Cyber Risk Management, 85825-85833 [2023-27102]

Download as PDF Federal Register / Vol. 88, No. 236 / Monday, December 11, 2023 / Rules and Regulations additional guidance related to concrete properties and damping values for use in the development of in structure response spectra. It also includes guidance on damping for steel plate composite walls. In addition, it updates the guidance for piping damping in RG 1.61, Revision 1. 12 CFR Part 609 II. Background RIN 3052–AD53 The regulations at 12 CFR part 609 were enacted in 2002 and repeated the statutory requirements of E–SIGN. Our existing information-technology (IT)related regulations primarily focus on Ecommerce terminology and the concept of conducting business in an Ecommerce environment. Since then, there have been significant changes and advancements in IT and the System’s use of technology to conduct business. We are responsible, as the System’s regulator, to ensure the System’s use of IT is consistent with safe and sound operations and complies with the law. We amend the current E-commerce regulations at part 609 to revise the rules for a broader cyber risk focus and to codify our existing expectations on risk management practices, corporate governance, and internal control systems for conducting business in an electronic environment. The final regulations set forth core principles that serve as the foundation for creating a comprehensive cyber risk management program and framework. Key definitions include: 1 • Information security refers to the policies, procedures, and technologies used to protect information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. • Cyber security is the process of protecting information assets and data by preventing, detecting, and responding to cyber attacks. • Cyber risk is any risk associated with financial loss, disruption, or damage to the reputation of an organization due to the failure or unauthorized or erroneous use of its information systems. A System institution’s policies, procedures, and internal controls that manage cyber risk must incorporate information security and cyber security concepts and sound business practices. Dated: December 5, 2023. For the Nuclear Regulatory Commission. Stephen M. Wyman, Acting Chief, Regulatory Guide and Programs Management Branch, Division of Engineering, Office of Nuclear Regulatory Research. [FR Doc. 2023–27070 Filed 12–8–23; 8:45 am] The NRC published a notice of the availability of DG–1364 in the Federal Register on June 13, 2023 (88 FR 38408) for a 30-day public comment period. The public comment period closed on July 13, 2023. Public comments on DG– 1364 and the staff responses to the public comments are available under ADAMS under Accession No. ML23284A274. As noted in the Federal Register on December 9, 2022 (87 FR 75671), this document is being published in the ‘‘Rules’’ section of the Federal Register to comply with publication requirements under 1 CFR chapter I. BILLING CODE 7590–01–P This RG is a rule as defined in the Congressional Review Act (5 U.S.C. 801–808). However, the Office of Management and Budget has not found it to be a major rule as defined in the Congressional Review Act. IV. Backfitting, Forward Fitting, and Issue Finality Issuance of RG 1.61 would not constitute backfitting as that term is defined in section 50.109 of title 10 of the Code of Federal Regulations (10 CFR), ‘‘Backfitting,’’ and as described in NRC Management Directive (MD) 8.4, ‘‘Management of Backfitting, Forward Fitting, Issue Finality, and Information Requests (ADAMS Accession No. ML18093B087);’’ constitute forward fitting as that term is defined and described in MD 8.4; or affect issue finality of an approval issued under 10 CFR part 52, ‘‘Licenses, Certifications, and Approvals for Nuclear Power Plants,’’ as explained in RG 1.61, licensees would not be required to comply with the positions set forth in RG 1.61. V. Submitting Suggestions for Improvement of Regulatory Guides lotter on DSK11XQN23PROD with RULES1 FARM CREDIT ADMINISTRATION • Revise part 609 to codify our existing expectations, as well as ensure the relevance and adequacy of risk management practices, corporate governance, and internal control systems at System institutions conducting business in an electronic environment. • Require each System institution to develop and implement a comprehensive, written cyber risk management program consistent with the size, risk profile, and complexity of the institution’s operations. enhancements to the ‘‘Regulatory Guide’’ series. II. Additional Information III. Congressional Review Act A member of the public may, at any time, submit suggestions to the NRC for improvement of existing RGs or for the development of new RGs. Suggestions can be submitted on the NRC’s public website at https://www.nrc.gov/readingrm/doc-collections/reg-guides/ contactus.html. Suggestions will be considered in future updates and VerDate Sep<11>2014 15:57 Dec 08, 2023 Jkt 262001 85825 Cyber Risk Management Farm Credit Administration. Final rule. AGENCY: ACTION: The Farm Credit Administration (FCA, we, or our) rescinds and revises its regulations to reflect developments in cyber risk and continuously evolving business practices. We rename the regulations ‘‘Cyber Risk Management.’’ The final rule requires each Farm Credit System (System or FCS) institution to implement a comprehensive, written cyber risk management program consistent with the size, risk profile, and complexity of the institution’s operations. SUMMARY: This regulation is effective January 1, 2025. DATES: FOR FURTHER INFORMATION CONTACT: Technical information: Dr. Ira D. Marshall, Senior Policy Analyst, Office of Regulatory Policy, Farm Credit Administration, McLean, VA 22102– 5090, (703) 883–4414, TTY (703) 883– 4056; or Legal information: Jane Virga, Assistant General Counsel, Office of General Counsel, Farm Credit Administration, McLean, VA 22102– 5090, (703) 883–4020, TTY (703) 883– 4056. SUPPLEMENTARY INFORMATION: I. Objectives The objectives of this final rule are to: • Delete references to the requirements of ‘‘Electronic Signatures in Global and National Commerce Act’’ (E–SIGN) (Pub. L. 106–229), which became effective on October 1, 2000. E– SIGN is a statutory requirement that governs electronic transactions relating to the conduct of electronic business, consumer, or commercial affairs. E– SIGN continues to apply to System institutions as statutory requirements. PO 00000 Frm 00007 Fmt 4700 Sfmt 4700 1 FFIEC IT Examination Handbook InfoBase— Glossary, https://www.ithandbook.ffiec.gov/ glossary. E:\FR\FM\11DER1.SGM 11DER1 85826 Federal Register / Vol. 88, No. 236 / Monday, December 11, 2023 / Rules and Regulations Appropriate governance and controls over cyber risk can help guide future decision-making about how to mitigate risk while focusing on an institution’s strategic goals and objectives. These cyber risk management regulations allow System institutions to innovate. We recognize that innovation in the System may create different opportunities, challenges, and risks for different institutions. Accordingly, we considered the needs and constraints of all institutions, regardless of size, risk profile, or complexity. We understand cyber risk management programs will vary and there is no one-size-fits-all approach; however, these cyber risk management regulations provide the flexibility for System institutions to innovate based on the institution’s unique needs and operations. System institutions can mitigate challenges and risks through good governance and effective risk management. Strong governance principles and appropriate risk management practices, implemented through sound internal controls, can safeguard against a variety of risks, including those stemming from adopting new technology. However, an institution should never sacrifice safety and soundness for innovation. These cyber risk management regulations encourage System institutions to implement and develop effective and sound cyber risk management program solutions. We continually communicate these expectations to System institutions in our role as examiner of the System. This rule also considers the role our examinations play in ensuring safe and sound operations of the System. lotter on DSK11XQN23PROD with RULES1 III. Comments and Our Responses We received 26 comment letters, all of which came from System institutions or persons affiliated with the System, except one that came from the Independent Community Bankers of America (ICBA). Of the comment letters received, one came from the Farm Credit Council (Council), acting on behalf of its membership. Each of the four Farm Credit banks submitted a letter, as did the Federal Agricultural Mortgage Corporation (Farmer Mac). Many comment letters from System associations expressed support for the Council’s letter, with several raising specific issues. The following is a description of the issues raised and our responses. VerDate Sep<11>2014 15:57 Dec 08, 2023 Jkt 262001 A. General Comments Principles-Based Approach Most of the commenters stated that the proposed rule does not align with a principles-based approach to rulemaking. As discussed below, we disagree. As an initial matter, we considered that System institutions vary dramatically in terms of size, risk profile, and complexity of business model. Accordingly, during the rulemaking process, we focus on the right blend of principles and specific requirements to achieve a safe and sound System. Principles-based regulations set forth broad objectives and goals for which System institutions should strive. Thus, this rule does not address every circumstance. The rule attempts to balance an institution’s need to develop a cyber risk management program against our mission to promote and protect the safety and soundness of each institution and the System, as a whole. The rule provides flexibility, where appropriate, and establishes minimum standards, where needed. Thus, the rule provides System institutions with parameters and our expectations for the System to establish, among other things, internal controls consistent with a principles-based rule. The regulation provides flexibility for both the FCA and the System to adapt to market developments and evolving technology. We believe we have achieved the correct regulatory balance. While commenting on this principlesbased approach, one institution asked us to minimize examination inconsistency by recognizing and clarifying the appropriate role of management and the board of directors in selecting the appropriate cyber security approach from among the many that may satisfy the overarching principles of the rule. An institution has the flexibility to determine its risk profile and identify appropriate cyber risk management practices. The institution should document its analysis to provide examiners with an opportunity to assess its choices. This approach acknowledges that there is more than one way to comply with the regulation. We will take a riskbased approach, and not a one-size-fitsall approach, in our examination of each System institution. Ambiguous, Unclear, or Unfeasible Several institutions commented that portions of the proposed regulation are unclear or unfeasible. In response, we reviewed the proposed regulation in its entirety to ensure it is written in accordance with plain language PO 00000 Frm 00008 Fmt 4700 Sfmt 4700 principles and to clarify any potentially confusing language. The rule requires System institutions to develop a program consistent with the size, risk profile, and complexity of the institution’s operations. This provides flexibility, consistent with a principles-based approach, to allow each System institution to customize its cyber security program for its particular risk environment. However, to address commenters’ concerns, we are adding the term ‘‘risk profile,’’ as appropriate throughout the preamble and regulation, to clarify that an institution’s program must be based on size, complexity, and risk. Adding the term ‘‘risk profile’’ will allow each System institution to customize its cyber risk management program for its unique risk environment. User Experience One commenter stated that perfect security is neither possible nor desirable, and there is often a fundamental tradeoff between security and convenience (or user experience). The commenter further stated that while clients appropriately value the security of their information, they are often willing to accept some security risk in exchange for a better user experience. Although convenience and user experience could compromise security, we believe a risk assessment, including a determination to mitigate or accept certain risks, is critical to an institution’s cyber risk management program. Thus, an institution must document why it accepts, transfers, or mitigates the risk. The board has a fiduciary responsibility to ensure a safe and sound operating environment. If the board chooses to accept a risk for convenience or customer experience, the board’s approval must be documented. Leveraging Modern Frameworks Several commenters suggested the proposed regulation should leverage standard frameworks based on industry standards (e.g., Federal Financial Institutions Examination Council (FFIEC) or National Institute of Standards and Technology (NIST)), which would allow the regulation to remain relevant for rapidly changing technologies. We agree. As this is a principles-based regulation, in part, linking to standard frameworks will encourage innovation, implementation, and compliance. Referencing industry standards promotes conformity with the cyber risk management rule as institutions innovate and apply rapidly evolving technology and attendant controls. E:\FR\FM\11DER1.SGM 11DER1 lotter on DSK11XQN23PROD with RULES1 Federal Register / Vol. 88, No. 236 / Monday, December 11, 2023 / Rules and Regulations We also direct System institutions to the June 27, 2017, Informational Memorandum (IM) on ‘‘Reporting Security Incidents and Business Continuity Events to FCA.’’ This guidance will assist System institutions to identify and define an incident under 12 CFR 609.930(c)(3)(i) and help determine reporting requirements. The Office of Examination periodically releases informational memoranda to update the System on expectations. We anticipate the continued issuance of such guidance documents in the future, despite the publication of this rule. sound manner. In drafting this regulation, we reviewed the cyber security regulations of the federal financial regulatory agencies and included some of the elements of those regulations. We believe the review process was comprehensive and have been unable to identify any other provisions we should include. Nevertheless, we refer System institutions to the FFIEC IT Handbook 4 and NIST 5 for additional guidance and as examples of industry standards. Requests To Define Key Terms Several commenters requested that we define key terms, such as ‘‘effective,’’ ‘‘ensure,’’ or ‘‘appropriate.’’ However, as this is a principles-based rule, we will not define such terms here. FCA and the institutions it regulates must interpret these terms considering the institution’s unique circumstances. What may be ‘‘effective’’ or ‘‘appropriate’’ at one institution or at one time may not be ‘‘effective’’ or ‘‘appropriate’’ at another institution with a different risk profile, where there is a different size or complexity, or at a different time. FCA’s decision to not define the terms allows an institution to determine what is effective or appropriate at its institution. During the supervisory and examination process, we will apply the regulatory requirements based on the institution’s current circumstances, which is consistent with a principles-based rule. Moreover, these terms currently are used without definition throughout our regulations, and we do not believe it appropriate to define the terms in this regulation. FCS institutions may want to refer to the NIST Computer Security Resource Center’s Glossary 2 and FFIEC IT Examination Handbook InfoBase— Glossary 3 as additional resources in defining terms. For further guidance, please refer to our IM dated June 27, 2017, entitled, ‘‘Reporting Security Incidents and Business Continuity Events to FCA,’’ for terms like ‘‘Security Event’’ and ‘‘Security Incident.’’ Two System institutions stated that the proposed rule should be pulled back, reworked, and reproposed in the future to allow for additional comments. We disagree. FCA has not updated our technology regulations in years. We believe this updated regulation will help institutions strengthen their cyber security and cyber risk management practices. We provide, through this principles-based rule, flexibility for institutions to develop cyber risk management programs based on institution size, risk profile, and complexity. Conformity With Other Federal Financial Regulators The ICBA recommends that we harmonize the proposed regulation and guidance with that of the other federal financial regulatory agencies to ensure System institutions operate in a safe and 2 Glossary |√ CSRC, https://www.csrc.nist.gov/ glossary. 3 FFIEC IT Examination Handbook InfoBase— Glossary, https://www.ithandbook.ffiec.gov/ glossary. VerDate Sep<11>2014 15:57 Dec 08, 2023 Jkt 262001 Reproposing the Proposed Rule 85827 Examination Approach Several commenters asked how FCA examiners would examine cyber risk management programs at System institutions of different sizes and complexities. Commenters were also concerned the rule does not have specific definitions and thresholds that may lead to inconsistencies in examinations. Examiners will review cyber risk management programs much like other internal controls programs. There is no one-size-fits-all approach. We know cyber risk management plans will differ based on an institution’s size, complexity, and risk profile. The rule outlines items institutions must consider, such as a written cyber risk management program, documented incident response plan, and documented risk assessments, which examiners may review as part of the examination process. We will provide consistency and clarity in our supervision and regulation of the System as it pertains to, among other things, cyber risk management. B. Comments on Specific Provisions Regulatory Burden Mitigating Vulnerabilities (§ 609.905) One commenter suggested the proposed rule is excessively burdensome and inconsistent with modern industry accepted and dynamic cyber security program standards that System institutions already implemented as part of their cyber security programs. The commenter further stated that the proposed rule would adversely impact the ability and capability of System institutions to establish effective and relevant cyber security programs. Additionally, the commenter said the language was prescriptive and vague. The commenter stated that we should defer to industry standards and not attempt to create competing, duplicative, and nonconforming regulatory requirements. We agree, in part, and FCA intends through this rulemaking to leverage standard frameworks based on industry standards, such as FFIEC and NIST, as discussed herein. However, consistent with principles-based rulemaking, we reiterate that an institution must develop a program consistent with the size, risk profile, and complexity of the institution’s operations. An institution should customize and document the cyber risk management program for its risk environment. Several commenters recommended that we allow each System institution to define the term ‘‘vulnerability’’ in proposed § 609.905 based on a modern framework and remove the requirement that ‘‘any’’ vulnerability must be remediated. They asserted that System institutions should be allowed to rank and prioritize vulnerabilities based on their defined risk-based program, including allowing known unmitigated vulnerabilities to be assessed and addressed based on that risk assessment. There was also a comment that human capital presents the greatest risk or vulnerability to an institution. We do not agree that the regulation should include the suggested terminology ‘‘based on a modern framework.’’ We believe the commenter’s suggested language of ‘‘based on a modern framework’’ is vague and could be misinterpreted to allow a System institution to use any modern framework, which could lead to further inconsistencies among System institutions. However, we do agree that an institution should rank and prioritize vulnerabilities based on its cyber risk management program and cyber risk assessment. The vulnerability management program should be commensurate with the size, risk profile, and complexity of the institution and based on sound industry standards and practices. 4 FFIEC IT Handbook, https://www.ithandbook. ffiec.gov. 5 Cybersecurity | NIST, https://www.nist.gov/ cybersecurity. PO 00000 Frm 00009 Fmt 4700 Sfmt 4700 E:\FR\FM\11DER1.SGM 11DER1 85828 Federal Register / Vol. 88, No. 236 / Monday, December 11, 2023 / Rules and Regulations lotter on DSK11XQN23PROD with RULES1 A System institution board should identify and document the institution’s appetite for risk. Then, the board, with management, should assess the institution’s vulnerabilities. Although an institution cannot mitigate every vulnerability, each System institution’s board must assess the risk of a vulnerability, decide whether the vulnerability exposes the institution to any undue risk, and document its analysis and conclusions. In some cases, a System institution may assess and identify its risk appetite and accept the risk, which should be documented to allow FCA to examine for safety and soundness, as well as compliance with law. Mitigating vulnerabilities involves taking steps to implement internal controls that reduce risk. Remediation is the act of removing or eradicating a vulnerability from an IT system. Mitigation, on the other hand, is creating strategies to minimize the potential threat of a vulnerability when it cannot be eliminated immediately. Some vulnerabilities are more difficult to remediate and may require some time to address. An institution could refer to the FFIEC IT Handbook or NIST Cybersecurity Framework for guidance on how to identify, document, and address a vulnerability within its risk profile. Privacy and Compliance (§ 609.930(a)) Several commenters disagreed with the second sentence in proposed § 609.930(a), which provided as follows: ‘‘The program must ensure the security and confidentiality of current, former, and potential customer and employee information, protect against reasonably anticipated cyber threats or hazards to the security or integrity of such information, and protect against unauthorized access to or use of such information.’’ The commenters were concerned that the phrase ‘‘must ensure’’ created an unattainable standard as to the security and confidentiality of information, as any information loss, no matter how insignificant, would appear to violate the rule as drafted. The commenters suggested that we revise this language so the program ‘‘must be designed to protect’’ or ‘‘manage the risk’’ of protecting the security and confidentiality of information. We strongly believe there must be controls in place to protect the security and confidentiality of information. Thus, we revise the second sentence of Section 609.930(a) as follows: ‘‘The program must ensure controls exist to protect the security and confidentiality VerDate Sep<11>2014 15:57 Dec 08, 2023 Jkt 262001 of current, former, and potential customer and employee information, protect against reasonably anticipated cyber threats or hazards to the security or integrity of such information, and protect against unauthorized access to or use of such information.’’ The revision to the second sentence of Section 609.930(a) addresses the commenters’ concerns and will ensure that an institution has strong controls in place to protect the security and confidentiality of information. Size and Complexity (§ 609.930(a)) We received numerous comments suggesting that we clarify expectations related to ‘‘size and complexity’’ in proposed § 609.930(a). There was a concern that a lack of guidance on ‘‘size and complexity’’ will lead to inconsistent expectations of examiners and place additional regulatory burden on smaller institutions. It was also suggested that we acknowledge the role of IT service providers to avoid examination inconsistencies and to reference ‘‘a modern risk management framework.’’ Section 609.930(a) requires, in part, each institution to implement a comprehensive, written cyber risk management program consistent with the size, risk profile, and complexity of the institution’s operations. Consistent with our intent for a principles-based rulemaking, we do not define ‘‘size and complexity.’’ However, to provide clarity, we include ‘‘risk profile’’ and change the phrase to ‘‘size, risk profile, and complexity.’’ We do not believe it appropriate to reference ‘‘a modern risk management framework.’’ An institution must assess its risk profile. The regulation requires a cyber risk management program to be consistent with size, risk profile, and complexity of an institution. A smaller institution may not be required to assess as many risks as or the same types of risks as a larger institution. However, depending on an institution’s complexity, size, and risk profile, it is possible for a smaller institution to have a similar cyber risk management plan range as compared to a larger institution. Each institution should document its risk-based approach to establishing a cyber risk management plan and scope. As noted above, to add clarity in response to the size and complexity concerns, we revise the first sentence in this section to insert the phrase ‘‘risk profile’’ to help align the regulation with the requirement of providing strong controls commensurate with an institution’s size and complexity. PO 00000 Frm 00010 Fmt 4700 Sfmt 4700 Role of Board and Management (§ 609.930(b)) One commenter stated that although the heading of proposed § 609.930(b) refers to the role of management, the text of this section does not appear to contemplate a defined role for management. The commenter further stated that although management has a significant role in managing cyber risk, the rule assigns many responsibilities to an institution’s board of directors, with management providing the services. We believe that a board of directors must provide appropriate oversight of management to develop, implement, and maintain a cyber risk management program consistent with the board’s fiduciary duties and oversight obligations. This section provides that the board must decide who will do what without FCA specifying or telling them what to do step-by-step. We do not want to create a prescriptive rule. For clarity, we modified the language of this section to remove ‘‘and management’’ from the heading. This should clarify that the institution board has oversight responsibility but may delegate day-to-day tasks to management and other employees, as appropriate. Timely Remediation (§ 609.930(c)(2)) Proposed § 609.930(c)(2) requires institutions to ‘‘perform timely remediation.’’ Several commenters stated the regulation does not define the term ‘‘timely,’’ which could lead to inconsistencies and misaligned expectations between examiners and institutions. One commenter recommended we define ‘‘timely’’ by directing System institutions to leverage modern frameworks based on industry standards, customized for its institution’s risk environment, and aligned with its documented risk-based approach. This is a principles-based rule. Institutions have an opportunity to be innovative and develop their own metrics and identify material matters relevant and specific to their institutions. Metrics will vary from System institution to System institution depending on risks, threats, and cyber risk management program. As to defining ‘‘timely,’’ we understand the commenters’ concerns. However, remediation evaluation should begin immediately after the vulnerability has been identified. The word ‘‘timely’’ is intended to provide institutions some flexibility. A minor vulnerability, depending on the circumstances presented, may not need to be addressed immediately, but a E:\FR\FM\11DER1.SGM 11DER1 Federal Register / Vol. 88, No. 236 / Monday, December 11, 2023 / Rules and Regulations major vulnerability must be addressed immediately. Thus, we finalize this section as proposed. lotter on DSK11XQN23PROD with RULES1 Incident Response Planning (§ 609.930(c)(3)) One institution stated that ‘‘incident response planning’’ as required by proposed § 609.930(c)(3) varies greatly by institution and by incident. The technologies used and available expertise also vary greatly. The commenter stated that broad-based incident responses provide the flexibility needed to adapt to constantly changing technology and threats to technology. The commenter added that requiring specific incident plan responses to individual potential threats is both time consuming and ultimately not satisfactory, especially for new threats that may not be envisioned when the plan is created. The commenter recommended that the final rule be revised to allow institutions more flexibility in defining incident response planning. We believe that proposed § 609.930(c)(3) included the necessary components and flexibility for an incident response plan. An institution should view an incident response plan as the steps that should be taken when a security incident occurs. Procedures do not need to be specific to any one type of event and can be written to ensure the right people are involved in the incident response and the process remains consistent. Further, we believe incident response plans will likely need to change over time in response to new threats. Thus, we revise this section to include language that the documented cyber risk management program, risk assessments, and incident response plans should be reviewed and updated periodically, but at least annually, to address new threats, concerns, and evolving technology. This is consistent with existing FFIEC, NIST, and FCA guidance. Detailed Procedures for Security Events (§§ 609.930(c)(3)(i) Through (iii)) Proposed §§ 609.930(c)(3)(i) through (iii) require each institution to document its procedures on forensics, containment, and business resumption. Several commenters stated that the requirements in proposed §§ 609.930(c)(3)(i) through (iii) are not feasible because of the lengthy and numerous ways System institutions identify and contain security events, and later, resume business. The commenters recommended that we revise this section to focus less on specific procedures, and more on an VerDate Sep<11>2014 15:57 Dec 08, 2023 Jkt 262001 adaptable and scalable framework to assess the nature and scope of an incident, contain the incident, and how to safely resume business activities. Some commenters stated that an institution should act in accordance with state and federal law. We disagree with the commenters’ statements. A System institution must document its procedures for, among other things, ensuring each employee follows the same protocol for forensics, containment, and business resumption. Also, documentation will assist with staff continuity within the institution and can serve as a training tool for institution employees. Furthermore, FCA examiners must be able to examine for compliance. Compliance with only state and federal laws is not appropriate because it does not assess an institution’s size, complexity, and risk profile. We will finalize this section as proposed. Board Notice of a Cyber Incident (§ 609.930(c)(3)(iv)) One commenter recommended that we modify proposed § 609.930(c)(3)(iv) to permit each institution’s board of directors to determine when it should be notified by management of a cyber incident, consistent with the board notification protocols in the institution’s approved incident response plan. The commenter suggested revising the proposal to include an incident escalation matrix that would provide the board and management with a clear and specific action plan in the event of a cyber incident and identify when an incident should be brought to the attention of the board and/or other stakeholders (e.g., regulators and law enforcement). Proposed § 609.930(c)(3)(iv) requires board notice when there is a cyber incident involving unauthorized access to or use of sensitive or confidential customer or employee information. We believe this section already includes an escalation concept, in that it applies only to sensitive or confidential information. The section does not apply to all information. We believe that when there has been a cyber incident involving sensitive or confidential information, the board must be notified. The board should not be caught off guard when it comes to hearing about cyber incidents. After further consideration, we now also include a clause that requires notification when there is ‘‘unauthorized access to financial institution information, including proprietary information.’’ Financial institution information must also be PO 00000 Frm 00011 Fmt 4700 Sfmt 4700 85829 protected. An institution must guard its institution’s reputation in every instance. Reporting an Incident (§ 609.930(c)(3)(v)) Proposed § 609.930(c)(3)(v) requires an institution to notify FCA as soon as possible, or no later than 36 hours after an institution determines a cyber security incident occurs. A few commenters stated that incidents can occur in an environment without discovery for longer than 36 hours. Additionally, one commenter stated that 36 hours will not allow an institution sufficient time to review evidence and determine whether a reportable incident has occurred. The commenter recommended extending the deadline to 72 hours. Another commenter suggested extending the reporting requirement to four business days after the date of a materiality determination, rather than the date of discovery. The proposed rule requires ‘‘notifying FCA as soon as possible or no later than 36 hours after the institution determines that an incident has occurred.’’ We believe it reasonable that an institution be required to notify its regulator as soon as possible and no later than 36 hours after it identifies such an incident. We do not believe that a materiality standard should be introduced. Notification does not require a detailed report with findings and recommendations. Notification provides us with timely information on a cyber security incident. This is consistent with the other federal financial regulatory agencies’ requirement promulgated in a joint regulation that a banking organization notify its primary federal regulator of any significant security incident as soon as possible and no later than 36 hours after it has been determined that a cyber incident has occurred.6 Thus, we believe the notification requirements of this section are reasonable and remain unchanged. Former, Current, or Potential Customers (§ 609.930(c)(3)(vi)) Some commenters recommended proposed § 609.930(c)(3)(vi) be amended and revised to provide notice to customers, employees, and website visitors in accordance with state and federal laws. Another commenter was concerned that there was no definition of ‘‘customer,’’ especially as it relates to potential customers exploring available loan products online. Another 6 See. Computer-Security Incident Notification Requirements for Banking Organizations and Their Bank Service Providers, 86 FR. 66,424 (November 23, 2021). E:\FR\FM\11DER1.SGM 11DER1 85830 Federal Register / Vol. 88, No. 236 / Monday, December 11, 2023 / Rules and Regulations commenter was concerned the section was overly broad and vague. Another commenter recommended deleting this phrase in its entirety. This section requires institutions to notify former, current, or potential customers and employees, and known visitors to an institution’s website, of an incident, when warranted, and in accordance with state and federal laws. For example, notification would be required when sensitive or confidential information has been compromised. The section does not define ‘‘known visitor’’ or ‘‘potential customer.’’ Overall, the commenters are concerned System institutions will interpret these terms differently. We do not believe we should change this section as the requirements are consistent with a principles-based rule. Each System institution will determine and document what these terms mean. Providing notice, when warranted, provides flexibility to institutions. Nevertheless, all confidential information related to ‘‘former, current, or potential customers and employees and known visitors to a website’’ must be protected. System institutions may not allow others to inappropriately view or access this information without proper authorization. Our regulations at part 618 support this conclusion. lotter on DSK11XQN23PROD with RULES1 Training (§ 609.930(c)(4)) Proposed § 609.930(c)(4) requires institutions to ‘‘describe the plan to train employees, vendors, contractors, and the institution board to implement the institution’s cyber risk program.’’ Several commenters argued that the requirement to train contractors and vendors is impractical and that many contractors and vendors will simply refuse to submit to institution-specific training based on their own business requirements. As a principles-based rule, this section requires an institution to describe its plan to train employees, vendors, and contractors. However, we do not prescribe a particular plan. If an institution does not provide training, the institution must describe its plan and state why and what actions it is taking to mitigate the risk of not having institution-provided training. We require such documentation to enable FCA examiners to review the training plan. As to vendors, System institutions should be able to confirm, either contractually or otherwise, that vendors have some acceptable level of training, as well as understand sound cyber risk management practices and protocols. We acknowledge that it is unrealistic for VerDate Sep<11>2014 15:57 Dec 08, 2023 Jkt 262001 an institution to train all contractors and vendors. We finalize this section as proposed. Third-Party Vendors (§ 609.930(c)(5)) Several institutions commented generally that they did not own or manage any IT systems that they currently use. They stated that these IT systems may be owned by third-party vendors, technology service providers, or by another System institution, such as a Farm Credit Bank that provides services like a third-party service provider. As to specific comments, one commenter asked that the term ‘‘vendor’’ be clarified. Another commenter stated that proposed § 609.930(c)(5)(i) is impractical as it requires an institution to require its vendors, by contract, to implement appropriate due diligence in selecting vendors. The commenter provided an example of its inability to comply with proposed § 609.930(c)(5)(i) when a vendor may refuse to negotiate its standard terms and conditions, due to its size and bargaining position. We also received a comment on proposed § 609.930(c)(5)(iii) (now § 609.930(c)(5)(iv)) concerning institutions monitoring and reviewing vendor audits or summaries of test results. The commenter stated that some vendors will not provide these audits or test results. The commenter stated that requiring institutions to negotiate the right to an audit with every vendor will greatly hinder an institution’s choice of vendors. Moreover, for many vendors, this is not practical. The commenter added that it is not necessary for an institution to review audits or summaries of test results for a vendor contracted to provide catering or lawn maintenance services, or other non-IT contracts. Another commenter suggested a risk-based approach. A ‘‘vendor’’ is a third party and includes third-party service providers or a System institution providing services to another System institution. A System institution should assess the risk of using a vendor, i.e., complete a vendor risk assessment.7 Completing a vendor risk assessment helps an institution understand risks when using vendor 7 A vendor risk assessment is the process of identifying and evaluating potential risks or hazards associated with a vendor’s operations and products and its potential impact on your organization. When an institution performs a third-party vendor risk assessment, it determines the most likely effects of uncertain events, and then identifies, measures, and prioritizes them. Potential risks include the accuracy and reliability of operational, customer, and financial information; security breaches; operation effectiveness; and legal and regulatory compliance. PO 00000 Frm 00012 Fmt 4700 Sfmt 4700 products or services. An institution cannot delegate its due diligence responsibilities. Conducting a risk assessment is particularly important when a vendor handles a critical business function, accesses sensitive customer data, and/or interacts with customers. An institution must have controls to ensure that the vendor, even if it is another System institution, has appropriate security in place for IT systems. Whether a vendor is a System service provider or external service provider, an institution should never put its trust in any IT service provider without doing its own due diligence. An institution has a responsibility to its customers and shareholders. Accordingly, each association must be aware of the risks, even if it outsources its IT services. We will hold the institution accountable for ensuring it has appropriate controls to ensure the continued safety and soundness of the institution. An institution must know its own complexity, including the role of technology service providers. Although services may be outsourced, an institution cannot delegate or shift the requirement for due diligence or accountability from the institution’s board and management to service providers. Institutions are required to ensure service providers/vendors are providing adequate and effective services. Nevertheless, we agree that negotiating the right to audit need not apply to every vendor. Accordingly, to address these concerns we added a new paragraph (iii), requiring institutions to conduct a vendor risk assessment on all vendors. An institution will be able to assess the level of detail needed for their vendor risk assessment. For example, a vendor risk assessment of a catering vendor may need a statement indicating very little risk because of the nature of the service and type of information provided to the vendor. A vendor risk assessment for IT services would require an institution evaluate cyber risk as part of its vendor management process. A vendor risk assessment helps an institution understand the risks that exist when it uses vendors’ products or services. Conducting a vendor risk assessment is particularly important when a vendor handles a critical business function, accesses sensitive customer data, or interacts with customers. An institution must document the vendor risk assessment and may address whether a large vendor already has appropriate security measures. This way, an institution can determine if it E:\FR\FM\11DER1.SGM 11DER1 Federal Register / Vol. 88, No. 236 / Monday, December 11, 2023 / Rules and Regulations will accept, mitigate, transfer, or avoid the risk. It is possible that a vendor risk assessment could address the reputation of a vendor and conclude that there is a low risk. Just because a smaller or less complex institution may rely on its funding bank for technology services does not mean that institution would not be required to have a cyber risk management program. If a cyber event occurred at a small or less complex institution that relies on the bank for services, we would still expect the institution to work with the bank to follow a cyber security framework (e.g., identify, protect, detect, respond, and recover). Additionally, to be more consistent with a principles-based approach, we revise proposed § 609.930(c)(4)(iii) (now § 609.930(c)(4)(iv)) to identify what an institution may monitor, rather than prescribing what an institution must monitor. This would provide an option for the institution to receive some type of report, audit, or summary. The institution must exercise appropriate due diligence in selecting any vendor. Any such assessment must include appropriate documentation for examiner review. lotter on DSK11XQN23PROD with RULES1 Internal Controls Frequency (§ 609.930(c)(6)(i)) A few commenters stated that proposed § 609.930(c)(6)(i), which requires an institution to determine the frequency and nature of internal controls testing, provides no substantive guidance on the frequency and nature of internal controls testing. No recommendation was provided. As this is a principles-based rule, we provide institutions the autonomy to decide the frequency and nature of their internal control tests. Based on the risk assessment, each institution should decide the frequency and nature of internal control tests. If we were to mandate every element, this rule would no longer be principles-based, as appropriate, but a prescriptive rule. The type and amount of risk an institution faces should determine the nature and frequency of testing. An institution may want to consult the FFIEC IT Handbook, NIST, and FCA guidance documents. We finalize this section as proposed. Independent Third-Party Testing (§ 609.930(c)(6)(ii)) A commenter stated that proposed § 609.930(c)(6)(ii) requires an independent party to perform testing but does not address the size and complexity of the institutions when performing testing. The commenter asserted that, to minimize examination inconsistencies, the rule should address VerDate Sep<11>2014 15:57 Dec 08, 2023 Jkt 262001 the unique service provider relationship and structure between some System entities. We disagree. The regulation provides that an independent party can include institution staff who are independent of the cyber risk management program. This will allow an institution, regardless of size, risk profile, or complexity, to conduct its own testing and due diligence, which the institution should document. Institution documentation will promote consistency in the examination process. Reasonable Assurances and Material Deficiencies (§ 609.930(c)(6)(iii)) Several commenters stated that there is no indication how to measure the term ‘‘material.’’ One commenter added that ‘‘reasonable assurances’’ seem to refer to an auditor’s degree of satisfaction that the evidence obtained during the audit supports the assertions in the financial statements. The commenter added ‘‘reasonable assurances’’ do not include ‘‘remediation’’ in the definition, as a situation with material deficiencies (situations requiring remediation) would not allow an auditor to arrive at a level of reasonable assurances. The commenter suggested separating this section into a testing element and a remediation element. The commenter stated that a testing element related to ‘‘reasonable assurances’’ would assess the cyber capabilities of the organization to detect and prevent cyber incidents of a material nature, while a remediation element related to incident responses would assess the effectiveness of timely remediation of cyber incidents that have a material impact on the entity. Proposed § 609.930(c)(6)(iii) indicates that ‘‘internal systems and controls must provide reasonable assurances that System institutions will prevent, detect, and remediate material deficiencies on a timely basis.’’ ‘‘Material’’ in this context means to exclude small or de minimis deficiencies. Thus, System institutions may interpret ‘‘material’’ to mean anything that could potentially impact the safety and soundness of an institution or the accuracy of financial reporting. Internal controls should provide reasonable assurances that information and IT is reliable, accurate, and timely. Internal controls are intended to prevent errors and irregularities, identify problems, and ensure corrective action. Internal controls can be expected to provide only reasonable, not absolute, assurances to an institution’s management and board. PO 00000 Frm 00013 Fmt 4700 Sfmt 4700 85831 We continue to believe internal controls must provide reasonable assurances to prevent, detect, and remediate material deficiencies. We do not believe any change to the proposal is necessary. The regulation, as proposed, is clear on the need for adequate internal controls. Privacy Framework (§ 609.930(d)) With respect to proposed § 609.930(d), commenters were concerned that this section does not provide expectations on the privacy framework, or other legal or compliance requirements. This section requires, in part, that an institution ‘‘consider privacy and other legal compliance issues.’’ We have decided not to specify a uniform privacy framework. Privacy frameworks can vary from state-to-state and from institution-to-institution. System institutions may consult the privacy framework established by NIST at https://www.nist.gov/privacyframework/privacy-framework. We finalize this section as proposed. Reporting to the Board (§ 609.930(e)) As proposed, § 609.930(e) requires an institution to ‘‘report quarterly to its board or an appropriate committee.’’ One commenter suggested that quarterly reporting may not be the correct frequency to report to an institution’s Board. We concur with the suggestion that quarterly reporting may not be the correct reporting frequency. We revise this section to provide, ‘‘[a]t a minimum, each institution must report quarterly to its board or an appropriate committee of the board.’’ This will ensure that there is at least quarterly reporting to the board. Depending on the risk or information that must be communicated to the board, the frequency of reporting may need to increase, and conversely, a quarterly report to the board may be brief, as appropriate and in accordance with the institution’s situation. The institution should have appropriate documentation to support the frequency of board reporting. Cyber Risk Management Metrics (§ 609.930(e)) Section 609.930(e), as proposed, requires the report to the board to ‘‘contain material matters and metrics related to the institution’s cyber risk management program, including specific risks and threats.’’ One commenter was concerned that the section does not provide a framework or expectation for the metrics presented to the board, or consider institutions E:\FR\FM\11DER1.SGM 11DER1 85832 Federal Register / Vol. 88, No. 236 / Monday, December 11, 2023 / Rules and Regulations providing cyber metrics through another avenue, such as an entity-wide risk management report. The commenter believed that their concerns could lead to inconsistencies and misaligned expectations between examiners and institutions. The commenter suggested the rule should refer System institutions to modern frameworks based on industry standards, customized for its institution’s risk environment, and aligned with its documented risk-based approach. Upon further review, we delete the phrase ‘‘and metrics’’ from the final rule, but we decline to reference modern frameworks based on industry standards. Removing ‘‘metrics’’ should alleviate confusion from the proposed language. We continue to believe management should timely report on cyber risk management practices to the board or a committee of the board. lotter on DSK11XQN23PROD with RULES1 Technology Budget (§ 609.935(b)) One commenter stated that requiring an institution, per proposed § 609.935(b), to detail the technology budget in the technology plan could lead to unnecessary duplication. Some institutions present their technology budget to their boards with the overall operating expense budget. Another commenter objected to the requirement on how and when the information is to be presented. We are not revising the proposed language. We believe there is little to no burden for institutions to include the technology budgets in the overall operating expense budgets, even if duplicative to other reports the boards might receive. Having a separate technology budget could benefit the board of directors by identifying the expenses incurred within the technology area. A separate technology budget is especially important as money spent in the technology area helps keep systems secure and adds more transparency to the technology area. Business planning is very important as institutions identify specific areas that should be reviewed, assessed, and evaluated. Board and management can use the technology budget to initiate discussions on spending for cyber risk management. Identify and Assess Business Risk (§ 609.935(c)) One commenter stated proposed § 609.935(c) is unclear. Proposed § 609.935(c) requires institutions to identify and assess the business risk of proposed technology changes and assess the adequacy of the institution’s cyber risk program. The commenter did not know whether the requirement in VerDate Sep<11>2014 15:57 Dec 08, 2023 Jkt 262001 proposed § 609.935(c) is intended to assess the adequacy of the program as a whole or solely assess the proposed technology changes. No recommendation was provided. To alleviate any confusion, we modify this section, so that the plan ‘‘[i]dentifies and assesses the adequacy of the institution’s entire cyber risk management program, including proposed technology changes.’’ Records Retention (§ 609.945) Several commenters stated that the proposed rule does not provide guidance on maintaining electronic records. Proposed § 609.945 requires ‘‘records stored electronically must be accurate, accessible, and reproducible for later reference.’’ The commenters stated that this section is silent on the scope and extent of the records and does not consider the institutions’ data retention policies. The commenters recommended that we revise the rule to refer System institutions to modern frameworks based on industry standards, which would be customized for the institution’s risk environment when defining the scope and extent of its electronic records retention program. We are not revising the proposed language. This is the same language from the prior regulation on E–SIGN. This section will continue to hold institutions accountable for records retention in general. Institutions are still required to comply with E–SIGN, which is a statutory provision. Our existing E– SIGN regulations were educational and a reminder to institutions of their applicability. As this is not a prescriptive rule, we have decided not to impose specific records retention schedules here. System institutions must continue to maintain their records to document their business decisions and to allow examiners to review such documents. Moreover, System institutions must have records retention programs that comply with their respective state and federal laws. IV. Regulatory Analysis A. Regulatory Flexibility Act Pursuant to section 605(b) of the Regulatory Flexibility Act (5 U.S.C. 601 et seq.), FCA hereby certifies that the Cyber Risk Management final rule will not have a significant economic impact on a substantial number of small entities. Each of the banks in the FCS, considered together with its affiliated associations, has assets and annual income more than the amounts that would qualify them as small entities. Therefore, FCS institutions are not PO 00000 Frm 00014 Fmt 4700 Sfmt 4700 ‘‘small entities’’ as defined in the Regulatory Flexibility Act. Under the provisions of the Congressional Review Act (5 U.S.C. 801 et seq.), the Office of Management and Budget’s Office of Information and Regulatory Affairs has determined that this final rule is not a ‘‘major rule’’ as the term is defined at 5 U.S.C. 804(2). List of Subjects in 12 CFR Part 609 Agriculture, Banks, Banking, Electronic commerce, Reporting and recordkeeping requirements, Rural areas. For the reasons stated in the preamble, revise part 609 of chapter VI, title 12 of the Code of Federal Regulations to read as follows: ■ PART 609—CYBER RISK MANAGEMENT Subpart A—General Rules Sec. 609.905 In general. Subpart B—Standards for Boards and Management Sec. 609.930 Cyber risk management. 609.935 Business planning. 609.945 Records retention. Authority: Sec. 5.9 of the Farm Credit Act (12 U.S.C. 2243); 5 U.S.C. 301; Pub. L. 106– 229 (114 Stat. 464). Subpart A—General Rules § 609.905 In general. Farm Credit System (System) institutions must engage in appropriate risk management practices to ensure safety and soundness of their operations. A System institution’s board and management must maintain and document effective policies, procedures, and controls to mitigate cyber risks. This includes establishing an appropriate vulnerability management program to monitor cyber threats, mitigate any known vulnerabilities, and establish appropriate reporting mechanisms to the institution’s board and the Farm Credit Administration (FCA). The vulnerability management programs should be commensurate with the size, risk profile, and complexity of the institution and based on sound industry standards and practices. Subpart B—Standards for Boards and Management § 609.930 Cyber risk management. (a) Cyber risk management program. Each System institution must implement a comprehensive, written cyber risk management program consistent with the size, risk profile, E:\FR\FM\11DER1.SGM 11DER1 lotter on DSK11XQN23PROD with RULES1 Federal Register / Vol. 88, No. 236 / Monday, December 11, 2023 / Rules and Regulations and complexity of the institution’s operations. The program must ensure controls exist to protect the security and confidentiality of current, former, and potential customer and employee information, protect against reasonably anticipated cyber threats or hazards to the security or integrity of such information, and protect against unauthorized access to or use of such information. (b) Role of the board. Each year, the board of directors of each System institution or an appropriate committee of the board must: (1) Approve a written cyber risk program. The program must be consistent with industry standards to ensure the institution’s safety and soundness and compliance with law and regulations; (2) Oversee the development, implementation, and maintenance of the institution’s cyber risk program; and (3) Determine necessary expertise for executing the cyber risk management plan and, where practical, delegate dayto-day responsibilities to management and employees. (c) Cyber risk program. Each institution’s cyber risk program must, at a minimum: (1) Include an annual risk assessment of the internal and external factors likely to affect the institution. The risk assessment, at a minimum, must: (i) Identify and assess internal and external factors that could result in unauthorized disclosure, misuse, alteration, or destruction of current, former, and potential customer and employee information or information systems; and (ii) Assess the sufficiency of policies, procedures, internal controls, and other practices in place to mitigate risks. (2) Identify systems and software vulnerabilities, prioritize the vulnerabilities and the affected systems based on risk, and perform timely remediation. The particular security measures an institution adopts will depend upon the size, risk profile, and complexity of the institution’s operations and activities. (3) Maintain an incident response plan that contains procedures the institution must implement when it suspects or detects unauthorized access to current, former, or potential customer, employee, or other sensitive or confidential information. An institution’s incident response plan must be reviewed and updated periodically, but at least annually, to address new threats, concerns, and evolving technology. The incident response plan must contain procedures for: VerDate Sep<11>2014 15:57 Dec 08, 2023 Jkt 262001 (i) Assessing the nature and scope of an incident, and identifying what information systems and types of information have been accessed or misused; (ii) Acting to contain the incident while preserving records and other evidence; (iii) Resuming business activities during intrusion response; (iv) Notifying the institution’s board of directors when the institution learns of an incident involving unauthorized access to or use of sensitive or confidential customer, and/or employee information, or unauthorized access to financial institution information including proprietary information; (v) Notifying FCA as soon as possible or no later than 36 hours after the institution determines that an incident has occurred; and (vi) Notifying former, current, or potential customers and employees and known visitors to your website of an incident when warranted, and in accordance with state and federal laws. (4) Describe the plan to train employees, vendors, contractors, and the institution board to implement the institution’s cyber risk program. (5) Include policies for vendor management and oversight. Each institution, at a minimum, must: (i) Exercise appropriate due diligence in selecting vendors; (ii) Negotiate contract provisions, when feasible, that facilitate effective risk management and oversight and specify the expectations and obligations of both parties; (iii) Conduct a vendor risk assessment on all vendors; and (iv) Monitor its IT and cyber risk management related vendors to ensure they have satisfied agreed upon expectations and deliverables. Monitoring may include reviewing audits, summaries of test results, or other equivalent evaluations of its vendors. (6) Maintain robust internal controls by regularly testing the key controls, systems, and procedures of the cyber risk management program. (i) The frequency and nature of such tests are to be determined by the institution’s risk assessment. (ii) Tests must be conducted or reviewed by independent third parties or staff independent of those who develop or maintain the cyber risk management program. (iii) Internal systems and controls must provide reasonable assurances that System institutions will prevent, detect, and remediate material deficiencies on a timely basis. (d) Privacy. Institutions must consider privacy and other legal compliance PO 00000 Frm 00015 Fmt 4700 Sfmt 4700 85833 issues, including but not limited to, the privacy and security of System institution information; current, former, and potential borrower information; and employee information, as well as compliance with statutory requirements for the use of electronic media. (e) Board reporting requirements. At a minimum, each institution must report quarterly to its board or an appropriate committee of the board. The report must contain material matters related to the institution’s cyber risk management program, including specific risks and threats. § 609.935 Business planning. The annually approved business plan required under subpart J of part 618 of this chapter, and § 652.60 of this chapter for System institutions and the Federal Agricultural Mortgage Corporation, respectively, must include a technology plan that, at a minimum: (a) Describes the institution’s intended technology goals, performance measures, and objectives; (b) Details the technology budget; (c) Identifies and assesses the adequacy of the institution’s entire cyber risk management program, including proposed technology changes; (d) Describes how the institution’s technology and security support the current and planned business operations; and (e) Reviews internal and external technology factors likely to affect the institution during the planning period. § 609.945 Records retention. Records stored electronically must be accurate, accessible, and reproducible for later reference. Dated: December 6, 2023. Ashley Waldron, Secretary, Farm Credit Administration. [FR Doc. 2023–27102 Filed 12–8–23; 8:45 am] BILLING CODE 6705–01–P DEPARTMENT OF TRANSPORTATION Federal Aviation Administration 14 CFR Part 39 [Docket No. FAA–2023–1816; Project Identifier MCAI–2021–01460–R; Amendment 39–22599; AD 2023–22–15] RIN 2120–AA64 Airworthiness Directives; Airbus Helicopters Deutschland GmbH (AHD) Helicopters Federal Aviation Administration (FAA), DOT. ACTION: Final rule. AGENCY: E:\FR\FM\11DER1.SGM 11DER1

