Cyber Incident Notification Requirements for Federally Insured Credit Unions, 12811-12817 [2023-03682]
Download as PDF
Federal Register / Vol. 88, No. 40 / Wednesday, March 1, 2023 / Rules and Regulations
the NCUA receive timely notice of cyber
incidents that disrupt a FICU’s
operations, lead to unauthorized access
to sensitive data, or disrupt members’
access to accounts or services.
NATIONAL CREDIT UNION
ADMINISTRATION
12 CFR Part 748
RIN 3133–AF47
Cyber Incident Notification
Requirements for Federally Insured
Credit Unions
National Credit Union
Administration.
ACTION: Final rule.
AGENCY:
The National Credit Union
Administration (NCUA or agency) is
amending Part 748 of its regulations to
require a federally insured credit union
(FICU) that experiences a reportable
cyber incident to report the incident to
the NCUA as soon as possible and no
later than 72 hours after the FICU
reasonably believes that it has
experienced a reportable cyber incident.
This notification requirement provides
an early alert to the NCUA and does not
require a FICU to provide a detailed
incident assessment to the NCUA
within the 72-hour time frame.
DATES: The effective date of this final
rule is September 1, 2023.
FOR FURTHER INFORMATION CONTACT:
Policy: Christina Saari, Information
Systems Officer, Office of Examination
and Insurance, at (703) 283–0121; Legal:
Gira Bose, Senior Staff Attorney, Office
of General Counsel, at (703) 518–6540.
SUPPLEMENTARY INFORMATION:
SUMMARY:
I. Introduction
II. Overview of the Final Rule
III. Legal Authority
IV. Discussion of Public Comments Received
on the Proposed Rule
V. Regulatory Procedures
I. Introduction
ddrumheller on DSK120RN23PROD with RULES
A. Background
The NCUA’s requirement that FICUs
develop written security programs and
report certain activity to the NCUA is
codified in 12 CFR part 748. In July
2022, the NCUA Board (Board)
approved a notice of proposed
rulemaking (proposal or proposed rule)
that would require a FICU to notify the
NCUA of any cyber incident that rises
to the level of a reportable cyber
incident.1 The proposed rule would
require such notification as soon as
possible but no later than 72 hours after
a FICU reasonably believes that a
reportable cyber incident has occurred.
As stated in the proposed rule, given
the growing frequency and severity of
cyber incidents within the financial
services industry, it is important that
1 87
FR 45029 (July 27, 2022).
VerDate Sep<11>2014
16:10 Feb 28, 2023
Jkt 259001
B. Summary of Proposed Rule
The proposed rule added a provision
to 12 CFR 748.1 for the NCUA to require
notification of any cyber incident that
rises to the level of a reportable cyber
incident as soon as possible but no later
than 72 hours after a FICU reasonably
believes that a reportable cyber incident
has occurred. As first stated in the
proposed rule and finalized here, in
accordance with § 704.1(a) of the
NCUA’s regulations, this rule also
applies to federally chartered corporate
credit unions and federally insured,
state-chartered corporate credit unions.
The proposed rule defined a cyber
incident as an occurrence that actually
or imminently jeopardizes, without
lawful authority, the integrity,
confidentiality, or availability of
information on an information system or
actually or imminently jeopardizes,
without lawful authority, an
information system.2
The proposed rule defined a
reportable cyber incident as any
substantial cyber incident that leads to
one or more of the following: a
substantial loss of confidentiality,3
integrity,4 or availability of a network or
member information system 5 that
results from the unauthorized access to
or exposure of sensitive data,6 disrupts 7
vital member services,8 or has a serious
26
U.S.C. 659(a)(5).
means preserving authorized
restrictions on information access and disclosure,
including means for protecting personal privacy
and proprietary information. See https://
csrc.nist.gov/glossary/term/confidentiality. The
agency is using definitions from the National
Institute of Standards and Technology (NIST), as
appropriate. NIST is a familiar and trusted source
in the cybersecurity arena and is routinely cited by
the Federal Financial Institutions Examination
Council and individual federal agencies.
4 Integrity means guarding against improper
information modification or destruction and
includes ensuring information non-repudiation and
authenticity. See https://csrc.nist.gov/glossary/
term/integrity.
5 Member information system means any method
used to access, collect, store, use, transmit, protect,
or dispose of member information. 12 CFR part 748,
appendix A, section I.B.2.e.
6 Sensitive data is defined as any information
which by itself, or in combination with other
information, could be used to cause harm to a credit
union or credit union member and any information
concerning a person or the person’s account which
is not public information, including any non-public
personally identifiable information.
7 A disruption is an unplanned event that causes
an information system to be inoperable for a length
of time. https://csrc.nist.gov/glossary/term/
disruption.
8 Vital member services means informational
account inquiries, share withdrawals and deposits,
3 Confidentiality
PO 00000
Frm 00007
Fmt 4700
Sfmt 4700
12811
impact on the safety and resiliency of
operational systems and processes; a
disruption of business operations, vital
member services, or a member
information system resulting from a
cyberattack 9 or exploitation of
vulnerabilities; and/or a disruption of
business operations or unauthorized
access to sensitive data facilitated
through, or caused by, a compromise 10
of a credit union service organization,
cloud service provider, managed service
provider, or other third-party data
hosting provider or by a supply chain
compromise.
The proposed rule definition
excluded any event where the cyber
incident was performed in good faith by
an entity in response to a specific
request by the owner or operator of the
information system.
The Board is adopting this final rule
largely as proposed to give the NCUA
early notice of substantial cyber
incidents that have consequences for
FICUs as stated in the rule.
Shortly before the Board issued its
proposed rule, Congress enacted the
Cyber Incident Reporting for Critical
Infrastructure Act of 2022 (Cyber
Incident Reporting Act) requiring
covered entities to report covered cyber
incidents to the Cybersecurity and
Infrastructure Security Agency (CISA)
not later than 72 hours after the entity
reasonably believes that a covered cyber
incident has occurred.11 CISA has until
2025 to publish a final rule
implementing the Cyber Incident
Reporting Act’s requirements, including
defining the terms used therein.
Nevertheless, as stated in the proposed
rule, the Board believes that it would be
imprudent in light of the increasing
frequency and severity of cyber
and loan payments and disbursements. 12 CFR
749.1.
9 Cyberattack is an attack, via cyberspace,
targeting an enterprise’s use of cyberspace for the
purpose of disrupting, disabling, destroying, or
maliciously controlling a computing environment/
infrastructure; or destroying the integrity of the data
or stealing controlled information. See https://
csrc.nist.gov/glossary/term/Cyber_
Attack#:∼:text=An%20attack
%2C%20via%20cyberspace%2C
%20targeting%20an%20enterprise%E2
%80%99s%20use,SP%20180010B%20from%20NIST%20SP%2080030%20Rev.%201.
10 A compromise is the unauthorized disclosure,
modification, substitution, or use of sensitive data
or the unauthorized modification of a securityrelated system, device, or process in order to gain
unauthorized access. See https://csrc.nist.gov/
glossary/term/compromise#:∼:text=Definition(s)
%3A,an%20object%20may%20have%20occurred.
11 The Cyber Incident Reporting for Critical
Infrastructure Act of 2022, part of the Consolidated
Appropriations Act of 2022, Division Y, Public Law
117–103 (Mar. 15, 2022), is available at https://
www.congress.gov/bill/117th-congress/house-bill/
2471/text.
E:\FR\FM\01MRR1.SGM
01MRR1
12812
Federal Register / Vol. 88, No. 40 / Wednesday, March 1, 2023 / Rules and Regulations
incidents to postpone a notification
requirement until after CISA
promulgates a final rule. To the extent
possible, and as appropriate for the
credit union system, this final rule uses
terminology and a reporting framework
that Congress outlined in the Cyber
Incident Reporting Act. The Board
believes it is in the best interest of the
credit union system to align the NCUA’s
rule with the Cyber Incident Reporting
Act to provide uniform and timely cyber
incident reporting. It is the intention of
the Board for the NCUA to coordinate
with CISA on any future credit union
cyber incident reporting to avoid
duplicate reporting to both the NCUA
and CISA.
ddrumheller on DSK120RN23PROD with RULES
II. Overview of the Final Rule
After carefully considering the
comments received, the NCUA is
issuing this final rule largely as
proposed, as discussed in this section of
the preamble.
Definitions
The proposed rule defined a
reportable cyber incident as, among
other things, any substantial cyber
incident that leads to a substantial loss
of confidentiality, integrity, or
availability of a network or member
information system that results from the
unauthorized access to or exposure of
sensitive data, disrupts vital member
services, or has a serious impact on the
safety and resiliency of operational
systems and processes. Some
commenters felt that the duplicate use
of the term substantial was redundant.
That was the not the intent of the
definition. While the word used is the
same, substantial applies in two
different contexts and thus is retained in
both places to ensure that the agency
receives notification of cyber incidents
that are substantial. This terminology
also aligns with the language used in the
Cyber Incident Reporting Act. In the
event such a cyber incident is one that
leads to a substantial loss of
confidentiality, integrity, or availability
of a network or member information
system, as opposed to a minimal loss,
then such incident would be reportable
to the agency.
The first prong of the reportable cyber
incident definition will require a FICU
to notify the NCUA of a cyber incident
that leads to a substantial loss of
confidentiality, integrity, or availability
of a member information system as a
result of the exposure of sensitive data,
disruption of vital member services, or
that has a serious impact on the safety
and resiliency of operational systems
and processes. For example, if a FICU
becomes aware that a substantial level
VerDate Sep<11>2014
16:10 Feb 28, 2023
Jkt 259001
of sensitive data is unlawfully accessed,
modified, or destroyed, or if the
integrity of a network or member
information system is compromised, the
cyber incident is reportable. If the credit
union becomes aware that a member
information system has been unlawfully
modified and/or sensitive data has been
left exposed to an unauthorized person,
process, or device, that cyber incident is
also reportable, irrespective of intent.
There are many technological reasons
why services may not be available at
any given time as, for example,
computer servers are offline, or systems
are being updated. Such events are
routine and thus would not be
reportable to the NCUA. However, a
failed system upgrade or change that
results in unplanned widespread user
outages for FICU members and
employees would be reportable.
The second prong of the reportable
cyber incident definition will require
reporting to the NCUA in the event of
a cyberattack that leads to a disruption
of business operations, vital member
services, or a member information
system. Cyberattacks that cause
disruption to a FICU’s business
operations, vital member services, or a
member information system must be
reported to the NCUA within 72 hours
of a FICU’s reasonable belief that it has
experienced a cyberattack. For example,
a distributed denial of service (DDoS)
attack that disrupts member account
access will be reportable under this
prong.
Blocked phishing attempts, failed
attempts to gain access to systems, or
unsuccessful malware attacks do not
have to be reported.
