Operational Resilience Framework for Futures Commission Merchants, Swap Dealers, and Major Swap Participants, 4706-4768 [2023-28745]

Download as PDF 4706 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules COMMODITY FUTURES TRADING COMMISSION 17 CFR Parts 1 and 23 RIN 3038–AF23 Operational Resilience Framework for Futures Commission Merchants, Swap Dealers, and Major Swap Participants Commodity Futures Trading Commission. ACTION: Notice of proposed rulemaking. AGENCY: The Commodity Futures Trading Commission (CFTC or Commission) is proposing to require that futures commission merchants, swap dealers, and major swap participants establish, document, implement, and maintain an Operational Resilience Framework reasonably designed to identify, monitor, manage, and assess risks relating to information and technology security, third-party relationships, and emergencies or other significant disruptions to normal business operations. The framework would include three components—an information and technology security program, a third-party relationship program, and a business continuity and disaster recovery plan—supported by broad requirements relating to governance, training, testing, and recordkeeping. The proposed rule would also require certain notifications to the Commission and customers or counterparties. The Commission is further proposing guidance relating to the management of risks stemming from third-party relationships. DATES: Comments must be received on or before March 2, 2024. ADDRESSES: You may submit comments, identified by RIN number 3038–AF23, by any of the following methods: • CFTC Comments Portal: https:// comments.cftc.gov. Select the ‘‘Submit Comments’’ link for this rulemaking and follow the instructions on the Public Comment Form. • Mail: Christopher Kirkpatrick, Secretary of the Commission, Commodity Futures Trading Commission, Three Lafayette Centre, 1155 21st Street NW, Washington, DC 20581. • Hand Delivery/Courier: Follow the same instructions as for Mail, above. Please submit your comments using only one of these methods. Submissions through the CFTC Comments Portal are encouraged. All comments must be submitted in English, or if not, accompanied by an English translation. Comments will be ddrumheller on DSK120RN23PROD with PROPOSALS2 SUMMARY: VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 posted as received to https://comments. cftc.gov. You should submit only information that you wish to make available publicly. If you wish the Commission to consider information that you believe is exempt from disclosure under the Freedom of Information Act (FOIA), a petition for confidential treatment of the exempt information may be submitted according to the procedures established in Commission regulation 145.9.1 The Commission reserves the right, but shall have no obligation, to review, pre-screen, filter, redact, refuse or remove any or all of your submission from https://comments.cftc.gov that it may deem to be inappropriate for publication, such as obscene language. All submissions that have been redacted or removed that contain comments on the merits of the rulemaking will be retained in the public comment file and will be considered as required under the Administrative Procedure Act and other applicable laws, and may be accessible under the FOIA. FOR FURTHER INFORMATION CONTACT: Amanda L. Olear, Director, at 202–418– 5283 or aolear@cftc.gov; Pamela Geraghty, Deputy Director, at 202–418– 5634 or pgeraghty@cftc.gov; Fern Simmons, Associate Director, at 202– 418–5901 or fsimmons@cftc.gov; Elise Bruntel, Special Counsel, at 202–418– 5577 or ebruntel@cftc.gov; Market Participants Division, Commodity Futures Trading Commission, Three Lafayette Centre, 1151 21st Street NW, Washington, DC 20581. SUPPLEMENTARY INFORMATION: Table of Contents I. Introduction II. Proposal A. Generally—Proposed Paragraph (b) 1. Purpose and Scope; Components— Proposed Paragraphs (b)(1) and (b)(2) 2. Standard—Proposed Paragraph (b)(3) 3. Request for Comment B. Governance—Proposed Paragraph (c) 1. Approval of Components—Proposed Paragraph (c)(1) 2. Risk Appetite and Risk Tolerance Limits—Proposed Paragraph (c)(2) 3. Internal Escalations—Proposed Paragraph (c)(3) 4. Consolidated Program or Plan— Proposed Paragraph (c)(4) 5. Request for Comment C. Information and Technology Security Program—Proposed Paragraph (d) 1. Risk Assessment—Proposed Paragraph (d)(1) 2. Effective Controls—Proposed Paragraph (d)(2) 3. Incident Response Plan—Proposed Paragraph (d)(3) 1 17 CFR 145.9. The Commission’s regulations are found at 17 CFR chapter I (2022). PO 00000 Frm 00002 Fmt 4701 Sfmt 4702 4. Request for Comment D. Third-Party Relationship Program— Proposed Paragraph (e) 1. Third-Party Relationship Lifecyle Stages—Proposed Paragraph (e)(1) 2. Heightened Requirements for Critical Third-Party Service Providers—Proposed Paragraph (e)(2) 3. Third-Party Service Provider Inventory—Proposed Paragraph (e)(3) 4. Retention of Responsibility—Proposed Paragraph (e)(3) 5. Application to Existing Third-Party Relationships 6. Guidance on Third-Party Relationship Programs—Proposed Paragraph (e)(4); Appendix A to Part 1; Appendix A to Subpart J of Part 23 7. Request for Comment E. Business Continuity and Disaster Recovery Plan—Proposed Paragraph (f) 1. Definition of ‘‘Business Continuity and Disaster Recovery Plan’’ 2. Purpose—Proposed Paragraph (f)(1) 3. Minimum Contents—Proposed Paragraph (f)(2) 4. Accessibility—Proposed Paragraph (f)(3) 5. Request for Comment F. Training and Distribution—Proposed Paragraph (g) G. Review and Testing—Proposed Paragraph (h) 1. Reviews—Proposed Paragraph (h)(1) 2. Testing—Proposed Paragraph (h)(2) 3. Independence—Proposed Paragraph (h)(3) 4. Documentation—Proposed Paragraph (h)(4) 5. Internal Reporting—Proposed Paragraph (h)(5) 6. Request for Comment H. Required Notifications—Proposed Paragraphs (i) and (j) 1. Commission Notification of Incidents— Proposed Paragraph (i)(1) 2. Commission Notification of BCDR Plan Activation—Proposed Paragraph (i)(2) 3. Notifications to Customers or Counterparties—Proposed Paragraph (j) 4. Request for Comment I. Amendment and Expansion of Other Provisions in Current Commission Regulation 23.603 1. Emergency Contacts—Proposed Paragraph (k) 2. Recordkeeping—Proposed Paragraph (l) 3. Request for Comment J. Cross-Border Application for Swap Entities K. Implementation Period III. Related Matters A. Regulatory Flexibility Act B. Paperwork Reduction Act C. Cost-Benefit Considerations D. Antitrust Laws I. Introduction In 2012 and 2013, the Commission adopted rules requiring that futures commission merchants (FCMs),2 swap dealers (SDs) 3 and major swap 2 See 7 U.S.C. 1a(28), 17 CFR 1.3 (defining ‘‘futures commission merchant’’). 3 See 7 U.S.C. 1a(49), 17 CFR 1.3 (defining ‘‘swap dealer’’). E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 participants (MSPs) 4 establish risk management programs (RMPs).5 The rules require that SDs and MSPs (together, swap entities) and FCMs design their RMPs to monitor and manage the risks associated with their activities as swap entities or FCMs.6 Such risks include, but are not limited to, market, credit, liquidity, segregation, settlement, capital, and operational risk.7 Taken together, the RMP rules support a unified Commission objective: to require FCMs and swap entities (collectively, covered entities) to establish comprehensive risk management practices to mitigate systemic risk and promote customer protection.8 Recognizing that covered entities vary in size and complexity, the RMP rules identify certain elements that must, at a minimum, be included as part of the RMP, and require that certain risks must be taken into account; but the rules otherwise allow covered entities flexibility to design RMPs tailored to their circumstances and organizational structures.9 In the decade since the RMP rules were adopted, covered entities have encountered a wide variety of challenging conditions, including Brexit, the LIBOR transition, the COVID–19 pandemic stress period, the invasion of Ukraine, and general interest rate increases to tame inflation. Throughout this period, the Commission has, through its various oversight activities, observed that adherence to its RMP rules has supported covered entities’ ability to withstand and recover from market challenges. The Commission therefore believes the RMP rules have helped establish a solid foundation of risk management among covered entities 4 See 7 U.S.C. 1a(33), 17 CFR 1.3 (defining ‘‘major swap participant’’).’’ 5 See 17 CFR 1.11; 17 CFR 23.600; Enhancing Protections Afforded Customers and Customer Funds Held by Futures Commission Merchants and Derivatives Clearing Organizations, 78 FR 68506 (Nov. 14, 2013) (Final FCM RMP Rule); Swap Dealer and Major Swap Participant Recordkeeping, Reporting, and Duties Rules; Futures Commission Merchant and Introducing Broker Conflicts of Interest Rules; and Chief Compliance Officer Rules for Swap Dealers, Major Swap Participants, and Futures Commission Merchants, 77 FR 20128 (Apr. 3, 2012) (Final Swap Entities RMP Rule). 6 See 17 CFR 1.11(c); 17 CFR 23.600(b). The RMP rule for FCMs does not apply to FCMs that do not accept or hold customer assets. See 17 CFR 1.11(a). 7 See 17 CFR 1.11(e); 17 CFR 23.600(c). 8 See Final Swap Entities RMP Rule, 77 FR at 20128; Final FCM RMP Rule, 78 FR 68506. 9 See, e.g., Regulations Establishing and Governing the Duties of Swap Dealers and Major Swap Participants, 75 FR 71397, 71399 (Nov. 23, 2010) (Proposed Swap Entities RMP Rule) (‘‘The Commission’s rule has been designed such that the specific elements of a risk management program will vary depending on the size and complexity of a [swap entity’s] business operations.’’). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 across various risk types, promoting a solid baseline standard of risk management that reduces overall systemic risk and enhances the Commission’s customer protections. Nevertheless, the Commission believes it has identified opportunities to adapt its regulations to further promote sound risk management practices, reduce risk to the U.S. financial system, and protect commodity interest customers and counterparties.10 Specifically, as it relates to this proposal, the Commission believes that recent events, noted below, have highlighted the need for more particularized risk management requirements for covered entities designed to promote operational resilience. An outcome of the effective management of operational risk, ‘‘operational resilience’’ can be broadly defined as the ability of a firm to detect, resist, adapt to, respond to, and recover from operational disruptions.11 As the use of technology and associated thirdparty service providers have expanded within the financial sector, so too have the sources of operational risk facing covered entities, notably the potential for technological failures and cyberattacks.12 The Commission 10 The Commission recently solicited public comment on an advanced notice of proposed rulemaking regarding potential amendments to the RMP requirements. See Risk Management Program Regulations for Swap Dealers, Major Swap Participants, and Futures Commission Merchants, 88 FR 45826 (Jul. 18, 2023) (RMP ANPRM). The comment file is available at https://comments.cftc. gov/PublicComments/CommentList.aspx?id=7412. 11 See Proposed Swap Entities RMP Rule, 75 FR 71399, n.12 (defining ‘‘operational risk’’ as including ‘‘the risk of loss due to deficiencies in information systems, internal processes and staffing, or disruptions from external events that result in the reduction, deterioration, or breakdown in services or controls within the firm.’’). Several sources have produced definitions of ‘‘operational resilience’’ relevant to the financial sector. See e.g., Board of Governors of the Federal Reserve System (FRB), the Office of the Comptroller of the Currency (OCC), and the Federal Deposit Insurance Corporation (FDIC) (together, the prudential regulators), Sound Practices to Strengthen Operational Resilience at 2 (Oct. 30, 2020) (Prudential Operational Resilience Paper) (defining ‘‘operational resilience’’ as the ‘‘ability to deliver operations, including critical operations and core business lines, through a disruption from any hazard.’’); Basel Committee on Banking Supervision (BCBS), Principles for Operational Resilience at 2, 3 (Mar. 31, 2021) (BCBS Operational Resilience Principles) (‘‘ability of a bank to deliver critical operations through disruption’’); National Institute of Standards and Technology (NIST), Developing Cyber-Resilient Systems: A Systems Security Engineering Approach, SP 800–160, Vol. 2, Rev. 1 at 76 (Dec. 2021) (‘‘ability of systems to resist, absorb, and recover from or adapt to an adverse occurrence during operation that may cause harm, destruction, or loss of ability to perform missionrelated functions.’’). Core to each of these definitions is the notion of being able to continue to operate or perform despite a disruption. 12 See Jason Harrell, Depository Trust & Clearing Corporation (DTCC) Managing Director, Head of PO 00000 Frm 00003 Fmt 4701 Sfmt 4702 4707 preliminarily believes that requirements for covered entities directed at promoting sound practices for managing these risks, as well as the risk of other potential physical disruptions to operations (e.g., power outages, natural disasters, pandemics), and for mitigating their potential impact would not only strengthen individual covered entity operational resilience but would reduce risk to the U.S. financial system as a whole and help protect derivatives customers and counterparties.13 The importance of operational resilience in the financial industry has come into stark relief in the past few years, particularly following the COVID–19 pandemic. At the start of the pandemic, Commission staff initiated near daily in-depth discussions with covered entities as those registrants navigated the myriad challenges presented during that time. Through a combination of sustained intensive effort on the part of the covered entities, and targeted no-action positions and exemptive relief provided by Commission staff, covered entities generally continued to operate without material disruption to their CFTCregulated activities. As a result of this unprecedented experience, the Commission considered whether there were additional opportunities for it to act to gain ongoing transparency into, and to provide further regulatory support to, covered entities’ operational resilience practices outside of an unfolding crisis. Commission staff then began the work of assessing the current operational resilience landscape for covered entities and determining how the Commission could act to further the holistic consideration and adoption of operational resilience practices amongst covered entities to ensure that certain External Engagements, ‘‘Operational and Technology Risk, Evolving Cybersecurity Risks in a Digitalized Era’’ (Sept. 20, 2023) (‘‘While partnerships with third parties offer rapid solutions for institutions to access the latest technologies and capabilities, they also increase the surface area for potential threat actors to gain access to an institution, causing cyber incidents that can impact the institution’s operations and potentially create additional sector impacts.’’). 13 Responding to the RMP ANPRM, several commenters suggested the Commission consider addressing cybersecurity risk independently. See Americans for Financial Reform Education Fund (AFREF) and Public Citizen Letter at 6 (Sept. 18, 2023) (AFREF&PC Letter); Better Markets Letter Re: Risk Management Program Regulations for Swap Dealers, Major Swap Participants, and Futures Commission Merchants (RIN 3038–AE59) at 6–9 (Sept. 18, 2023) (Better Markets Letter); R.J. O’Brien & Associates LLC Letter at 5–6 (Sept. 18, 2023) (R.J. O’Brien Letter). AFRF and Public Citizen also recommended that the Commission consider extending its risk management regulations to encompass third-party service providers for information technology services. See AFREF&PC Letter at 2. E:\FR\FM\24JAP2.SGM 24JAP2 4708 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 operational risks impacting their CFTCregulated activities were being addressed on an ongoing basis. In particular, one area of increased focus is cyber risk. In 2022, cyber intelligence firms reported that the financial sector was among the most impacted by malicious emails, and was ultimately the most breached over the course of the year, with more than 566 successful attacks resulting in 254 million leaked records by early December 2022.14 For the past two years, financial institutions responding to a DTCC risk survey have identified cyber risk as one of the top five risks to global financial markets, highlighting the increased sophistication of cyber criminals and the industry’s growing digital footprint as key drivers.15 Given that remote access and cloud computing may become permanent features of the financial markets, the need for financial institutions to strengthen, adapt, and prioritize their information and technology risk practices would seem critical to preserving the continued integrity and stability of U.S. financial markets.16 Covered entities have experienced firsthand how breaches of information and technology security can reduce their ability to protect customers. In 2016, for instance, a hacker was able to access customer records held on an FCM’s backup storage device after a default configuration of that device left 14 See Trellix, The Threat Report Fall 2022 at 11 (Nov. 2022) (noting that the financial services sector was the most targeted by malicious emails in Q3 of 2022); Flashpoint, Flashpoint Year In Review: 2022 Financial Threat Landscape (Dec. 20, 2022) (citing finance and insurance as the most-breached sector in 2022). 15 See DTCC, Systemic Risk Barometer Survey: 2023 Risk Forecast (Dec. 7, 2022); DTCC, Systemic Risk Barometer Survey: 2022 Risk Forecast (Dec. 13, 2021) (naming cyber risk as the top risk to the economy). See also Bank for International Settlements (BIS), Financial Stability Institute (FSI), FSI Insights on policy implementation No. 50, Banks’ cyber security—a second generation of regulatory approaches (June 12, 2023) (FSI Cybersecurity Paper) (citing a 2023 report that most chief risk officers consider cyber risk the top threat to the banking industry and the most likely to result in a crisis or major operational disruption); Federal Bureau of Investigation, internet Crime Complaint Center Releases 2022 Statistics (Mar. 22, 2023) (‘‘Cyber-enabled crime has been around for many years, but methods used by perpetrators continue to increase in scope and sophistication emanating from around the world.’’). 16 See FRB, Cybersecurity and Financial System Resilience Report at 15 (Aug. 2023) (‘‘The rising number of advanced persistent threats increases the potential for malicious cyber activity within the financial sector. Combined with the increased internet-based interconnectedness between financial institutions and the increasing dependence on third-party service providers, these threats may result in incidents that affect one or more participants in the financial services sector simultaneously and have potentially systemic consequences.’’). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 it open to infiltration via the internet.17 In 2018, a successful phishing attack on an FCM compromised customer information and resulted in the FCM’s acceptance of a fraudulent wire request that took $1 million in funds from a customer’s account.18 Other regulators have also taken action against banks registered as swap entities where failed controls and third-party service providers intersected to result in the significant exposure of customer information.19 Even more recently, a ransomware attack on a U.S. brokerdealer in November 2023 was so significant, news reports indicate that the brokerage required a capital injection from a parent entity to settle $9 billion in trades, an amount many times larger than its net capital.20 Against the backdrop of that work, a recent and well-documented incident serves as an important cautionary tale about the potential systemic impact of an operational event at a third-party service provider. On January 30, 2023, a ransomware attack on ION Markets, a division of UK-based third-party service provider ION Group LLC (ION), resulted in a two-week disruption in mid-office activities at several FCMs. ION provides order management, execution, trading, and trade processing services for several FCMs, including about 20 percent of clearing members at the Chicago Mercantile Exchange (CME), but also provides software services to many other financial institutions, notably many systemically important banks.21 17 See In re AMP Global Clearing LLC, CFTC Docket No. 18–10 (Feb. 12, 2018). 18 See In re Phillip Capital Inc., CFTC Docket No. 19–22 (Sept. 12, 2019). 19 See, e.g., In re Capital One, N.A. and Capital One Bank (USA), N.A., AA–EC–20–49 (Aug. 5, 2020) (OCC finding that failed risk management practices resulted in exposure of 100 million individual credit card applications, including approximately 140,000 social security numbers, by a former cloud servicer employee); In re Morgan Stanley Smith Barney LLC, File No. 3–17280 (Jun. 8, 2016) (Securities and Exchange Commission (SEC) finding that failed risk management controls allowed an employee to impermissibly access and transfer data regarding 730,000 accounts to a personal server, which was ultimately hacked by third parties). 20 See Paritosh Bansal, Reuters, ‘‘Inside Wall Street’s scramble after ICBC hack’’ (Nov. 13, 2023) (reporting that the firm asked clients to temporarily suspend business with them and clear trades elsewhere). 21 See Luke Clancy, Risk.net, ‘‘One-fifth of CME clearing members hit by Ion hack’’ (Mar. 9, 2023); see also Statement of Todd Conklin, Deputy Assistant Secretary, Department of the Treasury (Treasury), Office of Cybersecurity and Critical Infrastructure Protection (OCCIP), The Cyber Threat Landscape for Financial Markets: Lessons Learned from ION Markets, Cloud Use in Financial Services, and Beyond, CFTC Technology Advisory Committee Meeting Transcript at 160–166 (Mar. 22, 2023) (Conklin TAC Presentation) (describing the potential ‘‘sprawling impact zone’’ had the ION PO 00000 Frm 00004 Fmt 4701 Sfmt 4702 FCMs affected by the attack had to process trades manually, leading to delays in the timely and accurate reporting of trade data to the CFTC, and consequently a temporary lag in production of the Commission’s weekly Commitments of Traders report.22 The incident was initially so concerning that Japan cut off all connectivity with ION.23 Within a couple days of the attack, however, regulators, including the CFTC, coordinated efforts to determine that the attack was limited to a small number of software applications relied on within the cleared derivatives space by about forty-two (42) institutions, with no significant impact to systemically important banks.24 During a March 8, 2023, meeting of the CFTC’s Market Risk Advisory Committee (MRAC), panelists discussed how the collaborative work of the CFTC, industry, and self-regulatory organizations (including CME, the National Futures Association (NFA), and the Financial Industry Regulatory Authority (FINRA)) helped mitigate the impact of the ION incident, allowing affected firms to return to business as usual within a couple weeks.25 Nevertheless, panelists agreed that the incident highlighted the interconnectedness of the derivatives markets and the need for firms to continue to adapt safeguards to address the ever-evolving threat landscape.26 As the ION incident demonstrates, a incident not been limited to its derivatives software services), available at https://www.cftc.gov/sites/ default/files/2023/07/1688400024/tac_032223_ transcript.pdf. 22 CFTC, Statement on ION and the Impact to the Derivatives Markets (Feb. 2, 2023), available at https://www.cftc.gov/PressRoom/Speeches Testimony/cftcstatement020223. The Commitment of Traders report is widely relied on by market participants for insight into positions held on exchange-traded futures and options. 23 See Conklin TAC Presentation (Mar. 22, 2023). 24 Id. 25 See CFTC, The Market Risk Advisory Committee to Meet on March 8 (Mar. 8, 2023) (MRAC Meeting), available at https://www.cftc.gov/ PressRoom/Events/opaeventmrac030823; see also Conklin TAC Presentation (discussing how Treasury implemented its cyber incident response playbook in the days following the ION incident to mitigate the potential for panic after news reports began circulating information that the incident was more significant than regulators had initially determined it was). 26 See Statement of Walt Lukken, President and Chief Executive Officer, Futures Industry Association (FIA), MRAC Meeting Transcript at 41 (‘‘While the number of clearing firms that use ION’s suite of clearing products is limited, the interconnectedness of our markets made the outage impactful throughout the entirety of our marketplace.’’); see also Statement of Tom W. Sexton, III, President and Chief Executive Officer, NFA, MRAC Meeting Transcript at 46 (‘‘[O]ur member firms have adopted robust safeguards already that need to be adapted in light of today’s and tomorrow’s ongoing challenges and threats.’’). E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 disruptive cyber event can reach beyond particular financial institutions directly experiencing events to other institutions in the financial markets or to others doing business with an impacted financial institution, and could potentially impact financial stability.27 In light of these and other events, the Commission believes that customer protection and the broader stability of the derivatives markets at large warrant more targeted CFTC requirements relating to the management of operational risk designed to promote operational resilience.28 Specifically, the Commission believes that the absence of CFTC-specific requirements for covered entities that explicitly address information and technology security, as well as third-party risk, could impede the Commission’s ability to fulfill its regulatory oversight obligations with respect to covered entities and ultimately weaken its ability to address systemic risk, protect customer assets, and promote responsible innovation.29 The Commission further believes that enhanced CFTC oversight of covered entities with respect to operational resilience would help improve 27 See FIA, FIA Taskforce on Cyber Risk, After Action Report and Findings at 3 (Sept. 2023) (FIA Taskforce Report) (‘‘The [ION incident] demonstrated that an outage at a single service provider can have damaging effects across a wide range of firms and threaten the orderly functioning of markets. The attack also demonstrated in vivid detail the complexities of restoring normal service.’’). 28 Existing CFTC requirements for covered entities relating to operational risk or information security are more general in nature or limited in application. See, e.g., 17 CFR 1.11(e)(3)(ii) (providing, with respect to operational risk, that FCMs have automated financial risk management controls reasonably designed to prevent the placing of erroneous orders); Enhancing Protections Afforded Customers and Customer Funds Held by Futures Commission Merchants and Derivatives Clearing Organizations, 77 FR 67866, 67906 (Nov. 14, 2012) (describing Commission regulation 1.11(e)(3)(ii) as requiring an FCM’s RMP to include automated financial risk management controls in order to reduce operational risk that could result from ‘‘fat finger’’ errors when submitting trades, or from technological ‘‘glitches’’ using automated trading); 17 CFR 23.600(c)(4)(vi) (requiring swap entities to take into account, among other things, secure and reliable operating and information systems with adequate, scalable capacity, and independence from the business trading unit; safeguards to detect, identify, and promptly correct deficiencies in operating and information systems; and reconciliation of all data and information in operating and information systems); 17 CFR 162.21 and 17 CFR 160.30 (requiring covered entities to adopt written policies and procedures addressing administrative, technical, and physical safeguards with respect to the information of consumers). 29 See 7 U.S.C. 5 (establishing among the purposes of the Commodity Exchange Act to deter disruptions to market integrity, to ensure the financial integrity of covered transactions and the avoidance of systemic risk, and to promote responsible innovation and fair competition among market participants). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 outcomes following operational disruptions by giving the Commission the ability to ensure that covered entities have actionable plans in place to address key operational risks. II. Proposal Section 4s(j)(2) of the Commodity Exchange Act (CEA or Act) expressly requires swap entities to establish robust and professional risk management systems adequate for managing their day-to-day business.30 Section 4s(j)(7) further directs the Commission to prescribe rules governing the duties of swap entities, including the duty to establish risk management systems, which would include the management of operational risk.31 The Commission is authorized to promulgate operational risk management requirements for FCMs pursuant to section 8a(5) of the CEA, which authorizes the Commission to make and promulgate such rules and regulations as, in the judgment of the Commission, are reasonably necessary to effectuate any of the provisions of, or to accomplish any of the purposes of, the CEA.32 This general rulemaking authority may be used to prevent problems before they arise in the agency’s blind spots,33 and may be exercised to regulate circumstances or parties beyond those explicated in a statute.34 Accordingly, the Commission has broad authority to promulgate regulations provided that such regulations are supported by a sufficient nexus to the CFTC’s delegated authority. Specifically, Congress expressly empowered the Commission to prescribe certain requirements with respect to FCMs, namely, to require FCMs to register (sections 8a(1), 4d(a)(1), and 4f(a)(1) of the CEA 35); to segregate customer funds (section 4d of the CEA 36); to establish safeguards to minimize conflicts of interest (section 4d of the CEA 37); to meet minimum financial requirements (section 4f of the CEA 38); to manage and maintain records and reporting on the financial and operational risks of affiliates 30 See 7 U.S.C. 6s(j)(2). 7 U.S.C. 6s(j)(7). 32 7 U.S.C. 12a(5). 33 Inv. Co. Inst. v. CFTC, 891 F. Supp. 2d 162, 193 (D.D.C. 2012), as amended (Jan. 2, 2013) (citing Stilwell v. Office of Thrift Supervision, 569 F.3d 514, 519 (D.C. Cir. 2009)). 34 Nat’l Ass’n of Mfrs. v. SEC, 748 F.3d 359, 366 (D.C. Cir. 2014), overruled on other grounds by Am. Meat Inst. v. U.S. Dept. of Agric., 760 F.3d 18 (D.C. Cir. 2014) (en banc). 35 7 U.S.C. 12a(1); 7 U.S.C. 6d(a)(1); 7 U.S.C. 6f(a)(1). 36 7 U.S.C. 6d. 37 Id. 38 7 U.S.C. 6f. 31 See PO 00000 Frm 00005 Fmt 4701 Sfmt 4702 4709 (section 4f of the CEA 39); and to establish administrative, technical, and physical safeguards to protect the security and confidentiality of certain nonpublic personal information (section 5g of the CEA 40), among other requirements. The Commission believes that more particularized operational risk management requirements are reasonably necessary to help effectuate these statutory requirements for FCMs and to accomplish the purposes of the CEA. FCMs play an important role in the derivatives markets, serving as both the primary point of access to the cleared commodity interest markets for customers and the custodian of the funds used to maintain their positions. Given their position at the center of the derivatives market ecosystem, FCMs’ operational resilience is essential to well-functioning derivatives markets and to ensuring that customers receive the protections provided by the CEA. However, as discussed above, operational risks, notably cyber and third-party risks, have become an increasing threat to financial institutions, including FCMs. These risks can cause major disruptions to FCMs’ operations, and consequently impact the ability of FCMs to fulfill their obligations as Commission registrants. In particular, information security threats and operational disruptions can place an FCM’s financial resources at risk; disrupt an FCM’s ability to segregate and protect customer funds; impede accurate recordkeeping, including records related to customer funds; and cause a host of other issues for FCMs, which ultimately inure to the detriment of their customers and the derivatives markets. Accordingly, the Commission believes a comprehensive operational resilience regime is reasonably necessary to ensure that an FCM adequately addresses and mitigates risks that could adversely impact its ability to operate and fulfill its statutory obligations and duties as an FCM. As discussed in detail in subsequent sections of this release, the Commission is proposing to require that FCMs and swap entities establish an Operational Resilience Framework (ORF) that is reasonably designed to identify, monitor, manage, and assess risks relating to information and technology security, third-party relationships, and emergencies or other significant disruptions to normal business operations. At its core, the ORF would have three key components: an 39 Id. 40 See E:\FR\FM\24JAP2.SGM 7 U.S.C. 7b–2; 15 U.S.C. 6801. 24JAP2 4710 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 information and technology security program, a third-party relationship program, and a business continuity and disaster recovery plan. The proposed ORF rule reflects a principles-based approach buttressed by certain minimum requirements specific to each of the component programs or plans, such as requiring an annual risk assessment and controls relating to information and technology security, and due diligence and monitoring requirements for third-party service providers. Proposed requirements relating to governance, training, testing, and recordkeeping would apply broadly and support the ORF as a whole. The proposed rule would further require covered entities to notify the Commission (and, in certain instances, customers or counterparties) of certain ORF-related events. Detailed guidance intended to assist covered entities in designing and implementing their thirdparty relationship program would be included in appendices to the rule. In developing the proposed rule, the Commission endeavored to incorporate general directives to federal agencies articulated in the White House’s March 2023 National Cybersecurity Strategy: Leverage existing standards and guidance, harmonize where sensible and appropriate to achieve better outcomes, and demonstrate an approach that is sufficiently nimble to meet the challenges of the ever-evolving technological threat landscape and fit the unique business and risk profile of each covered entity.41 To that end, the proposal builds on the Commission’s experience establishing system safeguard requirements for registered entities, as well as the approaches adopted by self-regulatory organizations and other regulatory authorities.42 Notably, the proposal draws on 41 The White House, National Cybersecurity Strategy at 8–9 (Mar. 2023) (National Cyber Strategy) (‘‘Our strategic environment requires modern and nimble regulatory frameworks for cybersecurity tailored for each sector’s risk profile, harmonized to reduce duplication, complementary to public-private collaboration, and cognizant of the cost of implementation.’’). See also FIA Taskforce Report, supra note 27, at 9 (‘‘[T]he Taskforce encourages regulators and legislators to take a principles-based approach to cyber risk and operational resilience. That approach may not be sufficient in all areas, but such a flexible approach is well suited to a threat landscape that is likely to continue evolving at a rapid rate.’’). 42 See 17 CFR 37.1400 and 17 CFR 37.1401 (system safeguard requirements for swap execution facilities (SEFs)); 17 CFR 38.1050 and 17 CFR 38.1051 (designated contract markets (DCMs)); 17 CFR 39.18 (derivatives clearing organizations (DCOs)); 17 CFR 49.24 (swap data repositories (SDRs)). See also 17 CFR 1.3 (defining ‘‘registered entity’’ to include DCMs, DCOs, SEFs, and SDRs). For a summary of international regulatory efforts related to operational resilience, see FIA Taskforce Report, supra note 27, at 7–8. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 approaches adopted by NFA, whose rules and interpretative notices relating to information systems security, thirdparty risk, and business continuity and disaster recovery planning apply to covered entities by virtue of being NFA members, and prudential regulators, who also regulate many covered entities, and have recently issued interagency positions on operational resilience and third-party relationship management.43 The Commission also surveyed the work of international standard-setting bodies, notably the BCBS Principles for Operational Resilience.44 The Commission also conferred with, and reviewed the standards published by the National Institute of Standards and Technology (NIST), a part of the U.S. Department of Commerce charged by Executive Order 13636 in 2013 with developing a framework to reduce cyber risks to critical infrastructure that incorporates voluntary consensus standards and industry best practices.45 Standards developed in response to this charge and reviewed by the Commission include the Framework for Improving Critical Infrastructure Cybersecurity and the Security and Privacy Controls for Information Systems and Organizations, among others.46 The Commission and 43 See NFA Interpretive Notice 9070, NFA Compliance Rules 2–9, 2–36 and 2–49: Information Systems Security (rev. Sept. 30, 2019) (NFA ISSP Notice); NFA Interpretive Notice 9079, NFA Compliance Rules 2–9 and 2–36: Members’ Use of Third-Party Service Providers (NFA Third-Party Notice) (effective Sept. 30, 2021); NFA Rule 2–38: Business Continuity and Disaster Recovery Plan (rev. July 1, 2019); NFA Interpretive Notice 9052, NFA Compliance Rule 2–38: Business Continuity and Disaster Recovery Plan (NFA BCDR Notice) (April 7, 2003); Prudential Operational Resilience Paper, supra note 11; Interagency Guidance on Third-Party Relationships: Risk Management, 88 FR 37920 (Jun. 9, 2023) (Prudential Third-Party Guidance). See also Computer-Security Incident Notification Requirements for Banking Organizations and their Bank Service Providers, 86 FR 66424 (Nov. 23, 2021); 12 CFR part 30, app. A (Interagency Guidelines Establishing Standards for Safety and Soundness), 12 CFR part 30, app. B (Interagency Guidelines Establishing Information Security Standards). 44 See BCBS Operational Resilience Principles, supra note 11. See also International Organization of Securities Commissions (IOSCO), Cyber Task Force: Final Report (2019) (identifying different but comparable core standards or frameworks, including both NIST and ISO standards); Financial Stability Board (FSB), Final report on Enhancing Third-Party Risk Management and Oversight—a toolkit for financial institutions and financial authorities (Dec. 4, 2023) (FSB Third-Party Report). Materials related to the FSB’s work on cyber resilience are available at https://www.fsb.org/workof-the-fsb/financial-innovation-and-structuralchange/cyber-resilience/. 45 See The White House, Office of the Press Secretary, Executive Order—Improving Critical Infrastructure Cybersecurity, E.O. 13636 (Feb. 12, 2013). 46 See NIST, Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1) at 2 (Apr. PO 00000 Frm 00006 Fmt 4701 Sfmt 4702 other financial regulators have previously adapted NIST’s standards in regulation and guidance related to operational resilience. The Commission’s system safeguards requirements treat NIST’s CSF as a source for well-established best practices for cybersecurity.47 In Appendix A of the Interagency Sound Resilience Paper, the prudential regulators presented ‘‘a collection of sound practices for cyber risk management, aligned to NIST and augmented to emphasize governance and third-party risk management.’’ 48 The Commission also considered standards published by equivalent standard setting bodies like the International Standards Organization (ISO).49 Finally, in putting together the proposal, Commission staff engaged with staff at NFA and various federal agencies, including prudential regulators, and the SEC.50 Based on these efforts, the Commission preliminarily believes that, if adopted, the proposed rule would strike an 16, 2018) (NIST CSF); NIST, SP 800–53, Security and Privacy Controls for Information Systems and Organizations (Sept. 2020, rev. Dec. 10, 2020) (NIST SP 800–53). See also Cybersecurity & Infrastructure Security Agency (CISA), Financial Services SectorSpecific Plan—2015 at 16 (rev. Dec. 17, 2020) (‘‘While the [NIST cybersecurity framework] is designed to manage cybersecurity risks, its core functions of Identify, Protect, Detect, Respond, and Recover provide a model for considering physical risks as well. This methodology is increasingly central to the sector’s thinking on security and resilience, and the concept aligns with existing [Federal Financial Institutions Examination Council (FFIEC)] guidance.’’). 47 System Safeguards Testing Requirements for Derivatives Clearing Organizations, 81 FR 64322, 64329 (Sept. 19, 2016). 48 Board of Governors of the Federal Reserve System, the Office of the Comptroller of the Currency, and the Federal Deposit Insurance Corporation, Sound Practices to Strengthen Operational Resilience (Nov. 2, 2020), available at https://www.federalreserve.gov/supervisionreg/ srletters/SR2024.html. 49 See, e.g., ISO/IEC 27001:2022, Information security, cybersecurity and privacy protection: Information security controls (Oct. 2022) (ISO/IEC 27001:2022). 50 In accordance with section 712(a) of the DoddFrank Act (15 U.S.C. 8302), the Commission has consulted and coordinated, to the extent possible, with the SEC and the prudential regulators, including with the FRB, the OCC, and the FDIC, for purposes of assuring regulatory consistency and comparability. The Securities Exchange Act of 1934 and existing and proposed SEC regulations include requirements relating to risk management including cybersecurity, including requirements for SECregulated broker-dealers and security-based swap dealers. See, e.g. Cybersecurity Risk Management Rule for Broker-Dealers, Clearing Agencies, Major Security-Based Swap Participants, the Municipal Securities Rulemaking Board, National Securities Associations, National Securities Exchanges, Security-Based Swap Data Repositories, SecurityBased Swap Dealers, and Transfer Agents, 88 FR 20212, sections IV.C.1.b.i and IV.C.1.b.iii (Apr. 5, 2023). E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules appropriate balance between supporting technological and market innovation and fair competition, ensuring covered entities devote the necessary thought, planning, and resources to their operational resilience so as to support the resilience of the U.S. derivatives markets and the financial sector as a whole.51 The Commission is proposing to codify the ORF rule for swap entities in existing Commission regulation 23.603, which currently contains the Commission’s business continuity and disaster recovery requirements for swap entities.52 As discussed in greater detail below, the Commission is proposing to retain the substance of the existing business continuity and disaster recovery requirements in current Commission regulation 23.603 as part of the ORF rule for swap entities, with certain modifications. Similar requirements would also be imposed on FCMs. The proposed ORF rule for FCMs would be codified in new Commission regulation 1.13. The proposed guidance on third-party relationships would be included in the appendices to parts 1 and 23 for FCMs and swap entities, respectively. As proposed, the regulatory text of the ORF rule for swap entities is nearly identical in structure and substance to the ORF rule for FCMs. Accordingly, to promote readability, when referencing sections of the regulatory text, this notice generally refers to the relevant paragraph of the proposed regulations (i.e., ‘‘proposed paragraph (b)’’ would refer to paragraph (b) of both proposed Commission regulations 1.13 and proposed Commission regulation 23.603). The Commission invites comment on all aspects of the proposed rule, as further detailed below. A. Generally—Proposed Paragraph (b) 53 ddrumheller on DSK120RN23PROD with PROPOSALS2 1. Purpose and Scope; Components— Proposed Paragraphs (b)(1) and (b)(2) As previously mentioned, the proposed rule would require covered entities to establish, document, implement, and maintain an Operational Resilience Framework, or ORF.54 The ORF would need to be reasonably designed to identify, monitor, manage, and assess risks 51 See 7 U.S.C. 5. CFR 23.603. 53 Paragraph (a) of proposed Commission regulations 1.13 and 23.603 provides definitions for terms used within the ORF rule. Each proposed definition is discussed in the context of the relevant substantive regulatory requirement throughout the remainder of this notice. 54 See paragraph (b)(1) of proposed Commission regulations 1.13 and 23.603. 52 17 VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 relating to three key risk areas that challenge operational resilience: (i) information and technology security, as defined in the proposed rule and discussed further below; (ii) third-party relationships; and (iii) emergencies or other significant disruptions to the continuity of normal business operations as a covered entity.55 Although these risk areas are often viewed distinctly, as the introduction to this notice illustrates, they are significantly interrelated, as the relative strength of information and technology security and third-party risk management can directly affect recovery activities and improve outcomes following an emergency or other significant disruption.56 Together, the Commission believes they represent important sources of potential operational risk, the effective management of which is key to operational resilience. The proposed rule would require covered entities to establish three written component programs or plans, each dedicated to addressing one of the three enumerated risks within the ORF. The three component programs or plans would be: (i) an information and technology security program, (ii) a thirdparty relationship program, and (iii) a business continuity and disaster recovery plan.57 Each component program or plan would need to be supported by written policies and procedures and meet the requirements 55 See paragraphs (b)(1)(i)–(iii) of proposed Commission regulations 1.13 and 23.603. 56 See, e.g., ISO/IEC 27031:2011, Information technology—Security techniques—Guidelines for information and communication technology readiness for business continuity (Mar. 2011) (‘‘Failures of [information and communication technology (ICT)] services, including the occurrence of security issues such as systems intrusion and malware infections, will impact the continuity of business operations. Thus, managing ICT and related continuity and other security aspects form a key part of business continuity requirements. Furthermore, in the majority of cases, the critical business functions that require business continuity are usually dependent upon ICT. This dependence means that disruptions to ICT can constitute strategic risks to the reputation of the organization and its ability to operate . . . As a result, effective [business continuity management] is frequently dependent upon effective ICT readiness to ensure that the organization’s objectives can continue to be met in times of disruptions.’’). See Prudential Operational Resilience Paper, supra note 11, at 8 (‘‘Secure and resilient information systems underpin the operational resilience of a firm’s critical operations and core business lines.’’); see also Prudential Third-Party Guidance, 88 FR 37920 (discussing the interplay of third-party risks and operational resilience). 57 See paragraph (b)(2) of proposed Commission regulations 1.13 and 23.603; see also paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘information and technology security program,’’ ‘‘third-party relationship program,’’ and ‘‘business continuity and disaster recovery plan’’). PO 00000 Frm 00007 Fmt 4701 Sfmt 4702 4711 set forth in the rule, as discussed in subsequent sections of this notice.58 The definitions and specific requirements for the information and technology security program, the third-party relationship program, and the business continuity and disaster recovery plan are discussed in detail in subsequent sections of this notice specifically dedicated to discussing each of the three components.59 Although they may go by different names, the Commission understands that written programs or plans of these types are generally recognized as common ways to address these risks and are even currently required of covered entities. NFA, for instance, currently requires members to adopt a written information systems security program (ISSP), a written supervisory framework to address outsourcing to third-party service providers, and a written business continuity and disaster recovery plan.60 The Commission itself requires swap entities to have a written business continuity and disaster recovery plan.61 Accordingly, to the extent that covered entities have existing programs or plans and policies and procedures that address the requirements of the ORF rule, by virtue of other regulatory requirements or otherwise, the Commission would not expect such covered entities to adopt entirely new component programs or plans. The Commission would only expect that covered entities review their existing programs and plans to ensure they meet the minimum requirements of the ORF rule and make any necessary amendments. The Commission appreciates that covered entities may assign responsibility for the establishment, implementation, and maintenance of each ORF component program or plan to distinct functions within their organizations. By structuring the proposed rule to require a ‘‘framework’’ directed at operational resilience, 58 See paragraph (b)(2) of proposed Commission regulations 1.13 and 23.603. See paragraphs (d) (information and technology security program), (e) (third-party relationship program), and (f) (business continuity and disaster recovery plan) of proposed Commission regulations 1.13 and 23.603 (describing the requirements for each program, respectively). 59 See sections II.C (information and technology security program), II.D (third-party relationship program), II.E (business continuity and disaster recovery plan) of this notice, infra. 60 See NFA ISSP Notice, supra note 43; NFA Third-Party Notice, supra note 43; and NFA BCDR Notice, supra note 43. NFA’s requirement to establish a business continuity and disaster recovery plan does not currently apply to swap entities, see NFA Rule 2–38, paragraph (a), supra note 43. 61 See 17 CFR 23.603. E:\FR\FM\24JAP2.SGM 24JAP2 4712 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules however, the Commission intends for executive leadership at covered entities to address the risk areas covered by the ORF as a cohesive and interrelated whole, breaking down any unnecessary internal silos, and to consider all aspects of operational resilience in determining their operational strategies, risk appetite, and risk tolerance limits.62 ddrumheller on DSK120RN23PROD with PROPOSALS2 2. Standard—Proposed Paragraph (b)(3) The Commission is proposing to require that each covered entity implement the requirements of the proposed ORF rule in a manner that is appropriate and proportionate to the nature, scope, complexity, and risk profile of its business activities as a covered entity, following generally accepted standards and best practices (the (b)(3) standard).63 The proposed (b)(3) standard reflects the general principles-based approach underpinning the proposed rule, which the Commission believes would be appropriate given the increased reliance on and rapid evolution of technology within the financial industry and its attendant risks.64 This standard incorporates two themes that have broad support from other governmental and international standard-setting bodies when addressing matters related to operational resilience: (i) proportionality; and (ii) reliance on established standards and best practices.65 62 The specific governance requirements of the proposed rule, which include the requirement to establish risk appetite and risk tolerance limits with respect to the ORF, further support this view. See paragraph (c) of proposed Commission regulations 1.13 and 23.603. 63 See paragraph (b)(3) of proposed Commission regulations 1.13 and 23.603. 64 See BCBS Operational Resilience Principles, supra note 11, at 1 (‘‘Recognising that a range of potential hazards cannot be prevented, the Committee believes that a pragmatic, flexible approach to operational resilience can enhance the ability of banks to withstand, adapt to and recover from potential hazards and thereby mitigate potentially severe adverse impacts.’’); see also Prudential Operational Resilience Paper, supra note 11, at 9 (providing as a sound practice of operational resilience that firms review information systems ‘‘on a regular basis against common industry standards and best practices.’’). 65 See, e.g., BCBS Operational Resilience Principles at 2–3 (‘‘The principles for operational resilience set forth in this document are largely derived and adapted from existing guidance that has been issued by the Committee or national supervisors over a number of years. The Committee recognizes that many banks have well established risk management processes that are appropriate for their individual risk profile, operational structure, corporate governance and culture, and conform to the specific risk management requirements of their jurisdictions. By building upon existing guidance and current practices, the Committee is issuing a principles-based approach to operational resilience that will help to ensure proportional implementation across banks of various size, complexity and geographical location.’’); FSB VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 Broadly speaking, the principle of proportionality recognizes that operational resilience, and information and technology security, in particular, cannot be addressed with a one-size-fitsall approach.66 On the contrary, differences in operational structures and business strategies among covered entities necessitate a more flexible and adaptive approach that would allow individual covered entities to best address their specific risks and evolve to address emerging challenges as they arise. Covered entities vary widely in terms of their business structure and risk profiles, such that a covered entity operating within a large bank holding company group structure and involved in a broad array of asset classes would likely have a different risk profile and different resources than an entity that is solely registered with the CFTC or that has a narrower scope to its CFTCregulated business. The Commission would therefore expect that covered entities facing different operational risks may take different approaches to managing and monitoring those risks. Designing an operational resilience framework that would apply uniformly across all covered entities would not only pose significant challenges, it would likely be ineffective, imposing operational costs where no risks demand it. Accordingly, the Commission preliminarily believes that a proportional, risk-based approach would help ensure that firms, customers, counterparties, and the financial system at large can appropriately respond to and recover from operational shocks in context. Interpretive notices adopted by NFA reflect a comparable approach. Specifically, NFA’s notices on ISSPs and the use of third-party service providers establish general, baseline requirements (e.g., assess risks associated with the use of information technology systems or with reliance on third-party service providers) and then direct NFA members, including covered entities, to tailor the specifics to their Third-Party Report, supra note 44, at 10–11; IOSCO, Principles on Outsourcing: Final Report at 10 (IOSCO Outsourcing Report) (Oct. 2021) (providing that ‘‘[t]he application and implementation of these Principles should be proportional to the size, complexity and risk posed by the outsourcing’’ of tasks, functions, processes, services, or activities to a service provider that would otherwise be undertaken by the regulated entity itself). 66 See e.g., FINRA, 2018 Report on Selected Cybersecurity Practices at 1 (Dec. 2018) (FINRA Cybersecurity Report) (‘‘[T]here is no one-size-fitsall approach to cybersecurity.’’); NIST CSF, supra note 46, at 2 (‘‘The [NIST CSF] is not a one-sizefits-all approach to managing cybersecurity risk for critical infrastructure. Organizations will continue to have unique risks—different threats, different vulnerabilities, different risk tolerances.’’). PO 00000 Frm 00008 Fmt 4701 Sfmt 4702 businesses.67 This approach is also consistent with the CFTC’s own approach with respect to system safeguard requirements for registered entities,68 as well as those of the prudential regulators.69 Generally accepted standards and best practices themselves also generally support a proportional approach.70 The Commission emphasizes, however, that ‘‘proportional’’ does not mean ‘‘permissive.’’ The Commission’s proposed standard for the ORF rule would not support a ‘‘race to the bottom,’’ where covered entities default to the minimum requirements of the proposed rule. On the contrary, covered entities would be required to implement an ORF that is reasonably designed to reflect and address their unique risk profile and activities, consistent with the proposed (b)(3) standard. Accordingly, the Commission would expect larger, more complex entities that operate more varied business lines, rely on more technological platforms, or 67 See NFA ISSP Notice, supra note 43 (requiring each NFA member to adopt an ISSP appropriate to the its ‘‘size, complexity of operations, type of customers and counterparties, the sensitivity of the data accessible within its systems, and its electronic interconnectivity with other entities’’); NFA ThirdParty Notice, supra note 43 (‘‘NFA recognizes that a Member must have flexibility to adopt a written supervisory framework relating to outsourcing functions to a [third-party service provider] that is tailored to a Member’s specific needs and business . . .’’). 68 See, e.g., 17 CFR 37.1401(b) (SEFs); 17 CFR 38.1051(b) (DCMs); 17 CFR 39.18(b)(3) (DCOs); 17 CFR 49.24(c) (SDRs) (requiring registered entities to follow generally accepted standards and best practices with respect to the development, operation, reliability, security, and capacity of automated systems); see also System Safeguards Testing Requirements for Derivatives Clearing Organizations, 81 FR 64322, 64329 (Sept. 19, 2016) (DCO System Safeguards Testing Requirements) (describing the CFTC’s approach to system safeguards for DCOs as providing DCOs with ‘‘flexibility to design systems and testing procedures based on the best practices that are most appropriate for that DCO’s risks’’). 69 12 CFR part 30, app. B (Interagency Guidelines Establishing Information Security Standards); id. at II.A. (Information Security Program) (‘‘Each [financial institution] shall implement a comprehensive written information security program that includes administrative, technical, and physical safeguards appropriate to the size and complexity of the [financial institution] and the nature and scope of its activities.’’); FFIEC Information Technology Examination Handbook, Information Security at 2 (Sept. 2016) (FFIEC Information Security Booklet) (‘‘Institutions should maintain effective information security programs commensurate with their operational complexities.’’). 70 The NIST CSF, for example, identifies activities designed to achieve specific cybersecurity outcomes and tiers practices by increasing degree of rigor and sophistication. In selecting a tier, NIST directs entities to consider their ‘‘current risk management practices, threat environment, legal and regulatory requirements, information sharing practices, business/mission objectives, supply chain cybersecurity requirements, and organizational constraints.’’ See NIST CSF, supra note 46, at 8. E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 have more complicated agreements with third-party service providers to arrive at an ORF that is appropriate to their likely increased level of operational risk.71 The requirement for covered entities to follow generally accepted standards and best practices serves to ground covered entities’ approaches to operational resilience in practices that are widely recognized as effective in aiding financial institutions to mitigate and recover from operational shocks. In adopting system safeguard requirements for registered entities, which require registered entities to follow generally accepted standards and best practices, the Commission identified several sources of standards and best practices.72 NFA and other bodies have compiled similar lists.73 Among perhaps the most commonly relied on by financial institutions are the NIST CSF, ISO, the Center for internet Security (CIS), and FFIEC, whose examination booklets and Cyber Assessment Tool (CAT) are specifically designed to guide financial institutions.74 The Commission would expect covered entities to use generally accepted standards and industry best practices that are appropriate and proportionate to the nature, size, scope, complexities, and risk profile of their business activities, in designing or updating an ORF that would comply with the proposed rule. For instance, in conducting the risk assessment required under proposed paragraph (c)(1), a covered entity would need to identify risks to its information and technology security with reference to risks discussed in an appropriate standard or based on industry best practices, and then assess and prioritize those risks using frameworks and metrics 71 See National Cyber Strategy, supra note 41, at 4 (‘‘The most capable and best-positioned actors in cyberspace must be better stewards of the digital ecosystem.’’); see also IOSCO Outsourcing Report, supra note 65, at 10. 72 See, e.g., DCO System Safeguards Testing Requirements, 81 FR 64322–23; 17 CFR 39.18(b)(3) (requiring DCOs to follow generally accepted standards and best practices with respect to the development, operation, reliability, security, and capacity of automated systems); see also 17 CFR 37.1401(b) (SEFs) (requiring the same); 17 CFR 38.1051(b) (DCMs) (same); 17 CFR 49.24(c) (SDRs) (same). 73 See, e.g., NFA, Cybersecurity FAQs, ‘‘Does NFA recommend any particular consultants that can help a Member draft an ISSP or perform penetration testing?’’; see also FFIEC, Cybersecurity Resource Guide for Financial Institutions (Sept. 2022) (rev. Nov. 2022). 74 The Financial Services Sector Coordinating Council (FSSC) has also developed a NIST CSF profile specifically designed for financial institutions. The profile is now maintained, updated, and managed by the Cyber Risk Institute (CRI) and was last updated in January 2023. See CRI Profile v1.2 (Dec. 14, 2021), available at https:// cyberriskinstitute.org/the-profile/. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 recommended by those standards or practices. Requiring covered entities to follow generally accepted standards and industry best practices in developing and implementing the ORF would help ensure that covered entities establish, document, implement, and maintain ORFs reasonably designed to address their particular operational resiliencerelated risks. The proposed rule leverages these standards not only by directing covered entities to consider them in developing their approaches but by incorporating common themes contained within them into the substance of the proposed rule. In the Commission’s view, reliance on such standards supports the use of a common lexicon, facilitating the development of understandable and transposable practices on a cross-border basis. The Commission further recognizes that generally accepted standards and best practices are likely to evolve over time, and the applicability of any particular standard may vary based on the unique circumstances and risk profile of each covered entity. Accordingly, the Commission preliminarily believes requiring covered entities to follow generally accepted standards and best practices supports the goal of an adaptive approach that can respond nimbly to rapid changes in emerging threats.75 3. Request for Comment The Commission invites comment on all aspects of proposed paragraph (b), including the following questions: 1. Applicability to FCMs. In adopting the RMP rule for FCMs in 2013, the Commission determined to limit the rule’s applicability to FCMs that hold or accept customer funds.76 The CEA and Commission regulations define a ‘‘futures commission merchant’’ as an entity that solicits or accepts orders to buy or sell futures contracts, options on futures, retail off-exchange forex contracts or swaps, and accepts money or other assets from customers to support such orders.77 Although some entities are, for various reasons, currently registered as FCMs despite not 75 See National Cyber Strategy, supra note 41, at 9 (‘‘By leveraging existing international standards in a manner consistent with current policy and law, regulatory agencies can minimize the burden of unique requirements and reduce the need for regulatory harmonization.’’). 76 See 17 CFR 1.11(a) (Nothing in this section shall apply to a futures commission merchant that does not accept any money, securities, or property (or extend credit in lieu thereof) to margin, guarantee, or secure any trades or contracts that result from soliciting or accepting orders for the purchase or sale of any commodity interest.). 77 See 7 U.S.C. 1a(28)(A); 17 CFR 1.3 (defining ‘‘futures commission merchant’’) (emphasis added). PO 00000 Frm 00009 Fmt 4701 Sfmt 4702 4713 accepting customer funds, as the Commission explained in the adopting release for the FCM RMP rule, FCMs that do not accept or hold customer funds to margin, guarantee, or security commodity interests are generally not operating as FCMs.78 With respect to the proposed ORF rule, the Commission has preliminarily determined to apply the proposed requirements to all registered FCMs. Although the customer protection concerns may be mitigated for FCMs that do not handle customer assets, the Commission preliminarily believes that the potential systemic risk that can result from failures to manage information and technology risk, thirdparty relationships, emergencies, or other significant disruptions persist for all FCMs, given their access to customer information and their potential relationships with and/or connectivity to other regulated entities, including exchanges and clearinghouses.79 a. Are the risks associated with information and technology security, third-party relationships, and emergencies or other significant disruptions substantially different or reduced for FCMs that do not hold customer funds? If yes, please explain. b. Should the Commission consider limiting the ORF rule to FCMs that do not hold customer funds, consistent with the FCM RMP rule? Why or why not? Please explain. 2. Standard. The proposed rule would require covered entities to follow ‘‘generally accepted standards and best practices’’ in establishing, implementing, and maintaining their ORFs. Although this notice identifies various sources of such standards and practices, including NIST, ISO, CIS, and FFIEC, the proposed rule does not further define or otherwise limit the scope of ‘‘generally accepted standards and best practices,’’ acknowledging that there are several sources of recognized standards currently relied on by covered entities and that standards and practices 78 As of July 31, 2023, twelve (12) entities were registered as FCMs but were not required to segregate any funds on behalf of customers. See CFTC, Financial Data for FCMs (July 31, 2023), available at https://www.cftc.gov/MarketReports/ financialfcmdata/index.htm. The Commission made clear in the adopting notice for the FCM RMP rule that it would expect that, prior to changing their business model to begin accepting customer funds, any registered FCM that does not currently accept customer funds would need to establish a risk management program that complies with Commission regulation 1.11 and file such program with the Commission and with the FCM’s designated self-regulatory organization (DSRO). See Final FCM RMP Rule, 78 FR 68517. 79 The Final FCM RMP rule, by contrast, could be viewed as more directly targeting the management of specific risks associated with operating as an FCM. E:\FR\FM\24JAP2.SGM 24JAP2 4714 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules are likely to evolve over time in response to changes in technology or emerging threats. Nevertheless, the Commission understands that, particularly in the United States, NIST and ISO standards are heavily relied on by covered entities and referenced by other regulators, making them widely recognized as the leading industry standards for cybersecurity and operational risk management. a. Should the Commission further define or otherwise limit what constitutes ‘‘generally accepted standards and best practices’’? Specifically, should the Commission require covered entities to follow NIST or ISO standards, as some commenters on the RMP ANPRM recommended? 80 Why or why not? Please explain. b. Are there any other standards or practices commonly relied on by covered entities that the Commission did not identify, directly or indirectly, in this notice? If so, please identify them and specify how they are currently relied on by covered entities. B. Governance—Proposed Paragraph (c) ddrumheller on DSK120RN23PROD with PROPOSALS2 The topic of governance has gained increased attention within the context of operational resilience, particularly with respect to the area of information and technology security. As of the date of this notice, NIST is undergoing a process to update the NIST CSF, and new governance outcomes are expected to feature prominently.81 Prudential regulators have also emphasized the role of effective governance to operational resilience.82 In the Commission’s view, the overall objective of an effective governance regime for an ORF should be the integration of operational resilience topics into existing reporting lines and operational structures, including the entity’s overall operational strategy, to ensure active executive engagement and oversight in the management of 80 See, e.g., R.J. O’Brien Letter, supra note 13, at 6 (‘‘The Commission should also seek to implement the [NIST CSF] as a part of its standard for managing and mitigating this area of risk. The NIST CSF is widely accepted throughout many different industries and would set a universal standard and best practices for registrants to follow.’’). 81 See NIST, NIST Cybersecurity Framework 2.0 Concept Paper: Potential Significant Updates to the Cybersecurity Framework at 10–11 (Jan. 19, 2023) (discussing how the update ‘‘will emphasize the importance of cybersecurity governance’’ by adding a new govern function); see also CRI, The Profile Workbook: Guidance for Implementing the CRI Profile v1.2.1 and Responding to its Diagnostic Statements at 16 (rev. Jan. 2023) (CRI Profile Workbook) (providing guidance on governance outcomes that have already been incorporated into the NIST CSF financial services sector profile). 82 See Prudential Operational Resilience Paper, supra note 11, at 3. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 operational risk that could challenge a covered entity’s operational resilience.83 1. Approval of Components—Proposed Paragraph (c)(1) Accordingly, to ensure that a covered entity’s senior leadership is involved in key decision-making around operational resilience, and is ultimately held accountable for implementation of the ORF, the proposed rule would require covered entities to have their senior leadership annually approve the ORF.84 In recognition of the wide variety of corporate structures represented among covered entities, however, the proposed rule would give covered entities broad flexibility and discretion to identify the appropriate senior-level individual or body to provide such approval. Specifically, paragraph (c)(1) of the proposed rule would require that each ORF component program or plan required by paragraph (b)(2) of the proposed rule is approved in writing, on at least an annual basis, by either the senior officer, an oversight body, or a senior-level official of the covered entity.85 The term ‘‘oversight body’’ itself would be broadly defined to encompass any board, body, or committee of a board or body of the covered entity specifically granted the authority and responsibility for making strategic decisions, setting objectives and overall direction, implementing policies and procedures, or overseeing the management of operations for the covered entity.86 Consistent with Commission regulation 3.1(j), ‘‘senior officer’’ would mean the chief executive officer or other equivalent officer of the covered entity.87 As an example, under the proposed rule, a covered entity could elect to have its information and technology security program annually approved by its chief executive officer, its chief information security officer, or a committee with oversight authority over information and technology 83 See BCBS Operational Resilience Principles, supra note 11, at 4 (‘‘Principle 1: Banks should utilise their existing governance structure to establish, oversee and implement an effective operational resilience approach that enables them to respond and adapt to, as well as recover and learn from, disruptive events in order to minimise their impact on delivering critical operations through disruption.’’) (internal citation omitted). 84 See paragraph (c)(1) of proposed Commission regulations 1.13 and 23.603. 85 Id. 86 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘oversight body’’). 87 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘senior officer’’). See also 17 CFR 3.1(j) (defining ‘‘senior officer’’). PO 00000 Frm 00010 Fmt 4701 Sfmt 4702 security.88 Again, the intention behind offering this flexibility is to ensure that covered entities would be able to rely on and incorporate operational resilience into their existing governance structures when complying with the proposed ORF rule, while ensuring that each component program or plan would be approved by an individual or group of individuals with senior-level responsibilities and authority. 2. Risk Appetite and Risk Tolerance Limits—Proposed Paragraph (c)(2) The proposed rule would further require covered entities to establish and implement appropriate risk appetite and risk tolerance limits with respect to the three risk areas enumerated in paragraph (b)(1) (information and technology security, third-party relationships, and emergencies or other significant disruptions to the continuity of normal business operations).89 Although the terms ‘‘risk appetite’’ and ‘‘risk tolerance’’ are sometimes used interchangeably, the Commission intends the terms to have distinct meanings within the context of the proposed rule. Specifically, in the context of the proposed rule, ‘‘risk appetite’’ would mean the aggregate amount of risk a covered entity is willing to assume to achieve its strategic objectives.90 Risk appetite is typically documented through a risk appetite statement, which establishes qualitative and quantitative measures designed to help identify when risk appetite has been exceeded and what appropriate mitigating strategies that can be taken.91 88 Other possible senior-level officials could be the covered entity’s chief risk officer or chief operating officer, as appropriate. 89 See paragraph (c)(2)(i) of proposed Commission regulations 1.13 and 23.603. See also paragraph (b)(1) of proposed Commission regulations 1.11 and 23.603 (identifying the risk areas proposed to be covered by the ORF). 90 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘risk appetite’’). See also 12 CFR part 30, app. D, I.E.10 (Definitions) (defining ‘‘risk appetite’’ as the aggregate level and types of risk the board of directors and management are willing to assume to achieve a covered bank’s strategic objectives and business program, consistent with applicable capital, liquidity, and other regulatory requirements); Prudential Operational Resilience Paper, supra note 11, at 14 (defining ‘‘risk appetite’’ as ‘‘[t]he aggregate level and types of risk the board and senior management are willing to assume to achieve a firm’s strategic business objectives, consistent with applicable capital, liquidity, and other requirements and constraints’’); BCBS Operational Resilience Principles, supra note 11, at 3, n.7 (defining ‘‘risk appetite’’ as ‘‘the aggregate level and types of risk a bank is willing to assume, decided in advance and within its risk capacity, to achieve its strategic objectives and business program’’). 91 See 12 CFR part 30, app. D (requiring covered financial institutions to have a comprehensive written risk appetite statement). See also CRI Profile E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 With its proposed definition of ‘‘risk tolerance limit,’’ the Commission intends to capture a more focused measure of acceptable risk. Specifically, ‘‘risk tolerance limit’’ would mean the amount of risk, beyond its risk appetite, that a covered entity is prepared to tolerate through mitigating actions.92 Thus, risk tolerance limits assume a particular type of risk has materialized (e.g., an operational disruption has occurred) and identify the amount of disruption a firm is prepared to tolerate beyond its risk appetite.93 Risk tolerance limits are also more likely to be measured in quantitative terms (e.g., number of hours a particular system or application is down).94 As with each component ORF program or plan, the proposed rule would require that a covered entity’s risk appetite and risk tolerance limits be reviewed and approved in writing on at least an annual basis by either the senior officer, an oversight body, or a seniorWorkbook, supra note 78, at 16 (‘‘Risk appetite statements define certain risk tolerance metrics that help describe systems and services that the organization may consider high-risk.’’). 92 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘risk tolerance limit’’). See also Prudential Operational Resilience Paper, at 3, n. 11; 14 (defining ‘‘tolerance for disruption’’ as ‘‘determined by a firm’s risk appetite for weathering disruption from operational risks considering its risk profile and the capabilities of its supporting operational environment’’ and ‘‘informed by existing regulations and guidance and by the analysis of a range of severe but plausible scenarios that would affect its critical operations and core business lines.’’); CRI Profile Workbook at 291 (stating that ‘‘risk tolerance’’ ‘‘reflects the acceptable variation in outcomes related to specific performance measures linked to objectives the entity seeks to achieve’’). ISACA, Risk IT Framework, 2nd Ed. (July 27, 2020) (defining ‘‘risk tolerance’’ as ‘‘the acceptable deviation from the level set by the risk appetite and business objectives’’). 93 The Commission recognizes that Commission regulations 1.11 and 23.600 incorporate the term ‘‘risk tolerance limits.’’ See 17 CFR 1.11(e)(1), 17 CFR 23.600(c)(1). As proposed to be defined in the ORF rule, however, ‘‘risk tolerance limits’’ would be limited to the context of the risks identified in paragraph (b)(1) of the proposed rule and associated disruptions. Accordingly, if adopted, the defined use of the term ‘‘risk tolerance limit’’ in the proposed rule would not be intended to affect how covered entities use or interpret the term in the context of the Commission’s RMP rules. 94 The Commission believes its proposed definitions are in line with proposed definitions of ‘‘risk appetite’’ and ‘‘risk tolerance’’ used by NIST. For example, in NIST Interagency or Internal Report 8286 (NIST IR 8286), NIST explains that a statement of risk appetite might be that ‘‘[e]mail shall be available during the large majority of a 24-hour period,’’ while the associated risk tolerance would be narrower, stating something like ‘‘[e]mail services shall not be interrupted more than five minutes during core hours.’’ See NIST IR 8286 at 5–6 (Oct. 2020). Accordingly, any existing risk appetite and risk tolerance limits established by covered entities pursuant to NIST or prudential regulator standards would be considered consistent with the proposed rule. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 level official of the covered entity.95 This proposed requirement is intended to ensure that the risk appetite and risk tolerance limits are consistent with the covered entity’s operational strategy and objectives, as established by senior leadership, and that senior leadership is involved in, and ultimately held accountable for, how operational risks faced by the covered entity are internalized by the covered entity. The setting and approval of risk appetite and risk tolerance limits for operational risk is a well-recognized key component of effective governance and oversight.96 The Commission therefore preliminarily believes the setting and approval of risk appetite and risk tolerance limits for operational risks captured by the ORF would be helpful to ensuring effective governance and oversight of the ORF. Specifically, the Commission believes that the process of identifying appropriate risk appetite and risk tolerance limits would have a disciplining effect, encouraging covered entities to think critically about the risks they face and their ability to comfortably manage them without incurring intolerable harm to themselves or their customers or counterparties. The Commission further believes that operating within set risk appetite and risk tolerance limits would help support a culture where senior leaders at covered entities can make more informed decisions about the risks they are willing to take and the mitigation measures they would need to employ to manage these risks, which would further support operational resilience. 3. Internal Escalations—Proposed Paragraph (c)(3) To further ensure that senior leadership remains involved in and accountable for the ORF as it is implemented, the proposed rule would require either the senior officer, an oversight body, or a senior-level official of the covered entity to be notified of: (i) circumstances that exceed the risk tolerance limits established pursuant to 95 See paragraph (c)(2)(ii) of proposed Commission regulations 1.13 and 23.603. 96 See, e.g., BCBS Operational Resilience Principles, supra note 11, at 4 (‘‘The board of directors should review and approve the bank’s operational resilience approach considering the bank’s risk appetite and tolerance for disruption to its critical operations. In formulating the bank’s tolerance for disruption, the board of directors should consider the bank’s operational capabilities given a broad range of severe but plausible scenarios that would affect its critical operations. The board of directors should ensure that the bank’s policies effectively address instances where the bank’s capabilities are insufficient to meet its stated tolerance for disruption.’’); CRI Profile v1.2, supra note 74. PO 00000 Frm 00011 Fmt 4701 Sfmt 4702 4715 paragraph (c)(2)(i) of the proposed rule; and (ii) incidents that require notification to the Commission, customers, or counterparties under the proposed rule, as further discussed in subsequent sections of this notice.97 The Commission believes that circumstances that would push a covered entity outside of its risk tolerance limits or trigger a Commission notification requirement would be extraordinary, non-business-as-usual events, and would likely require the involvement of senior leadership to direct responsive actions to preserve or mitigate damage to operational resilience and prevent situations of intolerable harm. Ensuring that appropriate senior leadership, as determined by the covered entity, is apprised of instances where expected risk tolerance limits have been exceeded would further help senior leadership determine whether the risk appetite and risk tolerance limits are appropriately calibrated and whether identified mitigation strategies are working, creating opportunities to update either as necessary. 4. Consolidated Program or Plan— Proposed Paragraph (c)(4) The Commission is aware that many covered entities function as a division or affiliate of a larger entity or holding company structure; and that, in such instances, operational risks stemming from information and technology security, third-party relationships, and emergencies or other significant disruptions are generally monitored and managed at the enterprise level to address the risks holistically and to achieve economies of scale.98 The proposed rule recognizes the benefits of such a consolidated approach and is not intended to interfere with covered entities’ operational structures. Accordingly, the proposed rule would allow covered entities to satisfy the component program or plan requirement in paragraph (b)(2) through its participation in a consolidated program or plan, provided the consolidated program or plan meets the 97 See paragraph (c)(3) of proposed Commission regulations 1.13 and 23.603. See also paragraphs (i) and (j) of proposed Commission regulations 1.13 and 23.603, discussed in section II.G of this notice, infra. 