruptions from
external events will result in the reduction, deterioration, or
breakdown of services provided by the designated financial market
utility.''
The proposed definition of ``operational risk'' is consistent with
the definition for operational risk in the PFMI and the Board's
definition in part I of the Federal Reserve Policy on Payment System
Risk (PSR policy), which sets out the Board's views, and related
standards, regarding the management of risks in financial market
infrastructures, including those operated by the Reserve Banks.\38\ The
Board also provided this definition of operational risk when it
proposed the current operational risk-management standard in Regulation
HH in 2014; however, the Board did not believe a defined term in the
rule text was necessary at that time. For clarifying purposes, the
Board is proposing to adopt ``operational risk'' as a defined term.
---------------------------------------------------------------------------
\38\ The Board revised concurrently the risk-management
standards in Regulation HH and part I of the PSR policy based on the
PFMI in 2014.
---------------------------------------------------------------------------
2. Definition of Critical Operations and Critical Services
Proposed Sec. 234.2(d) would add ``critical operations'' and
``critical services'' as defined terms in Regulation HH, in order to
streamline references to these terms. Under the proposal, these terms
are defined as ``any operations or services that the designated
financial market utility identifies under 12 CFR 234.3(a)(3)(iii)(A).''
Under Sec. 234.3(a)(3)(iii)(A), a designated FMU must identify its
critical operations and services related to payment, clearing, and
settlement for purposes of developing its integrated plans for recovery
and orderly wind-down.
The Board's proposed amendments to Sec. 234.3(a)(17) related to
review and testing, incident management and planning, and business
continuity management planning, refer to a designated FMU's critical
operations and/or services in multiple places. Amending Regulation HH
to include definitions of ``critical operations'' and ``critical
services'' would clarify that the critical operations or services that
the designated FMU should consider under paragraph (a)(17) are the same
set of critical operations and services that the designated FMU has
identified under paragraph (a)(3). These technical revisions are not
expected to result in changes to designated FMUs' business continuity
management and planning.
3. Cross-Reference to ``Other Entities'' Identified in Sec.
234.3(a)(3) on Comprehensive Management of Risk
Current Sec. 234.3(a)(17)(ii) requires a designated FMU to
identify, manage, and monitor the risks that its operations might pose
to other ``financial market utilities and trade repositories, if any.''
The Board proposes to streamline and replace this reference with other
``relevant entities such as those referenced in paragraph (a)(3)(ii).''
The Board believes this requirement is consistent with the current
requirement under subparagraph (a)(3)(ii) for the designated FMU to
identify, measure, monitor, and manage the material risks that it poses
to other entities, such as other FMUs, settlement banks, liquidity
providers, and service providers, as a result of interdependencies. As
a conforming revision, the Board is proposing to include ``trade
repositories'' in the list of entities listed under paragraph
(a)(3)(ii).\39\
---------------------------------------------------------------------------
\39\ Because of the differences in the definition for financial
market infrastructure in the PFMI, which includes trade
repositories, and the definition of FMU in the Dodd-Frank Act, which
does not, the Board inadvertently excluded the reference to ``trade
repositories'' in Sec. 234.3(a)(3)(ii).
---------------------------------------------------------------------------
4. Operational Capabilities To Ensure High Degree of Security and
Operational Reliability
Current Sec. 234.3(a)(17)(iii) requires a designated FMU to have
``policies and systems'' that are designed to achieve clearly defined
objectives to ensure a high degree of security and operational
reliability. The Board expects a designated FMU to establish clearly
defined objectives to ensure a high degree of security and operational
reliability; to have systems designed to achieve these objectives; and
to have policies, such as benchmarks, in place
[[Page 60323]]
for the designated FMU to evaluate its systems' performance against
these objectives.