Agencies

[Federal Register Volume 88, Number 236 (Monday, December 11, 2023)]
[Rules and Regulations]
[Pages 85825-85833]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-27102]


=======================================================================
-----------------------------------------------------------------------

FARM CREDIT ADMINISTRATION

12 CFR Part 609

RIN 3052-AD53


Cyber Risk Management

AGENCY: Farm Credit Administration.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: The Farm Credit Administration (FCA, we, or our) rescinds and 
revises its regulations to reflect developments in cyber risk and 
continuously evolving business practices. We rename the regulations 
``Cyber Risk Management.'' The final rule requires each Farm Credit 
System (System or FCS) institution to implement a comprehensive, 
written cyber risk management program consistent with the size, risk 
profile, and complexity of the institution's operations.

DATES: This regulation is effective January 1, 2025.

FOR FURTHER INFORMATION CONTACT: 
    Technical information: Dr. Ira D. Marshall, Senior Policy Analyst, 
Office of Regulatory Policy, Farm Credit Administration, McLean, VA 
22102-5090, (703) 883-4414, TTY (703) 883-4056;
    or
    Legal information: Jane Virga, Assistant General Counsel, Office of 
General Counsel, Farm Credit Administration, McLean, VA 22102-5090, 
(703) 883-4020, TTY (703) 883-4056.

SUPPLEMENTARY INFORMATION: 

I. Objectives

    The objectives of this final rule are to:
     Delete references to the requirements of ``Electronic 
Signatures in Global and National Commerce Act'' (E-SIGN) (Pub. L. 106-
229), which became effective on October 1, 2000. E-SIGN is a statutory 
requirement that governs electronic transactions relating to the 
conduct of electronic business, consumer, or commercial affairs. E-SIGN 
continues to apply to System institutions as statutory requirements.
     Revise part 609 to codify our existing expectations, as 
well as ensure the relevance and adequacy of risk management practices, 
corporate governance, and internal control systems at System 
institutions conducting business in an electronic environment.
     Require each System institution to develop and implement a 
comprehensive, written cyber risk management program consistent with 
the size, risk profile, and complexity of the institution's operations.

II. Background

    The regulations at 12 CFR part 609 were enacted in 2002 and 
repeated the statutory requirements of E-SIGN. Our existing 
information-technology (IT)-related regulations primarily focus on E-
commerce terminology and the concept of conducting business in an E-
commerce environment. Since then, there have been significant changes 
and advancements in IT and the System's use of technology to conduct 
business.
    We are responsible, as the System's regulator, to ensure the 
System's use of IT is consistent with safe and sound operations and 
complies with the law.
    We amend the current E-commerce regulations at part 609 to revise 
the rules for a broader cyber risk focus and to codify our existing 
expectations on risk management practices, corporate governance, and 
internal control systems for conducting business in an electronic 
environment. The final regulations set forth core principles that serve 
as the foundation for creating a comprehensive cyber risk management 
program and framework.
    Key definitions include: \1\
---------------------------------------------------------------------------

    \1\ FFIEC IT Examination Handbook InfoBase--Glossary, https://www.ithandbook.ffiec.gov/glossary.
---------------------------------------------------------------------------

     Information security refers to the policies, procedures, 
and technologies used to protect information and information systems 
from unauthorized access, use, disclosure, disruption, modification, or 
destruction.
     Cyber security is the process of protecting information 
assets and data by preventing, detecting, and responding to cyber 
attacks.
     Cyber risk is any risk associated with financial loss, 
disruption, or damage to the reputation of an organization due to the 
failure or unauthorized or erroneous use of its information systems.
    A System institution's policies, procedures, and internal controls 
that manage cyber risk must incorporate information security and cyber 
security concepts and sound business practices.

[[Page 85826]]

Appropriate governance and controls over cyber risk can help guide 
future decision-making about how to mitigate risk while focusing on an 
institution's strategic goals and objectives.
    These cyber risk management regulations allow System institutions 
to innovate. We recognize that innovation in the System may create 
different opportunities, challenges, and risks for different 
institutions. Accordingly, we considered the needs and constraints of 
all institutions, regardless of size, risk profile, or complexity. We 
understand cyber risk management programs will vary and there is no 
one-size-fits-all approach; however, these cyber risk management 
regulations provide the flexibility for System institutions to innovate 
based on the institution's unique needs and operations.
    System institutions can mitigate challenges and risks through good 
governance and effective risk management. Strong governance principles 
and appropriate risk management practices, implemented through sound 
internal controls, can safeguard against a variety of risks, including 
those stemming from adopting new technology. However, an institution 
should never sacrifice safety and soundness for innovation.
    These cyber risk management regulations encourage System 
institutions to implement and develop effective and sound cyber risk 
management program solutions. We continually communicate these 
expectations to System institutions in our role as examiner of the 
System. This rule also considers the role our examinations play in 
ensuring safe and sound operations of the System.

III. Comments and Our Responses

    We received 26 comment letters, all of which came from System 
institutions or persons affiliated with the System, except one that 
came from the Independent Community Bankers of America (ICBA). Of the 
comment letters received, one came from the Farm Credit Council 
(Council), acting on behalf of its membership. Each of the four Farm 
Credit banks submitted a letter, as did the Federal Agricultural 
Mortgage Corporation (Farmer Mac). Many comment letters from System 
associations expressed support for the Council's letter, with several 
raising specific issues. The following is a description of the issues 
raised and our responses.

A. General Comments

Principles-Based Approach
    Most of the commenters stated that the proposed rule does not align 
with a principles-based approach to rule-making. As discussed below, we 
disagree. As an initial matter, we considered that System institutions 
vary dramatically in terms of size, risk profile, and complexity of 
business model. Accordingly, during the rule-making process, we focus 
on the right blend of principles and specific requirements to achieve a 
safe and sound System.
    Principles-based regulations set forth broad objectives and goals 
for which System institutions should strive. Thus, this rule does not 
address every circumstance. The rule attempts to balance an 
institution's need to develop a cyber risk management program against 
our mission to promote and protect the safety and soundness of each 
institution and the System, as a whole. The rule provides flexibility, 
where appropriate, and establishes minimum standards, where needed. 
Thus, the rule provides System institutions with parameters and our 
expectations for the System to establish, among other things, internal 
controls consistent with a principles-based rule. The regulation 
provides flexibility for both the FCA and the System to adapt to market 
developments and evolving technology. We believe we have achieved the 
correct regulatory balance.
    While commenting on this principles-based approach, one institution 
asked us to minimize examination inconsistency by recognizing and 
clarifying the appropriate role of management and the board of 
directors in selecting the appropriate cyber security approach from 
among the many that may satisfy the overarching principles of the rule. 
An institution has the flexibility to determine its risk profile and 
identify appropriate cyber risk management practices. The institution 
should document its analysis to provide examiners with an opportunity 
to assess its choices.
    This approach acknowledges that there is more than one way to 
comply with the regulation. We will take a risk-based approach, and not 
a one-size-fits-all approach, in our examination of each System 
institution.
Ambiguous, Unclear, or Unfeasible
    Several institutions commented that portions of the proposed 
regulation are unclear or unfeasible. In response, we reviewed the 
proposed regulation in its entirety to ensure it is written in 
accordance with plain language principles and to clarify any 
potentially confusing language.
    The rule requires System institutions to develop a program 
consistent with the size, risk profile, and complexity of the 
institution's operations. This provides flexibility, consistent with a 
principles-based approach, to allow each System institution to 
customize its cyber security program for its particular risk 
environment. However, to address commenters' concerns, we are adding 
the term ``risk profile,'' as appropriate throughout the preamble and 
regulation, to clarify that an institution's program must be based on 
size, complexity, and risk. Adding the term ``risk profile'' will allow 
each System institution to customize its cyber risk management program 
for its unique risk environment.
User Experience
    One commenter stated that perfect security is neither possible nor 
desirable, and there is often a fundamental tradeoff between security 
and convenience (or user experience). The commenter further stated that 
while clients appropriately value the security of their information, 
they are often willing to accept some security risk in exchange for a 
better user experience.
    Although convenience and user experience could compromise security, 
we believe a risk assessment, including a determination to mitigate or 
accept certain risks, is critical to an institution's cyber risk 
management program. Thus, an institution must document why it accepts, 
transfers, or mitigates the risk. The board has a fiduciary 
responsibility to ensure a safe and sound operating environment. If the 
board chooses to accept a risk for convenience or customer experience, 
the board's approval must be documented.
Leveraging Modern Frameworks
    Several commenters suggested the proposed regulation should 
leverage standard frameworks based on industry standards (e.g., Federal 
Financial Institutions Examination Council (FFIEC) or National 
Institute of Standards and Technology (NIST)), which would allow the 
regulation to remain relevant for rapidly changing technologies.
    We agree. As this is a principles-based regulation, in part, 
linking to standard frameworks will encourage innovation, 
implementation, and compliance. Referencing industry standards promotes 
conformity with the cyber risk management rule as institutions innovate 
and apply rapidly evolving technology and attendant controls.

[[Page 85827]]

    We also direct System institutions to the June 27, 2017, 
Informational Memorandum (IM) on ``Reporting Security Incidents and 
Business Continuity Events to FCA.'' This guidance will assist System 
institutions to identify and define an incident under 12 CFR 
609.930(c)(3)(i) and help determine reporting requirements. The Office 
of Examination periodically releases informational memoranda to update 
the System on expectations. We anticipate the continued issuance of 
such guidance documents in the future, despite the publication of this 
rule.
Requests To Define Key Terms
    Several commenters requested that we define key terms, such as 
``effective,'' ``ensure,'' or ``appropriate.'' However, as this is a 
principles-based rule, we will not define such terms here.
    FCA and the institutions it regulates must interpret these terms 
considering the institution's unique circumstances. What may be 
``effective'' or ``appropriate'' at one institution or at one time may 
not be ``effective'' or ``appropriate'' at another institution with a 
different risk profile, where there is a different size or complexity, 
or at a different time. FCA's decision to not define the terms allows 
an institution to determine what is effective or appropriate at its 
institution. During the supervisory and examination process, we will 
apply the regulatory requirements based on the institution's current 
circumstances, which is consistent with a principles-based rule. 
Moreover, these terms currently are used without definition throughout 
our regulations, and we do not believe it appropriate to define the 
terms in this regulation.
    FCS institutions may want to refer to the NIST Computer Security 
Resource Center's Glossary \2\ and FFIEC IT Examination Handbook 
InfoBase--Glossary \3\ as additional resources in defining terms. For 
further guidance, please refer to our IM dated June 27, 2017, entitled, 
``Reporting Security Incidents and Business Continuity Events to FCA,'' 
for terms like ``Security Event'' and ``Security Incident.''
---------------------------------------------------------------------------

    \2\ Glossary [verbar] CSRC, https://www.csrc.nist.gov/glossary.
    \3\ FFIEC IT Examination Handbook InfoBase--Glossary,  https://www.ithandbook.ffiec.gov/glossary.
---------------------------------------------------------------------------

Conformity With Other Federal Financial Regulators
    The ICBA recommends that we harmonize the proposed regulation and 
guidance with that of the other federal financial regulatory agencies 
to ensure System institutions operate in a safe and sound manner. In 
drafting this regulation, we reviewed the cyber security regulations of 
the federal financial regulatory agencies and included some of the 
elements of those regulations. We believe the review process was 
comprehensive and have been unable to identify any other provisions we 
should include. Nevertheless, we refer System institutions to the FFIEC 
IT Handbook \4\ and NIST \5\ for additional guidance and as examples of 
industry standards.
---------------------------------------------------------------------------

    \4\ FFIEC IT Handbook, https://www.ithandbook.ffiec.gov.
    \5\ Cybersecurity [verbar] NIST, https://www.nist.gov/cybersecurity.
---------------------------------------------------------------------------