98 In responding to the RMP ANPRM, several commenters noted how cybersecurity risk is generally managed at the enterprise level and should not be managed at the level of the entity regulated by the Commission. See FIA Letter at 11 (Sept. 18, 2023); International Swaps and Derivatives Association, Inc. (‘‘ISDA’’) and the Securities Industry and Financial Markets Association (‘‘SIFMA’’) Letter at 9 (Sept. 18, 2023). E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 4716 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules requirements of the proposed rule.99 As defined in the proposed rule, a ‘‘consolidated program or plan’’ would mean any information and technology security program, third-party relationship program, or business continuity and disaster recovery plan in which a covered entity participates with one or more affiliates and is managed and approved at the enterprise level.100 Nevertheless, the Commission does have a strong regulatory interest in ensuring that operational shocks, such as cyber incidents or technological failures, having an impact on the discrete interests and operations of the covered entity are appropriately considered through the unique lens of the covered entity, which is regulated by the Commission. Accordingly, for a covered entity to satisfy the component program or plan requirement through its participation in a consolidated program or plan, the consolidated program or plan would need to meet the requirements of the proposed rule, as discussed in this notice. Those requirements include the establishment of appropriate risk appetite and risk tolerance limits that address the covered entity, as well as testing and other requirements, as discussed further below. With respect to the requirements in proposed paragraphs (c)(1) and (c)(2)(i) that senior leadership of the covered entity approve, respectively, the component program or plan and the risk appetite and risk tolerance limits at least annually, the Commission recognizes that such a requirement might be challenging in the context of a consolidated program or plan, which is likely to address matters related to affiliates that are not within the scope of knowledge or responsibility of the covered entity. Accordingly, the proposed rule would allow covered entities relying on a consolidated program or plan to satisfy the approval requirements in paragraphs (c)(1) and (c)(2)(i) of the proposed rule, provided that either the senior officer, an oversight body, or a senior-level official of the covered entity attests in writing, on at least an annual basis, that the consolidated program or plan meets the requirements of this section and reflects the risk appetite and risk tolerance limits appropriate to the covered 99 See paragraph (c)(4)(i) of proposed Commission regulations 1.13 and 23.603. 100 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘consolidated program’’). Again, the specific definitions and minimum requirements of each program are discussed in sections II.C, II.D, and II.E of this notice, infra. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 entity.101 Notably, the senior officer, an oversight body, or a senior-level official at the covered entity would still need to be notified when the risk appetite and risk tolerance limits related to the covered entity are exceeded.102 The Commission believes that such an attestation requirement would promote efficiency by allowing covered entities to continue to rely on an enterpriselevel ORF and governance structures that have acknowledged benefits while also ensuring that such enterprise-level ORF appropriately addresses the risks specific to the covered entity, and would ensure that the requirements of the Commission’s proposed rule are addressed for those covered entities in the same way as they would for a covered entity that is not a part of a larger enterprise.103 5. Request for Comment The Commission invites comment on all aspects of the proposed governance requirements for the ORF, including the following questions: 1. Governance structures. The proposed rule is intended to provide covered entities sufficient flexibility to integrate the proposed operational resilience requirements into existing reporting lines and operational structures, as well as to select the individual or body with senior-level responsibilities and authority to approve the component programs or plans of the ORF. Does the proposed rule accomplish this goal? If not, what other governance structure(s) should the Commission consider? Alternatively, should the Commission consider a more prescriptive, bright-line approach where only the senior officer or board of directors of the covered entity may provide any approvals required under the proposed rule? Please explain. 2. Internal escalations. The proposed rule would require that the senior officer, an oversight body, or other senior-level official(s) of the covered entity be notified of circumstances that exceed risk tolerance limits or that require reporting to the Commission or counterparties or customers under the 101 See paragraph (c)(4)(ii) of proposed Commission regulations 1.13 and 23.603. 102 See paragraph (c)(3)(i) of proposed Commission regulations 1.13 and 23.603. 103 The Commission also believes this approach would be consistent with NFA’s current interpretive notice on ISSPs. See NFA ISSP Notice, supra note 43 (‘‘[T]o the extent a Member firm is part of a holding company that has adopted and implemented privacy and security safeguards organization-wide, then the Member firm can meet its supervisory responsibilities imposed by Compliance Rules 2–9, 2–36 and 2–49 to address the risks associated with information systems through its participation in a consolidated entity ISSP.’’). PO 00000 Frm 00012 Fmt 4701 Sfmt 4702 proposed rule. Should the Commission require internal escalation to any other specific personnel or under any other circumstances? Please identify and explain why. 3. Consolidated program or plan. The proposed rule would allow covered entities relying on a consolidated program or plan to satisfy certain governance requirements by requiring the senior officer, an oversight body, or another senior-level official of the covered entity to attest in writing, on at least an annual basis, that the consolidated program or plan meets the requirements of the rule and reflects a risk appetite and risk tolerance limits appropriate to the covered entity. Is this standard workable for covered entities that function as a division or affiliate of a larger entity or holding company? Why or why not? Do such covered entities typically set their own risk appetite and risk tolerance limits, or are setting such limits conducted at the enterprise level? If they are set at the enterprise level, how is senior leadership of the covered entity typically involved in setting risk appetite and risk tolerance limits? C. Information and Technology Security Program—Proposed Paragraph (d) As mentioned above, the proposed rule would require each covered entity’s ORF to include an information and technology security program, defined as a written program reasonably designed to identify, monitor, manage, and assess risks relating to information and technology security and that meets the minimum requirements for the program, as set forth in the proposed rule and discussed below.104 The proposed rule would define ‘‘information and technology security’’ as the preservation of (a) the confidentiality, integrity, and availability of covered information and (b) the reliability, security, capacity, and resilience of covered technology.105 ‘‘Covered information’’ would be defined to mean any sensitive or confidential data or information maintained by a covered entity in connection with its business activities as a covered entity.106 ‘‘Covered technology’’ would be defined to mean any application, device, information technology asset, network service, 104 See paragraph (d) of proposed Commission regulations 1.13 and 23.603. See also paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘information and technology security program’’). 105 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘information and technology security’’). 106 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘covered information’’). E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules system, and other information-handling component, including the operating environment, that is used by a covered entity to conduct its business activities, or to meet its regulatory obligations, as a covered entity.107 The proposed definition of ‘‘covered information’’ is intended to focus the requirements of the ORF on protecting data and information that are sensitive or otherwise intended to be kept confidential, whether by law or for business purposes. Notably, such data and information would include position, order, and account information, all of which covered entities have an obligation to keep confidential and which if made public could result in harm to customers, counterparties, or the markets more broadly. Often referred to as the ‘‘CIA triad,’’ confidentiality, integrity, and availability represent the three pillars of information security: preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information; guarding against the improper modification or destruction of data and information, ensuring its authenticity; and ensuring the timely and reliable access to and use of information.108 The Commission therefore believes that compromising any aspect of the CIA triad with respect to covered information would have meaningful consequences for customers, counterparties, the covered entity, or even the market. The proposed definition of ‘‘information and technology security’’ is likewise intended to ensure that the ORF is designed to address risks to two key facets of a covered entities’ business for which they are registered with the Commission: the technology they use to conduct their regulated business activities and the sensitive information stored or transmitted therein. The proposed definition of ‘‘covered technology’’ is sufficiently broad to capture all types of technology (and related components) but is tailored to focus on the technology that is used by covered entities in the context of their regulated business activities, such that its disruption would have an impact on regulated business activities. The Commission preliminarily believes that reliability, security, capacity, and resilience are all key attributes of covered technology that must be 107 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘covered technology’’). 108 See NIST, SP 1800–26, Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events (Dec. 2020) (discussing the CIA triad). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 4717 preserved for it to function as intended without posing a disruption to operations. Accordingly, the Commission believes that having a program designed to preserve the confidentiality, integrity, and availability of covered information and the reliability, security, capacity, and resilience of covered technology is key to ensuring operational resilience. Under the proposed rule, each covered entity’s information and technology security program would need to meet the (b)(3) standard, i.e., be appropriate and proportionate to the nature, size, scope, complexities and risk profiles of the covered entity’s business activities, following generally accepted standards and best practices.109 The proposed rule would nevertheless establish certain minimum requirements for the information and technology security program, including a periodic risk assessment, effective controls, and an incident response plan. Each proposed minimum requirement is discussed in turn below. NIST, the purpose of a risk assessment is to inform decision makers and support risk responses by identifying: (i) relevant threats to organizations or threats directed through organizations against other organizations; (ii) vulnerabilities both internal and external to organizations; (iii) impact (i.e., harm) to organizations that may occur given the potential for threats exploiting vulnerabilities; and (iv) the likelihood that harm will occur.112 Given this broad and important purpose, the Commission believes conducting a comprehensive risk assessment would be reasonably necessary for covered entities to have a thorough understanding of their information and technology security risks, including the types of threats the covered entities face, internal and external vulnerabilities, the impact of such risks, and their relative priorities, to guide mitigation efforts. As stated, the risk assessment would need to identify, assess, and prioritize risks to information and technology security.113 In broad terms, the 1. Risk Assessment—Proposed Commission anticipates that conducting Paragraph (d)(1) the assessment could first involve taking As part of the information and an inventory of covered technology and technology security program, covered then identifying and assessing the entities would be required to conduct likelihood and potential impact of and document the results of a periodic reasonably foreseeable threats and and comprehensive risk assessment vulnerabilities to information and reasonably designed to identify, assess, technology security (i.e., to the and prioritize risks to information and confidentiality, integrity, and technology security.110 Risk assessments availability of covered information, or to are widely recognized as a necessary the reliability, security, capacity or and effective first step to monitoring resilience of covered technology) in and managing risks to information and light of the existing operational technology security.111 According to environment. Identified threats and vulnerabilities could derive from a wide 109 See paragraph (b)(3) of proposed Commission array of sources, including both external regulations 1.13 and 23.603. 110 See paragraph (d)(1)(i) proposed Commission cyber threats and internal gaps in regulations 1.13 and 23.603. existing systems or controls. 111 See, e.g., ISO/IEC 27001:2022, supra note 48 The Commission would then expect (requiring a risk assessment to help organizations the risks to be prioritized in light of the identify, analyze, and evaluate weaknesses in their covered entity’s stated risk appetite and information systems); ISO/IEC 31010:2019, Risk management: Risk assessment techniques (July 2, risk tolerance limits to help direct 2019); NIST, SP 800–39, Managing Information resources and other activities in order to Security Risk: Organization, Mission, and best support information and Information System View at 37 (Mar. 2011) (NIST SP 800–39) (‘‘Risk assessment identifies, prioritizes, technology security. If the proposal is and estimates risk to organizational operations (i.e., adopted as final, the Commission would mission, functions, image, and reputation), expect covered entities to use the results organizational assets, individuals, other of each risk assessment as a basis for organizations, and the Nation, resulting from the designing, implementing, and refining operation and use of information systems. Risk assessments use the results of threat and other elements of its information and vulnerability assessments to identify and evaluate technology security program, including risk in terms of likelihood of occurrence and potential adverse impact (i.e., magnitude of harm) to organizations, assets, and individuals.’’); NIST, SP 800–30, Guide for Conducting Risk Assessments, Rev. 1, at ix (Sept. 2012) (NIST SP 800–30) (‘‘Risk assessments are a key part of effective risk management and facilitate decision making . . .’’). See also 12 CFR part 30, app. B (establishing a requirement to assess risk by identifying reasonably foreseeable threats, assessing the likelihood and potential damage of the threats, and assessing the sufficiency of arrangements to control risks); PO 00000 Frm 00013 Fmt 4701 Sfmt 4702 Prudential Operational Resilience Paper, supra note 11, at 4 (‘‘The firm’s operational risk management function implements and maintains risk identification and assessment approaches that adequately capture business processes and their associated operational risks, including technology and third-party risks.’’). 112 See NIST SP 800–30 at 1. 113 See paragraph (d)(1)(i) proposed Commission regulations 1.13 and 23.603. E:\FR\FM\24JAP2.SGM 24JAP2 4718 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 but not limited to, the development of controls, testing protocols, and the incident response plan, as discussed further below.114 In this way, a wellconducted risk assessment should support the development of a more rational, effective, and valuable information and technology security framework, especially as the assessment is repeated and built upon over time. The proposed rule would not prescribe a specific process or methodology for the risk assessment, but the risk assessment would need to be consistent with the proposed (b)(3) standard.115 Following generally accepted standards and best practices, covered entities would need to implement processes and methodologies that ensure the risk assessment reflects the nature, size, scope, complexities, and risk profile of its business activities as a covered entity. Any such processes or methodologies should also be sufficient to identify, assess, and prioritize risks to information and technology security and to evaluate their potential impact on covered technology and covered information.116 To ensure that the risk assessment is conducted objectively, the proposal would require that the personnel involved in conducting the assessment are not responsible for the development or implementation of the covered technology or related controls.117 Such personnel could be employees of the covered entity, an affiliated entity, or a third-party service provider. To ensure that senior leadership is aware of risks to information security, and can appropriately prioritize them within the covered entity’s broader strategy and risk management framework, the proposed rule would expressly require that the results of the risk assessment be provided to the senior officer, oversight body, or other senior-level official who approves the information and technology security program upon the risk assessment’s completion.118 The 114 See NIST SP 800–39 at 34 (‘‘Information generated during the risk assessment may influence the original assumptions, change the constraints regarding appropriate risk responses, identify additional tradeoffs, or shift priorities.’’). 115 See paragraph (b)(3) of proposed Commission regulations 1.13 and 23.603, discussed supra. The Commission is aware of several sources for industry standards and best practices regarding information security risk assessments. See, e.g., NIST SP 800– 39; see also FFIEC Information Security Booklet, supra note 69. 116 See paragraph (d)(1)(i) of proposed Commission regulations 1.13 and 23.603. 117 See paragraph (d)(1)(ii) of proposed Commission regulations 1.13 and 23.603. 118 See paragraph (d)(1)(iii) of proposed Commission regulations 1.13 and 23.603. See also NIST SP 800–30, supra note 111, at 1 (‘‘The VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 Commission believes the results of the risk assessment would be key information for senior leadership in determining whether to approve an information and technology security program. The proposed rule would require that the covered entity conduct the risk assessment at a frequency consistent with the (b)(3) standard (i.e., a frequency appropriate and proportionate to the nature, scope, and complexities of its business activities as a covered entity, following generally accepted standards and best practices) but, in any case, no less frequently than annually.119 Given the rapidly evolving nature of technological developments and related threats, the Commission preliminarily believes that a uniform requirement to conduct a risk assessment on at least an annual basis would support the development of a strong, foundational level of information and technology security across the industry, thereby mitigating the overall threat of systemic risk. However, the Commission understands that generally accepted standards and best practices may encourage more frequent risk assessments for covered entities that engage in broader or more complex business activities and would expect covered entities to conduct risk assessments more frequently if the circumstances so require. As mentioned above, the proposed rule would allow covered entities to satisfy the requirement to have an information and technology security program through its participation in a consolidated information and technology security program.120 Accordingly, such covered entities would be allowed to rely on a risk assessment that is conducted at an enterprise level. In such cases, the Commission would expect that the covered entities review the program and supporting policies and procedures for conducting the risk assessment to ensure it captures and assesses the risks to the covered entity consistent with the proposed rule so as to support the related attestation requirement.121 2. Effective Controls—Proposed Paragraph (d)(2) The proposed rule would require that the information and technology security program establish, document, purpose of risk assessments is to inform decision makers and support risk responses . . .’’). 119 See paragraph (d)(1)(ii) of proposed Commission regulations 1.13 and 23.603. 120 See paragraph (c)(4)(i) of proposed Commission regulations 1.13 and 23.603. 121 See paragraph (c)(4)(ii) of proposed Commission regulations 1.13 and 23.603. PO 00000 Frm 00014 Fmt 4701 Sfmt 4702 implement, and maintain controls reasonably designed to prevent, detect, and mitigate identified risks to information and technology security.122 An essential component of any information and technology security program, and a critical component of a covered entity’s overall ORF, controls (also referred to as ‘‘countermeasures’’ or ‘‘safeguards’’) include any measures (actions, devices, procedures, techniques) designed to promote information and technology security.123 The selection, design, and implementation of controls can therefore have significant implications for a covered entity’s information and technology security and overall operational resilience.124 Accordingly, the Commission believes effective controls would be a critical component of a covered entity’s overall ORF. Although the proposed rule would not mandate that covered entities implement specific controls, it would require covered entities to consider, at a minimum, certain categories of controls, discussed below, and adopt those consistent with the (b)(3) standard.125 If the proposal is adopted as final, the Commission would further expect that a particular covered entity’s determination of which controls to implement would be guided by the results of its risk assessment, considering the covered entity’s risk appetite and risk tolerance limits.126 122 See paragraph (d)(2) of proposed Commission regulations 1.13 and 23.603. 123 See Committee on Payments and Market Infrastructures (CPMI), IOSCO, Guidance on cyber resilience for financial market infrastructures at 7 (Jun. 2016) (CPMI IOSCO Cyber Resilience Guidance) (noting that a strong information and communications technologies control environment is a fundamental and critical component of overall cyber resilience). See also NIST SP 800–53, supra note 46, at 8 (‘‘Controls can be viewed as descriptions of the safeguards and protection capabilities appropriate for achieving the particular security and privacy objectives of the organization and reflecting the protection needs of organizational stakeholders. Controls are selected and implemented by the organization in order to satisfy the system requirements. Controls can include administrative, technical, and physical aspects.’’); ISO/IEC 27001:2022, supra note 48, Annex A (Information security management systems) (providing guidelines for 93 objectives and controls). 124 See Prudential Operational Resilience Paper, supra note 11, at 8 (identifying as a sound practice for operational resilience routinely applying and evaluating the effectiveness of processes and controls to protect confidentiality, integrity, availability, and overall security of data and information systems). 125 See paragraphs (d)(2)(i)–(xii) of proposed Commission regulations 1.13 and 23.603 (identifying categories of controls for covered entities to consider). See also paragraph (b)(3) of proposed Commission regulations 1.13 and 23.603. 126 See paragraph (c)(2) of proposed Commission regulations 1.13 and 23.603 (requiring covered E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 Adopted controls would also need to address risks to information and technology security identified through other means, including outcomes of continuous monitoring of threats and vulnerabilities, actual and attempted cyber-attacks, threat intelligence, scenario analysis, and the likelihood and realistic impact of such attacks. In other words, the controls would need to be linked to and address the identified and prioritized risks to information and technology security. The Commission would advise covered entities to document their consideration of controls within each of the enumerated categories and their reasoning for adopting specific controls within any given category, or for declining to adopt any controls within a particular category. Further, the Commission would expect those controls to be reviewed and revised as needed to reflect the results of the covered entity’s most recent risk assessment. The specific categories of controls the Commission would require covered entities to consider under the proposed rule include: access controls; access restrictions; encryption; dual control procedures,127 segregation of duties, and background checks; change management practices; system development and configuration management practices; flaw remediation; measures to protect against destruction, loss, or damage to covered information; monitoring systems and procedures to detect attacks or intrusions; response programs; and measures to promptly recover and secure any compromised covered information.128 The Commission preliminarily believes that these categories of controls collectively represent a comprehensive array of controls for ensuring the information and technology security. Access controls, access restrictions, encryption, and background checks would limit access to covered technology and covered information to individuals with a legitimate business need in both physical and digital environments. Dual control procedures, segregation of duties, procedures entities to establish and implement risk appetite and risk tolerance limits). 127 Dual control procedures refer to a technique that requires two or more separate persons, operating together, to protect sensitive data and information. Both persons are equally responsible for protecting the information and neither can access the information alone. See Interagency Guidelines Establishing Standards for Safeguarding Customer Information and Rescission of Year 2000 Standards for Safety and Soundness, 66 FR 8616, 8622 (Feb. 1, 2001) (Interagency Guidelines Safeguarding Customer Information). 128 See paragraphs (d)(2)(i)–(xi) of proposed Commission regulations 1.13 and 23.600. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 relating to modifications to covered technology, and measures to protect against destruction, loss, or damage to covered information, would support the integrity and availability of covered information from accidental or intentional damage or disclosure to unauthorized recipients. Change management practices would ensure that the information and technology security program, and associated controls, continue to operate as intended over time as systems and processes are updated. Systems development, configuration management, and flaw remediation practices would operate to ensure the integrity and availability of covered technology throughout any updates to covered technology or following a vulnerability analysis.129 Measures to protect against destruction of covered information due to environmental hazards would further ensure that covered information remains available even following a physical disruption. Monitoring systems and procedures, response programs, and measures to promptly recover and secure any compromised covered information would serve to detect unauthorized access to covered information and to recover it if the covered entity’s access to the covered information were impaired (e.g., through a ransomware attack). The proposed rule is modeled after an approach adopted by prudential regulators. Since the early 2000s, prudential regulators have required financial institutions to consider a similar list of categories of controls when designing their information security programs.130 In adopting their list of categories, prudential regulators described them as designed to control identified risks and to achieve the overall objective of ensuring the security and confidentiality of customer information.131 Prudential regulators further emphasized that the categories were broad enough to be adapted by institutions of varying sizes, scope of operations, and risk management structures, such that the manner of 129 Based on its experience, the Commission further believes that that failures in change management, systems development, and vulnerability patching practices are common sources of disruption among financial institutions and are often neglected control areas. 130 See Interagency Guidelines Safeguarding Customer Information, 66 FR 8616; see also 12 CFR part 30, app. B. The guidelines were expanded and retitled, ‘‘Interagency Guidelines Establishing Information Security Standards’’ in 2004, see Proper Disposal of Consumer Information Under the Fair and Accurate Credit Transactions Act of 2003, 69 FR 77610 (Dec. 28, 2004). 131 See Interagency Guidelines Safeguarding Customer Information, 66 FR 8621. PO 00000 Frm 00015 Fmt 4701 Sfmt 4702 4719 implementing the guidelines would vary from institution to institution.132 Given that the list of control categories developed by prudential regulators, many of which are included in the Commission’s proposed rule, has a longstanding history of being effective and adaptable to the financial industry at large, the Commission preliminarily believes that incorporating a similar approach with respect to covered entities would also further the Commission’s intent to adopt a flexible rule that can be tailored to each individual covered entity and adapted over time to respond to changing threat environments and risk profiles.133 3. Incident Response Plan—Proposed Paragraph (d)(3) The proposed rule would require that the information and technology security program include a written incident response plan that is reasonably designed to detect, assess, contain, mitigate the impact of, and recover from an incident.134 A hallmark of operational resilience is the recognition that although meaningful steps can be taken to prevent and deter risks to information and technology security, such risks may never be entirely eliminated.135 As the ION incident illustrated, quick and complete recovery of covered technology and operations may be key to mitigating the potential systemic impact to the financial markets. Accordingly, a crucial aspect of any information and technology security program, and therefore any ORF, is having a plan to respond to and recover from events that may create risks to information and technology security.136 132 Commenters further supported the level of detail, see id. at 8622. 133 NIST has compiled a comprehensive catalog of security and privacy controls for all types of computing platforms, including general purpose computing systems, cyber-physical systems, cloud systems, mobile systems, and Internet of Things (IoT) devices. See NIST SP 800–53, supra note 123. 134 See paragraph (d)(3) of proposed Commission regulations 1.13 and 23.603. The Commission is aware that some covered entities may have established an incident response plan as a separate document or as an attachment to another plan, such as a BCDR plan. If the proposed rule is adopted, the Commission would be agnostic as to where a covered entity elects to house its incident response plan provided it otherwise meets the requirements of the proposed rule, including recordkeeping, furnishing it to the Commission upon request, and distributing it to personnel. 135 See BCBS Operational Resilience Principles, supra note 12, at 1 (stating that, in recognition that ‘‘the range of potential hazards cannot be prevented,’’ the focus should be on ‘‘the ability of banks to withstand, adapt to and recover from potential hazards and thereby mitigate potentially severe adverse impacts’’). 136 See, e.g., BCBS Operational Resilience Principles at 7, n.18 (‘‘The goal of incident E:\FR\FM\24JAP2.SGM Continued 24JAP2 4720 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 The Commission believes, therefore, that an effective incident response plan would help covered entities minimize the potential impact to their operations and customers or counterparties when negative events occur, facilitating their recovery as swiftly and successfully as possible.137 It can also assist in securing against the destruction or theft of sensitive and important confidential customer or counterparty information, which could have a very real impact on their business and assets. For purposes of the proposed rule, ‘‘incident’’ would be defined as any event, occurrence, or circumstance that could jeopardize information and technology security, including if it occurs at a third-party service provider.138 The purpose of the incident response plan is to identify and classify foreseeable types of incidents and to establish steps to detect, assess, contain, mitigate the impact of, and recover from incidents. The Commission’s proposed definition of ‘‘incident’’ is intentionally broad to ensure that the incident response plan would address any event that could reasonably jeopardize (i.e., endanger or put at risk) information and technology security, even if that danger never materializes or the incident response plan is otherwise successful at preventing or reversing the danger. As defined in the proposed rule, ‘‘incident’’ is broad enough to cover various types of risks to covered technology (e.g., disruption or modification) or covered information (e.g., disclosure or destruction), regardless of the source (e.g., external threat actor or internal staff, physical or electronic) or whether the event was accidental or malicious in management is to limit the disruption and restore critical operations in line with the bank’s risk tolerance for disruption.’’). See also FFIEC Information Security Booklet, supra note 69, 50–51 (‘‘containing the incident, coordinating with law enforcement and third parties, restoring systems, preserving data and evidence, providing assistance to customers, and otherwise facilitating operational resilience’’); NIST, SP 800–184, Guide for Cybersecurity Event Recovery (Dec. 2016) (NIST SP 800–184) (‘‘evaluate the potential impact, planned response activities, and resulting recovery processes long before an actual cyber event takes place’’); CIS, Incident Response Policy Template: Critical Security Controls (Mar. 8, 2023) at 4 (‘‘The primary goal of incident response is to identify threats on the enterprise, respond to them before they can spread, and remediate them before they can cause harm.’’) (CIS Incident Response Template). 137 See FFIEC, CAT at 52 (May 2017) (‘‘The incident response plan is designed to ensure recovery from disruption of services, assurance of data integrity, and recovery of lost or corrupted data following a cybersecurity incident’’); CPMI IOSCO Cyber Resilience Guidance, supra note 123, at 16 (recognizing the incident response plan enables the business ‘‘to resume critical operations rapidly, safely and with accurate data’’). 138 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘incident’’). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 nature, since intent may not be readily determined at the outset of an incident. Common examples of incidents would include unauthorized access to a system or data; unauthorized changes to system hardware, software, or data; or a failure of controls that could, if not addressed, endanger information and technology security. Consistent with the general framework for the ORF as a whole, the proposal would require the incident response plan to meet certain minimum requirements.139 In broad terms, these requirements focus on identifying persons relevant to an incident response (i.e., personnel involved in responding to the incident and persons who should be notified of such incidents) and how and when they should be involved; documenting the nature of the covered entity’s response; and remediating any weaknesses that lead to the incident.140 The Commission believes that clearly identifying parties who would be involved in incident response, including external parties like thirdparty service providers and law enforcement, and establishing associated roles and responsibilities would help ensure that incidents are: (1) resolved in a timely manner and by appropriate personnel; (2) adequately resourced financially, operationally, and staffing-wise; and (3) disclosed to appropriate persons either within senior leadership of the covered entity or externally, where required.141 The process of documenting incidents and management’s response, as well as any subsequent remediation efforts, would assist with any related reporting obligations and required information sharing, as well as with subsequent testing of the incident response plan or post-mortem analysis, which would potentially lead to adjustments in subsequent risk assessments and provide lessons learned that could serve to help prevent the occurrence of incidents in the future.142 Among these minimum requirements for the incident response plan is the need for it to include escalation protocols, i.e., a process of identifying 139 See paragraphs (d)(3)(i)–(vi) of proposed Commission regulations 1.13 and 23.603. 140 See id. 141 See also NIST SP 800–61 (‘‘It is important to identify other groups within the organization that may need to participate in incident handling so that their cooperation can be solicited before it is needed. Every incident response team relies on the expertise, judgment, and abilities of others . . .’’). 142 See NIST SP 800–184, supra note 132; CIS Incident Response Template, supra note 136, at 4 (‘‘Without understanding the full scope of an incident, how it happened, and what can be done to prevent it from happening again, defenders will just be in a perpetual ‘whack-a-mole’ pattern.’’). PO 00000 Frm 00016 Fmt 4701 Sfmt 4702 when to involve or alert specific personnel, including senior leadership, of an incident.143 Specifically, the proposed rule would require that the senior officer, oversight body, or other senior-level official that has primary responsibility for overseeing the information and technology security program; the Chief Compliance Officer (CCO); 144 and any other relevant personnel be timely informed of incidents that may significantly impact the covered entity’s regulatory obligations or require notification to the Commission.145 This provision is designed to ensure that every individual who has a role in responding to an incident at a covered entity would be appropriately notified. CCOs of covered entities in particular have a duty to take reasonable steps to ensure compliance with Commission regulations relating to the covered entities’ business as a covered entity.146 Timely disclosure of incidents to the CCO that could impact a covered entity’s regulatory obligations or require disclosure to the Commission would therefore be crucial for a covered entity CCO to fulfill the duty to take reasonable steps to ensure compliance. As previously discussed above in the section addressing governance, the Commission believes that involving senior leadership in incident response would be particularly important to ensure that they are apprised of and held accountable for the ultimate effectiveness of the ORF, and that incidents receive proper attention and are swiftly addressed. 4. Request for Comment The Commission invites comment on all aspects of the proposed information and technology security program requirement, including the following questions: 1. Risk Assessment. a. The proposed rule would require that the risk assessment be provided to relevant senior leadership of the covered entity upon its completion but would not require that such senior leadership certify in writing that they have received the results of the risk assessment or approve the results of the risk assessment. Such approvals and certifications may be required in other contexts to ensure that senior leadership 143 See paragraph (d)(3)(ii) of proposed Commission regulations 1.13 and 23.603. 144 See 17 CFR 3.3 (establishing the qualifications and duties of covered entity CCOs). 145 See paragraph (d)(3)(ii) of proposed Commission regulations 1.13 and 23.603. See also paragraph (i) of proposed Commission regulations 1.13 and 23.603 (requiring notification of certain incidents to the Commission), discussed in section II.H of this release, infra. 146 See 17 CFR 3.3(d)(3). E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 is aware of risk assessments and consider them in establishing strategic goals, risk appetite, and risk tolerance limits. Should the Commission require such a certification or approval? Why or why not? Please explain. b. Given the rapidly evolving technological and threat landscape, the proposed rule would require risk assessments to be performed on at least an annual basis to support the mitigation of systemic risk and develop a strong baseline standard across covered entities. The Commission is aware of standards imposing risk assessments as frequently as every six months and as infrequently as every two years. Should the Commission consider a shorter or longer baseline frequency for risk assessments? Why or why not? Please explain. 2. Effective controls. The proposed rule would require covered entities to consider broad categories of controls and determine which to adopt consistent with the proposed (b)(3) standard. The Commission is also aware that certain controls, including firewalls, antivirus, and multifactor authentication (MFA) are commonly recommended within the industry. With respect to MFA, which requires users to present two or more authentication factors at login to verify their identity before they are granted access, CISA advises that implementing MFA is important because it makes it more difficult for threat actors to gain access to information systems, even if passwords or PINs are compromised through phishing attacks or other means.147 In 2021, FFIEC issued guidance advising financial institutions that MFA or controls of equivalent strength, including for those employees, could help more effectively mitigate risks when a financial institution’s risk assessment indicates that single-factor authentication with layered security is inadequate.148 The guidance added that MFA factors, which may include memorized secrets, look-up secrets, outof-band devices, one-time-password devices, biometrics identifiers, and cryptographic keys, can vary in terms of 147 CISA, Multi-Factor Authentication Fact Sheet (Jan. 2022), available at https://www.cisa.gov/sites/ default/files/publications/MFA-Fact-Sheet-Jan22508.pdf. NIST defines MFA as ‘‘[a]n authentication system that requires more than one distinct authentication factor for successful authentication. Multi-factor authentication can be performed using a multi-factor authenticator or by a combination of authenticators that provide different factors. The three authentication factors are something you know, something you have, and something you are.’’ NIST, SP 800–63–3, Digital Identity Guidelines at 49 (June 2017). 148 FFIEC, Authentication and Access to Financial Institution Services and Systems at 7 (rev. Jan. 5, 2022). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 usability, convenience, and strength and their ability to be exploited.149 That same year, the Federal Trade Commission updated its rule for safeguarding customer information to mandate financial institutions to adopt MFA for all users.150 The Commission preliminarily believes that requiring covered entities to implement such widely recommended controls, such as and including MFA, would help reduce cyber security risks and clarify expectations. Should the Commission mandate the use of any specific controls, including firewalls, antivirus, and/or MFA? Why or why not? Please explain. 3. Incident response plan. As proposed, covered entities would be required to notify their CCOs of incidents that they have determined may significantly impact regulatory obligations or require notification to the Commission. Commission staff are aware of instances where covered entity CCOs have not been notified of incidents sufficiently early to play a meaningful role in determining whether the incident implicates any CFTC requirements and in developing an appropriate remediation plan. Should covered entities be required to notify their CCOs of all incidents, only incidents that may require notification under the proposed rule, or incidents that may require notification under the proposed rule to other financial regulatory authorities? Why or why not? D. Third-Party Relationship Program— Proposed Paragraph (e) The second program required to be included as part of the proposed ORF would be a third-party relationship program, defined as a written program reasonably designed to identify, monitor, manage, and assess risks relating to third-party relationships that meets the requirements of the proposed rule.151 The Commission understands that covered entities currently routinely rely upon third parties for a wide variety of products, services, and activities, including, for example, information technology, counterparty or customer relationship management, accounting, compliance, human 149 Id. 150 See Standards for Safeguarding Customer Information, 86 FR 70272 (Dec. 9, 2021); see also 16 CFR 314.4(c)(5) (requiring financial intuitions to ‘‘[i]mplement multi-factor authentication for any individual accessing any information system unless [a qualified individual, as defined in the rule] has approved in writing the use of reasonably equivalent or more secure access controls.’’). 151 See paragraph (e) of proposed Commission regulations 1.13 and 23.603. See also paragraph (a) of proposed regulations 1.13 and 23.603 (defining ‘‘third-party relationship program’’). PO 00000 Frm 00017 Fmt 4701 Sfmt 4702 4721 resources, margin processing, trading, and risk management. Reliance on thirdparty service providers carries many potential benefits, including a reduction in operating costs and access to technological advancements that can improve operations and regulatory compliance.152 But that reliance is not riskless.153 As the ION incident illustrated, operational disruptions of third-party services, particularly of those important to a firm’s operations or regulatory obligations, can present challenges for individual firms and even the financial system as a whole.154 The risks may vary from minor to significant, depending on the nature of the provider or the service being rendered, but they are inherent in the nature of a thirdparty service provider relationship, in which a firm relies on the performance of another entity and the quality and reliability of that performance is not in the direct control of the firm.155 The Commission accordingly believes that, in order to support their operational resilience, covered entities should have a plan in place to identify, monitor, manage, and assess the risks associated with third-party relationships.156 152 See Prudential Third-Party Guidance, 88 FR 37927 (‘‘The use of third parties can offer banking organizations significant benefits, such as access to new technologies, human capital, delivery channels, products, services, and markets.’’); IOSCO Outsourcing Report, supra note 65, at 4 (‘‘The benefits of outsourcing include lowering costs, increasing automation to speed up tasks and reduce the need for manual intervention, and providing flexibility to allow regulated entities to rapidly adjust both to the scope and scale of their activities.’’); FFIEC, Information Technology Examination Handbook, Outsourcing Technology Services Booklet at 1 (June 2004) (‘‘The ability to contract for technology services typically enables an institution to offer its customers enhanced services without the various expenses involved in owning the required technology or maintaining the human capital required to deploy and operate it.’’). 153 See Prudential Third-Party Guidance, 88 FR 37927 (‘‘[T]he use of third parties can reduce a banking organization’s direct control over activities and may introduce new risks or increase existing risks, such as operational, compliance, and strategic risks.’’). 154 See supra note 20 and accompanying text. 155 See Prudential Third-Party Guidance, 88 FR 37927 (‘‘Increased risk often arises from greater operational or technological complexity, newer or different types of relationships, or potential inferior performance by the third party. A banking organization can be exposed to adverse impacts, including substantial financial loss and operational disruption, if it fails to appropriately manage the risks associated with third-party relationships.’’). 156 For purposes of the proposed rule, the Commission would construe ‘‘third-party service provider’’ broadly and consistently with the terms ‘‘third-party’’ and ‘‘business arrangement’’ as used in the Prudential Third-Party Relationship Guidance. See id. (‘‘Third-party relationships can include, but are not limited to, outsourced services, use of independent consultants, referral arrangements, merchant payment processing E:\FR\FM\24JAP2.SGM Continued 24JAP2 4722 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules As mentioned above, the Commission appreciates that the risks presented by individual third-party relationships may vary depending on the firm, the provider, or service. For instance, risks may be more elevated if the service provider is a new entrant to the marketplace or the service relates to a new, untested technology, and covered entities with more numerous or intricate third-party relationships may experience greater overall risk from third parties by virtue of the number and complexity of their relationships. Accordingly, the proposed rule would not require third-party relationship programs to apply an identical degree of scrutiny and oversight to all third-party relationships. Instead, consistent with the principles-based focus of the proposed rule, and the proposed (b)(3) standard, the Commission would expect covered entities to adopt a third-party relationship program that helps them identify and assess the risks of their existing and future third-party relationships and adapt their risk management practices consistent with those risks, their risk appetite and risk tolerance limits, and the nature, size, scope, complexity, and risk profile of their business activities, following generally accepted standards and best practices.157 ddrumheller on DSK120RN23PROD with PROPOSALS2 1. Third-Party Relationship Lifecyle Stages—Proposed Paragraph (e)(1) To guide covered entities in developing their third-party relationship programs, and to ensure that the programs address the full scope of risks that third-party relationships can present, the proposed rule would require the third-party relationship program to describe how the covered entity would address the risks attendant to each stage of the third-party relationship lifecycle.158 Specifically, the proposed rule would require the services, services provided by affiliates and subsidiaries, and joint ventures. Some banking organizations may form third-party relationships with new or novel structures and features—such as those observed in relationships with some financial technology (fintech) companies.’’). 157 See paragraph (b)(3) of proposed Commission regulations 1.13 and 23.603. See also NFA ThirdParty Notice, supra note 43 (‘‘NFA recognizes that a Member must have flexibility to adopt a written supervisory framework relating to outsourcing functions to a Third-Party Service Provider that is tailored to a Member’s specific needs and business . . .’’); Prudential Third-Party Guidance, 88 FR 37924 (‘‘[I]t is the responsibility of the banking organization to identify and evaluate the risks associated with each third-party relationship and to tailor its risk management practices, commensurate with the banking organization’s size, complexity, and risk profile, as well as with the nature of its third-party relationships.’’). 158 See paragraph (e)(1) of proposed Commission regulations 1.13 and 23.603. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 program to address: (i) pre-selection risk assessment; (ii) the due diligence process for prospective third-party relationships; 159 (iii) contractual negotiations; (iv) ongoing monitoring during the course of the relationship; and (v) termination of the relationship, including preparations for planned and unplanned terminations.160 Each of these stages offers covered entities opportunities to assess and take steps to mitigate the potential risks associated with reliance on third-party service providers. At the outset, covered entities should determine whether it is appropriate for a third-party service provider to perform a particular service and evaluate the associated risks.161 For instance, the determination to secure a third-party service provider may carry greater risks where the service directly impacts a regulatory requirement, where the third-party service provider would be given direct access to covered information, or where a disruption of services could impact regulatory compliance or have a negative impact on customers or counterparties. Due diligence provides covered entities with information to assess whether a prospective third-party service provider is equipped, operationally and otherwise, to perform as expected.162 159 The proposed rule is not intended to interfere with the obligation in Commission regulation 1.11(e) for FCMs to conduct onboarding and ongoing due diligence on depositories carrying customer funds. See 17 CFR 1.11(e)(3)(i)(A)–(B). 160 See paragraphs (e)(1)(i)–(v) of proposed Commission regulations 1.13 and 23.603. See also NFA Third-Party Notice (requiring NFA members to establish a written supervisory framework that includes an initial risk assessment, onboarding due diligence, ongoing monitoring, termination, and recordkeeping); 12 CFR part 30, app. B, III.D. (Oversee Service Provider Arrangements) (requiring financial institutions to exercise appropriate due diligence in selecting service providers, contract with service providers to implement ‘‘appropriate measures designed to meet the objectives of’’ prudential guidelines for information security; and, where indicated by its risk assessment, monitor service providers to confirm they have satisfied their obligations). 161 See NFA Third-Party Notice (‘‘At the outset, a Member should determine whether a particular regulatory function is appropriate to outsource and evaluate the risks associated with outsourcing the function.’’); Prudential Third-Party Guidance, 88 FR 37928 (‘‘As part of sound risk management, effective planning allows a banking organization to evaluate and consider how to manage risks before entering into a third-party relationship.’’). 162 See IOSCO Outsourcing Report, supra note 65, at 18 (‘‘It is important that regulated entities exercise due care, skill, and diligence in the selection of service providers. The regulated entity should be satisfied that the service provider has the ability and capacity to undertake the provision of the outsourced task effectively at all times.’’); Prudential Third-Party Guidance, 88 FR 37929 (‘‘Conducting due diligence on third parties before selecting and entering into third-party relationships is an important part of sound risk management. It provides management with the information needed about potential third parties to determine if a PO 00000 Frm 00018 Fmt 4701 Sfmt 4702 Contractual negotiations offer a possibility to mitigate potential risks by including provisions to assign specific responsibilities or liabilities, but may also contribute to risks, especially where a covered entity may have more limited negotiating power.163 Ongoing monitoring of a third-party service provider’s performance likewise aids covered entities in identifying whether selected third-party service providers remain able to perform as expected throughout the duration of the relationship.164 Finally, the manner in which the relationship ends can have a major impact on the covered entity, particularly if it ends due to a breach of performance. Plans to address the termination, through contingencies or otherwise, could therefore prove important to ensuring the covered entity’s ongoing operations.165 The Commission therefore preliminarily believes that effective management of third-party risks would require covered entities to have a program that establishes methodologies and practices to assess and manage the risks of thirdparty relationships throughout each of these five stages of the third-party relationship lifecycle.166 2. Heightened Requirements for Critical Third-Party Service Providers— Proposed Paragraph (e)(2) Although the Commission appreciates that third-party risks are not uniform, it nevertheless believes that certain circumstances warrant enhanced risk management practices across all covered entities. Specifically, the proposed rule would require that the third-party relationship program establish heightened due diligence and ongoing relationship would help achieve a banking organization’s strategic and financial goals. The due diligence process also provides a banking organization with the information needed to evaluate whether it can appropriately identify, monitor, and control risks associated with the particular third-party relationship.’’). 163 See IOSCO Outsourcing Report at 21 (‘‘Contractual provisions can reduce the risks of non-performance or aid the resolution of disagreements about the scope, nature, and quality of the service to be provided.’’). 164 See id. at 18 (‘‘The regulated entity should also establish appropriate processes and procedures for monitoring the performance of the service provider on an ongoing basis to ensure that it retains the ability and capacity to continue to provide the outsourced task.’’). 165 See id. at 33 (‘‘Where a task is outsourced, there is an increased risk that the continuity of the particular task in terms of daily management and control of that task, related information and data, staff training, and knowledge management, is dependent on the service provider continuing in that role and performing that task.’’). 166 See Prudential Third-Party Guidance, 88 FR 37928 (‘‘Effective third-party risk management generally follows a continuous life cycle for thirdparty relationships.’’). E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules monitoring practices with respect to third-party service providers deemed critical third-party service providers.167 The proposed rule would define ‘‘critical third-party service provider’’ to mean a third-party service provider, the disruption of whose performance would be reasonably likely to either (a) significantly disrupt a covered entity’s businesses operations or (b) significantly and adversely impact the covered entity’s counterparties or customers.168 The Commission understands that it is common practice for financial institutions, whether by regulatory mandate or otherwise, to identify a subset of services or providers more central to their operations and apply greater scrutiny and oversight to them to ensure the services are provided without disruption. The proposed rule’s definition of ‘‘critical third-party service provider’’ focuses on the potential impact a disruption to performance would have on the covered entity’s regulated business operations, customers, or counterparties. Where such an impact would be significant, as assessed in light of the covered entity’s business activities, risk appetite, and risk tolerance limits, the Commission believes heightened due diligence for potential critical third-party service providers and ongoing monitoring for onboarded critical third-party service providers are warranted to both mitigate the potential for such an occurrence and to promote the ability for covered entities to take early and effective action if a critical third-party service provider’s performance is disrupted to mitigate the impact and effectively recover.169 ddrumheller on DSK120RN23PROD with PROPOSALS2 3. Third-Party Service Provider Inventory—Proposed Paragraph (e)(3) To help ensure that covered entities implement a comprehensive and consistent approach to identifying their critical third-party service providers, covered entities would be required to create, maintain, and regularly update an inventory of third-party service providers they have engaged to support their activities as a covered entity, identifying whether each third-party service provider in the inventory is a 167 See paragraph (e)(2) of proposed Commission regulations 1.13 and 23.603. 168 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘critical third-party service provider’’). 169 See NFA Third-Party Notice, supra note 43 (‘‘Additionally, a Member’s onboarding due diligence process should be heightened for ThirdParty Service Providers that obtain or have access to a Member’s critical and/or confidential data and those that support a Member’s critical regulatoryrelated systems (e.g., handling customer segregated funds, keeping required records, filing financial reports, etc.).’’). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 critical third-party service provider.170 The Commission preliminarily believes that the process of creating an inventory of service providers, particularly the deliberative process involved in designating certain providers as critical third-party service providers, would help covered entities assess and evaluate the risks they face from their third-party service providers, and determine when to apply heightened monitoring. Maintaining such an inventory would also reflect that not all third-party service providers present the same level and types of risks to a covered entity, and would help covered entities assess and evaluate who is providing services and the attendant risk that any disruption of those services would have on a covered entity’s business. The inventory would also provide covered entities a holistic view of their third-party service providers, which would help them better understand how risks identified during due diligence and ongoing monitoring may interact or require additional management. Having a clear understanding of who is providing services, particularly those services identified as critical, would further assist covered entities in identifying potential interconnections that may not be readily apparent if the entities are not assembled and reviewed collectively.171 Covered entities relying on a consolidated third-party relationship program would be able to rely on an enterprise-wide third-party service provider inventory provided that the inventory meets the requirements of the proposed rule, including identifying critical third-party service providers specific to the covered entity.172 4. Retention of Responsibility— Proposed Paragraph (e)(3) For the avoidance of doubt, the proposed rule would make clear that, notwithstanding their determination to rely on a third-party service provider, covered entities remain responsible for meeting their obligations under the CEA and Commission regulations.173 This provision reflects the principle, widely recognized among financial regulatory 170 See paragraph (e)(3) of proposed Commission regulations 1.13 and 23.603. 171 Prudential Third-Party Guidance, 88 FR 37927 (‘‘Maintaining a complete inventory of its thirdparty relationships and periodically conducting risk assessments for each third-party relationship supports a banking organization’s determination of whether risks have changed over time and to update risk management practices accordingly.’’). 172 See paragraph (c)(4)(i) of proposed Commission regulations 1.13 and 23.603 (allowing covered entities to rely on consolidated programs). 173 See paragraph (e)(3) of proposed Commission regulations 1.13 and 23.603. PO 00000 Frm 00019 Fmt 4701 Sfmt 4702 4723 authorities, including the Commission, that while financial institutions may be able to delegate functions to third-party service providers, they cannot delegate their responsibility to comply with applicable laws and regulations.174 This provision is intended to ensure that covered entities are aware that they remain responsible for the performance of all applicable regulatory functions, whether performed by the covered entity or by a third-party service provider, and are accordingly fully subject to the Commission’s jurisdiction, including its examination and enforcement authorities. 5. Application to Existing Third-Party Relationships Should the proposed rule be adopted as final, the Commission would expect covered entities to apply their thirdparty relationship programs across all stages of the relationship lifecycle on a going-forward basis. Although the Commission would not require covered entities to renegotiate or terminate existing agreements, it would expect covered entities to conduct ongoing monitoring of existing third-party service providers consistent with the program and this regulation and, to the extent possible, to rely on its program with respect to termination. For any third-party service providers contemplated or onboarded after the effective date of the proposed rule, or for any contracts renegotiated or renewed after the effective date of the rule, however, the Commission would expect covered entities to apply the entirety of the third-party relationship program from pre-selection through termination. 174 See NFA Third-Party Notice, supra note 43 (‘‘If a Member outsources a regulatory function, however, it remains responsible for complying with NFA and/or CFTC Requirements and may be subject to discipline if a Third-Party Service Provider’s performance causes the Member to fail to comply with those Requirements.’’); Prudential Third-Party Guidance, 88 FR 37927 (‘‘A banking organization’s use of third parties does not diminish its responsibility to meet these requirements to the same extent as if its activities were performed by the banking organization in-house.’’); IOSCO Outsourcing Report, supra note 65, at 12 (‘‘The regulated entity retains full responsibility, legal liability, and accountability to the regulator for all tasks that it may outsource to a service provider to the same extent as if the service were provided inhouse.’’). See also 17 CFR 37.204 (SEFs); 17 CFR 38.154 (DCMs); 17 CFR 39.18(d) (DCOs) (providing that such registered entities retain responsibility for meeting relevant regulatory requirements when entering into contractual outsourcing arrangements). E:\FR\FM\24JAP2.SGM 24JAP2 4724 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules 6. Guidance on Third-Party Relationship Programs—Proposed Paragraph (e)(4); Appendix A to Part 1; Appendix A to Subpart J of Part 23 To assist covered entities in developing third-party relationship programs that adequately address risks from third-party relationships, the Commission is proposing guidance outlining potential risks, considerations, and strategies for covered entities to consider.175 The proposed guidance addresses all five stages of the relationship lifecycle and, if adopted, would be codified as appendices to parts 1 and 23 of the Commission’s regulations for FCMs and swap entities, respectively.176 Designed to be broadly applicable to all covered entities, the proposed guidance identifies actions and factors for covered entities to consider. The factors and actions identified are not exhaustive, nor should they be viewed as a required checklist. The nonbinding guidance would merely be intended to aid covered entities as they design thirdparty relationship programs tailored to their own unique circumstances, consistent with the general ORF ‘‘appropriate and proportionate standard’’ discussed above. In developing the proposed guidance, the Commission considered the recommendations of international standard-setting bodies, including IOSCO and FSB, in light of observations and lessons derived from its own oversight activities.177 In an effort to incorporate as much consensus as possible, the Commission also gave special consideration to existing guidance from NFA and the guidance on third-party relationships recently adopted by prudential regulators, both of which currently apply to at least some covered entities.178 The full text of the guidance is included at the end of this notice as proposed appendix A to part 1 for FCMs and proposed appendix A to subpart J of part 23. The guidance is identical in substance for FCMs and swap entities. ddrumheller on DSK120RN23PROD with PROPOSALS2 7. Request for Comment The Commission invites comment on all aspects of the proposed third-party relationship program requirement and associated guidance, including the following questions: 1. Scope of Application. NFA’s interpretive notice on third-party relationships is limited in scope to ‘‘outsourcing,’’ which NFA defines as third-party relationships in which an NFA member has a third-party service provider or vendor perform certain functions that would otherwise by undertaken by the member itself to comply with NFA and CFTC requirements.179 The proposed rule would follow the approach taken by prudential regulators in their third-party guidance, which more broadly addresses any circumstances where banking organizations rely on third parties for products, services, or activities to ‘‘capture[ ] the full range of third-party relationships that may pose risk to banking organizations.’’ 180 Should the Commission consider limiting the scope of its guidance to outsourcing of CFTC regulatory obligations? Why or why not? Please explain. 2. Critical third-party service provider. The proposed rule includes a definition of ‘‘critical third-party service provider.’’ The Commission understands it is common practice for financial institutions to identify and apply heightened oversight of thirdparty service providers they deem critical. NFA’s interpretive notice related to third-party relationships, for instance, advises members to tailor the frequency and scope of ongoing monitoring reviews to the criticality of and risk associated with the outsourced function but does not define ‘‘criticality’’ for covered entities. Is the Commission’s proposed definition consistent with existing standards or definitions of ‘‘criticality’’ applied by covered entities? If not, how is it different? Should the Commission consider allowing covered entities to generate and apply their own definition of ‘‘critical third-party service provider’’? Why or why not? Please explain. 3. Guidance—Affiliated Third-Party Service Providers. The proposed thirdparty relationship program requirement would apply to all third-party relationships, including where the third-party is an affiliate of the covered entity. This position is consistent with both NFA and prudential guidance related to third-party relationships.181 179 See 175 See paragraph (e)(4) of proposed Commission regulations 1.13 and 23.603. 176 See proposed Appendix A to part 1 and proposed Appendix A to Subpart J of part 23. 177 See IOSCO Outsourcing Report, supra note 65; FSB Third-Party Report, supra note 44. 178 See NFA Third-Party Notice; Prudential ThirdParty Guidance, 88 FR 37920. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 NFA Third-Party Notice, supra note 43. Prudential Third-Party Guidance, 88 FR 37921–22. 181 See NFA Third-Party Notice at n.1 (‘‘Further, even if a Member outsources a regulatory obligation to an affiliate, . . . a Member should comply with this Notice’s requirements.’’); Prudential ThirdParty Guidance, 88 FR 37927 (‘‘Third-party relationships can include, but are not limited to, 180 See PO 00000 Frm 00020 Fmt 4701 Sfmt 4702 Nevertheless, the Commission recognizes that arrangements with affiliates may present different or lower risks than with unaffiliated third parties. Should the Commission consider including any additional guidance with respect to the management of third-party service providers that are affiliated entities? If so, what factors should covered entities consider when evaluating relationships with affiliated third-party service providers? 4. Guidance—Due Diligence. The proposed guidance recommends that covered entities perform due diligence on prospective third-party service providers to assess their ability to deliver contracted services to an acceptable standard (i.e., consistent with risk appetite and risk tolerance limits) and provides examples of information that covered entities should review and sources for obtaining that information. a. Are there any additional due diligence tasks that should be conducted by the covered entity beyond reviewing information about the potential third-party service provider? Are there additional risks that should be included in the guidance for the covered entity to inquire into? If yes, please identify and explain. b. Are there additional sources of due diligence information beyond those listed in the guidance (see section B of the guidance) that should be included in the guidance? If yes, please identify and explain. c. Should covered entities be advised to periodically refresh their due diligence, or upon the occurrence of specific triggers (e.g., a material change to the service outsourced)? Why or why not? Would such a recommendation be duplicative of the covered entity’s ongoing monitoring activities, or would the subsequent due diligence provide additional valuable information to the covered entity beyond that provided by ongoing monitoring? Why or why not? Please explain. d. The proposed guidance does not recommend that covered entities perform due diligence directly on any subcontractors secured by third-party service providers. Rather, the Commission’s guidance suggests that covered entities review the operational risk management practices of the potential third-party service provider with respect to their subcontractors. Should the Commission recommend more enhanced due diligence of subcontractors? Why or why not? What . . . services provided by affiliates and subsidiaries. . .’’). E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 means are practicable for covered entities to conduct due diligence on subcontractors to their third-party service providers? Please identify and explain. E. Business Continuity and Disaster Recovery Plan—Proposed Paragraph (f) The third component of the ORF would be a business continuity and disaster recovery (BCDR) plan, defined as a written plan outlining the procedures to be followed in the event of an emergency or other significant disruption to the continuity of a covered entity’s normal business operations and that meets the requirements of the proposed rule.182 Similar to the incident response plan (and, in extreme cases, possibly triggered by an incident covered by the incident response plan), the proposed BCDR plan requirement recognizes the operational reality that not all operational disruptions can be prevented or immediately mitigated and asks covered entities to strategize and implement plans for how to minimize the impact to operations, customers, and counterparties when such adverse events occur. Although NFA requires FCMs to establish and maintain a BCDR plan, if adopted, the proposed rule would create a new CFTC BCDR plan requirement for FCMs.183 Current Commission regulation 23.603 contains an active BCDR plan requirement for swap entities.184 In essence, the proposal would make certain amendments to the CFTC BCDR plan requirement for swap entities and expand the requirement to include FCMs. The proposed amendments to the swap entity BCDR plan requirement have two general purposes. For the most part, the proposal would streamline and simplify some of the language to help it further conform to the proposed ORF rule more broadly, in ways the Commission intends to be non-substantive. The proposal would also make a few substantive changes, informed either by the Commission’s review of NFA’s and CME’s current BCDR requirements for their members or by its decade of experience applying current Commission regulation 23.603 to swap entities.185 The proposed substantive changes, each subsequently discussed in this notice, relate to either the defined 182 See paragraph (f) proposed Commission regulations 1.13 and 23.603. See also paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘business continuity and disaster recovery plan’’). 183 See NFA Rule 2–38, supra note 43. 184 See 17 CFR 23.603. 185 See NFA Rule 2–38; CME Rule 983 (Disaster Recovery and Business Continuity). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 scope of and recovery objective for the BCDR plan or the testing and audit requirements for the plan. Current Commission regulation 23.603 includes requirements that the proposed rule would apply to the entirety of the proposed ORF more broadly. Those requirements include requirements to: distribute the BCDR plan to relevant employees (current Commission regulation 23.603(c)); notify the Commission of emergencies or disruptions (current Commission regulation 23.603(d)); identify emergency contacts (current Commission regulation 23.603(e)); review, test, and update the BCDR plan (current Commission regulation 23.603(f) and (g)); and recordkeeping (current Commission regulation 23.603(i)). Each of these requirements is discussed in the relevant sections of this notice that follow.186 Accordingly, the Commission’s proposed amendment to the current BCDR audit requirement is discussed in the context of the ORF’s broader proposed review and testing requirements.187 1. Definition of ‘‘Business Continuity and Disaster Recovery Plan’’ The proposed definition of ‘‘business continuity and disaster recovery plan’’ is slightly modified from the language in the current BCDR plan requirement for swap entities. Current Commission regulation 23.603 requires swap entities to establish and maintain a BCDR plan that ‘‘outlines the procedures to be followed in the event of an emergency or other disruption of its normal business activities.’’ 188 As stated above, the proposed rule would specify that the BCDR plan would need to address ‘‘significant’’ disruptions to the continuity of a covered entity’s normal business operations, which the Commission preliminarily believes is more in line with what would constitute an ‘‘emergency’’ that would result in activation of a BCDR plan and how Commission regulation 23.603 has operated in practice.189 186 See sections II.F (Training), G (Review and Testing), H (Required Notifications), and I (Emergency Contacts, Recordkeeping) of this notice, infra. The proposed rule would not retain Commission regulation 23.603(h), which merely articulates the fact that swap entities are required to comply with Commission’s BCDR requirements in addition to any other applicable BCDR requirements from other regulatory bodies. See 17 CFR 23.603(h). The Commission accordingly views this amendment as non-substantive. 187 See paragraph (h) of proposed Commission regulations 1.13 and 23.603 and section II.G, infra. 188 See 17 CFR 23.603(a). 189 See also NFA Rule 2–38, supra note 43 (requiring certain members, including FCMs, to establish a BCDR plan to be followed in the event of a ‘‘significant business disruption’’). The PO 00000 Frm 00021 Fmt 4701 Sfmt 4702 4725 2. Purpose—Proposed Paragraph (f)(1) Under the proposed rule, the BCDR plan would need to be reasonably designed to enable covered entities to: (i) continue or resume normal business operations with minimal disruption to customers or counterparties and the markets and (ii) recover and make use of all covered information, as well as any other data, information, or documentation required to be maintained by law and regulation.190 The Commission preliminarily believes that this standard, which emphasizes the need to quickly resume regulated activities and to recover all information kept and required to be kept in connection with those activities, supports the overall regulatory objectives of the ORF rule of enhancing the operational resilience of covered entities to promote the protection of customers and the mitigation of system risk. Current Commission regulation 23.603 requires swap entities’ BCDR plans to ‘‘be designed to enable the [swap entity] to continue or to resume any operations by the next business day with minimal disturbance to its counterparties and the market.’’ The proposed rule would modify this language by requiring that the BCDR plan be ‘‘reasonably’’ designed to continue or resume operations with minimal disruption and by removing the requirement that such operations be resumed ‘‘by the next business day.’’ 191 The Commission views the qualification that the BCDR plan be ‘‘reasonably’’ designed as simply a more concrete expression of the Commission’s current expectations, in recognition that what might be necessary to achieve recovery is not an absolute fact and may vary depending on the circumstances, including the nature, size, scope, complexity, and risk profile of a covered entity’s business activities.192 The proposed language change from ‘‘normal business activities’’ to ‘‘the continuity of normal business operations’’ is intended only to bring the language more in line with the focus of the proposed ORF rule on the resiliency of operations and is not intended to have substantive effect. See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘business continuity and disaster recovery plan’’); 17 CFR 23.603(a). 190 See paragraphs (f)(1)(i)–(ii) of proposed Commission regulations 1.13 and 23.603. See also 17 CFR 23.603(a). 191 The Commission views the use of the phrase ‘‘minimal disturbance’’ in current Commission regulation 23.603 as equivalent to the phrase ‘‘minimal disruption’’ in the proposed rule and therefore views this change in language with respect to swap entities to be non-substantive. Compare 17 CFR 23.603(a) with paragraph (f)(1) of proposed Commission regulations 1.13 and 23.603. 192 See also NFA Rule 2–38 (requiring BCDR plans be ‘‘reasonably designed’’) (emphasis added). E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 4726 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules reasonableness of the plan would thus be viewed in light of the proposed (b)(3) standard (i.e., what is appropriate and proportional to the covered entity, following generally accepted standards and best practices). The proposal not to include a next business day recovery time objective is based in the Commission’s preliminary view that, depending on the circumstances, a next business day recovery standard could be either too short or too long, to the point where it may be misdirecting the focus of the rule. The Commission understands that the ‘‘next business day’’ standard has been common for businesses to employ for BCDR purposes in the context of purely physical disasters, such as power outages or natural disasters. Based on its experience in recent years, however, the Commission believes a next-day standard may in some cases be impractical in an era where rapid innovation has deepened and expanded reliance on technology among financial institutions, and pandemics and cyberattacks have become more prevalent or alarming forms of disruption. With the ION incident, for instance, it took weeks before back office operations were back to normal. Nevertheless, the impact to customers and the markets during that time was manageable. Were even one business day to stretch between FCMs paying and collecting margin, for example, the Commission does not believe the impact to customers or the markets could be characterized as minimal. Accordingly, the Commission preliminarily believes that by not including a precise recovery time objective, such as next business day, the emphasis of the proposed BCDR plan standard appropriately lies on ensuring that any disruption to customers, counterparties, and the markets is ‘‘minimal.’’ 193 For that standard to be met, however, the Commission would still expect covered entities to plan for a recovery that is expeditious. The longer a covered entity is not operating as usual, the more likely it is that customers and counterparties may be affected and that a crisis in confidence could develop, potentially affecting the industry more broadly. Current Commission regulation 23.603 requires swap entities’ BCDR plans to be designed ‘‘to recover all documentation and data required to be maintained by applicable law and regulation.’’ The proposal to require 193 The Commission notes that neither NFA nor CME includes a specific recovery time objective in its BCDR plan requirements. See NFA Rule 2–38; CME Rule 938. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 covered entities to reasonably design their BCDR plans to ‘‘recover and make use of all covered information, as well as any other data, information, or documentation required to be maintained by law and regulation’’ is intended to both incorporate the proposed defined term ‘‘covered information,’’ and make clear the need to also preserve the availability of the recovered data and information (i.e., reliable access to and use of information), which the Commission believes is an integral component of information and technology security.194 The Commission believes that making plans to ensure covered information— sensitive or confidential information and data the proposed ORF rule is designed, at its core, to ensure covered entities protect—as well as any other information covered entities are legally required to maintain, is recovered and accessible following an emergency is key to ensuring the protection of customers and counterparties and the ongoing orderly functioning of the commodity interest markets, as this information is vital to a covered entity’s ability to assess its ongoing compliance with the Commission’s regulations governing the requirements for covered entities.195 3. Minimum Contents—Proposed Paragraph (f)(2) Consistent with the proposed (b)(3) standard for the ORF as a whole, the BCDR plan would need to be appropriate and proportionate to the covered entity, following generally accepted standards and best practices.196 Accordingly, should the proposal be adopted as final, the Commission would expect each BCDR plan to be highly tailored to each specific covered entity. However, the proposed rule would also require the BCDR plan to include certain minimum contents, which are generally comparable to the current requirements in Commission regulation 23.603.197 First, the proposed rule would require the BCDR plan to identify its covered information, as well as any other data or information required to be maintained by law or regulation, and to establish and implement procedures to backup or copy it with sufficient frequency and to store it offsite in either hard-copy or electronic format.198 The BCDR plan would also need to identify any resources, including covered technology, facilities, infrastructure, personnel, and competencies, essential to the operations of the swap entity or to fulfill the regulatory obligations of the swap entity, and establish and maintain procedures and arrangements to provide for their backup in a manner that is sufficient to meet the requirements of the rule (i.e., to continue or resume operations with minimal disruption, to recover and make use of information).199 These minimum requirements are intended to ensure that the BCDR plan meets the proposed recovery standard by ensuring covered entities have gone through the process of cataloging everything they need (information, technology, infrastructure, human capital, etc.) to operate as a covered entity, and have established ways to recover them and to continue or resume operations with minimal disruption to customers, counterparties, or the markets. Furthermore, in establishing arrangements for backup resources, the Commission would want covered entities to consider diversification to the greatest extent possible to reduce the likelihood that an emergency that affects a primary operating resource affects any planned backups. Accordingly, the proposed rule would require covered entities to establish backup arrangements for resources that are in one or more areas geographically separate from the covered entity’s primary resources (e.g., a different power grid than the primary facility).200 The proposed rule would make clear those resources could be 194 See supra note 108 and accompanying text (discussing the ‘‘CIA triad’’ of confidentiality, integrity, and availability). 195 In designing a BCDR plan that would meet this recovery standard, the Commission would advise covered entities to identify a broad range of events that could constitute emergencies or pose significant disruptions, including natural events (e.g., hurricanes, wildfires), technical events (e.g., power failures, system failures), malicious activity (e.g., fraud, cyberattacks), failures of controls, and low likelihood but high impact events (e.g., terrorist attacks, pandemics), and consider potential impact on business operations and data and information. 196 See paragraph (b)(3) of proposed Commission regulations 1.13 and 23.603. 197 See paragraph (f)(2) of proposed Commission regulations 1.13 and 23.603. See also 17 CFR 23.603(b). Although the exact language of the proposed minimum contents in paragraph (f)(2) may diverge somewhat from that of current Commission regulation 23.603(b), the modifications were intended to streamline language and incorporate the proposed terms ‘‘covered information’’ and ‘‘covered technology.’’ The Commission does not intend any of the changes to have a substantive impact on compliance with the Commission’s BCDR plan requirement for swap entities. 198 See paragraph (f)(2)(i) of proposed Commission regulations 1.13 and 23.603. See also 17 CFR 23.603(b)(1), (b)(6). 199 See paragraph (f)(2)(ii) of proposed Commission regulations 1.13 and 23.603. See also 17 CFR 23.603(b)(2), (b)(4), (b)(5). 200 See paragraph (f)(2)(ii) of proposed Commission regulations 1.13 and 23.603. See also 17 CFR 23.603(b)(5). PO 00000 Frm 00022 Fmt 4701 Sfmt 4702 E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules provided by third-party service providers.201 To ensure that critical third-party service providers are given particular consideration when planning for disruptions, the proposed rule would specifically require the BCDR plan to identify potential disruptions to critical third-party service providers and establish a plan to minimize the impact of such potential disruptions.202 Additionally, given the importance of internal and external communication in times of crisis, and for duties and responsibilities to be well established, the proposed rule would require the BCDR plan to identify supervisory personnel responsible for implementing the BCDR plan, along with the covered entity’s required ORF emergency contacts, and establish a procedure for communicating with relevant persons in the event of an emergency or significant disruption.203 The minimum contents of the proposed BCDR plan requirement were designed to align with the substance of the ‘‘essential components’’ of a BCDR plan identified in current Commission regulation 23.603(b), with certain modifications.204 The changes are intended to streamline language, incorporate the proposed BCDR plan standard and defined terms (e.g., covered information, covered technology, critical third-party service provider), and reorder and combine elements to improve readability and application. Key changes include: • Replacing the identification or backup of documents and information essential to the continued operations of the swap entity and/or to fulfill the regulatory obligations of the swap dealer or major swap participant with covered information, as well as any other data or information required to be maintained by law and regulation.205 This change is 201 See id. paragraph (f)(2)(iii) of proposed Commission regulations 1.13 and 23.603. See also 17 CFR 23.603(b)(7) (identify ‘‘potential business interruptions encountered by third parties that are necessary to the continued operations of the swap dealer or major swap participant and a plan to minimize the impact of such disruptions’’). 203 See paragraphs (f)(2)(iv)–(v) of proposed Commission regulations 1.13 and 23.603. See also paragraph (k) of proposed Commission regulations 1.13 and 23.603 (requiring emergency contacts), discussed in section II.I.1 of this notice, infra; 17 CFR 23.603(b)(3). 204 See 17 CFR 23.603(b). 205 See proposed paragraph (f)(2)(i) of Commission regulations 1.13 and 23.603; 17 CFR 23.603(b)(1) (Identification of the documents and data essential to the continued operations of the swap entity and to fulfill the obligations of the swap entity); (b)(6) (Back-up or copying of documents and data essential to the operations of the swap entity or to fulfill the regulatory obligations of the swap entity’’). ddrumheller on DSK120RN23PROD with PROPOSALS2 202 See VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 intended to align the information required to be identified in the proposed BCDR plan with its purpose (recover and make use of all covered information, as well as any other data, information, or documentation required to be maintained by law and regulation). • Specifying that data and information must be backed up or copied with sufficient frequency ‘‘to meet the requirements of this section,’’ to make clear that the backup frequency should be linked to the broader purpose of the BCDR plan (i.e., to continue or resume operations with minimal disruption and to recover and make use of in-scope information).206 • Removing the qualification that resource backups be designed to achieve the timely recovery of data and documentation and to resume operations as soon as reasonably possible and generally within the next business day.207 This language could be viewed as in contradiction with the overall proposed purpose of the BCDR plan, which would not include a ‘‘next business day’’ recovery time objective. • Replacing third parties that are necessary to the continued operations of the swap dealer or major swap participant with critical third-party service provider, as defined in the proposed rule, as the Commission believes these terms are intended to capture similar concepts.208 4. Accessibility—Proposed Paragraph (f)(3) Finally, to ensure that the BCDR plan is available in the event of an emergency or other significant disruption that prevents a covered entity from accessing its primary office location, the proposed rule would require each covered entity to maintain copies of its BCDR plan at one or more accessible off-site locations.209 5. Request for Comment The Commission invites comment on all aspects of the proposed business continuity and disaster recovery plan 206 Cf. 17 CFR 23.603(b)(6) (Back-up or copying, with sufficient frequency, of documents and data). 207 See 17 CFR 23.603(b)(4) (Procedures for, and the maintenance of, back-up facilities, systems, infrastructure, alternative staffing and other resources to achieve the timely recovery of data and documentation and to resume operations as soon as reasonably possible and generally within the next business day.). 208 See 17 CFR 23.603(b)(7) (Identification of potential business interruptions encountered by third parties that are necessary to the continued operations of the swap dealer or major swap participant and a plan to minimize the impact of such disruptions.). 209 See paragraph (e)(3) of proposed Commission regulations 1.13 and 23.603. See also 17 CFR 23.603(c). PO 00000 Frm 00023 Fmt 4701 Sfmt 4702 4727 requirement, including the following question: 1. Recovery time objective. Under current Commission regulation 23.603, the Commission requires swap entities to establish and maintain a BCDR plan that is designed to enable the swap entity to continue or resume any operations ‘‘by the next business day’’ with minimal disturbance to is counterparties.210 Noting that such a standard may pose some challenges, the Commission has proposed to not include a recovery time objective, relying on covered entities to establish a BCDR plan that allows for sufficiently exigent recovery so as to impose ‘‘minimal disruption’’ to customers, counterparties, or the markets. a. Has a next business day standard posed challenges for swap entities to implement? Would such a standard be achievable for FCMs? Why or why not? Please explain. b. Should the Commission consider including additional language to ensure covered entities design BCDR plans that enable quick recovery (e.g., ‘‘as soon as possible’’ or ‘‘as soon as practicable’’)? Why or why not? Please explain. 2. Transfer of business to another entity. NFA and CME rules allow for BCDR plans to include the possibility of transferring their business to another regulated entity in the event of an emergency or disruption. NFA Rule 2– 38 provides that a BCDR plan ‘‘shall be reasonably designed to . . . transfer its business to another Member with minimal disruption to its customers, other members, and the commodity futures markets.’’ 211 CME Rule 983 provides that clearing members must have procedures in place to allow them to continue to operate during periods of stress ‘‘or to transfer accounts to another fully operational clearing member with minimal disruption to either [CME] or their customers.’’ 212 Do any covered entities currently have arrangements with other covered entities to transfer business or accounts in the event of an emergency or disruption? Should the Commission consider adding the option to transfer business to another regulated entity into its proposed BCDR rule? Why or why not? How would such a transfer function in practice? Please explain. F. Training and Plan Distribution— Proposed Paragraph (g) To support the effectiveness of the ORF by ensuring personnel are aware of relevant policies, procedures, and 210 See 17 CFR 23.603(a). NFA Rule 2–38, supra note 43. 212 See CME Rule 983, supra note 185. 211 See E:\FR\FM\24JAP2.SGM 24JAP2 4728 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 practices, the proposed rule would require that each covered entity establish, implement, and maintain training with respect to all aspects of the ORF.213 Relevant training is important to ensuring the ORF operates as intended, and to supporting a firm culture that promotes and prioritizes operational resilience.214 The training would therefore need to include, at a minimum, (i) cybersecurity awareness training for all personnel and (ii) rolespecific training for personnel involved in establishing, documenting, implementing, and maintaining the ORF.215 The importance of cybersecurity training is widely recognized, as incidents commonly occur because well-intentioned employees or other users make preventable mistakes.216 The Commission would further expect that role-specific training would include not only training on relevant policies and procedures but additional relevant threat and vulnerability response training for personnel involved in the development and maintenance of the information and technology security program (e.g., system administration 213 See paragraph (g) of proposed Commission regulations 1.13 and 23.603. 214 See FFIEC Information Security Booklet, supra note 69, at 17 (‘‘Training ensures personnel have the necessary knowledge and skills to perform their job functions.’’); CIS Critical Security Controls v.8., Control no. 14 (Security Awareness and Skills Training) at 43 (May 2021) (CIS Control 14) (training helps ‘‘influence behavior among the workforce to be security conscious and properly skilled to reduce cybersecurity risks to the enterprise’’). 215 See paragraphs (g)(1)(i)–(ii) of proposed Commission regulations 1.13 and 23.603. Proposed paragraph (g)(1)(ii) would supplant the current requirement in Commission regulation 23.603 for swap entities to train relevant employees on applicable components of the BCDR plan. See 17 CFR 23.603(c). The Commission does not intend any substantive difference in the BCDR plan training for swap entities. 216 The FSB found that most successful cyberattacks involved human error, which is why training is important for all personnel. See FSB, Summary Report on Financial Sector Cybersecurity Regulations, Guidance and Supervisory Practices at 7 (Oct. 13, 2017), available at https://www.fsb.org/ wp-content/uploads/P131017-1.pdf. See also CIS Control 14 (‘‘Users themselves, both intentionally and unintentionally, can cause incidents as a result of mishandling sensitive data, sending an email with sensitive data to the wrong recipient, losing a portable end-user device, using weak passwords, or using the same password they use on public site . . .); Prudential Operational Resilience Paper, supra note 11, at 11 (‘‘The firm provides cybersecurity awareness education especially to personnel engaged in the operations of critical operations and core business lines, . . . and adequately trains them to perform their information security-related duties and responsibilities consistent with related processes and agreements.’’). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 courses for IT professionals, secure coding training for web developers).217 As with all aspects of the ORF, if the proposal is adopted as final, the Commission would expect each covered entity’s ORF training to meet the (b)(3) standard (i.e., be appropriate and proportionate to the nature, scope, and complexities of its business activities as a covered entity, following generally accepted standards and best practices).218 To ensure the training remains relevant overtime and that personnel are adequately informed with respect to the ORF, covered entities would also be required to provide and update their ORF training as necessary, but no less frequently than annually.219 Requiring that the training occur annually would be a new CFTC requirement with respect to the BCDR plan training requirement for swap entities.220 The Commission nevertheless believes an annual training requirement is necessary for staff involved in BCDR planning to ensure they remain up-to-date on changes to the BCDR plan following the annual reviews and testing of the plan.221 To further support the proposed training requirement and ensure relevant personnel have access to and are aware of the current information and technology security, third-party relationships, and BCDR plans that form the ORF, the proposed rule would require that covered entities distribute copies of those plans to relevant personnel and promptly provide any significant revisions thereto.222 This proposed plan distribution requirement is consistent with the current BCDR plan distribution requirement for swap entities in current Commission regulation 23.603.223 Request for Comment The Commission invites comment on all aspects of the proposed training requirement. 217 See CISA, Incident Response Plan (IRP) Basics (advising that all staff need to understand their role in maintaining and improving the security of the organization), available at https://www.cisa.gov/ sites/default/files/publications/Incident-ResponsePlan-Basics_508c.pdf. 218 See paragraph (b)(3) of proposed Commission regulations 1.13 and 23.603; supra note 63 and accompanying text. 219 See paragraph (g)(2) of proposed Commission regulations 1.13 and 23.603. 220 See 17 CFR 23.603(c). 221 See paragraph (h) of proposed Commission regulations 1.13 and 23.603, discussed in section II.G, infra. 222 See paragraph (g)(3) of proposed Commission regulations 1.13 and 23.603. 223 See 17 CFR 23.603(c) (Each swap entity shall distribute a copy of its business continuity and disaster recovery plan to relevant employees and promptly provide any significant revision thereto.). PO 00000 Frm 00024 Fmt 4701 Sfmt 4702 G. Reviews and Testing—Proposed Paragraph (h) To ensure the ORF remains viable and effective over time, the proposed rule would require covered entities to establish, implement, and maintain a plan reasonably designed to assess its adherence to, and the effectiveness of, the ORF through regular reviews and risk-based testing.224 As discussed above, the purpose of the proposed ORF would be to identify, monitor, manage, assess, and report on risks relating to information and technology security, third-party relationships, and emergencies or other significant business disruptions.225 Monitoring and managing these risks is a dynamic, everevolving process, especially given the increased reliance on and rapid evolution of technological advancements and related cyber risks.226 The Commission believes regular reviews and testing are an important tool needed to confirm that systems and information remain protected, controls are working as expected, and policies and procedures are being followed.227 Accordingly, the Commission preliminarily believes that regular reviews and testing would provide covered entities with essential information about the actual quality, performance, and reliability of the ORF in relation to its objectives and regulatory requirements. The Commission further expects that reviews and testing would be key to revealing unknown gaps or weaknesses in systems or controls that could then be analyzed to identify corrective actions designed to improve overall operational resilience over time.228 The results of the reviews and testing should be used to support sound decision-making at the covered entity regarding prioritization and funding of resources in a manner 224 See paragraph (h) of proposed Commission regulations 1.13 and 23.603. 225 See paragraph (b)(1) of proposed Commission regulations 1.13 and 23.603, supra note 55 and accompanying text. 226 See Prudential Operational Resilience Paper, supra note 11, at 9 (‘‘The firm also regularly reviews and updates its systems and controls for security against evolving threats including cyber threats and emerging or new technologies.’’). 227 See, e.g., 17 CFR 37.1401 (SEFs); 17 CFR 38.1051 (DCMs); 17 CFR 39.18 (DCOs); 17 CFR 49.24 (SDRs) (requiring system safeguard testing). See also FFIEC Information Security Booklet, supra note 69 (providing that entities should have a documented testing and evaluation plan). 228 See also CPMI IOSCO Cyber Resilience Guidance, supra note 123, at 18 (‘‘Sound testing regimes produce findings that are used to identify gaps in stated resilience objectives and provide credible and meaningful inputs to the [entity’s] cyber risk management process. Analysis of testing results provides direction on how to correct weaknesses or deficiencies in the cyber resilience posture and reduce or eliminate identified gaps.’’). E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules that furthers operational resilience.229 Without such regular reviews and testing, the Commission is concerned that the ORF would quickly grow stale and ineffective, allowing unseen vulnerabilities to go unaddressed and potentially weaken the stability of the covered entity or the financial system at large. 1. Reviews—Proposed Paragraph (h)(1) ddrumheller on DSK120RN23PROD with PROPOSALS2 Under the proposed rule, reviews would need to include an analysis of the adherence to, and the effectiveness of, the ORF, as well as any recommendations for modifications or improvements that address root causes of issues identified by the review.230 Again, the Commission believes that the process of reviewing the ORF to evaluate both its current effectiveness and make recommendations for prospective improvements that relate to deficiencies found through the review would help ensure that the ORF remains effective at managing operational resilience as circumstances change over time. The proposed rule would require covered entities to conduct such reviews at least annually and in connection with any material change to the activities or operations of the covered entity that is reasonably likely to affect the risks addressed by the ORF.231 An annual review standard is consistent with the Commission’s existing review requirement for the RMP for covered entities, the BCDR plan for swap entities, and NFA’s ISSP Interpretive Notice.232 Although the Commission would expect the ORF to be reviewed at least annually in its entirety, including not only the required plans but training and governance, the reviews could be broken into phases, staged over the course of the year. The Commission preliminarily believes that requiring the ORF to be reviewed on at least an annual basis and in connection with any relevant, material business change is sufficiently frequent to help ensure that the ORF remains effective 229 See id. at 18 (‘‘The results of the testing programme should be used by the [entity] to support the ongoing improvement of its cyber resilience.’’). 230 See paragraph (h)(1) of proposed Commission regulations 1.13 and 23.603. 231 Id. 232 See 17 CFR 1.11(f)(1); 17 CFR 23.600(e)(1) (requiring covered entities to review their RMPs on an annual basis or upon any material change in the business reasonably likely to alter their risk profile); 17 CFR 23.603(f) (requiring an annual review of swap entities’ BCDR plan); NFA ISSP Notice, supra note 43 (providing that members should perform a regular review of their information systems security program at least once every twelve months). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 and continues to meet its objectives over time. The proposed review requirement for the ORF would replace the similar annual review requirement for swap entities’ BCDR plans contained in current Commission regulation 23.603. Current Commission regulation 23.603(f) requires that a member of senior management for a swap entity review the BCDR plan annually or upon any material change to the business and to document any deficiencies found or corrective action taken.233 The Commission preliminarily believes that the proposed annual review of the ORF, which would encompass a review of the BCDR plan, is sufficient to ensure the ORF’s effectiveness and that it would no longer be necessary for a separate review of the BCDR plan to be conducted by senior management. 2. Testing—Proposed Paragraph (h)(2) With respect to risk-based testing of the ORF, the proposed rule would generally provide that covered entities determine the frequency, nature, and scope of the testing consistent with the proposed (b)(3) standard.234 Covered entities have available to them a wide range of testing tools, techniques, and methodologies, particularly with respect to information and technology security. Those tools and techniques include open source analysis, network security assessments, physical security reviews, source code reviews, compatibility testing, performance testing, and end-toend testing, just to name a few.235 Such testing methods can vary significantly in terms of what they test and how, and in the degree of sophistication and sensitivity they need to run them correctly and reliably.236 Covered technology among covered entities varies, both in terms of the sensitivity of the data and information it contains and transmits, as well as its operational importance and risk profile. The Commission therefore preliminarily believes that leaving the specifics of the design and implementation of ORF testing to the reasonable judgment of each covered entity would help ensure that such testing protocols remain nimble as operations and recommended testing techniques change progressively over 233 See 17 CFR 23.603(f). paragraph (h)(2) of proposed Commission regulations 1.13 and 23.603. See also paragraph (b)(3) of proposed Commission regulations 1.13 and 23.603; supra note 63 and accompanying text. 235 See NIST, SP 800–115, Technical Guide to Information Security Testing and Assessment (Sept. 2008). 236 Id. 234 See PO 00000 Frm 00025 Fmt 4701 Sfmt 4702 4729 time.237 Covered entities would, however, need to ensure that the testing is reasonably designed to test the effectiveness of the function or system being tested.238 Covered entities should determine which particular tests to incorporate, consistent with the (b)(3) standard and their risk assessments, to ensure the testing effectively targets their particular business lines, activities, operations, and risk profile. Covered entities would accordingly be encouraged to document the decisionmaking regarding how it determined the nature, scope, and frequency of testing. Although the proposed rule would generally not mandate the use of any specific techniques, it would establish certain minimum testing frequencies with respect to a few testing categories that have broad consensus. With respect to testing of the information and technology security program, the proposed rule would require testing of key controls and the incident response plan at least annually.239 Consistent with the definition in the Commission’s system safeguard rules for registered entities, the proposal would define ‘‘key controls’’ as those controls that an appropriate risk analysis determines are either critically important for effective information and technology security, or are intended to address risks that evolve or change more frequently and therefore require more frequent review to ensure their continuing effectiveness in addressing such risks.240 Given their importance to preserving information and technology security and recovering from incidents, the Commission believes that regular testing of the incident response plan and key controls on at least an annual basis is an important baseline requirement to ensure the continued effectiveness of 237 See also Interagency Guidelines Safeguarding Customer Information, 66 FR 8623 (‘‘The Agencies believe that a variety of tests may be used to ensure the controls, systems, and procedures of the information security program work properly and also recognize that such tests will progressively change over time’’); FINRA Cybersecurity Report, supra note 66, at 13 (‘‘Many firms determined the systems to be tested and the frequency with which they should be tested based on a risk assessment where higher risk systems were tested more frequently.’’). 238 See paragraph (h) of proposed Commission regulations 1.13 and 23.603 (requiring that the testing plan be reasonably designed to assess the adherence to, and the effectiveness of, the ORF). 239 See paragraph (h)(2)(i)(A) of proposed Commission regulations 1.13 and 23.603. 240 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘key controls’’). See also 17 CFR 37.1401(h)(1) (SEFs); 17 CFR 38.1051(h)(1) (DCMs); 17 CFR 39.18(a) (DCOs); 17 CFR 49.24(j)(1) (SDRs) (defining ‘‘key controls’’ for purposes of system safeguard requirements). E:\FR\FM\24JAP2.SGM 24JAP2 4730 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 the information and technology security program.241 The proposed rule would also require that testing of the information and technology security program include vulnerability assessments and penetration testing.242 Vulnerability assessments include methods and techniques to identify, diagnose, and prioritize vulnerabilities in the security of covered technology.243 Technical vulnerabilities can be identified through scanner tools, which can be run continuously or periodically, often daily, and may include checking servers for security patches to ensure they are current.244 Penetration testing (or ‘‘pen testing’’), meanwhile, attempts to identify ways to exploit vulnerabilities and circumvent or defeat security features, mimicking potential real-world attacks. Experts have developed a wide variety of penetration tests (e.g., wireless, network, web application, cloud, client side, social engineering, physical, threat-led) and approaches to or modes of completing them (e.g., black box, white box, gray box).245 Some tests go further by using cyber-threat intelligence in designing these simulated attacks, a testing referred to as threat-led penetration testing or ‘‘red teaming.’’ 246 With respect to vulnerability assessments, the proposed rule would require covered entities to test their information and technology security programs using vulnerability assessments, including daily or continuous automated vulnerability scans.247 The Commission preliminarily believes that some degree of vulnerability assessment is considered standard cybersecurity hygiene in order to monitor systems and controls for vulnerabilities, and that the availability of automated vulnerability scanning 241 See 17 CFR 37.1401(h)(5) (SEFs); 17 CFR 38.1051(h)(5) (DCMs); 17 CFR 39.18(e)(5) (DCOs); 17 CFR 49.24(j)(5) (SDRs) (annual testing of incident response plans and key controls); see also FFIEC, Information Technology Handbook, Audit Booklet at A–15 (Apr. 2012) (including testing of key controls at least annually as an examination point 242 See paragraphs (h)(2)(i)(B)–(C) of proposed Commission regulations 1.13 and 23.603. 243 See FFIEC Information Security Booklet, supra note 69, at 8. 244 Id. 245 See FINRA Cybersecurity Report, supra note 66, at 13. 246 See FSI, FSI Insights on policy implementation No. 21, Varying shades of red: how red team testing frameworks can enhance the cyber resilience of financial institutions (Nov. 2019). 247 See paragraph (h)(2)(i)(B) of proposed Commission regulations 1.13 and 23.603. See also 17 CFR 37.1401(h)(2) (SEFs); 17 CFR 38.1051(h)(2) (DCMs); 17 CFR 39.18(e)(2) (DCOs); 17 CFR 49.24(j)(2) (SDRs) (requiring automated vulnerability scanning). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 tools help provide a base level of monitoring that is easily accessible to all covered entities.248 With respect to penetration testing, the proposed rule would not require covered entities to undertake specific types of testing. Given the diverse nature of entities registered as FCMs and swap entities, the Commission believes that determination of the type and method of penetration testing would be best left to the reasoned judgement of each covered entity after conducting its own assessment. The Commission would, however, require that covered entities conduct some penetration testing at least annually.249 The Commission preliminarily believes that annual penetration testing of some type, determined consistent with the proposed (b)(3) standard, would be important for covered entities to have knowledge and awareness of the actual vulnerability of their covered technology to internal or external threats. According to FINRA’s 2018 cyber risk report, firms with strong cybersecurity programs conducted penetration tests at least annually and more frequently for mission critical, high risk systems such as for an online trading system.250 Covered entities would also be encouraged to consider additional risk-based penetration testing after key events, such as any time a significant change is made to important elements of the firm’s applications and systems infrastructure, in addition to any other regular compliance testing. Current Commission regulation 23.603 includes a testing requirement for the BCDR plan for swap entities.251 The proposed ORF testing provision would replace that requirement in current Commission regulation 23.603 and specify that, as part of the testing, covered entities would need to conduct a walk-through or tabletop exercise designed to test the effectiveness of backup facilities and capabilities at least 248 For instance, CISA makes available a free vulnerability scanner. See CISA, Cyber Hygiene Services, available at https://www.cisa.gov/cyberhygiene-services. 249 See paragraph (h)(2)(i)(C) of proposed Commission regulations 1.13 and 23.603. 250 FINRA Cybersecurity Report, supra note 66, at 13–14. FFIEC’s exam book also appears to contemplate at least some degree of penetration testing among financial institutions. See FFIEC Information Security Booklet, supra note 69, at 55 (noting that independent testing, including penetration testing and vulnerability scanning, is conducted according to the risk assessment for external-facing systems and the internal network). 251 See 17 CFR 23.603(g) (requiring the BCDR plan to tested annually by qualified, independent internal personnel or a qualified third-party service). PO 00000 Frm 00026 Fmt 4701 Sfmt 4702 annually.252 The Commission preliminarily believes that swap entities currently test their BCDR plans through such exercises and that they are an important way to test the effectiveness of a BCDR plan in practice. Unlike current Commission regulation 23.603, however, the proposed rule would not require that covered entities’ BCDR plans be audited every three years by a qualified third-party service provider.253 Based on the Commission’s experience, this audit requirement has proven redundant and unnecessary in light of the requirements to review and test the plan annually. 3. Independence—Proposed Paragraph (h)(3) To support the reliability and objectivity of the review and testing results, the proposed rule would require the reviews and testing to be conducted by qualified personnel who are independent of the aspect of the ORF being reviewed or tested.254 The personnel conducting the testing could be employees of the covered entity itself, an affiliate, or of a third-party service provider, provided that such personnel are sufficiently trained and not responsible for the development, installation, operation, or maintenance of the ‘‘object’’ of the testing (e.g., covered technology, key controls, training, etc.). For example, a covered entity’s internal audit department may be sufficiently trained and independent to test certain key controls but may need to secure a third-party to test certain systems or program installations if it does not have sufficient capabilities inhouse. Covered entities would therefore be permitted under the proposal to determine whether a particular test should be conducted in-house or by a third-party service provider, provided that the qualification and independence requirements are met.255 This proposed independence requirement is consistent with the testing requirement for swap entity 252 Current Commission regulation 23.603 does not specify the nature of the BCDR testing, see id. 253 See id. (‘‘Each business continuity and disaster recovery plan shall be audited at least once every three years by a qualified third party service. The date the audit was performed shall be documented, together with the nature and scope of the audit, any deficiencies found, any corrective action taken, and the date that corrective action was taken.’’). 254 See paragraph (h)(3) of proposed Commission regulations 1.13 and 23.603. 255 If a covered entity determines to use a thirdparty service provider, the proposed requirements and guidance with respect to the management of third-party relationships would apply. See supra note 153 and accompanying text. E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules BCDR plans in current Commission regulation 23.603.256 4. Documentation—Proposed Paragraph (h)(4) The proposed rule would require covered entities to document all reviews and testing of the ORF. The documentation would need to include, at a minimum: (i) the date the review or testing was conducted; (ii) the nature and scope of the review or testing, including methodologies employed; (iii) the results of the review or testing, including any assessment of effectiveness; (iv) any identified deficiencies and recommendations for remediation; and (v) any corrective action(s) taken, including the date(s) such actions were taken.257 The Commission primarily believes documenting these key aspects of the testing and related results would not only assist in ensuring accountability for the testing, but would help covered entities take full advantage of any insights the testing may provide and to build upon their resiliency from lessons learned. Such documentation would also assist the Commission in performing its oversight duties with respect to covered entities and their implementation of their ORF. This proposed documentation requirement is consistent with the requirement for swap entity BCDR plans in current Commission regulation 23.603.258 ddrumheller on DSK120RN23PROD with PROPOSALS2 5. Internal Reporting—Proposed Paragraph (h)(5) To support covered entities’ compliance with the ORF rule and ensure that senior leadership is apprised of and held accountable for the effectiveness of the ORF, the proposed rule would expressly require covered entities to report on the results of their reviews and testing to the CCO and any other relevant senior-level official(s) and oversight body(ies).259 The proposed rule would not mandate the form, method, or frequency of such reporting, but the Commission would encourage the reporting to be provided in a sufficiently timely manner so as to allow the CCO and senior leadership to 256 See 17 CFR 23.603(g) (requiring the BCDR plan to tested annually by qualified, independent internal personnel or a qualified third-party service). 257 See paragraph (h)(4)(i)–(v) of proposed Commission regulations 1.13 and 23.603. 258 See 17 CFR 23.603(g) (‘‘The date the testing was performed shall be documented, together with the nature and scope of the testing, any deficiencies found, any corrective action taken, and the date that corrective action was taken.’’). 259 See paragraph (h)(5) of proposed Commission regulations 1.13 and 23.603. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 act upon the information to take steps to improve compliance and the overall effectiveness of the ORF. This requirement does not exist with respect to the swap entity BCDR plan requirement in current Commission regulation 23.603 and would therefore be a new requirement. 6. Request for Comment The Commission invites comment on all aspects of the proposed review and testing requirements, including the following question: 1. Key Controls. The proposed rule would require covered entities to test key controls on at least an annual basis and includes a definition of ‘‘key controls’’ that is comparable to how the term is defined for purposes of the Commission’s system safeguard requirements for registered entities.260 Are covered entities currently testing key controls? How are they determining what controls should be regularly tested? Should the Commission consider allowing covered entities to define ‘‘key controls’’ for themselves consistent with the proposed (b)(3) standard? H. Required Notifications—Proposed Paragraphs (i) and (j) The proposed rule would require covered entities to notify the Commission, customers, or counterparties of certain events within the scope of the ORF. Notifications to the Commission would relate to incidents that have an adverse impact, or a covered entity’s decision to activate its BCDR plan.261 Notifications to customers or counterparties would relate to incidents that adversely impact their interests.262 These notification provisions are discussed in turn below. 1. Commission Notification of Incidents—Proposed Paragraph (i)(1) The proposed rule would require covered entities to notify the Commission of any incident that adversely impacts, or is reasonably likely to adversely impact, (A) information and technology security, (B) the ability of the covered entity to continue its business activities as a covered entity, or (C) the assets or positions of a customer or counterparty.263 The notification would 260 See, e.g., 17 CFR 37.1401(h)(1) (SEFs); 17 CFR 38.1051(h)(1) (DCMs); 17 CFR 39.18(a) (DCOs); 17 CFR 49.24(j)(1) (SDRs) (defining ‘‘key controls’’ for purposes of system safeguard requirements). 261 See paragraph (i) of proposed Commission regulations 1.13 and 23.603. 262 See paragraph (j) of proposed Commission regulations 1.13 and 23.603. 263 See paragraph (i)(1)(A)–(C) of proposed Commission regulations 1.13 and 23.603. PO 00000 Frm 00027 Fmt 4701 Sfmt 4702 4731 need to include any information available to the covered entity at the time of the notification that could assist the Commission in assessing and responding to the incident, including the date the incident was detected, possible cause(s) of the incident, its apparent or likely impacts, and any actions the covered entity has taken or is taking to mitigate or recover from the incident, including measures to protect customers or counterparties.264 Covered entities would need to provide the notification as soon as possible, but no later than 24 hours after such incident has been detected.265 The purpose of this proposed notification provision is multifold. At a fundamental level, the proposed rule would allow the Commission to exercise its oversight function with respect to the ORF, offering the Commission a realworld, real-time insight into the effectiveness of a particular covered entity’s ORF and whether it is operating as intended. Early warning of impactful incidents would also enable the Commission to be more responsive, providing guidance or appropriate relief to help the covered entity withstand and recover from the incident. The Commission would also expect such early warnings to aid it in identifying and reacting to events that could pose a more systemic threat, either to the markets due to the severity of the impact of the incident or to other covered entities due to the nature of the incident (e.g., a ransomware attack against multiple covered entities or a third-party service provider engaged by more than one covered entity). In such potentially systemic circumstances, early awareness of the incident is expected to facilitate the Commission’s role in coordinating industry efforts and information sharing, allowing it to help forestall the impact of potential broadscale threats by sharing information with other regulators through its involvement in Financial and Banking Information Infrastructure Committee (FBIIC), issue timely statements to stabilize public confidence, and potentially take emergency regulatory action. Over time, the Commission preliminarily believes that the knowledge and experience gained from these incident reports could provide the Commission a vantage point from which to identify trends and lessons learned that could improve its supervisory guidance supporting industry efforts to 264 See paragraph (i)(1)(ii) of proposed Commission regulations 1.13 and 23.603. 265 See paragraph (i)(1)(iii) of proposed Commission regulations 1.13 and 23.603. E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 4732 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules enhance their ORF practices, or lead to other regulatory improvements. As discussed above, the proposed rule would define ‘‘incident’’ as any event, occurrence or circumstance that could jeopardize (i.e., put into danger) information and technology security.266 This standard would include events that have the potential to harm information and technology security regardless of whether a harm actually materializes. The proposed notification standard, by contrast, would limit the scope of incidents required to be reported to the Commission to those where there is an observable negative impact or harm, or such negative impact or harm is reasonably likely. Covered entities would not, for instance, need to notify the Commission of unsuccessful attempts at unauthorized access, as the detection and deterrence of such an attempt would not require Commission action and would appear to be suggestive of an ORF that is operating as expected. If, however, a covered entity determines that an unauthorized person did access covered information, the Commission would need to be notified, regardless of how much information was accessed or whether the covered entity believes it has been used. The Commission would similarly want to know of any successful distributed denial-of-service attack that disrupts business operations, regardless of the length of time of that disruption.267 The Commission appreciates that, at the outset, information regarding an incident is likely to be incomplete and in flux, and the full impact and root cause of an incident may take some time to reveal itself. Covered entities may also not be able to detect incidents immediately after their occurrence, and with sophisticated malicious attacks, culprits often take steps to hide their intrusions. Nevertheless, the Commission preliminarily believes that delays in reporting an incident to the Commission could impede its ability to make timely assessments and take appropriate action. The Commission is concerned that such delays could have broad implications, especially when there are potential sector-wide ramifications or spill-over effects to other regulated entities that the Commission could assist in managing. Accordingly, the proposed rule would not prescribe a specific form or content for the notification or include a materiality limiter. The proposed rule 266 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘incident’’). 267 Covered entities would not need to notify the Commission of routine testing or planned maintenance. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 would only require that covered entities provide whatever information they have on hand at the time that could assist the Commission in its assessment and response activities.268 If the proposed rule is adopted, the Commission would simply expect that as an incident progresses, covered entities would continue to engage with the Commission and provide updates as needed.269 The proposed rule would not prescribe a particular form for the notification but would require notification via email.270 2. Commission Notification of BCDR Plan Activation—Proposed Paragraph (i)(2) For similar reasons, the proposed rule would also require covered entities to notify the Commission of any determination to activate its BCDR plan.271 Consistent with the proposed incident notification, covered entities would need to notify the Commission of its determination to activate their BCDR plan within 24 hours of making that determination.272 Current Commission regulation 23.603 requires swap entities to notify the Commission ‘‘promptly’’ of any emergency or other disruption that may affect the ability of a swap entity to fulfill its regulatory obligations or would have a significant adverse effect on the swap entity, its counterparties, or the market.273 Based on the Commission’s experience with this provision, which became particularly relevant during the onset of the COVID– 19 pandemic, the Commission believes this standard has been open to wide interpretation among swap entities, leading to broad variations in the timeliness of the notifications to the Commission regarding their decisions to implement their BCDR plans and employ a remote work posture. The Commission therefore preliminarily believes that a more bright-line test that centers on the decision to activate the 268 See paragraph (i)(1)(ii) of proposed Commission regulations 1.13 and 23.603. 269 For avoidance of doubt, the proposed rule would not have any impact on covered entities’ obligations to notify criminal authorities as appropriate or required by other law or regulation. 270 See paragraph (i)(2)(iii) of proposed Commission regulations 1.13 and 23.603. 271 See paragraph (i)(2)(i) of proposed Commission regulations 1.13 and 23.603. 272 See paragraph (i)(2)(iii) of proposed Commission regulations 1.13 and 23.603. 273 See 17 CFR 23.603(d) (‘‘Each swap dealer and major swap participant shall promptly notify the Commission of any emergency or other disruption that may affect the ability of the swap dealer or major swap participant to fulfill its regulatory obligations or would have a significant adverse effect on the swap dealer or major swap participant, its counterparties, or the market.’’). PO 00000 Frm 00028 Fmt 4701 Sfmt 4702 BCDR plan, an action that presumably would not occur absent an emergency or significant disruption impacting the covered entity, would be easier to apply. The Commission also believes such a standard would facilitate the prompt delivery of information to the Commission so that it may consider whether any action to support the continued integrity of the markets during the course of the emergency is necessary to continue to fulfill its oversight obligations. For that purpose, the Commission believes that 24 hours from activation of the BCDR plan would both encourage covered entities to inform the Commission with sufficient time for it to take any needed action and encourage covered entities to focus initial efforts on resuming or continuing operations. Under the proposed rule, the notification would need to include all information available to the covered entity at that time, including the date of the emergency or disruption, a brief description thereof, its apparent impact, and any actions the covered entity has taken or is taking to mitigate or recover from the incident, including measures to protect customers and counterparties, as the Commission believes this information would be necessary for it to perform its oversight obligations and take responsive action if needed.274 The proposed rule would not prescribe a particular form for the notification but would require notification via email.275 3. Notifications to Customers or Counterparties—Proposed Paragraph (j) Finally, the proposed rule would require covered entities to notify customers or counterparties as soon as possible of any incident that could have adversely affected the confidentiality or integrity of such customer or counterparty’s covered information or their assets or positions.276 Such incidents could include the identification of a longstanding vulnerability that left exposed covered information, regardless of whether the covered entity has determined that a 274 See paragraph (i)(2)(ii) of proposed Commission regulations 1.13 and 23.603. 275 See paragraph (i)(2)(iii) of proposed Commission regulations 1.13 and 23.603. Current Commission regulation 23.603 does not prescribe the contents of the notification or the method of notification, so these would be new requirements for swap entities. See 17 CFR 23.603(d) (‘‘Each swap dealer and major swap participant shall promptly notify the Commission of any emergency or other disruption that may affect the ability of the swap dealer or major swap participant to fulfill its regulatory obligations or would have a significant adverse effect on the swap dealer or major swap participant, its counterparties, or the market.’’). 276 See paragraph (j)(1) of proposed Commission regulations 1.13 and 23.603. E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 bad actor has obtained access to that information. The Commission preliminarily believes that covered entities owe an enhanced duty to protect the covered information provided to them by their customers and counterparties in order to ensure market integrity and support customer protections. The proposed notification standard therefore encompasses incidents where an impact on customers or counterparties may not be definite so that they may have an opportunity to take whatever actions they deem necessary to protect their interests. Unlike with the proposed notifications to the Commission, however, the Commission preliminarily believes that the accuracy of information provided to customers and counterparties should be prioritized over early delivery to avoid causing unnecessary panic that could have potentially negative and irreversible spill-over effects. Accordingly, the proposed customer/counterparty notification provision does not include a specific minimum timing requirement for the notification other than to require the notification to be provided to customers and counterparties as soon as possible.277 The proposed rule would further require covered entities to disclose to customers and counterparties information necessary for them to understand and assess the potential impact of the incident on their information, assets, or positions and take any necessary actions (e.g., closing accounts, changing passwords).278 Such information would include, at a minimum, a description of the incident, the particular way in which the customer or counterparty may have been adversely impacted, measures taken by the covered entity to protect against further harm, and contact information for the covered entity where the customer or counterparty may learn more or ask questions.279 4. Request for Comment The Commission invites comment on all aspects of its proposed ORF notification provisions, including the following questions: 1. Incident notification to Commission. The proposed rule would require covered entities to notify the Commission of any incident that ‘‘adversely impacts, or is reasonably likely to adversely impact,’’ information and technology security, the ability of the covered entity to continue its 277 See id. paragraphs (j)(2)(i)–(iv) of proposed Commission regulations 1.13 and 23.603. 279 See id. 278 See VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 business activities as a covered entity, or the assets or positions of a customer or counterparty. As discussed above, the Commission believes this standard would give the Commission an early warning of incidents that do result in an observable negative impact or harm, or such negative impact or harm is reasonably likely, i.e., where information and technology security, business operations, or customers/ counterparties is harmed or compromised. Given the purpose of the proposed rule as providing the Commission an early warning so that it may act to help mitigate the potential impacts of the event, the proposed rule does not include a materiality limiter. Should the Commission consider including changing the requirement to further limit the incident notice to the incidents with a ‘‘material’’ or ‘‘significant’’ adverse impact, or where such a material or significant adverse impact would be reasonably likely? If yes, how would including such a materiality limiter change the scope of incidents that would be reported to the Commission? In other words, what types of incidents would not be reported to the Commission under a standard that includes a materiality limiter, and why should the Commission not receive an early warning of those types of incidents? Please explain and provide examples. 2. BCDR notification to Commission. The Commission is proposing to change the notification requirement in Commission regulation 23.603 to trigger upon a covered entity’s determination to activate its BCDR plan, rather than ‘‘promptly’’ after an emergency or other disruption. Do covered entities typically make a specific determination before activating the BCDR plan? What is the process for making that determination and who makes it? Are there aspects of the BCDR plan that may become active before any formal determination is made? Should the Commission instead require notification ‘‘when’’ or ‘‘as soon as’’ a BCDR plan is activated? Why or why not? Please explain. 3. Notifications to customers or counterparties. The proposed rule would require covered entities to provide affected customers and counterparties information necessary for the affected customer/counterparty to understand and assess the potential impact of the incident on its information, assets, or positions and to take any necessary action. Does the proposed rule provide sufficient information for covered entities to assess and comply with that standard? PO 00000 Frm 00029 Fmt 4701 Sfmt 4702 4733 I. Amendment and Expansion of Other Provisions in Current Commission Regulation 23.603 As mentioned in previous sections of this notice, the proposed rule would expand and apply the substance of existing provisions in current Commission regulation 23.603 to all covered entities and the ORF in its entirety. Such provisions not yet addressed include (1) the establishment of emergency contacts for the Commission and (2) recordkeeping obligations.280 1. Emergency Contacts—Proposed Paragraph (k) To assist the Commission in responding to a reported incident, or an emergency or other significant disruption causing a covered entity to activate its BCDR plan, the proposed rule would require each covered entity to provide the Commission the name and contact information for two employees with knowledge of the covered entity’s incident response plan and two employees with knowledge of the covered entity’s BCDR plan.281 Each identified employee would need to be authorized to make key decisions on behalf of the covered entity in the event of either an incident or the BCDR plan activation, as applicable, as the Commission would want to be sure to be contacting personnel with appropriate knowledge and authority.282 Any updates to the ORF contacts would need to be made to the Commission as necessary to ensure the Commission’s contact information remains accurate and up to date.283 This provision is consistent with the existing emergency contacts requirement in the swap entity BCDR plan requirement in current Commission regulation 23.603.284 280 See 17 CFR 23.603(e) and (i). The Commission would not retain Commission regulation 23.603(h) (business continuity and disaster recovery plans required by other regulatory authorities) as superfluous, see supra note 198. 281 See paragraph (k)(1) of proposed Commission regulations 1.13 and 23.603. See also 17 CFR 23.603(e) (requiring the designation of two emergency contacts with respect to the BCDR plan for swap entities). 282 See paragraph (k)(2) of proposed Commission regulations 1.13 and 23.603. The two employee contacts identified with respect to the information and technology security program could be the same as the employee contacts for the BCDR plan, provided that they have the requisite authority. See id. 283 See paragraph (k)(3) of proposed Commission regulations 1.13 and 23.603. 284 See 17 CFR 23.603(e) (‘‘Each swap dealer and major swap participant shall provide to the Commission the name and contact information of two employees who the Commission can contact in the event of an emergency or other disruption. The E:\FR\FM\24JAP2.SGM Continued 24JAP2 4734 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules 2. Recordkeeping—Proposed Paragraph (l) To aid the Commission in fulfilling its oversight responsibilities, the proposed rule would require each covered entity to maintain all records required pursuant to the proposed ORF rule, including the information and technology security program, the thirdparty relationship program, and the BCDR plan, in accordance with Commission regulation 1.31 and to make them available promptly upon request to representatives of the Commission and to representations of applicable prudential regulators as defined in section 1a(39) of the CEA.285 This provision is consistent with the existing recordkeeping requirement in the swap entity BCDR plan requirement in current Commission regulation 23.603.286 3. Request for Comment The Commission invites comment on all aspects of the proposed emergency contacts and recordkeeping requirements. J. Cross-Border Application for Swap Entities ddrumheller on DSK120RN23PROD with PROPOSALS2 In September 2020, the Commission published a final rule addressing the cross-border application of certain provisions of the CEA applicable to swap entities.287 The rule addresses the application of the registration thresholds and certain requirements applicable to swap entities and establishes a formal process for requesting comparability determinations for such requirements from the Commission.288 Therein, the Commission classified current Commission regulation 23.603 (BCDR requirements for swap entities) as a individuals identified shall be authorized to make key decisions on behalf of the swap dealer or major swap participant and have knowledge of the firm’s business continuity and disaster recovery plan. The swap dealer or major swap participant shall provide the Commission with any updates to this information promptly.’’). 285 See paragraph (l) of proposed Commission regulations 1.13 and 23.603. See 7 U.S.C. 1(a)(39). 286 See 17 CFR 23.603(i) (‘‘The business continuity and disaster recovery plan of the swap dealer and major swap participant and all other records required to be maintained pursuant to this section shall be maintained in accordance with Commission Regulation § 1.31 and shall be made available promptly upon request to representatives of the Commission and to representatives of applicable prudential regulators.’’). 287 See Cross-Border Application of the Registration Thresholds and Certain Requirements Applicable to Swap Dealers and Major Swap Participants, 85 FR 56924 (Sept. 14, 2020) (Final Cross Border Rule); 17 CFR 23.23. 288 Id. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 group A requirement.289 The Commission described the group A requirements as helping swap entities ‘‘implement and maintain a comprehensive and robust system of internal controls to ensure the financial integrity of the firm, and, in turn, the protection of the financial system’’ and as ‘‘constitut[ing] an important line of defense against financial, operational, and compliance risks that could lead to a firm’s default.’’ 290 Pursuant to Commission regulation 23.23(f)(1), a non-U.S. swap entity may satisfy any applicable group A requirement on an entity-wide basis by complying with the applicable standards of a foreign jurisdiction to the extent permitted by, and subject to any conditions specified in, a comparability determination issued by the Commission.291 In determining to offer substituted compliance for group A requirements broadly to all non-U.S. swap entities, the Commission explained its belief that group A requirements cannot be effectively applied on a fragmented jurisdictional basis, such that it would not be practical to limit substituted compliance for group A requirements to transactions involving only non-U.S. persons.292 As discussed above, the proposed rule would amend current Commission regulation 23.603 to contain the entirety of the ORF requirements applicable to swap entities, which would include requirements not only relating to BCDR but also those relating to information and technology security and third-party relationships. The Commission preliminarily believes that the same rationale for classifying BCDR requirements as a group A requirement would apply to the ORF rule more broadly. As discussed in detail above, the Commission preliminarily believes that the proposed information and technology security and third-party risk relationship requirements would also serve to help swap entities implement and maintain a comprehensive and robust system of internal controls, serving as an important line of defense against the threat of failure at the firm level and of the financial system more broadly. Accordingly, should the ORF rule be adopted, the Commission would 289 Id. at 56964–65; 17 CFR 23.23(a)(6) (defining ‘‘group A requirements’’). 290 Final Cross-Border Rule, 85 FR 56964 (providing that ‘‘requiring swap entities to rigorously monitor and address the risks they incur as part of their day-to-day businesses lowers the registrants’ risk of default—and ultimately protects the public and the financial system.’’). 291 See 17 CFR 23.23(f)(1). See also 17 CFR 23.23(a)(11) (defining ‘‘non-U.S. swap entity’’); 17 CFR 23.23(g) (describing the process for the issuance of comparability determinations). 292 See Final Cross-Border Rule, 85 FR 56977. PO 00000 Frm 00030 Fmt 4701 Sfmt 4702 continue to classify Commission regulation 23.603 in its entirety as a group A requirement, for which substituted compliance would broadly be available pursuant to the requirements of Commission regulation 23.23(f)(1). As mentioned above, Commission regulation 23.23(f)(1) only allows substituted compliance ‘‘to the extent permitted by, and subject to any conditions specified in, a comparability determination issued by the Commission under [Commission regulation 23.23(g)].’’ 293 Current Commission comparability determinations do not address the entirety of the proposed ORF rule, as it has yet to be adopted. Rather, they only address the requirements in current Commission regulation 23.603, which are limited to the BCDR plan requirement. The Commission appreciates that non-U.S. swap entities have come to rely on existing comparability determinations with respect to the current BCDR requirements in Commission regulation 23.603. Accordingly, in the interest of comity and good governance, should the proposed rule be adopted, the Commission has preliminarily determined to permit non-U.S. swap entities to continue to rely on current comparability determinations with respect to the Commission’s BCDR requirements, even as amended. However, for substituted compliance to be available for the ORF rule in its entirety, an eligible swap entity or foreign regulatory authority would need to submit a request for a comparability determination pursuant to Commission regulation 23.23(g). The submission would need to address the full complement of the provisions of the ORF rule, however codified in amended Commission regulation 23.603, including the BCDR requirements. The Commission would then evaluate the request, considering amended Commission regulation 23.603 in its entirety, and, if the Commission were to conclude it appropriate to do so, issue updated comparability determinations that would supersede any pre-existing comparability determinations with respect to BCDR requirements for swap entities. Request for Comment The Commission invites comment on all aspects of the cross-border implications of the proposed rule. 293 See E:\FR\FM\24JAP2.SGM 17 CFR 23.23(f)(1). 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules K. Implementation Period Should the proposed rule be adopted, the Commission recognizes that covered entities may need time to establish an ORF or review and update existing plans and procedures for compliance with the proposed ORF rule. The Commission preliminarily believes that, given existing and applicable NFA, prudential, and foreign requirements, six months from the rule’s adoption would be a sufficient amount of time for covered entities to achieve compliance with the ORF rule. The Commission invites comment on the Commission’s proposed implementation period for the proposed ORF rule, including the following questions: 1. Would six months be as sufficient amount of time for covered entities to develop compliant ORFs? If not, why not? Please explain. 2. If covered entities would need more than six months to implement the ORF as proposed, how much more time would they estimate to need, and what would they be doing with that time? Please be as detailed as possible. III. Related Matters ddrumheller on DSK120RN23PROD with PROPOSALS2 A. Regulatory Flexibility Act The Regulatory Flexibility Act (RFA) requires Federal agencies, in promulgating regulations, to consider the impact of those regulations on small entities—whether the rules will have a significant economic impact on a substantial number of small entities— and if so, to provide a regulatory flexibility analysis reflecting the impact.294 The Commission has established certain definitions of ‘‘small entities’’ to be used by the Commission in evaluating the impact of its rules on small entities in accordance with the RFA.295 The proposed regulations would affect FCMs, SDs, and MSPs. The Commission has previously determined that FCMs, SDs, and MSPs are not small entities for purposes of the RFA.296 Accordingly, the Chairman, on behalf of the Commission, hereby certifies pursuant to 5 U.S.C. 506(b) that the proposed rule and rule amendments would not have a significant economic impact on a substantial number of small entities. 294 5 U.S.C. 601 et seq. Policy Statement and Establishment of Definitions of ‘‘Small Entities’’ for Purposes of the Regulatory Flexibility Act, 47 FR 18618 (Apr. 30, 1982) (RFA Definitions of ‘‘Small Entities’’). 296 See RFA Definitions of ‘‘Small Entities,’’ 47 FR 18619 (FCMs); Final Swap Entities RMP Rule, 77 FR 20193–94 (SDs and MSPs). 295 See VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 B. Paperwork Reduction Act The Paperwork Reduction Act (PRA) imposes certain requirements on federal agencies, including the Commission, in connection with conducting or sponsoring any ‘‘collection of information,’’ as defined by the PRA.297 The PRA is intended, in part, to minimize the paperwork burden created for individuals, businesses, and other persons as a result of the collection of information by federal agencies, and to ensure the greatest possible benefit and utility of information created, collected, maintained, used, shared, and disseminated by or for the Federal Government.298 The PRA applies to all information, regardless of form or format, whenever the Federal Government is obtaining, causing to be obtained, or soliciting information, and includes required disclosure to third parties or the public, of facts or opinions, when the information collection calls for answers to identical questions posed to, or identical reporting or recordkeeping requirements imposed on, ten or more persons.299 This proposed rulemaking would result in new collection of information requirements within the meaning of the PRA. The Commission is therefore submitting this proposal to the Office of Management and Budget (OMB) for review.300 The title for this collection of information is ‘‘Operational Resilience Framework for Futures Commission Merchants, Swap Dealers, and Major Swap Participants.’’ The OMB has not yet assigned this collection a control number. An agency may not conduct or sponsor, and a person is not required to respond to, a collection of information unless it displays a currently valid control number.301 If the proposed regulations are adopted, responses to this collection of information would be mandatory. The Commission will protect proprietary information according to the Freedom of Information Act and part 145 of the Commission’s regulations, ‘‘Commission Records and Information.’’ 302 In addition, section 8(a)(1) of the CEA strictly prohibits the Commission, unless specifically authorized by the CEA, from making public ‘‘data and information that would separately disclose the business transactions or market positions of any person and trade secrets or names of customers.’’ 303 297 44 U.S.C. 3501 et seq. 298 Id. 299 See 44 U.S.C. 3502(3). 44 U.S.C. 3507(d); 5 CFR 1320.11. 301 See 44 U.S.C. 3507(a)(3); 5 CFR 1320.5(a)(3). 302 See 5 U.S.C. 552. See also 17 CFR part 145. 303 7 U.S.C. 12(a)(1). 300 See PO 00000 Frm 00031 Fmt 4701 Sfmt 4702 4735 The Commission is also required to protect certain information contained in a government system of records according to the Privacy Act of 1974.304 1. Information Provided by Reporting Entities/Persons The proposed regulations would require each covered entity to establish, document, implement, and maintain an ORF that includes an information and technology security program, a thirdparty relationship program, and a BCDR plan, each of which would need to be supported by written policies and procedures. In addition, the proposed regulations would impose the following reporting, recordkeeping, and disclosure obligations on each covered entity: (1) on an annual basis, written approval of each component program or plan of the ORF and of risk appetite and risk tolerance limits, or in the case of covered entities relying on a consolidated program or plan, written attestation; (2) on an annual basis, documenting review and testing of the ORF; (3) as applicable, notifying the Commission of certain ‘‘incidents,’’ as defined in the proposed rule; (4) as applicable, notifying the Commission upon activation of the BCDR plan; (5) as applicable, notifying customers or counterparties of certain ‘‘incidents,’’ as defined in the proposed rule; and (6) providing emergency contact information to the Commission in connection with the information and technology security program and the BCDR plan. These requirements will result in new PRA burdens for covered entities. For purposes of the PRA, the term ‘‘burden’’ means the ‘‘time, effort, or financial resources expended by persons to generate, maintain, or provide information to or for a Federal Agency.’’ 305 This total includes the anticipated burden associated with the development of the required written policies and procedures, satisfaction of various reporting, recordkeeping, and disclosure obligations, the documentation of required ORF testing and review, and the documentation of risk appetite and risk tolerance limits approval. As of October 31, 2023, there are 160 covered entities that would become subject to the proposed rule (100 registered swaps dealers, 54 registered futures commission merchants, and 6 dually-registered swap dealers/futures commission merchants). The estimated burden associated with the proposed 304 See 305 44 E:\FR\FM\24JAP2.SGM 5 U.S.C. 552a. U.S.C. 3502(2). 24JAP2 4736 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules information collections is calculated as follows: ddrumheller on DSK120RN23PROD with PROPOSALS2 a. Recordkeeping Requirements The proposed regulation contains recordkeeping requirements that would result in a collection of information from ten or more persons over a 12month period. Establishing, documenting, implementing, and maintaining information and technology security program: As part of an overall ORF, proposed Commission regulations 1.13(d) and 23.603(d) would require covered entities to establish an information and technology security program reasonably designed to identify, monitor, manage, and assess risks relating to information and technology security, including through conducting and documenting risk assessments at least annually. Upon the risk assessment’s completion, the results would need to be provided to the oversight body, senior officer, or other senior-level official who approves the information and technology security program. As part of the information and technology security program, the proposed rule would require the covered entity to establish, document, implement, and maintain controls to prevent, detect, and mitigate identified risks to information and technology security. In addition, the proposed rule would require that the information and technology security program include a written incident response plan reasonably designed to detect, assess, contain, mitigate the impact of, and recover from an incident. The Commission anticipates that a covered entity would require an estimated 200 hours to develop their information and technology security program, including conducting and documenting an annual risk assessment and developing an incident response plan. This yields a total annual burden of 32,000 burden hours (160 respondents × 200 hours = 32,000 hours). Accordingly, the aggregate annual estimate for the recordkeeping burden associated with this proposal would be as follows:306 Number of registrants: 160. 306 This estimate reflects the aggregate information collection burden estimate associated with the proposed recordkeeping requirement for the first annual period following implementation of the proposed regulations. Because proposed Commission regulations 1.13(d) and 23.603(d) would require the one-time recordkeeping requirement as to developing the information and technology security program, Commission staff estimates that for each subsequent annual period, the number of burden hours would be reduced accordingly. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 Estimated number of responses: 1. Estimated total annual burden per registrant: 200 hours. Frequency of collection: Annually. Total annual burden: 32,000 burden hours [160 registrants × 200 hours]. Establishing, documenting, implementing, and maintaining thirdparty relationship program: Proposed Commission regulations 1.13(e) and 23.603(e) would require covered entities to develop a program reasonably designed to identify, monitor, manage, and assess risks relating to third-party relationships. The program would be required to address the risks attendant to each stage of the third-party relationship lifecycle and would be required to include an inventory of third-party service providers the covered entity has engaged to support its activities as a covered entity. The Commission anticipates that a covered entity would require an estimated 160 hours annually to develop their third-party relationship program, including creating and maintaining a third-party service provider inventory. This yields a total annual burden of 25,600 hours (160 respondents × 160 hours = 25,600 burden hours). The aggregate annual estimate for the recordkeeping burden associated with this proposal would be as follows: 307 Number of registrants: 160. Estimated number of responses: 1. Estimated total annual burden per registrant: 160 hours. Frequency of collection: Annually. Total annual burden: 25,600 burden hours [160 registrants × 160 hours]. Establishing, documenting, implementing, and maintaining BCDR plan: Proposed Commission regulations 1.13(f) and 23.603(f) would require covered entities to establish a written BCDR plan reasonably designed to identify, monitor, manage, and assess risks relating to emergencies or other significant disruptions to the continuity of normal business operations as a covered entity.308 The proposed rule 307 This estimate reflects the aggregate information collection burden estimate associated with the proposed recordkeeping requirement for the first annual period following implementation of the proposed regulations. Because proposed Commission regulations 1.13(e) and 23.603(e) would require the one-time recordkeeping requirement as to developing the third-party relationship program, Commission staff estimates that for each subsequent annual period, the number of burden hours would be reduced accordingly. 308 As discussed in section II.E (Continuity and Disaster Recovery Plan) of this notice, swap entities are already required to establish a written BCDR plan pursuant to current Commission regulation 23.603. The existing burdens for current Commission regulation 23.603 are found in the following information collection, Regulations PO 00000 Frm 00032 Fmt 4701 Sfmt 4702 would require the BCDR plan be reasonably designed to enable the covered entity to: (1) continue or resume any activities as a covered entity with minimal disruption to customers, counterparties, and markets; and (2) recover and make use of covered information, in addition to any other data, information, or documentation required to be maintained by law and regulation. These plans would be required to, among other things, establish procedures for data backup and establish and maintain arrangements to provide for redundancies or their backup for covered technology, facilities, infrastructure, personnel, and competencies. The Commission anticipates that a covered entity would require an estimated 50 hours annually to develop or to update their existing written BCDR plan. This yields a total annual burden of 8,000 burden hours (160 respondents × 50 hours = 8,000 hours). Accordingly, the aggregate annual estimate for the recordkeeping burden associated with this proposal would be as follows:309 Number of registrants: 160. Estimated number of responses: 1. Estimated total annual burden per registrant: 50 hours. Frequency of collection: Annually. Total annual burden: 8,000 burden hours [160 registrants × 50 hours]. Documentation of ORF review: Proposed Commission regulations 1.13(h) and 23.603(h) would require covered entities to establish, implement, and maintain plans reasonably designed to assess their adherence to, and the effectiveness of, their ORF through regular reviews and risk-based testing. The proposed rule would require that reviews be conducted at least annually and when any material change to covered entities’ activities or operations occurs that is reasonably likely to affect Establishing and Governing the Duties of Swap Dealers and Major Swap Participants (OMB Control No. 3038–0084). The burden of swap entities updating their BCDR plan is included in the new collection of information established by the proposed rule, but the Commission is retaining its existing burden estimates under Control No. 3038– 0084 at this time to avoid undercounting. The Commission will adjust its burden estimates associated with OMB Control No. 3038–0084 at a later date, as necessary. 309 This estimate reflects the aggregate information collection burden estimate associated with the proposed recordkeeping requirement for the first annual period following implementation of the proposed regulations. Because proposed Commission regulations 1.13(f) and 23.603(f) would require the one-time recordkeeping requirement, as to developing the BCDR plan, Commission staff estimates that for each subsequent annual period, the number of burden hours would be reduced accordingly. E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 the risks identified in the ORF. With regard to testing, the proposed rule would require that the testing of information and technology security program include, at a minimum, the testing of key controls and the incident response plan at least annually; daily or continuous automated vulnerability scans; and penetration testing at least annually. Additionally, the proposed rule would require that testing of the BCDR plan must include, at a minimum, a walk-through or tabletop exercise designed to test the effectiveness of backup facilities and capabilities at least annually. The proposed rule would also require covered entities to document all reviews and testing of their ORFs. The proposed rule would require that documentation to include, at a minimum, (i) the date the review or testing was conducted; (ii) the nature and scope of the review or testing, including methodologies employed; (iii) the results of the review or testing, including any assessment of effectiveness; (iv) any identified deficiencies and recommendations for remediation; and (v) any corrective action(s) taken or initiated, including the date(s) of such action(s). The Commission anticipates that covered entities would require an estimated 80 hours annually to establish a plan to assess adherence to, and the effectiveness of, its ORF, as well as documenting all reviews and testing of the ORF. This yields a total annual burden of 12,800 hours (160 respondents × 80 hours = 12,800 burden hours). The aggregate annual estimate for the recordkeeping burden associated with this proposal would be as follows: 310 Number of registrants: 160. Estimated number of responses: 1. Estimated total annual burden per registrant: 80 hours. Frequency of collection: Annually. Total annual burden: 12,800 burden hours [160 registrants × 80 hours]. Documentation of approval of the component programs or plan, risk appetite, and risk tolerance limits: Proposed Commission regulations 1.13(c)(1) and 23.603(c)(1) would require covered entities to ensure that the information and technology security 310 This estimate reflects the aggregate information collection burden estimate associated with the proposed recordkeeping requirement for the first annual period following implementation of the proposed regulations. Because proposed Commission regulations 1.13(h) and 23.603(h) would require the one-time recordkeeping requirement as to developing a plan to assess the effectiveness of the ORF, Commission staff estimates that for each subsequent annual period, the number of burden hours would be reduced accordingly. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 program, third-party relationship program, and BCDR plan are approved in writing on at least an annual basis by either the senior officer, an oversight body, or a senior-level official with primary responsibility for the component programs or plan. Proposed Commission regulations 1.13(c)(2) and 23.603(c)(2) would require the risk appetite and risk tolerance limits established by covered entities be approved in writing at least annually by either the senior officer, an oversight body, or a senior-level official. Proposed Commission regulations 1.13(c)(4)(ii) and 23.603(c)(4)(ii) would allow covered entities that rely on a consolidated program or plan for its ORF to meet the annual approval requirement for the component programs or plan of the ORF, risk appetite, and risk tolerance limits through an annual written attestation by either the senior officer, an oversight body, or a senior-level official. The Commission anticipates that covered entities would require an estimated 20 hours annually to document approval of the ORF, risk appetite, and risk tolerance limits or to prepare the written attestation. This yields a total annual burden of 3,200 hours (160 respondents × 20 hours = 3,200 burden hours). The aggregate annual estimate for the recordkeeping burden associated with this proposal would be as follows: Number of registrants: 160. Estimated number of responses: 1. Estimated total annual burden per registrant: 20 hours. Frequency of collection: Annually. Total annual burden: 3,200 burden hours [160 registrants × 20 hours]. b. Reporting Requirements The proposed regulation contains reporting requirements that would result in a collection of information from ten or more persons over a 12month period. Notification of incidents to the Commission: Proposed Commission regulations 1.13(i)(1) and 23.603(i)(1) would require covered entities to notify the Commission regarding incidents that adversely impact or are reasonably likely to adversely impact: (1) information technology and security; (2) the covered entity’s ability to continue its business activities; or (3) the assets or positions of a customer or counterparty. These notifications would be required to include information that may assist the Commission in assessing and responding to the incident, including the date the incident was detected, possible cause(s) of the incident, its apparent or likely impacts, PO 00000 Frm 00033 Fmt 4701 Sfmt 4702 4737 and any actions the covered entity has taken or is taking to mitigate or recover from the incident. Notifications would be required to be submitted via email as soon as possible, but no later than 24 hours after an incident is detected. The Commission anticipates that covered entities may experience one reportable incident per year and that covered entities would expend approximately 10 hours to gather the information required and provide the required notification to the Commission. This would result in an estimated total annual burden of 1,600 hours (160 respondents × 1 reportable incident per year × 10 hours per reportable incident = 1,600 hours). The aggregate annual estimate for the reporting burden associated with this proposal would be as follows: Number of registrants: 160. Estimated number of responses: 1. Estimated total annual burden per registrant: 10 hours. Frequency of collection: As needed. Total annual burden: 1,600 burden hours [160 registrants × 10 hours]. Notification of BCDR plan activation: Proposed Commission regulations 1.13(i)(2) and 23.603(i)(2) would require covered entities to notify the Commission of any determination to activate the BCDR plan. Covered entities would be required to provide such notices via email and include any information available at the time of the notification that may assist the Commission in assessing or responding to the emergency or disruption, including the date of the emergency or disruption, a description thereof, the possible cause(s), its apparent or likely impacts, and any actions the covered entity has taken or is taking to mitigate or recover from the emergency or disruption, including measures taken or being taken to protect customers. The Commission anticipates that approximately 3 covered entities may activate their BCDR plan per year and that such covered entities would expend approximately 10 hours to gather the information required and to provide the required notification to the Commission. This would result in an estimated total annual burden of 30 burden hours (3 BCDR activations per year × 10 hours per BCDR activation = 30 hours). The aggregate annual estimate for the reporting burden associated with this proposal would be as follows: Number of registrants: 3. Estimated number of responses per respondent: 1. Estimated total annual burden per registrant: 10 hours. Frequency of collection: As needed. E:\FR\FM\24JAP2.SGM 24JAP2 4738 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules Total annual burden: 30 burden hours [3 BCDR activations per year × 10 hours]. Filing emergency contact information: Proposed Commission regulations 1.13(k) and 23.603(k) would require covered entities to provide the Commission with emergency contact information for employees to serve as contacts in connection with required incident notifications under the ORF and the activation of the covered entity’s BCDR plan. The Commission anticipates that covered entities would require an estimated 1 hour annually to provide the Commission with emergency contact information. This yields a total annual burden of 160 burden hours (160 respondents × 1 hour = 160 burden hours). The aggregate annual estimate for the reporting burden associated with this proposal would be as follows: 311 Number of registrants: 160. Estimated number of responses: 1. Estimated total annual burden per registrant: 1 hour. Frequency of collection: As needed. Total annual burden: 160 burden hours [160 registrants × 1 hour]. ddrumheller on DSK120RN23PROD with PROPOSALS2 c. Disclosure Requirements The proposed regulation contains disclosure requirements that would result in a collection of information from ten or more persons over a 12month period. Notification of incidents to affected customers and counterparties: Proposed Commission regulations 1.13(j) and 23.603(j) would require covered entities to notify their customers and counterparties as soon as possible of any incident that is reasonably likely to have adversely affected the confidentiality or integrity of the customer’s or counterparty’s covered information, assets, or positions. The proposed rule would require that notifications include information necessary for the affected customer or counterparty to understand and assess the potential impact of the incident on its information, assets, or positions and to take any necessary action. Such notifications shall include, at a minimum, a description of the incident; the way the customer or counterparty, or its covered information, 311 This estimate reflects the aggregate information collection burden estimate associated with the proposed reporting requirement for the first annual period following implementation of the proposed regulations. Because proposed Commission regulations 1.13(k) and 23.603(k) would require the emergency contact information provided to the Commission to be updated only as necessary, Commission staff estimates that for each subsequent annual period, the number of burden hours would be reduced accordingly. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 may have been adversely impacted; measures being taken by the covered entity to protect against further harm; and contact information for the covered entity where the customer or counterparty may learn more about the incident or ask questions. The Commission anticipates that covered entities may experience 17 reportable incidents per year and that covered entities would expend approximately 50 hours to gather the required information necessary to provide notice of an incident and to prepare and deliver the required notification. This would result in an estimated total annual burden of 850 burden hours (17 reportable incidents per year × 50 hours per reportable incident = 850 burden hours). The aggregate annual estimate for the disclosure burden associated with this proposal would be as follows: Number of registrants: 17. Estimated number of responses per respondent: 1. Estimated total annual burden per registrant: 50 hours. Frequency of collection: As needed. Total annual burden: 850 burden hours [17 reportable incidents per year × 50 hours]. d. Total Burden Based upon the estimates above, the aggregate annual cost for all covered entities is 84,240 burden hours. It is expected that covered entities will utilize existing software, information technology and systems. Thus, the Commission believes any additional capital/startup costs or operational/maintenance costs incurred by respondents to report the information required by the proposed regulations to the Commission would be negligible, if any. 2. Request for Comment The Commission invites the public and other federal agencies to comment on any aspect of the reporting, recordkeeping, and disclosure burdens discussed above. Pursuant to 44 U.S.C. 3506(c)(2)(B), the Commission will consider public comments on this proposed collection of information in: (1) Evaluating whether the proposed collection of information is necessary for the proper performance of the functions of the Commission, including whether the information will have practical utility; (2) Evaluating the accuracy of the Commission’s estimate of the burden of the proposed collection of information, including the degree to which the methodology and the assumptions that the Commission employed were valid; PO 00000 Frm 00034 Fmt 4701 Sfmt 4702 (3) Enhancing the quality, utility, and clarity of the information proposed to be collected; and (4) Minimizing the burden of the collection of information on covered entities, including through the use of appropriate automated, electronic, mechanical, or other technological information collection techniques, e.g., permitting electronic submission of responses. A copy of the supporting statements for the collections of information discussed above are available from the CFTC Clearance Officer, 1155 21st Street NW, Washington, DC 20581, 202– 418–5714, or from https:// www.RegInfo.gov. Organizations and individuals desiring to submit comments on the proposed information collection requirements should send those comments to: • The Office of Information and Regulatory Affairs, Office of Management and Building, Room 10235, New Executive Office Building, Washington, DC 20503, Attn: Desk Officer of the Commodity Futures Trading Commission; • 202–395–6566 (fax); • OIRAsubmissions@omb.eop.gov (email). Please provide the Commission with a copy of submitted comments so that all comments can be summarized and addressed in the final rulemaking. Please refer to the ADDRESSES section of this notice of proposed rulemaking for comment submission instructions to the Commission. OMB is required to decide concerning the collection of information between 30 and 60 days after publication of this document in the Federal Register. Therefore, a comment is best assured of receiving full consideration if OMB (and the Commission) receives it within 30 calendar days of publication of this notice. Nothing in the foregoing affects the deadline enumerated above for public comment to the Commission on the proposed rule. C. Cost-Benefit Considerations Section 15(a) of the CEA requires the Commission to consider the costs and benefits of its discretionary actions before promulgating a regulation under the CEA or issuing certain orders.312 Section 15(a) further specifies that the costs and benefits shall be evaluated in light of five broad areas of market and public concern: (1) Protection of market participants and the public; (2) efficiency, competitiveness, and financial integrity of swaps markets; (3) price discovery; (4) sound risk 312 See E:\FR\FM\24JAP2.SGM 7 U.S.C. 19(a). 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules management practices; and (5) other public interest considerations.313 In conducting its analysis, the Commission may, in its discretion, give greater weight to any one of the five enumerated areas of concern. The Commission considers the costs and benefits resulting from its discretionary determinations with respect to the considerations of section 15(a) of the CEA. As detailed above, the proposed rule would require covered entities (FCMs, SDs, and MSPs) to establish, document, implement, and maintain an ORF reasonably designed to identify, monitor, manage, and assess risks relating to (i) information and technology security, (ii) third-party service providers, and (iii) emergencies or other significant disruptions to the continuity of their normal business operations.314 The ORF would accordingly need to include a program or plan directed at each of these three risk areas (an information and technology security program, a thirdparty relationship program, and a business continuity and disaster recovery plan), as well as a plan for the review and testing of the ORF, each of which would need to meet certain specified minimum requirements.315 The proposed rule would further establish governance, training, and recordkeeping requirements related to the ORF, as well as require notification of certain ORF-related events to the Commission and customers or counterparties.316 The main purpose of the proposed ORF, as discussed above, is to promote sound practices for managing risks relating to information and technology security, third-party relationships, and emergencies or other significant disruptions, so as to support covered entity operational resilience, to the benefit of customers, counterparties, and the derivatives markets more broadly. The Commission identifies and considers the benefits and costs of the proposed amendments relative to the baseline of the current status quo. As discussed above, all of the proposed ddrumheller on DSK120RN23PROD with PROPOSALS2 313 Id. 314 See paragraph (b)(1) of proposed Commission regulations 1.13 and 23.603. 315 See paragraphs (b)(2) (components), (d) (information and technology security program), (e) (third-party relationship program), (f) (business continuity and disaster recovery plan), and (h) (reviews and testing) of proposed Commission regulations 1.13 and 23.603. 316 See paragraphs (c) (governance), (g) (training), (i) (notifications to the Commission), (j) (notification of incidents to affected customers or counterparties), (k) (emergency contacts), and (l) (recordkeeping) of proposed Commission regulations 1.13 and 23.603. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 requirements would be new CFTC requirements for covered entities, with the exception of the BCDR plan requirement for swap entities, which the proposed rule would amend in certain respects.317 Nevertheless, the Commission preliminarily believes that many, if not all, covered entities currently registered with the Commission have likely adopted documents, policies, and practices consistent with the proposed ORF rule. Current NFA rules and interpretive notices, for instance, address the core risks at the center of the ORF— information and technology security, third-party risks, and BCDR planning— and establish related requirements that apply to covered entities, including a BCDR plan requirement for FCMs.318 Additionally, many covered entities are subject to prudential regulation, which includes requirements relating to information security and notifications of related incidents.319 Prudential regulators have also provided guidance relating to operational resilience and third-party relationships.320 Furthermore, based on its oversight activities, the Commission preliminarily believes that certain aspects of the proposed rule requirements are already employed by many covered entities as recommended best practices. The Commission acknowledges that, no matter the degree to which a covered entity currently operates in a manner consistent with the requirements of the proposed rule, covered entities would all incur some level of costs in reviewing the proposed rule and comparing their existing practices and procedures against it to ensure they meet the minimum requirements and make any necessary updates. Nevertheless, the Commission preliminarily believes that the actual costs and benefits of the proposed rule 317 See 17 CFR 23.603. supra note 43; see also supra note 60 (noting that NFA’s requirement to establish a business continuity and disaster recovery plan does not apply to swap entities). 319 See Computer-Security Incident Notification Requirements for Banking Organizations and their Bank Service Providers, 86 FR 66424 (Nov. 23, 2021); 12 CFR part 30, app. A (Interagency Guidelines Establishing Standards for Safety and Soundness); 12 CFR part 30, app. B (Interagency Guidelines Establishing Information Security Standards). 320 See supra note 43. See also supra note 50. The Commission notes that the Prudential Operational Resilience Paper was ‘‘written for use by the largest and most complex domestic firms,’’ including financial institutions with average total consolidated assets greater than or equal to (a) $250 billion or (b) $100 billion and have $75 billion or more in average weighted short-term wholesale funding, average nonbank assets, or average offbalance-sheet exposure. See Prudential Operational Resilience Paper, supra note 11, at 1. 318 See PO 00000 Frm 00035 Fmt 4701 Sfmt 4702 4739 as realized by most current covered entities may not be as significant as they would be for entities not already subject to NFA or prudential authority or that have not already adopted operational resilience practices in line with general standards and best practices. The Commission also preliminarily believes that leveraging existing standards and guidance and aligning with other applicable authorities to the degree sensible and appropriate, as recommended by the National Cyber Strategy, in itself is a benefit to covered entities and the markets more broadly, by reducing compliance burdens while promoting practices that have proven to support operational resilience and positive regulatory outcomes. Customers, counterparties, and the public more generally would likely benefit as well, as the proposed rule would allow the Commission to exercise its oversight authority to foster compliance with the ORF requirements that are currently absent from its regulations. By its terms, section 15(a) does not specifically require the Commission to quantify the costs and benefits of a new rule or to determine whether the benefits of the adopted rule outweigh its costs. Rather, section 15(a) requires the Commission to ‘‘consider the costs and benefits’’ of a subject rule.321 The Commission has endeavored to assess the expected costs and benefits of the proposed amendments in quantitative terms, including PRA related costs, where possible. In situations where the Commission is unable to quantify the costs and benefits, the Commission identifies and considers the costs and benefits of the applicable proposed amendments in qualitative terms. However, the Commission lacks the data necessary to reasonably quantify all of the costs and benefits considered below. Additionally, any initial and recurring compliance costs for any particular covered entity would depend on its size, existing infrastructure, practices, and cost structures, as well as the nature, size, scope, complexity, and risk profile of its operations as a covered entity. It is impossible to place a reliable dollar figure on potential future incidents that might be prevented through this rulemaking because the threats are too varied. The constantly changing nature of technology exacerbates this difficulty.322 321 See 7 U.S.C. 19(a). Cybersecurity Paper, supra note 15, at 1 (‘‘The cyber threat landscape is also characterised by a significant and continuous rise in the cost of cyber incidents. Statista (2023) estimated the global cost of cyber crime in 2022 at $8.4 trillion and 322 FSI E:\FR\FM\24JAP2.SGM Continued 24JAP2 4740 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 Regarding covered entities’ costs, while the Commission generally believes—based on anecdotal information and its general understanding—that covered entities have already instituted, to a large degree, the practices called for in the proposed rule, the Commission lacks empirical evidence or data to verify that belief (including the number of covered entities whose practices currently meet the requirements being proposed) and quantify what, if any, material costs covered entities would incur to comply with the proposed regulations. To the extent covered entities would need to make operational changes to comply with the proposed amendments, the Commission expects they would be proportionate to the nature, size, scope, complexity, and risk profile of their operations as covered entities. The Commission therefore invites comments providing data and other empirical information to allow it to quantify the degree to which: (1) covered entities currently have implemented (or independent of the proposed amendments, otherwise plan to implement) practices that are compliant with the Commission’s proposed regulations and (2) the expected additional costs for any covered entities that, to date, have not completely done so or are otherwise moving independently towards doing so. The Commission notes that this costbenefit consideration is based on its understanding that the derivatives markets regulated by the Commission function internationally with: (1) transactions that involve U.S. entities occurring across different international jurisdictions; (2) some entities organized outside of the United States that are registered with the Commission; and (3) some entities that typically operate both within and outside the United States and that follow substantially similar business practices wherever they are located. Where the Commission does not specifically refer to matters of location, the discussion of costs and benefits below refers to the effects of the proposed regulations on all relevant derivatives activity, whether based on expects this to go beyond $11 trillion in 2023. This reflects an annual increase of 30% in the cost of cyber crime during the 2021–23 period. Moreover, the average cost of a data breach between 2020 and 2022 increased by 13%, with the financial industry scoring the second highest average cost after healthcare at $6 million. According to Chainalysis (202[3]), 2022 was the biggest year ever for crypto hacking, with $3.8 billion stolen from cryptocurrency businesses. Cyber insurance demand continues to outweigh supply and that the cyber protection gap appears to be widening amid a market characterised by rising premiums, narrowing coverage and tighter underwriting standards.’’). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 their actual occurrence in the United States, or on their connection with, or effect on, U.S. commerce. In the sections that follow, the Commission discusses the costs and benefits associated with the proposed rule, as well as reasonable alternatives, relative to the baseline. The Commission generally requests comment on all aspects of its costbenefit consideration, including the baseline; assumptions and methodology employed; the identification and measurement of costs and benefits relative to the baseline; the identification, measurement, and assessment of any costs and benefits not discussed herein; data and any other information to assist or otherwise inform the Commission’s ability to better quantify or qualitatively understand and describe the costs and benefits of the proposed amendments; whether and what specific alternatives would be more reasonable in terms of their costs and benefits and why; and substantiating data, statistics, and any other information to support positions posited by commenters with respect to the Commission’s discussion and/or requests for comments. 1. Costs and Benefits The following sections discuss the costs and benefits that the Commission preliminarily expects to result from the requirements in the proposed rule. e. Generally—Proposed Paragraph (b) The proposed rule would require covered entities to establish, document, implement, and maintain an ORF reasonably designed to identify, monitor, manage, and assess risks relating to: (i) information and technology security; (ii) third-party relationships; and (iii) emergencies or other significant disruptions to the continuity of normal business operations as covered entities.323 The ORF would need to, at a minimum, include an information and technology security program, a third-party relationship program, and a business continuity and disaster recovery plan, and each component program or plan would need to be supported by written policies and procedures.324 Covered entities would further need to ensure that their ORF is appropriate and proportionate to the nature, size, scope, complexity, and risk profile of their business activities as covered entities, 323 See paragraph (b)(1) of proposed Commission regulations 1.13 and 23.603. 324 See paragraph (b)(2) of proposed Commission regulations 1.13 and 23.603. PO 00000 Frm 00036 Fmt 4701 Sfmt 4702 following generally accepted standards and best practices.325 The Commission anticipates that the main source of costs associated with establishing, documenting, implementing, and maintaining the ORF, as required, would derive from creating and implementing the necessary core component programs and plan, the detailed requirements and costs and benefits of which are discussed in greater detail in the sections that follow. As discussed above, although the Commission expects that most covered entities have already established at least some of elements of the ORF in place by virtue of NFA or other requirements, covered entities would, at minimum, need to devote time and resources to reviewing their existing programs to ensure they meet the requirements of the proposed rule and making any necessary amendments. Accordingly, the Commission anticipates all covered entities would incur at least a one-time fixed cost associated with reviewing their existing programs to ensure compliance, and to identify and make any potential required updates. Specifically, the Commission expects covered entities would incur a one-time initial cost of $41,000 (410 hours 326 × $100/hour) to review their existing programs and identify and make any necessary changes, or an estimated aggregate dollar cost of $6,560,000 (160 covered entities × $41,000).327 To the extent that covered entities’ current operational resilience practices do not meet the minimum requirements 325 See paragraph (b)(3) of proposed Commission regulations 1.13 and 23.603. 326 This hour estimate reflects the aggregate amount of time the Commission estimates covered entities will expend establishing, documenting, implementing and maintaining the core component programs and plan of their ORF (i.e., information and technology security program, third-party relationship program, and business continuity and disaster recovery plan). See section III.B (Paperwork Reduction Act) of this notice, supra. 327 The cost estimates in this section were determined using an average salary of $100.00 per hour. The Commission believes that this is an appropriate salary estimate for purposes of the proposed rule based upon the May 2022 Bureau of Labor Statistics’ average hourly rate for the following positions: (1) $63.08 for management occupations; (2) $41.39 for business and financial operations occupations; (3) $51.99 for computer and mathematical occupations; (4) $67.71 for computer engineering occupations; (5) $59.87 for legal occupations; and (6) $21.90 for office and administrative support occupations. Based on this data, the Commission took the mean hourly wage for these positions and increased it to $100 in recognition that some covered entities are large financial institutions whose employees’ salaries may exceed the mean wage. See U.S. Bureau of Labor Statistics, May 2022 National Occupational Employment and Wage Estimates (last updated Apr. 25, 2023), available at https://www.bls.gov/oes/ current/oes_nat.htm#43-0000. E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules of the proposed rule, they may incur more and other forms of costs in updating the programs. Such costs could include fixed costs associated with securing new technology or other services (e.g., upgrading technology, incorporating penetration testing), or even adding new staffing to support new required functions, as well as new ongoing costs related to monitoring and training. By requiring that the ORF, and consequently the associated programs and plan, are appropriate and proportionate to the covered entity, the Commission expects that the extent of those costs should be reasonably mitigated, such that covered entities should be able to tailor their ORFs to their unique circumstances and not incur costs to adopt practices or technologies that would not be recommended or necessary for them. Additionally, to the extent costs in updating programs are unavoidable, the Commission believes the proposed ORF rule is reasonably designed to ensure that the costs would support covered entities’ operational resilience, and the broader security of the derivatives markets as a whole, as discussed in greater detail below. More specifically, the Commission believes the proposed ORF rule is reasonably designed to ensure customer and counterparty information and assets remain protected, and that the derivatives markets remain stable and functioning, particularly as covered entities become ever more reliant on rapidly evolving technology and/or third-party service providers to support their operations. Requiring all covered entities to have a framework directed at operational resilience that meets certain minimum requirements, including governance, training, and testing requirements, would give the CFTC, customers, counterparties, and covered entities themselves confidence that there exists among all covered entities a certain foundational level of security and resilience. Requiring covered entities to base their ORFs on generally accepted standards and best practices further buttresses that assurance by making sure adopted practices are grounded in standards that are commonly known and accepted, widely recognized as effective, and require adaptation as risk profiles change. Relying on existing known standards should also help mitigate implementation costs compared to complying with specific and detailed requirements created by the Commission and applied more uniformly. Furthermore, as the Commission engages in oversight of ORFs, it would expect to be able to VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 identify additional recommended best practices unique to covered entities that it could share through guidance or future rulemakings, which would operate to further support the stability of the derivatives markets. f. Governance—Proposed Paragraph (c) The proposed rule would require that each of the three required component programs and plan (the information and technology security program, the thirdparty relationship program, and the business continuity and disaster recovery plan) be approved in writing, on at least an annual basis, by either the senior officer, an oversight body, or a senior-level official of the covered entity.328 Covered entities would likely experience some costs associated with selecting the responsible official or body to provide the approval and associated costs to obtain their approval, including the time and resources needed to develop any explanatory materials, making amendments in light of any comments from leadership, and ministerial costs associated with obtaining signatures. More specifically, the Commission estimates that covered entities would incur an initial cost of $4,000 (40 hours × $100/hour) to select the responsible official or body to approve the component programs and plan of the ORF,329 or an estimated aggregate dollar cost of $640,000 (160 covered entities × $4,000). Additionally, the Commission estimates that covered entities will incur an ongoing annual cost of $1,000 for the approval of the component programs or plan of the ORF (10 hours × $100/hour),330 or an estimated aggregate dollar cost of $160,000 (160 covered entities × $1,000). However, the Commission anticipates that providing a covered entity broad discretion to select whomever it deems appropriate to provide the approval would serve to mitigate some of those costs by allowing the covered entity to embed the approval process within its existing operational structures. The Commission further believes that requiring regular and formal approval of the ORF component programs and plan by senior leadership would help ensure that the ORF is in line with operational 328 See paragraph (c)(1) of proposed Commission regulations 1.13 and 23.603. 329 Covered entities may also incur subsequent costs in the event there is a change in official or body responsible for the approval of the ORF component programs or plan. 330 As discussed supra in section III.B (Paperwork Reduction Act) of this notice, the Commission expects covered entities will expend a total of 20 burden hours to approve the component programs and plan of the ORF, risk appetite, and risk tolerance limits, or to prepare a written attestation. PO 00000 Frm 00037 Fmt 4701 Sfmt 4702 4741 strategy and risk capacity, improving the chances that the covered entity would be adequately prepared for, and able to withstand and recover from operational shocks, that could otherwise significantly harm customers, counterparties, or even have spillover effects into the derivatives market as a whole. The proposed rule would further require covered entities to establish risk appetite and risk tolerance limits with respect to the risk areas underlying the ORF (information and technology security, third-party relationships, and emergencies or other significant disruptions to the continuity of normal business operations).331 The Commission believes that establishing and operating within established risk appetite and risk tolerance limits would help ensure that covered entities do not engage in activities that would present risks beyond those they can comfortably manage, helping to mitigate the potential for covered entities to take on risk that could lead to intolerable harm to customers or disruption to the financial system at large. Covered entities that do not currently have a practice of creating a risk appetite statement and establishing and monitoring metrics for risk tolerance limits would likely incur costs associated with establishing a methodology to identify them, which would involve time and staffing resources, or perhaps even the use of consultants, but the Commission anticipates such costs should be reduced year over year as such covered entities gain experience and streamline processes. Nevertheless, the Commission understands that establishing risk appetite and tolerance limits is common practice in the financial industry, and is included as a recommended part of governance in the NIST financial sector profile.332 To the extent that covered entities already follow this practice, such covered entities would incur general costs associated with reviewing their risk appetite and risk tolerance limits against the rule requirements to ensure they cover the full scope of the rule, but they would avoid the heavier resource burdens of developing risk appetite and risk tolerance limits from whole cloth. The risk appetite and risk tolerance limits would further need to be 331 See paragraph (c)(2)(i) of proposed Commission regulations 1.13 and 23.603. 332 See CRI Profile Workbook, supra note 81, at 16 (‘‘An appropriate governing authority . . . endorses and periodically reviews the cyber risk appetite and is regularly informed about the status of and material changes in the organization’s inherent cyber risk profile). E:\FR\FM\24JAP2.SGM 24JAP2 4742 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 reviewed and approved in writing on at least an annual basis by the oversight body, senior officer, or other seniorlevel official with primary responsibility for the relevant risk area.333 Similar to the broad approval of the ORF component programs and plan in general, covered entities would likely incur some costs preparing information for approval, making amendments in response to comments, and obtaining signatures. Specifically, the Commission estimates covered entities would incur an ongoing annual cost of $1,000 for the approval of risk appetite and risk tolerance limits (10 hours × $1,000),334 or an estimated aggregate dollar cost of $160,000 (160 covered entities × $1,000). The Commission believes that the process of securing formal approval would encourage covered entities to think critically about the risk appetite and risk tolerance limits they establish and to justify them in light of operational strategy. This exercise should bring more awareness to activities that create operational risk and lead to better outcomes from an operational resilience standpoint, with attendant benefits to customers, counterparties, and the market more broadly. Relatedly, the proposed rule would require covered entities to notify selected senior leadership of circumstances that exceed risk tolerance limits and incidents requiring notification to either the Commission or customers and counterparties.335 The Commission understands that such an internal escalation requirement would require covered entities to incur some costs in developing policies and procedures that reflect this requirement, or reviewing existing escalation protocols to ensure they meet the terms of the rule, but the Commission believes the requirement is sufficiently flexible to allow covered entities to rely on existing operational structures and reporting lines, and does not anticipate that any organizational changes, or attendant costs, would be necessary. Additionally, the Commission views the involvement and awareness of senior leadership in cases where risk tolerance limits are exceeded, or where significant incidents have occurred that clearly threaten operational resilience, as 333 See paragraph (c)(2)(ii) of proposed Commission regulations 1.13 and 23.603. 334 As discussed in section III.B (Paperwork Reduction Act) of this notice, the Commission expects covered entities will expend a total of 20 burden hours annually to document approval of the component plans of the ORF, risk appetite, and risk tolerance limits, or to prepare a written attestation. 335 See paragraphs (c)(3)(i)–(ii) of proposed Commission regulations 1.13 and 23.603. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 critical to ensuring recovery efforts are coordinated and thus more likely to be successful. The proposed rule would allow covered entities that form a part of a larger enterprise to satisfy the requirements of the proposed rule through their participation in a consolidated program or plan that meets the requirements of the proposed rule.336 Additionally, a covered entity relying on a consolidated program or plan would be able to satisfy the requirements for senior leadership to approve both the component program or plan and risk appetite and risk tolerance limits by having senior leadership attest on an annual basis that the consolidated program or plan meet the requirements of the proposed ORF rule, and reflects risk appetite and risk tolerance limits appropriate to the covered entity.337 The Commission estimates that covered entities would incur an ongoing annual cost of $2,000 (20 hours × $100/hour) to prepare an written attestation,338 or an estimated aggregate dollar cost of $320,000 (160 covered entities × $2,000). The Commission believes allowing covered entities to rely on a consolidated program or plan would mitigate costs for such entities, specifically by benefiting from economies of scale present in relying on shared corporate infrastructure and a larger parent company’s resources to manage operational risk at a broader enterprise level, and through using existing practices that meet the requirements of the proposed rule. Nevertheless, the Commission expects that such covered entities would incur at least some costs associated with reviewing the consolidated program or plan to ensure it meets the requirements of the proposed rule and reflect risk appetite and risk tolerance limits appropriate to the covered entities. Such covered entities may face challenges in ensuring that their consolidated programs or plans, which may be written with the parent corporate entity as the primary focus, appropriately address the risks as they relate more specifically to the business and operations of the covered entity, which may be a relatively small line of business for the parent. Accordingly, a covered entity may incur some costs, in 336 See paragraph (c)(4)(i) of proposed Commission regulations 1.13 and 23.603. 337 See paragraph (c)(4)(ii) of proposed Commission regulations 1.13 and 23.603. 338 As discussed supra in section III.B (Paperwork Reduction Act) of this notice, the Commission expects covered entities will expend a total of 20 burden hours annually to document approval of the component programs or plans of the ORF, risk appetite, and risk tolerance limits, or to prepare a written attestation. PO 00000 Frm 00038 Fmt 4701 Sfmt 4702 terms of time and staffing resources, associated with amending any consolidated program or plan to ensure it reflects the proposed rule’s requirements and risk appetite and risk tolerance limits appropriate to the covered entity. The Commission cannot accurately quantify such costs, as these costs could range from minimal to more substantial depending on the complexity of the organization and how closely the current consolidated program or plan meets the requirements of the proposed rule, including how particularized they are with respect to identifying and managing the risks specific to the covered entity. The Commission believes that such requirements are important to ensuring that all covered entities, regardless of their operational structure, have a baseline level of operational risk management that is tailored to the entity itself, helping reduce risk to the overall financial system and the commodity derivatives markets in particular. The Commission also preliminarily believes that the overall costs of the proposed rule are reduced, without any loss of benefit, by allowing covered entities to rely on consolidated programs or plans over requiring them to duplicate existing larger corporate entity efforts to produce programs or plans that are independent and unique to the covered entity. g. Information and Technology Security Program—Proposed Paragraph (d) The proposed rule would require covered entities to have an information and technology security program, defined as a written program reasonably designed to identify, monitor, manage, and assess risks relating to information and technology security and that meets certain requirements.339 Specifically, the information and technology security program would need to include (1) a risk assessment, conducted at least annually; (2) effective controls; and (3) an incident response plan.340 The proposed risk assessment requirement would require covered entities to identify and devote resources to planning and performing the risk assessment and then analyzing its results. These resources would need to include reliance on personnel not responsible for the development or implementation of covered technology or related controls, which could impose additional staffing needs on some 339 See paragraphs (a) (defining ‘‘information and technology security program’’) and (b)(2) (components) of proposed Commission regulations 1.13 and 23.603. 340 See paragraph (d) of proposed Commission regulations 1.13 and 23.603. E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules covered entities.341 The amount of time and resources expended would likely vary depending on the size, complexity, and risk profile of the covered entity and its degree of reliance on covered technology. The Commission believes that larger covered entities with more complex business operations and broader risk profiles would likely need to devote more permanent and extensive resources, staffing and otherwise, to performing and analyzing their risk assessments. Presenting the results of the assessment to selected senior leadership would also require the devotion of time and staffing resources to prepare for and respond to leadership feedback. In establishing effective controls, covered entities would be required to consider a broad range of categories of controls, determine which to implement in line with identified risks, implement them, and then review and revise the controls as needed over time in response to continued risk assessments. Depending on the types of controls they would need to implement, covered entities may take on additional costs to acquire new security technology and/or hire additional staff or third-party service providers to oversee and implement the controls. Again, the Commission would expect any outlays to be appropriate and proportionate to the covered entity and its risk profile, so the exact costs would vary by covered entity. Nevertheless, given that the approach of the proposed rule, and list of required categories, closely aligns with the longstanding approach adopted by prudential regulators with respect to information and technology security controls, the Commission believes that costs for at least prudentially regulated covered entities may be reduced compared to other covered entities that have not been required to apply and consider such categories of controls.342 Development of an incident response plan would likely require a noticeable devotion of resources at the outset, as staff would need to dedicate time and effort to forming and documenting the plan, including creating policies and procedures for identifying the types of incidents that need to be reported and to whom. Should an incident occur, the plan would require staff at the covered entity to devote time to documenting and responding to the incident, as well as identifying and taking on remediation efforts. Nevertheless, the Commission expects that, given the NFA’s ISSP Notice, 341 See paragraph (d)(1)(ii) of proposed Commission regulations 1.13 and 23.603. 342 See supra note 130 and accompanying text. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 covered entities would likely not need to expend resources to develop an information and technology security program from scratch. Notably, NFA requires its members to adopt and enforce a written ISSP, assess and prioritize the risks associated with its use of information technology systems, document and describe in their ISSPs safeguards deployed in light of identified and prioritized threats and vulnerabilities, and create an incident response plan.343 Accordingly, some of the compliance burdens associated with implementing an information and technology security program should be reduced. Covered entities overseen by prudential regulators are also required to consider similar categories of controls to those in the proposed rule, so compliance costs as realized by prudentially regulated covered entities may be even further reduced.344 Notably, however, NFA does not mandate that a risk assessment be conducted at least annually by personnel not responsible for the development or implementation of covered technology or related controls. Although the Commission believes these requirements to be consistent with generally accepted standards and best practices, such that covered entities may be following them anyway, some covered entities may nevertheless experience some additional costs associated with ensuring or otherwise acquiring staff sufficiently independent to conduct the risk assessment and in potentially conducting the risk assessment more frequently than they currently do. The Commission also recognizes that, if adopted, the proposed rule would at minimum require covered entities to expend resources to review the ISSPs they established pursuant to NFA rules to ensure they meet the requirements of the information and technology security program. Notwithstanding the potential operational and staffing costs to covered entities associated with the proposed rule, the Commission believes the benefits of the requirements of the proposed information and technology security program are well established. Risk assessments are crucial to identifying threats and vulnerabilities, which is key to directing resources to mitigate those risks in a way that increases the effectiveness of security efforts. The Commission likewise believes the benefits of an independent risk assessment (a more unbiased and reliable assessment) and conducting it at least annually (ensuring the information 343 See 344 See PO 00000 NFA ISSP Notice, supra note 43. 12 CFR part 30, app. B. Frm 00039 Fmt 4701 Sfmt 4702 4743 and technology security program is upto-date and responsive in light of current threat landscape and vulnerabilities at the covered entity) are important to supporting covered entity operational resilience. Likewise, controls are the methods or techniques for monitoring and managing those risks and safeguarding information, operations, and assets. Without them, the potential for a system weakness to be exploited, and for customers and counterparties, covered entities, or the market at large to be harmed is increased, as the interconnected nature of the commodity derivatives markets enhances the possibility for spillover effects. Incident response plans operate to reduce the potential magnitude of the harm should a safeguard fail by creating a concrete plan, known in advance, for how the covered entity should respond, thereby shortening response times following an incident. Accordingly, the Commission believes the proposed minimum requirements of the information and technology security program, in combination with the Commission’s oversight, would further support the development of a foundational level of operational risk management practices with respect to information and technology security that would benefit customers, counterparties, and the market at large. h. Third-Party Relationship Program— Proposed Paragraph (e) The proposed rule would require covered entities to have a third-party relationship program, defined as a written program reasonably designed to identify, monitor, manage, and assess risks relating to third-party relationships.345 The program would need to describe how covered entities address the risks attendant to each of the five identified stages of the thirdparty relationship lifestyle, ranging from pre-selection to termination, with heightened due diligence and monitoring required for critical thirdparty service providers.346 The proposed rule would further require covered entities to create, maintain, and regularly update an inventory of thirdparty service providers engaged to support their activities as covered entities, identifying whether each is a critical third-party service provider.347 345 See paragraphs (a) (defining ‘‘third-party relationship program’’) and (e) (third-party relationship program) of proposed Commission regulations 1.13 and 23.603. 346 See paragraphs (e)(1)(i)–(v) and (e)(2) of proposed Commission regulations 1.13 and 23.603. 347 See paragraph (e)(3) of proposed Commission regulations 1.13 and 23.603. E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 4744 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules As with the information and technology security program, complying with this aspect of the proposed rule would require covered entities to expend staff resources at the outset to develop the program and put it into writing. Although NFA requires its members, including covered entities, to have a written supervisory framework for its third-party service providers, which could help mitigate these costs, NFA’s written supervisory framework only extends to outsourcing functions, i.e., regulatory functions that would otherwise be undertaken by the NFA member itself to comply with NFA and CFTC requirements.348 Accordingly, covered entities would likely experience at least some staffing burdens expanding their NFA frameworks to fit the broader scope of third-party relationships covered by the proposed rule and implementing it across their third-party service providers more broadly. However, applying the proposed (b)(3) standard, covered entities should be able to align their third-party risk management practices to the risks presented by each individual third-party service provider, which would allow covered entities to tailor and fit the costs of their third-party practices to their unique circumstances. Covered entities following prudential rules and guidance with respect to third-party service providers, which applies to all third-party relationships, would likely experience reduced costs compared to other covered entities with respect to any need to modify their existing programs.349 Additionally, the proposed rule would not require covered entities to perform due diligence or renegotiate contracts with existing third-party service providers, which would avoid a potentially substantial initial fixed cost from implementing the third-party relationship program. Creating an initial inventory of thirdparty service providers, and assessing whether they meet the definition of ‘‘critical third-party service provider’’ would also require a temporary redirection of staff resources, with the amount of time and resources required varying depending on the extent and complexity of a given covered entity’s reliance on third-party service providers. With respect to critical thirdparty service providers, the Commission preliminarily believes that many, if not all, covered entities currently have in place a process to identify and categorize covered entities as ‘‘critical’’ 348 See NFA Third-Party Notice, supra note 43. 349 See 12 CFR part 30, app. B, III.D. (Oversee Service Provider Arrangements); Prudential ThirdParty Guidance, supra note 43. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 or otherwise requiring enhanced supervisory activities. Additionally, NFA requires its members to have heightened due diligence for third-party service providers that obtain or have access to critical and/or confidential data and those that support critical regulatory-related systems, which could potentially reduce burdens on covered entities in designing and implementing heightened due diligence and monitoring with respect to critical thirdparty service providers.350 Although the Commission preliminarily believes that its proposed definition of ‘‘critical thirdparty service provider’’ should identify many, if not all, of the same providers covered entities would themselves identify as ‘‘critical,’’ the Commission recognizes that the process of applying the proposed definition to an existing process would, at minimum, require some initial expenditure of staff resources to ensure existing practices and taxonomies align with the proposed rule.351 Additionally, the process of creating an inventory of third-party service providers, which is not currently required by NFA or prudential regulators, could be particularly burdensome, especially for covered entities with a large number of complex third-party relationships, or that rely on an affiliate to secure and coordinate third-party service providers as part of a larger enterprise-wide function, potentially involving staff from many different departments or the review of multiple contracts or contract databases. Nevertheless, the Commission believes that requiring covered entities to have a program to identify, monitor, manage, and assess risks relating to third-party relationships, and inventory their third-party service providers, would have meaningful benefits at the individual covered entity-level, as well as for customers and counterparties and the derivatives markets at large. Given their roles and interconnectedness in the derivatives markets, an operational shock at one covered entity can have ripple effects across the markets. Requiring covered entities to develop and maintain a program to help evaluate and address the risk at each stage of the third-party relationship—from before selecting a third-party service provider to how such a relationship would be supervised and terminated—may not only help covered entities be more fully aware of and manage the risks of their third-party relationships, it could also help increase overall confidence levels 350 See NFA Third-Party Notice, supra note 43. 351 See paragraph (a) of proposed Commission regulations 1.13 and 23.603 (defining ‘‘critical third-party service provider’’). PO 00000 Frm 00040 Fmt 4701 Sfmt 4702 in the derivatives markets by ensuring customers and counterparties that there is a foundational level of third-party risk management practices across covered entities. Additionally, the proposed rule could operate to raise minimum standards with regards to how third-party risks are managed, by introducing enhanced due diligence or monitoring practices for critical third-party service providers, for instance, which could lead to real and measurable reduction in risk to the financial system. The act of creating an inventory of third-party service providers would also help increase the likelihood of identifying interdependencies or overdependencies, which could cause covered entities to reevaluate particular relationships (i.e., diversify third-party service providers to reduce concentration risk) or take on additional activities (e.g., insurance) to help mitigate those risks, thereby promoting operational resilience. Identifying critical third-party service providers should also help enhance operational awareness of those entities and ensure they receive the required heightened monitoring to ensure that the risk of disruption to critical services, which could have a broader impact on the markets or customers and counterparties, is mitigated. i. Business Continuity and Disaster Recovery Plan—Proposed Paragraph (f) The proposed rule would require covered entities to have a BCDR plan, defined as a written plan outlining the procedures to be followed in the event of an emergency or other significant disruption to the continuity of normal business operations and that meets certain requirements.352 This would be a new CFTC requirement for FCMs, but current Commission regulation 23.603 imposes a BCDR plan requirement on swap entities that is substantially similar to the proposed rule, as the proposed rule was modeled after the current BCDR requirement for swap entities with certain modifications.353 Additionally, although the CFTC does not currently impose a BCDR plan requirement on FCMs, NFA and CME do, which the Commission believes should help FCMs mitigate the costs of establishing a BCDR plan for purposes of complying with the proposed rule, particularly since some of the amendments to the current BCDR plan requirement for swap entities have the effect of further aligning the regulatory 352 See paragraphs (a) (defining ‘‘business continuity and disaster recovery plan’’) and (b)(2) (components) of proposed Commission regulation 1.13 and 23.603. 353 See 17 CFR 23.603. E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules text with NFA and CME BCDR plan requirements.354 The proposed rule would require covered entities’ BCDR plans to be reasonably designed to enable the covered entities to continue or resume any activities as a covered entity with minimal disruption to counterparties, customers, and the markets, and to recover and make use of covered information, as well as any other data, information, or documentation required to be maintained by law and regulation.355 The proposed rule would further require the BCDR plans to include certain minimum contents, including: identifying and backing up required information; identifying and developing backups for required resources, including technology, facilities, and staff; identifying potential disruptions to critical third-party service providers; identifying implicated personnel; and establishing a communication plan.356 To design a BCDR plan that meets that standard, covered entities would need to expend resources to establish and preserve backup resources (staffing, technology, inputs) for use in the event of the BCDR plan’s activation, and to create backups of the information the BCDR plan would cover. Depending on the size and complexity of a particular covered entity’s business, those costs could be sizeable, as they may require negotiating and entering into new contracts with backup resource providers, or other third-party service providers. Covered entities would also need to expend resources to establish a plan to minimize the impact of disruptions and establish a communication plan, which would include identifying implicated persons and bodies and establishing potential contacts, methods, modes, and priorities of communication. Finally, the resources to document all of this work in the plan would likely be more than simply ministerial effort, as staff would likely have to spend time working through various deliberative points, at least at the outset in first developing the BCDR plan. The costs to maintaining the plan would likely be reduced compared to the initial fixed costs, however, as the plan put into action over time. Nevertheless, the Commission expects that most covered entities have already incurred at least some of these potential costs by virtue of either the existing CFTC BCDR plan requirements for swap entities, or the NFA and CME BCDR plan requirements applicable to FCMs. Notably, the ‘‘essential elements’’ of NFA’s BCDR Notice aligns closely with the minimum requirements for the Commission’s proposed BCDR plan requirement, requiring FCMs to establish backups in one more reasonably separate geographic areas, to backup or copy essential documents and data and store them off-site, to consider the impact of interruptions by thirdparties and ways to minimize the impact, and to develop a communication plan.357 Accordingly, although the Commission expects FCMs would incur at least some costs reviewing their BCDR plans to ensure they meet the proposed CFTC requirements, the Commission preliminarily believes most FCMs would be able to avoid the more substantial initial costs of developing a BCDR plan from scratch. The Commission further believes that the expenditure of resources required to create the proposed plan would help give the derivatives markets and customers and/or counterparties confidence that covered entities’ operations would be able to be quickly reestablished following an emergency or significant disruption, improving the overall resilience of the market and perhaps lowering customer/ counterparty risk and its associated costs. Having a plan that centralizes key information related to an emergency— including identifying core information, personnel, systems, and resources needed to resume operations—should also help facilitate covered entities in achieving the recovery time objective of being back up and running with minimal disruption to counterparties, customers, and the derivatives markets, supporting market confidence and reducing overall systemic risk. Maintaining copies of the plan in accessible off-site locations should impose no more than ministerial costs and would help ensure that covered entities can access the plan in a crisis. The proposed rule would amend the current BCDR plan requirement for swap entities in a few ways, some of which the Commission expects would have cost-benefit implications.358 For instance, the proposed rule would require covered entities to ‘‘recover and make use of all covered information, as 357 See NFA BCDR Notice, supra note 43. with the other sections of this notice, portions of the BCDR plan requirement for swap entities in current Commission regulation 23.603 that have been expanded in the proposal to apply to the ORF more broadly, notably testing, are discussed in the context of the discussion of those specific requirements. 358 As 354 See NFA Rule 3–38, supra note 43; CME Rule 983, supra note 185. 355 See paragraph (f)(1) of proposed Commission regulation 1.13 and 23.603. 356 See paragraph (f)(2) of proposed Commission regulation 1.13 and 23.603. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 PO 00000 Frm 00041 Fmt 4701 Sfmt 4702 4745 well as any other data, information, or documentation required to be maintained by law and regulation,’’ which expands the information BCDR plans would be required to cover beyond that required to be maintained by applicable law and regulation, and makes clear the information should not only be recovered but also accessible and still useable.359 Depending on current BCDR plan practices by swap entities, the proposal could potentially cause covered entities to expand the sources of information they need to backup and/or augment their backup systems to ensure the information stored there is useable. The proposed rule would also no longer require swap entities to ensure their BCDR plans are designed to enable swap entities to continue or resume operations ‘‘by the next business day.’’ 360 Although the Commission does not believe that this change would have an impact on the actual recovery time of swap entities following an emergency or other significant disruption, given that both current Commission regulation 23.603 and the proposed rule require that the BCDR plan be designed to ensure recovery with minimal disruption to counterparties and the market, swap entities could need to dedicate at least some staff time to review their BCDR plans to ensure that they continue to meet the rule requirements. j. Training and Distribution—Proposed Paragraph (g) The proposed rule would require covered entities to establish, implement, and maintain training with respect to the ORF, including general cybersecurity awareness training and role-specific training for personnel involved in the ORF.361 If the proposed rule is adopted, covered entities would need to expend resources to develop and/or evaluate and acquire externally sourced training. Those outlays would include the costs associated with establishing the training at the outset, as well as ongoing costs associated with updating and providing the training at least every year.362 There would also be administrative costs associated with distributing copies of the component programs or plan to relevant personnel and providing them with any significant revisions.363 Nevertheless, the 359 See 17 CFR 23.603(a). 360 Id. 361 See paragraph (g)(1) of proposed Commission regulations 1.13 and 23.603. 362 See paragraph (g)(2) of proposed Commission regulations 1.13 and 23.603 363 See paragraph (g)(3) of proposed Commission regulations 1.13 and 23.603. E:\FR\FM\24JAP2.SGM 24JAP2 4746 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules Commission believes that establishing, implementing, and maintaining a training program is crucial to realizing the benefits of the proposed ORF. Not only would it help ensure that employees of covered entities are kept aware of good cyber hygiene practices, which should reduce the potential for covered information to be compromised and customers and counterparties to be negatively impacted, training would help ensure that the ORF practices covered entities establish are accurately implemented and maintained by the personnel tasked with operationalizing the ORF. Although allowing covered entities to provide training less frequently than annually would reduce compliance costs for covered entities, the Commission believes that annual training is needed to preserve its benefits given the rapidly evolving pace of technology and the potential for human error to result in actual harm to operations or even customers or counterparties.364 ddrumheller on DSK120RN23PROD with PROPOSALS2 k. Reviews and Testing—Proposed Paragraph (h) The proposed rule would require covered entities to establish, implement, and maintain a plan reasonably designed to assess adherence to, and the effectiveness of, their ORF through regular reviews and risk-based testing.365 At the outset, covered entities would need to dedicate staff resources to develop a review and testing plan for the ORF; ongoing staff resources would be needed to conduct reviews at least annually and risk-based testing at a frequency that is appropriate and proportionate to each covered entity’s nature, size, scope, complexity, and risk profile, following generally accepted standards and best practices.366 Covered entities would further assume regular costs associated with documenting the reviews and testing (e.g., results of testing, assessment of effectiveness, recommendations for modifications/ improvements/corrective actions) and reporting on them to the CCO and any other relevant senior-level official(s) and oversight body(ies).367 In general, the ongoing costs of the required testing and reviews are likely to vary by covered entity, with larger, more complicated covered entities likely expending significantly more resources to conduct 364 See supra note 18 and accompanying text. paragraph (h) of proposed Commission regulations 1.13 and 23.603. 366 See paragraph (b)(3) of proposed Commission regulations 1.13 and 23.603. 367 See paragraphs (h)(4) and (h)(5) of proposed Commission regulations 1.13 and 23.603. 365 See VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 testing consistent with the proposed (b)(3) standard.368 With respect to the reviews of the ORF, the proposed rule would require that they be conducted at least annually and in connection with any material change that is reasonably likely to affect the risks addressed by the ORF. The proposed rule would further require the reviews to include an analysis of adherence to, and the effectiveness of the ORF, as well as any recommendations for improvements.369 This standard is generally consistent with, and would replace, the current review standard in current Commission regulation 23.603 for swap entity BCDR plans, such that associated costs for reviewing the BCDR plan should not be affected by the proposal.370 NFA’s ISSP Notice and BCDR Notice also require NFA members to review their ISSPs or BCDR pans on a regular or periodic basis.371 Accordingly, while covered entities may experience some staffing costs in assuring their reviews are at least annual, costs associated with establishing a review process more broadly should have already been realized by most covered entities. For testing, the proposed rule would generally require that its frequency, nature, and scope would be determined consistent with the proposed (b)(3) standard.372 The Commission believes that such a risk-based standard would allow covered entities to tailor testing to their unique business and risk profile, focusing testing efforts on areas that would be the most impactful or revealing and avoiding unnecessary costs. Nevertheless, with respect to testing of the information and technology security program, the proposed rule would require covered entities to assume costs for some specific testing, including testing of key controls and the incident response plan, as well as daily or continuous vulnerability assessments and 368 The Commission estimates, on average, that covered entities will incur an initial annual cost of $8,000 (80 hours × $100/hour) to establish a plan to assess adherence to, and the effectiveness of, its ORF, and to document all reviews and testing of the ORF, or an estimated aggregate dollar cost of $1,280,000 (160 covered entities × $8,000). 369 See paragraph (h)(1) of proposed Commission regulations 1.13 and 23.603 370 See 17 CFR 23.603(f) (‘‘A member of the senior management of each swap dealer and major swap participant shall review the business continuity and disaster recovery plan annually or upon any material change to the business. Any deficiencies found or corrective action taken shall be documented.’’) 371 See NFA BCDR Notice, supra note 43; NFA ISSP Notice, supra note 43. 372 See paragraph (h)(2) of proposed Commission regulations 1.13 and 23.603. PO 00000 Frm 00042 Fmt 4701 Sfmt 4702 penetration testing at least annually.373 Although regular testing of key controls and the incident response plan is likely to require time and staff resources, the Commission believes that without testing, it would be impossible for covered entities to know whether the controls are functioning to mitigate risk as expected, and for the incident response plan to be actionable in times of emergency. Daily or continuous vulnerability assessments and penetration testing at least annually could require additional staff and technology outlays.374 The exact cost of testing as realized by each covered entity, however, is likely to vary depending on the scope and complexity of its operations, and the degree to which it has already incorporated vulnerability assessments and penetration testing as part of its ISSP.375 The Commission believes that vulnerability assessments and penetration testing are essential for covered entities to know what their vulnerabilities are and how they might be exploited, so they can take steps to mitigate associated risks, including by adapting internal controls, which are a key component of preserving operational resilience. Given the dynamic, ever changing nature of technology and cybersecurity, the Commission believes that continual and active action and engagement are necessary to ensure controls are operating as intended, and for covered entities to have an accurate assessment of the risks to their covered information and technology. By not mandating specific types of penetration testing, however, the Commission believes the proposed rule is adapted to allow the wide range of covered entities subject to the proposed rule to adopt types of testing that are recommended for and best fit their unique circumstances, so as to achieve the highest level of improved cybersecurity without incurring unnecessary costs. The Commission further believes such testing is essential cyber hygiene and their use among covered entities would help ensure a base level of monitoring in the derivatives markets that is readily accessible. 373 See paragraph (h)(2)(i) of proposed Commission regulations 1.13 and 23.603. 374 CISA makes available a free vulnerability scanner, see supra note 248. 375 The NFA ISSP Notice provides that a member ‘‘may include penetration testing of the firm’s systems, the scope and timing of which is highly dependent upon the Member’s size, business, technology, its electronic interconnectivity with other entities and the potential threats identified in its risk assessment.’’ See NFA ISSP Notice, supra note 43. E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules With respect to testing of the BCDR plan, the proposed rule would require covered entities to dedicate time and staff resources to conduct a walkthrough or tabletop exercise designed to test the effectiveness of backup facilities and capabilities at least annually, which could involve outreach to operators of backup facilities.376 Such a periodic effort would likely consume staff time and resources to put into place, including potentially in designing tabletop exercise scenarios. The Commission expects that this aspect of the proposed rule would not have any cost impact on swap entities, as current 23.603 requires annual testing of their BCDR plan, and the Commission does not believe the clarification that the testing be a walk-through or tabletop exercise would have substantive effect. Because the proposed rule would require the reviews and testing to be conducted by qualified personnel who are independent of the aspect of the ORF being reviewed or tested, the Commission anticipates this work would either be conducted by internal compliance audit staff, external independent auditors, or other internal staff, provided they were not involved in creating the ORF component being tested.377 Accordingly, this independence requirement could require covered entities to reassign duties or secure additional staffing resources, either of which would impose some additional costs. Nevertheless, the Commission believes that annual reviews and testing are essential to ensuring that the ORF is operating as intended, and thus to ensuring the intended and expected benefits of the ORF with respect to protecting customers and mitigating systemic risk are actually realized. Without proper review and testing, determining whether the intended benefits of the ORF are being achieved would not be possible. Although eliminating the independence requirement could alleviate some potential staffing burdens on covered entities, the Commission believes that independence in reviews and testing is critical to preserving their benefits by helping to ensure that the results are reliable and unbiased. The Commission further believes that by allowing covered entities to adjust the frequency, nature, and scope of their risk-based testing of the ORF in a manner that is appropriate and proportionate to the circumstances, following generally accepted standards and best practices, the proposed rule would ensure that costs of the rule would be as well tailored to the covered entity as possible to realize benefits at the least cost. With respect to the BCDR plan requirement for swap entities in particular, the Commission believes the proposed rule could reduce review and testing costs. First, it would eliminate costs associated with securing an independent auditor to audit the plan every three years.378 Although there may be some benefits to having an independent audit of a BCDR plan, including having an external party with fresh eyes identify issues and potential improvements that might not be readily apparent to internal staff, the Commission preliminarily believes, based on its experience, that the internal reviews and testing of the BCDR plan are sufficient to achieve iterative improvements to the BCDR plan, making the costs associated with the independent audit unnecessary. Second, the proposed rule would eliminate the separate requirement that a member of senior management for a swap entity review the BCDR plan annually or upon any material change to the business and to document any deficiencies found or corrective action taken.379 While the proposed rule would retain the annual review requirement for the BCDR plan, not requiring the review to be undertaken by a member of senior management may result in at least some burden reduction for senior management. l. Notification Provisions—Proposed Paragraphs (i) and (j) The proposed rule would require covered entities to provide certain notifications to either the Commission or affected customers or counterparties.380 Notifications to the Commission, made electronically via email, would relate either to the covered entity’s determination to activate the BCDR plan, or an ‘‘incident,’’ as defined in the proposed rule, that adversely impacts, or is reasonably likely to adversely impact information and technology security, the covered entity’s ability to operate, or the assets or positions of a customer or counterparty.381 In both cases, the notifications to the Commission would be intended to function as early warnings and thus would not need to be complete or detailed. Understanding 378 See 17 CFR 23.603(g). 17 CFR 23.603(f). 380 See paragraphs (i) and (j) of proposed Commission regulations 1.13 and 23.603. 381 See paragraph (i) of proposed Commission regulations 1.13 and 23.603. 379 See 376 See paragraph (h)(2)(i) of proposed Commission regulations 1.13 and 23.603. 377 See proposed paragraph (h)(3) of proposed Commission regulations 1.13 and 23.603. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 PO 00000 Frm 00043 Fmt 4701 Sfmt 4702 4747 that the information available to covered entities would be preliminary and incomplete at the time of the notification, the Commission would not expect covered entities to expend considerable resources to assemble notifications that are perfectly accurate and complete. Rather, the proposed rule would only require that the information provided to the Commission would be whatever the covered entity has available at the time that could assist the Commission in its oversight or response, with the understanding that resources should predominantly be directed at mitigating and recovering from the incident, emergency, or significant disruption.382 Prioritizing an early warning over complete information should not only reduce the costs for covered entities in delivering the notification, but also allow the Commission the best opportunity to take quick responsive action, if appropriate. Accordingly, while the Commission recognizes that there would be at least some information gathering and administrative costs associated with providing the notice, the Commission does not intend or expect the resource burden for providing the notification to be significant.383 This limited earlywarning function for the notice requirement is further supported by the relatively brief 24-hour time period for providing the notices.384 With respect to the BCDR plan in particular, the Commission does not believe covered entities would expend significant resources to notify the Commission, since the notification trigger (activation of the BCDR plan) is relatively bright-line. The Commission recognizes that with respect to the incident notification, however, covered entities may need to engage in some deliberation to determine whether an incident has or is reasonably likely to have an adverse impact, which would consume some staff resources. Preliminarily, the Commission estimates that covered entities activating their BCDR plan would incur a cost of $1000 (10 hours × $100/hour) to notify the Commission, or an estimated aggregate dollar cost of $160,000 (160 covered entities × $1,000). The Commission believes, however, that these costs may go down over time, as covered entities 382 See paragraphs (i)(1)(ii) and (i)(2)(ii) of proposed Commission regulations 1.13 and 23.603. 383 The Commission estimates that for each ‘‘incident’’ requiring notification, covered entities will incur a cost of $1,000 (10 hours × $100/hour) to gather the information required and to provide notification to the Commission, or an estimated aggregate dollar cost of $160,000 (160 covered entities × $1,000). 384 See paragraphs (i)(1)(iii) and (i)(2)(iii) of proposed Commission regulations 1.13 and 23.603. E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 4748 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules gain familiarity in applying the notification provision. The Commission also preliminarily believes that an adverse impact standard would be potentially easier to apply than one that included a materiality limiter, which could introduce further need for interpretation and internal deliberation for covered entities to determine whether the impact is ‘‘material’’ or ‘‘significant.’’ Additionally, scoping notifications to incidents with a likely adverse impact and to BCDR activation would help focus the Commission’s oversight activities and responsive efforts on cases where it could act to support the derivatives markets and customers and counterparties, potentially reducing the potential for ripple effects. In addition to notifications to the Commission, the proposed rule would require covered entities to notify affected customers or counterparties as soon as possible of any incident that is reasonably likely to have adversely affected the confidentiality or integrity of their covered information, assets, or positions.385 Because the rule does not contain a specific timing limit for providing this notification, the Commission does not expect that this notification requirement would cause covered entities to need to divert any resources while managing the incident to draft the notification. Rather, the Commission expects that most of the costs associated with this notification requirement would be in spending the necessary staff resources to gather and report facts as accurately as possible to aid affected customers and counterparties in understanding and assessing the potential impact of the incident on their information, assets, or positions and to take any necessary action.386 Covered entities may also need to dedicate staff resources to interacting with customers or counterparties after the notification is given to provide more information or answer questions. The Commission estimates that for each ‘‘incident’’ requiring notification, covered entities will incur a cost of $5,000 (50 hours × $100/hour) to gather the required information necessary to provide notice to customers or counterparties and to prepare and deliver the required notification, or an estimated aggregate dollar cost of $800,000 (160 covered entities × $5,000). The Commission believes that this notification could produce substantial benefits to 385 See paragraph (j)(1) of proposed Commission regulations 1.13 and 23.603. 386 See paragraph (j)(2) of proposed Commission regulations 1.13 and 23.603. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 customers and counterparties, especially where state or other federal law does not otherwise require such notifications, as they would give customers and counterparties the information they would need to further protect their information and assets and allow them to seek other avenues of redress. m. Emergency Contacts and Recordkeeping—Proposed Paragraphs (k) and (l) The proposed rule would require covered entities to provide the Commission with the name and contact information of employees in connection with incidents triggering notification to the Commission and in connection with the activation of the covered entity’s BCDR plan.387 The identified employees would need to be authorized to make key decisions on behalf of the covered entity and have knowledge of the covered entity’s incident response plan or BCDR plan, as appropriate.388 Covered entities would also need to update their contacts with the Commission, as necessary.389 The Commission believes that ensuring it has knowledgeable contacts with whom to direct communications during a crisis would aid the Commission’s ability to take any necessary responsive action, and that the costs associated with identifying and updating the appropriate contacts would be ministerial in nature.390 With respect to BCDR plan emergency contacts for swap entities, the proposed rule is identical in substance to current Commission regulation 23.603, such that it should impose no additional costs on swap entities.391 The proposed rule would also further require covered entities to maintain all records required to be maintained pursuant to this section in accordance with Commission regulation 1.31, and make them available promptly upon request to representatives of the Commission and to representatives of applicable prudential regulators.392 Covered entities would incur costs associated with maintaining a recordkeeping system that allows for 387 See paragraph (k)(1) of proposed Commission regulations 1.13 and 23.603. 388 See paragraph (k)(2) of proposed Commission regulations 1.13 and 23.603. 389 See paragraph (k)(3) of proposed Commission regulations 1.13 and 23.603. 390 The Commission estimates that covered entities will incur a cost of $100 (1 hour × $100/ hour) to provide the Commission with emergency contact information, or an estimated aggregate dollar cost of $16,000 (160 covered entities × $100). 391 See 17 CFR 23.603(3). 