Self-Regulatory Organizations; The Options Clearing Corporation; Notice of Filing of Proposed Rule Change by The Options Clearing Corporation Concerning Clearing Member Cybersecurity Obligations, 20195-20200 [2023-07004]

Download as PDF lotter on DSK11XQN23PROD with NOTICES1 Federal Register / Vol. 88, No. 65 / Wednesday, April 5, 2023 / Notices Additionally, please include the Docket ID at the top of your comments. Federal eRulemaking Portal: Go to www.regulations.gov to submit your comments electronically. Information on how to use Regulations.gov, including instructions for accessing agency documents, submitting comments, and viewing the docket, is available on the site under ‘‘FAQ’’ (https://www.regulations.gov/faq). Privacy Note: OSTP’s policy is to make all comments received from members of the public available for public viewing in their entirety on the Federal eRulemaking Portal at www.regulations.gov. Therefore, commenters should be careful to include in their comments only information that they wish to make publicly available. OSTP requests that no proprietary information, copyrighted information, or personally identifiable information be submitted in response to this RFI. Instructions: Response to this RFI is voluntary. Respondents need not reply to all questions listed. For all submissions, clearly indicate which questions are being answered. Multiple submissions from an individual, group, or institution will be considered as supplements to the original response and not as new comments. Submissions should include the name(s) of the person(s) or organization(s) filing the comment. Any information obtained from this RFI is intended to be used by the Government on a non-attribution basis for planning and strategy development. OSTP will not respond to individual submissions. A response to this RFI will not be viewed as a binding commitment to develop or pursue the project or ideas discussed. This RFI is not accepting applications for financial assistance or financial incentives. Please note that the United States Government will not pay for response preparation, or for the use of any information contained in a response. FOR FURTHER INFORMATION CONTACT: Rhema Bjorkland at info@nnco.nano.gov or 202–517–1050. Individuals who use telecommunication devices for the deaf and hard of hearing (TDD) may call the Federal Relay Service (FRS) at 1–800– 877–8339, 24 hours a day, every day of the year, including holidays. SUPPLEMENTARY INFORMATION: Background Information: NEHI, on behalf of the NNI, is engaging the community early in the process to allow the public and key stakeholders to inform revisions to the NNI EHS research strategy. In preparing comments, the public is invited to view VerDate Sep<11>2014 17:44 Apr 04, 2023 Jkt 259001 the core research areas and their associated needs as set out in the NNI 2011 Environmental, Health, and Safety (EHS) Research Strategy (https:// www.nano.gov/2011EHSStrategy). The 2014 Progress Review on the Coordinated Implementation of the National Nanotechnology Initiative 2011 Environmental, Health, and Safety Research Strategy (https:// www.nano.gov/2014-EHS-ProgressReview) and 2017 Highlights of Recent Research on the Environmental, Health, and Safety Implications of Engineered Nanomaterials (https://www.nano.gov/ Highlights-Federal-NanoEHS-Report) provide additional information on the progress made in the core research areas. Information Requested: Pursuant to 42 U.S.C. 6617, OSTP is soliciting public input through an RFI to obtain feedback from a wide variety of stakeholders, including individuals, industry, academia, research laboratories, nonprofits, and think tanks. OSTP is interested in public input to inform an updated nanotechnology EHS research strategy, specifically a strategy that focuses on the use of science-based risk analysis and risk management to protect public health and the environment while also fostering the technological advancements that benefit society. OSTP seeks responses to any or all of the following questions: 1. What are the research accomplishments in the following six core research areas identified in the 2011 NNI EHS Strategy? The six core research areas are (1) Nanomaterial Measurement Infrastructure, (2) Human Exposure Assessment, (3) Human Health, (4) Environment, (5) Risk Assessment and Risk Management Methods, and (6) Informatics and Modeling. 2. What research gaps remain in addressing the six NNI EHS core research areas listed in question 1? 3. The ethical, legal, and societal implications (ELSI) of nanotechnology are considered across the core research areas of the 2011 strategy. What additional ways could ELSI be more fully integrated throughout a refreshed NNI EHS research strategy? 4. What broad themes should the revised strategy adopt to integrate and connect the six research areas? 5. How should the updated NNI EHS research strategy reflect the evolution of nanotechnology beyond engineered nanomaterials to complex systems, structures, and devices? 6. The 2011 strategy focused on engineered nanomaterials and did not include incidental nanoscale materials PO 00000 Frm 00078 Fmt 4703 Sfmt 4703 20195 such as nanoplastics and certain nanoscale particulate emissions such as those from 3D printing. If the updated strategy is revised to include some nonengineered or incidental nanomaterials, describe how to scope the strategy in a way that complements rather than being redundant with existing health and environmental research (e.g., by excluding the large body of existing research on air pollution, which can include nanoscale particles). Dated: March 31, 2023. Stacy Murphy, Deputy Chief Operations Officer/Security Officer. [FR Doc. 2023–07074 Filed 4–4–23; 8:45 am] BILLING CODE 3270–F1–P SECURITIES AND EXCHANGE COMMISSION [Release No. 34–97225; File No. SR–OCC– 2023–003] Self-Regulatory Organizations; The Options Clearing Corporation; Notice of Filing of Proposed Rule Change by The Options Clearing Corporation Concerning Clearing Member Cybersecurity Obligations March 30, 2023. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (‘‘Exchange Act’’ or ‘‘Act’’),1 and Rule 19b–4 thereunder,2 notice is hereby given that on March 21, 2023, The Options Clearing Corporation (‘‘OCC’’ or ‘‘Corporation’’) filed with the Securities and Exchange Commission (‘‘SEC’’ or ‘‘Commission’’) the proposed rule change as described in Items I, II, and III below, which Items have been prepared primarily by OCC. The Commission is publishing this notice to solicit comments on the proposed rule change from interested persons. I. Clearing Agency’s Statement of the Terms of Substance of the Proposed Rule Change The proposed rule change would amend certain provisions in OCC’s Rules relating to Clearing Member cybersecurity obligations to address the occurrence of a cyber-related disruption or intrusion of a Clearing Member (‘‘Security Incident’’). The proposed changes would (i) require a Clearing Member to immediately notify OCC of a Security Incident; (ii) memorialize OCC’s ability to take actions reasonably necessary to mitigate any effects to its operations; and (iii) require such 1 15 2 17 E:\FR\FM\05APN1.SGM U.S.C. 78s(b)(1). CFR 240.19b–4. 05APN1 20196 Federal Register / Vol. 88, No. 65 / Wednesday, April 5, 2023 / Notices Clearing Member to provide a form containing written representations addressing the incident and attesting to certain security requirements (‘‘Reconnection Attestation’’) and an associated checklist describing remediation efforts (‘‘Reconnection Checklist’’ and together, ‘‘Reconnection Attestation and Checklist’’). The proposed changes to OCC’s Rules are included as Exhibit 5 to File No. SR– OCC–2023–003. Material proposed to be added to the Rules as currently in effect is underlined and material proposed to be deleted is marked in strikethrough text. All capitalized terms not defined herein have the same meaning as set forth in the OCC By-Laws and Rules.3 II. Clearing Agency’s Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change In its filing with the Commission, OCC included statements concerning the purpose of and basis for the proposed rule change and discussed any comments it received on the proposed rule change. The text of these statements may be examined at the places specified in Item IV below. OCC has prepared summaries, set forth in sections (A), (B), and (C) below, of the most significant aspects of these statements. (A) Clearing Agency’s Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change lotter on DSK11XQN23PROD with NOTICES1 (1) Purpose Overview The proposed rule change would amend certain provisions in the Rules relating to Clearing Member cybersecurity obligations to address the occurrence of a Security Incident. The proposed changes would (i) require a Clearing Member to immediately notify OCC of a Security Incident; (ii) memorialize OCC’s ability to take actions reasonably necessary to mitigate any effects to its operations; and (iii) require such Clearing Member to provide a Reconnection Attestation containing written representations addressing the incident and attesting to certain security requirements and an associated Reconnection Checklist describing remediation efforts. As described in more detail below, the proposed rule change is designed to help OCC assess and take appropriate action to manage the cybersecurity risks that may be introduced to OCC’s information and data systems due to a Security Incident. 3 OCC’s By-Laws and Rules can be found on OCC’s public website: https://www.theocc.com/ Company-Information/Documents-and-Archives/ By-Laws-and-Rules. VerDate Sep<11>2014 17:44 Apr 04, 2023 Jkt 259001 OCC believes it is prudent to implement a standardized approach to assess and manage the cybersecurity risks that OCC may face through its interconnections to Clearing Members. Cybersecurity incidents pose an ongoing risk to OCC, as well as market participants, as an attack on OCC can lead to the loss of data or system integrity, unauthorized disclosure of sensitive information, or an inability to conduct essential clearance and settlement functions. Moreover, as a designated systemically important financial market utility (‘‘SIFMU’’),4 a failure or disruption to OCC could increase the risk of significant liquidity problems spreading among financial institutions or markets and thereby threaten the stability of the financial system in the United States. Given its designation as a SIFMU, OCC believes it is prudent to enhance its management of Security Incidents so that OCC’s own information and data systems remain protected against cyberattacks. The proposed rule change would amend certain provisions in the Rules relating to Clearing Member cybersecurity obligations to address the occurrence of a Security Incident. Clearing Member cybersecurity obligations are currently set out in Rule 219, which addresses requirements related to a firm’s cybersecurity program. The proposed rule change would expand the scope of this Rule to incorporate provisions that address the occurrence of a Security Incident, as further described below. The current Clearing Member cybersecurity obligations in this Rule would remain unchanged. The proposed changes would clearly describe Clearing Member obligations and OCC rights with respect to a Security Incident. The proposal would require Clearing Members to immediately notify OCC of a Security Incident. OCC’s notification and reporting requirements for Clearing Members are currently set forth in various provisions of the By-Laws and the Rules and require, among other things, that Clearing Members provide OCC with such documents and information as OCC may require from time to time.5 These existing notification and reporting requirements do not directly address Security Incidents. The proposal would amend OCC’s notification and reporting 4 OCC was designated as a SIFMU under Title VIII of the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010. 