The third prong of the reportable
cyber incident definition will require a
FICU to notify the agency within 72
hours after a third-party has informed a
FICU that the FICU’s sensitive data or
business operations have been
compromised or disrupted as a result of
a cyber incident experienced by the
third-party or upon the FICU forming a
reasonable belief this has occurred,
whichever occurs sooner. A cyber
incident, under the third prong would
also only be reportable in the event that
the third-party has a relationship with
the FICU. The rule does not impose a
notification requirement on a FICU for
an incident occurring at any third-party
that, unbeknownst and unrelated to the
FICU, holds information about
individuals who happen to be FICU
members or employees.
A FICU will not be required to report
an incident performed in good faith by
an entity in response to a request by the
owner or operator of the information
system. An example of an incident
PO 00000
Frm 00008
Fmt 4700
Sfmt 4700
excluded from reporting would be the
contracting of a third-party to conduct a
penetration test.12
III. Legal Authority
The Board issues this final rule
pursuant to its authority under the
Federal Credit Union Act (FCUA).
Section 209 of the FCUA is a plenary
grant of regulatory authority to the
Board to issue rules and regulations
necessary or appropriate to carry out its
role as share insurer for all FICUs.13
Section 206 of the FCUA requires the
agency to impose corrective measures
whenever, in the opinion of the Board,
any FICU is engaged in or has engaged
in unsafe or unsound practices in
conducting its business.14 Accordingly,
the FCUA grants the Board broad
rulemaking authority to ensure that the
credit union industry and the National
Credit Union Share Insurance Fund
(Share Insurance Fund) remain safe and
sound.
IV. Discussion of Public Comments
Received on the Proposed Rule
The proposed rule provided for a 60day public comment period, which
closed on September 26, 2022. The
NCUA received 17 comments in
response to the proposed rule. These
comments came from credit unions,
credit union trade associations and
leagues, service providers, and
individual members of the public.
Twelve commenters expressed
support for the proposal. One
commenter felt it was premature for the
Board to issue a rule at this time
because promulgating a rule now could
lead to conflicts with standards yet to be
determined by CISA, which Congress
has tasked with issuing cybersecurity
notification rules across many sectors,
including financial services.
Four credit union commenters
disagreed with the premise that
knowing about and responding to cyber
incidents is important to the NCUA’s
mission. These commenters stated that
the preamble articulated no benefits to
members and that members are already
protected by a FICU’s data security
program, which the NCUA has the
12 A penetration test is a test methodology in
which assessors, typically working under specific
constraints, attempt to circumvent or defeat the
security features of a system. See Assessing Security
and Privacy Controls in Information Systems and
Organizations, NIST Special Publication 800–53A
Revision 5 at 697. Available at https://nvlpubs.
nist.gov/nistpubs/SpecialPublications/NIST.SP.80053Ar5.pdf.
13 12 U.S.C. 1789(a)(11).
14 12 U.S.C. 1786(b)(1). There are a number of
references to ‘‘safety and soundness’’ in the FCUA.
See 12 U.S.C. 1757(5)(A)(vi)(I), 1759(d & f),
1781(c)(2), 1782(a)(6)(B), 1786(b), 1786(e), 1786(f),
1786(g), 1786(k)(2), 1786(r), 1786(s), and 1790d(h).
E:\FR\FM\01MRR1.SGM
01MRR1
Federal Register / Vol. 88, No. 40 / Wednesday, March 1, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES
opportunity to evaluate during the
examination cycle. These four
commenters stated that the NCUA
should show deference to a FICU’s
decision regarding whether or not to
report an incident because the FICU will
be in the best position to know whether
it has met the elements of a reportable
cyber incident.
The Board has considered these
comments and has determined to
proceed to a final rule at this time. As
discussed in the preamble to the
proposed rule, the financial services
sector is one of the main critical
infrastructure sectors targeted by
cyberattacks. The agency has a statutory
obligation to ensure the safety and
soundness of the credit union system
and the Share Insurance Fund. Thus,
the NCUA must be made aware of cyber
incidents that could significantly impact
FICUs and their members. Commenters
are correct in that this rule does not
change the NCUA’s ability to review
data security programs during the
examination cycle. This rule merely
requires early notification to the agency
of substantial cyber incidents. Early
awareness can help the NCUA react to
emerging threats to FICUs and the
broader financial system before they
become systemic. As stated in the
proposed rule, this notification
requirement is intended to serve as an
early alert to the agency and is not
intended to include a lengthy
assessment of the incident. The NCUA
will be providing additional reporting
guidance prior to the final rule going
into effect. However, anytime a FICU is
unsure as to whether a cyber incident is
reportable, the Board encourages the
FICU to contact the agency.
Commenters focused on the following
specific issues:
Reporting Timeframe
The proposed rule put forward a 72hour reporting window for FICUs to
notify the NCUA of a cyber incident that
rises to the level of a reportable cyber
incident. The proposal asked
commenters to discuss whether 72
hours is appropriate or if another time
frame is warranted, such as 36 hours as
the Federal banking agencies require.
Fourteen commenters expressed support
for the 72-hour reporting window. Three
of these commenters asked the agency to
be aware that, while 72 hours is
generally reasonable, even this may be
burdensome for smaller institutions.
One commenter stated that the proposed
timeframe will correspond with
additional administrative burden for
credit unions. One commenter preferred
the 36-hour time frame since this would
be consistent with the Federal banking
VerDate Sep<11>2014
16:10 Feb 28, 2023
Jkt 259001
12813
agencies’ rule and should not be
burdensome in light of the limited
information being sought.
Three commenters recommended that
the 72-hour reporting period begin only
once a FICU has actually discovered a
reportable cyber incident, as the Federal
banking agencies require, rather than
requiring FICUs to come to a reasonable
belief that a reportable cyber incident
has occurred. Another commenter stated
that the Board should not require
reporting until the FICU is aware of
helpful details.
This final rule maintains the reporting
period set forth in the proposed rule
requiring a FICU to notify the NCUA as
soon as possible but no later than 72
hours after the FICU reasonably believes
that a reportable cyber incident has
occurred. This is the same reporting
requirement CISA must implement
under the Cyber Incident Reporting Act.
By maintaining the expectation that a
FICU does not have a reporting
obligation until it has a reasonable belief
that a reportable cyber incident has
occurred, the Board is providing
flexibility based on specific
circumstances that may occur. Only
once the FICU has formed a reasonable
belief that it has experienced a
reportable cyber incident would the
requirement to report within 72 hours
be triggered. The Board does not believe
this minimal notification requirement
would be burdensome to even the
smallest institutions. The burden is
likely to result from the cyber incident
itself. Early notification to the agency
could be beneficial in a number of ways,
including helping the FICU protect its
members and obtaining the agency’s
guidance with the response.
NCUA permit FICUs to report to their
regional office contacts so as to ensure
that the NCUA staff evaluating the
incident are familiar with the affected
FICU’s operations.
The proposed rule states that cyber
incidents may be reported via email,
telephone, or other similar methods that
the NCUA may prescribe. The Board
believes that this approach addresses
the need for flexibility, including if one
or more communication channels are
impacted by the cyber incident. The
NCUA will be providing more detailed
reporting guidance before the effective
date of the final rule.
One commenter asked for clarity on
what follow up communications the
agency expects after a FICU provides the
initial notification of a reportable cyber
incident. The proposed rule stated, ‘‘the
NCUA anticipates that further follow-up
communications between the FICU and
the agency will occur through the
supervisory process, as necessary,’’ but
did not explain what such
communications would entail or what
the expected frequency or level of detail
would be.
The NCUA will determine the
necessity and frequency of follow-up
communications on a case-by-case basis.
Factors in making this determination
may include the severity of impact, the
ability to recover and restore services,
and the potential risk to the financial
system. These factors may evolve over
time. The NCUA is aware that during a
reportable cyber incident, FICUs will be
focused on recovery and, thus, the
agency will generally limit contact
during such incidents to minimize
burden on FICUs.
Reporting Process
With regard to where and how FICUs
should report cyber incidents, two
commenters stated that they would
prefer a single point of contact in the
NCUA’s central office and multiple
methods of reporting—secure online
portal, email, and telephone. One
commenter expressed a preference for
reporting to the regional office but
recognized that the NCUA may prefer
all FICUs to report to the central office.
This commenter suggested that if
reporting is done via portal, then FICUs
should be permitted to go back and edit
their reporting. Two commenters asked
the NCUA to develop a form or checklist
that lists the information the agency is
looking for. One commenter stated that
the NCUA should provide a clear
reporting mechanism via secure email
or web form. Finally, one commenter
expressed support for multiple methods
of reporting but suggested that the
Confidentiality
PO 00000
Frm 00009
Fmt 4700
Sfmt 4700
Five commenters expressed concern
for the security of the information
reported to the NCUA and the potential
negative consequences to FICUs in the
event sensitive information were to leak.
These commenters stated that it is vital
for the NCUA to have a secure
infrastructure with confidentiality
controls and limits on the number of
agency personnel with access to the
reported information. One commenter
asked the NCUA to clarify that cyber
incident reports are not only subject to
part 792 of the NCUA’s rules but are
also exempt from Freedom of
Information Act (FOIA) requests.
The NCUA receives confidential
financial information from FICUs on a
routine basis as a function of its role as
a financial regulator and insurer. Like
all federal agencies, the NCUA must
comply with mandatory security
standards for federal information and
E:\FR\FM\01MRR1.SGM
01MRR1
12814
Federal Register / Vol. 88, No. 40 / Wednesday, March 1, 2023 / Rules and Regulations
information systems.15 The NCUA
meets these requirements by employing
a defense-in-depth 16 approach to
information and system security,
including robust technical and
administrative controls and
comprehensive procedures for
preventing and addressing potential
compromises to information in the
NCUA’s custody and control.17
Reporting under this rule will be
subject to part 792 of the NCUA’s rules
and exempt from FOIA requests under
FOIA exemptions 4 and 8, and
potentially exemptions 6 and 7(c).18
ddrumheller on DSK120RN23PROD with RULES
Definition of Reportable Cyber Incident
Eight commenters suggested the
NCUA provide more clarity around
what the agency considers to be a
substantial cyber incident. Of these, five
commenters stated that the NCUA
should focus on the materiality of the
incident and include a materiality
standard to avoid overreporting and to
provide a sufficient threshold to ensure
reporting only of major disruptions and
not minor ones. One of these
commenters stated that the definition of
reportable cyber incident itself is
acceptable and leaves room to enable
ongoing alignment with other
frameworks such as future CISA
guidance. However, the commenter
stated that the definition of substantial
should include a materiality standard.