392 See paragraph (l) of proposed Commission regulations 1.13 and 23.603. PO 00000 Frm 00044 Fmt 4701 Sfmt 4702 easy records retrieval, which would require both staff resources and likely reliance on electronic recordkeeping systems. The Commission believes these costs are likely mitigated for most covered entities, as they would be able to rely on existing recordkeeping systems designed to maintain other records in accordance with Commission regulation 1.31, and proper recordkeeping would help covered entities demonstrate compliance with the ORF rule, and ensure their ORFs are operating as expected as they conduct required reviews and testing. 2. Section 15(a) Factors a. Protection of Market Participants and the Public The Commission believes the proposed rule would support protection of market participants and the public. The Commission preliminarily believes the proposed rule will help protect market participants and the public by increasing the operational resiliency of covered entities to disruptions caused by natural disasters, cyber-attacks, and failures at third-party service providers. As covered entities are responsible for safeguarding customers’ accounts, executing trades, maintaining records, and reporting to relevant agencies, their operational resiliency will mitigate the negative impact on customers, clients, and counterparties in case of an incident. The proposed rule may also help reduce the likelihood of an incident due to proposed proactive measures such as penetration and vulnerability testing and cyber security training. For market participants and the public more generally, the benefits include enhanced market protection against the spread of contagion risk to the financial system from operational risks. b. Efficiency, Competitiveness, and Financial Integrity of Markets The Commission believes the proposed rule would enhance the financial integrity of CFTC-regulated derivatives markets. SDs, MSPs, and FCMs are essential intermediaries in the financial markets regulated by the Commission. Due to the interconnectedness of markets, disruptions to the business operations of these intermediaries pose risks to other markets. The Commission believes that increasing and helping to ensure the operational resiliency of these covered entities would help improve the financial integrity of the derivatives markets. The proposed rule’s requirement to report to the Commission incidents and BCDR plan E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules activation would assist the Commission effectuate a timely response to business disruptions, which will help mitigate the impact on other market participants and promote financial stability and confidence. Additionally, to the degree that the proposed rule aligns with other existing applicable requirements, including NFA rules and interpretive notices, and incorporates generally accepted standards and best practices currently broadly relied on by covered entities, the proposed rule would support regulatory convergence and the efficiencies that may generate. c. Price Discovery The Commission does not anticipate the proposed rule directly impacting the price discovery process. Nevertheless, if a trading disruption would be prevented or shortened by this proposed rulemaking, then price discovery would be improved. ddrumheller on DSK120RN23PROD with PROPOSALS2 d. Sound Risk Management Practices The Commission believes the proposed rule would promote the development of sound risk management practices among covered entities. Programs, plans, policies, and procedures are required for operational risks, which now explicitly include cybersecurity and third-party risks that adhere to current best practices. These processes seek to help covered entities identify, protect, detect, respond, and recover from such risks. As such, the operational risk management processes of covered entities may be improved. e. Other Public Interest Considerations The proposed rule relies on and incorporates aspects of existing standards and practices developed by other regulators and standard-setting bodies, including NFA rules and interpretive notices; prudential rules and guidance; and NIST, ISO, FFIEC and other sources of cyber and operational resilience standards. Accordingly, the proposed rule should support the development of further convergence in the area of operational resilience and allow covered entities to develop ORFs that are adaptive and responsive to rapidly changing circumstances and technology, which the Commission believes could lead to better protection of markets against the spread of contagion risks to the financial system from operational risks, in general. 3. Request for Comments As noted, the Commission invites public comment on all aspects of its cost-benefit consideration, including, but not limited to the baseline and the VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 identification and measurement of costs and benefits relative to it; the identification, measurement, and assessment of any costs and benefits not discussed herein; whether the Commission has misidentified any costs or benefits; what, if any, alternatives would be more reasonable in terms of their costs and benefits; and the Section 15(a) factors described above. The Commission asks that commenters explain and support the reasons for positions asserted in their comment letters and, further, include in them any data or other information that they may have to assist the Commission’s ability to better quantify the costs and benefits of the Proposal. 1. Has the Commission misidentified any costs or benefits? If so, please explain. 2. Please explain whether compliance costs would increase or decrease as a result the proposed rule. Please provide all quantitative and qualitative costs, including, but not limited to personnel costs and technological costs. 3. The Commission seeks additional information on the costs and benefits of the proposed rule’s requirement for covered entities to have a governance regime for their ORF, including risk appetite and tolerance limits, consolidated programs or plans, and internal escalation policies. Specifically, to what extent do covered entities already have or plan to have relevant programs or plans, policies, and procedures compliant with those prescribed in the proposed rule? To what practical extent do NFA’s requirements, prudential regulation and/or best practices currently duplicate or differ from the ORF governance regime, including risk appetite limits, consolidated programs or plans, and internal escalation policies, being proposed? Will covered entities experience additional or lowered costs to comply with the proposed rule, and if so, to what degree? 4. The Commission seeks additional information regarding the costs and benefits of establishing an information and technology security program. Specifically, to what extent are covered entities already conducting comprehensive risk assessments that follow standards described in the proposed rule? Are these assessments being conducted on at least an annual basis? Do existing effective controls likewise meet the standards in the proposed rule? Will covered entities experience additional or lowered costs relative to current practice to establish, document, and maintain an incident response plan as called for in the proposed rule, and if so, to what degree? PO 00000 Frm 00045 Fmt 4701 Sfmt 4702 4749 5. The Commission seeks additional information regarding the costs and benefits of establishing a business continuity and disaster recovery plan. In particular, is the Commission’s proposed rule different from current practice, and, if so, how? Would covered entities experience additional or lowered costs to comply with the proposed rule, and, if so, to what degree? 6. The Commission seeks additional information regarding the costs and benefits of the proposed rule’s required notice of ORF events to the Commission. Will covered entities experience additional or lowered costs to comply with the proposed rule, and, if so, to what degree? Will compliance with the 24-hour cap for as-soon-aspossible notification entail additional costs relative to some shorter or longer cap and, if so, why and to what degree? 7. The Commission seeks additional information on the costs and benefits of the proposed rule’s requirement that covered entities provide notification to customers and counterparties following an incident. In particular, is the Commission’s proposed rule different from current practice, and, if so, how? Would covered entities experience additional or lowered costs to comply with the proposed rule, and, if so, to what degree? 8. The Commission seeks additional information regarding the costs and benefits of ORF review and testing. In particular, to what extent, if any, does the proposed rule differ from existing procedures? How do covered entities determine the amount of review and testing that is appropriate? Do all covered entities currently undertake penetration and vulnerability testing, and at what frequency? Would covered entities experience additional or lowered costs to comply with the proposed rule, and, if so, to what degree? 9. The Commission seeks additional information regarding the costs and benefits of the cross-border application of the proposed rule. Would added specificity in the proposed regulations improve the cost-benefit calculus for those covered entities impacted by their cost-benefit application? If so, in what areas would more specificity be helpful and how would costs and benefits be impacted? D. Antitrust Laws Section 15(b) of the CEA requires the Commission to ‘‘take into consideration the public interest to be protected by the antitrust laws and endeavor to take the least anticompetitive means of achieving the purposes of the CEA, in E:\FR\FM\24JAP2.SGM 24JAP2 4750 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules issuing any order or adopting any Commission rule or regulation (including any exemption under CEA section 4(c) or 4c(b)), or in requiring or approving any bylaw, rule, or regulation of a contract market or registered futures association established pursuant to section 17 of this Act.’’ 393 The Commission preliminarily believes that the public interest to be protected by the antitrust laws is generally to protect competition. The Commission invites comment on whether the proposed rule implicates any other specific public interest to be protected by the antitrust laws. The Commission has also assessed the proposal for potential anticompetitive effects. To the extent that there are substantial fixed costs associated with improved operational risk management, there may be competitive implications, though likely anticompetitive impacts have not been identified. Smaller firms may bear a disproportionate cost relative to larger firms in total asset size due to this proposed rule. Nevertheless, smaller firms may be able to realize economies of scope and scale through outsourcing to third-parties, albeit at the cost of raising their third-party risk exposure. In addition, the proposed rule allows smaller firms to choose programs or plans, policies, and procedures that are appropriate to their businesses, further mitigating competitive concerns. The Commission invites comment on its CEA section 15(b) assessment, including what other means, if any, would be more procompetitive than what the Commission now proposes and why. List of Subjects 17 CFR Part 1 Brokers, Commodity futures, Consumer protection, Reporting and recordkeeping requirements. ddrumheller on DSK120RN23PROD with PROPOSALS2 17 CFR Part 23 Banks, Banking, Commodity futures, Reporting and recordkeeping requirements, Swaps. For the reasons stated in the preamble, the Commodity Futures Trading Commission proposes to amend 17 CFR parts 1 and 23 as set forth below: PART 1—GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT 1. The authority citation for part 1 continues to read as follows: ■ Authority: 7 U.S.C. 1a, 2, 5, 6, 6a, 6b, 6c, 6d, 6e, 6f, 6g, 6h, 6i, 6k, 6l, 6m, 6n, 6o, 6p, 393 7 U.S.C. 19(b). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 6r, 6s, 7, 7a–1, 7a–2, 7b, 7b–3, 8, 9, 10a, 12, 12a, 12c, 13a, 13a–1, 16, 16a, 19, 21, 23, and 24 (2012). ■ 2. Add § 1.13 to read as follows: § 1.13 Operational Resilience Framework for Futures Commission Merchants (a) Definitions. For purposes of this section: Affiliate means, with respect to any person, a person controlling, controlled by, or under common control with, such person. Business continuity and disaster recovery plan means a written plan outlining the procedures to be followed in the event of an emergency or other significant disruption to the continuity of normal business operations and that meets the requirements of paragraph (f) of this section. Consolidated program or plan means any information and technology security program, third-party relationship program, or business continuity and disaster recovery plan in which the futures commission merchant participates with one or more affiliates and that is managed and approved at the enterprise level. Covered information means any sensitive or confidential data or information maintained by a futures commission merchant in connection with its business activities as a futures commission merchant. Covered technology means any application, device, information technology asset, network service, system, and other information-handling component, including the operating environment, that is used by a futures commission merchant to conduct its business activities, or to meet its regulatory obligations, as a futures commission merchant. Critical third-party service provider means a third-party service provider, the disruption of whose performance would be reasonably likely to: (i) Significantly disrupt a futures commission merchant’s business operations as a futures commission merchant; or (ii) Significantly and adversely impact the futures commission merchant’s customers. Information and technology security means the preservation of: (i) The confidentiality, integrity, and availability of covered information; and (ii) The reliability, security, capacity, and resilience of covered technology. Incident means any event, occurrence, or circumstance that could jeopardize information and technology security, including if it occurs at a third-party service provider. Information and technology security program means a written program PO 00000 Frm 00046 Fmt 4701 Sfmt 4702 reasonably designed to identify, monitor, manage, and assess risks relating to information and technology security and that meets the requirements of paragraph (d) of this section. Key controls mean controls that an appropriate risk analysis determines are either critically important for effective information and technology security or intended to address risks that evolve or change more frequently and therefore require more frequent review to ensure their continuing effectiveness in addressing such risks. Oversight body means any board, body, or committee of a board or body of the futures commission merchant specifically granted the authority and responsibility for making strategic decisions, setting objectives and overall direction, implementing policies and procedures, or overseeing the implementation of operations for the futures commission merchant. Risk appetite means the aggregate amount of risk a futures commission merchant is willing to assume to achieve its strategic objectives. Risk tolerance limit means the amount of risk, beyond its risk appetite, that a futures commission merchant is prepared to tolerate through mitigating actions. Senior officer means the chief executive officer or other equivalent officer of the futures commission merchant. Third-party relationship program means a written program reasonably designed to identify, monitor, manage, and assess risks relating to third-party relationships and that meets the requirements of paragraph (e) of this section. (b) Generally. (1) Purpose and scope. Each futures commission merchant shall establish, document, implement, and maintain an Operational Resilience Framework reasonably designed to identify, monitor, manage, and assess risks relating to: (i) information and technology security; (ii) third-party relationships; and (iii) emergencies or other significant disruptions to the continuity of normal business operations as a futures commission merchant. (2) Components. The Operational Resilience Framework shall include an information and technology security program, a third-party relationship program, and a business continuity and disaster recovery plan. Each component program or plan shall be supported by written policies and procedures. (3) Standard. The Operational Resilience Framework shall be E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules appropriate and proportionate to the nature, size, scope, complexity, and risk profile of its business activities as a futures commission merchant, following generally accepted standards and best practices. (c) Governance. (1) Approval of components. Each component program or plan required by paragraph (b)(2) of this section shall be approved in writing, on at least an annual basis, by either the senior officer, an oversight body, or a senior-level official of the futures commission merchant. (2) Risk appetite and risk tolerance limits. (i) Each futures commission merchant shall establish and implement appropriate risk appetite and risk tolerance limits with respect to the risk areas identified in paragraph (b)(1) of this section. (ii) The risk appetite and risk tolerance limits established pursuant to paragraph (c)(2)(i) of this section shall be reviewed and approved in writing on at least an annual basis by either the senior officer, an oversight body, or a senior-level official of the futures commission merchant. (3) Internal escalations. The senior officer, an oversight body, or a seniorlevel official of the futures commission merchant shall be notified of: (i) circumstances that exceed risk tolerance limits established and approved pursuant to paragraph (c)(2)(i) of this section; and (ii) incidents that require notification pursuant to paragraphs (i) or (j) of this section. (4) Futures commission merchants forming part of a larger enterprise. (i) Generally. A futures commission merchant may satisfy the requirements of paragraph (b)(2) of this section through its participation in a consolidated program or plan, provided that each consolidated program or plan meets the requirements of this section. (ii) Attestation. A futures commission merchant that relies on a consolidated program or plan pursuant to paragraph (c)(4)(i) of this section may satisfy the requirements in paragraphs (c)(1) and (c)(2)(ii) of this section provided that either the senior officer, an oversight body, or a senior-level official of the futures commission merchant attests in writing, on at least an annual basis, that the consolidated program or plan meets the requirements of this section and reflects a risk appetite and risk tolerance limits appropriate to the futures commission merchant. (d) Information and technology security program. (1) Risk assessment. (i) The information and technology security program shall require the futures commission merchant to VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 conduct and document the results of a comprehensive risk assessment reasonably designed to identify, assess, and prioritize risks to information and technology security. (ii) Such risk assessment shall be conducted at a frequency consistent with the standard set forth in paragraph (b)(3) of this section, but at least annually, and be conducted by personnel not responsible for the development or implementation of covered technology or related controls. (iii) The results of the risk assessment shall be provided to the oversight body, senior officer, or other senior-level official who approves the information and technology security program upon the risk assessment’s completion. (2) Effective controls. The information and technology security program shall require the futures commission merchant to establish, document, implement, and maintain controls reasonably designed to prevent, detect, and mitigate identified risks to information and technology security. Each futures commission merchant shall consider, at a minimum, the following types of controls and adopt those consistent with the standard set forth in paragraph (b)(3) of this section: (i) Access controls on covered technology, including controls to authenticate and permit access only by authorized individuals and controls preventing misappropriation or misuse of covered information by employees; (ii) Access restrictions designed to permit only authorized individuals to access physical locations containing covered information, including, but not limited to, buildings, computer facilities, and records storage facilities; (iii) Encryption of electronic covered information, including while in transit or in storage on networks or systems, to which unauthorized individuals may have access; (iv) Dual control procedures, segregation of duties, and background checks for employees or third-party service providers with responsibilities for or access to covered information; (v) Change management practices, including defined roles and responsibilities, logging, and monitoring practices; (vi) Systems development and configuration management practices, including practices for initializing, changing, testing, and monitoring configurations; (vii) Flaw remediation, including vulnerability patching practices; (viii) Measures to protect against destruction, loss, or damage of covered information due to potential PO 00000 Frm 00047 Fmt 4701 Sfmt 4702 4751 environmental hazards, such as fire and water damage or technological failures; (ix) Monitoring systems and procedures to detect actual and attempted attacks on or intrusions into covered technology; (x) Response programs that specify actions to be taken when the futures commission merchant suspects or detects that unauthorized individuals have gained access to covered technology, including appropriate reports to regulatory and law enforcement agencies; and (xi) Measures to promptly recover and secure any compromised covered information. (3) Incident response plan. The information and technology security program shall include a written incident response plan that is reasonably designed to detect, assess, contain, mitigate the impact of, and recover from an incident. This incident response plan shall include, at a minimum: (i) The roles and responsibilities of the futures commission merchant’s management, staff, and third-party service providers in responding to incidents; (ii) Escalation protocols, including a requirement to timely inform the oversight body, senior officer, or other senior-level official that has primary responsibility for overseeing the information and technology security program; the chief compliance officer of the futures commission merchant; and any other relevant personnel of incidents that may significantly impact the futures commission merchant’s regulatory obligations or require notification to the Commission; (iii) The points of contact for external coordination of incident responses as determined necessary by the futures commission merchant based on the severity of incidents; (iv) The required reporting of incidents, whether by internal policy, contract, or law, including as required in this section; (v) Procedures for documenting incidents and managements’ response; and (vi) The remediation of weaknesses in information and technology security, controls, and training, if any. (e) Third-party relationship program. (1) Third-party relationship lifecycle stages. The third-party relationship program shall describe how the futures commission merchant addresses the risks attendant to each stage of the thirdparty relationship lifecycle, including: (i) Pre-selection risk assessment; (ii) Due diligence of prospective thirdparty service providers; (iii) Contractual negotiations; E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 4752 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules (iv) Ongoing monitoring; and (v) Termination, including preparations for planned and unplanned terminations. (2) Heightened duties for critical third-party service providers. The thirdparty relationship program shall establish heightened due diligence practices for potential critical thirdparty service providers and heightened monitoring for critical third-party service providers. (3) Third-party service provider inventory. As part of its third-party relationship program, each futures commission merchant shall create, maintain, and regularly update an inventory of third-party service providers the futures commission merchant has engaged to support its activities as a futures commission merchant, identifying whether each third-party service provider in the inventory is a critical third-party service provider. (3) Retention of responsibility. Notwithstanding a futures commission merchant’s determination to rely on a third-party service provider, each futures commission merchant remains responsible for meeting its obligations under the Act and Commission regulations. (4) Guidance on third-party relationship program. For guidance outlining potential risks, considerations, and strategies for developing a thirdparty relationship program consistent with paragraph (e), see Appendix A to this part. (f) Business continuity and disaster recovery plan. (1) Purpose. The business continuity and disaster recovery plan shall be reasonably designed to enable the futures commission merchant to: (i) Continue or resume normal business operations with minimal disruption to customers and the markets; and (ii) Recover and make use of covered information, as well as any other data, information, or documentation required to be maintained by law and regulation. (2) Minimum contents. The business continuity and disaster recovery plan shall, at a minimum: (i) Identify covered information, as well as any other data or information required to be maintained by law and regulation, and establish and implement procedures to backup or copy all such data and information with sufficient frequency to meet the requirements of this section, and to store such data and information off-site in either hard-copy or electronic format; (ii) Identify any resources, including covered technology, facilities, infrastructure, personnel, and VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 competencies, essential to the operations of the futures commission merchant or to fulfill the regulatory obligations of the futures commission merchant, and establish and maintain procedures and arrangements to provide for their backup in a manner that is sufficient to meet the requirements of this section. Such arrangements must provide for backups that are located in one or more areas that are geographically separate from the futures commission merchant’s primary systems, facilities, infrastructure, and personnel, and may include the use of resources provided by third-party service providers; (iii) Identify potential disruptions to critical third-party service providers and establish a plan to minimize the impact of such disruptions; (iv) Identify supervisory personnel responsible for implementing each aspect of the business continuity and disaster recovery plan, including the emergency contacts required to be provided pursuant to paragraph (k) of this section; and (v) Establish a plan for communicating with the following persons in the event of an emergency or other significant disruption, to the extent applicable: employees; customers; swap data repositories; execution facilities; trading facilities; clearing facilities; regulatory authorities; data, communications and infrastructure providers and other vendors; disaster recovery specialists; and other persons essential to the recovery of documentation and data, the resumption of operations, and compliance with the Act and Commission regulations. (3) Accessibility. Each futures commission merchant shall maintain copies of its business continuity and disaster recovery plan at one or more accessible off-site locations. (g) Training and distribution. (1) Training. Each futures commission merchant shall establish, implement, and maintain training with respect to all aspects of the Operational Resilience Framework, including, but not limited to: (i) Cybersecurity awareness training for all personnel; and (ii) Role-specific training for personnel involved in establishing, documenting, implementing, and maintaining the Operational Resilience Framework. (2) Frequency. Each futures commission merchant shall provide and update the training required in paragraph (g)(1) as necessary, but no less frequently than annually. PO 00000 Frm 00048 Fmt 4701 Sfmt 4702 (3) Distribution. Each futures commission merchant shall distribute copies of each component program or plan required by paragraph (b)(2) of this section to relevant personnel and promptly provide any significant revisions thereto. (h) Reviews and Testing. Each futures commission merchant shall establish, implement, and maintain a plan reasonably designed to assess its adherence to, and the effectiveness of, its Operational Resilience Framework through regular reviews and risk-based testing. (1) Reviews. Reviews of the Operational Resilience Framework shall be conducted at least annually and in connection with any material change to the activities or operations of the futures commission merchant that is reasonably likely to affect the risks identified in paragraph (b)(1) of this section. Reviews shall include an analysis of adherence to, and the effectiveness of, the Operational Resilience Framework and any recommendations for modifications or improvements that address root causes of any issues identified by the review. (2) Testing. The frequency, nature, and scope of risk-based testing of the Operational Resilience Framework shall be determined by the futures commission merchant, consistent with the standard in paragraph (b)(3) of this section. (i) Testing of the information and technology security program shall include, at a minimum: (A) Testing of key controls and the incident response plan at least annually; (B) Vulnerability assessments, including daily or continuous automated vulnerability scans; and (C) Penetration testing at least annually. (ii) Testing of the business continuity and disaster recovery plan shall include, at a minimum, a walk-through or tabletop exercise designed to test the effectiveness of backup facilities and capabilities at least annually. (3) Independence. The reviews and testing shall be conducted by qualified personnel who are independent of the aspect of the Operational Resilience Framework being reviewed or tested. (4) Documentation. Each futures commission merchant shall document all reviews and testing of the Operational Resilience Framework. The documentation shall, at a minimum, include: (i) The date the review or testing was conducted; (ii) The nature and scope of the review or testing, including methodologies employed; E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules (iii) The results of the review or testing, including any assessment of effectiveness; (iv) Any identified deficiencies and recommendations for remediation; and (v) Any corrective action(s) taken or initiated, including the date(s) such action(s) were taken. (5) Internal reporting. Each futures commission merchant shall report on the results of its reviews and testing to the futures commission merchant’s chief compliance officer and any other relevant senior-level official(s) and oversight body(ies). (i) Notifications to the Commission. (1) Incidents. (i) Notification trigger. Each futures commission merchant shall notify the Commission of any incident that adversely impacts, or is reasonably likely to adversely impact: (A) information and technology security; (B) the ability of the futures commission merchant to continue its business activities as a futures commission merchant; or (C) the assets or positions of a customer of the futures commission merchant. (ii) Contents. The notification shall provide any information available to the futures commission merchant at the time of notification that may assist the Commission in assessing and responding to the incident, including the date the incident was detected, possible cause(s) of the incident, its apparent or likely impacts, and any actions the futures commission merchant has taken or is taking to mitigate or recover from the incident, including measures to protect customers. (iii) Timing and method. Each futures commission merchant shall provide the incident notification as soon as possible but in any event no later than 24 hours after such incident has been detected. The notification shall be provided via email to ORFnotices@cftc.gov. (2) Business continuity and disaster recovery plan activation. (i) Notification trigger. Each futures commission merchant shall notify the Commission of any determination to activate the business continuity and disaster recovery plan. (ii) Contents. The notification shall provide any information available to the futures commission merchant at the time of notification that may assist the Commission in assessing or responding to the emergency or disruption, including the date of the emergency or disruption, a description thereof, the possible cause(s), its apparent or likely impacts, and any actions the futures commission merchant has taken or is VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 taking to mitigate or recover from the emergency or disruption, including measures taken or being taken to protect customers. (iii) Timing and method. Each futures commission merchant shall provide the business continuity and disaster recovery plan activation notification within 24 hours of determining to activate the business continuity and disaster recovery plan. The notification shall be provided via email to ORFnotices@cftc.gov. (j) Notification of incidents to affected customers. (1) Notification trigger. Each futures commission merchant shall notify a customer as soon as possible of any incident that is reasonably likely to have adversely affected the confidentiality or integrity of the customer’s covered information, assets, or positions. (2) Contents. The notification to affected customers shall include information necessary for the affected customer to understand and assess the potential impact of the incident on its information, assets, or positions, and to take any necessary action. Such notification shall include, at a minimum: (i) a description of the incident; (ii) the particular way in which the customer, or its covered information, may have been adversely impacted; (iii) measures being taken by the futures commission merchant to protect against further harm; and (iv) contact information for the futures commission merchant where the customer may learn more about the incident or ask questions. (k) Emergency Contacts. (1) Each futures commission merchant shall provide the Commission the name and contact information of: (i) two employees whom the Commission may contact in connection with incidents triggering notification to the Commission under paragraph (i)(1) of this section; and (ii) two employees whom the Commission may contact in connection with the activation of the futures commission merchant’s business continuity and disaster recovery plan triggering notification to the Commission under paragraph (i)(2) of this section. (2) The identified employees shall be authorized to make key decisions on behalf of the futures commission merchant and have knowledge of the futures commission merchant’s incident response plan or business continuity and disaster recovery plan, as appropriate. PO 00000 Frm 00049 Fmt 4701 Sfmt 4702 4753 (3) The futures commission merchant shall update its emergency contacts with the Commission as necessary. (l) Recordkeeping. Each futures commission merchant shall maintain all records required to be maintained pursuant to this section in accordance with section 1.31 of this chapter and shall make them available promptly upon request to representatives of the Commission and to representatives of applicable prudential regulators, as defined in section 1a(39) of the Act. ■ 3. Add appendix A to part 1 to read as follows: Appendix A to Part 1—Guidance on Third-Party Relationship Programs The following guidance offers factors, actions, and strategies for futures commission merchants to consider in preparing and implementing third-party relationship programs reasonably designed to identify, monitor, manage, and assess risks relating to third-party relationships, as required by Commission regulation 1.13. The guidance is also not intended to reduce or replace the obligation of futures commission merchants to comply with the requirements in Commission regulation 1.13, including the requirement to ensure that each futures commission merchant’s Operational Resilience Framework is appropriate and proportionate to the nature, size, scope, complexity, and risk profile of its business activities as a futures commission merchant, following generally accepted standards and best practices. The guidance is not exhaustive and is nonbinding. The guidance is written to be broadly relevant to all futures commission merchants, but it may not be universally applicable. The degree to which the guidance would be applicable to a particular futures commission merchant would depend on its unique facts and circumstances and may vary from relationship to relationship. Each futures commission merchant should assess the relevance of the guidance as it applies to its particular risk profile and tailor its thirdparty relationship program accordingly. Comparable guidance for swap dealers and major swap participants is included in Appendix A to subpart J of part 23 of the Commission’s regulations. A. Pre-Selection Risk Assessment— Commission Regulation 1.13(e)(1)(i) Before entering into a third-party relationship, futures commission merchants should determine which services should be performed by a third-party and plan for how to manage associated risks. The Commission appreciates that reliance on third-party service providers may be unavoidable, particularly given the rapid pace of technological innovation, which may render it uneconomical or even infeasible for financial institutions to meet all of their technological needs in-house. Nevertheless, given the risks associated with relying on third-party service providers, and that each additional third-party relationship a futures commission merchant E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 4754 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules employs is likely to add further risk and complexity, a futures commission merchant’s third-party relationship program should include a deliberative process for affirmatively determining whether to source a particular service from a third-party service provider. In determining whether a particular function should be performed by a thirdparty service provider, futures commission merchants should consider whether: • The service would support the futures commission merchant’s strategic goals and objectives. • The same goals and objectives could be addressed through an alternative means that may not require reliance on a third-party service provider. • The futures commission merchant has or could otherwise secure the resources, financial and otherwise, to effectively monitor the third-party service provider. • Relevant and reputable third-party service providers are available. • The provision of the service would implicate information and technology security concerns, including by requiring the third-party service provider to obtain access to covered information or provide covered technology. • A disruption of the service would have a negative impact on customers or regulatory compliance. • The relationship could be structured to reduce associated risks, such as by limiting the third-party service provider’s access to covered information or covered technology. • Lack of direct control over performance of the service would present unacceptable risk, i.e., risk outside the futures commission merchant’s risk tolerance limits. As the above considerations illustrate, futures commission merchants should consider ways in which they might structure their third-party relationships to reduce the associated risks. For example, where giving a third-party service provider direct access to its technology or data may be outside a futures commission merchant’s risk tolerance, structuring the relationship to provide the third-party service provider access on a read-only basis or via reports delivered by the futures commission merchants could render the relationship more acceptable. Futures commission merchants should therefore consider the availability of safer means of performing the service as part of their assessment. Changes in technology, businesses practices, regulation, market structure, market participants (e.g., new entrants to the market), or service delivery may change the risk profile of the third-party relationship over time. Accordingly, futures commission merchants should consider periodically reassessing their selection of services to be performed by third-party service providers. Futures commission merchants should stay abreast of these changes by monitoring the external environment and communicating with current and prospective service providers and other participants in industry. B. Due Diligence in Selecting Third-Party Service Providers—Commission Regulation 1.13(e)(1)(ii) After a futures commission merchant has determined that a service is suitable for a VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 third-party to perform, it should conduct due diligence on prospective third-party service providers. Due diligence provides futures commission merchants with the information they need to assess and conclude, with a reasonable level of assurance, that the prospective third-party service provider is capable of effectively providing the service as expected, adhering to the futures commission merchant’s policies, maintaining the futures commission merchant’s compliance with Commission regulations, and protecting covered information. Appropriate due diligence should also enable futures commission merchants to evaluate whether they would be able to effectively monitor and manage the risks associated with a particular third-party relationship. Due diligence may be conducted before or contemporaneously with contractual negotiations with prospective third-party service providers but should be concluded prior to executing any agreements. Futures commission merchants should conduct due diligence even in situations where, for a particular service, there may only be one or a small number of providers with a dominant market share whose services are used by all or most of the futures commission merchants’ industry peers, and futures commission merchants should not rely solely on those providers’ reputations or prior experience with them. The depth and rigor of the due diligence should be proportionate to the nature of the third-party relationship, with the required heightened due diligence for potential critical third-party service providers pursuant to Commission regulation 1.13(e)(2). Specifically, when conducting due diligence for a potential critical third-party servicer provider, futures commission merchants should expand the type and sources of information they rely on, the rigor and scrutiny they apply in reviewing the information to identify potential risks, and the level of confidence in their assessment of the third-party service provider’s ability to perform. When establishing their due diligence protocols, futures commission merchants should consider the full range of risks that reliance on the third-party service providers could introduce in light of the nature of the service they would be performing. Relevant considerations with respect to the potential third-party service provider include its: • Financial condition, business experience and reputation, and business prospects, particularly the third-party service provider’s experience providing services to financial institutions. • Background, experience, and qualifications with respect to key personnel. • Information and technology security practices, including incident reporting and incident management programs, and whether there are clearly documented processes for identifying and escalating incidents. • Risk management practices, including governance, controls, testing, and issue management practices, as well as the results of any independent risk assessments. • Regulatory environment, including the legal jurisdiction in which it is based and applicable regulatory or licensing requirements. PO 00000 Frm 00050 Fmt 4701 Sfmt 4702 • History of disruptions to operations, including whether the third-party service provider has suffered incidents that would meet the standard for reporting to the Commission in Commission regulation 1.13(i). • Violations of legal, compliance, or contractual obligations, including civil or criminal proceedings or administrative enforcement actions, including from selfregulatory organizations. • Understanding of Commission regulatory requirements applicable to the futures commission merchant. • Use of and reliance on subcontractors, including the volume and types of subcontracted activities, and the third-party service provider’s process for identifying, assessing, managing, and monitoring associated risks. • Business continuity and contingency plans. • Financial protections, such as insurance coverage against losses or liabilities from intentional or negligent acts or hazards involving physical destruction and data or documentation losses. Futures commission merchants should memorialize their assessment of these factors and identify how the review was heightened for critical third-party service providers. Futures commission merchants should not rely solely on their prior knowledge of or experience with a potential third-party. Potential sources of due diligence information include: • Audit reports, including pooled audit plans and System and Organizational Controls (SOC) reports. • Financial statements and projections and relevant accompanying information (e.g., annual or quarterly reports, management commentary, auditors’ opinions, and investor relations materials). • Incident response plans, including the results of recent testing or assessments thereof. • Business continuity and disaster recovery plans, as well as the result of recent testing or assessments thereof. • Public filings. • News reports, trade publications, and press releases. • Reports from market intelligence providers. • References from current or previous customers, or other parties which have had business relationships with the third-party service provider. • Informal industry discussions. • Information provided directly by the third-party service provider, such as internal performance metrics. Obtaining and reviewing audit reports, including SOC reports, may be of particular value for conducting heightened due diligence of critical third-party service providers. In certain circumstances, futures commission merchants may not be able to gather all the information necessary to reach an informed conclusion that a prospective third-party service provider is an adequate provider. Examples include instances where the third-party service provider is a new entrant into the market and little information exists; where information provided by the E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 third-party service provider is insufficient or appears unreliable; or where the third-party service provider is reluctant to provide internal information. In such cases, the futures commission merchant should identify and document the limitations of its due diligence, the attendant risks, and any available methods for mitigating them (e.g., obtaining alternate information, implementing enhanced monitoring or controls, negotiating protective contractual provisions). Ultimately, such factors could weigh against the use of the potential thirdparty service provider, particularly a potential critical third-party service provider. Futures commission merchants that proceed with the third-party service arrangements notwithstanding the limited due diligence should do so with caution, applying heightened scrutiny of the information they do receive, and consider the implementation of their own mitigating controls to compensate for the uncertainty. C. Contractual Negotiations—Commission Regulation 1.13(e)(1)(iii) After selecting a third-party service provider, futures commission merchants should proceed to finalizing the agreement, typically through entering into an enforceable written contract. Written contracts are an important tool for clarifying the scope of services to be delivered, establishing standards or performance benchmarks, allocating risks and responsibilities, and facilitating resolution of disputes. They can also reduce the risks of non-performance and assist in monitoring the third-party service provider. Because of their importance, the Commission recommends that futures commission merchants enter written agreements with third-party service providers before services are delivered, particularly with critical third-party service providers. In negotiating a written contract, futures commission merchants should seek to negotiate contractual provisions that would support their ability to mitigate, manage, and monitor the risks associated with the relationship, as identified through their initial pre-selection and due diligence activities. The contractual provisions should be informed by the nature of the service provided and be proportionate to the criticality of the services provided. In particular, futures commission merchants should consider negotiating for the contract to include the following provisions: • Timely notification to the futures commission merchant of any incidents suffered by third-party service providers, or of significant disruptions to the operations of the third-party service provider. • Timely notification to the futures commission merchant of any material changes to the services provided. • Required periodic, independent audits of the third-party service provider, the results of which would be shared with the futures commission merchant. • Restrictions on the third-party service provider’s use of the futures commission merchant’s covered information, except as necessary to deliver the service or meet legal obligations. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 • Security measures to protect the futures commission merchant’s covered information and covered technology to which the thirdparty service provider has access. • Insurance, guarantees, indemnification, and limitations on liability. • Dispute resolution procedures. • Performance measures or benchmarks. • Remediation of identified performance issues. • Dispute resolution procedures. • Compliance with regulatory requirements, including reasonable assurances that the third-party service provider is willing and able to coordinate with the futures commission merchant for the purpose of ensuring the futures commission merchant complies with its legal and regulatory obligations. • Use of subcontractors, including notification or approval procedures for their use, the extension of contractual rights of the futures commission merchant against the third-party service provider to its subcontractors, and contractual obligations for reporting on or oversight of subcontractors. • Termination provisions, including rights to terminate following breaches of the thirdparty service provider’s obligations, notice requirements, obligations of the third-party service provider to provide support for a successful transition, and the return or destruction of records or covered information, as further described in section E of this guidance. • Information sharing necessary to facilitate other provisions of this proposed guidance (for example, reporting requirements to support ongoing monitoring, as discussed in section D of this guidance, or notice requirements for termination, as discussed in section E of this guidance). These provisions focus on key risk factors generally associated with third-party service provider relationships. They are not exhaustive of all contractual provisions futures commission merchants should seek to include in their written contracts, including ordinary commercial contract terms (e.g., choice of law provisions) and terms that may relate only to specific services, among other provisions. While third-parties may initially offer a standard contract, a futures commission merchant may seek to request modifications, additional contractual provisions, or addendums to satisfy its needs. Futures commission merchants should work to tailor the level of detail and comprehensiveness of the contractual provisions based on the risk and complexity posed by the particular third-party relationship, contracts with critical thirdparty service providers likely being the most tailored. In some circumstances, a futures commission merchant may be at a bargaining power disadvantage, which prevents it from negotiating optimal contractual provisions. For example, a prospective third-party service provider may be the sole provider of a service or may have such dominant market share that it can offer its services on a ‘‘takeit-or-leave-it’’ basis. In such situations, the futures commission merchant should work to understand any resulting limitations in the PO 00000 Frm 00051 Fmt 4701 Sfmt 4702 4755 contract and attendant risks and consider whether it can achieve outcomes comparable to those provided by contractual protections through non-contractual means. Examples could include the futures commission merchant implementing additional controls, augmenting its monitoring of the third-party service provider using public sources or market intelligence services, or purchasing insurance. The futures commission merchant should make an assessment, however, of whether these alternatives would provide an adequate substitute for the unobtained contractual protections and document its assessment and mitigation plan, considering its risk appetite and risk tolerance limits. Where a third-party service provider is unable or unwilling to agree to provisions necessary for the futures commission merchant to meet its obligations under Commission regulations, particularly a critical third-party service provider, the futures commission merchant should consider finding an alternative third-party service provider. D. Ongoing Monitoring—Commission Regulation 1.13(e)(1)(iv) After a third-party service provider has initiated performance, futures commission merchants should engage in ongoing monitoring. Ongoing monitoring is important to ensure the third-party service provider is properly carrying out its outsourced function and contractual obligations, as well as meeting quality or performance expectations. Effective monitoring can aid futures commission merchants in the early identification of performance deficits, allowing for a quicker response that may then mitigate the impact. Ongoing monitoring should occur throughout the duration of a third-party relationship, commensurate with the level of risk and complexity of the relationship and the activity performed by the third-party. Examples of possible monitoring activities include: • Reviewing reports on performance and effectiveness of controls, including independent audit reports and SOC reports. • Periodic on-site visits or meetings to discuss open issues and plans for changes to the relationship. • Reviewing updated due diligence information. • Documenting service-level agreements with the third-party service provider to establish performance targets. • Establishing measures for the third-party service provider to identify, record, and remediate instances of failure to meet contractual obligations or unsatisfactory performance and to report such instances to the futures commission merchant on a timely basis. • Direct testing of the third-party service provider’s control environment. The frequency and depth of the futures commission merchant’s monitoring activities should reflect the nature of the third-party relationship, including heightened monitoring for critical third-party service providers, and may change over the duration of the relationship. The futures commission merchant should dedicate sufficient staffing E:\FR\FM\24JAP2.SGM 24JAP2 4756 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules ddrumheller on DSK120RN23PROD with PROPOSALS2 resources to its monitoring activities and be particularly alert to any circumstances that could signal that a third-party service provider may not be able to perform to an acceptable standard. A futures commission merchant should be cognizant that certain events may trigger the need for it to take further action, including terminating its relationship with the third-party service provider. Such events could include cyberattacks, natural disasters, financial distress or insolvency, adverse or qualified audit opinions, or litigation or enforcement actions. In addition to the continuous monitoring described above, futures commission merchants should periodically review and reevaluate their relationships with thirdparty service providers holistically. Such reviews should be more thorough than routine monitoring and may involve additional personnel, such as in-house or outside auditors, compliance and risk functions, information technology staff, or by a central function or committee whose visibility into other third-party relationships could provide valuable context for the relationship at issue. Additionally, to the extent a futures commission merchant uses enterprise risk management techniques, it should seek to integrate the information gathered from its ongoing monitoring with those practices. For example, to the extent that a futures commission merchant maintains a standardized approach across risk types to escalate concerns or issues to senior management or governance bodies (e.g., through the use of predefined criteria or escalation paths), the futures commission merchant should consider using the same protocols for escalating concerns identified through its ongoing monitoring of third-party service providers. The ongoing monitoring approach itself may be subject to enterprise risk management practices, such as periodic self-assessment for effectiveness, independent testing, and quality assurance. To the extent that monitoring activities reveal a change in their assessment of the risks associated with the third-party relationship, futures commission merchants should adjust the frequency and types of monitoring they conduct, including reports, regular testing, and on-site visits. One example of information that may change the level of monitoring is a notification that a third-party service provider has suffered or may suffer from a severe adverse event that could trigger a material change in the systems or process used to carry out an outsourced function. E. Terminating the Third-Party Relationship—Commission Regulation 1.13(e)(1)(v) Futures commission merchants should ensure that their third-party service provider relationship programs include advance preparation for the termination of the thirdparty relationship to ensure an orderly transition. Futures commission merchants should prepare for both planned terminations (i.e., where one or both parties elects to end the relationship pursuant to their contract) and unplanned terminations (e.g., following a sudden withdrawal of the third-party VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 service). The plans should include both the contractual provisions for terminating the service (termination provisions), and the futures commission merchant’s plan to facilitate an orderly transition of the function to an alternative provider or to bring it inhouse (exit strategy). The goal of termination planning is to support an efficient transition to alternative arrangements for the provision of the service, regardless of the circumstances of the termination. Termination provisions include all terms needed by the futures commission merchant to wind down a third-party service relationship while ensuring that the futures commission merchant can continue to serve its customers without interruption and to meet its regulatory compliance obligations. Because information, data, staff training, and knowledge may reside in the third-party service provider, there is an increased risk of disruption during the termination phase. When negotiating termination provisions, a futures commission merchant should ensure that the terms negotiated support its exit strategy. For example, a futures commission merchant should ensure that termination rights are accompanied by notice periods that leave the futures commission merchant enough time to find an alternative provider (or to provide the service itself) to ensure an orderly transition. Similarly, the futures commission merchant should ensure that all customer data or other covered information in the third-party service provider’s possession is promptly returned to the futures commission merchant or destroyed, as appropriate. The futures commission merchant should also verify that the third-party’s access to its systems and covered information ceases at termination. Futures commission merchants should also consider negotiating more stringent terms for third-party service providers that breach their obligations under the agreement, other than for ‘‘no-fault’’ terminations. Such breaches may signal an inability of the third-party service provider to provide the services contracted for and thereby threaten the ability of the futures commission merchant to serve its customers and meet its regulatory obligations. (See section C of this guidance for examples of termination provisions.) Futures commission merchants’ exit strategies should include the steps needed to end the service provision with the third-party service provider and retain a new service provider or begin providing the service inhouse. Although elements of an exit strategy may be reflected in termination provisions, not all elements of the exit strategy may be suitable for the contract. Examples include approvals, identification of alternative providers, description of the roles of staff in the futures commission merchant, and other internal matters. These elements may be memorialized in a procedure or similar document, such as the third-party relationship program. The exit strategy should contain the internal steps to be taken to ensure notification to the third-party service provider, identification of the proposed new provider, or, if bringing the function in-house, the hiring and training of personnel, development of procedures, and PO 00000 Frm 00052 Fmt 4701 Sfmt 4702 launch of new technology, along with the time periods and responsible personnel for each. Futures commission merchants should be aware that, in practice, implementing an exit strategy may be complex and timeconsuming and that the exercise of termination arrangements may be difficult. Futures commission merchants should also be aware that some third parties possess expertise that is not readily available and plan accordingly. Futures commission merchants should ensure that their plans are flexible enough to account for a range of plausible termination scenarios, including situations where the third-party service provider rapidly becomes unviable. Futures commission merchants may need to design backup or interim procedures sufficient to meet regulatory requirements in such situations. PART 23—SWAP DEALERS AND MAJOR SWAP PARTICIPANTS 4. The authority citation for part 23 continues to read as follows: ■ Authority: 7 U.S.C. 1a, 2, 6, 6a, 6b, 6b–1, 6c, 6p, 6r, 6s, 6t, 9, 9a, 12, 12a, 13b, 13c, 16a, 18, 19, 21. Section 23.160 also issued under 7 U.S.C. 2(i); Sec. 721(b), Pub. L. 111–203, 124 Stat. 1641 (2010). ■ 5. Revise § 23.603 to read as follows: § 23.603 Operational Resilience Framework for Swap Dealers and Major Swap Participants. (a) Definitions. For purposes of this section: Affiliate means, with respect to any person, a person controlling, controlled by, or under common control with, such person. Business continuity and disaster recovery plan means a written plan outlining the procedures to be followed in the event of an emergency or other significant disruption to the continuity of normal business operations and that meets the requirements of paragraph (f) of this section. Consolidated program or plan means any information and technology security program, third-party relationship program, or business continuity and disaster recovery plan in which the swap entity participates with one or more affiliates and that is managed and approved at the enterprise level. Covered information means any sensitive or confidential data or information maintained by a swap entity in connection with its business activities as a swap entity. Covered technology means any application, device, information technology asset, network service, system, and other information-handling component, including the operating environment, that is used by a swap entity to conduct its business activities, or to meet its regulatory obligations, as a swap entity. Critical third-party service provider means a third-party service provider, the disruption of whose performance would be reasonably likely to: E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules (1) Significantly disrupt a swap entity’s business operations as a swap entity; or (2) Significantly and adversely impact the swap entity’s counterparties. Information and technology security means the preservation of: (1) The confidentiality, integrity, and availability of covered information; and (2) The reliability, security, capacity, and resilience of covered technology. Incident means any event, occurrence, or circumstance that could jeopardize information and technology security, including if it occurs at a third-party service provider. Information and technology security program means a written program reasonably designed to identify, monitor, manage, and assess risks relating to information and technology security and that meets the requirements of paragraph (d) of this section. Key controls mean controls that an appropriate risk analysis determines are either critically important for effective information and technology security or intended to address risks that evolve or change more frequently and therefore require more frequent review to ensure their continuing effectiveness in addressing such risks. Oversight body means any board, body, or committee of a board or body of the swap entity specifically granted the authority and responsibility for making strategic decisions, setting objectives and overall direction, implementing policies and procedures, or overseeing the implementation of operations for the swap entity. Risk appetite means the aggregate amount of risk a swap entity is willing to assume to achieve its strategic objectives. Risk tolerance limit means the amount of risk, beyond its risk appetite, that a swap entity is prepared to tolerate through mitigating actions. Senior officer means the chief executive officer or other equivalent officer of the swap entity. Swap entity means a person that is registered with the Commission as a swap dealer or major swap participant pursuant to the Act. Third-party relationship program means a written program reasonably designed to identify, monitor, manage, and assess risks relating to third-party relationships and that meets the requirements of paragraph (e) of this section. (b) Generally. (1) Purpose and scope. Each swap entity shall establish, document, implement, and maintain an Operational Resilience Framework reasonably designed to identify, monitor, manage, and assess risks relating to: (i) information and technology security; (ii) third-party relationships; and (iii) emergencies or other significant disruptions to the continuity of normal business operations as a swap entity. (2) Components. The Operational Resilience Framework shall include an information and technology security program, a third-party relationship program, and a business continuity and disaster recovery plan. Each component program or plan shall be supported by written policies and procedures. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 (3) Standard. The Operational Resilience Framework shall be appropriate and proportionate to the nature, size, scope, complexity, and risk profile of its business activities as a swap entity, following generally accepted standards and best practices. (c) Governance. (1) Approval of components. Each component program or plan required by paragraph (b)(2) of this section shall be approved in writing, on at least an annual basis, by either the senior officer, an oversight body, or a senior-level official of the swap entity. (2) Risk appetite and risk tolerance limits. (i) Each swap entity shall establish and implement appropriate risk appetite and risk tolerance limits with respect to the risk areas identified in paragraph (b)(1) of this section. (ii) The risk appetite and risk tolerance limits established pursuant to paragraph (c)(2)(i) of this section shall be reviewed and approved in writing on at least an annual basis by either the senior officer, an oversight body, or a senior-level official of the swap entity. (3) Internal escalations. The senior officer, an oversight body, or a senior-level official of the swap entity shall be notified of: (i) circumstances that exceed risk tolerance limits established and approved pursuant to paragraph (c)(2)(i) of this section; and (ii) incidents that require notification pursuant to paragraphs (i) or (j) of this section. (4) Swap entities forming part of a larger enterprise. (i) Generally. A swap entity may satisfy the requirements of paragraph (b)(2) of this section through its participation in a consolidated program or plan, provided that each consolidated program or plan meets the requirements of this section. (ii) Attestation. A swap entity that relies on a consolidated program or plan pursuant to paragraph (c)(4)(i) of this section may satisfy the requirements in paragraphs (c)(1) and (c)(2)(ii) of this section provided that either the senior officer, an oversight body, or a senior-level official of the swap entity attests in writing, on at least an annual basis, that the consolidated program or plan meets the requirements of this section and reflects a risk appetite and risk tolerance limits appropriate to the swap entity. (d) Information and technology security program. (1) Risk assessment. (i) The information and technology security program shall require the swap entity to conduct and document the results of a comprehensive risk assessment reasonably designed to identify, assess, and prioritize risks to information and technology security. (ii) Such risk assessment shall be conducted at a frequency consistent with the standard set forth in paragraph (b)(3) of this section, but at least annually, and be conducted by personnel not responsible for the development or implementation of covered technology or related controls. (iii) The results of the risk assessment shall be provided to the oversight body, senior officer, or other senior-level official who approves the information and technology security program upon the risk assessment’s completion. PO 00000 Frm 00053 Fmt 4701 Sfmt 4702 4757 (2) Effective controls. The information and technology security program shall require the swap entity to establish, document, implement, and maintain controls reasonably designed to prevent, detect, and mitigate identified risks to information and technology security. Each swap entity shall consider, at a minimum, the following types of controls and adopt those consistent with the standard set forth in paragraph (b)(3) of this section: (i) Access controls on covered technology, including controls to authenticate and permit access only by authorized individuals and controls preventing misappropriation or misuse of covered information by employees; (ii) Access restrictions designed to permit only authorized individuals to access physical locations containing covered information, including, but not limited to, buildings, computer facilities, and records storage facilities; (iii) Encryption of electronic covered information, including while in transit or in storage on networks or systems, to which unauthorized individuals may have access; (iv) Dual control procedures, segregation of duties, and background checks for employees or third-party service providers with responsibilities for or access to covered information; (v) Change management practices, including defined roles and responsibilities, logging, and monitoring practices; (vi) Systems development and configuration management practices, including practices for initializing, changing, testing, and monitoring configurations; (vii) Flaw remediation, including vulnerability patching practices; (viii) Measures to protect against destruction, loss, or damage of covered information due to potential environmental hazards, such as fire and water damage or technological failures; (ix) Monitoring systems and procedures to detect actual and attempted attacks on or intrusions into covered technology; (x) Response programs that specify actions to be taken when the swap entity suspects or detects that unauthorized individuals have gained access to covered technology, including appropriate reports to regulatory and law enforcement agencies; and (xi) Measures to promptly recover and secure any compromised covered information. (3) Incident response plan. The information and technology security program shall include a written incident response plan that is reasonably designed to detect, assess, contain, mitigate the impact of, and recover from an incident. This incident response plan shall include, at a minimum: (i) The roles and responsibilities of the swap entity’s management, staff, and thirdparty service providers in responding to incidents; (ii) Escalation protocols, including a requirement to timely inform the oversight body, senior officer, or other senior-level official that has primary responsibility for overseeing the information and technology security program; the chief compliance officer of the swap entity; and any other relevant personnel of incidents that may E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 4758 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules significantly impact the swap entity’s regulatory obligations or require notification to the Commission; (iii) The points of contact for external coordination of incident responses as determined necessary by the swap entity based on the severity of incidents; (iv) The required reporting of incidents, whether by internal policy, contract, or law, including as required in this section; (v) Procedures for documenting incidents and managements’ response; and (vi) The remediation of weaknesses in information and technology security, controls, and training, if any. (e) Third-party relationship program. (1) Third-party relationship lifecycle stages. The third-party relationship program shall describe how the swap entity addresses the risks attendant to each stage of the thirdparty relationship lifecycle, including: (i) Pre-selection risk assessment; (ii) Due diligence of prospective third-party service providers; (iii) Contractual negotiations; (iv) Ongoing monitoring; and (v) Termination, including preparations for planned and unplanned terminations. (2) Heightened duties for critical thirdparty service providers. The third-party relationship program shall establish heightened due diligence practices for potential critical third-party service providers and heightened monitoring for critical third-party service providers. (3) Third-party service provider inventory. As part of its third-party relationship program, each swap entity shall create, maintain, and regularly update an inventory of third-party service providers the swap entity has engaged to support its activities as a swap entity, identifying whether each third-party service provider in the inventory is a critical third-party service provider. (3) Retention of responsibility. Notwithstanding a swap entity’s determination to rely on a third-party service provider, each swap entity remains responsible for meeting its obligations under the Act and Commission regulations. (4) Guidance on third-party relationship programs. For guidance outlining potential risks, considerations, and strategies for developing a third-party relationship program consistent with paragraph (e), see Appendix A to Subpart J of this part. (f) Business continuity and disaster recovery plan. (1) Purpose. The business continuity and disaster recovery plan shall be reasonably designed to enable the swap entity to: (i) Continue or resume normal business operations with minimal disruption to counterparties and the markets; and (ii) Recover and make use of covered information, as well as any other data, information, or documentation required to be maintained by law and regulation. (2) Minimum contents. The business continuity and disaster recovery plan shall, at a minimum: (i) Identify covered information, as well as any other data or information required to be maintained by law and regulation, and establish and implement procedures to backup or copy all such data and information VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 with sufficient frequency to meet the requirements of this section and to store such data and information off-site in either hardcopy or electronic format; (ii) Identify any resources, including covered technology, facilities, infrastructure, personnel, and competencies, essential to the operations of the swap entity or to fulfill the regulatory obligations of the swap entity, and establish and maintain procedures and arrangements to provide for their backup in a manner that is sufficient to meet the requirements of this section. Such arrangements must provide for backups that are located in one or more areas that are geographically separate from the swap entity’s primary systems, facilities, infrastructure, and personnel, and may include the use of resources provided by third-party service providers; (iii) Identify potential disruptions to critical third-party service providers and establish a plan to minimize the impact of such disruptions; (iv) Identify supervisory personnel responsible for implementing each aspect of the business continuity and disaster recovery plan, including the emergency contacts required to be provided pursuant to paragraph (k) of this section; and (v) Establish a plan for communicating with the following persons in the event of an emergency or other significant disruption, to the extent applicable: employees; counterparties; swap data repositories; execution facilities; trading facilities; clearing facilities; regulatory authorities; data, communications and infrastructure providers and other vendors; disaster recovery specialists; and other persons essential to the recovery of documentation and data, the resumption of operations, and compliance with the Act and Commission regulations. (3) Accessibility. Each swap entity shall maintain copies of its business continuity and disaster recovery plan at one or more accessible off-site locations. (g) Training and distribution. (1) Training. Each swap entity shall establish, implement, and maintain training with respect to all aspects of the Operational Resilience Framework, including, but not limited to: (i) Cybersecurity awareness training for all personnel; and (ii) Role-specific training for personnel involved in establishing, documenting, implementing, and maintaining the Operational Resilience Framework. (2) Frequency. Each swap entity shall provide and update the training required in paragraph (g)(1) as necessary, but no less frequently than annually. (3) Distribution. Each swap entity shall distribute copies of each component program or plan required by paragraph (b)(2) of this section to relevant personnel and promptly provide any significant revisions thereto. (h) Reviews and Testing. Each swap entity shall establish, implement, and maintain a plan reasonably designed to assess its adherence to, and the effectiveness of, its Operational Resilience Framework through regular reviews and risk-based testing. (1) Reviews. Reviews of the Operational Resilience Framework shall be conducted at least annually and in connection with any PO 00000 Frm 00054 Fmt 4701 Sfmt 4702 material change to the activities or operations of the swap entity that is reasonably likely to affect the risks identified in paragraph (b)(1) of this section. Reviews shall include an analysis of adherence to, and the effectiveness of, the Operational Resilience Framework and any recommendations for modifications or improvements that address root causes of any issues identified by the review. (2) Testing. The frequency, nature, and scope of risk-based testing of the Operational Resilience Framework shall be determined by the swap entity, consistent with the standard in paragraph (b)(3) of this section. (i) Testing of the information and technology security program shall include, at a minimum: (A) Testing of key controls and the incident response plan at least annually; (B) Vulnerability assessments, including daily or continuous automated vulnerability scans; and (C) Penetration testing at least annually. (ii) Testing of the business continuity and disaster recovery plan shall include, at a minimum, a walk-through or tabletop exercise designed to test the effectiveness of backup facilities and capabilities at least annually. (3) Independence. The reviews and testing shall be conducted by qualified personnel who are independent of the aspect of the Operational Resilience Framework being reviewed or tested. (4) Documentation. Each swap entity shall document all reviews and testing of the Operational Resilience Framework. The documentation shall, at a minimum, include: (i) The date the review or testing was conducted; (ii) The nature and scope of the review or testing, including methodologies employed; (iii) The results of the review or testing, including any assessment of effectiveness; (iv) Any identified deficiencies and recommendations for remediation; and (v) Any corrective action(s) taken or initiated, including the date(s) such action(s) were taken. (5) Internal reporting. Each swap entity shall report on the results of its reviews and testing to the swap entity’s chief compliance officer and any other relevant senior-level official(s) and oversight body(ies). (i) Notifications to the Commission. (1) Incidents. (i) Notification trigger. Each swap entity shall notify the Commission of any incident that adversely impacts, or is reasonably likely to adversely impact: (A) Information and technology security; (B) The ability of the swap entity to continue its business activities as a swap entity; or (C) The assets or positions of a counterparty of the swap entity. (ii) Contents. The notification shall provide any information available to the swap entity at the time of notification that may assist the Commission in assessing and responding to the incident, including the date the incident was detected, possible cause(s) of the incident, its apparent or likely impacts, and any actions the swap entity has taken or is taking to mitigate or recover from the E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules incident, including measures to protect counterparties. (iii) Timing and method. Each swap entity shall provide the incident notification as soon as possible but in any event no later than 24 hours after such incident has been detected. The notification shall be provided via email to ORFnotices@cftc.gov. (2) Business continuity and disaster recovery plan activation. (i) Notification trigger. Each swap entity shall notify the Commission of any determination to activate the business continuity and disaster recovery plan. (ii) Contents. The notification shall provide any information available to the swap entity at the time of notification that may assist the Commission in assessing or responding to the emergency or disruption, including the date of the emergency or disruption, a description thereof, the possible cause(s), its apparent or likely impacts, and any actions the swap entity has taken or is taking to mitigate or recover from the emergency or disruption, including measures taken or being taken to protect counterparties. (iii) Timing and method. Each swap entity shall provide the business continuity and disaster recovery plan activation notification within 24 hours of determining to activate the business continuity and disaster recovery plan. The notification shall be provided via email to ORFnotices@cftc.gov. (j) Notification of incidents to affected counterparties. (1) Notification trigger. Each swap entity shall notify a counterparty as soon as possible of any incident that is reasonably likely to have adversely affected the confidentiality or integrity of the counterparty’s covered information, assets, or positions. (2) Contents. The notification to affected counterparties shall include information necessary for the affected counterparty to understand and assess the potential impact of the incident on its information, assets, or positions, and to take any necessary action. Such notification shall include, at a minimum: (i) A description of the incident; (ii) The particular way in which the counterparty, or its covered information, may have been adversely impacted; (iii) Measures being taken by the swap entity to protect against further harm; and (iv) Contact information for the swap entity where the counterparty may learn more about the incident or ask questions. (k) Emergency Contacts. (1) Each swap entity shall provide the Commission the name and contact information of: (i) Two employees whom the Commission may contact in connection with incidents triggering notification to the Commission under paragraph (i)(1) of this section; and (ii) Two employees whom the Commission may contact in connection with the activation of the swap entity’s business continuity and disaster recovery plan triggering notification to the Commission under paragraph (i)(2) of this section. (2) The identified employees shall be authorized to make key decisions on behalf of the swap entity and have knowledge of the swap entity’s incident response plan or business continuity and disaster recovery plan, as appropriate. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 (3) The swap entity shall update its emergency contacts with the Commission as necessary. (l) Recordkeeping. Each swap entity shall maintain all records required to be maintained pursuant to this section in accordance with section 1.31 of this chapter and shall make them available promptly upon request to representatives of the Commission and to representatives of applicable prudential regulators, as defined in section 1a(39) of the Act. 6. Add appendix A to subpart J of part 23 to read as follows: ■ Appendix A to Subpart J of Part 23— Guidance on Third-Party Relationship Programs The following guidance offers factors, actions, and strategies for swap entities to consider in preparing and implementing third-party relationship programs reasonably designed to identify, monitor, manage, and assess risks relating to third-party relationships, as required by Commission regulation 23.603. The guidance is also not intended to reduce or replace the obligation of swap entities to comply with the requirements in Commission regulation 23.603, including the requirement to ensure that each swap entity’s Operational Resilience Framework is appropriate and proportionate to the nature, size, scope, complexity, and risk profile of its business activities as a swap entity, following generally accepted standards and best practices. The guidance is not exhaustive and is nonbinding. The guidance is written to be broadly relevant to all swap entities, but it may not be universally applicable. The degree to which the guidance would be applicable to a particular swap entity would depend on its unique facts and circumstances and may vary from relationship to relationship. Each swap entity should assess the relevance of the guidance as it applies to its particular risk profile and tailor its third-party relationship program accordingly. Comparable guidance for futures commission merchants is included in Appendix A to part 1 of the Commission’s regulations. A. Pre-Selection Risk Assessment— Commission Regulation 23.603(e)(1)(i) Before entering into a third-party relationship, swap entities should determine which services should be performed by a third-party and plan for how to manage associated risks. The Commission appreciates that reliance on third-party service providers may be unavoidable, particularly given the rapid pace of technological innovation, which may render it uneconomical or even infeasible for financial institutions to meet all of their technological needs in-house. Nevertheless, given the risks associated with relying on third-party service providers, and that each additional third-party relationship a swap entity employs is likely to add further risk and complexity, a swap entity’s third-party relationship program should include a deliberative process for affirmatively determining whether to source a particular service from a third-party service PO 00000 Frm 00055 Fmt 4701 Sfmt 4702 4759 provider. In determining whether a particular function should be performed by a thirdparty service provider, swap entities should consider whether: • The service would support the swap entity’s strategic goals and objectives. • The same goals and objectives could be addressed through an alternative means that may not require reliance on a third-party service provider. • The swap entity has or could otherwise secure the resources, financial and otherwise, to effectively monitor the third-party service provider. • Relevant and reputable third-party service providers are available. • The provision of the service would implicate information and technology security concerns, including by requiring the third-party service provider to obtain access to covered information or provide covered technology. • A disruption of the service would have a negative impact on counterparties or regulatory compliance. • The relationship could be structured to reduce associated risks, such as by limiting the third-party service provider’s access to covered information or covered technology. • Lack of direct control over performance of the service would present unacceptable risk, i.e., risk outside the swap entity’s risk tolerance limits. As the above considerations illustrate, swap entities should consider ways in which they might structure their third-party relationships to reduce the associated risks. For example, where giving a third-party service provider direct access to its technology or data may be outside a swap entity’s risk tolerance, structuring the relationship to provide the third-party service provider access on a read-only basis or via reports delivered by the swap entity could render the relationship more acceptable. Swap entities should therefore consider the availability of safer means of performing the service as part of their assessment. Changes in technology, businesses practices, regulation, market structure, market participants (e.g., new entrants to the market), or service delivery may change the risk profile of the third-party relationship over time. Accordingly, swap entities should consider periodically reassessing their selection of services to be performed by third-party service providers. Swap entities should stay abreast of these changes by monitoring the external environment and communicating with current and prospective service providers and other participants in industry. B. Due Diligence in Selecting Third-Party Service Providers—Commission Regulation 23.603(e)(1)(ii) After a swap entity has determined that a service is suitable for a third-party to perform, it should conduct due diligence on prospective third-party service providers. Due diligence provides swap entities with the information they need to assess and conclude, with a reasonable level of assurance, that the prospective third-party service provider is capable of effectively E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 4760 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules providing the service as expected, adhering to the swap entity’s policies, maintaining the swap entity’s compliance with Commission regulations, and protecting covered information. Appropriate due diligence should also enable swap entities to evaluate whether they would be able to effectively monitor and manage the risks associated with a particular third-party relationship. Due diligence may be conducted before or contemporaneously with contractual negotiations with prospective third-party service providers but should be concluded prior to executing any agreements. Swap entities should conduct due diligence even in situations where, for a particular service, there may only be one or a small number of providers with a dominant market share whose services are used by all or most of the swap entities’ industry peers, and swap entities should not rely solely on those providers’ reputations or prior experience with them. The depth and rigor of the due diligence should be proportionate to the nature of the third-party relationship, with the required heightened due diligence required for potential critical third-party service providers pursuant to Commission regulation 23.603(e)(2). Specifically, when conducting due diligence for a potential critical third-party servicer provider, swap entities should expand the type and sources of information they rely on, the rigor and scrutiny they apply in reviewing the information to identify potential risks, and the level of confidence in their assessment of the third-party service provider’s ability to perform. When establishing their due diligence protocols, swap entities should consider the full range of risks that reliance on the thirdparty service providers could introduce in light of the nature of the service they would be performing. Relevant considerations with respect to the potential third-party service provider include its: • Financial condition, business experience and reputation, and business prospects, particularly the third-party service provider’s experience providing services to financial institutions. • Background, experience, and qualifications with respect to key personnel. • Information and technology security practices, including incident reporting and incident management programs, and whether there are clearly documented processes for identifying and escalating incidents. • Risk management practices, including governance, controls, testing, and issue management practices, as well as the results of any independent risk assessments. • Regulatory environment, including the legal jurisdiction in which it is based and applicable regulatory or licensing requirements. • History of disruptions to operations, including whether the third-party service provider has suffered incidents that would meet the standard for reporting to the Commission in Commission regulation 23.603(i). • Violations of legal, compliance, or contractual obligations, including civil or criminal proceedings or administrative enforcement actions, including from selfregulatory organizations. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 • Understanding of Commission regulatory requirements applicable to the swap entity. • Use of and reliance on subcontractors, including the volume and types of subcontracted activities, and the third-party service provider’s process for identifying, assessing, managing, and monitoring associated risks. • Business continuity and contingency plans. • Financial protections, such as insurance coverage against losses or liabilities from intentional or negligent acts or hazards involving physical destruction and data or documentation losses. Swap entities should memorialize their assessment of these factors and identify how the review was heightened for critical thirdparty service providers. Swap entities should not rely solely on their prior knowledge of or experience with a potential third-party. Potential sources of due diligence information include: • Audit reports, including pooled audit plans, and System and Organizational Controls (SOC) reports. • Financial statements and projections and relevant accompanying information (e.g., annual or quarterly reports, management commentary, auditors’ opinions, and investor relations materials). • Incident response plans, including the results of recent testing or assessments thereof. • Business continuity and disaster recovery plans, as well as the result of recent testing or assessments thereof. • Public filings. • News reports, trade publications, and press releases. • Reports from market intelligence providers. • References from current or previous customers, or other parties which have had business relationships with the third-party service provider. • Informal industry discussions. • Information provided directly by the third-party service provider, such as internal performance metrics. Obtaining and reviewing audit reports, including SOC reports, may be of particular value for conducting heightened due diligence of critical third-party service providers. In certain circumstances, swap entities may not be able to gather all the information necessary to reach an informed conclusion that a prospective third-party service provider is an adequate provider. Examples include instances where the thirdparty service provider is a new entrant into the market and little information exists; where information provided by the thirdparty service provider is insufficient or appears unreliable; or where the third-party service provider is reluctant to provide internal information. In such cases, the swap entity should identify and document the limitations of its due diligence, the attendant risks, and any available methods for mitigating them (e.g., obtaining alternate information, implementing enhanced monitoring or controls, negotiating protective contractual provisions). Ultimately, such factors could weigh against the use of the potential third-party service provider, PO 00000 Frm 00056 Fmt 4701 Sfmt 4702 particularly a potential critical third-party service provider. Swap entities that proceed with the third-party service arrangements notwithstanding the limited due diligence should do so with caution, applying heightened scrutiny of the information they do receive, and consider the implementation of their own mitigating controls to compensate for the uncertainty. C. Contractual Negotiations—Commission Regulation 23.603(e)(1)(iii) After selecting a third-party service provider, swap entities should proceed to finalizing the agreement, typically through entering into an enforceable written contract. Written contracts are an important tool for clarifying the scope of services to be delivered, establishing standards or performance benchmarks, allocating risks and responsibilities, and facilitating resolution of disputes. They can also reduce the risks of non-performance and assist in monitoring the third-party service provider. Because of their importance, the Commission recommends that swap entities enter written agreements with third-party service providers before services are delivered, particularly with critical third-party service providers. In negotiating a written contract, swap entities should seek to negotiate contractual provisions that would support their ability to mitigate, manage, and monitor the risks associated with the relationship, as identified through their initial pre-selection and due diligence activities. The contractual provisions should be informed by the nature of the service provided and be proportionate to the criticality of the services provided. In particular, swap entities should consider negotiating for the contract to include the following provisions: • Timely notification to the swap entity of any incidents suffered by third-party service providers, or of significant disruptions to the operations of the third-party service provider. • Timely notification to the swap entity of any material changes to the services provided. • Required periodic, independent audits of the third-party service provider, the results of which would be shared with the swap entity. • Restrictions on the third-party service provider’s use of the swap entity’s covered information, except as necessary to deliver the service or meet legal obligations. • Security measures to protect the swap entity’s covered information and covered technology to which the third-party service provider has access. • Insurance, guarantees, indemnification, and limitations on liability. • Dispute resolution procedures. • Performance measures or benchmarks. • Remediation of identified performance issues. • Compliance with regulatory requirements, including reasonable assurances that the third-party service provider is willing and able to coordinate with the swap entity for the purpose of ensuring the swap entity complies with its legal and regulatory obligations. • Use of subcontractors, including notification or approval procedures for their use, the extension of contractual rights of the E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules swap entity against the third-party service provider to its subcontractors, and contractual obligations for reporting on or oversight of subcontractors. • Termination provisions, including rights to terminate following breaches of the thirdparty service provider’s obligations, notice requirements, obligations of the third-party service provider to provide support for a successful transition, and the return or destruction of records or covered information, as further described in section E of this guidance. • Information sharing necessary to facilitate other provisions of this proposed guidance (for example, reporting requirements to support ongoing monitoring, as discussed in section D of this guidance, or notice requirements for termination, as discussed in section E of this guidance). These provisions focus on key risk factors generally associated with third-party service provider relationships. They are not exhaustive of all contractual provisions swap entities should seek to include in their written contracts, including ordinary commercial contract terms (e.g., choice of law provisions) and terms that may relate only to specific services, among other provisions. While third-parties may initially offer a standard contract, a swap entity may seek to request modifications, additional contractual provisions, or addendums to satisfy its needs. Swap entities should work to tailor the level of detail and comprehensiveness of the contractual provisions based on the risk and complexity posed by the particular third-party relationship, contracts with critical thirdparty service providers likely being the most tailored. In some circumstances, a swap entity may be at a bargaining power disadvantage, which prevents it from negotiating optimal contractual provisions. For example, a prospective third-party service provider may be the sole provider of a service or may have such dominant market share that it can offer its services on a ‘‘take-it-or-leave-it’’ basis. In such situations, the swap entity should work to understand any resulting limitations in the contract and attendant risks and consider whether it can achieve outcomes comparable to those provided by contractual protections through non-contractual means. Examples could include the swap entity implementing additional controls, augmenting its monitoring of the third-party service provider using public sources or market intelligence services, or purchasing insurance. The swap entity should make an assessment, however, of whether these alternatives would provide an adequate substitute for the unobtained contractual protections and document its assessment and mitigation plan, considering its risk appetite and risk tolerance limits. Where a third-party service provider is unable or unwilling to agree to provisions necessary for the swap entity to meet its obligations under Commission regulations, particularly a critical third-party service provider, the swap entity should consider finding an alternative third-party service provider. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 D. Ongoing Monitoring—Commission Regulation 23.603(e)(1)(iv) After a third-party service provider has initiated performance, swap entities should engage in ongoing monitoring. Ongoing monitoring is important to ensure the thirdparty service provider is properly carrying out its outsourced function and contractual obligations, as well as meeting quality or performance expectations. Effective monitoring can aid swap entities in the early identification of performance deficits, allowing for a quicker response that may then mitigate the impact. Ongoing monitoring should occur throughout the duration of a third-party relationship, commensurate with the level of risk and complexity of the relationship and the activity performed by the third-party. Examples of possible monitoring activities include: • Reviewing reports on performance and effectiveness of controls, including independent audit reports and SOC reports. • Periodic on-site visits or meetings to discuss open issues and plans for changes to the relationship. • Reviewing updated due diligence information. • Documenting service-level agreements with the third-party service provider to establish performance targets. • Establishing measures for the third-party service provider to identify, record, and remediate instances of failure to meet contractual obligations or unsatisfactory performance and to report such instances to the swap entity on a timely basis. • Direct testing of the third-party service provider’s control environment. The frequency and depth of the swap entity’s monitoring activities should reflect the nature of the third-party relationship, including heightened monitoring for critical third-party service providers, and may change over the duration of the relationship. The swap entity should dedicate sufficient staffing resources to its monitoring activities and be particularly alert to any circumstances that could signal that a third-party service provider may not be able to perform to an acceptable standard. A swap entity should be cognizant that certain events may trigger the need for it to take further action, including terminating its relationship with the thirdparty service provider. Such events could include cyberattacks, natural disasters, financial distress or insolvency, adverse or qualified audit opinions, or litigation or enforcement actions. In addition to the continuous monitoring described above, swap entities should periodically review and reevaluate their relationships with third-party service providers holistically. Such reviews should be more thorough than routine monitoring and may involve additional personnel, such as in-house or outside auditors, compliance and risk functions, information technology staff, or by a central function or committee whose visibility into other third-party relationships could provide valuable context for the relationship at issue. Additionally, to the extent a swap entity uses enterprise risk management techniques, it should seek to integrate the information gathered from its PO 00000 Frm 00057 Fmt 4701 Sfmt 4702 4761 ongoing monitoring with those practices. For example, to the extent that a swap entity maintains a standardized approach across risk types to escalate concerns or issues to senior management or governance bodies (e.g., through the use of predefined criteria or escalation paths), the swap entity should consider using the same protocols for escalating concerns identified through its ongoing monitoring of third-party service providers. The ongoing monitoring approach itself may be subject to enterprise risk management practices, such as periodic selfassessment for effectiveness, independent testing, and quality assurance. To the extent that monitoring activities reveal a change in their assessment of the risks associated with the third-party relationship, swap entities should adjust the frequency and types of monitoring they conduct, including reports, regular testing, and on-site visits. One example of information that may change the level of monitoring is a notification that a third-party service provider has suffered or may suffer from a severe adverse event that could trigger a material change in the systems or process used to carry out an outsourced function. E. Terminating the Third-Party Relationship—Commission Regulation 23.603(e)(1)(v) Swap entities should ensure that their third-party service provider relationship programs include advance preparation for the termination of the third-party relationship to ensure an orderly transition. Swap entities should prepare for both planned terminations (i.e., where one or both parties elects to end the relationship pursuant to their contract) and unplanned terminations (e.g., following a sudden withdrawal of the third-party service). The programs should include both the contractual provisions for terminating the service (termination provisions), and the swap entity’s plan to facilitate an orderly transition of the function to an alternative provider or to bring it in-house (exit strategy). The goal of termination planning is to support an efficient transition to alternative arrangements for the provision of the service, regardless of the circumstances of the termination. Termination provisions include all terms needed by the swap entity to wind down a third-party service relationship while ensuring that the swap entity can continue to serve its counterparties without interruption and to meet its regulatory compliance obligations. Because information, data, staff training, and knowledge may reside in the third-party service provider, there is an increased risk of disruption during the termination phase. When negotiating termination provisions, a swap entity should ensure that the terms negotiated support its exit strategy. For example, a swap entity should ensure that termination rights are accompanied by notice periods that leave the swap entity enough time to find an alternative provider (or to provide the service itself) to ensure an orderly transition. Similarly, the swap entity should ensure that all customer data or other covered information in the third-party service provider’s possession is promptly returned to E:\FR\FM\24JAP2.SGM 24JAP2 4762 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules the swap entity or destroyed, as appropriate. The swap entity should also verify that the third-party’s access to its systems and covered information ceases at termination. Swap entities should also consider negotiating more stringent terms for thirdparty service providers that breach their obligations under the agreement, other than for ‘‘no-fault’’ terminations. Such breaches may signal an inability of the third-party service provider to provide the services contracted for and thereby threaten the ability of the swap entity to serve its customers and meet its regulatory obligations. (See section C of this guidance for examples of termination provisions.) Swap entities’ exit strategies should include the steps needed to end the service provision with the third-party service provider and retain a new service provider or begin providing the service in-house. Although elements of an exit strategy may be reflected in termination provisions, not all elements of the exit strategy may be suitable for the contract. Examples include approvals, identification of alternative providers, description of the roles of staff in the swap entity, and other internal matters. These elements may be memorialized in a procedure or similar document, such as the third-party relationship program. The exit strategy should contain the internal steps to be taken to ensure notification to the thirdparty service provider, identification of the proposed new provider, or, if bringing the function in-house, the hiring and training of personnel, development of procedures, and launch of new technology, along with the time periods and responsible personnel for each. Swap entities should be aware that, in practice, implementing an exit strategy may be complex and time-consuming and that the exercise of termination arrangements may be difficult. Swap entities should also be aware that some third parties possess expertise that is not readily available and plan accordingly. Swap entities should ensure that their plans are flexible enough to account for a range of plausible termination scenarios, including situations where the third-party service provider rapidly becomes unviable. Swap entities may need to design backup or interim procedures sufficient to meet regulatory requirements in such situations. Issued in Washington, DC, on December 22, 2023, by the Commission. Robert Sidman, Deputy Secretary of the Commission. ddrumheller on DSK120RN23PROD with PROPOSALS2 NOTE: The following appendices will not appear in the Code of Federal Regulations. Appendices to Operational Resilience Framework for Futures Commission Merchants, Swap Dealers, and Major Swap Participants—Voting Summary and Chairman’s and Commissioners’ Statements Appendix 1—Voting Summary On this matter, Chairman Behnam, Commissioners Johnson, Goldsmith Romero, Mersinger and Pham voted in the affirmative. No Commissioner voted in the negative. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 Appendix 2—Statement of Support of Chairman Rostin Behnam I support the Commission’s approval of the notice of proposed rulemaking to require futures commission merchants (FCMs), swap dealers (SDs), and major swap participants (MSPs) to establish an operational resilience framework (ORF). The proposal recognizes that while FCMs, SDs, and MSPs (collectively, ‘‘covered entities’’) have generally withstood challenging market conditions since the Commission promulgated its risk management program requirements over a decade ago, the Commission must bolster that foundational framework to promote operational resilience in the face of increasingly sophisticated cyberattacks and heightened technological disruptions. A strong ORF is especially important as the financial sector increasingly relies on thirdparty service providers; the disruption of which can lead to major interruptions in— and potential corruption of—FCM and SD operations. In addition to market impacts, events like these may impact covered entities’ ability to comply with the Commission’s statutory and regulatory requirements. FCMs’ customers and SDs’ counterparties expect covered entities to take a 360-degree approach to identify, monitor, manage, and assess risks for potential vulnerabilities. Similarly, the Commission must identify, monitor, manage, and assess any potential gaps in its own risk management requirements that could impede sound risk management practices, expose the U.S. financial system to unmanaged risk, or weaken customer protection. Operational disruptions that place a covered entity’s financial resources at risk; disrupt the segregation and protection of customer funds; hinder recordkeeping; introduce uncertainty or delay; or otherwise inject operational risk into the derivatives market must be avoided to the extent possible to ensure customers, counterparties, and market participants have confidence in the integrity of our markets. The operational resilience framework proposal is the product of many months of in-depth research regarding operational resilience standards and guidance issued by the prudential regulators, the U.S. Securities and Exchange Commission, the National Futures Association, the International Organization of Securities Commissions, the Financial Stability Board, and other subject matter experts to avoid those operational disruptions and failures. The proposal also reflects staff’s own observations and lessons learned from its own oversight activities. The proposal is a holistic, principles-based approach that is calibrated with certain minimum requirements. Specifically, the proposed rule would require covered entities to establish, document, implement, and maintain an ORF reasonably designed to identify, monitor, manage, and assess risks relating to three key risk areas: (1) information and technology security, (2) third-party relationships, and (3) emergencies and other significant disruptions. The ORF would also include requirements related to governance, training, testing, and recordkeeping. PO 00000 Frm 00058 Fmt 4701 Sfmt 4702 The proposal would require covered entities to establish risk appetite and risk tolerance limits and would allow these registrants to rely on an information and technology security program, third-party relationship program, or business continuity and disaster recovery plan in which the covered entity participates with one or more affiliates and that is managed and approved at the enterprise level. Testing would need to be risk-based and include, at a minimum, daily or continuous vulnerability assessment and annual penetration testing, among others. The proposed rule would also require certain notifications to the Commission and customers or counterparties. The Commission is also proposing non-binding guidance that FCMs and SDs could consider to identify factors, actions, and strategies as they design their third-party relationship programs. The Commission recognizes that covered entities subject to this proposal include many different business models. As a result, the proposal is tailored to accommodate firms that vary in size and complexity, including corporate structures in which operational resilience frameworks may be managed at an enterprise level and have governance arrangements with different reporting line structures. In the same vein, the proposed ORF standard would require covered entities to implement an ORF that is appropriate and proportionate to the nature, size, scope, complexity, and risk profile of the firm’s business as an FCM or SD, following generally accepted standards and best practices. I look forward to reading the public’s comments on how the proposed operational resilience framework requirements and guidance can strengthen the operational resilience of FCMs, SDs, and MSPs as well as help protect their respective customers and counterparties in the derivatives markets. The 75-day comment period will begin upon the Commission’s publication of the release on its website. I thank staff in the Market Participants Division, Office of the General Counsel, and the Office of the Chief Economist for all of their work on the proposal. Appendix 3—Statement of Commissioner Kristin N. Johnson Cyberattacks are an ever-increasing threat. The rising cost, frequency, and severity of cyber threats represent one of the most critical issues facing city, state, and federal government authorities, businesses in each sector of our economy, educational and philanthropic institutions, and significant energy and transportation infrastructure, and national security resources. Less than a month before the White House released its National Cybersecurity Strategy in March of this year, international media headlines reported a ransomware attack that demonstrated that ‘‘big financial firms’’ are among the most attractive targets of cyber threats.1 Even for firms that have successfully 1 James Rundle, Wall Street Journal, Cyberattack on ION Derivatives Unit Had Ripple Effects on Financial Markets (Feb. 10, 2023), https:// www.wsj.com/articles/cyberattack-on-ion- E:\FR\FM\24JAP2.SGM 24JAP2 ddrumheller on DSK120RN23PROD with PROPOSALS2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules developed business continuity plans to identify, assess, or mitigate cyber threats, the networked or interconnected systems that comprise our operational market infrastructure may still render sophisticated, well-resourced firms vulnerable to the knockon effects of cyberattacks leveled against critical third-party service providers. The ransomware attack, carried out on a critical third-party service provider, ION Cleared Derivatives,2 disrupted trade settlement and reconciliation in derivatives markets. ION provides trading, clearing, analytics, treasury, and risk management services for capital markets and futures and derivatives markets. A significant number of market participants, including a notable number of futures commission merchants (FCMs), rely on ION for back-office trade processing and settlement of exchange-traded derivatives. The cyber-incident that disrupted ION’s operations caused a ripple effect across markets, halting deal matching, requiring affected parties to rely on manual (old school) trade processing, and causing delays in reconciliation and information sharing and reporting. the public understand the dynamics of the futures and options on futures markets.6 The COT report is a reflection of the effectiveness of the Commission’s surveillance of markets; it increases transparency and aids in price discovery. Thus, indirectly, the ION incident disrupted regulatory functions even though the cyberattack was not directed at the Commission nor any of the Commission’s registrants. As a consequence, it is imperative to begin to examine the scope of our regulations governing cyber-system safeguards not only for registered market participants, but for mission-critical third-party service providers. There is increasing reliance on third parties for the provision of important services, particularly, for example, services that facilitate digital connectivity and cloudbased services. While outsourcing may allow companies to rely on outside expertise, reduce operating costs, and enhance operational infrastructure necessary for executing business activities, reliance, may, in some instances, create vulnerability and risks that must be identified, managed, and mitigated. MRAC Leads on Cyber Reform Discussions I sponsor the Market Risk Advisory Committee (MRAC). On March 8, 2023, the MRAC held a first-of-its-kind convening focused on the interconnectedness of our markets and the potential for interconnectedness and correlation to amplify contagion in the event of successful cyberattacks against critical infrastructure resources.3 At the March MRAC meeting, Futures Industry Association (FIA) President Walt Lukken announced the creation of a Cyber Risk Taskforce, charged with ‘‘recommend[ing] ways to improve the ability of the exchange-traded and cleared derivatives industry to withstand the disruptive impacts of a cyberattack.’’ 4 The After Action Report issued by the FIA at the conclusion of the Taskforce’s work outlines the challenges that both markets and regulators faced as a result of the ION cyberincident. Trade reconciliation for affected firms continued to lag. For weeks following the ION cyberattack, the Commission continued to work to consistently publish the Commitments of Traders (COT) report on a timely basis because ‘‘reporting firms continu[ed] to experience . . . issues submitting timely and accurate data to the CFTC.’’ 5 The COT report is designed to help Operational Resilience Proposed Rulemaking derivatives-unit-had-ripple-effects-on-financialmarkets-11675979210. 2 See Press Release, ION Markets, Cleared Derivatives Cyber Event (Jan. 31, 2023), https:// iongroup.com/press-release/markets/clearedderivatives-cyber-event/. 3 Kristin N. Johnson, Commissioner, CFTC, Opening Statement Before the Market Risk Advisory Committee Meeting (Mar. 8, 2023), https://www.cftc.gov/PressRoom/Speeches Testimony/johnsonstatement030823. 4 Futures Industry Association, FIA Taskforce on Cyber Risk, After Action Report and Findings, at 3 (Sept. 28, 2023), https://www.fia.org/sites/default/ files/2023-09/FIA_ Taskforce%20on%20Cyber%20Risk_ Recommendations_SEPT2023_Final2.pdf. 5 Press Release No. 8662–23, CFTC, CFTC Announces Postponement of Commitments of VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 Today, the Market Participants Division (MPD) has introduced a robust and comprehensive proposed rulemaking that addresses: business continuity and disaster planning, cybersecurity, and assessment of the risk posed by reliance on third parties. I want to commend MPD, in particular Pamela Geraghty, Elise Bruntel, Fern Simmons, and Amanda Olear. The Commission has the authority to direct swap entities (swap dealers and major swap participants) to establish this operational resilience framework under Section 4s(j)(2) and (7) of the Commodity Exchange Act (CEA), which require swap entities to establish risk management systems over their day-to-day business and their operational risk.7 Likewise, the Commission may require operational resilience framework of FCMs (collectively with swap entities, ‘‘covered entities’’) under Section 8a(5) of the CEA,8 which authorizes the Commission to promulgate regulations sufficient to accomplish the purposes of the CEA, including, for example, the need to maintain records of the operational risk of affiliates,9 and to establish safeguards to protect the confidentiality of nonpublic personal information.10 The proposed rulemaking sets out three major pillars of its operational resilience framework: (1) information and technology security; (2) a third-party relationship program to manage risks presented by mission-critical third-party service providers; and (3) a business continuity and disaster recovery plan.11 Layered on top of the of the three pillars are corporate governance reforms that will dictate how each covered entity will incorporate the components of the plan into existing organizational structures. Each of the components of the operational resilience framework must be reviewed by senior leadership.12 Covered entities must also establish a risk appetite—the level of risk acceptable on an ongoing basis—and risk tolerance limits—the level of excess risk the entity is willing to accept should a particular risk materialize 13—and the entities will be required to escalate incidents that exceed their risk tolerance limit.14 The rule also allows for flexibility for entities that function as a division or affiliate of a larger organization; such entities will be allowed to operate under the umbrella company’s operational resilience plan so long as that plan meets the rule’s requirements and considers the covered entity’s particular risks.15 The information and technology security program requires the covered entities to comprehensively assess, on at least an annual basis, the types of threats the entity faces, the entity’s internal and external vulnerabilities, the likely impact of those threats or the exploitation of those vulnerabilities, and appropriate priorities for addressing those risks.16 With that background, covered entities must then implement controls reasonably designed to prevent, detect, and mitigate the identified risks, threats, and vulnerabilities.17 The program then requires the covered entities to develop a written incident response plan, reasonably designed to detect incidents where risks to information and technology are realized, and then provide for how the entity will mitigate the impact of and recover from such an incident.18 The third-party relationship plan requires covered entities to understand the risks posed by all third-party service providers at each stage of the relationship: pre-selection, diligence, contract negotiation, ongoing monitoring, and termination.19 The proposed rule then imposes a heightened level of required diligence and monitoring for ‘‘critical’’ third parties, defined as those parties for whom disruption of performance on their service contract would either ‘‘significantly disrupt’’ the covered entity’s business operations, or ‘‘significantly and adversely impact’’ the entity’s counterparties or customers.20 Covered entities will also have to maintain an inventory of their critical and non-critical third-party service providers.21 Finally, regardless of any 11 Proposed §§ 1.13(b)(2), 23.603(b)(2). §§ 1.13(c)(1), 23.603(c)(1). 13 Proposed §§ 1.13(c)(1), 23.603(c)(2). 14 Proposed §§ 1.13(c)(3), 23.603(c)(3). 15 Proposed §§ 1.13(c)(4), 23.603(c)(4). 16 Proposed §§ 1.13(d)(1), 23.603(d)(1). 17 Proposed §§ 1.13(d)(2), 23.603(d)(2). 18 Proposed §§ 1.13(d)(3), 23.603(d)(3). 19 Proposed §§ 1.13(e)(1), 23.603(e)(1). 20 Proposed §§ 1.13(e)(2), 23.603(e)(2). 21 Proposed §§ 1.13(e)(3), 23.603(e)(3). 12 Proposed Traders Report (Feb. 16, 2023), https:// www.cftc.gov/PressRoom/PressReleases/8662-23. 6 CFTC, Commitments of Traders Reports Descriptions, https://www.cftc.gov/MarketReports/ CommitmentsofTraders/index.htm. 7 7 U.S.C. 6s(j)(2), (7). 8 7 U.S.C. 12a(5). 9 7 U.S.C. 6f. 10 7 U.S.C. 7b–2; 15 U.S.C. 6801. PO 00000 Frm 00059 Fmt 4701 Sfmt 4702 4763 E:\FR\FM\24JAP2.SGM 24JAP2 4764 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules decision to rely on a third-party service provider, each covered entity remains responsible for meeting its obligations under the CEA and Commission regulations.22 Each entity’s business continuity and disaster recovery plan (BCDR plan) must ‘‘outline[ ] the procedures to be followed in the event of an emergency or other disruption of its normal business activities.’’ 23 The goal of a BCDR plan will be to enable covered entities to continue or resume business operations with minimal disruption to customers, counterparties, or the markets, and recover any affected data or information.24 At minimum, the BCDR plan must define backup plans for covered information and data; identify essential technology, facilities, infrastructure, and personnel; identify potential disruptions to critical third-party service providers; and identify supervisory personnel responsible for carrying out the plan in the event of an emergency.25 Covered entities must also maintain the plan at one or more off-site locations.26 To support the pillars of the operational resilience framework, the proposed rule also lays out training,27 review, and testing requirements to ensure the framework evolves with newly generated risks. Covered entities must review their framework annually,28 and engage in regular independent and documented testing, including penetration testing, vulnerability assessments, and testing of the incident response and BCDR plans.29 Results of that testing must be reported to the entity’s chief compliance officer and other relevant senior personnel.30 Finally, the proposed rule lays out the instances in which the Commission must be notified of incidents and of activation of the BCDR plan.31 This proposed rulemaking is both expansive and thoroughly considered. It galvanizes much of the preexisting guidance on these subjects, recognizing that the vast majority of our market participants already have programs in place to address these risks and often already are subject to other regulators’ rules and obligations, both domestically and internationally. The rule also recognizes the vast range in the size of the operations of our registered market participants—from some of the world’s largest financial institutions acting as swap dealers to small, independent futures commissions merchants—and consequently builds flexibility into the proposed rule to allow businesses to tailor their operational resilience frameworks to the realities of their business needs. ddrumheller on DSK120RN23PROD with PROPOSALS2 The Need for Operational Resilience for Other Commission Registrants This rule is necessarily limited in scope to FCMs and the swap entities overseen by 22 Id. 23 See 17 CFR 23.603(a). §§ 1.13(f)(1)(i)–(ii), 23.603(f)(1)(i)–(ii). 25 Proposed §§ 1.13(f)(2), 23.603(f)(2). 26 Proposed §§ 1.13(f)(3), 23.603(f)(3). 27 Proposed §§ 1.13(g), 23.603(g). 28 Proposed §§ 1.13(h)(1), 23.603(h)(1). 29 Proposed §§ 1.13(h)(2)–(3), 23.603(h)(2)–(3). 30 Proposed §§ 1.13(h)(5), 23.603(h)(5). 31 Proposed §§ 1.13(i)–(j), 23.603(i)–(j). 24 Proposed VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 MPD. The risks that this rule intends to mitigate, however, are not similarly siloed. Designated Contract Markets (DCM), Swap Execution Facilities (SEF), and Swap Data Repositories (SDR), overseen by the Division of Market Oversight, and Derivative Clearing Organizations (DCO), overseen by the Division of Clearing and Risk, similarly rely on mission-critical third-party service providers, similarly are targeted by cyberattacks, and similarly risk business disruption caused by unforeseen disaster scenarios. Rulemakings completed in 2016 created system safeguard testing requirements for each of these entities, currently codified in Parts 37, 38, 39, and 49 of the CFR.32 These rules include obligations for business continuity and disaster recovery and cybersecurity. Since 2016, however, the core issues surrounding the concept of operational resilience have shifted, most importantly around the ideas of mission-critical third parties. DCOs are increasingly contracting with third parties to manage and conduct aspects of their regulatory obligations, and just like with the covered entities subject to the rule at issue today, the onboarding of these new third parties also onboards new risks. The proposed rulemaking today considers the system safeguards provisions already on the books; 33 the Commission now needs to continue to press forward by considering this proposed rule for future parallel regulations, for DCOs in particular. The pandemic underscored the importance of business operational resilience, namely the ability of our registrants to react to and withstand unforeseen disasters. The FIA conducted its annual Disaster Recovery Exercise this fall with the stated goal of probing participants’ ability to ‘‘conduct critical business functions’’ in the wake of a large-scale disaster.34 Last year’s exercise saw participation from 19 major U.S. and international futures exchanges and clearinghouses, who indicated that this type of probing helped them to: ‘‘Exercise their business continuance/disaster resilience plans[, i]dentify internal and external single points of failure . . . [, and t]ighten up and improve the documentation of their business continuity procedures.’’ 35 32 See Final Rule, System Safeguards Testing Requirements, 81 FR 64272 (Sept. 19, 2016) (covering DCMs, SEFs, and SDRs); Final Rule, System Safeguards Testing Requirements for Derivatives Clearing Organizations, 81 FR 64322, 64329 (Sept. 19, 2016) (‘‘System Safeguards for DCOs’’) (describing the CFTC’s approach to system safeguards for DCOs as providing DCOs with ‘‘flexibility to design systems and testing procedures based on the best practices that are most appropriate for that DCO’s risks’’). 33 C.f., e.g., System Safeguards for DCOs, 81 FR 64322–23; 17 CFR 39.18(b)(3) (requiring DCOs to follow generally accepted standards and best practices with respect to the development, operation, reliability, security, and capacity of automated systems). 34 Presentation, Futures Industry Association, Business Continuity Disaster Recovery Test, at 4 (Aug. 23, 2023), https://www.fia.org/sites/default/ files/2023-10/FIA_DR_Test_Briefing_2023_1010_ 0.pptx. 35 Summary Report, Futures Industry Association, 2022 FIA Industry-Wide Disaster Recovery Test, at PO 00000 Frm 00060 Fmt 4701 Sfmt 4702 In 2021, the International Organization of Securities Commissions (IOSCO) initiated a consultation examining business continuity planning.36 IOSCO’s initial recommendations to member jurisdictions stated that all regulators should require firms to have in place ‘‘mechanisms to help ensure the resiliency, reliability and integrity (including security) of critical systems’’ including an appropriate ‘‘Business Continuity Plan.’’ 37 Every industry advisory board and oversight group to have studied cybersecurity has reached the same conclusion: risks to financial institutions from cyberattacks continue to grow. The Financial Stability Oversight Council noted in its 2022 annual report that from 2015 to 2020 the finance and insurance industries were subject to the most cyberattacks of any industry, and that the current global geopolitical climate has only increased the need for vigilance against cyber threats.38 In April 2020, the Financial Stability Board (FSB) issued a guide on cyber incident response that explained that ‘‘[a] significant cyber incident, if not properly contained, could seriously disrupt the financial system, including critical financial infrastructure, leading to broader financial stability implications.’’ 39 Similarly, in its 2019 Cyber Task Force report, IOSCO reiterated that cyber risk is one of the top threats to financial markets today given the ‘‘economic costs of such events can be immense . . . and could potentially undermine the integrity of global financial markets.’’ 40 IOSCO went further in their recommendations to the crypto industry earlier this year that ‘‘[r]egulators should require a [crypto-asset service provider] to put in place sufficient measures to address cyber and system resiliency.’’ 41 Next Steps for Derivatives Clearing Organizations At the MRAC meeting this past Monday, I announced a new workstream for the CCP Risk and Governance subcommittee that will focus on third-party risk for central clearing counterparties. Work will begin imminently, with the goal of presenting a proposal for 4 (Dec. 16, 2021), https://www.fia.org/sites/default/ files/2023-05/2022_DR_Test_Results_v2.pdf. 36 The Board of The International Organization of Securities Commissions, Thematic Review on Business Continuity Plans with respect to Trading Venues and Intermediaries (May 21, 2021), https:// www.iosco.org/library/pubdocs/pdf/ IOSCOPD675.pdf. 37 Id. at 1. 38 Financial Stability Oversight Council, 2002 Annual Report, at 37 (Dec. 16, 2022), https:// home.treasury.gov/system/files/261/ FSOC2022AnnualReport.pdf. 39 The Financial Stability Board, Effective Practices for Cyber Incident Response and Recovery, at 1 (Oct. 19, 2020), https://www.fsb.org/ wp-content/uploads/P191020-1.pdf. 40 The Board of The International Organization of Securities Commissions, Cyber Task Force: Final Report, at 3 (June 19, 2019), https://www.iosco.org/ library/pubdocs/pdf/IOSCOPD633.pdf. 41 The Board of The International Organization of Securities Commissions, Policy Recommendations for Crypto and Digital Asset Markets Consultation Report, at 39 (Nov. 16, 2023), https:// www.iosco.org/library/pubdocs/pdf/ IOSCOPD747.pdf. E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules vote by the parent committee in the first quarter of 2024. DCOs already retain responsibility for meeting regulatory requirements when entering into contractual outsourcing arrangements; 42 the question now is how DCOs should be required to assess and monitor the risks associated with doing so. Such a rule should in my view broadly track the rule for FCMs and swap entities proposed today, but deep consideration must be given to the ways in which the core DCO business differs. For example, DCOs already occupy a quasi-oversight role with respect to their clearing members; should a rule on third-party risk require DCOs to consider not only the risk posed by their own outsourcing contracts, but also require that DCOs consider their clearing members’ third-party risks, perhaps as an aspect of a DCO’s assessment of its counterparty risk? How else might the rule differ given the disparity between DCOs’ and FCMs’ relative frequency of interaction with end users? How might these rules coordinate with prudential regulators? A cyberattack on a third party that affected FCMs last winter was already disruptive enough, but given their status as SIFMUs some DCOs are quite literally systemically important entities. DCOs serve irreplaceable market functions, and we need update their operational resilience requirements to take into account this new conception of thirdparty risk. I look forward to the new MRAC workstream diving into this critical issue, and of course to what Division of Clearing and Risk staff might bring forward in an eventual proposed rulemaking. I once again commend the staff of MPD on their tremendous effort bringing forth this proposed rule, and look forward to hearing the thoughts of my fellow Commissioners. ddrumheller on DSK120RN23PROD with PROPOSALS2 Appendix 4—Statement of Commissioner Christy Goldsmith Romero Today we have before us our first proposed cyber and operational resilience rule that would apply to swap dealers (including banks) and futures commission merchants (FCMs). I’m excited to see the proposed rule up for vote today. I support the rule and thank the staff for their more than one year of hard work. I also thank all who engaged with us in an extensive collaborative effort. I also thank Chairman Behnam for entrusting me to help with this rule. This is a critical rule for the CFTC. FBI Director Christopher Wray recently said ‘‘that today’s cyber threats are more pervasive, hit a wider array of victims, and carry the potential for greater damage than ever before’’ and we face ‘‘some of our most complex, most severe, and most rapidly evolving threats.’’ 1 This rule proposes to help advance our markets from a mentality 42 17 CFR 39.18(d) (2022) (providing that registered entities such as DCOs retain responsibility for meeting relevant regulatory requirements when entering into contractual outsourcing arrangements). 1 See FBI, Director Wray’s Remarks at the Mandiant/mWISE 2023 Cybersecurity Conference (Sept. 18, 2023). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 of incident response to one of cyber resilience. This would further President Biden’s White House National Cybersecurity Strategy and Executive Order on Improving the Nation’s Cybersecurity.2 Cyber resilience is one of my top priorities, and a critical issue on which I am engaged. Over the last year, the CFTC staff and I have been engaged with the White House, other financial regulators, the Department of Commerce’s National Institute of Standards and Technology (NIST), the National Futures Association (NFA), swap dealers, FCMs, trade groups like the Futures Industry Association, the International Swaps and Derivatives Association, and the Securities Industry and Financial Markets Association, public interest groups, and third-party vendors. I also sponsor the Technology Advisory Committee that covers cybersecurity, and has a dedicated Cybersecurity subcommittee stacked with well-regarded cybersecurity experts.3 It takes this type of collective public and private engagement to thwart cybercrime, stay ahead of the continuously changing threat, and protect our nation’s critical infrastructure. Director Wray has spoken about how malicious cyber actors seeking to cause destruction are working to hit us somewhere that’s going to hurt—U.S. critical infrastructure sectors.4 According to the FBI, in 2021, there were ransomware incidents against 14 of the 16 U.S. critical infrastructure sectors.5 That includes an attack on Colonial Pipeline that led to gas shortages, and an attack on the world’s largest meat supplier JBS, that led to meat shortages and spiking prices.6 As Director Wray has said, ‘‘ransomware gangs love to go after things we can’t do without.’’ 7 Our nation cannot do without the commercial agriculture, energy, metals, and 2 The E.O.’s policy statement of policy is ‘‘Protecting our Nation from malicious cyber actors requires the Federal Government to partner with the private sector. The private sector must adapt to the continuously changing threat environment, ensure its products are built and operate securely, and partner with the Federal Government to foster a more secure cyberspace. In the end, the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is, and to the consequences we will incur if that trust is misplaced.’’ The White House, Executive Order on Improving the Nation’s Cybersecurity (May 12, 2021). 3 See CFTC, Commissioner Goldsmith Romero Announces Technology Advisory Committee Subcommittee Co-Chairs and Members (July 14, 2023); see also CFTC Technology Advisory Committee July 18 Meeting (July 18, 2023); CFTC Technology Advisory Committee March 22 Meeting (March 22, 2023). 4 See FBI, Director’s Remarks to the Boston Conference on Cyber Security 2022 (June 1, 2022). 5 See FBI, FBI Partnering with the Private Sector to Counter the Cyber Threat, Remarks at the Detroit Economic Club (Mar. 22, 2022). 6 See Id. (discussing how an attack led to Colonial shutting down pipeline operations and a panic among people in the Southeast that led to a run on gas and how an attack on JBS resulted in a complete stoppage of meat production, leading to spiking prices and less availability of meat). 7 See FBI, Director’s Remarks to the Boston Conference on Cyber Security 2022 (June 1, 2022). PO 00000 Frm 00061 Fmt 4701 Sfmt 4702 4765 financial markets, on which derivatives markets are based. In June, I presented five key pillars of cyber resilience, pillars that are contained in the proposed rule: 8 1. A proportionate and appropriate approach; 2. Following generally accepted standards and best practices; 3. Elevating responsibility through governance; 4. Building resilience to third-party risk; and 5. Leveraging the important work already done in this space, including by prudential regulators and NFA. Taking a Proportionate and Appropriate Approach There is no one-size fits all approach. The proposed rule would require swap dealers and FCMs to ensure that their operational resilience programs are appropriate and proportionate to the nature and risk profile of their business. This follows the White House National Cybersecurity Strategy.9 Our swap dealers include Globally Systemically Important Banks (GSIBs). Additionally, some of our swap dealers and FCMs are involved in U.S. critical infrastructure such as in the energy or agricultural sectors, or in supply chains. FBI Director Wray testified before Congress this month that one of the most worrisome facets of state-sponsored adversaries is their focus on compromising U.S. critical infrastructure, especially during a crisis, and that there is often no bright line that separates where nation state activity ends and cybercriminal activity begins.10 He testified about the disruptive impact of a supply chain attack in the SolarWinds attack, conducted by the Russian Foreign Intelligence Service.11 This summer, Director Wray said that the FBI is seeing the effects of Russia’s invasion of Ukraine here at home, as the FBI has seen Russia conducting reconnaissance on the U.S. energy sector.12 Director Wray also has said that, ‘‘China operates on a scale Russia doesn’t come close to. They’ve got a bigger hacking program than all other major nations combined. They’ve stolen more American personal and corporate data than all nations combined.’’ 13 Director Wray has said that ‘‘the Chinese government has hacked more than a dozen U.S. oil and gas pipeline operators, not just stealing their 8 Commissioner Christy Goldsmith Romero, Advancing from Incident Response to Cyber Resilience, (June 20, 2023). 9 See The White House, National Cybersecurity Strategy (March 2023) (recommending that organizations ‘‘demonstrate a principles-based approach that is sufficiently nimble to adapt to meet the challenges of the ever-evolving technological threat landscape and to fit the unique business and risk profile of each individual covered entity.’’ 10 See FBI, Statement of Christopher A. Wray Director Federal Bureau of Investigation Before the Committee on the Judiciary United States Senate (Dec. 5, 2023). 11 See Id. 12 See FBI, Director Wray’s Remarks at the FBI Atlanta Cyber Threat Summit (July 26, 2023). 13 See FBI, Director’s Remarks to the Boston Conference on Cyber Security 2022 (June 1, 2022). E:\FR\FM\24JAP2.SGM 24JAP2 4766 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules information, but holding them, and all of us, at risk.’’ 14 Swap dealers and FCMs involved in critical infrastructure sectors will need to build resilience for these cyber threats. The proposal also recognizes that cyber resilience requires continuous attention. What is appropriate or proportionate may change with the changing threat vector. It may also change when a swap dealer or FCM enters a new line of business, onboards a new vendor, or takes other action that can carry cyber risk. Following Generally Accepted Standards and Practices The proposal, like the CFTC’s rules for exchanges and clearinghouses, would require swap dealers and FCMs to follow generally accepted standards and industry best practices, like NIST or ISO (for international companies). The NIST Cybersecurity Framework creates a clear set of cybersecurity expectations that are risk-and outcome-based rather than prescriptive, and adaptable to the size and types of businesses.15 These standards are regularly updated to reflect the evolving technology and threat landscape. The proposed rule also requires at least annual assessment, testing and updates to the operational resilience framework. ddrumheller on DSK120RN23PROD with PROPOSALS2 Elevating Responsibility Through Governance The vision of the Biden Administration’s National Cybersecurity Strategy is to rebalance the responsibility to defend cyberspace by shifting the burden for cybersecurity away from individuals and small businesses, and onto the organizations that are most capable and best positioned to reduce risks.16 This strategy gets away from vulnerability caused by one person in an organization clicking on the wrong thing that leads to total disruption. The banks and commodity firms this rule would apply to are capable and best positioned to reduce cyber risk and cybercrime losses. Building cyber resilience requires elevating responsibility to those who make strategic decisions about the business. The stakes for businesses are high. There is potential legal risk, reputational risk, risk to national security, as well as financial risk. In 2022, the FBI reported $10.3 billion in cybercrime losses, shattering the record from the prior year.17 Tone at the top, including the Csuite’s active participation in cyber resilience programs as well as making cyber resilience a top priority, can determine whether an organization will successfully be cyber resilient and operationally resilient. The proposed rule would require operational resilience plans to be approved annually by a senior leader and for incidents 14 See FBI, FBI Partnering with the Private Sector to Counter the Cyber Threat, Remarks at the Detroit Economic Club (Mar. 22, 2022). 15 See Presentation of Kevin Stine, Chief of the Applied Security Division at NIST Information Technology Laboratory, ‘‘Managing Cybersecurity Risks,’’ CFTC Technology Advisory Committee Meeting (March 22, 2023). 16 See The White House, National Cybersecurity Strategy (March 2023). 17 FBI, Internet Crime Report 2022 (March 22, 2023). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 to be escalated promptly. It also would require senior leaders to set and approve the firm’s risk appetite and risk tolerance limit. Leaders should make strategic decisions about the risk they are willing to take on, as well as the metrics they will monitor. I am interested in hearing if the proposal’s definitions of these terms set a clear expectation and align with generally accepted standards. Building Resilience to Third-Party Risk Swap dealers and FCMs routinely rely upon third party (as well as fourth party) service providers to access new technologies and expertise, and for efficiencies in business functions. The rule requires building resilience to third party risk, an issue brought sharply into focus with this year’s cyberattack on third-party vendor ION Markets. Because third parties create points of entry that need to be secured from cyber criminals, the banking regulators released updated interagency guidance on third party risk management that would apply to many of the swap dealers subject to the proposed rule.18 The staff and I met with the Federal Reserve, Federal Deposit Insurance Corporation, and the Office of the Comptroller of the Currency about their guidance and their efforts to promote cyber resilience. Like that interagency guidance, the proposed rule includes an inventory of all third-party service providers, assessments of risk throughout the lifecycle of the third-party relationship, the identification of critical third-parties, and subjects those critical third parties to heightened due diligence and monitoring. The proposed definition of who is a critical third-party service provider takes a flexible approach, asking entities to consider the impact of a disruption.19 At his TAC presentation, Todd Conklin, Deputy Assistant Secretary of Treasury’s Office of Cybersecurity and Critical Infrastructure Protection (OCCIP) and TAC member discussed how ION Markets received less scrutiny because it was not treated as a critical third-party vendor by most firms.20 I look forward to comment. The CFTC also proposes separate guidance on managing third-party risks. I am interested 18 Board of Governors of the Federal Reserve System, Federal Deposit Insurance Corporation, and Office of the Comptroller of the Currency, Interagency Guidance on Third Party Relationships: Risk Management (Jun. 6, 2023). 19 I heard from many banks and brokers that identifying who is a critical third-party service provider is an issue they regularly grapple with, and that it often comes down to specific facts and circumstances, and not just the products and service they provide. 20 See Presentation of Todd Conklin, Deputy Assistant Secretary of Treasury’s Office of Cybersecurity and Critical Infrastructure Protection (OCCIP), ‘‘The Cyber Threat Landscape for Financial Markets: Lessons Learned from ION Markets, Cloud Use in Financial Services, and Beyond,’’ CFTC Technology Advisory Committee Meeting (March 22, 2023) (‘‘many institutions didn’t even classify [ION Markets] necessarily as a ‘critical’ third-party vendor. So many firms who onboarded ION didn’t use the highest-level scrutiny that they use for their most critical third-party vendors.’’). PO 00000 Frm 00062 Fmt 4701 Sfmt 4702 in commenters’ views on this guidance, and whether we have it right for harmonization. Leveraging the Important Work of Others, Including Prudential Regulators and the NFA The White House’s 2023 Cybersecurity Strategy recommends organizations ‘‘harmonize where sensible and appropriate to achieve better outcomes.’’ 21 The proposal recognizes that many of our regulated entities are part of a larger enterprise, with cyber and operational resilience programs managed at the enterprise level, and can use those programs under this rule. I am interested in commenters’ views on whether we have achieved appropriate harmonization or whether we need greater harmonization with bank regulators’ rules and guidance and NFA guidance.22 Stronger Together We are stronger together. The CFTC is part of coordinated government efforts to learn about and disseminate information about emerging cyber threats. We want to work with our swap dealers and FCMs to help strengthen their operational resilience, especially prior to any disruptive event. Should a disruptive event occur, resilience requires rapid collaboration among the CFTC and all those who are potentially affected to contain any potential damage and to keep critical market functions running. The proposed rule includes specific requirements for notifying the CFTC of an incident as soon as possible, but no later than 24 hours after detection. I support immediate notification to the CFTC because if we know, we can work with regulated entities and markets to assess and minimize damage, trigger appropriate regulatory and law enforcement action, help in recovery, and protect customers. I note that this time frame and reporting standards differs from other regulators, and look forward to comment. A two-way flow of information can play a significant role in the ability to build resilience, which means the ability to recover quickly after an attack. According to Deputy Assistant Secretary Conklin, collaboration between the government and industry helped mitigate the impact of the ION Markets attack.23 The proposal would also require notification to customers and counterparties as soon as possible of attacks that affect them. Early notice helps minimize the impact of an 21 See The White House, National Cybersecurity Strategy, (March 2023). 22 These requirements and guidance include the prudential regulator’s Sound Practices to Strengthen Operational Resilience paper, the Interagency Guidelines Establishing Standards for Safeguard Customer Information, and the recently released Interagency Guidance on Third-Party Relationships: Risk Management, as well as NFA guidance on information security, third-party service provider risk management, and notification of regulators and business continuity and disaster recovery. 23 See Presentation of Todd Conklin, Deputy Assistant Secretary of Treasury’s Office of Cybersecurity and Critical Infrastructure Protection (OCCIP), ‘‘The Cyber Threat Landscape for Financial Markets: Lessons Learned from ION Markets, Cloud Use in Financial Services, and Beyond,’’ CFTC Technology Advisory Committee Meeting (Mar. 22, 2023). E:\FR\FM\24JAP2.SGM 24JAP2 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules attack by allowing them to secure their personal data, monitor affected accounts, and make alternative arrangements for accessing critical funds or markets. If we can all work together, we can harden our defenses, thwart cyber criminals, and protect critical U.S. infrastructure and national security. Together, we can build a safer and more resilient cyberspace. Appendix 5—Statement of Commissioner Caroline D. Pham ddrumheller on DSK120RN23PROD with PROPOSALS2 I support the Notice of Proposed Rulemaking on Operational Resilience Framework for Futures Commission Merchants, Swap Dealers, and Major Swap Participants (Operational Resilience Proposal) 1 because I believe this approach is largely consistent with international standards for operational resilience, as well as U.S. prudential regulations and non-U.S. regulations, which have been implemented for several years now. I thank the staff of the Market Participants Division (MPD), especially Pamela Geraghty, Elise Bruntel, and Amanda Olear, as well as Chairman Behnam and Commissioner Goldsmith Romero, for working with me over the past year to address my concerns. Background My discussions with MPD staff, formerly the Division of Swap Dealer and Intermediary Oversight (DSIO), in fact date back to 2016 when I was in the private sector. MPD staff have been considering many of the elements of an operational resilience framework for years, including operational risk and cybersecurity risk. I appreciate the staff’s focus on all of these important issues that contribute to ensuring that our registrants have robust risk management and compliance programs, and that the CFTC is doing our job to uphold financial stability and protect against systemic risk. I would like to mention my background and experience, as well as familiarity, with the subject areas covered by the Operational Resilience Proposal to provide context for my efforts to support the development of this Proposal and address my concerns that the CFTC’s approach should not be overly prescriptive and generally takes a principlesbased approach in recognition of the extensive years-long global implementation of operational resilience requirements by U.S. and non-U.S. regulators and banking organizations. In my previous roles at a global systemically important bank (GSIB), I have been involved with operational resilience since 2019, including the oversight and coordination of global regulatory advocacy with the Financial Stability Board (FSB) and regulatory authorities such as the U.S. prudential regulators,2 the Bank of England, and European Union (EU) authorities. I also 1 Because there are no registered major swap participants, as a practical matter, this statement will refer to swap dealers and futures commission merchants (FCMs). 2 U.S. prudential regulators refers to the Board of Governors of the Federal Reserve System (Fed), the Office of the Comptroller of the Currency (OCC), and the Federal Deposit Insurance Corporation (FDIC). VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 was on the enterprise-wide operational resilience program steering committee, and I have implemented enterprise-wide programs across a global financial institution across all regions and both institutional or wholesale and consumer businesses. Among the specific elements encompassed in the Operational Resilience Proposal, I have enhanced the swap dealer and futures commission merchant (FCM) risk management programs. I have drafted an enterprise-wide risk appetite statement. I have implemented the National Futures Association’s (NFA) update to its information systems security programs requirements, which addresses cybersecurity risk. I have participated in tabletop exercises, drills, and simulations of responses to cyber attacks. I was the lead from the Compliance department on the third-party risk management program for cross-asset activities or other programmatic aspects across the global markets business. I have enhanced the business continuity and disaster recovery (BCDR) swap dealer policies and procedures and integration with the enterprise-wide continuity of business program. I have delivered training for, respectively, 9,000 and 17,000 employees across nearly 100 countries and multiple languages. I have had a compliance monitoring team that reported directly to me. I have advised on the design and implementation of the enterprise-wide Volcker Rule independent testing program. I was part of global regulatory notification protocols for cybersecurity or other incidents. And also, of course, I have been subject to regulatory examinations on each one of these areas. This practical experience has informed my engagement on this significant rulemaking initiative. The CFTC’s Approach to Operational Resilience Must Be Consistent With International Standards and Prudential Regulations I am pleased that the CFTC is seeking an approach that is consistent with international standards and best practices for regulators in addressing operational resilience. I will reiterate my previous remarks on the many years of work by policymakers such as the FSB, the Basel Committee on Banking Supervision (BCBS), the International Organization of Securities Commissions (IOSCO), and other regulatory authorities around the world to implement laws, regulations, and standards for operational resilience. Operational resilience, as noted by U.S. prudential regulators in 2020, encompasses governance, operational risk management, business continuity management, third-party risk management, scenario analysis, secure and resilient information system management, surveillance and reporting, and cyber risk management. Regulated entities, including the vast majority of our swap dealers and FCMs that are part of banking organizations, have already implemented comprehensive enterprise-wide operational resilience programs.3 3 Opening Statement of Commissioner Caroline D. Pham before the Technology Advisory Committee, PO 00000 Frm 00063 Fmt 4701 Sfmt 4702 4767 Issuing this Proposal can be beneficial to initiate an open process to request information and stimulate dialogue with the public. That is why, although there has been some hesitation or trepidation around what the Commission might do since we are coming onto the tail end of operational resilience implementation globally, I do think it is important that we are taking this step today, because it is critical that the public has the opportunity to provide input on any amendment or expansion of our existing programmatic requirements that is informed by actual experience from risk management and compliance officers, other control functions, and practitioners who have implemented and complied with operational resilience requirements pursuant to other regulations. Further, as I have noted previously, because the CFTC’s rules are often only one part of a much broader risk governance framework for financial institutions, the Commission must ensure that it has the full picture before coming to conclusions to ensure that our rules not only address any potential regulatory gaps or changes in risk profiles, but also to avoid issuing rules that are conflicting, duplicative, or unworkable with other regulatory regimes.4 For example, when I last checked earlier this year, the CFTC currently has 106 provisionally registered swap dealers. Of these 106 entities, both U.S. and non-U.S., all but a handful are also registered with and supervised by another agency or authority, such as a prudential, functional, or market regulator. Most of these swap dealers are subject to three or more regulatory regimes.5 It is imperative that the Commission and the staff consider how our rules work in practice together with the rules of other regulators, whether foreign or domestic. This key point is easily apparent in looking at the CFTC’s substituted compliance regime for non-U.S. swap dealers, where the Commission has expressly found that nonU.S. swap dealers in certain jurisdictions are subject to comparable and comprehensive regulation, and therefore, our rules permit such non-U.S. swap dealers to, for example, substitute compliance with their home jurisdiction risk management regulations to satisfy our risk management program rules under CFTC Regulation 23.600.6 Specific Areas for Public Comment As a preliminary matter, regarding discussion of the CFTC’s approach to system safeguards requirements for designated contract markets (DCMs) and derivatives clearing organizations (DCOs) and its impact on the development of today’s Operational Resilience Proposal, I note that swap dealers U.S. Commodity Futures Trading Commission (Jul. 18, 2023), https://www.cftc.gov/PressRoom/ SpeechesTestimony/phamstatement071823. 4 Statement of Commissioner Caroline D. Pham on Risk Management Program for Swap Dealers and Futures Commission Merchants Advance Notice of Proposed Rulemaking, U.S. Commodity Futures Trading Commission (Jun. 1, 2023), https:// www.cftc.gov/PressRoom/SpeechesTestimony/ phamstatement060123. 5 Id. 6 Id. E:\FR\FM\24JAP2.SGM 24JAP2 4768 Federal Register / Vol. 89, No. 16 / Wednesday, January 24, 2024 / Proposed Rules and FCMs are very different from exchanges and clearinghouses. The CFTC should not overly rely upon its approach to the system safeguards rulesets because it is akin to the difference between, for example, the Securities and Exchange Commission’s (SEC) Regulation SCI and the U.S. prudential regulators’ Heightened Standards for Risk Governance. I believe that the staff has tried to balance these considerations, and I welcome public comment on this approach. Definitions Words matter, and it is very important for the Commission to be precise in the words that we use for defined terms. I encourage all commenters to review the Proposal’s definitions and advise whether the definitions are appropriate or need to be revised. ddrumheller on DSK120RN23PROD with PROPOSALS2 Third-Party Relationship Program Guidance The Operational Resilience Proposal includes an appendix to the rule text with more prescriptive guidance on third-party relationships (third-party risk management). This is unusual because I do not believe that the CFTC has this level of prescriptiveness for any other category of risk, such as credit risk. I question whether this heralds a change to the CFTC’s approach to setting forth risk management requirements, and why would the Commission issue prescriptive guidance for third-party risk, but not other risks such as operational risk or market risk. I also question the approach of issuing Commission guidance, which would have to undergo notice-and-comment rulemaking and that could take a year or two to update, instead of issuing staff guidance, which could be updated more flexibly. I believe that any prescriptive guidance would be more appropriate as staff guidance, not Commission guidance, because staff guidance can be kept up-to-date more easily to address changes in best practices or to adapt to emerging risks. This is similar to how, for example, U.S. prudential regulators update their bank examiners handbook or circulars. I am interested in public comment on the CFTC’s requirements for third-party risk management, and whether it should be issued as Commission guidance or staff guidance. VerDate Sep<11>2014 18:32 Jan 23, 2024 Jkt 262001 Risk Appetite The Operational Resilience Proposal refers to risk appetite, which is a new concept to CFTC regulations. I am interested in whether commenters believe risk appetite is workable under the CFTC’s regulatory framework, which is focused on enforcement rather than ongoing supervision. Indeed, I have repeatedly noted that the CFTC lacks a swap dealer examination program. As a consequence, non-material operational or technical issues are the subject of enforcement actions, rather than addressed more appropriately through supervisory findings and exam reports like every other regulatory authority in the world. This makes the CFTC an outlier amongst U.S. and nonU.S. regulators, and therefore prudential concepts like risk appetite may not be workable. Risk Tolerance Limits Risk tolerance limits are a requirement under the CFTC’s risk management program (RMP) rules for swap dealers and FCMs. The Operational Resilience Proposal also requires risk tolerance limits, but sets forth a different definition and does not refer to the risk tolerance limits under the RMP rules. I am interested in public comment on whether the two differing requirements may cause confusion or can be implemented without any issues. Annual Attestation The Operational Resilience Proposal requires an annual attestation by the senior officer, an oversight body, or a senior-level official of a swap dealer or FCM that relies on a consolidated operational resilience program. Such attestation is to the effect that the consolidated program meets CFTC requirements and reflects the risk appetite and risk tolerance limits appropriate to the swap dealer or FCM. I encourage commenters to discuss the attestation requirement and suggest appropriate attestation language. Substituted Compliance Under the Operational Resilience Proposal, substituted compliance would be available for non-U.S. swap dealers subject to a comparability determination issued by the Commission. I appreciate the recognition in PO 00000 Frm 00064 Fmt 4701 Sfmt 9990 the Proposal of the importance of a homehost regulator approach to maintaining regulatory cohesion and addressing systemic risk and financial stability. I am interested in whether commenters believe the Proposal presents any cross-border issues in implementation. Conclusion I believe in continuous improvement for not only our market participants, but also for the Commission and its regulations, and that is why I would like to thank the MPD staff again for being proactive in thinking about these issues. I want to particularly recognize the leadership of Commissioner Goldsmith Romero in first highlighting these risks and exploring ways to address them through the work of the CFTC’s Technology Advisory Committee, which she sponsors. As I have stated before, the benefit of the CFTC’s principles-based regulatory framework is that it can quickly anticipate and adapt to changes in risk profiles or the operating environment. That is why I believe our rules must be broad and flexible enough to be forward-looking and evergreen, because it is simply not possible to prescribe every last requirement for the unknown future. Consistent with international standards, I have discussed the importance of utilizing existing risk governance frameworks and risk management disciplines to identify, measure, monitor, and control emerging risks and new technologies. Swap dealers and FCMs must be vigilant and address new and emerging risks through various risk stripes as appropriate, whether from changing market conditions, technological developments, geopolitical concerns, or any other event, and maintain operational resilience. With that, I welcome the input from the public comments to inform the Commission and the staff regarding the application of the Operational Resilience Proposal to swap dealers and FCMs, especially those entities that are part of a banking organization and have already implemented operational resilience requirements pursuant to U.S. or non-U.S. regulations. [FR Doc. 2023–28745 Filed 1–23–24; 8:45 am] BILLING CODE 6351–01–P E:\FR\FM\24JAP2.SGM 24JAP2