Reproposing the Proposed Rule
    Two System institutions stated that the proposed rule should be 
pulled back, reworked, and reproposed in the future to allow for 
additional comments. We disagree. FCA has not updated our technology 
regulations in years. We believe this updated regulation will help 
institutions strengthen their cyber security and cyber risk management 
practices. We provide, through this principles-based rule, flexibility 
for institutions to develop cyber risk management programs based on 
institution size, risk profile, and complexity.
Regulatory Burden
    One commenter suggested the proposed rule is excessively burdensome 
and inconsistent with modern industry accepted and dynamic cyber 
security program standards that System institutions already implemented 
as part of their cyber security programs. The commenter further stated 
that the proposed rule would adversely impact the ability and 
capability of System institutions to establish effective and relevant 
cyber security programs. Additionally, the commenter said the language 
was prescriptive and vague. The commenter stated that we should defer 
to industry standards and not attempt to create competing, duplicative, 
and non-conforming regulatory requirements.
    We agree, in part, and FCA intends through this rulemaking to 
leverage standard frameworks based on industry standards, such as FFIEC 
and NIST, as discussed herein. However, consistent with principles-
based rulemaking, we reiterate that an institution must develop a 
program consistent with the size, risk profile, and complexity of the 
institution's operations. An institution should customize and document 
the cyber risk management program for its risk environment.
Examination Approach
    Several commenters asked how FCA examiners would examine cyber risk 
management programs at System institutions of different sizes and 
complexities. Commenters were also concerned the rule does not have 
specific definitions and thresholds that may lead to inconsistencies in 
examinations.
    Examiners will review cyber risk management programs much like 
other internal controls programs. There is no one-size-fits-all 
approach. We know cyber risk management plans will differ based on an 
institution's size, complexity, and risk profile. The rule outlines 
items institutions must consider, such as a written cyber risk 
management program, documented incident response plan, and documented 
risk assessments, which examiners may review as part of the examination 
process. We will provide consistency and clarity in our supervision and 
regulation of the System as it pertains to, among other things, cyber 
risk management.

B. Comments on Specific Provisions

Mitigating Vulnerabilities (Sec.  609.905)
    Several commenters recommended that we allow each System 
institution to define the term ``vulnerability'' in proposed Sec.  
609.905 based on a modern framework and remove the requirement that 
``any'' vulnerability must be remediated. They asserted that System 
institutions should be allowed to rank and prioritize vulnerabilities 
based on their defined risk-based program, including allowing known 
unmitigated vulnerabilities to be assessed and addressed based on that 
risk assessment. There was also a comment that human capital presents 
the greatest risk or vulnerability to an institution.
    We do not agree that the regulation should include the suggested 
terminology ``based on a modern framework.'' We believe the commenter's 
suggested language of ``based on a modern framework'' is vague and 
could be misinterpreted to allow a System institution to use any modern 
framework, which could lead to further inconsistencies among System 
institutions. However, we do agree that an institution should rank and 
prioritize vulnerabilities based on its cyber risk management program 
and cyber risk assessment. The vulnerability management program should 
be commensurate with the size, risk profile, and complexity of the 
institution and based on sound industry standards and practices.

[[Page 85828]]

    A System institution board should identify and document the 
institution's appetite for risk. Then, the board, with management, 
should assess the institution's vulnerabilities. Although an 
institution cannot mitigate every vulnerability, each System 
institution's board must assess the risk of a vulnerability, decide 
whether the vulnerability exposes the institution to any undue risk, 
and document its analysis and conclusions. In some cases, a System 
institution may assess and identify its risk appetite and accept the 
risk, which should be documented to allow FCA to examine for safety and 
soundness, as well as compliance with law.
    Mitigating vulnerabilities involves taking steps to implement 
internal controls that reduce risk. Remediation is the act of removing 
or eradicating a vulnerability from an IT system. Mitigation, on the 
other hand, is creating strategies to minimize the potential threat of 
a vulnerability when it cannot be eliminated immediately. Some 
vulnerabilities are more difficult to remediate and may require some 
time to address.
    An institution could refer to the FFIEC IT Handbook or NIST 
Cybersecurity Framework for guidance on how to identify, document, and 
address a vulnerability within its risk profile.
Privacy and Compliance (Sec.  609.930(a))
    Several commenters disagreed with the second sentence in proposed 
Sec.  609.930(a), which provided as follows: ``The program must ensure 
the security and confidentiality of current, former, and potential 
customer and employee information, protect against reasonably 
anticipated cyber threats or hazards to the security or integrity of 
such information, and protect against unauthorized access to or use of 
such information.'' The commenters were concerned that the phrase 
``must ensure'' created an unattainable standard as to the security and 
confidentiality of information, as any information loss, no matter how 
insignificant, would appear to violate the rule as drafted. The 
commenters suggested that we revise this language so the program ``must 
be designed to protect'' or ``manage the risk'' of protecting the 
security and confidentiality of information.
    We strongly believe there must be controls in place to protect the 
security and confidentiality of information. Thus, we revise the second 
sentence of Section 609.930(a) as follows: ``The program must ensure 
controls exist to protect the security and confidentiality of current, 
former, and potential customer and employee information, protect 
against reasonably anticipated cyber threats or hazards to the security 
or integrity of such information, and protect against unauthorized 
access to or use of such information.'' The revision to the second 
sentence of Section 609.930(a) addresses the commenters' concerns and 
will ensure that an institution has strong controls in place to protect 
the security and confidentiality of information.
Size and Complexity (Sec.  609.930(a))
    We received numerous comments suggesting that we clarify 
expectations related to ``size and complexity'' in proposed Sec.  
609.930(a). There was a concern that a lack of guidance on ``size and 
complexity'' will lead to inconsistent expectations of examiners and 
place additional regulatory burden on smaller institutions. It was also 
suggested that we acknowledge the role of IT service providers to avoid 
examination inconsistencies and to reference ``a modern risk management 
framework.'' Section 609.930(a) requires, in part, each institution to 
implement a comprehensive, written cyber risk management program 
consistent with the size, risk profile, and complexity of the 
institution's operations.
    Consistent with our intent for a principles-based rulemaking, we do 
not define ``size and complexity.'' However, to provide clarity, we 
include ``risk profile'' and change the phrase to ``size, risk profile, 
and complexity.'' We do not believe it appropriate to reference ``a 
modern risk management framework.''
    An institution must assess its risk profile. The regulation 
requires a cyber risk management program to be consistent with size, 
risk profile, and complexity of an institution. A smaller institution 
may not be required to assess as many risks as or the same types of 
risks as a larger institution. However, depending on an institution's 
complexity, size, and risk profile, it is possible for a smaller 
institution to have a similar cyber risk management plan range as 
compared to a larger institution.
    Each institution should document its risk-based approach to 
establishing a cyber risk management plan and scope.
    As noted above, to add clarity in response to the size and 
complexity concerns, we revise the first sentence in this section to 
insert the phrase ``risk profile'' to help align the regulation with 
the requirement of providing strong controls commensurate with an 
institution's size and complexity.
Role of Board and Management (Sec.  609.930(b))
    One commenter stated that although the heading of proposed Sec.  
609.930(b) refers to the role of management, the text of this section 
does not appear to contemplate a defined role for management. The 
commenter further stated that although management has a significant 
role in managing cyber risk, the rule assigns many responsibilities to 
an institution's board of directors, with management providing the 
services.
    We believe that a board of directors must provide appropriate 
oversight of management to develop, implement, and maintain a cyber 
risk management program consistent with the board's fiduciary duties 
and oversight obligations. This section provides that the board must 
decide who will do what without FCA specifying or telling them what to 
do step-by-step. We do not want to create a prescriptive rule.
    For clarity, we modified the language of this section to remove 
``and management'' from the heading. This should clarify that the 
institution board has oversight responsibility but may delegate day-to-
day tasks to management and other employees, as appropriate.
Timely Remediation (Sec.  609.930(c)(2))
    Proposed Sec.  609.930(c)(2) requires institutions to ``perform 
timely remediation.'' Several commenters stated the regulation does not 
define the term ``timely,'' which could lead to inconsistencies and 
misaligned expectations between examiners and institutions. One 
commenter recommended we define ``timely'' by directing System 
institutions to leverage modern frameworks based on industry standards, 
customized for its institution's risk environment, and aligned with its 
documented risk-based approach.
    This is a principles-based rule. Institutions have an opportunity 
to be innovative and develop their own metrics and identify material 
matters relevant and specific to their institutions. Metrics will vary 
from System institution to System institution depending on risks, 
threats, and cyber risk management program.
    As to defining ``timely,'' we understand the commenters' concerns. 
However, remediation evaluation should begin immediately after the 
vulnerability has been identified. The word ``timely'' is intended to 
provide institutions some flexibility. A minor vulnerability, depending 
on the circumstances presented, may not need to be addressed 
immediately, but a

[[Page 85829]]

major vulnerability must be addressed immediately.
    Thus, we finalize this section as proposed.
Incident Response Planning (Sec.  609.930(c)(3))
    One institution stated that ``incident response planning'' as 
required by proposed Sec.  609.930(c)(3) varies greatly by institution 
and by incident. The technologies used and available expertise also 
vary greatly. The commenter stated that broad-based incident responses 
provide the flexibility needed to adapt to constantly changing 
technology and threats to technology. The commenter added that 
requiring specific incident plan responses to individual potential 
threats is both time consuming and ultimately not satisfactory, 
especially for new threats that may not be envisioned when the plan is 
created. The commenter recommended that the final rule be revised to 
allow institutions more flexibility in defining incident response 
planning.
    We believe that proposed Sec.  609.930(c)(3) included the necessary 
components and flexibility for an incident response plan. An 
institution should view an incident response plan as the steps that 
should be taken when a security incident occurs. Procedures do not need 
to be specific to any one type of event and can be written to ensure 
the right people are involved in the incident response and the process 
remains consistent. Further, we believe incident response plans will 
likely need to change over time in response to new threats. Thus, we 
revise this section to include language that the documented cyber risk 
management program, risk assessments, and incident response plans 
should be reviewed and updated periodically, but at least annually, to 
address new threats, concerns, and evolving technology. This is 
consistent with existing FFIEC, NIST, and FCA guidance.
Detailed Procedures for Security Events (Sec. Sec.  609.930(c)(3)(i) 
Through (iii))
    Proposed Sec. Sec.  609.930(c)(3)(i) through (iii) require each 
institution to document its procedures on forensics, containment, and 
business resumption. Several commenters stated that the requirements in 
proposed Sec. Sec.  609.930(c)(3)(i) through (iii) are not feasible 
because of the lengthy and numerous ways System institutions identify 
and contain security events, and later, resume business. The commenters 
recommended that we revise this section to focus less on specific 
procedures, and more on an adaptable and scalable framework to assess 
the nature and scope of an incident, contain the incident, and how to 
safely resume business activities. Some commenters stated that an 
institution should act in accordance with state and federal law.
    We disagree with the commenters' statements. A System institution 
must document its procedures for, among other things, ensuring each 
employee follows the same protocol for forensics, containment, and 
business resumption. Also, documentation will assist with staff 
continuity within the institution and can serve as a training tool for 
institution employees. Furthermore, FCA examiners must be able to 
examine for compliance. Compliance with only state and federal laws is 
not appropriate because it does not assess an institution's size, 
complexity, and risk profile.
    We will finalize this section as proposed.
Board Notice of a Cyber Incident (Sec.  609.930(c)(3)(iv))
    One commenter recommended that we modify proposed Sec.  
609.930(c)(3)(iv) to permit each institution's board of directors to 
determine when it should be notified by management of a cyber incident, 
consistent with the board notification protocols in the institution's 
approved incident response plan. The commenter suggested revising the 
proposal to include an incident escalation matrix that would provide 
the board and management with a clear and specific action plan in the 
event of a cyber incident and identify when an incident should be 
brought to the attention of the board and/or other stakeholders (e.g., 
regulators and law enforcement).
    Proposed Sec.  609.930(c)(3)(iv) requires board notice when there 
is a cyber incident involving unauthorized access to or use of 
sensitive or confidential customer or employee information.
    We believe this section already includes an escalation concept, in 
that it applies only to sensitive or confidential information. The 
section does not apply to all information. We believe that when there 
has been a cyber incident involving sensitive or confidential 
information, the board must be notified. The board should not be caught 
off guard when it comes to hearing about cyber incidents.
    After further consideration, we now also include a clause that 
requires notification when there is ``unauthorized access to financial 
institution information, including proprietary information.'' Financial 
institution information must also be protected. An institution must 
guard its institution's reputation in every instance.
Reporting an Incident (Sec.  609.930(c)(3)(v))
    Proposed Sec.  609.930(c)(3)(v) requires an institution to notify 
FCA as soon as possible, or no later than 36 hours after an institution 
determines a cyber security incident occurs. A few commenters stated 
that incidents can occur in an environment without discovery for longer 
than 36 hours. Additionally, one commenter stated that 36 hours will 
not allow an institution sufficient time to review evidence and 
determine whether a reportable incident has occurred. The commenter 
recommended extending the deadline to 72 hours. Another commenter 
suggested extending the reporting requirement to four business days 
after the date of a materiality determination, rather than the date of 
discovery.
    The proposed rule requires ``notifying FCA as soon as possible or 
no later than 36 hours after the institution determines that an 
incident has occurred.'' We believe it reasonable that an institution 
be required to notify its regulator as soon as possible and no later 
than 36 hours after it identifies such an incident. We do not believe 
that a materiality standard should be introduced. Notification does not 
require a detailed report with findings and recommendations. 
Notification provides us with timely information on a cyber security 
incident. This is consistent with the other federal financial 
regulatory agencies' requirement promulgated in a joint regulation that 
a banking organization notify its primary federal regulator of any 
significant security incident as soon as possible and no later than 36 
hours after it has been determined that a cyber incident has 
occurred.\6\ Thus, we believe the notification requirements of this 
section are reasonable and remain unchanged.
---------------------------------------------------------------------------