12 U.S.C. 5465(e)(1). 5 See Article V, Section 1, Interpretation and Policy .07 of the By-Laws and Rules 201(b), 215, 216, 217(b), 303, 306, 308 and 310(a)–(c). PO 00000 Frm 00079 Fmt 4703 Sfmt 4703 requirements to adopt a specific requirement in the Rules that Clearing Members immediately notify OCC of a Security Incident and promptly confirm such notice in writing. The proposed changes would also memorialize in the Rules OCC’s ability to take actions reasonably necessary to mitigate any effects of a Security Incident to its operations. OCC’s existing right to disconnect access, or to modify the scope and specifications of access, of a Clearing Member to OCC information and data systems is based in the Agreement for OCC Services, which sets forth the terms of various services that OCC may provide to Clearing Members.6 OCC maintains various contracts and forms, including the Agreement for OCC Services, that in conjunction with OCC’s By-Laws and Rules, establish and govern the relationship between OCC and each Clearing Member.7 Pursuant to the Agreement for OCC Services, OCC may terminate electronic access to particular OCC information and data systems, or modify the scope and specifications of such access, from time to time. Codifying this ability of OCC to take actions reasonably necessary to mitigate any effects to its operations in the Rules would centralize relevant information pertaining to cybersecurity in the Rules. The proposal would further implement a standardized approach to evaluate and manage the cybersecurity risks that OCC may face due to a Security Incident. The proposal would set out new procedures that would require a Clearing Member to submit, upon OCC’s request, the Reconnection Attestation and Checklist after reporting a Security Incident, both as provided by OCC from time to time. The Rule is designed to provide OCC with a degree of flexibility in requesting the Reconnection Attestation and Checklist to consider circumstances where there may be no risk or threat to OCC, such as when a Security Incident is contained to a part of a Clearing Member’s business with no relevance to OCC or its markets. The Reconnection Attestation and Checklist are designed to enable OCC to determine whether the risk or threat to OCC has been mitigated sufficiently, including whether to resume connectivity to a Clearing Member if connectivity was disconnected or modified. OCC would detail specific representations and information required of Clearing Members in the proposed Reconnection 6 See Exchange Act Release No. 34–73577 (Nov. 12, 2014), 79 FR 68733 (Nov. 18, 2014) (File No. SR–OCC–2014–20). 7 Id. E:\FR\FM\05APN1.SGM 05APN1 Federal Register / Vol. 88, No. 65 / Wednesday, April 5, 2023 / Notices Attestation and Checklist, included in Exhibit 3 to File No. SR–OCC–2023– 003. OCC believes an attestation-based format coupled with a checklist would be most effective in ascertaining a Clearing Member’s response to a Security Incident, including whether the Clearing Member has appropriate security requirements and carried out suitable remediation measures, to determine any potential threats to OCC’s information and data systems. The forms filter the requested information and representations into a standardized format, which would better enable OCC to review and identify areas of interest, concern, or heightened risk in respect of a Security Incident. Standardizing the form and contents of submissions would also improve efficiency for Clearing Members and OCC by reducing the potential uncertainty and time required to demonstrate an acceptable response to a Security Incident, which would facilitate OCC’s ability to evaluate the potential risk or threat posed by the Security Incident and facilitate the resumption of Clearing Member connectivity. lotter on DSK11XQN23PROD with NOTICES1 Proposed Rule Changes The proposed rule change would amend certain provisions in the Rules relating to Clearing Member cybersecurity obligations to address the occurrence of a Security Incident. In addition to expanding the scope of existing Rules, the proposed changes would (i) require a Clearing Member to immediately notify OCC of a Security Incident; (ii) memorialize OCC’s ability to take actions reasonably necessary to mitigate any effects to its operations; and (iii) require such Clearing Member to provide a Reconnection Attestation and Checklist. Amended Cybersecurity Obligations Provisions The proposed changes would expand the scope of existing Rule 219 to address the occurrence of a Security Incident. Existing Rule 219, titled ‘‘Cybersecurity Confirmation,’’ currently includes requirements related to a firm’s cybersecurity program and requires Clearing Members and applicants for clearing membership to submit a form, referred to as the ‘‘Cybersecurity Confirmation,’’ that confirms the existence of a cybersecurity program. To broaden the scope, OCC proposes to retitle this Rule from ‘‘Cybersecurity Confirmation’’ to ‘‘Cybersecurity Obligations’’ to address Security Incidents and centralize cybersecurityrelated provisions in one section of the Rules. For clarity, OCC also proposes to add a heading to each paragraph in this VerDate Sep<11>2014 17:44 Apr 04, 2023 Jkt 259001 Rule to summarize its content. OCC proposes to add the following headings: ‘‘Cybersecurity Confirmation Submission’’ to paragraph (a), which relates to the submission of the Cybersecurity Confirmation; ‘‘Representations in the Cybersecurity Confirmation’’ to paragraph (b), which relates to the representations in the Cybersecurity Confirmation; and ‘‘Execution of the Cybersecurity Confirmation’’ to paragraph (c), which relates to the execution of the Cybersecurity Confirmation. OCC also proposes a minor edit to replace ‘‘OCC’’ with ‘‘the Corporation’’ in paragraphs (a) and (b) for consistency. Additionally, under the proposed rule change, existing Rule 219 would be renumbered as Rule 213.8 Occurrence of a Security Incident The proposed changes would address the occurrence of a Security Incident in the Rules by: (i) requiring a Clearing Member to immediately notify OCC of a Security Incident; (ii) memorializing OCC’s ability to take actions reasonably necessary to mitigate any effects to its operations; and (iii) requiring such Clearing Member to provide a Reconnection Attestation and Checklist. Each of these proposed changes is described in greater detail below. (i) Notification of a Security Incident The proposed rule change would adopt a new paragraph (d) to amended Rule 213, titled ‘‘Occurrence of a Security Incident,’’ to address the occurrence of a Security Incident. Proposed Rule 213(d) would define Security Incident as a cyber-related disruption or intrusion of the Clearing Member, including, but not limited to, any disruption or degradation of the normal operation of the Clearing Member’s systems or any unauthorized entry into the Clearing Member’s systems. Proposed Rule 213(d) would require a Clearing Member to immediately notify OCC if there has been a Security Incident or if a Security Incident is occurring and to promptly confirm such notice in writing. (ii) Memorialization of OCC’s Ability To Take Action Proposed paragraph (d) to amended Rule 213 would also memorialize OCC’s ability to take actions reasonably necessary to mitigate any effects to its 8 OCC proposes to renumber existing Rule 219 to Rule 213 following on proposed changes to OCC’s clearing membership standards, which includes removal of current rules 213 through 218. See Exchange Act Release No. 34–97150 (Mar. 15, 2023), 88 FR 17046 (Mar. 21, 2023) (File No. SR– OCC–2023–002). PO 00000 Frm 00080 Fmt 4703 Sfmt 4703 20197 operations in the case of a Security Incident. The proposed language specifies that upon notice from a Clearing Member of a Security Incident, or if OCC has a reasonable basis to believe that a Security Incident has occurred, or is occurring, OCC may take actions reasonably necessary to mitigate any effects to its operations. Such actions would include the right to disconnect access, or to modify the scope and specifications of access, of the Clearing Member to OCC’s information and data systems, consistent with the Agreement for OCC Services. (iii) Requirement To Provide Reconnection Attestation and Checklist The proposed rule change would adopt new paragraph (e) to amended Rule 213, titled ‘‘Procedures for Connecting Following a Security Incident,’’ to incorporate procedures for Clearing Members to follow in the case of a Security Incident, including in order to resume connectivity to OCC. Proposed Rule 213(e) would require a Clearing Member to complete and submit, upon OCC’s request, the Reconnection Attestation and Checklist after reporting a Security Incident, both as provided by OCC from time to time. The Reconnection Attestation and Checklist would facilitate OCC’s ability to determine whether the risk or threat to OCC has been mitigated sufficiently, including whether to resume connectivity to a Clearing Member if connectivity was disconnected or modified. The proposed Reconnection Attestation and Checklist are set out in more detail below. Each Reconnection Attestation would be required to be in writing on a form provided by OCC and signed by a designated senior executive of the Clearing Member who is authorized to attest to these matters, as specified in proposed Rule 213(e)(1). Each Reconnection Attestation would contain representations addressing the incident and attesting to certain security requirements. In addition, Clearing Members would be required to describe the Security Incident. OCC is proposing to require that the following representations be included in the