Agencies

[Federal Register Volume 89, Number 16 (Wednesday, January 24, 2024)]
[Proposed Rules]
[Pages 4706-4768]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-28745]



[[Page 4705]]

Vol. 89

Wednesday,

No. 16

January 24, 2024

Part III





 Commodity Futures Trading Commission





-----------------------------------------------------------------------





17 CFR Parts 1 and 23





Operational Resilience Framework for Futures Commission Merchants, Swap 
Dealers, and Major Swap Participants; Proposed Rule

Federal Register / Vol. 89 , No. 16 / Wednesday, January 24, 2024 / 
Proposed Rules

[[Page 4706]]


-----------------------------------------------------------------------

COMMODITY FUTURES TRADING COMMISSION

17 CFR Parts 1 and 23

RIN 3038-AF23


Operational Resilience Framework for Futures Commission 
Merchants, Swap Dealers, and Major Swap Participants

AGENCY: Commodity Futures Trading Commission.

ACTION: Notice of proposed rulemaking.

-----------------------------------------------------------------------

SUMMARY: The Commodity Futures Trading Commission (CFTC or Commission) 
is proposing to require that futures commission merchants, swap 
dealers, and major swap participants establish, document, implement, 
and maintain an Operational Resilience Framework reasonably designed to 
identify, monitor, manage, and assess risks relating to information and 
technology security, third-party relationships, and emergencies or 
other significant disruptions to normal business operations. The 
framework would include three components--an information and technology 
security program, a third-party relationship program, and a business 
continuity and disaster recovery plan--supported by broad requirements 
relating to governance, training, testing, and recordkeeping. The 
proposed rule would also require certain notifications to the 
Commission and customers or counterparties. The Commission is further 
proposing guidance relating to the management of risks stemming from 
third-party relationships.

DATES: Comments must be received on or before March 2, 2024.

ADDRESSES: You may submit comments, identified by RIN number 3038-AF23, 
by any of the following methods:
     CFTC Comments Portal: https://comments.cftc.gov. Select 
the ``Submit Comments'' link for this rulemaking and follow the 
instructions on the Public Comment Form.
     Mail: Christopher Kirkpatrick, Secretary of the 
Commission, Commodity Futures Trading Commission, Three Lafayette 
Centre, 1155 21st Street NW, Washington, DC 20581.
     Hand Delivery/Courier: Follow the same instructions as for 
Mail, above.
    Please submit your comments using only one of these methods. 
Submissions through the CFTC Comments Portal are encouraged.
    All comments must be submitted in English, or if not, accompanied 
by an English translation. Comments will be posted as received to 
https://comments.cftc.gov. You should submit only information that you 
wish to make available publicly. If you wish the Commission to consider 
information that you believe is exempt from disclosure under the 
Freedom of Information Act (FOIA), a petition for confidential 
treatment of the exempt information may be submitted according to the 
procedures established in Commission regulation 145.9.\1\
---------------------------------------------------------------------------

    \1\ 17 CFR 145.9. The Commission's regulations are found at 17 
CFR chapter I (2022).
---------------------------------------------------------------------------

    The Commission reserves the right, but shall have no obligation, to 
review, pre-screen, filter, redact, refuse or remove any or all of your 
submission from https://comments.cftc.gov that it may deem to be 
inappropriate for publication, such as obscene language. All 
submissions that have been redacted or removed that contain comments on 
the merits of the rulemaking will be retained in the public comment 
file and will be considered as required under the Administrative 
Procedure Act and other applicable laws, and may be accessible under 
the FOIA.

FOR FURTHER INFORMATION CONTACT: Amanda L. Olear, Director, at 202-418-
5283 or [email protected]; Pamela Geraghty, Deputy Director, at 202-418-
5634 or [email protected]; Fern Simmons, Associate Director, at 202-
418-5901 or [email protected]; Elise Bruntel, Special Counsel, at 202-
418-5577 or [email protected]; Market Participants Division, Commodity 
Futures Trading Commission, Three Lafayette Centre, 1151 21st Street 
NW, Washington, DC 20581.

SUPPLEMENTARY INFORMATION:

Table of Contents

I. Introduction
II. Proposal
    A. Generally--Proposed Paragraph (b)
    1. Purpose and Scope; Components--Proposed Paragraphs (b)(1) and 
(b)(2)
    2. Standard--Proposed Paragraph (b)(3)
    3. Request for Comment
    B. Governance--Proposed Paragraph (c)
    1. Approval of Components--Proposed Paragraph (c)(1)
    2. Risk Appetite and Risk Tolerance Limits--Proposed Paragraph 
(c)(2)
    3. Internal Escalations--Proposed Paragraph (c)(3)
    4. Consolidated Program or Plan--Proposed Paragraph (c)(4)
    5. Request for Comment
    C. Information and Technology Security Program--Proposed 
Paragraph (d)
    1. Risk Assessment--Proposed Paragraph (d)(1)
    2. Effective Controls--Proposed Paragraph (d)(2)
    3. Incident Response Plan--Proposed Paragraph (d)(3)
    4. Request for Comment
    D. Third-Party Relationship Program--Proposed Paragraph (e)
    1. Third-Party Relationship Lifecyle Stages--Proposed Paragraph 
(e)(1)
    2. Heightened Requirements for Critical Third-Party Service 
Providers--Proposed Paragraph (e)(2)
    3. Third-Party Service Provider Inventory--Proposed Paragraph 
(e)(3)
    4. Retention of Responsibility--Proposed Paragraph (e)(3)
    5. Application to Existing Third-Party Relationships
    6. Guidance on Third-Party Relationship Programs--Proposed 
Paragraph (e)(4); Appendix A to Part 1; Appendix A to Subpart J of 
Part 23
    7. Request for Comment
    E. Business Continuity and Disaster Recovery Plan--Proposed 
Paragraph (f)
    1. Definition of ``Business Continuity and Disaster Recovery 
Plan''
    2. Purpose--Proposed Paragraph (f)(1)
    3. Minimum Contents--Proposed Paragraph (f)(2)
    4. Accessibility--Proposed Paragraph (f)(3)
    5. Request for Comment
    F. Training and Distribution--Proposed Paragraph (g)
    G. Review and Testing--Proposed Paragraph (h)
    1. Reviews--Proposed Paragraph (h)(1)
    2. Testing--Proposed Paragraph (h)(2)
    3. Independence--Proposed Paragraph (h)(3)
    4. Documentation--Proposed Paragraph (h)(4)
    5. Internal Reporting--Proposed Paragraph (h)(5)
    6. Request for Comment
    H. Required Notifications--Proposed Paragraphs (i) and (j)
    1. Commission Notification of Incidents--Proposed Paragraph 
(i)(1)
    2. Commission Notification of BCDR Plan Activation--Proposed 
Paragraph (i)(2)
    3. Notifications to Customers or Counterparties--Proposed 
Paragraph (j)
    4. Request for Comment
    I. Amendment and Expansion of Other Provisions in Current 
Commission Regulation 23.603
    1. Emergency Contacts--Proposed Paragraph (k)
    2. Recordkeeping--Proposed Paragraph (l)
    3. Request for Comment
    J. Cross-Border Application for Swap Entities
    K. Implementation Period
III. Related Matters
    A. Regulatory Flexibility Act
    B. Paperwork Reduction Act
    C. Cost-Benefit Considerations
    D. Antitrust Laws

I. Introduction

    In 2012 and 2013, the Commission adopted rules requiring that 
futures commission merchants (FCMs),\2\ swap dealers (SDs) \3\ and 
major swap

[[Page 4707]]

participants (MSPs) \4\ establish risk management programs (RMPs).\5\ 
The rules require that SDs and MSPs (together, swap entities) and FCMs 
design their RMPs to monitor and manage the risks associated with their 
activities as swap entities or FCMs.\6\ Such risks include, but are not 
limited to, market, credit, liquidity, segregation, settlement, 
capital, and operational risk.\7\ Taken together, the RMP rules support 
a unified Commission objective: to require FCMs and swap entities 
(collectively, covered entities) to establish comprehensive risk 
management practices to mitigate systemic risk and promote customer 
protection.\8\ Recognizing that covered entities vary in size and 
complexity, the RMP rules identify certain elements that must, at a 
minimum, be included as part of the RMP, and require that certain risks 
must be taken into account; but the rules otherwise allow covered 
entities flexibility to design RMPs tailored to their circumstances and 
organizational structures.\9\
---------------------------------------------------------------------------

    \2\ See 7 U.S.C. 1a(28), 17 CFR 1.3 (defining ``futures 
commission merchant'').
    \3\ See 7 U.S.C. 1a(49), 17 CFR 1.3 (defining ``swap dealer'').
    \4\ See 7 U.S.C. 1a(33), 17 CFR 1.3 (defining ``major swap 
participant'').''
    \5\ See 17 CFR 1.11; 17 CFR 23.600; Enhancing Protections 
Afforded Customers and Customer Funds Held by Futures Commission 
Merchants and Derivatives Clearing Organizations, 78 FR 68506 (Nov. 
14, 2013) (Final FCM RMP Rule); Swap Dealer and Major Swap 
Participant Recordkeeping, Reporting, and Duties Rules; Futures 
Commission Merchant and Introducing Broker Conflicts of Interest 
Rules; and Chief Compliance Officer Rules for Swap Dealers, Major 
Swap Participants, and Futures Commission Merchants, 77 FR 20128 
(Apr. 3, 2012) (Final Swap Entities RMP Rule).
    \6\ See 17 CFR 1.11(c); 17 CFR 23.600(b). The RMP rule for FCMs 
does not apply to FCMs that do not accept or hold customer assets. 
See 17 CFR 1.11(a).
    \7\ See 17 CFR 1.11(e); 17 CFR 23.600(c).
    \8\ See Final Swap Entities RMP Rule, 77 FR at 20128; Final FCM 
RMP Rule, 78 FR 68506.
    \9\ See, e.g., Regulations Establishing and Governing the Duties 
of Swap Dealers and Major Swap Participants, 75 FR 71397, 71399 
(Nov. 23, 2010) (Proposed Swap Entities RMP Rule) (``The 
Commission's rule has been designed such that the specific elements 
of a risk management program will vary depending on the size and 
complexity of a [swap entity's] business operations.'').
---------------------------------------------------------------------------

    In the decade since the RMP rules were adopted, covered entities 
have encountered a wide variety of challenging conditions, including 
Brexit, the LIBOR transition, the COVID-19 pandemic stress period, the 
invasion of Ukraine, and general interest rate increases to tame 
inflation. Throughout this period, the Commission has, through its 
various oversight activities, observed that adherence to its RMP rules 
has supported covered entities' ability to withstand and recover from 
market challenges. The Commission therefore believes the RMP rules have 
helped establish a solid foundation of risk management among covered 
entities across various risk types, promoting a solid baseline standard 
of risk management that reduces overall systemic risk and enhances the 
Commission's customer protections.
    Nevertheless, the Commission believes it has identified 
opportunities to adapt its regulations to further promote sound risk 
management practices, reduce risk to the U.S. financial system, and 
protect commodity interest customers and counterparties.\10\ 
Specifically, as it relates to this proposal, the Commission believes 
that recent events, noted below, have highlighted the need for more 
particularized risk management requirements for covered entities 
designed to promote operational resilience. An outcome of the effective 
management of operational risk, ``operational resilience'' can be 
broadly defined as the ability of a firm to detect, resist, adapt to, 
respond to, and recover from operational disruptions.\11\ As the use of 
technology and associated third-party service providers have expanded 
within the financial sector, so too have the sources of operational 
risk facing covered entities, notably the potential for technological 
failures and cyberattacks.\12\ The Commission preliminarily believes 
that requirements for covered entities directed at promoting sound 
practices for managing these risks, as well as the risk of other 
potential physical disruptions to operations (e.g., power outages, 
natural disasters, pandemics), and for mitigating their potential 
impact would not only strengthen individual covered entity operational 
resilience but would reduce risk to the U.S. financial system as a 
whole and help protect derivatives customers and counterparties.\13\
---------------------------------------------------------------------------

    \10\ The Commission recently solicited public comment on an 
advanced notice of proposed rulemaking regarding potential 
amendments to the RMP requirements. See Risk Management Program 
Regulations for Swap Dealers, Major Swap Participants, and Futures 
Commission Merchants, 88 FR 45826 (Jul. 18, 2023) (RMP ANPRM). The 
comment file is available at https://comments.cftc.gov/PublicComments/CommentList.aspx?id=7412.
    \11\ See Proposed Swap Entities RMP Rule, 75 FR 71399, n.12 
(defining ``operational risk'' as including ``the risk of loss due 
to deficiencies in information systems, internal processes and 
staffing, or disruptions from external events that result in the 
reduction, deterioration, or breakdown in services or controls 
within the firm.''). Several sources have produced definitions of 
``operational resilience'' relevant to the financial sector. See 
e.g., Board of Governors of the Federal Reserve System (FRB), the 
Office of the Comptroller of the Currency (OCC), and the Federal 
Deposit Insurance Corporation (FDIC) (together, the prudential 
regulators), Sound Practices to Strengthen Operational Resilience at 
2 (Oct. 30, 2020) (Prudential Operational Resilience Paper) 
(defining ``operational resilience'' as the ``ability to deliver 
operations, including critical operations and core business lines, 
through a disruption from any hazard.''); Basel Committee on Banking 
Supervision (BCBS), Principles for Operational Resilience at 2, 3 
(Mar. 31, 2021) (BCBS Operational Resilience Principles) (``ability 
of a bank to deliver critical operations through disruption''); 
National Institute of Standards and Technology (NIST), Developing 
Cyber-Resilient Systems: A Systems Security Engineering Approach, SP 
800-160, Vol. 2, Rev. 1 at 76 (Dec. 2021) (``ability of systems to 
resist, absorb, and recover from or adapt to an adverse occurrence 
during operation that may cause harm, destruction, or loss of 
ability to perform mission-related functions.''). Core to each of 
these definitions is the notion of being able to continue to operate 
or perform despite a disruption.
    \12\ See Jason Harrell, Depository Trust & Clearing Corporation 
(DTCC) Managing Director, Head of External Engagements, 
``Operational and Technology Risk, Evolving Cybersecurity Risks in a 
Digitalized Era'' (Sept. 20, 2023) (``While partnerships with third 
parties offer rapid solutions for institutions to access the latest 
technologies and capabilities, they also increase the surface area 
for potential threat actors to gain access to an institution, 
causing cyber incidents that can impact the institution's operations 
and potentially create additional sector impacts.'').
    \13\ Responding to the RMP ANPRM, several commenters suggested 
the Commission consider addressing cybersecurity risk independently. 
See Americans for Financial Reform Education Fund (AFREF) and Public 
Citizen Letter at 6 (Sept. 18, 2023) (AFREF&PC Letter); Better 
Markets Letter Re: Risk Management Program Regulations for Swap 
Dealers, Major Swap Participants, and Futures Commission Merchants 
(RIN 3038-AE59) at 6-9 (Sept. 18, 2023) (Better Markets Letter); 
R.J. O'Brien & Associates LLC Letter at 5-6 (Sept. 18, 2023) (R.J. 
O'Brien Letter). AFRF and Public Citizen also recommended that the 
Commission consider extending its risk management regulations to 
encompass third-party service providers for information technology 
services. See AFREF&PC Letter at 2.
---------------------------------------------------------------------------

    The importance of operational resilience in the financial industry 
has come into stark relief in the past few years, particularly 
following the COVID-19 pandemic. At the start of the pandemic, 
Commission staff initiated near daily in-depth discussions with covered 
entities as those registrants navigated the myriad challenges presented 
during that time. Through a combination of sustained intensive effort 
on the part of the covered entities, and targeted no-action positions 
and exemptive relief provided by Commission staff, covered entities 
generally continued to operate without material disruption to their 
CFTC-regulated activities. As a result of this unprecedented 
experience, the Commission considered whether there were additional 
opportunities for it to act to gain ongoing transparency into, and to 
provide further regulatory support to, covered entities' operational 
resilience practices outside of an unfolding crisis. Commission staff 
then began the work of assessing the current operational resilience 
landscape for covered entities and determining how the Commission could 
act to further the holistic consideration and adoption of operational 
resilience practices amongst covered entities to ensure that certain

[[Page 4708]]

operational risks impacting their CFTC-regulated activities were being 
addressed on an ongoing basis.
    In particular, one area of increased focus is cyber risk. In 2022, 
cyber intelligence firms reported that the financial sector was among 
the most impacted by malicious emails, and was ultimately the most 
breached over the course of the year, with more than 566 successful 
attacks resulting in 254 million leaked records by early December 
2022.\14\ For the past two years, financial institutions responding to 
a DTCC risk survey have identified cyber risk as one of the top five 
risks to global financial markets, highlighting the increased 
sophistication of cyber criminals and the industry's growing digital 
footprint as key drivers.\15\ Given that remote access and cloud 
computing may become permanent features of the financial markets, the 
need for financial institutions to strengthen, adapt, and prioritize 
their information and technology risk practices would seem critical to 
preserving the continued integrity and stability of U.S. financial 
markets.\16\
---------------------------------------------------------------------------

    \14\ See Trellix, The Threat Report Fall 2022 at 11 (Nov. 2022) 
(noting that the financial services sector was the most targeted by 
malicious emails in Q3 of 2022); Flashpoint, Flashpoint Year In 
Review: 2022 Financial Threat Landscape (Dec. 20, 2022) (citing 
finance and insurance as the most-breached sector in 2022).
    \15\ See DTCC, Systemic Risk Barometer Survey: 2023 Risk 
Forecast (Dec. 7, 2022); DTCC, Systemic Risk Barometer Survey: 2022 
Risk Forecast (Dec. 13, 2021) (naming cyber risk as the top risk to 
the economy). See also Bank for International Settlements (BIS), 
Financial Stability Institute (FSI), FSI Insights on policy 
implementation No. 50, Banks' cyber security--a second generation of 
regulatory approaches (June 12, 2023) (FSI Cybersecurity Paper) 
(citing a 2023 report that most chief risk officers consider cyber 
risk the top threat to the banking industry and the most likely to 
result in a crisis or major operational disruption); Federal Bureau 
of Investigation, internet Crime Complaint Center Releases 2022 
Statistics (Mar. 22, 2023) (``Cyber-enabled crime has been around 
for many years, but methods used by perpetrators continue to 
increase in scope and sophistication emanating from around the 
world.'').
    \16\ See FRB, Cybersecurity and Financial System Resilience 
Report at 15 (Aug. 2023) (``The rising number of advanced persistent 
threats increases the potential for malicious cyber activity within 
the financial sector. Combined with the increased internet-based 
interconnectedness between financial institutions and the increasing 
dependence on third-party service providers, these threats may 
result in incidents that affect one or more participants in the 
financial services sector simultaneously and have potentially 
systemic consequences.'').
---------------------------------------------------------------------------

    Covered entities have experienced firsthand how breaches of 
information and technology security can reduce their ability to protect 
customers. In 2016, for instance, a hacker was able to access customer 
records held on an FCM's backup storage device after a default 
configuration of that device left it open to infiltration via the 
internet.\17\ In 2018, a successful phishing attack on an FCM 
compromised customer information and resulted in the FCM's acceptance 
of a fraudulent wire request that took $1 million in funds from a 
customer's account.\18\ Other regulators have also taken action against 
banks registered as swap entities where failed controls and third-party 
service providers intersected to result in the significant exposure of 
customer information.\19\ Even more recently, a ransomware attack on a 
U.S. broker-dealer in November 2023 was so significant, news reports 
indicate that the brokerage required a capital injection from a parent 
entity to settle $9 billion in trades, an amount many times larger than 
its net capital.\20\
---------------------------------------------------------------------------

    \17\ See In re AMP Global Clearing LLC, CFTC Docket No. 18-10 
(Feb. 12, 2018).
    \18\ See In re Phillip Capital Inc., CFTC Docket No. 19-22 
(Sept. 12, 2019).
    \19\ See, e.g., In re Capital One, N.A. and Capital One Bank 
(USA), N.A., AA-EC-20-49 (Aug. 5, 2020) (OCC finding that failed 
risk management practices resulted in exposure of 100 million 
individual credit card applications, including approximately 140,000 
social security numbers, by a former cloud servicer employee); In re 
Morgan Stanley Smith Barney LLC, File No. 3-17280 (Jun. 8, 2016) 
(Securities and Exchange Commission (SEC) finding that failed risk 
management controls allowed an employee to impermissibly access and 
transfer data regarding 730,000 accounts to a personal server, which 
was ultimately hacked by third parties).
    \20\ See Paritosh Bansal, Reuters, ``Inside Wall Street's 
scramble after ICBC hack'' (Nov. 13, 2023) (reporting that the firm 
asked clients to temporarily suspend business with them and clear 
trades elsewhere).
---------------------------------------------------------------------------

    Against the backdrop of that work, a recent and well-documented 
incident serves as an important cautionary tale about the potential 
systemic impact of an operational event at a third-party service 
provider. On January 30, 2023, a ransomware attack on ION Markets, a 
division of UK-based third-party service provider ION Group LLC (ION), 
resulted in a two-week disruption in mid-office activities at several 
FCMs. ION provides order management, execution, trading, and trade 
processing services for several FCMs, including about 20 percent of 
clearing members at the Chicago Mercantile Exchange (CME), but also 
provides software services to many other financial institutions, 
notably many systemically important banks.\21\ FCMs affected by the 
attack had to process trades manually, leading to delays in the timely 
and accurate reporting of trade data to the CFTC, and consequently a 
temporary lag in production of the Commission's weekly Commitments of 
Traders report.\22\ The incident was initially so concerning that Japan 
cut off all connectivity with ION.\23\ Within a couple days of the 
attack, however, regulators, including the CFTC, coordinated efforts to 
determine that the attack was limited to a small number of software 
applications relied on within the cleared derivatives space by about 
forty-two (42) institutions, with no significant impact to systemically 
important banks.\24\
---------------------------------------------------------------------------