    \6\ See. Computer-Security Incident Notification Requirements 
for Banking Organizations and Their Bank Service Providers, 86 FR. 
66,424 (November 23, 2021).
---------------------------------------------------------------------------

Former, Current, or Potential Customers (Sec.  609.930(c)(3)(vi))
    Some commenters recommended proposed Sec.  609.930(c)(3)(vi) be 
amended and revised to provide notice to customers, employees, and 
website visitors in accordance with state and federal laws. Another 
commenter was concerned that there was no definition of ``customer,'' 
especially as it relates to potential customers exploring available 
loan products online. Another

[[Page 85830]]

commenter was concerned the section was overly broad and vague. Another 
commenter recommended deleting this phrase in its entirety.
    This section requires institutions to notify former, current, or 
potential customers and employees, and known visitors to an 
institution's website, of an incident, when warranted, and in 
accordance with state and federal laws. For example, notification would 
be required when sensitive or confidential information has been 
compromised. The section does not define ``known visitor'' or 
``potential customer.'' Overall, the commenters are concerned System 
institutions will interpret these terms differently.
    We do not believe we should change this section as the requirements 
are consistent with a principles-based rule. Each System institution 
will determine and document what these terms mean. Providing notice, 
when warranted, provides flexibility to institutions. Nevertheless, all 
confidential information related to ``former, current, or potential 
customers and employees and known visitors to a website'' must be 
protected. System institutions may not allow others to inappropriately 
view or access this information without proper authorization. Our 
regulations at part 618 support this conclusion.
Training (Sec.  609.930(c)(4))
    Proposed Sec.  609.930(c)(4) requires institutions to ``describe 
the plan to train employees, vendors, contractors, and the institution 
board to implement the institution's cyber risk program.'' Several 
commenters argued that the requirement to train contractors and vendors 
is impractical and that many contractors and vendors will simply refuse 
to submit to institution-specific training based on their own business 
requirements.
    As a principles-based rule, this section requires an institution to 
describe its plan to train employees, vendors, and contractors. 
However, we do not prescribe a particular plan. If an institution does 
not provide training, the institution must describe its plan and state 
why and what actions it is taking to mitigate the risk of not having 
institution-provided training. We require such documentation to enable 
FCA examiners to review the training plan.
    As to vendors, System institutions should be able to confirm, 
either contractually or otherwise, that vendors have some acceptable 
level of training, as well as understand sound cyber risk management 
practices and protocols. We acknowledge that it is unrealistic for an 
institution to train all contractors and vendors.
    We finalize this section as proposed.
Third-Party Vendors (Sec.  609.930(c)(5))
    Several institutions commented generally that they did not own or 
manage any IT systems that they currently use. They stated that these 
IT systems may be owned by third-party vendors, technology service 
providers, or by another System institution, such as a Farm Credit Bank 
that provides services like a third-party service provider.
    As to specific comments, one commenter asked that the term 
``vendor'' be clarified. Another commenter stated that proposed Sec.  
609.930(c)(5)(i) is impractical as it requires an institution to 
require its vendors, by contract, to implement appropriate due 
diligence in selecting vendors. The commenter provided an example of 
its inability to comply with proposed Sec.  609.930(c)(5)(i) when a 
vendor may refuse to negotiate its standard terms and conditions, due 
to its size and bargaining position.
    We also received a comment on proposed Sec.  609.930(c)(5)(iii) 
(now Sec.  609.930(c)(5)(iv)) concerning institutions monitoring and 
reviewing vendor audits or summaries of test results. The commenter 
stated that some vendors will not provide these audits or test results. 
The commenter stated that requiring institutions to negotiate the right 
to an audit with every vendor will greatly hinder an institution's 
choice of vendors. Moreover, for many vendors, this is not practical. 
The commenter added that it is not necessary for an institution to 
review audits or summaries of test results for a vendor contracted to 
provide catering or lawn maintenance services, or other non-IT 
contracts. Another commenter suggested a risk-based approach.
    A ``vendor'' is a third party and includes third-party service 
providers or a System institution providing services to another System 
institution. A System institution should assess the risk of using a 
vendor, i.e., complete a vendor risk assessment.\7\ Completing a vendor 
risk assessment helps an institution understand risks when using vendor 
products or services. An institution cannot delegate its due diligence 
responsibilities.
---------------------------------------------------------------------------

    \7\ A vendor risk assessment is the process of identifying and 
evaluating potential risks or hazards associated with a vendor's 
operations and products and its potential impact on your 
organization. When an institution performs a third-party vendor risk 
assessment, it determines the most likely effects of uncertain 
events, and then identifies, measures, and prioritizes them. 
Potential risks include the accuracy and reliability of operational, 
customer, and financial information; security breaches; operation 
effectiveness; and legal and regulatory compliance.
---------------------------------------------------------------------------

    Conducting a risk assessment is particularly important when a 
vendor handles a critical business function, accesses sensitive 
customer data, and/or interacts with customers. An institution must 
have controls to ensure that the vendor, even if it is another System 
institution, has appropriate security in place for IT systems. Whether 
a vendor is a System service provider or external service provider, an 
institution should never put its trust in any IT service provider 
without doing its own due diligence.
    An institution has a responsibility to its customers and 
shareholders. Accordingly, each association must be aware of the risks, 
even if it outsources its IT services. We will hold the institution 
accountable for ensuring it has appropriate controls to ensure the 
continued safety and soundness of the institution. An institution must 
know its own complexity, including the role of technology service 
providers. Although services may be outsourced, an institution cannot 
delegate or shift the requirement for due diligence or accountability 
from the institution's board and management to service providers. 
Institutions are required to ensure service providers/vendors are 
providing adequate and effective services.
    Nevertheless, we agree that negotiating the right to audit need not 
apply to every vendor. Accordingly, to address these concerns we added 
a new paragraph (iii), requiring institutions to conduct a vendor risk 
assessment on all vendors.
    An institution will be able to assess the level of detail needed 
for their vendor risk assessment. For example, a vendor risk assessment 
of a catering vendor may need a statement indicating very little risk 
because of the nature of the service and type of information provided 
to the vendor. A vendor risk assessment for IT services would require 
an institution evaluate cyber risk as part of its vendor management 
process. A vendor risk assessment helps an institution understand the 
risks that exist when it uses vendors' products or services. Conducting 
a vendor risk assessment is particularly important when a vendor 
handles a critical business function, accesses sensitive customer data, 
or interacts with customers.
    An institution must document the vendor risk assessment and may 
address whether a large vendor already has appropriate security 
measures. This way, an institution can determine if it

[[Page 85831]]

will accept, mitigate, transfer, or avoid the risk. It is possible that 
a vendor risk assessment could address the reputation of a vendor and 
conclude that there is a low risk.
    Just because a smaller or less complex institution may rely on its 
funding bank for technology services does not mean that institution 
would not be required to have a cyber risk management program. If a 
cyber event occurred at a small or less complex institution that relies 
on the bank for services, we would still expect the institution to work 
with the bank to follow a cyber security framework (e.g., identify, 
protect, detect, respond, and recover).
    Additionally, to be more consistent with a principles-based 
approach, we revise proposed Sec.  609.930(c)(4)(iii) (now Sec.  
609.930(c)(4)(iv)) to identify what an institution may monitor, rather 
than prescribing what an institution must monitor. This would provide 
an option for the institution to receive some type of report, audit, or 
summary. The institution must exercise appropriate due diligence in 
selecting any vendor. Any such assessment must include appropriate 
documentation for examiner review.
Internal Controls Frequency (Sec.  609.930(c)(6)(i))
    A few commenters stated that proposed Sec.  609.930(c)(6)(i), which 
requires an institution to determine the frequency and nature of 
internal controls testing, provides no substantive guidance on the 
frequency and nature of internal controls testing. No recommendation 
was provided.
    As this is a principles-based rule, we provide institutions the 
autonomy to decide the frequency and nature of their internal control 
tests. Based on the risk assessment, each institution should decide the 
frequency and nature of internal control tests. If we were to mandate 
every element, this rule would no longer be principles-based, as 
appropriate, but a prescriptive rule. The type and amount of risk an 
institution faces should determine the nature and frequency of testing. 
An institution may want to consult the FFIEC IT Handbook, NIST, and FCA 
guidance documents.
    We finalize this section as proposed.
Independent Third-Party Testing (Sec.  609.930(c)(6)(ii))
    A commenter stated that proposed Sec.  609.930(c)(6)(ii) requires 
an independent party to perform testing but does not address the size 
and complexity of the institutions when performing testing. The 
commenter asserted that, to minimize examination inconsistencies, the 
rule should address the unique service provider relationship and 
structure between some System entities.
    We disagree. The regulation provides that an independent party can 
include institution staff who are independent of the cyber risk 
management program. This will allow an institution, regardless of size, 
risk profile, or complexity, to conduct its own testing and due 
diligence, which the institution should document. Institution 
documentation will promote consistency in the examination process.
Reasonable Assurances and Material Deficiencies (Sec.  
609.930(c)(6)(iii))
    Several commenters stated that there is no indication how to 
measure the term ``material.'' One commenter added that ``reasonable 
assurances'' seem to refer to an auditor's degree of satisfaction that 
the evidence obtained during the audit supports the assertions in the 
financial statements. The commenter added ``reasonable assurances'' do 
not include ``remediation'' in the definition, as a situation with 
material deficiencies (situations requiring remediation) would not 
allow an auditor to arrive at a level of reasonable assurances. The 
commenter suggested separating this section into a testing element and 
a remediation element. The commenter stated that a testing element 
related to ``reasonable assurances'' would assess the cyber 
capabilities of the organization to detect and prevent cyber incidents 
of a material nature, while a remediation element related to incident 
responses would assess the effectiveness of timely remediation of cyber 
incidents that have a material impact on the entity.
    Proposed Sec.  609.930(c)(6)(iii) indicates that ``internal systems 
and controls must provide reasonable assurances that System 
institutions will prevent, detect, and remediate material deficiencies 
on a timely basis.''
    ``Material'' in this context means to exclude small or de minimis 
deficiencies. Thus, System institutions may interpret ``material'' to 
mean anything that could potentially impact the safety and soundness of 
an institution or the accuracy of financial reporting. Internal 
controls should provide reasonable assurances that information and IT 
is reliable, accurate, and timely.
    Internal controls are intended to prevent errors and 
irregularities, identify problems, and ensure corrective action. 
Internal controls can be expected to provide only reasonable, not 
absolute, assurances to an institution's management and board.
    We continue to believe internal controls must provide reasonable 
assurances to prevent, detect, and remediate material deficiencies. We 
do not believe any change to the proposal is necessary. The regulation, 
as proposed, is clear on the need for adequate internal controls.
Privacy Framework (Sec.  609.930(d))
    With respect to proposed Sec.  609.930(d), commenters were 
concerned that this section does not provide expectations on the 
privacy framework, or other legal or compliance requirements. This 
section requires, in part, that an institution ``consider privacy and 
other legal compliance issues.''
    We have decided not to specify a uniform privacy framework. Privacy 
frameworks can vary from state-to-state and from institution-to-
institution. System institutions may consult the privacy framework 
established by NIST at https://www.nist.gov/privacy-framework/privacy-framework.
    We finalize this section as proposed.
Reporting to the Board (Sec.  609.930(e))
    As proposed, Sec.  609.930(e) requires an institution to ``report 
quarterly to its board or an appropriate committee.'' One commenter 
suggested that quarterly reporting may not be the correct frequency to 
report to an institution's Board.
    We concur with the suggestion that quarterly reporting may not be 
the correct reporting frequency. We revise this section to provide, 
``[a]t a minimum, each institution must report quarterly to its board 
or an appropriate committee of the board.'' This will ensure that there 
is at least quarterly reporting to the board. Depending on the risk or 
information that must be communicated to the board, the frequency of 
reporting may need to increase, and conversely, a quarterly report to 
the board may be brief, as appropriate and in accordance with the 
institution's situation. The institution should have appropriate 
documentation to support the frequency of board reporting.
Cyber Risk Management Metrics (Sec.  609.930(e))
    Section 609.930(e), as proposed, requires the report to the board 
to ``contain material matters and metrics related to the institution's 
cyber risk management program, including specific risks and threats.'' 
One commenter was concerned that the section does not provide a 
framework or expectation for the metrics presented to the board, or 
consider institutions