One commenter suggested that
substantial could be defined based on
the percentage of members impacted,
duration of impact, or other similar
metrics which scale with the size of the
FICU. Another commenter suggested
that any factors used to define
substantial should be principles-based
rather than enumerate different types of
data, systems, or other static elements,
which can quickly change as best
practices and mitigation strategies
evolve over time. This commenter noted
that, however defined, the agency
should grant appropriate deference to
the reasonable judgment of the FICU.
Another commenter expressed support
for the definition of reportable cyber
incident but stated that rather than just
15 Federal Information Security Modernization
Act of 2014 (FISMA), 44 U.S.C. Chapter 35; FIPS
Publication 199, Standards for Security
Categorization of Federal Information and
Information Systems; FIPS Publication 200,
Minimum Security Requirements for Federal
Information and Information Systems.
16 Defense-in Depth is the application of multiple
countermeasures in a layered or stepwise manner
to achieve security objectives. See https://
csrc.nist.gov/glossary/term/defense_in_depth.
17 NIST Special Publication 800–53 (Rev. 5),
Security and Privacy Controls for Federal
Information Systems and Organizations.
18 12 CFR part 792; 5 U.S.C. 552(b)(4), (6), (7)(c),
and (8).
VerDate Sep<11>2014
16:10 Feb 28, 2023
Jkt 259001
providing a definition of substantial, it
would be more helpful if the NCUA
were to provide examples of reportable
incidents.
The Board agrees that a definition that
relies on specific data points, systems,
or other static elements may be
unnecessarily complicated and may
quickly become obsolete. By using the
term substantial, the Board seeks to
convey an expectation that the agency
will be notified of cyber incidents that
are extensive or significant to the FICU
or its members (or both), rather than
minor or inconsequential. The
dictionary definition of substantial is
‘‘something that is important, essential,
considerable in quantity, or significantly
great.’’ 19 In lieu of a more complicated
definition, the agency intends to add to
the examples of reportable cyber
incidents provided in the proposed rule.
Commenters who requested that a
materiality standard be added to the
term substantial did not offer any
definitions or suggest how a material
cyber incident would be something
other than a substantial cyber incident.
If a FICU is unsure as to whether a cyber
incident is reportable, the Board
encourages the FICU to contact the
agency. However, once the rule is
implemented the agency will continue
to assess whether further clarity or
guidance is needed over time.
Examples of Reportable Cyber Incidents
Three commenters stated that the list
of reportable incidents in the proposed
rule is helpful and should be kept
current. One commenter stated that the
NCUA should provide more examples of
nonreportable incidents.
The NCUA will be providing
additional reporting guidance and
examples of reportable incidents and
non-reportable incidents prior to the
effective date of this final rule. In
addition, the NCUA is retaining the
examples provided in the proposed rule
with some minor edits, as discussed
below.
The agency is clarifying the following
example which was cited in the
proposed rule: ‘‘A systems compromise
resulting from card skimming,’’ is being
changed to ‘‘Member information
compromised as a result of card
skimming at a credit union’s ATM.’’ 20
Third-Party Compromise
Two commenters noted that contracts
with third-party service providers may
not perfectly align with the reporting
19 Merriam Webster Dictionary, available at
https://www.merriam-webster.com/dictionary/
substantial.
20 See example 7 at 87 FR 45029, 45032 (July 27,
2022).
PO 00000
Frm 00010
Fmt 4700
Sfmt 4700
proposed in this rule. One commenter
sought clarification that the NCUA is
not intending to impact existing
contractual relationships. Another
commenter stated that FICU reporting of
third-party breaches should only be
required once the third-party notifies
the FICU that its information has been
materially compromised. Without
receiving information from the thirdparty, the FICU has no way to know if
it has experienced a cyber incident.
One commenter noted that thirdparties only provide notification once
their investigations are almost complete.
Another commenter expressed concerns
about the ability of FICUs to make
decisions about third-party breaches
when third-parties may be reluctant to
offer information until they have done
their own investigations. Thus, the
commenter stated that the NCUA should
defer to a FICU’s judgment about
whether a reportable cyber incident has
occurred. Another commenter stated
that the NCUA must focus on when the
FICU formed a reasonable belief and not
when a third-party made that
determination. Finally, one commenter
stated that the NCUA should not, as
suggested by one example in the
preamble to the proposed rule, impose
a reporting requirement when a FICU
employee’s personally identifiable
information (PII) is implicated in a data
breach at another organization that has
no affiliation with the FICU.
This rule does not impact existing
contractual relationships. While the
proposed rule asked FICUs to share how
third-parties provide notice to FICUs in
the event of a cyber incident, there is no
requirement in the proposed or final
rules that FICUs amend existing
contracts to comply with this rule. The
rule requires only that the agency
receive notice of a reportable cyber
incident that impacts a FICU either
within 72 hours of being notified by a
third-party or within 72 hours of a FICU
forming a reasonable belief that it has
experienced a reportable cyber incident.
For example, a FICU reasonably may not
be aware that a third-party has
experienced a breach absent a
notification from the third-party.
However, if a FICU experiences a
disruption by losing access to its
member accounts, it reasonably should
be aware that its core service provider
has been compromised. The rule does
not permit FICUs to provide notice only
after the FICU or the third-party have
completed all their investigations
because the core purpose of the rule is
for the agency to receive an early
notification that an incident has
occurred. The Board recognizes that a
FICU’s understanding of an incident is
E:\FR\FM\01MRR1.SGM
01MRR1
Federal Register / Vol. 88, No. 40 / Wednesday, March 1, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES
likely to evolve, and initial reporting
can be incomplete or even inaccurate
due to limited information. However,
early notification, even if substantively
limited, is preferable when compared to
delayed notification which may have
the effect of impeding the agency’s
situational awareness.
Finally, regarding the example
referenced by one commenter, a
substantial cyber incident that leads to
the breach of a FICU employee’s PII
would only be reportable in the event
that the third-party has an affiliation or
relationship with the FICU by, for
example, providing payroll services to
the FICU. The example is not intended
to impose a notification requirement on
a FICU for an incident occurring at any
third-party that, unbeknownst and
unrelated to the FICU, holds
information about individuals who
happen to be FICU members or
employees.
Clarification of Other Sections of Part
748
With regard to catastrophic act
reporting under § 748.1(b), two
commenters stated that there is
insufficient clarity to differentiate this
new proposed reporting requirement
from the existing catastrophic act
reporting requirement and, thus, the
latter should be updated to state that it
does not include cyber incident
reporting. Another commenter stated
that, in the event of any overlap
between the two reporting requirements,
the agency should permit such reporting
to receive the longer five-day
catastrophic act reporting timeframe.
The Board does not intend to amend
the catastrophic act reporting
requirement at this time. The Board
believes that the two reporting
requirements are sufficiently distinct.
As stated in the proposed rule, while
natural disasters were the leading
concern in the aftermath of hurricanes
Katrina and Rita, the use of the phrasing
‘‘any disaster, natural or otherwise’’ in
the definition of catastrophic act was
meant to illustrate other events, such as
a power grid failure or physical attack,
for example, could have a similar
impact on access to member services
and vital records. While some cyberevents may fall within the § 748.1(b)
definition of catastrophic act, the Board
believes they are sufficiently
distinguishable and distinct to warrant
separate consideration. The Board
further believes that the longstanding
requirement that FICUs be given five
business days to report catastrophic
acts, as defined in § 748.1(b), is still
appropriate. However, the agency will
continue to monitor the issue after this
VerDate Sep<11>2014
16:10 Feb 28, 2023
Jkt 259001
rule goes into effect, in the event
clarification is needed.
With regard to Appendix B guidance,
one commenter stated that Appendix B
should be amended to state that it does
not supersede this rule. Another
commenter stated that the NCUA should
remove the Appendix B language that
refers to reporting to a FICU’s regional
director because most reportable
incidents covered by Appendix B will
be covered by this rule.
The Board does not intend to amend
Appendix B at this time. However,
Appendix B provides guidance on
FICUs’ obligations under § 748.0 and
applicable statutes and, thus, does not
supersede this rule.21 If a FICU
experiences a reportable cyber incident,
that incident shall be reported under the
requirements of this rule.
Finally, another commenter stated
that while there is some overlap with
existing Part 748 reporting
requirements, the overlap is minimal,
and the proposed rule sufficiently
clarifies the requirements of each.
With regard to the definition of vital
member services, one commenter stated
that the definition needs to be updated
to reflect changes in how vital services
are delivered to members. Another
commenter stated that the NCUA should
not require reporting for non-malicious
system outages; for example, incidents
that involve a substantial loss of
availability of a network that disrupts
vital member services when a FICU
undertakes a technology transition or
system upgrade. In these situations, the
commenter stated that reporting to the
FICU’s board of directors should be
sufficient.
The NCUA recognizes that FICUs will
have planned updates and planned
outages that will not require
notification. However, a failed system
upgrade that causes widespread
unplanned outages for members would
be reportable under this final rule.
Coordination With the States and Other
Agencies
Five commenters stated that it is
important to coordinate with other
regulatory agencies to minimize
redundancy and inconsistency. One of
these commenters specifically noted the
importance of coordinating with state
regulators. One commenter encouraged
the NCUA to engage with the Financial
Services Information Sharing and
Analysis Center. Another commenter
noted the importance of coordinating
21 The Board’s final rule on the role of
supervisory guidance provides further discussion
on the role and use of guidance in the supervisory
process. 86 FR 7949 (Feb. 3, 2021).
PO 00000
Frm 00011
Fmt 4700
Sfmt 4700
12815
with CISA and the U.S. Treasury to
ensure harmonization with the Cyber
Incident Reporting Act.
The final rule does not prevent
existing supervisory information sharing
frameworks. The Board agrees that
voluntary information sharing is
important and encourages FICUs to
continue sharing information through
established channels. The agency
intends to coordinate with CISA, state
and federal regulators, and the U.S.
Treasury as much as possible.
Policy Expectations
Two commenters noted that it is
important for the NCUA to define what
its policy expectations are, to issue
supervisory guidance for institutions to
review in developing their policies and
procedures, and to show how examiners
will assess reported incidents during the
annual exam. One commenter stated
that it is unclear what follow up action
the NCUA is expecting and, thus, this
represents an unaccounted impact on
FICUs. This commenter also suggested
the NCUA create a safe harbor for FICUs
that make good faith efforts to perform
a reasonable assessment of a cyber
incident.
The NCUA will be providing further
supervisory guidance prior to the
effective date of the final rule. However,
cyber incidents may still be reviewed
during an annual examination or as part
of a supervision contact. This rule does
not change the examination and
supervision process.
Ransomware
Five commenters mentioned
ransomware. Two commenters stated
that ransomware reporting should be the
same as for other cyber incidents. One
commenter supported a shorter window
for ransomware reporting. One
commenter stated that the NCUA should
follow CISA, and one commenter said
more specifically that the agency should
wait until we know how CISA will
handle ransomware reporting.