Reconnection Attestation in proposed Rule 213(e)(1)(A) through (E): First, the Reconnection Attestation would include a representation that the Clearing Member has provided full, complete and accurate information in response to all requests made by OCC regarding the Security Incident, including all requests contained in the Reconnection Checklist, on a good faith, best efforts basis. E:\FR\FM\05APN1.SGM 05APN1 lotter on DSK11XQN23PROD with NOTICES1 20198 Federal Register / Vol. 88, No. 65 / Wednesday, April 5, 2023 / Notices Second, the Reconnection Attestation would include a representation that the Clearing Member has provided full, complete and accurate information regarding any OCC data or systems that were potentially compromised during the Security Incident, including any potential exposure of credentials used to access OCC’s systems, and will immediately notify OCC if it later becomes aware of a previously undetected or unreported compromise of OCC data or systems during the Security Incident. Third, the Reconnection Attestation would include a representation that the Clearing Member has determined whether the Security Incident resulted, directly or indirectly, from any controls that failed or were circumvented by its employees, contractors or agents (‘‘Failed Controls’’). The proposed language would further specify that the Clearing Member has communicated Failed Controls to OCC and is remediating or has remediated all Failed Controls. Fourth, the Reconnection Attestation would include a representation that the Clearing Member has implemented, or will implement promptly, technical and operational changes, both preventative and detective, with the intent to prevent a recurrence of the Security Incident and has provided written summaries of such changes to OCC. Fifth, the Reconnection Attestation would include a representation that the Clearing Member has complied and will continue to comply with all applicable laws in connection with its response to the Security Incident, including any notifications required to be provided to government agencies, OCC, and third parties. Furthermore, each Reconnection Checklist would be required to be in writing on a form provided by OCC. A Clearing Member would describe its remediation efforts as part of the Reconnection Checklist, including relevant information related to the Security Incident and the Clearing Member’s response thereto. To account for the evolving nature of Security Incidents, OCC proposes flexibility regarding the information requirements under proposed Rule 213(e)(2). Namely, the Reconnection Checklist may require information including, but not limited to, the following under this Rule: • whether the disconnection was the result of a cybersecurity-related incident; • the nature of the incident; • the steps taken to contain the incident; • the OCC data, if any, that was compromised during the incident; VerDate Sep<11>2014 17:44 Apr 04, 2023 Jkt 259001 • the OCC systems, if any, that were impacted during the incident; • whether there was any risk of exposure of credentials used to access OCC systems, and if so, whether the credentials were reissued; • the controls that were circumvented or failed that led to the incident occurring; • the changes, preventative and detective, that were implemented to prevent a reoccurrence; • details on how data integrity has been preserved and what data checks have been performed; 9 • whether third-parties, including government agencies, have been notified; and • any additional details relevant to reconnection. Together, the required representations and information in the Reconnection Attestation and Checklist are designed to provide OCC with evidence related to a Clearing Member’s response to a Security Incident, including whether the Clearing Member has appropriate security requirements and carried out suitable remediation measures, to enable OCC to better understand and manage Security Incidents. By requiring such representations and information from a Clearing Member, the Reconnection Attestation and Checklist would provide OCC with key information to make decisions about risks and threats, perform additional monitoring, and determine whether to resume connectivity to a Clearing Member, as applicable, in order to protect OCC’s information and data systems. (2) Statutory Basis OCC believes the proposed rule changes are consistent with the requirements of the Act and the rules and regulations thereunder applicable to a registered clearing agency. In particular, OCC believes that the proposed rule changes are consistent with Section 17A(b)(3)(F) of the Act,10 and Rules 17Ad–22(e)(17)(i) and (e)(17)(ii), each promulgated under the Act,11 for the reasons described below. Section 17A(b)(3)(F) of the Act requires that the rules of OCC be designed to, among other things, promote the prompt and accurate clearance and settlement of securities transactions and assure the safeguarding 9 OCC notes that the Reconnection Checklist would specifically request details on how data integrity has been preserved and what data checks have been performed ‘‘prior to reconnecting to and sending/receiving data to/from OCC.’’ See Exhibit 3 to File No. SR–OCC–2023–003. 10 15 U.S.C. 78q–1(b)(3)(F). 11 17 CFR 240.17Ad–22(e)(17)(i) and (e)(17)(ii). PO 00000 Frm 00081 Fmt 4703 Sfmt 4703 of securities and funds which are in the custody or control of the clearing agency or for which it is responsible.12 As described above, the proposed amendments are designed to help OCC assess and take appropriate action to manage the cybersecurity risks that may be introduced to OCC’s information and data systems due to a Security Incident. OCC proposes edits to existing Rule 219, including to titles and headings, to expand the scope to address the occurrence of a Security Incident. Existing Rule 219 would be renumbered as Rule 213 and would clearly set out the obligation of Clearing Members to notify OCC of a Security Incident and the right of OCC to take actions reasonably necessary to mitigate any effects to its operations, thereby centralizing relevant information pertaining to cybersecurity in the Rules and promoting transparency. Moreover, the proposal would implement a standardized approach to assess and manage the cybersecurity risks that OCC may face through its interconnections to Clearing Members. The proposal would include procedures for Clearing Members to follow in the case of a Security Incident, including in order to resume connectivity to OCC. The proposed changes would require a Clearing Member to submit, upon OCC’s request, the Reconnection Attestation and Checklist after reporting a Security Incident, both as provided by OCC from time to time. OCC proposes to set forth specific representations and information required of Clearing Members in the Reconnection Attestation and Checklist, which are designed to provide OCC with evidence related to a Clearing Member’s response to a Security Incident, including whether the Clearing Member has appropriate security requirements and carried out suitable remediation measures, to enable OCC to better understand and manage Security Incidents. The Reconnection Attestation and Checklist would provide OCC with key information to make decisions about risks and threats, perform additional monitoring, and determine whether to resume connectivity to a Clearing Member, as applicable, to protect OCC’s information and data systems. Risks, threats, and potential vulnerabilities could impact OCC’s ability to clear and settle securities transactions, or to safeguard the securities and funds which are in its custody or control, or for which it is responsible. Therefore, by enhancing its processes to mitigate these risks, OCC believes the proposal would promote the prompt and accurate 12 15 E:\FR\FM\05APN1.SGM U.S.C. 78q–1(b)(3)(F). 05APN1 lotter on DSK11XQN23PROD with NOTICES1 Federal Register / Vol. 88, No. 65 / Wednesday, April 5, 2023 / Notices clearance and settlement of securities transactions and assure the safeguarding of securities and funds which are in the custody or control of the clearing agency or for which it is responsible, consistent with the requirements of Section 17A(b)(3)(F) of the Act.13 Rule 17Ad–22(e)(17)(i) under the Act requires that each covered clearing agency establish, implement, maintain and enforce written policies and procedures reasonably designed to manage the covered clearing agency’s operational risks by identifying the plausible sources of operational risk, both internal and external, and mitigating their impact through the use of appropriate systems, policies, procedures, and controls.14 The proposed Reconnection Attestation and Checklist would reduce the cybersecurity risks to OCC by requiring a Clearing Member to provide written representations addressing the incident and attesting to certain security requirements and an associated checklist describing remediation efforts. The proposed Reconnection Attestation and Checklist would filter the requested information and representations into a standardized format, which would better enable OCC to review and identify areas of interest, concern, or heightened risk in respect of a Security Incident. The representations and information in these forms would help OCC mitigate its exposure to cybersecurity risk and, thereby, decrease the operational risks to OCC. The proposed Reconnection Attestation and Checklist would identify to OCC potential sources of external operational risks that may be introduced through its interconnections to Clearing Members and enable OCC to mitigate these risks and possible impacts to OCC’s operations. Based on this information, OCC would make a determination regarding the resumption of connectivity to a Clearing Member if connectivity was disconnected or modified. As a result, OCC believes the proposal is consistent with the requirements of Rule 17Ad–22(e)(17)(i) under the Act.15 Rule 17Ad–22(e)(17)(ii) under the Act requires that each covered clearing agency establish, implement, maintain and enforce written policies and procedures reasonably designed to manage the covered clearing agency’s operational risks by ensuring, in part, that systems have a high degree of security, resiliency, and operational 13 Id. 14 17 reliability.16 The proposed Reconnection Attestation and Checklist would help enhance the security, resiliency, and operational reliability of OCC’s information and data systems. Namely, these forms would help OCC determine whether to take action against a Clearing Member, including preventing the reconnection of a Clearing Member, that may pose an increased cyber risk to OCC by not having appropriate security requirements or taking suitable remediation measures. Clearing Members that have not adequately addressed Security Incidents may present