A designated FMU is implicitly required to have the operational
capability to achieve these objectives. The Board is proposing to make
this requirement explicit by clarifying that a designated FMU must have
``operational capabilities''--in addition to policies and systems--that
are designed to achieve clearly defined objectives to ensure a high
degree of security and operational reliability. This additional
emphasis on having operational capabilities in addition to policies and
systems is in line with proposed Sec. 234.3(a)(17)(i)(A)(2), which
emphasizes the need for a designated FMU to assess whether its relevant
systems, policies, procedures, and controls function as intended.
5. Identify, Monitor, and Manage Potential and Evolving Vulnerabilities
and Threats
Current Sec. 234.3(a)(17)(v) requires a designated FMU to have
comprehensive physical, information, and cyber security policies,
procedures, and controls ``that address'' potential and evolving
vulnerabilities and threats. The Board is proposing to replace the
quoted text with ``that enable the designated financial market utility
to identify, monitor, and manage'' potential and evolving
vulnerabilities and threats. The Board believes this is a technical
change that would clarify what it means to ``address'' potential and
evolving vulnerabilities and threats.
6. Questions
With respect to the proposed set of technical amendments, the Board
requests comment on the following specific question:
16. Would any of these proposed amendments effect a substantive
change? If so, how?
III. Administrative Law Matters
A. Regulatory Flexibility Act Analysis
The Regulatory Flexibility Act, 5 U.S.C. 601 et seq. (RFA),
requires an agency to consider the impact of its proposed rules on
small entities. In connection with a proposed rule, the RFA generally
requires an agency to prepare an Initial Regulatory Flexibility
Analysis (IRFA) describing the impact of the rule on small entities,
unless the head of the agency certifies that the proposed rule will not
have a significant economic impact on a substantial number of small
entities and publishes such certification along with a statement
providing the factual basis for such certification in the Federal
Register. An IRFA must contain (1) a description of the reasons why
action by the agency is being considered; (2) a succinct statement of
the objectives of, and legal basis for, the proposed rule; (3) a
description of, and, where feasible, an estimate of the number of small
entities to which the proposed rule will apply; (4) a description of
the projected reporting, recordkeeping, and other compliance
requirements of the proposed rule, including an estimate of the classes
of small entities that will be subject to the requirement and the type
of professional skills necessary for preparation of the report or
record; (5) an identification, to the extent practicable, of all
relevant Federal rules that may duplicate, overlap with, or conflict
with the proposed rule; and (6) a description of any significant
alternatives to the proposed rule that accomplish its stated
objectives.
The Board is providing an IRFA with respect to the proposed rule.
For the reasons described below, the Board believes that the proposal
will not have a significant economic impact on a substantial number of
small entities. The Board invites public comment on all aspects of its
IRFA.
1. Reasons Action Is Being Considered
The Board is proposing to amend Regulation HH to update current
standards related to operational risk management in light of
developments in the operational risk, technology, and regulatory
landscape in which designated FMUs operate. Further discussion of the
rationale for the proposal is provided in section I.C, above.
2. Objectives of the Proposed Rule
As described in section I.B, above, section 805(a)(1)(A) of the
Dodd-Frank Act requires the Board to prescribe risk-management
standards, taking into consideration relevant international standards
and existing prudential requirements, applicable to certain designated
FMUs. Pursuant to this authority, the Board issued Regulation HH in
2012 and significantly revised Regulation HH in 2014. The Board is now
proposing revisions to the current Regulation HH standards related to
operational risk management. The Board's objective is to promote
effective operational risk management practices at and the operational
resilience of designated FMUs subject to Regulation HH, and as a
result, advance safety and soundness and promote the stability of the
U.S. financial system.
3. Description and Estimate of the Number of Small Entities
Regulation HH applies to designated FMUs other than derivatives
clearing organizations registered with the CFTC and clearing agencies
registered with the SEC. At present, the FSOC has designated eight FMUs
as systemically important; two of these designated FMUs are subject to
the Board's Regulation HH.