Notification to the agency of
ransomware incidents should be the
same as the reporting required under
this rule for other cyber incidents.
While the Cyber Incident Reporting Act
does require entities to report
ransomware payments within 24-hours,
CISA has not yet promulgated
regulations to that effect and this rule
does not create a separate reporting
framework for ransomware payments.
However, the Board encourages FICUs
to contact law enforcement and CISA, as
appropriate, in the event of a cyber
incident that may be criminal in nature.
Application to federally chartered
corporate credit unions and federally
E:\FR\FM\01MRR1.SGM
01MRR1
12816
Federal Register / Vol. 88, No. 40 / Wednesday, March 1, 2023 / Rules and Regulations
insured, state-chartered corporate credit
unions.
The proposed rule applied to
federally chartered and federally
insured, state-chartered corporate credit
unions. Only one commenter mentioned
this point and stated that they support
such application. The final rule does not
amend this aspect of the proposed rule.
Thus, the final rule applies to all FICUs
including all federally insured corporate
credit unions.
V. Regulatory Procedures
A. Regulatory Flexibility Act
The Regulatory Flexibility Act
requires the NCUA to prepare an
analysis to describe any significant
economic impact a regulation may have
on a substantial number of small
entities.22 For purposes of this analysis,
the NCUA considers small credit unions
to be those having under $100 million
in assets.23 The final rule requires a
FICU to notify the NCUA upon
experiencing a substantial cyber
incident. This notification requirement
is not expected to increase cost burdens
on FICUs as it requires only that FICUs
provide an early notification to the
agency without requiring any detailed
assessments or evaluations. Also, while
the final rule could lead to cost savings
for FICUs if the NCUA or other
government agencies can help to
mitigate the impact of a cyber incident,
the Board does not expect the final rule
to accord a significant economic benefit
to a substantial number of FICUs.
Accordingly, the NCUA certifies that the
final rule will not have a significant
economic impact on a substantial
number of small credit unions.
ddrumheller on DSK120RN23PROD with RULES
B. Paperwork Reduction Act
The Paperwork Reduction Act of 1995
(PRA) (44 U.S.C. 3501 et seq.) requires
that the Office of Management and
Budget (OMB) approve all collections of
information by a Federal agency from
the public before they can be
implemented. Respondents are not
required to respond to any collection of
information unless it displays a valid
OMB control number. In accordance
with the PRA, the information
collection requirements included in this
final rule have been submitted to OMB
for approval under control number
3133–0033, Security Program, 12 CFR
748.
C. Executive Order 13132
Executive Order 13132 encourages
independent regulatory agencies to
consider the impact of their actions on
22 5
U.S.C. 603(a).
FR 57512 (Sept. 24, 2015).
16:10 Feb 28, 2023
D. Assessment of Federal Regulations
and Policies on Families
The NCUA has determined that this
final rule will not affect family wellbeing within the meaning of Section 654
of the Treasury and General
Government Appropriations Act,
1999.24
E. Small Business Regulatory
Enforcement Fairness Act
The Small Business Regulatory
Enforcement Fairness Act of 1996
(SBREFA) generally provides for
congressional review of agency rules.25
A reporting requirement is triggered in
instances where the NCUA issues a final
rule as defined by section 551 of the
Administrative Procedure Act. An
agency rule, in addition to being subject
to congressional oversight, may also be
subject to a delayed effective date if the
rule is a ‘‘major rule.’’ The NCUA does
not believe this rule is a ‘‘major rule’’
within the meaning of the relevant
sections of SBREFA. As required by
SBREFA, the NCUA will submit this
final rule to OMB for it to determine
whether the final rule is a ‘‘major rule’’
for purposes of SBREFA. The NCUA
also will file appropriate reports with
Congress and the Government
Accountability Office so this rule may
be reviewed.
For purposes of the Congressional
Review Act, the OMB makes a
determination as to whether a final rule
constitutes a ‘‘major rule.’’ If a rule is
deemed a ‘‘major rule’’ by the OMB, the
Congressional Review Act generally
provides that the rule may not take
effect until at least 60 days following its
25 5
Jkt 259001
PO 00000
Law 105–277, 112 Stat. 2681 (1998).
U.S.C. 551.
publication. The Congressional Review
Act defines a ‘‘major rule’’ as any rule
that the Administrator of the Office of
Information and Regulatory Affairs of
the OMB finds has resulted in or is
likely to result in (1) an annual effect on
the economy of $100 million or more;
(2) a major increase in costs or prices for
consumers, individual industries,
Federal, State, or local government
agencies or geographic regions, or (3)
significant adverse effects on
competition, employment, investment,
productivity, innovation, or on the
ability of U.S.-based enterprises to
compete with foreign-based enterprises
in domestic and export markets.26
List of Subjects in 12 CFR Part 748
Computer technology, Confidential
business information, Credit unions,
internet, Personally identifiable
information, Privacy, Reporting and
recordkeeping requirements, Security
measures.
By the NCUA Board on February 16, 2023.
Melane Conyers-Ausbrooks,
Secretary of the Board.
For the reasons stated in the
preamble, the NCUA Board amends 12
CFR part 748, as follows:
PART 748—SECURITY PROGRAM,
SUSPICIOUS TRANSACTIONS,
CATASTROPHIC ACTS, CYBER
INCIDENTS, AND BANK SECRECY
ACT COMPLIANCE
1. The authority citation for part 748
is revised to read as follows:
■
Authority: 12 U.S.C. 1766(a), 1786(b)(1),
1786(q), 1789(a)(11); 15 U.S.C. 6801–6809; 31
U.S.C. 5311 and 5318.
2. Revise the heading for part 748 to
read as set forth above.
■ 3. Amend § 748.1 as follows:
■ a. Redesignate paragraph (c) as
paragraph (d); and
■ b. Add a new paragraph (c).
The addition reads as follows:
■
§ 748.1
Filing of reports.
*
*
*
*
*
(c) Cyber incident report. Each
federally insured credit union must
notify the appropriate NCUA-designated
point of contact of the occurrence of a
reportable cyber incident via email,
telephone, or other similar methods that
the NCUA may prescribe. The NCUA
must receive this notification as soon as
possible but no later than 72 hours after
a federally insured credit union
reasonably believes that it has
experienced a reportable cyber incident
or, if reporting pursuant to paragraph
24 Public
23 80
VerDate Sep<11>2014
state and local interests. In adherence to
fundamental federalism principles, the
NCUA, an independent regulatory
agency as defined in 44 U.S.C. 3502(5),
voluntarily complies with the Executive
order. This rulemaking will not have a
substantial direct effect on the states, on
the connection between the national
government and the states, or on the
distribution of power and
responsibilities among the various
levels of government. Although the final
rule applies to federally insured, statechartered credit unions (FISCUs), it
imposes only a minimal reporting
requirement and does not affect the
ability of state regulatory agencies to
regulate, supervise, or examine FISCUs
on this subject. Therefore, the NCUA
has determined that this final rule does
not constitute a policy that has
federalism implications for purposes of
the Executive order.
Frm 00012
Fmt 4700
Sfmt 4700
26 5
U.S.C. 804(2).
E:\FR\FM\01MRR1.SGM
01MRR1
ddrumheller on DSK120RN23PROD with RULES
Federal Register / Vol. 88, No. 40 / Wednesday, March 1, 2023 / Rules and Regulations
(c)(1)(i)(C) of this section, within 72
hours of being notified by a third-party,
whichever is sooner.
(1) Reportable cyber incident. (i) A
reportable cyber incident is any
substantial cyber incident that leads to
one or more of the following:
(A) A substantial loss of
confidentiality, integrity, or availability
of a network or member information
system as defined in appendix A,
section I.B.2. e., of this part that results
from the unauthorized access to or
exposure of sensitive data, disrupts vital
member services as defined in § 749.1
of this chapter, or has a serious impact
on the safety and resiliency of
operational systems and processes.
(B) A disruption of business
operations, vital member services, or a
member information system resulting
from a cyberattack or exploitation of
vulnerabilities.
(C) A disruption of business
operations or unauthorized access to
sensitive data facilitated through, or
caused by, a compromise of a credit
union service organization, cloud
service provider, or other third-party
data hosting provider or by a supply
chain compromise.
(ii) A reportable cyber incident does
not include any event where the cyber
incident is performed in good faith by
an entity in response to a specific
request by the owner or operators of the
system.
(2) Definitions. For purposes of this
part:
Compromise means the unauthorized
disclosure, modification, substitution,
or use of sensitive data or the
unauthorized modification of a securityrelated system, device, or process in
order to gain unauthorized access.
Confidentiality means preserving
authorized restrictions on information
access and disclosure, including means
for protecting personal privacy and
proprietary information.
Cyber incident means an occurrence
that actually or imminently jeopardizes,
without lawful authority, the integrity,
confidentiality, or availability of
information on an information system,
or actually or imminently jeopardizes,
without lawful authority, an
information system.
Cyberattack means an attack, via
cyberspace, targeting an enterprise’s use
of cyberspace for the purpose of
disrupting, disabling, destroying, or
maliciously controlling a computing
environment/infrastructure; or
destroying the integrity of the data or
stealing controlled information.
Disruption means an unplanned event
that causes an information system to be
inoperable for a length of time.
VerDate Sep<11>2014
16:10 Feb 28, 2023
Jkt 259001
12817
Integrity means guarding against
improper information modification or
destruction and includes ensuring
information non-repudiation and
authenticity.
Sensitive data means any information
which by itself, or in combination with
other information, could be used to
cause harm to a credit union or credit
union member and any information
concerning a person or their account
which is not public information,
including any non-public personally
identifiable information.
*
*
*
*
*
DEPARTMENT OF TRANSPORTATION
4. Amend appendix B to part 748 as
follows:
■ a. Redesignate footnotes 29 through 42
as footnotes 1 through 14;
■ b. In the introductory text of section
I:
■ i. Revise the first sentence; and
■ ii. Remove ‘‘Part 748’’ and add ‘‘this
part’’ in its place; and
■ c. Revise newly redesignated
footnotes 1 and 11.
The revisions read as follows:
The FAA is adopting a new
airworthiness directive (AD) for all
Schempp-Hirth Flugzeugbau GmbH
Model Duo Discus and Duo Discus T
gliders. This AD was prompted by
mandatory continuing airworthiness
information (MCAI) originated by an
aviation authority of another country to
identify and correct an unsafe condition
on an aviation product. The MCAI
identifies the unsafe condition as the
airbrake becoming blocked or jammed
in an extended position during high
airspeed due to an incorrect adjustment
on the airbrake system. This AD
requires repetitively inspecting the
airbrake system and taking corrective
action as necessary. The FAA is issuing
this AD to address the unsafe condition
on these products.
DATES: This AD is effective April 5,
2023.