increased risk to OCC. For example, weaknesses within a Clearing Member’s environment could allow for exploitation by a malicious actor of the link between a Clearing Member and OCC. By better enabling OCC to identify these risks, the proposed rule change would allow OCC to more effectively secure its environment against potential vulnerabilities. The required representations and information in the Reconnection Attestation and Checklist would provide OCC with key information to make decisions about risks and threats, perform additional monitoring, and determine whether to resume connectivity to a Clearing Member, as applicable, to protect OCC’s information and data systems. As a result, OCC believes the proposal would improve OCC’s ability to ensure that its systems have a high degree of security, resiliency, and operational reliability, and, as such, is consistent with the requirements of Rule 17Ad–22(e)(17)(ii) under the Act.17 (B) Clearing Agency’s Statement on Burden on Competition Section 17A(b)(3)(I) of the Act 18 requires that the rules of a clearing agency not impose any burden on competition not necessary or appropriate in furtherance of the purposes of the Act. OCC does not believe that the proposed rule changes would impose any burden on competition not necessary or appropriate in furtherance of the purposes of the Act. As discussed above, OCC proposes to amend certain provisions in the Rules relating to Clearing Member cybersecurity obligations to address the occurrence of a Security Incident. The proposed changes would (i) require a Clearing Member to immediately notify OCC of a Security Incident; (ii) memorialize OCC’s ability to take actions reasonably 16 17 CFR 240.17Ad–22(e)(17)(i). 15 Id. VerDate Sep<11>2014 18 15 17:44 Apr 04, 2023 CFR 240.17Ad–22(e)(17)(ii). 17 Id. Jkt 259001 PO 00000 U.S.C. 78q–1(b)(3)(I). Frm 00082 Fmt 4703 Sfmt 4703 20199 necessary to mitigate any effects to its operations; and (iii) require such Clearing Member to provide a Reconnection Attestation and Checklist. While the proposed changes would require Clearing Members to incur additional costs, including to complete and submit the Reconnection Attestation and Checklist, OCC does not believe the proposed changes would present an undue burden on Clearing Members. Clearing Members are already subject to the notification and reporting requirements in OCC’s By-Laws and the Rules that require, among other things, that Clearing Members provide OCC with such documents and information as OCC may require from time to time.19 Standardizing the form and contents of the proposed submissions would reduce the potential uncertainty and time required to demonstrate an acceptable response to a Security Incident. Additionally, the proposed changes would not unfairly inhibit access to OCC’s services or disadvantage or favor any particular user in relationship to another user. Such changes would apply to all Clearing Members consistently and thus would not provide any Clearing Member with a competitive advantage over any other Clearing Member as the requirements would be uniform. As described above, given OCC’s position in the marketplace, OCC believes it is prudent to enhance its management of Security Incidents as detailed in the proposal, so that OCC’s own information and data systems remain protected against cyberattacks. For the foregoing reasons, OCC believes that the proposed rule change is in the public interest, would be consistent with the requirements of the Act applicable to clearing agencies, and would not impact or impose a burden on competition. (C) Clearing Agency’s Statement on Comments on the Proposed Rule Change Received From Members, Participants or Others Written comments were not and are not intended to be solicited with respect to the proposed rule change and none have been received. III. Date of Effectiveness of the Proposed Rule Change and Timing for Commission Action Within 45 days of the date of publication of this notice in the Federal Register or within such longer period up to 90 days (i) as the Commission may designate if it finds such longer period 19 See Article V, Section 1, Interpretation and Policy .07 of the By-Laws and Rules 201(b), 215, 216, 217(b), 303, 306, 308 and 310(a)–(c). E:\FR\FM\05APN1.SGM 05APN1 20200 Federal Register / Vol. 88, No. 65 / Wednesday, April 5, 2023 / Notices to be appropriate and publishes its reasons for so finding or (ii) as to which the self-regulatory organization consents, the Commission will: (A) by order approve or disapprove such proposed rule change, or (B) institute proceedings to determine whether the proposed rule change should be disapproved. The proposal shall not take effect until all regulatory actions required with respect to the proposal are completed. IV. Solicitation of Comments Interested persons are invited to submit written data, views and arguments concerning the foregoing, including whether the proposed rule change is consistent with the Act. Comments may be submitted by any of the following methods: Electronic Comments • Use the Commission’s internet comment form (https://www.sec.gov/ rules/sro.shtml); or • Send an email to rule-comments@ sec.gov. Please include File Number SR– OCC–2023–003 on the subject line. lotter on DSK11XQN23PROD with NOTICES1 Paper Comments • Send paper comments in triplicate to Vanessa Countryman, Secretary, Securities and Exchange Commission, 100 F Street NE, Washington, DC 20549–1090. All submissions should refer to File Number SR–OCC–2023–003. This file number should be included on the subject line if email is used. To help the Commission process and review your comments more efficiently, please use only one method. The Commission will post all comments on the Commission’s internet website (https://www.sec.gov/ rules/sro.shtml). Copies of the submission, all subsequent amendments, all written statements with respect to the proposed rule change that are filed with the Commission, and all written communications relating to the proposed rule change between the Commission and any person, other than those that may be withheld from the public in accordance with the provisions of 5 U.S.C. 552, will be available for website viewing and printing in the Commission’s Public Reference Room, 100 F Street, NE, Washington, DC 20549, on official business days between the hours of 10:00 a.m. and 3:00 p.m. Copies of such filing also will be available for inspection and copying at the principal office of OCC and on OCC’s website at https://www.theocc.com/Company- VerDate Sep<11>2014 17:44 Apr 04, 2023 Jkt 259001 Information/Documents-and-Archives/ By-Laws-and-Rules. All comments received will be posted without change. Persons submitting comments are cautioned that we do not redact or edit personal identifying information from comment submissions. You should submit only information that you wish to make available publicly. All submissions should refer to File Number SR–OCC–2023–003 and should be submitted on or before April 26, 2023. For the Commission, by the Division of Trading and Markets, pursuant to delegated authority.20 Sherry R. Haywood, Assistant Secretary. [FR Doc. 2023–07004 Filed 4–4–23; 8:45 am] BILLING CODE 8011–01–P investments made with amounts held by the Clearing House as regulatory capital. II. Clearing Agency’s Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change In its filing with the Commission, ICE Clear Europe included statements concerning the purpose of and basis for the proposed rule change and discussed any comments it received on the proposed rule change. The text of these statements may be examined at the places specified in Item IV below. ICE Clear Europe has prepared summaries, set forth in sections (A), (B), and (C) below, of the most significant aspects of such statements. (A) Clearing Agency’s Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change (a) Purpose SECURITIES AND EXCHANGE COMMISSION [Release No. 34–97224; File No. SR–ICEEU– 2023–009] Self-Regulatory Organizations; ICE Clear Europe Limited; Notice of Filing of Proposed Rule Change Relating to Amendments of the Investment Management Procedures March 30, 2023. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (‘‘Act’’),1 and Rule 19b–4 thereunder,2 notice is hereby given that on March 23, 2023, ICE Clear Europe Limited (‘‘ICE Clear Europe’’ or the ‘‘Clearing House’’) filed with the Securities and Exchange Commission (‘‘Commission’’) the proposed rule changes described in Items I, II and III below, which Items have been primarily prepared by ICE Clear Europe. The Commission is publishing this notice to solicit comments on the proposed rule change from interested persons. I. Clearing Agency’s Statement of the Terms of Substance of the Proposed Rule Change ICE Clear Europe Limited (‘‘ICE Clear Europe’’ or the ‘‘Clearing House’’) proposes to modify its Investment Management Procedures 3 (the ‘‘Investment Management Procedures’’ or the ‘‘Procedures’’) to change the maximum maturities for certain 20 17 CFR 200.30–3(a)(12). U.S.C. 78s(b)(1). 2 17 CFR 240.19b–4. 3 Capitalized terms used but not defined herein have the meanings specified in the ICE Clear Europe Clearing Rules and the Investment Management Procedures. 1 15 PO 00000 Frm 00083 Fmt 4703 Sfmt 4703 ICE Clear Europe is proposing to amend the Investment Management Procedures in the Table of Authorised Investments and Concentration Limits for ICEU’s Regulatory Capital (the ‘‘Table’’) to change the maximum maturity of certain investments in sovereign and government agency bonds. In particular, the maximum maturity on the purchase of U.S. Sovereign Bonds, UK Sovereign Bonds, EU Sovereign Bonds, U.S. Government Agency Bonds, UK Government Agency Bonds, and EU Government Agency Bonds would be amended from 90 days to 13 months. The amendments would align the maximum maturity for such investments with the existing maximum maturity for permitted investments in the same instrument that are made with cash provided by Clearing Members (‘‘CMs’’) (e.g., as margin or guaranty fund contribution) and the Clearing House’s own contribution to the guaranty fund. By extending the maximum maturity, ICE Clear Europe would have the flexibility to invest its regulatory capital in longer term sovereign and government bonds. ICE Clear Europe believes that such flexibility is important in light of current and expected market conditions, including to assist ICE Clear Europe in avoiding having to invest or reinvest in shorter duration instruments during potential periods of market volatility, such as those that may arise in connection with U.S. debt ceiling developments. (b) Statutory Basis ICE Clear Europe believes that the proposed amendments to the Investment Management Procedures are consistent with the requirements of E:\FR\FM\05APN1.SGM 05APN1