The Small Business Administration (SBA) has adopted size standards
for determining whether a particular entity is considered a ``small
entity'' for purposes of the RFA. The Board believes that the most
appropriate SBA size standard to apply in determining whether a
designated FMU is a small entity is the SBA size standard for financial
transactions processing, reserve, and clearinghouse activities; under
this standard, a designated FMU is considered a small entity if its
annual receipts are less than $41.5 million.\40\ When applying this SBA
size standard, the Board includes the assets of all domestic and
foreign affiliates in determining whether to classify a designated FMU
as a small entity.\41\
---------------------------------------------------------------------------
\40\ 13 CFR 121.201 (subsector 522320). Alternatively, the SBA
size standards for (1) securities and commodities exchanges, (2)
trust, fiduciary, and custody activities, or (3) international trade
financing activities could also apply to certain designated FMUs;
these size standards are currently the same as the size standard for
financial transactions processing, reserve, and clearinghouse
activities (i.e., annual receipts of less than $41.5 million). Id.
(subsectors 523210, 523991, and 522293).
\41\ 13 CFR 121.103.
---------------------------------------------------------------------------
After applying this SBA size standard, the Board believes that
neither of the designated FMUs that are subject to Regulation HH are
considered small entities.
4. Estimating Compliance Requirements
The proposal updates current standards in Regulation HH related to
operational risk management in light of developments in the operational
risk, technology, and regulatory landscape in which designated FMUs
operate. The proposed revisions are discussed in detail in section II,
above. In general, the proposed revisions would add specificity to the
current operational risk management standards by codifying existing
practices of designated FMUs into the regulation. Because the proposed
revisions do not represent a significant change from existing practices
of designated FMUs, the Board would not expect the proposed revisions
to have a significant economic impact on those small entities.
[[Page 60324]]
5. Duplicative, Overlapping, and Conflicting Rules
The Board is not aware of any federal rules that may duplicate,
overlap with, or conflict with the proposed rule.
6. Significant Alternatives Considered
The Board did not consider any significant alternatives to the
proposed rule. The Board believes that updating the current Regulation
HH standards related to operational risk management in light of
developments in the operational risk, technology, and regulatory
landscape in which designated FMUs operate is the best way to achieve
the Board's objectives of promoting effective operational risk
management practices at and the operational resilience of designated
FMUs subject to Regulation HH, and as a result, advancing safety and
soundness and promoting the stability of the U.S. financial system.
B. Competitive Impact Analysis
As a matter of policy, the Board conducts a competitive impact
analysis in connection with any operational or legal changes that could
have a substantial effect on payment system participants, even if
competitive effects are not apparent on the face of the proposal.
Pursuant to this policy, the Board assesses whether proposed changes
``would have a direct and material adverse effect on the ability of
other service providers to compete effectively with the Federal Reserve
in providing similar services'' and whether any such adverse effect
``was due to legal differences or due to a dominant market position
deriving from such legal differences.'' If, as a result of this
analysis, the Board identifies an adverse effect on competition, the
Board then assesses whether the associated benefits--such as
improvements to payment system efficiency or integrity--can be achieved
while minimizing the adverse effect on competition.\42\
---------------------------------------------------------------------------
\42\ See Policies: The Federal Reserve in the Payments System
(issued 1984; revised 1990 and January 2001), https://www.federalreserve.gov/paymentsystems/pfs_frpaysys.htm.
---------------------------------------------------------------------------
Designated FMUs are subject to the supervisory framework
established under Title VIII of the Dodd-Frank Act. This proposed rule
revises current Regulation HH operational risk-management standards for
certain designated FMUs. At least one designated FMU that is currently
subject to Regulation HH competes with a similar service provided by
the Reserve Banks.