The Director of the Federal Register
approved the incorporation by reference
of a certain publication listed in this AD
as of April 5, 2023.
ADDRESSES:
AD Docket: You may examine the AD
docket at regulations.gov under Docket
No. FAA–2022–1484; or in person at
Docket Operations between 9 a.m. and
5 p.m., Monday through Friday, except
Federal holidays. The AD docket
contains this final rule, the MCAI, any
comments received, and other
information. The address for Docket
Operations is U.S. Department of
Transportation, Docket Operations, M–
30, West Building Ground Floor, Room
W12–140, 1200 New Jersey Avenue SE,
Washington, DC 20590.
Material Incorporated by Reference:
• For service information identified
in this final rule, contact SchemppHirth Flugzeugbau GmbH, Krebenstrasse
25, Kirchheim unter Teck, Germany;
phone: +49 7021 7298–0; email: info@
schempp-hirth.com; website: schempphirth.com.
• You may view this service
information at the FAA, Airworthiness
■
Appendix B to Part 748—Guidance on
Response Programs for Unauthorized
Access to Member Information and
Member Notice
I. * * *
This appendix provides guidance on
NCUA’s Security Program, Suspicious
Transactions, Catastrophic Acts, Cyber
Incidents, and Bank Secrecy Act Compliance
regulation,1 interprets section 501(b) of the
Gramm-Leach-Bliley Act (‘‘GLBA’’), and
describes response programs, including
member notification procedures, that a
federally insured credit union should
develop and implement to address
unauthorized access to or use of member
information that could result in substantial
harm or inconvenience to a member. * * *
*
*
1This
*
*
*
*
*
*
*
part.
*
11 A
credit union’s obligation to file a SAR
is set forth in § 748.1(d).
*
*
*
*
*
[FR Doc. 2023–03682 Filed 2–28–23; 8:45 am]
BILLING CODE 7535–01–P
PO 00000
Frm 00013
Fmt 4700
Sfmt 4700
Federal Aviation Administration
14 CFR Part 39
[Docket No. FAA–2022–1484; Project
Identifier MCAI–2022–00897–G; Amendment
39–22339; AD 2023–03–14]
RIN 2120–AA64
Airworthiness Directives; SchemppHirth Flugzeugbau GmbH Gliders
Federal Aviation
Administration (FAA), DOT.
ACTION: Final rule.
AGENCY:
SUMMARY:
E:\FR\FM\01MRR1.SGM
01MRR1
Agencies
[Federal Register Volume 88, Number 40 (Wednesday, March 1, 2023)]
[Rules and Regulations]
[Pages 12811-12817]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-03682]
[[Page 12811]]
=======================================================================
-----------------------------------------------------------------------
NATIONAL CREDIT UNION ADMINISTRATION
12 CFR Part 748
RIN 3133-AF47
Cyber Incident Notification Requirements for Federally Insured
Credit Unions
AGENCY: National Credit Union Administration.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: The National Credit Union Administration (NCUA or agency) is
amending Part 748 of its regulations to require a federally insured
credit union (FICU) that experiences a reportable cyber incident to
report the incident to the NCUA as soon as possible and no later than
72 hours after the FICU reasonably believes that it has experienced a
reportable cyber incident. This notification requirement provides an
early alert to the NCUA and does not require a FICU to provide a
detailed incident assessment to the NCUA within the 72-hour time frame.
DATES: The effective date of this final rule is September 1, 2023.
FOR FURTHER INFORMATION CONTACT: Policy: Christina Saari, Information
Systems Officer, Office of Examination and Insurance, at (703) 283-
0121; Legal: Gira Bose, Senior Staff Attorney, Office of General
Counsel, at (703) 518-6540.
SUPPLEMENTARY INFORMATION:
I. Introduction
II. Overview of the Final Rule
III. Legal Authority
IV. Discussion of Public Comments Received on the Proposed Rule
V. Regulatory Procedures
I. Introduction
A. Background
The NCUA's requirement that FICUs develop written security programs
and report certain activity to the NCUA is codified in 12 CFR part 748.
In July 2022, the NCUA Board (Board) approved a notice of proposed
rulemaking (proposal or proposed rule) that would require a FICU to
notify the NCUA of any cyber incident that rises to the level of a
reportable cyber incident.\1\ The proposed rule would require such
notification as soon as possible but no later than 72 hours after a
FICU reasonably believes that a reportable cyber incident has occurred.
---------------------------------------------------------------------------
\1\ 87 FR 45029 (July 27, 2022).
---------------------------------------------------------------------------
As stated in the proposed rule, given the growing frequency and
severity of cyber incidents within the financial services industry, it
is important that the NCUA receive timely notice of cyber incidents
that disrupt a FICU's operations, lead to unauthorized access to
sensitive data, or disrupt members' access to accounts or services.
B. Summary of Proposed Rule
The proposed rule added a provision to 12 CFR 748.1 for the NCUA to
require notification of any cyber incident that rises to the level of a
reportable cyber incident as soon as possible but no later than 72
hours after a FICU reasonably believes that a reportable cyber incident
has occurred. As first stated in the proposed rule and finalized here,
in accordance with Sec. 704.1(a) of the NCUA's regulations, this rule
also applies to federally chartered corporate credit unions and
federally insured, state-chartered corporate credit unions.
The proposed rule defined a cyber incident as an occurrence that
actually or imminently jeopardizes, without lawful authority, the
integrity, confidentiality, or availability of information on an
information system or actually or imminently jeopardizes, without
lawful authority, an information system.\2\
---------------------------------------------------------------------------
\2\ 6 U.S.C. 659(a)(5).
---------------------------------------------------------------------------
The proposed rule defined a reportable cyber incident as any
substantial cyber incident that leads to one or more of the following:
a substantial loss of confidentiality,\3\ integrity,\4\ or availability
of a network or member information system \5\ that results from the
unauthorized access to or exposure of sensitive data,\6\ disrupts \7\
vital member services,\8\ or has a serious impact on the safety and
resiliency of operational systems and processes; a disruption of
business operations, vital member services, or a member information
system resulting from a cyberattack \9\ or exploitation of
vulnerabilities; and/or a disruption of business operations or
unauthorized access to sensitive data facilitated through, or caused
by, a compromise \10\ of a credit union service organization, cloud
service provider, managed service provider, or other third-party data
hosting provider or by a supply chain compromise.
---------------------------------------------------------------------------
\3\ Confidentiality means preserving authorized restrictions on
information access and disclosure, including means for protecting
personal privacy and proprietary information. See https://csrc.nist.gov/glossary/term/confidentiality. The agency is using
definitions from the National Institute of Standards and Technology
(NIST), as appropriate. NIST is a familiar and trusted source in the
cybersecurity arena and is routinely cited by the Federal Financial
Institutions Examination Council and individual federal agencies.
\4\ Integrity means guarding against improper information
modification or destruction and includes ensuring information non-
repudiation and authenticity. See https://csrc.nist.gov/glossary/term/integrity.
\5\ Member information system means any method used to access,
collect, store, use, transmit, protect, or dispose of member
information. 12 CFR part 748, appendix A, section I.B.2.e.
\6\ Sensitive data is defined as any information which by
itself, or in combination with other information, could be used to
cause harm to a credit union or credit union member and any
information concerning a person or the person's account which is not
public information, including any non-public personally identifiable
information.
\7\ A disruption is an unplanned event that causes an
information system to be inoperable for a length of time. https://csrc.nist.gov/glossary/term/disruption.
\8\ Vital member services means informational account inquiries,
share withdrawals and deposits, and loan payments and disbursements.
12 CFR 749.1.
\9\ Cyberattack is an attack, via cyberspace, targeting an
enterprise's use of cyberspace for the purpose of disrupting,
disabling, destroying, or maliciously controlling a computing
environment/infrastructure; or destroying the integrity of the data
or stealing controlled information. See https://csrc.nist.gov/
glossary/term/
Cyber_Attack#:~:text=An%20attack%2C%20via%20cyberspace%2C%20targeting
%20an%20enterprise%E2%80%99s%20use,SP%201800-
10B%20from%20NIST%20SP%20800-30%20Rev.%201.
\10\ A compromise is the unauthorized disclosure, modification,
substitution, or use of sensitive data or the unauthorized
modification of a security-related system, device, or process in
order to gain unauthorized access. See https://csrc.nist.gov/
glossary/term/
compromise#:~:text=Definition(s)%3A,an%20object%20may%20have%20occurr
ed.
---------------------------------------------------------------------------
The proposed rule definition excluded any event where the cyber
incident was performed in good faith by an entity in response to a
specific request by the owner or operator of the information system.
The Board is adopting this final rule largely as proposed to give
the NCUA early notice of substantial cyber incidents that have
consequences for FICUs as stated in the rule.
Shortly before the Board issued its proposed rule, Congress enacted
the Cyber Incident Reporting for Critical Infrastructure Act of 2022
(Cyber Incident Reporting Act) requiring covered entities to report
covered cyber incidents to the Cybersecurity and Infrastructure
Security Agency (CISA) not later than 72 hours after the entity
reasonably believes that a covered cyber incident has occurred.\11\
CISA has until 2025 to publish a final rule implementing the Cyber
Incident Reporting Act's requirements, including defining the terms
used therein. Nevertheless, as stated in the proposed rule, the Board
believes that it would be imprudent in light of the increasing
frequency and severity of cyber
[[Page 12812]]
incidents to postpone a notification requirement until after CISA
promulgates a final rule. To the extent possible, and as appropriate
for the credit union system, this final rule uses terminology and a
reporting framework that Congress outlined in the Cyber Incident
Reporting Act. The Board believes it is in the best interest of the
credit union system to align the NCUA's rule with the Cyber Incident
Reporting Act to provide uniform and timely cyber incident reporting.
It is the intention of the Board for the NCUA to coordinate with CISA
on any future credit union cyber incident reporting to avoid duplicate
reporting to both the NCUA and CISA.
---------------------------------------------------------------------------
\11\ The Cyber Incident Reporting for Critical Infrastructure
Act of 2022, part of the Consolidated Appropriations Act of 2022,
Division Y, Public Law 117-103 (Mar. 15, 2022), is available at
https://www.congress.gov/bill/117th-congress/house-bill/2471/text.
---------------------------------------------------------------------------
II. Overview of the Final Rule
After carefully considering the comments received, the NCUA is
issuing this final rule largely as proposed, as discussed in this
section of the preamble.