Agencies

[Federal Register Volume 88, Number 65 (Wednesday, April 5, 2023)]
[Notices]
[Pages 20195-20200]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-07004]


=======================================================================
-----------------------------------------------------------------------

SECURITIES AND EXCHANGE COMMISSION

[Release No. 34-97225; File No. SR-OCC-2023-003]


Self-Regulatory Organizations; The Options Clearing Corporation; 
Notice of Filing of Proposed Rule Change by The Options Clearing 
Corporation Concerning Clearing Member Cybersecurity Obligations

March 30, 2023.
    Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 
(``Exchange Act'' or ``Act''),\1\ and Rule 19b-4 thereunder,\2\ notice 
is hereby given that on March 21, 2023, The Options Clearing 
Corporation (``OCC'' or ``Corporation'') filed with the Securities and 
Exchange Commission (``SEC'' or ``Commission'') the proposed rule 
change as described in Items I, II, and III below, which Items have 
been prepared primarily by OCC. The Commission is publishing this 
notice to solicit comments on the proposed rule change from interested 
persons.
---------------------------------------------------------------------------

    \1\ 15 U.S.C. 78s(b)(1).
    \2\ 17 CFR 240.19b-4.
---------------------------------------------------------------------------

I. Clearing Agency's Statement of the Terms of Substance of the 
Proposed Rule Change

    The proposed rule change would amend certain provisions in OCC's 
Rules relating to Clearing Member cybersecurity obligations to address 
the occurrence of a cyber-related disruption or intrusion of a Clearing 
Member (``Security Incident''). The proposed changes would (i) require 
a Clearing Member to immediately notify OCC of a Security Incident; 
(ii) memorialize OCC's ability to take actions reasonably necessary to 
mitigate any effects to its operations; and (iii) require such

[[Page 20196]]

Clearing Member to provide a form containing written representations 
addressing the incident and attesting to certain security requirements 
(``Reconnection Attestation'') and an associated checklist describing 
remediation efforts (``Reconnection Checklist'' and together, 
``Reconnection Attestation and Checklist'').
    The proposed changes to OCC's Rules are included as Exhibit 5 to 
File No. SR-OCC-2023-003. Material proposed to be added to the Rules as 
currently in effect is underlined and material proposed to be deleted 
is marked in strikethrough text. All capitalized terms not defined 
herein have the same meaning as set forth in the OCC By-Laws and 
Rules.\3\
---------------------------------------------------------------------------

    \3\ OCC's By-Laws and Rules can be found on OCC's public 
website: https://www.theocc.com/Company-Information/Documents-and-Archives/By-Laws-and-Rules.
---------------------------------------------------------------------------

II. Clearing Agency's Statement of the Purpose of, and Statutory Basis 
for, the Proposed Rule Change

    In its filing with the Commission, OCC included statements 
concerning the purpose of and basis for the proposed rule change and 
discussed any comments it received on the proposed rule change. The 
text of these statements may be examined at the places specified in 
Item IV below. OCC has prepared summaries, set forth in sections (A), 
(B), and (C) below, of the most significant aspects of these 
statements.

(A) Clearing Agency's Statement of the Purpose of, and Statutory Basis 
for, the Proposed Rule Change

(1) Purpose
Overview
    The proposed rule change would amend certain provisions in the 
Rules relating to Clearing Member cybersecurity obligations to address 
the occurrence of a Security Incident. The proposed changes would (i) 
require a Clearing Member to immediately notify OCC of a Security 
Incident; (ii) memorialize OCC's ability to take actions reasonably 
necessary to mitigate any effects to its operations; and (iii) require 
such Clearing Member to provide a Reconnection Attestation containing 
written representations addressing the incident and attesting to 
certain security requirements and an associated Reconnection Checklist 
describing remediation efforts. As described in more detail below, the 
proposed rule change is designed to help OCC assess and take 
appropriate action to manage the cybersecurity risks that may be 
introduced to OCC's information and data systems due to a Security 
Incident.
    OCC believes it is prudent to implement a standardized approach to 
assess and manage the cybersecurity risks that OCC may face through its 
interconnections to Clearing Members. Cybersecurity incidents pose an 
ongoing risk to OCC, as well as market participants, as an attack on 
OCC can lead to the loss of data or system integrity, unauthorized 
disclosure of sensitive information, or an inability to conduct 
essential clearance and settlement functions. Moreover, as a designated 
systemically important financial market utility (``SIFMU''),\4\ a 
failure or disruption to OCC could increase the risk of significant 
liquidity problems spreading among financial institutions or markets 
and thereby threaten the stability of the financial system in the 
United States. Given its designation as a SIFMU, OCC believes it is 
prudent to enhance its management of Security Incidents so that OCC's 
own information and data systems remain protected against cyberattacks.
---------------------------------------------------------------------------

    \4\ OCC was designated as a SIFMU under Title VIII of the Dodd-
Frank Wall Street Reform and Consumer Protection Act of 2010. 12 
U.S.C. 5465(e)(1).
---------------------------------------------------------------------------