Under the Federal Reserve Act, the Board has general supervisory
authority over the Reserve Banks, including the Reserve Banks'
provision of payment and settlement services. This general supervisory
authority is more extensive in scope than the Board's authority over
certain designated FMUs under Title VIII. In practice, Board oversight
of the Reserve Banks goes beyond the typical supervisory framework for
private-sector entities, including the framework provided by Title
VIII. The Board is committed to applying risk-management standards to
the Reserve Banks' Fedwire Funds Service and Fedwire Securities Service
(collectively, Fedwire Services) that are at least as stringent as the
Regulation HH standards that are applied to designated FMUs that
provide similar services. This would continue to be the case if the
proposed revisions to the operational risk management standards in
Regulation HH are adopted. Specifically, the Fedwire Services are
subject to in the risk-management standards in part I of the PSR
policy, which (like those in Regulation HH) are based on the PFMI. The
Board is be guided by its interpretation of the corresponding
provisions of Regulation HH in its application of the risk management
expectations in the PSR policy.\43\ Therefore, the Board does not
believe the proposed rule will have any direct and material adverse
effect on the ability of other service providers to compete with the
Reserve Banks.
---------------------------------------------------------------------------
\43\ See section I.B.1 of the PSR policy.
---------------------------------------------------------------------------
C. Paperwork Reduction Act Analysis
In accordance with the Paperwork Reduction Act of 1995 (44 U.S.C.
3506; 5 CFR part 1320, Appendix A.1), the Board reviewed the proposed
rule under the authority delegated to the Board by the Office of
Management and Budget. For purposes of calculating burden under the
Paperwork Reduction Act, a ``collection of information'' involves 10 or
more respondents. Any collection of information addressed to all or a
substantial majority of an industry is presumed to involve 10 or more
respondents (5 CFR 1320.3(c), 1320.3(c)(4)(ii)). The Board estimates
there are fewer than 10 respondents and these respondents do not
represent all or a substantial majority of the participants in payment,
clearing, and settlement systems. Therefore, no collections of
information under the Paperwork Reduction Act are contained in the
proposed rule.
List of Subjects in 12 CFR Part 234
Banks, banking, Credit, Electronic funds transfers, Financial
market utilities, Securities.
For the reasons set forth in the preamble, the Board proposes to
amend part 234 of chapter II of title 12 of the Code of Federal
Regulations, as follows:
PART 234--DESIGNATED FINANCIAL MARKET UTILITIES (REGULATION HH)
0
1. The authority citation for part 234 continues to read as follows:
Authority: 12 U.S.C. 5461 et seq.
0
2. Revise Sec. 234.2 as follows:
Sec. 234.2 Definitions.
(a) Backtest means the ex post comparison of realized outcomes with
margin model forecasts to analyze and monitor model performance and
overall margin coverage.
(b) Central counterparty means an entity that interposes itself
between counterparties to contracts traded in one or more financial
markets, becoming the buyer to every seller and the seller to every
buyer.
(c) Central securities depository means an entity that provides
securities accounts and central safekeeping services.
(d) Critical operations and critical services refer to any
operations or services that the designated financial market utility
identifies under 12 CFR 234.3(a)(3)(iii)(A).
(e) Designated financial market utility means a financial market
utility that is currently designated by the Financial Stability
Oversight Council under section 804 of the Dodd-Frank Act (12 U.S.C.
5463).
(f) Financial market utility has the same meaning as the term is
defined in section 803(6) of the Dodd-Frank Act (12 U.S.C. 5462(6)).
(g) Link means, for purposes of Sec. 234.3(a)(20), a set of
contractual and operational arrangements between two or more central
counterparties, central securities depositories, or securities
settlement systems, or between one or more of these financial market
utilities and one or more trade repositories, that connect them
directly or indirectly, such as for the purposes of participating in
settlement, cross margining, or expanding their services to additional
instruments and participants.
(h) Operational risk means the risk that deficiencies in
information systems or internal processes, human errors, management
failures, or disruptions from external events will result in the
reduction, deterioration, or breakdown of services provided by the
designated financial market utility.