Definitions
The proposed rule defined a reportable cyber incident as, among
other things, any substantial cyber incident that leads to a
substantial loss of confidentiality, integrity, or availability of a
network or member information system that results from the unauthorized
access to or exposure of sensitive data, disrupts vital member
services, or has a serious impact on the safety and resiliency of
operational systems and processes. Some commenters felt that the
duplicate use of the term substantial was redundant. That was the not
the intent of the definition. While the word used is the same,
substantial applies in two different contexts and thus is retained in
both places to ensure that the agency receives notification of cyber
incidents that are substantial. This terminology also aligns with the
language used in the Cyber Incident Reporting Act. In the event such a
cyber incident is one that leads to a substantial loss of
confidentiality, integrity, or availability of a network or member
information system, as opposed to a minimal loss, then such incident
would be reportable to the agency.
The first prong of the reportable cyber incident definition will
require a FICU to notify the NCUA of a cyber incident that leads to a
substantial loss of confidentiality, integrity, or availability of a
member information system as a result of the exposure of sensitive
data, disruption of vital member services, or that has a serious impact
on the safety and resiliency of operational systems and processes. For
example, if a FICU becomes aware that a substantial level of sensitive
data is unlawfully accessed, modified, or destroyed, or if the
integrity of a network or member information system is compromised, the
cyber incident is reportable. If the credit union becomes aware that a
member information system has been unlawfully modified and/or sensitive
data has been left exposed to an unauthorized person, process, or
device, that cyber incident is also reportable, irrespective of intent.
There are many technological reasons why services may not be
available at any given time as, for example, computer servers are
offline, or systems are being updated. Such events are routine and thus
would not be reportable to the NCUA. However, a failed system upgrade
or change that results in unplanned widespread user outages for FICU
members and employees would be reportable.
The second prong of the reportable cyber incident definition will
require reporting to the NCUA in the event of a cyberattack that leads
to a disruption of business operations, vital member services, or a
member information system. Cyberattacks that cause disruption to a
FICU's business operations, vital member services, or a member
information system must be reported to the NCUA within 72 hours of a
FICU's reasonable belief that it has experienced a cyberattack. For
example, a distributed denial of service (DDoS) attack that disrupts
member account access will be reportable under this prong.
Blocked phishing attempts, failed attempts to gain access to
systems, or unsuccessful malware attacks do not have to be reported.
The third prong of the reportable cyber incident definition will
require a FICU to notify the agency within 72 hours after a third-party
has informed a FICU that the FICU's sensitive data or business
operations have been compromised or disrupted as a result of a cyber
incident experienced by the third-party or upon the FICU forming a
reasonable belief this has occurred, whichever occurs sooner. A cyber
incident, under the third prong would also only be reportable in the
event that the third-party has a relationship with the FICU. The rule
does not impose a notification requirement on a FICU for an incident
occurring at any third-party that, unbeknownst and unrelated to the
FICU, holds information about individuals who happen to be FICU members
or employees.
A FICU will not be required to report an incident performed in good
faith by an entity in response to a request by the owner or operator of
the information system. An example of an incident excluded from
reporting would be the contracting of a third-party to conduct a
penetration test.\12\
---------------------------------------------------------------------------
\12\ A penetration test is a test methodology in which
assessors, typically working under specific constraints, attempt to
circumvent or defeat the security features of a system. See
Assessing Security and Privacy Controls in Information Systems and
Organizations, NIST Special Publication 800-53A Revision 5 at 697.
Available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar5.pdf.
---------------------------------------------------------------------------
III. Legal Authority
The Board issues this final rule pursuant to its authority under
the Federal Credit Union Act (FCUA). Section 209 of the FCUA is a
plenary grant of regulatory authority to the Board to issue rules and
regulations necessary or appropriate to carry out its role as share
insurer for all FICUs.\13\ Section 206 of the FCUA requires the agency
to impose corrective measures whenever, in the opinion of the Board,
any FICU is engaged in or has engaged in unsafe or unsound practices in
conducting its business.\14\ Accordingly, the FCUA grants the Board
broad rulemaking authority to ensure that the credit union industry and
the National Credit Union Share Insurance Fund (Share Insurance Fund)
remain safe and sound.
---------------------------------------------------------------------------
\13\ 12 U.S.C. 1789(a)(11).
\14\ 12 U.S.C. 1786(b)(1). There are a number of references to
``safety and soundness'' in the FCUA. See 12 U.S.C.
1757(5)(A)(vi)(I), 1759(d & f), 1781(c)(2), 1782(a)(6)(B), 1786(b),
1786(e), 1786(f), 1786(g), 1786(k)(2), 1786(r), 1786(s), and
1790d(h).
---------------------------------------------------------------------------
IV. Discussion of Public Comments Received on the Proposed Rule
The proposed rule provided for a 60-day public comment period,
which closed on September 26, 2022. The NCUA received 17 comments in
response to the proposed rule. These comments came from credit unions,
credit union trade associations and leagues, service providers, and
individual members of the public.
Twelve commenters expressed support for the proposal. One commenter
felt it was premature for the Board to issue a rule at this time
because promulgating a rule now could lead to conflicts with standards
yet to be determined by CISA, which Congress has tasked with issuing
cybersecurity notification rules across many sectors, including
financial services.
Four credit union commenters disagreed with the premise that
knowing about and responding to cyber incidents is important to the
NCUA's mission. These commenters stated that the preamble articulated
no benefits to members and that members are already protected by a
FICU's data security program, which the NCUA has the
[[Page 12813]]
opportunity to evaluate during the examination cycle. These four
commenters stated that the NCUA should show deference to a FICU's
decision regarding whether or not to report an incident because the
FICU will be in the best position to know whether it has met the
elements of a reportable cyber incident.
The Board has considered these comments and has determined to
proceed to a final rule at this time. As discussed in the preamble to
the proposed rule, the financial services sector is one of the main
critical infrastructure sectors targeted by cyberattacks. The agency
has a statutory obligation to ensure the safety and soundness of the
credit union system and the Share Insurance Fund. Thus, the NCUA must
be made aware of cyber incidents that could significantly impact FICUs
and their members. Commenters are correct in that this rule does not
change the NCUA's ability to review data security programs during the
examination cycle. This rule merely requires early notification to the
agency of substantial cyber incidents. Early awareness can help the
NCUA react to emerging threats to FICUs and the broader financial
system before they become systemic. As stated in the proposed rule,
this notification requirement is intended to serve as an early alert to
the agency and is not intended to include a lengthy assessment of the
incident. The NCUA will be providing additional reporting guidance
prior to the final rule going into effect. However, anytime a FICU is
unsure as to whether a cyber incident is reportable, the Board
encourages the FICU to contact the agency.
Commenters focused on the following specific issues:
Reporting Timeframe
The proposed rule put forward a 72-hour reporting window for FICUs
to notify the NCUA of a cyber incident that rises to the level of a
reportable cyber incident. The proposal asked commenters to discuss
whether 72 hours is appropriate or if another time frame is warranted,
such as 36 hours as the Federal banking agencies require. Fourteen
commenters expressed support for the 72-hour reporting window. Three of
these commenters asked the agency to be aware that, while 72 hours is
generally reasonable, even this may be burdensome for smaller
institutions. One commenter stated that the proposed timeframe will
correspond with additional administrative burden for credit unions. One
commenter preferred the 36-hour time frame since this would be
consistent with the Federal banking agencies' rule and should not be
burdensome in light of the limited information being sought.
Three commenters recommended that the 72-hour reporting period
begin only once a FICU has actually discovered a reportable cyber
incident, as the Federal banking agencies require, rather than
requiring FICUs to come to a reasonable belief that a reportable cyber
incident has occurred. Another commenter stated that the Board should
not require reporting until the FICU is aware of helpful details.
This final rule maintains the reporting period set forth in the
proposed rule requiring a FICU to notify the NCUA as soon as possible
but no later than 72 hours after the FICU reasonably believes that a
reportable cyber incident has occurred. This is the same reporting
requirement CISA must implement under the Cyber Incident Reporting Act.
By maintaining the expectation that a FICU does not have a reporting
obligation until it has a reasonable belief that a reportable cyber
incident has occurred, the Board is providing flexibility based on
specific circumstances that may occur. Only once the FICU has formed a
reasonable belief that it has experienced a reportable cyber incident
would the requirement to report within 72 hours be triggered. The Board
does not believe this minimal notification requirement would be
burdensome to even the smallest institutions. The burden is likely to
result from the cyber incident itself. Early notification to the agency
could be beneficial in a number of ways, including helping the FICU
protect its members and obtaining the agency's guidance with the
response.
Reporting Process
With regard to where and how FICUs should report cyber incidents,
two commenters stated that they would prefer a single point of contact
in the NCUA's central office and multiple methods of reporting--secure
online portal, email, and telephone. One commenter expressed a
preference for reporting to the regional office but recognized that the
NCUA may prefer all FICUs to report to the central office. This
commenter suggested that if reporting is done via portal, then FICUs
should be permitted to go back and edit their reporting. Two commenters
asked the NCUA to develop a form or checklist that lists the
information the agency is looking for. One commenter stated that the
NCUA should provide a clear reporting mechanism via secure email or web
form. Finally, one commenter expressed support for multiple methods of
reporting but suggested that the NCUA permit FICUs to report to their
regional office contacts so as to ensure that the NCUA staff evaluating
the incident are familiar with the affected FICU's operations.
The proposed rule states that cyber incidents may be reported via
email, telephone, or other similar methods that the NCUA may prescribe.
The Board believes that this approach addresses the need for
flexibility, including if one or more communication channels are
impacted by the cyber incident. The NCUA will be providing more
detailed reporting guidance before the effective date of the final
rule.
One commenter asked for clarity on what follow up communications
the agency expects after a FICU provides the initial notification of a
reportable cyber incident. The proposed rule stated, ``the NCUA
anticipates that further follow-up communications between the FICU and
the agency will occur through the supervisory process, as necessary,''
but did not explain what such communications would entail or what the
expected frequency or level of detail would be.
The NCUA will determine the necessity and frequency of follow-up
communications on a case-by-case basis. Factors in making this
determination may include the severity of impact, the ability to
recover and restore services, and the potential risk to the financial
system. These factors may evolve over time. The NCUA is aware that
during a reportable cyber incident, FICUs will be focused on recovery
and, thus, the agency will generally limit contact during such
incidents to minimize burden on FICUs.
Confidentiality
Five commenters expressed concern for the security of the
information reported to the NCUA and the potential negative
consequences to FICUs in the event sensitive information were to leak.
These commenters stated that it is vital for the NCUA to have a secure
infrastructure with confidentiality controls and limits on the number
of agency personnel with access to the reported information. One
commenter asked the NCUA to clarify that cyber incident reports are not
only subject to part 792 of the NCUA's rules but are also exempt from
Freedom of Information Act (FOIA) requests.