    The proposed rule change would amend certain provisions in the 
Rules relating to Clearing Member cybersecurity obligations to address 
the occurrence of a Security Incident. Clearing Member cybersecurity 
obligations are currently set out in Rule 219, which addresses 
requirements related to a firm's cybersecurity program. The proposed 
rule change would expand the scope of this Rule to incorporate 
provisions that address the occurrence of a Security Incident, as 
further described below. The current Clearing Member cybersecurity 
obligations in this Rule would remain unchanged.
    The proposed changes would clearly describe Clearing Member 
obligations and OCC rights with respect to a Security Incident. The 
proposal would require Clearing Members to immediately notify OCC of a 
Security Incident. OCC's notification and reporting requirements for 
Clearing Members are currently set forth in various provisions of the 
By-Laws and the Rules and require, among other things, that Clearing 
Members provide OCC with such documents and information as OCC may 
require from time to time.\5\ These existing notification and reporting 
requirements do not directly address Security Incidents. The proposal 
would amend OCC's notification and reporting requirements to adopt a 
specific requirement in the Rules that Clearing Members immediately 
notify OCC of a Security Incident and promptly confirm such notice in 
writing.
---------------------------------------------------------------------------

    \5\ See Article V, Section 1, Interpretation and Policy .07 of 
the By-Laws and Rules 201(b), 215, 216, 217(b), 303, 306, 308 and 
310(a)-(c).
---------------------------------------------------------------------------

    The proposed changes would also memorialize in the Rules OCC's 
ability to take actions reasonably necessary to mitigate any effects of 
a Security Incident to its operations. OCC's existing right to 
disconnect access, or to modify the scope and specifications of access, 
of a Clearing Member to OCC information and data systems is based in 
the Agreement for OCC Services, which sets forth the terms of various 
services that OCC may provide to Clearing Members.\6\ OCC maintains 
various contracts and forms, including the Agreement for OCC Services, 
that in conjunction with OCC's By-Laws and Rules, establish and govern 
the relationship between OCC and each Clearing Member.\7\ Pursuant to 
the Agreement for OCC Services, OCC may terminate electronic access to 
particular OCC information and data systems, or modify the scope and 
specifications of such access, from time to time. Codifying this 
ability of OCC to take actions reasonably necessary to mitigate any 
effects to its operations in the Rules would centralize relevant 
information pertaining to cybersecurity in the Rules.
---------------------------------------------------------------------------

    \6\ See Exchange Act Release No. 34-73577 (Nov. 12, 2014), 79 FR 
68733 (Nov. 18, 2014) (File No. SR-OCC-2014-20).
    \7\ Id.
---------------------------------------------------------------------------

    The proposal would further implement a standardized approach to 
evaluate and manage the cybersecurity risks that OCC may face due to a 
Security Incident. The proposal would set out new procedures that would 
require a Clearing Member to submit, upon OCC's request, the 
Reconnection Attestation and Checklist after reporting a Security 
Incident, both as provided by OCC from time to time. The Rule is 
designed to provide OCC with a degree of flexibility in requesting the 
Reconnection Attestation and Checklist to consider circumstances where 
there may be no risk or threat to OCC, such as when a Security Incident 
is contained to a part of a Clearing Member's business with no 
relevance to OCC or its markets. The Reconnection Attestation and 
Checklist are designed to enable OCC to determine whether the risk or 
threat to OCC has been mitigated sufficiently, including whether to 
resume connectivity to a Clearing Member if connectivity was 
disconnected or modified. OCC would detail specific representations and 
information required of Clearing Members in the proposed Reconnection

[[Page 20197]]

Attestation and Checklist, included in Exhibit 3 to File No. SR-OCC-
2023-003. OCC believes an attestation-based format coupled with a 
checklist would be most effective in ascertaining a Clearing Member's 
response to a Security Incident, including whether the Clearing Member 
has appropriate security requirements and carried out suitable 
remediation measures, to determine any potential threats to OCC's 
information and data systems. The forms filter the requested 
information and representations into a standardized format, which would 
better enable OCC to review and identify areas of interest, concern, or 
heightened risk in respect of a Security Incident. Standardizing the 
form and contents of submissions would also improve efficiency for 
Clearing Members and OCC by reducing the potential uncertainty and time 
required to demonstrate an acceptable response to a Security Incident, 
which would facilitate OCC's ability to evaluate the potential risk or 
threat posed by the Security Incident and facilitate the resumption of 
Clearing Member connectivity.
Proposed Rule Changes
    The proposed rule change would amend certain provisions in the 
Rules relating to Clearing Member cybersecurity obligations to address 
the occurrence of a Security Incident. In addition to expanding the 
scope of existing Rules, the proposed changes would (i) require a 
Clearing Member to immediately notify OCC of a Security Incident; (ii) 
memorialize OCC's ability to take actions reasonably necessary to 
mitigate any effects to its operations; and (iii) require such Clearing 
Member to provide a Reconnection Attestation and Checklist.
Amended Cybersecurity Obligations Provisions
    The proposed changes would expand the scope of existing Rule 219 to 
address the occurrence of a Security Incident. Existing Rule 219, 
titled ``Cybersecurity Confirmation,'' currently includes requirements 
related to a firm's cybersecurity program and requires Clearing Members 
and applicants for clearing membership to submit a form, referred to as 
the ``Cybersecurity Confirmation,'' that confirms the existence of a 
cybersecurity program. To broaden the scope, OCC proposes to retitle 
this Rule from ``Cybersecurity Confirmation'' to ``Cybersecurity 
Obligations'' to address Security Incidents and centralize 
cybersecurity-related provisions in one section of the Rules. For 
clarity, OCC also proposes to add a heading to each paragraph in this 
Rule to summarize its content. OCC proposes to add the following 
headings: ``Cybersecurity Confirmation Submission'' to paragraph (a), 
which relates to the submission of the Cybersecurity Confirmation; 
``Representations in the Cybersecurity Confirmation'' to paragraph (b), 
which relates to the representations in the Cybersecurity Confirmation; 
and ``Execution of the Cybersecurity Confirmation'' to paragraph (c), 
which relates to the execution of the Cybersecurity Confirmation. OCC 
also proposes a minor edit to replace ``OCC'' with ``the Corporation'' 
in paragraphs (a) and (b) for consistency. Additionally, under the 
proposed rule change, existing Rule 219 would be renumbered as Rule 
213.\8\
---------------------------------------------------------------------------

    \8\ OCC proposes to renumber existing Rule 219 to Rule 213 
following on proposed changes to OCC's clearing membership 
standards, which includes removal of current rules 213 through 218. 
See Exchange Act Release No. 34-97150 (Mar. 15, 2023), 88 FR 17046 
(Mar. 21, 2023) (File No. SR-OCC-2023-002).
---------------------------------------------------------------------------

Occurrence of a Security Incident
    The proposed changes would address the occurrence of a Security 
Incident in the Rules by: (i) requiring a Clearing Member to 
immediately notify OCC of a Security Incident; (ii) memorializing OCC's 
ability to take actions reasonably necessary to mitigate any effects to 
its operations; and (iii) requiring such Clearing Member to provide a 
Reconnection Attestation and Checklist. Each of these proposed changes 
is described in greater detail below.
(i) Notification of a Security Incident
    The proposed rule change would adopt a new paragraph (d) to amended 
Rule 213, titled ``Occurrence of a Security Incident,'' to address the 
occurrence of a Security Incident. Proposed Rule 213(d) would define 
Security Incident as a cyber-related disruption or intrusion of the 
Clearing Member, including, but not limited to, any disruption or 
degradation of the normal operation of the Clearing Member's systems or 
any unauthorized entry into the Clearing Member's systems. Proposed 
Rule 213(d) would require a Clearing Member to immediately notify OCC 
if there has been a Security Incident or if a Security Incident is 
occurring and to promptly confirm such notice in writing.
(ii) Memorialization of OCC's Ability To Take Action
    Proposed paragraph (d) to amended Rule 213 would also memorialize 
OCC's ability to take actions reasonably necessary to mitigate any 
effects to its operations in the case of a Security Incident. The 
proposed language specifies that upon notice from a Clearing Member of 
a Security Incident, or if OCC has a reasonable basis to believe that a 
Security Incident has occurred, or is occurring, OCC may take actions 
reasonably necessary to mitigate any effects to its operations. Such 
actions would include the right to disconnect access, or to modify the 
scope and specifications of access, of the Clearing Member to OCC's 
information and data systems, consistent with the Agreement for OCC 
Services.
(iii) Requirement To Provide Reconnection Attestation and Checklist
    The proposed rule change would adopt new paragraph (e) to amended 
Rule 213, titled ``Procedures for Connecting Following a Security 
Incident,'' to incorporate procedures for Clearing Members to follow in 
the case of a Security Incident, including in order to resume 
connectivity to OCC. Proposed Rule 213(e) would require a Clearing 
Member to complete and submit, upon OCC's request, the Reconnection 
Attestation and Checklist after reporting a Security Incident, both as 
provided by OCC from time to time. The Reconnection Attestation and 
Checklist would facilitate OCC's ability to determine whether the risk 
or threat to OCC has been mitigated sufficiently, including whether to 
resume connectivity to a Clearing Member if connectivity was 
disconnected or modified. The proposed Reconnection Attestation and 
Checklist are set out in more detail below.
    Each Reconnection Attestation would be required to be in writing on 
a form provided by OCC and signed by a designated senior executive of 
the Clearing Member who is authorized to attest to these matters, as 
specified in proposed Rule 213(e)(1). Each Reconnection Attestation 
would contain representations addressing the incident and attesting to 
certain security requirements. In addition, Clearing Members would be 
required to describe the Security Incident. OCC is proposing to require 
that the following representations be included in the Reconnection 
Attestation in proposed Rule 213(e)(1)(A) through (E):
    First, the Reconnection Attestation would include a representation 
that the Clearing Member has provided full, complete and accurate 
information in response to all requests made by OCC regarding the 
Security Incident, including all requests contained in the Reconnection 
Checklist, on a good faith, best efforts basis.