[[Page 85832]]

providing cyber metrics through another avenue, such as an entity-wide 
risk management report. The commenter believed that their concerns 
could lead to inconsistencies and misaligned expectations between 
examiners and institutions. The commenter suggested the rule should 
refer System institutions to modern frameworks based on industry 
standards, customized for its institution's risk environment, and 
aligned with its documented risk-based approach.
    Upon further review, we delete the phrase ``and metrics'' from the 
final rule, but we decline to reference modern frameworks based on 
industry standards. Removing ``metrics'' should alleviate confusion 
from the proposed language. We continue to believe management should 
timely report on cyber risk management practices to the board or a 
committee of the board.
Technology Budget (Sec.  609.935(b))
    One commenter stated that requiring an institution, per proposed 
Sec.  609.935(b), to detail the technology budget in the technology 
plan could lead to unnecessary duplication. Some institutions present 
their technology budget to their boards with the overall operating 
expense budget. Another commenter objected to the requirement on how 
and when the information is to be presented.
    We are not revising the proposed language. We believe there is 
little to no burden for institutions to include the technology budgets 
in the overall operating expense budgets, even if duplicative to other 
reports the boards might receive. Having a separate technology budget 
could benefit the board of directors by identifying the expenses 
incurred within the technology area. A separate technology budget is 
especially important as money spent in the technology area helps keep 
systems secure and adds more transparency to the technology area. 
Business planning is very important as institutions identify specific 
areas that should be reviewed, assessed, and evaluated. Board and 
management can use the technology budget to initiate discussions on 
spending for cyber risk management.
Identify and Assess Business Risk (Sec.  609.935(c))
    One commenter stated proposed Sec.  609.935(c) is unclear. Proposed 
Sec.  609.935(c) requires institutions to identify and assess the 
business risk of proposed technology changes and assess the adequacy of 
the institution's cyber risk program. The commenter did not know 
whether the requirement in proposed Sec.  609.935(c) is intended to 
assess the adequacy of the program as a whole or solely assess the 
proposed technology changes. No recommendation was provided.
    To alleviate any confusion, we modify this section, so that the 
plan ``[i]dentifies and assesses the adequacy of the institution's 
entire cyber risk management program, including proposed technology 
changes.''
Records Retention (Sec.  609.945)
    Several commenters stated that the proposed rule does not provide 
guidance on maintaining electronic records. Proposed Sec.  609.945 
requires ``records stored electronically must be accurate, accessible, 
and reproducible for later reference.'' The commenters stated that this 
section is silent on the scope and extent of the records and does not 
consider the institutions' data retention policies. The commenters 
recommended that we revise the rule to refer System institutions to 
modern frameworks based on industry standards, which would be 
customized for the institution's risk environment when defining the 
scope and extent of its electronic records retention program.
    We are not revising the proposed language. This is the same 
language from the prior regulation on E-SIGN. This section will 
continue to hold institutions accountable for records retention in 
general. Institutions are still required to comply with E-SIGN, which 
is a statutory provision. Our existing E-SIGN regulations were 
educational and a reminder to institutions of their applicability.
    As this is not a prescriptive rule, we have decided not to impose 
specific records retention schedules here. System institutions must 
continue to maintain their records to document their business decisions 
and to allow examiners to review such documents. Moreover, System 
institutions must have records retention programs that comply with 
their respective state and federal laws.

IV. Regulatory Analysis

A. Regulatory Flexibility Act

    Pursuant to section 605(b) of the Regulatory Flexibility Act (5 
U.S.C. 601 et seq.), FCA hereby certifies that the Cyber Risk 
Management final rule will not have a significant economic impact on a 
substantial number of small entities. Each of the banks in the FCS, 
considered together with its affiliated associations, has assets and 
annual income more than the amounts that would qualify them as small 
entities. Therefore, FCS institutions are not ``small entities'' as 
defined in the Regulatory Flexibility Act.
    Under the provisions of the Congressional Review Act (5 U.S.C. 801 
et seq.), the Office of Management and Budget's Office of Information 
and Regulatory Affairs has determined that this final rule is not a 
``major rule'' as the term is defined at 5 U.S.C. 804(2).

List of Subjects in 12 CFR Part 609

    Agriculture, Banks, Banking, Electronic commerce, Reporting and 
recordkeeping requirements, Rural areas.


0
For the reasons stated in the preamble, revise part 609 of chapter VI, 
title 12 of the Code of Federal Regulations to read as follows:

PART 609--CYBER RISK MANAGEMENT

Subpart A--General Rules
Sec.
609.905 In general.
Subpart B--Standards for Boards and Management
Sec.
609.930 Cyber risk management.
609.935 Business planning.
609.945 Records retention.

    Authority:  Sec. 5.9 of the Farm Credit Act (12 U.S.C. 2243); 5 
U.S.C. 301; Pub. L. 106-229 (114 Stat. 464).

Subpart A--General Rules


Sec.  609.905  In general.

    Farm Credit System (System) institutions must engage in appropriate 
risk management practices to ensure safety and soundness of their 
operations. A System institution's board and management must maintain 
and document effective policies, procedures, and controls to mitigate 
cyber risks. This includes establishing an appropriate vulnerability 
management program to monitor cyber threats, mitigate any known 
vulnerabilities, and establish appropriate reporting mechanisms to the 
institution's board and the Farm Credit Administration (FCA). The 
vulnerability management programs should be commensurate with the size, 
risk profile, and complexity of the institution and based on sound 
industry standards and practices.

Subpart B--Standards for Boards and Management


Sec.  609.930  Cyber risk management.

    (a) Cyber risk management program. Each System institution must 
implement a comprehensive, written cyber risk management program 
consistent with the size, risk profile,

[[Page 85833]]

and complexity of the institution's operations. The program must ensure 
controls exist to protect the security and confidentiality of current, 
former, and potential customer and employee information, protect 
against reasonably anticipated cyber threats or hazards to the security 
or integrity of such information, and protect against unauthorized 
access to or use of such information.
    (b) Role of the board. Each year, the board of directors of each 
System institution or an appropriate committee of the board must:
    (1) Approve a written cyber risk program. The program must be 
consistent with industry standards to ensure the institution's safety 
and soundness and compliance with law and regulations;
    (2) Oversee the development, implementation, and maintenance of the 
institution's cyber risk program; and
    (3) Determine necessary expertise for executing the cyber risk 
management plan and, where practical, delegate day-to-day 
responsibilities to management and employees.
    (c) Cyber risk program. Each institution's cyber risk program must, 
at a minimum:
    (1) Include an annual risk assessment of the internal and external 
factors likely to affect the institution. The risk assessment, at a 
minimum, must:
    (i) Identify and assess internal and external factors that could 
result in unauthorized disclosure, misuse, alteration, or destruction 
of current, former, and potential customer and employee information or 
information systems; and
    (ii) Assess the sufficiency of policies, procedures, internal 
controls, and other practices in place to mitigate risks.
    (2) Identify systems and software vulnerabilities, prioritize the 
vulnerabilities and the affected systems based on risk, and perform 
timely remediation. The particular security measures an institution 
adopts will depend upon the size, risk profile, and complexity of the 
institution's operations and activities.
    (3) Maintain an incident response plan that contains procedures the 
institution must implement when it suspects or detects unauthorized 
access to current, former, or potential customer, employee, or other 
sensitive or confidential information. An institution's incident 
response plan must be reviewed and updated periodically, but at least 
annually, to address new threats, concerns, and evolving technology. 
The incident response plan must contain procedures for:
    (i) Assessing the nature and scope of an incident, and identifying 
what information systems and types of information have been accessed or 
misused;
    (ii) Acting to contain the incident while preserving records and 
other evidence;
    (iii) Resuming business activities during intrusion response;
    (iv) Notifying the institution's board of directors when the 
institution learns of an incident involving unauthorized access to or 
use of sensitive or confidential customer, and/or employee information, 
or unauthorized access to financial institution information including 
proprietary information;
    (v) Notifying FCA as soon as possible or no later than 36 hours 
after the institution determines that an incident has occurred; and
    (vi) Notifying former, current, or potential customers and 
employees and known visitors to your website of an incident when 
warranted, and in accordance with state and federal laws.
    (4) Describe the plan to train employees, vendors, contractors, and 
the institution board to implement the institution's cyber risk 
program.
    (5) Include policies for vendor management and oversight. Each 
institution, at a minimum, must:
    (i) Exercise appropriate due diligence in selecting vendors;
    (ii) Negotiate contract provisions, when feasible, that facilitate 
effective risk management and oversight and specify the expectations 
and obligations of both parties;
    (iii) Conduct a vendor risk assessment on all vendors; and
    (iv) Monitor its IT and cyber risk management related vendors to 
ensure they have satisfied agreed upon expectations and deliverables. 
Monitoring may include reviewing audits, summaries of test results, or 
other equivalent evaluations of its vendors.
    (6) Maintain robust internal controls by regularly testing the key 
controls, systems, and procedures of the cyber risk management program.
    (i) The frequency and nature of such tests are to be determined by 
the institution's risk assessment.
    (ii) Tests must be conducted or reviewed by independent third 
parties or staff independent of those who develop or maintain the cyber 
risk management program.
    (iii) Internal systems and controls must provide reasonable 
assurances that System institutions will prevent, detect, and remediate 
material deficiencies on a timely basis.
    (d) Privacy. Institutions must consider privacy and other legal 
compliance issues, including but not limited to, the privacy and 
security of System institution information; current, former, and 
potential borrower information; and employee information, as well as 
compliance with statutory requirements for the use of electronic media.
    (e) Board reporting requirements. At a minimum, each institution 
must report quarterly to its board or an appropriate committee of the 
board. The report must contain material matters related to the 
institution's cyber risk management program, including specific risks 
and threats.


Sec.  609.935  Business planning.

    The annually approved business plan required under subpart J of 
part 618 of this chapter, and Sec.  652.60 of this chapter for System 
institutions and the Federal Agricultural Mortgage Corporation, 
respectively, must include a technology plan that, at a minimum:
    (a) Describes the institution's intended technology goals, 
performance measures, and objectives;
    (b) Details the technology budget;
    (c) Identifies and assesses the adequacy of the institution's 
entire cyber risk management program, including proposed technology 
changes;
    (d) Describes how the institution's technology and security support 
the current and planned business operations; and
    (e) Reviews internal and external technology factors likely to 
affect the institution during the planning period.


Sec.  609.945  Records retention.

    Records stored electronically must be accurate, accessible, and 
reproducible for later reference.

    Dated: December 6, 2023.
Ashley Waldron,
Secretary, Farm Credit Administration.
[FR Doc. 2023-27102 Filed 12-8-23; 8:45 am]
BILLING CODE 6705-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.