The NCUA receives confidential financial information from FICUs on
a routine basis as a function of its role as a financial regulator and
insurer. Like all federal agencies, the NCUA must comply with mandatory
security standards for federal information and
[[Page 12814]]
information systems.\15\ The NCUA meets these requirements by employing
a defense-in-depth \16\ approach to information and system security,
including robust technical and administrative controls and
comprehensive procedures for preventing and addressing potential
compromises to information in the NCUA's custody and control.\17\
---------------------------------------------------------------------------
\15\ Federal Information Security Modernization Act of 2014
(FISMA), 44 U.S.C. Chapter 35; FIPS Publication 199, Standards for
Security Categorization of Federal Information and Information
Systems; FIPS Publication 200, Minimum Security Requirements for
Federal Information and Information Systems.
\16\ Defense-in Depth is the application of multiple
countermeasures in a layered or stepwise manner to achieve security
objectives. See https://csrc.nist.gov/glossary/term/defense_in_depth.
\17\ NIST Special Publication 800-53 (Rev. 5), Security and
Privacy Controls for Federal Information Systems and Organizations.
---------------------------------------------------------------------------
Reporting under this rule will be subject to part 792 of the NCUA's
rules and exempt from FOIA requests under FOIA exemptions 4 and 8, and
potentially exemptions 6 and 7(c).\18\
---------------------------------------------------------------------------
\18\ 12 CFR part 792; 5 U.S.C. 552(b)(4), (6), (7)(c), and (8).
---------------------------------------------------------------------------
Definition of Reportable Cyber Incident
Eight commenters suggested the NCUA provide more clarity around
what the agency considers to be a substantial cyber incident. Of these,
five commenters stated that the NCUA should focus on the materiality of
the incident and include a materiality standard to avoid overreporting
and to provide a sufficient threshold to ensure reporting only of major
disruptions and not minor ones. One of these commenters stated that the
definition of reportable cyber incident itself is acceptable and leaves
room to enable ongoing alignment with other frameworks such as future
CISA guidance. However, the commenter stated that the definition of
substantial should include a materiality standard.
One commenter suggested that substantial could be defined based on
the percentage of members impacted, duration of impact, or other
similar metrics which scale with the size of the FICU. Another
commenter suggested that any factors used to define substantial should
be principles-based rather than enumerate different types of data,
systems, or other static elements, which can quickly change as best
practices and mitigation strategies evolve over time. This commenter
noted that, however defined, the agency should grant appropriate
deference to the reasonable judgment of the FICU. Another commenter
expressed support for the definition of reportable cyber incident but
stated that rather than just providing a definition of substantial, it
would be more helpful if the NCUA were to provide examples of
reportable incidents.
The Board agrees that a definition that relies on specific data
points, systems, or other static elements may be unnecessarily
complicated and may quickly become obsolete. By using the term
substantial, the Board seeks to convey an expectation that the agency
will be notified of cyber incidents that are extensive or significant
to the FICU or its members (or both), rather than minor or
inconsequential. The dictionary definition of substantial is
``something that is important, essential, considerable in quantity, or
significantly great.'' \19\ In lieu of a more complicated definition,
the agency intends to add to the examples of reportable cyber incidents
provided in the proposed rule. Commenters who requested that a
materiality standard be added to the term substantial did not offer any
definitions or suggest how a material cyber incident would be something
other than a substantial cyber incident. If a FICU is unsure as to
whether a cyber incident is reportable, the Board encourages the FICU
to contact the agency. However, once the rule is implemented the agency
will continue to assess whether further clarity or guidance is needed
over time.
---------------------------------------------------------------------------
\19\ Merriam Webster Dictionary, available at https://www.merriam-webster.com/dictionary/substantial.
---------------------------------------------------------------------------
Examples of Reportable Cyber Incidents
Three commenters stated that the list of reportable incidents in
the proposed rule is helpful and should be kept current. One commenter
stated that the NCUA should provide more examples of nonreportable
incidents.
The NCUA will be providing additional reporting guidance and
examples of reportable incidents and non-reportable incidents prior to
the effective date of this final rule. In addition, the NCUA is
retaining the examples provided in the proposed rule with some minor
edits, as discussed below.
The agency is clarifying the following example which was cited in
the proposed rule: ``A systems compromise resulting from card
skimming,'' is being changed to ``Member information compromised as a
result of card skimming at a credit union's ATM.'' \20\
---------------------------------------------------------------------------
\20\ See example 7 at 87 FR 45029, 45032 (July 27, 2022).
---------------------------------------------------------------------------
Third-Party Compromise
Two commenters noted that contracts with third-party service
providers may not perfectly align with the reporting proposed in this
rule. One commenter sought clarification that the NCUA is not intending
to impact existing contractual relationships. Another commenter stated
that FICU reporting of third-party breaches should only be required
once the third-party notifies the FICU that its information has been
materially compromised. Without receiving information from the third-
party, the FICU has no way to know if it has experienced a cyber
incident.
One commenter noted that third-parties only provide notification
once their investigations are almost complete. Another commenter
expressed concerns about the ability of FICUs to make decisions about
third-party breaches when third-parties may be reluctant to offer
information until they have done their own investigations. Thus, the
commenter stated that the NCUA should defer to a FICU's judgment about
whether a reportable cyber incident has occurred. Another commenter
stated that the NCUA must focus on when the FICU formed a reasonable
belief and not when a third-party made that determination. Finally, one
commenter stated that the NCUA should not, as suggested by one example
in the preamble to the proposed rule, impose a reporting requirement
when a FICU employee's personally identifiable information (PII) is
implicated in a data breach at another organization that has no
affiliation with the FICU.
This rule does not impact existing contractual relationships. While
the proposed rule asked FICUs to share how third-parties provide notice
to FICUs in the event of a cyber incident, there is no requirement in
the proposed or final rules that FICUs amend existing contracts to
comply with this rule. The rule requires only that the agency receive
notice of a reportable cyber incident that impacts a FICU either within
72 hours of being notified by a third-party or within 72 hours of a
FICU forming a reasonable belief that it has experienced a reportable
cyber incident. For example, a FICU reasonably may not be aware that a
third-party has experienced a breach absent a notification from the
third-party. However, if a FICU experiences a disruption by losing
access to its member accounts, it reasonably should be aware that its
core service provider has been compromised. The rule does not permit
FICUs to provide notice only after the FICU or the third-party have
completed all their investigations because the core purpose of the rule
is for the agency to receive an early notification that an incident has
occurred. The Board recognizes that a FICU's understanding of an
incident is
[[Page 12815]]
likely to evolve, and initial reporting can be incomplete or even
inaccurate due to limited information. However, early notification,
even if substantively limited, is preferable when compared to delayed
notification which may have the effect of impeding the agency's
situational awareness.
Finally, regarding the example referenced by one commenter, a
substantial cyber incident that leads to the breach of a FICU
employee's PII would only be reportable in the event that the third-
party has an affiliation or relationship with the FICU by, for example,
providing payroll services to the FICU. The example is not intended to
impose a notification requirement on a FICU for an incident occurring
at any third-party that, unbeknownst and unrelated to the FICU, holds
information about individuals who happen to be FICU members or
employees.
Clarification of Other Sections of Part 748
With regard to catastrophic act reporting under Sec. 748.1(b), two
commenters stated that there is insufficient clarity to differentiate
this new proposed reporting requirement from the existing catastrophic
act reporting requirement and, thus, the latter should be updated to
state that it does not include cyber incident reporting. Another
commenter stated that, in the event of any overlap between the two
reporting requirements, the agency should permit such reporting to
receive the longer five-day catastrophic act reporting timeframe.
The Board does not intend to amend the catastrophic act reporting
requirement at this time. The Board believes that the two reporting
requirements are sufficiently distinct. As stated in the proposed rule,
while natural disasters were the leading concern in the aftermath of
hurricanes Katrina and Rita, the use of the phrasing ``any disaster,
natural or otherwise'' in the definition of catastrophic act was meant
to illustrate other events, such as a power grid failure or physical
attack, for example, could have a similar impact on access to member
services and vital records. While some cyber-events may fall within the
Sec. 748.1(b) definition of catastrophic act, the Board believes they
are sufficiently distinguishable and distinct to warrant separate
consideration. The Board further believes that the longstanding
requirement that FICUs be given five business days to report
catastrophic acts, as defined in Sec. 748.1(b), is still appropriate.
However, the agency will continue to monitor the issue after this rule
goes into effect, in the event clarification is needed.
With regard to Appendix B guidance, one commenter stated that
Appendix B should be amended to state that it does not supersede this
rule. Another commenter stated that the NCUA should remove the Appendix
B language that refers to reporting to a FICU's regional director
because most reportable incidents covered by Appendix B will be covered
by this rule.
The Board does not intend to amend Appendix B at this time.
However, Appendix B provides guidance on FICUs' obligations under Sec.
748.0 and applicable statutes and, thus, does not supersede this
rule.\21\ If a FICU experiences a reportable cyber incident, that
incident shall be reported under the requirements of this rule.
---------------------------------------------------------------------------
\21\ The Board's final rule on the role of supervisory guidance
provides further discussion on the role and use of guidance in the
supervisory process. 86 FR 7949 (Feb. 3, 2021).
---------------------------------------------------------------------------
Finally, another commenter stated that while there is some overlap
with existing Part 748 reporting requirements, the overlap is minimal,
and the proposed rule sufficiently clarifies the requirements of each.
With regard to the definition of vital member services, one
commenter stated that the definition needs to be updated to reflect
changes in how vital services are delivered to members. Another
commenter stated that the NCUA should not require reporting for non-
malicious system outages; for example, incidents that involve a
substantial loss of availability of a network that disrupts vital
member services when a FICU undertakes a technology transition or
system upgrade. In these situations, the commenter stated that
reporting to the FICU's board of directors should be sufficient.
The NCUA recognizes that FICUs will have planned updates and
planned outages that will not require notification. However, a failed
system upgrade that causes widespread unplanned outages for members
would be reportable under this final rule.
Coordination With the States and Other Agencies
Five commenters stated that it is important to coordinate with
other regulatory agencies to minimize redundancy and inconsistency. One
of these commenters specifically noted the importance of coordinating
with state regulators. One commenter encouraged the NCUA to engage with
the Financial Services Information Sharing and Analysis Center. Another
commenter noted the importance of coordinating with CISA and the U.S.
Treasury to ensure harmonization with the Cyber Incident Reporting Act.
The final rule does not prevent existing supervisory information
sharing frameworks. The Board agrees that voluntary information sharing
is important and encourages FICUs to continue sharing information
through established channels. The agency intends to coordinate with
CISA, state and federal regulators, and the U.S. Treasury as much as
possible.
Policy Expectations
Two commenters noted that it is important for the NCUA to define
what its policy expectations are, to issue supervisory guidance for
institutions to review in developing their policies and procedures, and
to show how examiners will assess reported incidents during the annual
exam. One commenter stated that it is unclear what follow up action the
NCUA is expecting and, thus, this represents an unaccounted impact on
FICUs. This commenter also suggested the NCUA create a safe harbor for
FICUs that make good faith efforts to perform a reasonable assessment
of a cyber incident.