[[Page 20198]]

    Second, the Reconnection Attestation would include a representation 
that the Clearing Member has provided full, complete and accurate 
information regarding any OCC data or systems that were potentially 
compromised during the Security Incident, including any potential 
exposure of credentials used to access OCC's systems, and will 
immediately notify OCC if it later becomes aware of a previously 
undetected or unreported compromise of OCC data or systems during the 
Security Incident.
    Third, the Reconnection Attestation would include a representation 
that the Clearing Member has determined whether the Security Incident 
resulted, directly or indirectly, from any controls that failed or were 
circumvented by its employees, contractors or agents (``Failed 
Controls''). The proposed language would further specify that the 
Clearing Member has communicated Failed Controls to OCC and is 
remediating or has remediated all Failed Controls.
    Fourth, the Reconnection Attestation would include a representation 
that the Clearing Member has implemented, or will implement promptly, 
technical and operational changes, both preventative and detective, 
with the intent to prevent a recurrence of the Security Incident and 
has provided written summaries of such changes to OCC.
    Fifth, the Reconnection Attestation would include a representation 
that the Clearing Member has complied and will continue to comply with 
all applicable laws in connection with its response to the Security 
Incident, including any notifications required to be provided to 
government agencies, OCC, and third parties.
    Furthermore, each Reconnection Checklist would be required to be in 
writing on a form provided by OCC. A Clearing Member would describe its 
remediation efforts as part of the Reconnection Checklist, including 
relevant information related to the Security Incident and the Clearing 
Member's response thereto. To account for the evolving nature of 
Security Incidents, OCC proposes flexibility regarding the information 
requirements under proposed Rule 213(e)(2). Namely, the Reconnection 
Checklist may require information including, but not limited to, the 
following under this Rule:
     whether the disconnection was the result of a 
cybersecurity-related incident;
     the nature of the incident;
     the steps taken to contain the incident;
     the OCC data, if any, that was compromised during the 
incident;
     the OCC systems, if any, that were impacted during the 
incident;
     whether there was any risk of exposure of credentials used 
to access OCC systems, and if so, whether the credentials were 
reissued;
     the controls that were circumvented or failed that led to 
the incident occurring;
     the changes, preventative and detective, that were 
implemented to prevent a reoccurrence;
     details on how data integrity has been preserved and what 
data checks have been performed; \9\
---------------------------------------------------------------------------

    \9\ OCC notes that the Reconnection Checklist would specifically 
request details on how data integrity has been preserved and what 
data checks have been performed ``prior to reconnecting to and 
sending/receiving data to/from OCC.'' See Exhibit 3 to File No. SR-
OCC-2023-003.
---------------------------------------------------------------------------

     whether third-parties, including government agencies, have 
been notified; and
     any additional details relevant to reconnection.
    Together, the required representations and information in the 
Reconnection Attestation and Checklist are designed to provide OCC with 
evidence related to a Clearing Member's response to a Security 
Incident, including whether the Clearing Member has appropriate 
security requirements and carried out suitable remediation measures, to 
enable OCC to better understand and manage Security Incidents. By 
requiring such representations and information from a Clearing Member, 
the Reconnection Attestation and Checklist would provide OCC with key 
information to make decisions about risks and threats, perform 
additional monitoring, and determine whether to resume connectivity to 
a Clearing Member, as applicable, in order to protect OCC's information 
and data systems.
(2) Statutory Basis
    OCC believes the proposed rule changes are consistent with the 
requirements of the Act and the rules and regulations thereunder 
applicable to a registered clearing agency. In particular, OCC believes 
that the proposed rule changes are consistent with Section 17A(b)(3)(F) 
of the Act,\10\ and Rules 17Ad-22(e)(17)(i) and (e)(17)(ii), each 
promulgated under the Act,\11\ for the reasons described below.
---------------------------------------------------------------------------

    \10\ 15 U.S.C. 78q-1(b)(3)(F).
    \11\ 17 CFR 240.17Ad-22(e)(17)(i) and (e)(17)(ii).
---------------------------------------------------------------------------

    Section 17A(b)(3)(F) of the Act requires that the rules of OCC be 
designed to, among other things, promote the prompt and accurate 
clearance and settlement of securities transactions and assure the 
safeguarding of securities and funds which are in the custody or 
control of the clearing agency or for which it is responsible.\12\ As 
described above, the proposed amendments are designed to help OCC 
assess and take appropriate action to manage the cybersecurity risks 
that may be introduced to OCC's information and data systems due to a 
Security Incident. OCC proposes edits to existing Rule 219, including 
to titles and headings, to expand the scope to address the occurrence 
of a Security Incident. Existing Rule 219 would be renumbered as Rule 
213 and would clearly set out the obligation of Clearing Members to 
notify OCC of a Security Incident and the right of OCC to take actions 
reasonably necessary to mitigate any effects to its operations, thereby 
centralizing relevant information pertaining to cybersecurity in the 
Rules and promoting transparency. Moreover, the proposal would 
implement a standardized approach to assess and manage the 
cybersecurity risks that OCC may face through its interconnections to 
Clearing Members. The proposal would include procedures for Clearing 
Members to follow in the case of a Security Incident, including in 
order to resume connectivity to OCC. The proposed changes would require 
a Clearing Member to submit, upon OCC's request, the Reconnection 
Attestation and Checklist after reporting a Security Incident, both as 
provided by OCC from time to time. OCC proposes to set forth specific 
representations and information required of Clearing Members in the 
Reconnection Attestation and Checklist, which are designed to provide 
OCC with evidence related to a Clearing Member's response to a Security 
Incident, including whether the Clearing Member has appropriate 
security requirements and carried out suitable remediation measures, to 
enable OCC to better understand and manage Security Incidents. The 
Reconnection Attestation and Checklist would provide OCC with key 
information to make decisions about risks and threats, perform 
additional monitoring, and determine whether to resume connectivity to 
a Clearing Member, as applicable, to protect OCC's information and data 
systems. Risks, threats, and potential vulnerabilities could impact 
OCC's ability to clear and settle securities transactions, or to 
safeguard the securities and funds which are in its custody or control, 
or for which it is responsible. Therefore, by enhancing its processes 
to mitigate these risks, OCC believes the proposal would promote the 
prompt and accurate

[[Page 20199]]

clearance and settlement of securities transactions and assure the 
safeguarding of securities and funds which are in the custody or 
control of the clearing agency or for which it is responsible, 
consistent with the requirements of Section 17A(b)(3)(F) of the 
Act.\13\
---------------------------------------------------------------------------

    \12\ 15 U.S.C. 78q-1(b)(3)(F).
    \13\ Id.
---------------------------------------------------------------------------