(i) Orderly wind-down means the actions of a designated financial
market utility to effect the permanent cessation, sale, or transfer of
one or more of its
[[Page 60325]]
critical operations or services in a manner that would not increase the
risk of significant liquidity or credit problems spreading among
financial institutions or markets and thereby threaten the stability of
the U.S. financial system.
(j) Recovery means, for purposes of Sec. 234.3(a)(3) and (15), the
actions of a designated financial market utility, consistent with its
rules, procedures, and other ex ante contractual arrangements, to
address any uncovered loss, liquidity shortfall, or capital inadequacy,
whether arising from participant default or other causes (such as
business, operational, or other structural weaknesses), including
actions to replenish any depleted prefunded financial resources and
liquidity arrangements, as necessary to maintain the designated
financial market utility's viability as a going concern and to continue
its provision of critical services.
(k) Securities settlement system means an entity that enables
securities to be transferred and settled by book entry and allows
transfers of securities free of or against payment.
(l) Stress test means the estimation of credit or liquidity
exposures that would result from the realization of potential stress
scenarios, such as extreme price changes, multiple defaults, and
changes in other valuation inputs and assumptions.
(m) Supervisory Agency has the same meaning as the term is defined
in section 803(8) of the Dodd-Frank Act (12 U.S.C. 5462(8)).
(n) Third party means any entity with which a designated financial
market utility maintains a business arrangement, by contract or
otherwise.
(o) Trade repository means an entity that maintains a centralized
electronic record of transaction data, such as a swap data repository
or a security-based swap data repository.
0
3. Amend Sec. 234.3 by:
0
(a) Revising the section heading;
0
(b) Adding the words ``trade repositories,'' after the words ``such as
other financial market utilities,'' in paragraph (a)(3)(ii);
0
(c) Removing the word ``following'' and adding in its place ``after'',
in paragraph
0
(a)(3)(iii)(G);
0
(d) Revising paragraph (a)(17); and
0
(e) Removing the word ``following'' and adding in its place ``to
reflect'', in paragraph (a)(23)(v).
The revisions read as follows:
Sec. 234.3 Standards for designated financial market utilities.
(a) * * *
(17) Operational risk. The designated financial market utility
manages its operational risks by establishing a robust operational
risk-management framework that is approved by the board of directors.
In this regard, the designated financial market utility--
(i) Identifies the plausible sources of operational risk, both
internal and external, and mitigates their impact through the use of
appropriate systems, policies, procedures, and controls--including
those specific systems, policies, procedures, or controls required
pursuant to this paragraph (a)(17)--that are reviewed, audited, and
tested periodically and after major changes such that--
(A) The designated financial market utility conducts tests--
(1) In accordance with a documented testing framework that
addresses scope, frequency, participation, interdependencies, and
reporting; and
(2) That assess whether the designated financial market utility's
systems, policies, procedures, or controls function as intended;
(B) The designated financial market utility reviews the design,
implementation, and testing of systems, policies, procedures, and
controls, after material operational incidents, including the material
operational incidents described in paragraph (a)(17)(vi)(A) of this
section, or after significant changes to the environment in which the
designated financial market utility operates; and
(C) The designated financial market utility remediates as soon as
possible, following established governance processes, any deficiencies
in systems, policies, procedures, or controls identified in the process
of review or testing;
(ii) Identifies, monitors, and manages the risks its operations
might pose to other relevant entities such as those referenced in
paragraph (a)(3)(ii) of this section;
(iii) Has policies, systems, and operational capabilities that are
designed to achieve clearly defined objectives to ensure a high degree
of security and operational reliability;
(iv) Has systems that have adequate, scalable capacity to handle
increasing stress volumes and achieve the designated financial market
utility's service-level objectives;
(v) Has comprehensive physical, information, and cyber security
policies, procedures, and controls that enable the designated financial
market utility to identify, monitor, and manage potential and evolving
vulnerabilities and threats;
(vi) Has a documented framework for incident management that
provides for the prompt detection, analysis, and escalation of an