The NCUA will be providing further supervisory guidance prior to
the effective date of the final rule. However, cyber incidents may
still be reviewed during an annual examination or as part of a
supervision contact. This rule does not change the examination and
supervision process.
Ransomware
Five commenters mentioned ransomware. Two commenters stated that
ransomware reporting should be the same as for other cyber incidents.
One commenter supported a shorter window for ransomware reporting. One
commenter stated that the NCUA should follow CISA, and one commenter
said more specifically that the agency should wait until we know how
CISA will handle ransomware reporting.
Notification to the agency of ransomware incidents should be the
same as the reporting required under this rule for other cyber
incidents. While the Cyber Incident Reporting Act does require entities
to report ransomware payments within 24-hours, CISA has not yet
promulgated regulations to that effect and this rule does not create a
separate reporting framework for ransomware payments. However, the
Board encourages FICUs to contact law enforcement and CISA, as
appropriate, in the event of a cyber incident that may be criminal in
nature.
Application to federally chartered corporate credit unions and
federally
[[Page 12816]]
insured, state-chartered corporate credit unions.
The proposed rule applied to federally chartered and federally
insured, state-chartered corporate credit unions. Only one commenter
mentioned this point and stated that they support such application. The
final rule does not amend this aspect of the proposed rule. Thus, the
final rule applies to all FICUs including all federally insured
corporate credit unions.
V. Regulatory Procedures
A. Regulatory Flexibility Act
The Regulatory Flexibility Act requires the NCUA to prepare an
analysis to describe any significant economic impact a regulation may
have on a substantial number of small entities.\22\ For purposes of
this analysis, the NCUA considers small credit unions to be those
having under $100 million in assets.\23\ The final rule requires a FICU
to notify the NCUA upon experiencing a substantial cyber incident. This
notification requirement is not expected to increase cost burdens on
FICUs as it requires only that FICUs provide an early notification to
the agency without requiring any detailed assessments or evaluations.
Also, while the final rule could lead to cost savings for FICUs if the
NCUA or other government agencies can help to mitigate the impact of a
cyber incident, the Board does not expect the final rule to accord a
significant economic benefit to a substantial number of FICUs.
Accordingly, the NCUA certifies that the final rule will not have a
significant economic impact on a substantial number of small credit
unions.
---------------------------------------------------------------------------
\22\ 5 U.S.C. 603(a).
\23\ 80 FR 57512 (Sept. 24, 2015).
---------------------------------------------------------------------------
B. Paperwork Reduction Act
The Paperwork Reduction Act of 1995 (PRA) (44 U.S.C. 3501 et seq.)
requires that the Office of Management and Budget (OMB) approve all
collections of information by a Federal agency from the public before
they can be implemented. Respondents are not required to respond to any
collection of information unless it displays a valid OMB control
number. In accordance with the PRA, the information collection
requirements included in this final rule have been submitted to OMB for
approval under control number 3133-0033, Security Program, 12 CFR 748.
C. Executive Order 13132
Executive Order 13132 encourages independent regulatory agencies to
consider the impact of their actions on state and local interests. In
adherence to fundamental federalism principles, the NCUA, an
independent regulatory agency as defined in 44 U.S.C. 3502(5),
voluntarily complies with the Executive order. This rulemaking will not
have a substantial direct effect on the states, on the connection
between the national government and the states, or on the distribution
of power and responsibilities among the various levels of government.
Although the final rule applies to federally insured, state-chartered
credit unions (FISCUs), it imposes only a minimal reporting requirement
and does not affect the ability of state regulatory agencies to
regulate, supervise, or examine FISCUs on this subject. Therefore, the
NCUA has determined that this final rule does not constitute a policy
that has federalism implications for purposes of the Executive order.
D. Assessment of Federal Regulations and Policies on Families
The NCUA has determined that this final rule will not affect family
well-being within the meaning of Section 654 of the Treasury and
General Government Appropriations Act, 1999.\24\
---------------------------------------------------------------------------
\24\ Public Law 105-277, 112 Stat. 2681 (1998).
---------------------------------------------------------------------------
E. Small Business Regulatory Enforcement Fairness Act
The Small Business Regulatory Enforcement Fairness Act of 1996
(SBREFA) generally provides for congressional review of agency
rules.\25\ A reporting requirement is triggered in instances where the
NCUA issues a final rule as defined by section 551 of the
Administrative Procedure Act. An agency rule, in addition to being
subject to congressional oversight, may also be subject to a delayed
effective date if the rule is a ``major rule.'' The NCUA does not
believe this rule is a ``major rule'' within the meaning of the
relevant sections of SBREFA. As required by SBREFA, the NCUA will
submit this final rule to OMB for it to determine whether the final
rule is a ``major rule'' for purposes of SBREFA. The NCUA also will
file appropriate reports with Congress and the Government
Accountability Office so this rule may be reviewed.
---------------------------------------------------------------------------
\25\ 5 U.S.C. 551.
---------------------------------------------------------------------------
For purposes of the Congressional Review Act, the OMB makes a
determination as to whether a final rule constitutes a ``major rule.''
If a rule is deemed a ``major rule'' by the OMB, the Congressional
Review Act generally provides that the rule may not take effect until
at least 60 days following its publication. The Congressional Review
Act defines a ``major rule'' as any rule that the Administrator of the
Office of Information and Regulatory Affairs of the OMB finds has
resulted in or is likely to result in (1) an annual effect on the
economy of $100 million or more; (2) a major increase in costs or
prices for consumers, individual industries, Federal, State, or local
government agencies or geographic regions, or (3) significant adverse
effects on competition, employment, investment, productivity,
innovation, or on the ability of U.S.-based enterprises to compete with
foreign-based enterprises in domestic and export markets.\26\
---------------------------------------------------------------------------
\26\ 5 U.S.C. 804(2).
---------------------------------------------------------------------------
List of Subjects in 12 CFR Part 748
Computer technology, Confidential business information, Credit
unions, internet, Personally identifiable information, Privacy,
Reporting and recordkeeping requirements, Security measures.
By the NCUA Board on February 16, 2023.
Melane Conyers-Ausbrooks,
Secretary of the Board.
For the reasons stated in the preamble, the NCUA Board amends 12
CFR part 748, as follows:
PART 748--SECURITY PROGRAM, SUSPICIOUS TRANSACTIONS, CATASTROPHIC
ACTS, CYBER INCIDENTS, AND BANK SECRECY ACT COMPLIANCE
0
1. The authority citation for part 748 is revised to read as follows:
Authority: 12 U.S.C. 1766(a), 1786(b)(1), 1786(q), 1789(a)(11);
15 U.S.C. 6801-6809; 31 U.S.C. 5311 and 5318.
0
2. Revise the heading for part 748 to read as set forth above.
0
3. Amend Sec. 748.1 as follows:
0
a. Redesignate paragraph (c) as paragraph (d); and
0
b. Add a new paragraph (c).
The addition reads as follows:
Sec. 748.1 Filing of reports.
* * * * *
(c) Cyber incident report. Each federally insured credit union must
notify the appropriate NCUA-designated point of contact of the
occurrence of a reportable cyber incident via email, telephone, or
other similar methods that the NCUA may prescribe. The NCUA must
receive this notification as soon as possible but no later than 72
hours after a federally insured credit union reasonably believes that
it has experienced a reportable cyber incident or, if reporting
pursuant to paragraph
[[Page 12817]]
(c)(1)(i)(C) of this section, within 72 hours of being notified by a
third-party, whichever is sooner.
(1) Reportable cyber incident. (i) A reportable cyber incident is
any substantial cyber incident that leads to one or more of the
following:
(A) A substantial loss of confidentiality, integrity, or
availability of a network or member information system as defined in
appendix A, section I.B.2. e., of this part that results from the
unauthorized access to or exposure of sensitive data, disrupts vital
member services as defined in Sec. 749.1 of this chapter, or has a
serious impact on the safety and resiliency of operational systems and
processes.
(B) A disruption of business operations, vital member services, or
a member information system resulting from a cyberattack or
exploitation of vulnerabilities.
(C) A disruption of business operations or unauthorized access to
sensitive data facilitated through, or caused by, a compromise of a
credit union service organization, cloud service provider, or other
third-party data hosting provider or by a supply chain compromise.
(ii) A reportable cyber incident does not include any event where
the cyber incident is performed in good faith by an entity in response
to a specific request by the owner or operators of the system.
(2) Definitions. For purposes of this part:
Compromise means the unauthorized disclosure, modification,
substitution, or use of sensitive data or the unauthorized modification
of a security-related system, device, or process in order to gain
unauthorized access.
Confidentiality means preserving authorized restrictions on
information access and disclosure, including means for protecting
personal privacy and proprietary information.
Cyber incident means an occurrence that actually or imminently
jeopardizes, without lawful authority, the integrity, confidentiality,
or availability of information on an information system, or actually or
imminently jeopardizes, without lawful authority, an information
system.
Cyberattack means an attack, via cyberspace, targeting an
enterprise's use of cyberspace for the purpose of disrupting,
disabling, destroying, or maliciously controlling a computing
environment/infrastructure; or destroying the integrity of the data or
stealing controlled information.
Disruption means an unplanned event that causes an information
system to be inoperable for a length of time.
Integrity means guarding against improper information modification
or destruction and includes ensuring information non-repudiation and
authenticity.
Sensitive data means any information which by itself, or in
combination with other information, could be used to cause harm to a
credit union or credit union member and any information concerning a
person or their account which is not public information, including any
non-public personally identifiable information.
* * * * *
0
4. Amend appendix B to part 748 as follows:
0
a. Redesignate footnotes 29 through 42 as footnotes 1 through 14;
0
b. In the introductory text of section I:
0
i. Revise the first sentence; and
0
ii. Remove ``Part 748'' and add ``this part'' in its place; and
0
c. Revise newly redesignated footnotes 1 and 11.
The revisions read as follows:
Appendix B to Part 748--Guidance on Response Programs for Unauthorized
Access to Member Information and Member Notice
I. * * *
This appendix provides guidance on NCUA's Security Program,
Suspicious Transactions, Catastrophic Acts, Cyber Incidents, and
Bank Secrecy Act Compliance regulation,\1\ interprets section 501(b)
of the Gramm-Leach-Bliley Act (``GLBA''), and describes response
programs, including member notification procedures, that a federally
insured credit union should develop and implement to address
unauthorized access to or use of member information that could
result in substantial harm or inconvenience to a member. * * *
* * * * *
\1\This part.
* * * * *
\11\ A credit union's obligation to file a SAR is set forth in
Sec. 748.1(d).
* * * * *
[FR Doc. 2023-03682 Filed 2-28-23; 8:45 am]
BILLING CODE 7535-01-P