    Rule 17Ad-22(e)(17)(i) under the Act requires that each covered 
clearing agency establish, implement, maintain and enforce written 
policies and procedures reasonably designed to manage the covered 
clearing agency's operational risks by identifying the plausible 
sources of operational risk, both internal and external, and mitigating 
their impact through the use of appropriate systems, policies, 
procedures, and controls.\14\ The proposed Reconnection Attestation and 
Checklist would reduce the cybersecurity risks to OCC by requiring a 
Clearing Member to provide written representations addressing the 
incident and attesting to certain security requirements and an 
associated checklist describing remediation efforts. The proposed 
Reconnection Attestation and Checklist would filter the requested 
information and representations into a standardized format, which would 
better enable OCC to review and identify areas of interest, concern, or 
heightened risk in respect of a Security Incident. The representations 
and information in these forms would help OCC mitigate its exposure to 
cybersecurity risk and, thereby, decrease the operational risks to OCC. 
The proposed Reconnection Attestation and Checklist would identify to 
OCC potential sources of external operational risks that may be 
introduced through its interconnections to Clearing Members and enable 
OCC to mitigate these risks and possible impacts to OCC's operations. 
Based on this information, OCC would make a determination regarding the 
resumption of connectivity to a Clearing Member if connectivity was 
disconnected or modified. As a result, OCC believes the proposal is 
consistent with the requirements of Rule 17Ad-22(e)(17)(i) under the 
Act.\15\
---------------------------------------------------------------------------

    \14\ 17 CFR 240.17Ad-22(e)(17)(i).
    \15\ Id.
---------------------------------------------------------------------------

    Rule 17Ad-22(e)(17)(ii) under the Act requires that each covered 
clearing agency establish, implement, maintain and enforce written 
policies and procedures reasonably designed to manage the covered 
clearing agency's operational risks by ensuring, in part, that systems 
have a high degree of security, resiliency, and operational 
reliability.\16\ The proposed Reconnection Attestation and Checklist 
would help enhance the security, resiliency, and operational 
reliability of OCC's information and data systems. Namely, these forms 
would help OCC determine whether to take action against a Clearing 
Member, including preventing the reconnection of a Clearing Member, 
that may pose an increased cyber risk to OCC by not having appropriate 
security requirements or taking suitable remediation measures. Clearing 
Members that have not adequately addressed Security Incidents may 
present increased risk to OCC. For example, weaknesses within a 
Clearing Member's environment could allow for exploitation by a 
malicious actor of the link between a Clearing Member and OCC. By 
better enabling OCC to identify these risks, the proposed rule change 
would allow OCC to more effectively secure its environment against 
potential vulnerabilities. The required representations and information 
in the Reconnection Attestation and Checklist would provide OCC with 
key information to make decisions about risks and threats, perform 
additional monitoring, and determine whether to resume connectivity to 
a Clearing Member, as applicable, to protect OCC's information and data 
systems. As a result, OCC believes the proposal would improve OCC's 
ability to ensure that its systems have a high degree of security, 
resiliency, and operational reliability, and, as such, is consistent 
with the requirements of Rule 17Ad-22(e)(17)(ii) under the Act.\17\
---------------------------------------------------------------------------

    \16\ 17 CFR 240.17Ad-22(e)(17)(ii).
    \17\ Id.
---------------------------------------------------------------------------

(B) Clearing Agency's Statement on Burden on Competition

    Section 17A(b)(3)(I) of the Act \18\ requires that the rules of a 
clearing agency not impose any burden on competition not necessary or 
appropriate in furtherance of the purposes of the Act. OCC does not 
believe that the proposed rule changes would impose any burden on 
competition not necessary or appropriate in furtherance of the purposes 
of the Act. As discussed above, OCC proposes to amend certain 
provisions in the Rules relating to Clearing Member cybersecurity 
obligations to address the occurrence of a Security Incident. The 
proposed changes would (i) require a Clearing Member to immediately 
notify OCC of a Security Incident; (ii) memorialize OCC's ability to 
take actions reasonably necessary to mitigate any effects to its 
operations; and (iii) require such Clearing Member to provide a 
Reconnection Attestation and Checklist. While the proposed changes 
would require Clearing Members to incur additional costs, including to 
complete and submit the Reconnection Attestation and Checklist, OCC 
does not believe the proposed changes would present an undue burden on 
Clearing Members. Clearing Members are already subject to the 
notification and reporting requirements in OCC's By-Laws and the Rules 
that require, among other things, that Clearing Members provide OCC 
with such documents and information as OCC may require from time to 
time.\19\ Standardizing the form and contents of the proposed 
submissions would reduce the potential uncertainty and time required to 
demonstrate an acceptable response to a Security Incident. 
Additionally, the proposed changes would not unfairly inhibit access to 
OCC's services or disadvantage or favor any particular user in 
relationship to another user. Such changes would apply to all Clearing 
Members consistently and thus would not provide any Clearing Member 
with a competitive advantage over any other Clearing Member as the 
requirements would be uniform. As described above, given OCC's position 
in the marketplace, OCC believes it is prudent to enhance its 
management of Security Incidents as detailed in the proposal, so that 
OCC's own information and data systems remain protected against 
cyberattacks. For the foregoing reasons, OCC believes that the proposed 
rule change is in the public interest, would be consistent with the 
requirements of the Act applicable to clearing agencies, and would not 
impact or impose a burden on competition.
---------------------------------------------------------------------------

    \18\ 15 U.S.C. 78q-1(b)(3)(I).
    \19\ See Article V, Section 1, Interpretation and Policy .07 of 
the By-Laws and Rules 201(b), 215, 216, 217(b), 303, 306, 308 and 
310(a)-(c).
---------------------------------------------------------------------------

(C) Clearing Agency's Statement on Comments on the Proposed Rule Change 
Received From Members, Participants or Others

    Written comments were not and are not intended to be solicited with 
respect to the proposed rule change and none have been received.

III. Date of Effectiveness of the Proposed Rule Change and Timing for 
Commission Action

    Within 45 days of the date of publication of this notice in the 
Federal Register or within such longer period up to 90 days (i) as the 
Commission may designate if it finds such longer period

[[Page 20200]]

to be appropriate and publishes its reasons for so finding or (ii) as 
to which the self-regulatory organization consents, the Commission 
will:
    (A) by order approve or disapprove such proposed rule change, or
    (B) institute proceedings to determine whether the proposed rule 
change should be disapproved.
    The proposal shall not take effect until all regulatory actions 
required with respect to the proposal are completed.

IV. Solicitation of Comments

    Interested persons are invited to submit written data, views and 
arguments concerning the foregoing, including whether the proposed rule 
change is consistent with the Act. Comments may be submitted by any of 
the following methods:

Electronic Comments

     Use the Commission's internet comment form (https://www.sec.gov/rules/sro.shtml); or
     Send an email to [email protected]. Please include 
File Number SR-OCC-2023-003 on the subject line.

Paper Comments

     Send paper comments in triplicate to Vanessa Countryman, 
Secretary, Securities and Exchange Commission, 100 F Street NE, 
Washington, DC 20549-1090.

All submissions should refer to File Number SR-OCC-2023-003. This file 
number should be included on the subject line if email is used. To help 
the Commission process and review your comments more efficiently, 
please use only one method. The Commission will post all comments on 
the Commission's internet website (https://www.sec.gov/rules/sro.shtml). 
Copies of the submission, all subsequent amendments, all written 
statements with respect to the proposed rule change that are filed with 
the Commission, and all written communications relating to the proposed 
rule change between the Commission and any person, other than those 
that may be withheld from the public in accordance with the provisions 
of 5 U.S.C. 552, will be available for website viewing and printing in 
the Commission's Public Reference Room, 100 F Street, NE, Washington, 
DC 20549, on official business days between the hours of 10:00 a.m. and 
3:00 p.m. Copies of such filing also will be available for inspection 
and copying at the principal office of OCC and on OCC's website at 
https://www.theocc.com/Company-Information/Documents-and-Archives/By-Laws-and-Rules.
    All comments received will be posted without change. Persons 
submitting comments are cautioned that we do not redact or edit 
personal identifying information from comment submissions. You should 
submit only information that you wish to make available publicly.
    All submissions should refer to File Number SR-OCC-2023-003 and 
should be submitted on or before April 26, 2023.

    For the Commission, by the Division of Trading and Markets, 
pursuant to delegated authority.\20\
---------------------------------------------------------------------------

    \20\ 17 CFR 200.30-3(a)(12).
---------------------------------------------------------------------------

Sherry R. Haywood,
Assistant Secretary.
[FR Doc. 2023-07004 Filed 4-4-23; 8:45 am]
BILLING CODE 8011-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.