incident, appropriate procedures for addressing an incident, and
incorporation of lessons learned following an incident. This framework
includes a plan for notification and communication of material
operational incidents to identified relevant entities that ensures the
designated financial market utility--
(A) Immediately notifies the Board when the designated financial
market utility activates its business continuity plan or has a
reasonable basis to conclude that--
(1) There is an actual or likely disruption, or material
degradation, to any critical operations or services, or to its ability
to fulfill its obligations on time; or
(2) There is unauthorized entry, or the potential for unauthorized
entry, into the designated financial market utility's computer,
network, electronic, technical, automated, or similar systems that
affects or has the potential to affect its critical operations or
services;
(B) Establishes criteria and processes providing for timely
communication and responsible disclosure of material operational
incidents to the designated financial market utility's participants and
other relevant entities, such that--
(1) Affected participants are notified immediately of actual
disruptions or material degradation to any critical operations or
services, or to the designated financial market utility's ability to
fulfill its obligations on time; and
(2) All participants and other relevant entities, as identified in
the designated financial market utility's plan for notification and
communication, are notified in a timely manner of all other material
operational incidents that require notification under paragraph
(a)(17)(vi)(A) of this section;
(vii) Has business continuity management that provides for rapid
recovery and timely resumption of critical operations and services and
fulfillment of its obligations, including in the event of a wide-scale
disruption or a major disruption;
(viii) Has a business continuity plan that--
(A) Incorporates the use of two sites providing for sufficient
redundancy supporting critical operations that are located at a
sufficient geographical distance from each other to have a distinct
risk profile;
(B) Is designed to enable critical systems, including information
technology systems, to recover and resume critical operations and
services no later than two hours following disruptive events;
[[Page 60326]]
(C) Is designed to enable it to complete settlement by the end of
the day of the disruption, even in case of extreme circumstances;
(D) Sets out criteria and processes that address the reconnection
of the designated financial market utility to participants and other
entities following a disruption to the designated financial market
utility's critical operations or services;
(E) Provides for testing, pursuant to the requirements under
paragraphs (a)(17)(i)(A) and (a)(17)(i)(C) of this section, at least
annually, of the designated financial market utility's business
continuity arrangements, including the people, processes, and
technologies of the sites required under paragraph (a)(17)(viii)(A),
such that it can demonstrate that--
(1) The designated financial market utility can run live production
at the sites required under paragraph (a)(17)(viii)(A);
(2) The designated financial market utility's solutions for data
recovery and data reconciliation enable it to meet its recovery and
resumption objectives even in case of extreme circumstances, including
in the event of data loss or data corruption; and
(3) The designated financial market utility has geographically
dispersed staff who can effectively run the operations and manage the
business of the designated financial market utility; and
(F) Is reviewed, pursuant to the requirements under paragraphs
(a)(17)(i)(B) and (a)(17)(i)(C) of this section, at least annually, in
order to--
(1) Incorporate lessons learned from actual and averted
disruptions; and
(2) Update scenarios and assumptions in order to ensure
responsiveness to the evolving risk environment and incorporate new and
evolving sources of operational risk; and
(ix) Has systems, policies, procedures, and controls that
effectively identify, monitor, and manage risks associated with third-
party relationships, and that ensure that, for any service that is
performed for the designated financial market utility by a third party,
risks are identified, monitored, and managed to the same extent as if
the designated financial market utility were performing the service
itself. In this regard, the designated financial market utility--
(A) Regularly conducts risk assessments of third parties and
establishes information-sharing arrangements, as appropriate, with
third parties; and
(B) Includes third parties in business continuity management and
testing, as appropriate.
* * * * *
By order of the Board of Governors of the Federal Reserve
System.
Margaret McCloskey Shanks,
Deputy Secretary of the Board.
[FR Doc. 2022-21222 Filed 10-4-22; 8:45 am]
BILLING CODE P