    \21\ See Luke Clancy, Risk.net, ``One-fifth of CME clearing 
members hit by Ion hack'' (Mar. 9, 2023); see also Statement of Todd 
Conklin, Deputy Assistant Secretary, Department of the Treasury 
(Treasury), Office of Cybersecurity and Critical Infrastructure 
Protection (OCCIP), The Cyber Threat Landscape for Financial 
Markets: Lessons Learned from ION Markets, Cloud Use in Financial 
Services, and Beyond, CFTC Technology Advisory Committee Meeting 
Transcript at 160-166 (Mar. 22, 2023) (Conklin TAC Presentation) 
(describing the potential ``sprawling impact zone'' had the ION 
incident not been limited to its derivatives software services), 
available at https://www.cftc.gov/sites/default/files/2023/07/1688400024/tac_032223_transcript.pdf.
    \22\ CFTC, Statement on ION and the Impact to the Derivatives 
Markets (Feb. 2, 2023), available at https://www.cftc.gov/PressRoom/SpeechesTestimony/cftcstatement020223. The Commitment of Traders 
report is widely relied on by market participants for insight into 
positions held on exchange-traded futures and options.
    \23\ See Conklin TAC Presentation (Mar. 22, 2023).
    \24\ Id.
---------------------------------------------------------------------------

    During a March 8, 2023, meeting of the CFTC's Market Risk Advisory 
Committee (MRAC), panelists discussed how the collaborative work of the 
CFTC, industry, and self-regulatory organizations (including CME, the 
National Futures Association (NFA), and the Financial Industry 
Regulatory Authority (FINRA)) helped mitigate the impact of the ION 
incident, allowing affected firms to return to business as usual within 
a couple weeks.\25\ Nevertheless, panelists agreed that the incident 
highlighted the interconnectedness of the derivatives markets and the 
need for firms to continue to adapt safeguards to address the ever-
evolving threat landscape.\26\ As the ION incident demonstrates, a

[[Page 4709]]

disruptive cyber event can reach beyond particular financial 
institutions directly experiencing events to other institutions in the 
financial markets or to others doing business with an impacted 
financial institution, and could potentially impact financial 
stability.\27\
---------------------------------------------------------------------------

    \25\ See CFTC, The Market Risk Advisory Committee to Meet on 
March 8 (Mar. 8, 2023) (MRAC Meeting), available at https://www.cftc.gov/PressRoom/Events/opaeventmrac030823; see also Conklin 
TAC Presentation (discussing how Treasury implemented its cyber 
incident response playbook in the days following the ION incident to 
mitigate the potential for panic after news reports began 
circulating information that the incident was more significant than 
regulators had initially determined it was).
    \26\ See Statement of Walt Lukken, President and Chief Executive 
Officer, Futures Industry Association (FIA), MRAC Meeting Transcript 
at 41 (``While the number of clearing firms that use ION's suite of 
clearing products is limited, the interconnectedness of our markets 
made the outage impactful throughout the entirety of our 
marketplace.''); see also Statement of Tom W. Sexton, III, President 
and Chief Executive Officer, NFA, MRAC Meeting Transcript at 46 
(``[O]ur member firms have adopted robust safeguards already that 
need to be adapted in light of today's and tomorrow's ongoing 
challenges and threats.'').
    \27\ See FIA, FIA Taskforce on Cyber Risk, After Action Report 
and Findings at 3 (Sept. 2023) (FIA Taskforce Report) (``The [ION 
incident] demonstrated that an outage at a single service provider 
can have damaging effects across a wide range of firms and threaten 
the orderly functioning of markets. The attack also demonstrated in 
vivid detail the complexities of restoring normal service.'').
---------------------------------------------------------------------------

    In light of these and other events, the Commission believes that 
customer protection and the broader stability of the derivatives 
markets at large warrant more targeted CFTC requirements relating to 
the management of operational risk designed to promote operational 
resilience.\28\ Specifically, the Commission believes that the absence 
of CFTC-specific requirements for covered entities that explicitly 
address information and technology security, as well as third-party 
risk, could impede the Commission's ability to fulfill its regulatory 
oversight obligations with respect to covered entities and ultimately 
weaken its ability to address systemic risk, protect customer assets, 
and promote responsible innovation.\29\ The Commission further believes 
that enhanced CFTC oversight of covered entities with respect to 
operational resilience would help improve outcomes following 
operational disruptions by giving the Commission the ability to ensure 
that covered entities have actionable plans in place to address key 
operational risks.
---------------------------------------------------------------------------

    \28\ Existing CFTC requirements for covered entities relating to 
operational risk or information security are more general in nature 
or limited in application. See, e.g., 17 CFR 1.11(e)(3)(ii) 
(providing, with respect to operational risk, that FCMs have 
automated financial risk management controls reasonably designed to 
prevent the placing of erroneous orders); Enhancing Protections 
Afforded Customers and Customer Funds Held by Futures Commission 
Merchants and Derivatives Clearing Organizations, 77 FR 67866, 67906 
(Nov. 14, 2012) (describing Commission regulation 1.11(e)(3)(ii) as 
requiring an FCM's RMP to include automated financial risk 
management controls in order to reduce operational risk that could 
result from ``fat finger'' errors when submitting trades, or from 
technological ``glitches'' using automated trading); 17 CFR 
23.600(c)(4)(vi) (requiring swap entities to take into account, 
among other things, secure and reliable operating and information 
systems with adequate, scalable capacity, and independence from the 
business trading unit; safeguards to detect, identify, and promptly 
correct deficiencies in operating and information systems; and 
reconciliation of all data and information in operating and 
information systems); 17 CFR 162.21 and 17 CFR 160.30 (requiring 
covered entities to adopt written policies and procedures addressing 
administrative, technical, and physical safeguards with respect to 
the information of consumers).
    \29\ See 7 U.S.C. 5 (establishing among the purposes of the 
Commodity Exchange Act to deter disruptions to market integrity, to 
ensure the financial integrity of covered transactions and the 
avoidance of systemic risk, and to promote responsible innovation 
and fair competition among market participants).
---------------------------------------------------------------------------

II. Proposal

    Section 4s(j)(2) of the Commodity Exchange Act (CEA or Act) 
expressly requires swap entities to establish robust and professional 
risk management systems adequate for managing their day-to-day 
business.\30\ Section 4s(j)(7) further directs the Commission to 
prescribe rules governing the duties of swap entities, including the 
duty to establish risk management systems, which would include the 
management of operational risk.\31\ The Commission is authorized to 
promulgate operational risk management requirements for FCMs pursuant 
to section 8a(5) of the CEA, which authorizes the Commission to make 
and promulgate such rules and regulations as, in the judgment of the 
Commission, are reasonably necessary to effectuate any of the 
provisions of, or to accomplish any of the purposes of, the CEA.\32\ 
This general rulemaking authority may be used to prevent problems 
before they arise in the agency's blind spots,\33\ and may be exercised 
to regulate circumstances or parties beyond those explicated in a 
statute.\34\ Accordingly, the Commission has broad authority to 
promulgate regulations provided that such regulations are supported by 
a sufficient nexus to the CFTC's delegated authority. Specifically, 
Congress expressly empowered the Commission to prescribe certain 
requirements with respect to FCMs, namely, to require FCMs to register 
(sections 8a(1), 4d(a)(1), and 4f(a)(1) of the CEA \35\); to segregate 
customer funds (section 4d of the CEA \36\); to establish safeguards to 
minimize conflicts of interest (section 4d of the CEA \37\); to meet 
minimum financial requirements (section 4f of the CEA \38\); to manage 
and maintain records and reporting on the financial and operational 
risks of affiliates (section 4f of the CEA \39\); and to establish 
administrative, technical, and physical safeguards to protect the 
security and confidentiality of certain nonpublic personal information 
(section 5g of the CEA \40\), among other requirements.
---------------------------------------------------------------------------

    \30\ See 7 U.S.C. 6s(j)(2).
    \31\ See 7 U.S.C. 6s(j)(7).
    \32\ 7 U.S.C. 12a(5).
    \33\ Inv. Co. Inst. v. CFTC, 891 F. Supp. 2d 162, 193 (D.D.C. 
2012), as amended (Jan. 2, 2013) (citing Stilwell v. Office of 
Thrift Supervision, 569 F.3d 514, 519 (D.C. Cir. 2009)).
    \34\ Nat'l Ass'n of Mfrs. v. SEC, 748 F.3d 359, 366 (D.C. Cir. 
2014), overruled on other grounds by Am. Meat Inst. v. U.S. Dept. of 
Agric., 760 F.3d 18 (D.C. Cir. 2014) (en banc).
    \35\ 7 U.S.C. 12a(1); 7 U.S.C. 6d(a)(1); 7 U.S.C. 6f(a)(1).
    \36\ 7 U.S.C. 6d.
    \37\ Id.
    \38\ 7 U.S.C. 6f.
    \39\ Id.
    \40\ See 7 U.S.C. 7b-2; 15 U.S.C. 6801.
---------------------------------------------------------------------------

    The Commission believes that more particularized operational risk 
management requirements are reasonably necessary to help effectuate 
these statutory requirements for FCMs and to accomplish the purposes of 
the CEA. FCMs play an important role in the derivatives markets, 
serving as both the primary point of access to the cleared commodity 
interest markets for customers and the custodian of the funds used to 
maintain their positions. Given their position at the center of the 
derivatives market ecosystem, FCMs' operational resilience is essential 
to well-functioning derivatives markets and to ensuring that customers 
receive the protections provided by the CEA. However, as discussed 
above, operational risks, notably cyber and third-party risks, have 
become an increasing threat to financial institutions, including FCMs. 
These risks can cause major disruptions to FCMs' operations, and 
consequently impact the ability of FCMs to fulfill their obligations as 
Commission registrants. In particular, information security threats and 
operational disruptions can place an FCM's financial resources at risk; 
disrupt an FCM's ability to segregate and protect customer funds; 
impede accurate recordkeeping, including records related to customer 
funds; and cause a host of other issues for FCMs, which ultimately 
inure to the detriment of their customers and the derivatives markets. 
Accordingly, the Commission believes a comprehensive operational 
resilience regime is reasonably necessary to ensure that an FCM 
adequately addresses and mitigates risks that could adversely impact 
its ability to operate and fulfill its statutory obligations and duties 
as an FCM.
    As discussed in detail in subsequent sections of this release, the 
Commission is proposing to require that FCMs and swap entities 
establish an Operational Resilience Framework (ORF) that is reasonably 
designed to identify, monitor, manage, and assess risks relating to 
information and technology security, third-party relationships, and 
emergencies or other significant disruptions to normal business 
operations. At its core, the ORF would have three key components: an

[[Page 4710]]

information and technology security program, a third-party relationship 
program, and a business continuity and disaster recovery plan. The 
proposed ORF rule reflects a principles-based approach buttressed by 
certain minimum requirements specific to each of the component programs 
or plans, such as requiring an annual risk assessment and controls 
relating to information and technology security, and due diligence and 
monitoring requirements for third-party service providers. Proposed 
requirements relating to governance, training, testing, and 
recordkeeping would apply broadly and support the ORF as a whole. The 
proposed rule would further require covered entities to notify the 
Commission (and, in certain instances, customers or counterparties) of 
certain ORF-related events. Detailed guidance intended to assist 
covered entities in designing and implementing their third-party 
relationship program would be included in appendices to the rule.
    In developing the proposed rule, the Commission endeavored to 
incorporate general directives to federal agencies articulated in the 
White House's March 2023 National Cybersecurity Strategy: Leverage 
existing standards and guidance, harmonize where sensible and 
appropriate to achieve better outcomes, and demonstrate an approach 
that is sufficiently nimble to meet the challenges of the ever-evolving 
technological threat landscape and fit the unique business and risk 
profile of each covered entity.\41\ To that end, the proposal builds on 
the Commission's experience establishing system safeguard requirements 
for registered entities, as well as the approaches adopted by self-
regulatory organizations and other regulatory authorities.\42\ Notably, 
the proposal draws on approaches adopted by NFA, whose rules and 
interpretative notices relating to information systems security, third-
party risk, and business continuity and disaster recovery planning 
apply to covered entities by virtue of being NFA members, and 
prudential regulators, who also regulate many covered entities, and 
have recently issued interagency positions on operational resilience 
and third-party relationship management.\43\
---------------------------------------------------------------------------

    \41\ The White House, National Cybersecurity Strategy at 8-9 
(Mar. 2023) (National Cyber Strategy) (``Our strategic environment 
requires modern and nimble regulatory frameworks for cybersecurity 
tailored for each sector's risk profile, harmonized to reduce 
duplication, complementary to public-private collaboration, and 
cognizant of the cost of implementation.''). See also FIA Taskforce 
Report, supra note 27, at 9 (``[T]he Taskforce encourages regulators 
and legislators to take a principles-based approach to cyber risk 
and operational resilience. That approach may not be sufficient in 
all areas, but such a flexible approach is well suited to a threat 
landscape that is likely to continue evolving at a rapid rate.'').
    \42\ See 17 CFR 37.1400 and 17 CFR 37.1401 (system safeguard 
requirements for swap execution facilities (SEFs)); 17 CFR 38.1050 
and 17 CFR 38.1051 (designated contract markets (DCMs)); 17 CFR 
39.18 (derivatives clearing organizations (DCOs)); 17 CFR 49.24 
(swap data repositories (SDRs)). See also 17 CFR 1.3 (defining 
``registered entity'' to include DCMs, DCOs, SEFs, and SDRs). For a 
summary of international regulatory efforts related to operational 
resilience, see FIA Taskforce Report, supra note 27, at 7-8.
    \43\ See NFA Interpretive Notice 9070, NFA Compliance Rules 2-9, 
2-36 and 2-49: Information Systems Security (rev. Sept. 30, 2019) 
(NFA ISSP Notice); NFA Interpretive Notice 9079, NFA Compliance 
Rules 2-9 and 2-36: Members' Use of Third-Party Service Providers 
(NFA Third-Party Notice) (effective Sept. 30, 2021); NFA Rule 2-38: 
Business Continuity and Disaster Recovery Plan (rev. July 1, 2019); 
NFA Interpretive Notice 9052, NFA Compliance Rule 2-38: Business 
Continuity and Disaster Recovery Plan (NFA BCDR Notice) (April 7, 
2003); Prudential Operational Resilience Paper, supra note 11; 
Interagency Guidance on Third-Party Relationships: Risk Management, 
88 FR 37920 (Jun. 9, 2023) (Prudential Third-Party Guidance). See 
also Computer-Security Incident Notification Requirements for 
Banking Organizations and their Bank Service Providers, 86 FR 66424 
(Nov. 23, 2021); 12 CFR part 30, app. A (Interagency Guidelines 
Establishing Standards for Safety and Soundness), 12 CFR part 30, 
app. B (Interagency Guidelines Establishing Information Security 
Standards).
---------------------------------------------------------------------------

    The Commission also surveyed the work of international standard-
setting bodies, notably the BCBS Principles for Operational 
Resilience.\44\ The Commission also conferred with, and reviewed the 
standards published by the National Institute of Standards and 
Technology (NIST), a part of the U.S. Department of Commerce charged by 
Executive Order 13636 in 2013 with developing a framework to reduce 
cyber risks to critical infrastructure that incorporates voluntary 
consensus standards and industry best practices.\45\ Standards 
developed in response to this charge and reviewed by the Commission 
include the Framework for Improving Critical Infrastructure 
Cybersecurity and the Security and Privacy Controls for Information 
Systems and Organizations, among others.\46\ The Commission and other 
financial regulators have previously adapted NIST's standards in 
regulation and guidance related to operational resilience. The 
Commission's system safeguards requirements treat NIST's CSF as a 
source for well-established best practices for cybersecurity.\47\ In 
Appendix A of the Interagency Sound Resilience Paper, the prudential 
regulators presented ``a collection of sound practices for cyber risk 
management, aligned to NIST and augmented to emphasize governance and 
third-party risk management.'' \48\ The Commission also considered 
standards published by equivalent standard setting bodies like the 
International Standards Organization (ISO).\49\
---------------------------------------------------------------------------

    \44\ See BCBS Operational Resilience Principles, supra note 11. 
See also International Organization of Securities Commissions 
(IOSCO), Cyber Task Force: Final Report (2019) (identifying 
different but comparable core standards or frameworks, including 
both NIST and ISO standards); Financial Stability Board (FSB), Final 
report on Enhancing Third-Party Risk Management and Oversight--a 
toolkit for financial institutions and financial authorities (Dec. 
4, 2023) (FSB Third-Party Report). Materials related to the FSB's 
work on cyber resilience are available at https://www.fsb.org/work-of-the-fsb/financial-innovation-and-structural-change/cyber-resilience/.
    \45\ See The White House, Office of the Press Secretary, 
Executive Order--Improving Critical Infrastructure Cybersecurity, 
E.O. 13636 (Feb. 12, 2013).
    \46\ See NIST, Framework for Improving Critical Infrastructure 
Cybersecurity (Version 1.1) at 2 (Apr. 16, 2018) (NIST CSF); NIST, 
SP 800-53, Security and Privacy Controls for Information Systems and 
Organizations (Sept. 2020, rev. Dec. 10, 2020) (NIST SP 800-53). See 
also Cybersecurity & Infrastructure Security Agency (CISA), 
Financial Services Sector-Specific Plan--2015 at 16 (rev. Dec. 17, 
2020) (``While the [NIST cybersecurity framework] is designed to 
manage cybersecurity risks, its core functions of Identify, Protect, 
Detect, Respond, and Recover provide a model for considering 
physical risks as well. This methodology is increasingly central to 
the sector's thinking on security and resilience, and the concept 
aligns with existing [Federal Financial Institutions Examination 
Council (FFIEC)] guidance.'').
    \47\ System Safeguards Testing Requirements for Derivatives 
Clearing Organizations, 81 FR 64322, 64329 (Sept. 19, 2016).
    \48\ Board of Governors of the Federal Reserve System, the 
Office of the Comptroller of the Currency, and the Federal Deposit 
Insurance Corporation, Sound Practices to Strengthen Operational 
Resilience (Nov. 2, 2020), available at https://www.federalreserve.gov/supervisionreg/srletters/SR2024.html.
    \49\ See, e.g., ISO/IEC 27001:2022, Information security, 
cybersecurity and privacy protection: Information security controls 
(Oct. 2022) (ISO/IEC 27001:2022).
---------------------------------------------------------------------------

    Finally, in putting together the proposal, Commission staff engaged 
with staff at NFA and various federal agencies, including prudential 
regulators, and the SEC.\50\ Based on these efforts, the Commission 
preliminarily believes that, if adopted, the proposed rule would strike 
an

[[Page 4711]]

appropriate balance between supporting technological and market 
innovation and fair competition, ensuring covered entities devote the 
necessary thought, planning, and resources to their operational 
resilience so as to support the resilience of the U.S. derivatives 
markets and the financial sector as a whole.\51\
---------------------------------------------------------------------------

    \50\ In accordance with section 712(a) of the Dodd-Frank Act (15 
U.S.C. 8302), the Commission has consulted and coordinated, to the 
extent possible, with the SEC and the prudential regulators, 
including with the FRB, the OCC, and the FDIC, for purposes of 
assuring regulatory consistency and comparability. The Securities 
Exchange Act of 1934 and existing and proposed SEC regulations 
include requirements relating to risk management including 
cybersecurity, including requirements for SEC-regulated broker-
dealers and security-based swap dealers. See, e.g. Cybersecurity 
Risk Management Rule for Broker-Dealers, Clearing Agencies, Major 
Security-Based Swap Participants, the Municipal Securities 
Rulemaking Board, National Securities Associations, National 
Securities Exchanges, Security-Based Swap Data Repositories, 
Security-Based Swap Dealers, and Transfer Agents, 88 FR 20212, 
sections IV.C.1.b.i and IV.C.1.b.iii (Apr. 5, 2023).
    \51\ See 7 U.S.C. 5.
---------------------------------------------------------------------------

    The Commission is proposing to codify the ORF rule for swap 
entities in existing Commission regulation 23.603, which currently 
contains the Commission's business continuity and disaster recovery 
requirements for swap entities.\52\ As discussed in greater detail 
below, the Commission is proposing to retain the substance of the 
existing business continuity and disaster recovery requirements in 
current Commission regulation 23.603 as part of the ORF rule for swap 
entities, with certain modifications. Similar requirements would also 
be imposed on FCMs. The proposed ORF rule for FCMs would be codified in 
new Commission regulation 1.13. The proposed guidance on third-party 
relationships would be included in the appendices to parts 1 and 23 for 
FCMs and swap entities, respectively.
---------------------------------------------------------------------------

    \52\ 17 CFR 23.603.
---------------------------------------------------------------------------

    As proposed, the regulatory text of the ORF rule for swap entities 
is nearly identical in structure and substance to the ORF rule for 
FCMs. Accordingly, to promote readability, when referencing sections of 
the regulatory text, this notice generally refers to the relevant 
paragraph of the proposed regulations (i.e., ``proposed paragraph (b)'' 
would refer to paragraph (b) of both proposed Commission regulations 
1.13 and proposed Commission regulation 23.603).
    The Commission invites comment on all aspects of the proposed rule, 
as further detailed below.

A. Generally--Proposed Paragraph (b) 53
---------------------------------------------------------------------------

    \53\ Paragraph (a) of proposed Commission regulations 1.13 and 
23.603 provides definitions for terms used within the ORF rule. Each 
proposed definition is discussed in the context of the relevant 
substantive regulatory requirement throughout the remainder of this 
notice.
---------------------------------------------------------------------------

1. Purpose and Scope; Components--Proposed Paragraphs (b)(1) and (b)(2)
    As previously mentioned, the proposed rule would require covered 
entities to establish, document, implement, and maintain an Operational 
Resilience Framework, or ORF.\54\ The ORF would need to be reasonably 
designed to identify, monitor, manage, and assess risks relating to 
three key risk areas that challenge operational resilience: (i) 
information and technology security, as defined in the proposed rule 
and discussed further below; (ii) third-party relationships; and (iii) 
emergencies or other significant disruptions to the continuity of 
normal business operations as a covered entity.\55\ Although these risk 
areas are often viewed distinctly, as the introduction to this notice 
illustrates, they are significantly interrelated, as the relative 
strength of information and technology security and third-party risk 
management can directly affect recovery activities and improve outcomes 
following an emergency or other significant disruption.\56\ Together, 
the Commission believes they represent important sources of potential 
operational risk, the effective management of which is key to 
operational resilience.
---------------------------------------------------------------------------

    \54\ See paragraph (b)(1) of proposed Commission regulations 
1.13 and 23.603.
    \55\ See paragraphs (b)(1)(i)-(iii) of proposed Commission 
regulations 1.13 and 23.603.
    \56\ See, e.g., ISO/IEC 27031:2011, Information technology--
Security techniques--Guidelines for information and communication 
technology readiness for business continuity (Mar. 2011) (``Failures 
of [information and communication technology (ICT)] services, 
including the occurrence of security issues such as systems 
intrusion and malware infections, will impact the continuity of 
business operations. Thus, managing ICT and related continuity and 
other security aspects form a key part of business continuity 
requirements. Furthermore, in the majority of cases, the critical 
business functions that require business continuity are usually 
dependent upon ICT. This dependence means that disruptions to ICT 
can constitute strategic risks to the reputation of the organization 
and its ability to operate . . . As a result, effective [business 
continuity management] is frequently dependent upon effective ICT 
readiness to ensure that the organization's objectives can continue 
to be met in times of disruptions.''). See Prudential Operational 
Resilience Paper, supra note 11, at 8 (``Secure and resilient 
information systems underpin the operational resilience of a firm's 
critical operations and core business lines.''); see also Prudential 
Third-Party Guidance, 88 FR 37920 (discussing the interplay of 
third-party risks and operational resilience).
---------------------------------------------------------------------------

    The proposed rule would require covered entities to establish three 
written component programs or plans, each dedicated to addressing one 
of the three enumerated risks within the ORF. The three component 
programs or plans would be: (i) an information and technology security 
program, (ii) a third-party relationship program, and (iii) a business 
continuity and disaster recovery plan.\57\ Each component program or 
plan would need to be supported by written policies and procedures and 
meet the requirements set forth in the rule, as discussed in subsequent 
sections of this notice.\58\ The definitions and specific requirements 
for the information and technology security program, the third-party 
relationship program, and the business continuity and disaster recovery 
plan are discussed in detail in subsequent sections of this notice 
specifically dedicated to discussing each of the three components.\59\
---------------------------------------------------------------------------

    \57\ See paragraph (b)(2) of proposed Commission regulations 
1.13 and 23.603; see also paragraph (a) of proposed Commission 
regulations 1.13 and 23.603 (defining ``information and technology 
security program,'' ``third-party relationship program,'' and 
``business continuity and disaster recovery plan'').
    \58\ See paragraph (b)(2) of proposed Commission regulations 
1.13 and 23.603. See paragraphs (d) (information and technology 
security program), (e) (third-party relationship program), and (f) 
(business continuity and disaster recovery plan) of proposed 
Commission regulations 1.13 and 23.603 (describing the requirements 
for each program, respectively).
    \59\ See sections II.C (information and technology security 
program), II.D (third-party relationship program), II.E (business 
continuity and disaster recovery plan) of this notice, infra.
---------------------------------------------------------------------------

    Although they may go by different names, the Commission understands 
that written programs or plans of these types are generally recognized 
as common ways to address these risks and are even currently required 
of covered entities. NFA, for instance, currently requires members to 
adopt a written information systems security program (ISSP), a written 
supervisory framework to address outsourcing to third-party service 
providers, and a written business continuity and disaster recovery 
plan.\60\ The Commission itself requires swap entities to have a 
written business continuity and disaster recovery plan.\61\ 
Accordingly, to the extent that covered entities have existing programs 
or plans and policies and procedures that address the requirements of 
the ORF rule, by virtue of other regulatory requirements or otherwise, 
the Commission would not expect such covered entities to adopt entirely 
new component programs or plans. The Commission would only expect that 
covered entities review their existing programs and plans to ensure 
they meet the minimum requirements of the ORF rule and make any 
necessary amendments.
---------------------------------------------------------------------------

    \60\ See NFA ISSP Notice, supra note 43; NFA Third-Party Notice, 
supra note 43; and NFA BCDR Notice, supra note 43. NFA's requirement 
to establish a business continuity and disaster recovery plan does 
not currently apply to swap entities, see NFA Rule 2-38, paragraph 
(a), supra note 43.
    \61\ See 17 CFR 23.603.
---------------------------------------------------------------------------

    The Commission appreciates that covered entities may assign 
responsibility for the establishment, implementation, and maintenance 
of each ORF component program or plan to distinct functions within 
their organizations. By structuring the proposed rule to require a 
``framework'' directed at operational resilience,

[[Page 4712]]

however, the Commission intends for executive leadership at covered 
entities to address the risk areas covered by the ORF as a cohesive and 
interrelated whole, breaking down any unnecessary internal silos, and 
to consider all aspects of operational resilience in determining their 
operational strategies, risk appetite, and risk tolerance limits.\62\
---------------------------------------------------------------------------

    \62\ The specific governance requirements of the proposed rule, 
which include the requirement to establish risk appetite and risk 
tolerance limits with respect to the ORF, further support this view. 
See paragraph (c) of proposed Commission regulations 1.13 and 
23.603.
---------------------------------------------------------------------------

2. Standard--Proposed Paragraph (b)(3)
    The Commission is proposing to require that each covered entity 
implement the requirements of the proposed ORF rule in a manner that is 
appropriate and proportionate to the nature, scope, complexity, and 
risk profile of its business activities as a covered entity, following 
generally accepted standards and best practices (the (b)(3) 
standard).\63\ The proposed (b)(3) standard reflects the general 
principles-based approach underpinning the proposed rule, which the 
Commission believes would be appropriate given the increased reliance 
on and rapid evolution of technology within the financial industry and 
its attendant risks.\64\ This standard incorporates two themes that 
have broad support from other governmental and international standard-
setting bodies when addressing matters related to operational 
resilience: (i) proportionality; and (ii) reliance on established 
standards and best practices.\65\
---------------------------------------------------------------------------

    \63\ See paragraph (b)(3) of proposed Commission regulations 
1.13 and 23.603.
    \64\ See BCBS Operational Resilience Principles, supra note 11, 
at 1 (``Recognising that a range of potential hazards cannot be 
prevented, the Committee believes that a pragmatic, flexible 
approach to operational resilience can enhance the ability of banks 
to withstand, adapt to and recover from potential hazards and 
thereby mitigate potentially severe adverse impacts.''); see also 
Prudential Operational Resilience Paper, supra note 11, at 9 
(providing as a sound practice of operational resilience that firms 
review information systems ``on a regular basis against common 
industry standards and best practices.'').
    \65\ See, e.g., BCBS Operational Resilience Principles at 2-3 
(``The principles for operational resilience set forth in this 
document are largely derived and adapted from existing guidance that 
has been issued by the Committee or national supervisors over a 
number of years. The Committee recognizes that many banks have well 
established risk management processes that are appropriate for their 
individual risk profile, operational structure, corporate governance 
and culture, and conform to the specific risk management 
requirements of their jurisdictions. By building upon existing 
guidance and current practices, the Committee is issuing a 
principles-based approach to operational resilience that will help 
to ensure proportional implementation across banks of various size, 
complexity and geographical location.''); FSB Third-Party Report, 
supra note 44, at 10-11; IOSCO, Principles on Outsourcing: Final 
Report at 10 (IOSCO Outsourcing Report) (Oct. 2021) (providing that 
``[t]he application and implementation of these Principles should be 
proportional to the size, complexity and risk posed by the 
outsourcing'' of tasks, functions, processes, services, or 
activities to a service provider that would otherwise be undertaken 
by the regulated entity itself).
---------------------------------------------------------------------------

    Broadly speaking, the principle of proportionality recognizes that 
operational resilience, and information and technology security, in 
particular, cannot be addressed with a one-size-fits-all approach.\66\ 
On the contrary, differences in operational structures and business 
strategies among covered entities necessitate a more flexible and 
adaptive approach that would allow individual covered entities to best 
address their specific risks and evolve to address emerging challenges 
as they arise. Covered entities vary widely in terms of their business 
structure and risk profiles, such that a covered entity operating 
within a large bank holding company group structure and involved in a 
broad array of asset classes would likely have a different risk profile 
and different resources than an entity that is solely registered with 
the CFTC or that has a narrower scope to its CFTC-regulated business. 
The Commission would therefore expect that covered entities facing 
different operational risks may take different approaches to managing 
and monitoring those risks. Designing an operational resilience 
framework that would apply uniformly across all covered entities would 
not only pose significant challenges, it would likely be ineffective, 
imposing operational costs where no risks demand it. Accordingly, the 
Commission preliminarily believes that a proportional, risk-based 
approach would help ensure that firms, customers, counterparties, and 
the financial system at large can appropriately respond to and recover 
from operational shocks in context.
---------------------------------------------------------------------------

    \66\ See e.g., FINRA, 2018 Report on Selected Cybersecurity 
Practices at 1 (Dec. 2018) (FINRA Cybersecurity Report) (``[T]here 
is no one-size-fits-all approach to cybersecurity.''); NIST CSF, 
supra note 46, at 2 (``The [NIST CSF] is not a one-size-fits-all 
approach to managing cybersecurity risk for critical infrastructure. 
Organizations will continue to have unique risks--different threats, 
different vulnerabilities, different risk tolerances.'').
---------------------------------------------------------------------------

    Interpretive notices adopted by NFA reflect a comparable approach. 
Specifically, NFA's notices on ISSPs and the use of third-party service 
providers establish general, baseline requirements (e.g., assess risks 
associated with the use of information technology systems or with 
reliance on third-party service providers) and then direct NFA members, 
including covered entities, to tailor the specifics to their 
businesses.\67\ This approach is also consistent with the CFTC's own 
approach with respect to system safeguard requirements for registered 
entities,\68\ as well as those of the prudential regulators.\69\ 
Generally accepted standards and best practices themselves also 
generally support a proportional approach.\70\
---------------------------------------------------------------------------

    \67\ See NFA ISSP Notice, supra note 43 (requiring each NFA 
member to adopt an ISSP appropriate to the its ``size, complexity of 
operations, type of customers and counterparties, the sensitivity of 
the data accessible within its systems, and its electronic 
interconnectivity with other entities''); NFA Third-Party Notice, 
supra note 43 (``NFA recognizes that a Member must have flexibility 
to adopt a written supervisory framework relating to outsourcing 
functions to a [third-party service provider] that is tailored to a 
Member's specific needs and business . . .'').
    \68\ See, e.g., 17 CFR 37.1401(b) (SEFs); 17 CFR 38.1051(b) 
(DCMs); 17 CFR 39.18(b)(3) (DCOs); 17 CFR 49.24(c) (SDRs) (requiring 
registered entities to follow generally accepted standards and best 
practices with respect to the development, operation, reliability, 
security, and capacity of automated systems); see also System 
Safeguards Testing Requirements for Derivatives Clearing 
Organizations, 81 FR 64322, 64329 (Sept. 19, 2016) (DCO System 
Safeguards Testing Requirements) (describing the CFTC's approach to 
system safeguards for DCOs as providing DCOs with ``flexibility to 
design systems and testing procedures based on the best practices 
that are most appropriate for that DCO's risks'').
    \69\ 12 CFR part 30, app. B (Interagency Guidelines Establishing 
Information Security Standards); id. at II.A. (Information Security 
Program) (``Each [financial institution] shall implement a 
comprehensive written information security program that includes 
administrative, technical, and physical safeguards appropriate to 
the size and complexity of the [financial institution] and the 
nature and scope of its activities.''); FFIEC Information Technology 
Examination Handbook, Information Security at 2 (Sept. 2016) (FFIEC 
Information Security Booklet) (``Institutions should maintain 
effective information security programs commensurate with their 
operational complexities.'').
    \70\ The NIST CSF, for example, identifies activities designed 
to achieve specific cybersecurity outcomes and tiers practices by 
increasing degree of rigor and sophistication. In selecting a tier, 
NIST directs entities to consider their ``current risk management 
practices, threat environment, legal and regulatory requirements, 
information sharing practices, business/mission objectives, supply 
chain cybersecurity requirements, and organizational constraints.'' 
See NIST CSF, supra note 46, at 8.
---------------------------------------------------------------------------

    The Commission emphasizes, however, that ``proportional'' does not 
mean ``permissive.'' The Commission's proposed standard for the ORF 
rule would not support a ``race to the bottom,'' where covered entities 
default to the minimum requirements of the proposed rule. On the 
contrary, covered entities would be required to implement an ORF that 
is reasonably designed to reflect and address their unique risk profile 
and activities, consistent with the proposed (b)(3) standard. 
Accordingly, the Commission would expect larger, more complex entities 
that operate more varied business lines, rely on more technological 
platforms, or

[[Page 4713]]

have more complicated agreements with third-party service providers to 
arrive at an ORF that is appropriate to their likely increased level of 
operational risk.\71\
---------------------------------------------------------------------------

    \71\ See National Cyber Strategy, supra note 41, at 4 (``The 
most capable and best-positioned actors in cyberspace must be better 
stewards of the digital ecosystem.''); see also IOSCO Outsourcing 
Report, supra note 65, at 10.
---------------------------------------------------------------------------

    The requirement for covered entities to follow generally accepted 
standards and best practices serves to ground covered entities' 
approaches to operational resilience in practices that are widely 
recognized as effective in aiding financial institutions to mitigate 
and recover from operational shocks. In adopting system safeguard 
requirements for registered entities, which require registered entities 
to follow generally accepted standards and best practices, the 
Commission identified several sources of standards and best 
practices.\72\ NFA and other bodies have compiled similar lists.\73\ 
Among perhaps the most commonly relied on by financial institutions are 
the NIST CSF, ISO, the Center for internet Security (CIS), and FFIEC, 
whose examination booklets and Cyber Assessment Tool (CAT) are 
specifically designed to guide financial institutions.\74\ The 
Commission would expect covered entities to use generally accepted 
standards and industry best practices that are appropriate and 
proportionate to the nature, size, scope, complexities, and risk 
profile of their business activities, in designing or updating an ORF 
that would comply with the proposed rule. For instance, in conducting 
the risk assessment required under proposed paragraph (c)(1), a covered 
entity would need to identify risks to its information and technology 
security with reference to risks discussed in an appropriate standard 
or based on industry best practices, and then assess and prioritize 
those risks using frameworks and metrics recommended by those standards 
or practices. Requiring covered entities to follow generally accepted 
standards and industry best practices in developing and implementing 
the ORF would help ensure that covered entities establish, document, 
implement, and maintain ORFs reasonably designed to address their 
particular operational resilience-related risks.
---------------------------------------------------------------------------

    \72\ See, e.g., DCO System Safeguards Testing Requirements, 81 
FR 64322-23; 17 CFR 39.18(b)(3) (requiring DCOs to follow generally 
accepted standards and best practices with respect to the 
development, operation, reliability, security, and capacity of 
automated systems); see also 17 CFR 37.1401(b) (SEFs) (requiring the 
same); 17 CFR 38.1051(b) (DCMs) (same); 17 CFR 49.24(c) (SDRs) 
(same).
    \73\ See, e.g., NFA, Cybersecurity FAQs, ``Does NFA recommend 
any particular consultants that can help a Member draft an ISSP or 
perform penetration testing?''; see also FFIEC, Cybersecurity 
Resource Guide for Financial Institutions (Sept. 2022) (rev. Nov. 
2022).
    \74\ The Financial Services Sector Coordinating Council (FSSC) 
has also developed a NIST CSF profile specifically designed for 
financial institutions. The profile is now maintained, updated, and 
managed by the Cyber Risk Institute (CRI) and was last updated in 
January 2023. See CRI Profile v1.2 (Dec. 14, 2021), available at 
https://cyberriskinstitute.org/the-profile/.
---------------------------------------------------------------------------

    The proposed rule leverages these standards not only by directing 
covered entities to consider them in developing their approaches but by 
incorporating common themes contained within them into the substance of 
the proposed rule. In the Commission's view, reliance on such standards 
supports the use of a common lexicon, facilitating the development of 
understandable and transposable practices on a cross-border basis. The 
Commission further recognizes that generally accepted standards and 
best practices are likely to evolve over time, and the applicability of 
any particular standard may vary based on the unique circumstances and 
risk profile of each covered entity. Accordingly, the Commission 
preliminarily believes requiring covered entities to follow generally 
accepted standards and best practices supports the goal of an adaptive 
approach that can respond nimbly to rapid changes in emerging 
threats.\75\
---------------------------------------------------------------------------

    \75\ See National Cyber Strategy, supra note 41, at 9 (``By 
leveraging existing international standards in a manner consistent 
with current policy and law, regulatory agencies can minimize the 
burden of unique requirements and reduce the need for regulatory 
harmonization.'').
---------------------------------------------------------------------------

3. Request for Comment
    The Commission invites comment on all aspects of proposed paragraph 
(b), including the following questions:
    1. Applicability to FCMs. In adopting the RMP rule for FCMs in 
2013, the Commission determined to limit the rule's applicability to 
FCMs that hold or accept customer funds.\76\ The CEA and Commission 
regulations define a ``futures commission merchant'' as an entity that 
solicits or accepts orders to buy or sell futures contracts, options on 
futures, retail off-exchange forex contracts or swaps, and accepts 
money or other assets from customers to support such orders.\77\ 
Although some entities are, for various reasons, currently registered 
as FCMs despite not accepting customer funds, as the Commission 
explained in the adopting release for the FCM RMP rule, FCMs that do 
not accept or hold customer funds to margin, guarantee, or security 
commodity interests are generally not operating as FCMs.\78\ With 
respect to the proposed ORF rule, the Commission has preliminarily 
determined to apply the proposed requirements to all registered FCMs. 
Although the customer protection concerns may be mitigated for FCMs 
that do not handle customer assets, the Commission preliminarily 
believes that the potential systemic risk that can result from failures 
to manage information and technology risk, third-party relationships, 
emergencies, or other significant disruptions persist for all FCMs, 
given their access to customer information and their potential 
relationships with and/or connectivity to other regulated entities, 
including exchanges and clearinghouses.\79\
---------------------------------------------------------------------------

    \76\ See 17 CFR 1.11(a) (Nothing in this section shall apply to 
a futures commission merchant that does not accept any money, 
securities, or property (or extend credit in lieu thereof) to 
margin, guarantee, or secure any trades or contracts that result 
from soliciting or accepting orders for the purchase or sale of any 
commodity interest.).
    \77\ See 7 U.S.C. 1a(28)(A); 17 CFR 1.3 (defining ``futures 
commission merchant'') (emphasis added).
    \78\ As of July 31, 2023, twelve (12) entities were registered 
as FCMs but were not required to segregate any funds on behalf of 
customers. See CFTC, Financial Data for FCMs (July 31, 2023), 
available at https://www.cftc.gov/MarketReports/financialfcmdata/index.htm. The Commission made clear in the adopting notice for the 
FCM RMP rule that it would expect that, prior to changing their 
business model to begin accepting customer funds, any registered FCM 
that does not currently accept customer funds would need to 
establish a risk management program that complies with Commission 
regulation 1.11 and file such program with the Commission and with 
the FCM's designated self-regulatory organization (DSRO). See Final 
FCM RMP Rule, 78 FR 68517.
    \79\ The Final FCM RMP rule, by contrast, could be viewed as 
more directly targeting the management of specific risks associated 
with operating as an FCM.
---------------------------------------------------------------------------

    a. Are the risks associated with information and technology 
security, third-party relationships, and emergencies or other 
significant disruptions substantially different or reduced for FCMs 
that do not hold customer funds? If yes, please explain.
    b. Should the Commission consider limiting the ORF rule to FCMs 
that do not hold customer funds, consistent with the FCM RMP rule? Why 
or why not? Please explain.
    2. Standard. The proposed rule would require covered entities to 
follow ``generally accepted standards and best practices'' in 
establishing, implementing, and maintaining their ORFs. Although this 
notice identifies various sources of such standards and practices, 
including NIST, ISO, CIS, and FFIEC, the proposed rule does not further 
define or otherwise limit the scope of ``generally accepted standards 
and best practices,'' acknowledging that there are several sources of 
recognized standards currently relied on by covered entities and that 
standards and practices

[[Page 4714]]

are likely to evolve over time in response to changes in technology or 
emerging threats. Nevertheless, the Commission understands that, 
particularly in the United States, NIST and ISO standards are heavily 
relied on by covered entities and referenced by other regulators, 
making them widely recognized as the leading industry standards for 
cybersecurity and operational risk management.
    a. Should the Commission further define or otherwise limit what 
constitutes ``generally accepted standards and best practices''? 
Specifically, should the Commission require covered entities to follow 
NIST or ISO standards, as some commenters on the RMP ANPRM recommended? 
\80\ Why or why not? Please explain.
---------------------------------------------------------------------------

    \80\ See, e.g., R.J. O'Brien Letter, supra note 13, at 6 (``The 
Commission should also seek to implement the [NIST CSF] as a part of 
its standard for managing and mitigating this area of risk. The NIST 
CSF is widely accepted throughout many different industries and 
would set a universal standard and best practices for registrants to 
follow.'').
---------------------------------------------------------------------------

    b. Are there any other standards or practices commonly relied on by 
covered entities that the Commission did not identify, directly or 
indirectly, in this notice? If so, please identify them and specify how 
they are currently relied on by covered entities.

B. Governance--Proposed Paragraph (c)

    The topic of governance has gained increased attention within the 
context of operational resilience, particularly with respect to the 
area of information and technology security. As of the date of this 
notice, NIST is undergoing a process to update the NIST CSF, and new 
governance outcomes are expected to feature prominently.\81\ Prudential 
regulators have also emphasized the role of effective governance to 
operational resilience.\82\ In the Commission's view, the overall 
objective of an effective governance regime for an ORF should be the 
integration of operational resilience topics into existing reporting 
lines and operational structures, including the entity's overall 
operational strategy, to ensure active executive engagement and 
oversight in the management of operational risk that could challenge a 
covered entity's operational resilience.\83\
---------------------------------------------------------------------------

    \81\ See NIST, NIST Cybersecurity Framework 2.0 Concept Paper: 
Potential Significant Updates to the Cybersecurity Framework at 10-
11 (Jan. 19, 2023) (discussing how the update ``will emphasize the 
importance of cybersecurity governance'' by adding a new govern 
function); see also CRI, The Profile Workbook: Guidance for 
Implementing the CRI Profile v1.2.1 and Responding to its Diagnostic 
Statements at 16 (rev. Jan. 2023) (CRI Profile Workbook) (providing 
guidance on governance outcomes that have already been incorporated 
into the NIST CSF financial services sector profile).
    \82\ See Prudential Operational Resilience Paper, supra note 11, 
at 3.
    \83\ See BCBS Operational Resilience Principles, supra note 11, 
at 4 (``Principle 1: Banks should utilise their existing governance 
structure to establish, oversee and implement an effective 
operational resilience approach that enables them to respond and 
adapt to, as well as recover and learn from, disruptive events in 
order to minimise their impact on delivering critical operations 
through disruption.'') (internal citation omitted).
---------------------------------------------------------------------------

1. Approval of Components--Proposed Paragraph (c)(1)
    Accordingly, to ensure that a covered entity's senior leadership is 
involved in key decision-making around operational resilience, and is 
ultimately held accountable for implementation of the ORF, the proposed 
rule would require covered entities to have their senior leadership 
annually approve the ORF.\84\ In recognition of the wide variety of 
corporate structures represented among covered entities, however, the 
proposed rule would give covered entities broad flexibility and 
discretion to identify the appropriate senior-level individual or body 
to provide such approval.
---------------------------------------------------------------------------

    \84\ See paragraph (c)(1) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

    Specifically, paragraph (c)(1) of the proposed rule would require 
that each ORF component program or plan required by paragraph (b)(2) of 
the proposed rule is approved in writing, on at least an annual basis, 
by either the senior officer, an oversight body, or a senior-level 
official of the covered entity.\85\ The term ``oversight body'' itself 
would be broadly defined to encompass any board, body, or committee of 
a board or body of the covered entity specifically granted the 
authority and responsibility for making strategic decisions, setting 
objectives and overall direction, implementing policies and procedures, 
or overseeing the management of operations for the covered entity.\86\ 
Consistent with Commission regulation 3.1(j), ``senior officer'' would 
mean the chief executive officer or other equivalent officer of the 
covered entity.\87\ As an example, under the proposed rule, a covered 
entity could elect to have its information and technology security 
program annually approved by its chief executive officer, its chief 
information security officer, or a committee with oversight authority 
over information and technology security.\88\ Again, the intention 
behind offering this flexibility is to ensure that covered entities 
would be able to rely on and incorporate operational resilience into 
their existing governance structures when complying with the proposed 
ORF rule, while ensuring that each component program or plan would be 
approved by an individual or group of individuals with senior-level 
responsibilities and authority.
---------------------------------------------------------------------------

    \85\ Id.
    \86\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``oversight body'').
    \87\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``senior officer''). See also 17 CFR 3.1(j) 
(defining ``senior officer'').
    \88\ Other possible senior-level officials could be the covered 
entity's chief risk officer or chief operating officer, as 
appropriate.
---------------------------------------------------------------------------

2. Risk Appetite and Risk Tolerance Limits--Proposed Paragraph (c)(2)
    The proposed rule would further require covered entities to 
establish and implement appropriate risk appetite and risk tolerance 
limits with respect to the three risk areas enumerated in paragraph 
(b)(1) (information and technology security, third-party relationships, 
and emergencies or other significant disruptions to the continuity of 
normal business operations).\89\ Although the terms ``risk appetite'' 
and ``risk tolerance'' are sometimes used interchangeably, the 
Commission intends the terms to have distinct meanings within the 
context of the proposed rule. Specifically, in the context of the 
proposed rule, ``risk appetite'' would mean the aggregate amount of 
risk a covered entity is willing to assume to achieve its strategic 
objectives.\90\ Risk appetite is typically documented through a risk 
appetite statement, which establishes qualitative and quantitative 
measures designed to help identify when risk appetite has been exceeded 
and what appropriate mitigating strategies that can be taken.\91\

[[Page 4715]]

With its proposed definition of ``risk tolerance limit,'' the 
Commission intends to capture a more focused measure of acceptable 
risk. Specifically, ``risk tolerance limit'' would mean the amount of 
risk, beyond its risk appetite, that a covered entity is prepared to 
tolerate through mitigating actions.\92\ Thus, risk tolerance limits 
assume a particular type of risk has materialized (e.g., an operational 
disruption has occurred) and identify the amount of disruption a firm 
is prepared to tolerate beyond its risk appetite.\93\ Risk tolerance 
limits are also more likely to be measured in quantitative terms (e.g., 
number of hours a particular system or application is down).\94\
---------------------------------------------------------------------------

    \89\ See paragraph (c)(2)(i) of proposed Commission regulations 
1.13 and 23.603. See also paragraph (b)(1) of proposed Commission 
regulations 1.11 and 23.603 (identifying the risk areas proposed to 
be covered by the ORF).
    \90\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``risk appetite''). See also 12 CFR part 30, 
app. D, I.E.10 (Definitions) (defining ``risk appetite'' as the 
aggregate level and types of risk the board of directors and 
management are willing to assume to achieve a covered bank's 
strategic objectives and business program, consistent with 
applicable capital, liquidity, and other regulatory requirements); 
Prudential Operational Resilience Paper, supra note 11, at 14 
(defining ``risk appetite'' as ``[t]he aggregate level and types of 
risk the board and senior management are willing to assume to 
achieve a firm's strategic business objectives, consistent with 
applicable capital, liquidity, and other requirements and 
constraints''); BCBS Operational Resilience Principles, supra note 
11, at 3, n.7 (defining ``risk appetite'' as ``the aggregate level 
and types of risk a bank is willing to assume, decided in advance 
and within its risk capacity, to achieve its strategic objectives 
and business program'').
    \91\ See 12 CFR part 30, app. D (requiring covered financial 
institutions to have a comprehensive written risk appetite 
statement). See also CRI Profile Workbook, supra note 78, at 16 
(``Risk appetite statements define certain risk tolerance metrics 
that help describe systems and services that the organization may 
consider high-risk.'').
    \92\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``risk tolerance limit''). See also Prudential 
Operational Resilience Paper, at 3, n. 11; 14 (defining ``tolerance 
for disruption'' as ``determined by a firm's risk appetite for 
weathering disruption from operational risks considering its risk 
profile and the capabilities of its supporting operational 
environment'' and ``informed by existing regulations and guidance 
and by the analysis of a range of severe but plausible scenarios 
that would affect its critical operations and core business 
lines.''); CRI Profile Workbook at 291 (stating that ``risk 
tolerance'' ``reflects the acceptable variation in outcomes related 
to specific performance measures linked to objectives the entity 
seeks to achieve''). ISACA, Risk IT Framework, 2nd Ed. (July 27, 
2020) (defining ``risk tolerance'' as ``the acceptable deviation 
from the level set by the risk appetite and business objectives'').
    \93\ The Commission recognizes that Commission regulations 1.11 
and 23.600 incorporate the term ``risk tolerance limits.'' See 17 
CFR 1.11(e)(1), 17 CFR 23.600(c)(1). As proposed to be defined in 
the ORF rule, however, ``risk tolerance limits'' would be limited to 
the context of the risks identified in paragraph (b)(1) of the 
proposed rule and associated disruptions. Accordingly, if adopted, 
the defined use of the term ``risk tolerance limit'' in the proposed 
rule would not be intended to affect how covered entities use or 
interpret the term in the context of the Commission's RMP rules.
    \94\ The Commission believes its proposed definitions are in 
line with proposed definitions of ``risk appetite'' and ``risk 
tolerance'' used by NIST. For example, in NIST Interagency or 
Internal Report 8286 (NIST IR 8286), NIST explains that a statement 
of risk appetite might be that ``[e]mail shall be available during 
the large majority of a 24-hour period,'' while the associated risk 
tolerance would be narrower, stating something like ``[e]mail 
services shall not be interrupted more than five minutes during core 
hours.'' See NIST IR 8286 at 5-6 (Oct. 2020). Accordingly, any 
existing risk appetite and risk tolerance limits established by 
covered entities pursuant to NIST or prudential regulator standards 
would be considered consistent with the proposed rule.
---------------------------------------------------------------------------

    As with each component ORF program or plan, the proposed rule would 
require that a covered entity's risk appetite and risk tolerance limits 
be reviewed and approved in writing on at least an annual basis by 
either the senior officer, an oversight body, or a senior-level 
official of the covered entity.\95\ This proposed requirement is 
intended to ensure that the risk appetite and risk tolerance limits are 
consistent with the covered entity's operational strategy and 
objectives, as established by senior leadership, and that senior 
leadership is involved in, and ultimately held accountable for, how 
operational risks faced by the covered entity are internalized by the 
covered entity.
---------------------------------------------------------------------------

    \95\ See paragraph (c)(2)(ii) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

    The setting and approval of risk appetite and risk tolerance limits 
for operational risk is a well-recognized key component of effective 
governance and oversight.\96\ The Commission therefore preliminarily 
believes the setting and approval of risk appetite and risk tolerance 
limits for operational risks captured by the ORF would be helpful to 
ensuring effective governance and oversight of the ORF. Specifically, 
the Commission believes that the process of identifying appropriate 
risk appetite and risk tolerance limits would have a disciplining 
effect, encouraging covered entities to think critically about the 
risks they face and their ability to comfortably manage them without 
incurring intolerable harm to themselves or their customers or 
counterparties. The Commission further believes that operating within 
set risk appetite and risk tolerance limits would help support a 
culture where senior leaders at covered entities can make more informed 
decisions about the risks they are willing to take and the mitigation 
measures they would need to employ to manage these risks, which would 
further support operational resilience.
---------------------------------------------------------------------------

    \96\ See, e.g., BCBS Operational Resilience Principles, supra 
note 11, at 4 (``The board of directors should review and approve 
the bank's operational resilience approach considering the bank's 
risk appetite and tolerance for disruption to its critical 
operations. In formulating the bank's tolerance for disruption, the 
board of directors should consider the bank's operational 
capabilities given a broad range of severe but plausible scenarios 
that would affect its critical operations. The board of directors 
should ensure that the bank's policies effectively address instances 
where the bank's capabilities are insufficient to meet its stated 
tolerance for disruption.''); CRI Profile v1.2, supra note 74.
---------------------------------------------------------------------------

3. Internal Escalations--Proposed Paragraph (c)(3)
    To further ensure that senior leadership remains involved in and 
accountable for the ORF as it is implemented, the proposed rule would 
require either the senior officer, an oversight body, or a senior-level 
official of the covered entity to be notified of: (i) circumstances 
that exceed the risk tolerance limits established pursuant to paragraph 
(c)(2)(i) of the proposed rule; and (ii) incidents that require 
notification to the Commission, customers, or counterparties under the 
proposed rule, as further discussed in subsequent sections of this 
notice.\97\
---------------------------------------------------------------------------

    \97\ See paragraph (c)(3) of proposed Commission regulations 
1.13 and 23.603. See also paragraphs (i) and (j) of proposed 
Commission regulations 1.13 and 23.603, discussed in section II.G of 
this notice, infra.
---------------------------------------------------------------------------

    The Commission believes that circumstances that would push a 
covered entity outside of its risk tolerance limits or trigger a 
Commission notification requirement would be extraordinary, non-
business-as-usual events, and would likely require the involvement of 
senior leadership to direct responsive actions to preserve or mitigate 
damage to operational resilience and prevent situations of intolerable 
harm. Ensuring that appropriate senior leadership, as determined by the 
covered entity, is apprised of instances where expected risk tolerance 
limits have been exceeded would further help senior leadership 
determine whether the risk appetite and risk tolerance limits are 
appropriately calibrated and whether identified mitigation strategies 
are working, creating opportunities to update either as necessary.
4. Consolidated Program or Plan--Proposed Paragraph (c)(4)
    The Commission is aware that many covered entities function as a 
division or affiliate of a larger entity or holding company structure; 
and that, in such instances, operational risks stemming from 
information and technology security, third-party relationships, and 
emergencies or other significant disruptions are generally monitored 
and managed at the enterprise level to address the risks holistically 
and to achieve economies of scale.\98\ The proposed rule recognizes the 
benefits of such a consolidated approach and is not intended to 
interfere with covered entities' operational structures. Accordingly, 
the proposed rule would allow covered entities to satisfy the component 
program or plan requirement in paragraph (b)(2) through its 
participation in a consolidated program or plan, provided the 
consolidated program or plan meets the

[[Page 4716]]

requirements of the proposed rule.\99\ As defined in the proposed rule, 
a ``consolidated program or plan'' would mean any information and 
technology security program, third-party relationship program, or 
business continuity and disaster recovery plan in which a covered 
entity participates with one or more affiliates and is managed and 
approved at the enterprise level.\100\
---------------------------------------------------------------------------

    \98\ In responding to the RMP ANPRM, several commenters noted 
how cybersecurity risk is generally managed at the enterprise level 
and should not be managed at the level of the entity regulated by 
the Commission. See FIA Letter at 11 (Sept. 18, 2023); International 
Swaps and Derivatives Association, Inc. (``ISDA'') and the 
Securities Industry and Financial Markets Association (``SIFMA'') 
Letter at 9 (Sept. 18, 2023).
    \99\ See paragraph (c)(4)(i) of proposed Commission regulations 
1.13 and 23.603.
    \100\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``consolidated program''). Again, the specific 
definitions and minimum requirements of each program are discussed 
in sections II.C, II.D, and II.E of this notice, infra.
---------------------------------------------------------------------------

    Nevertheless, the Commission does have a strong regulatory interest 
in ensuring that operational shocks, such as cyber incidents or 
technological failures, having an impact on the discrete interests and 
operations of the covered entity are appropriately considered through 
the unique lens of the covered entity, which is regulated by the 
Commission. Accordingly, for a covered entity to satisfy the component 
program or plan requirement through its participation in a consolidated 
program or plan, the consolidated program or plan would need to meet 
the requirements of the proposed rule, as discussed in this notice. 
Those requirements include the establishment of appropriate risk 
appetite and risk tolerance limits that address the covered entity, as 
well as testing and other requirements, as discussed further below.
    With respect to the requirements in proposed paragraphs (c)(1) and 
(c)(2)(i) that senior leadership of the covered entity approve, 
respectively, the component program or plan and the risk appetite and 
risk tolerance limits at least annually, the Commission recognizes that 
such a requirement might be challenging in the context of a 
consolidated program or plan, which is likely to address matters 
related to affiliates that are not within the scope of knowledge or 
responsibility of the covered entity. Accordingly, the proposed rule 
would allow covered entities relying on a consolidated program or plan 
to satisfy the approval requirements in paragraphs (c)(1) and (c)(2)(i) 
of the proposed rule, provided that either the senior officer, an 
oversight body, or a senior-level official of the covered entity 
attests in writing, on at least an annual basis, that the consolidated 
program or plan meets the requirements of this section and reflects the 
risk appetite and risk tolerance limits appropriate to the covered 
entity.\101\ Notably, the senior officer, an oversight body, or a 
senior-level official at the covered entity would still need to be 
notified when the risk appetite and risk tolerance limits related to 
the covered entity are exceeded.\102\ The Commission believes that such 
an attestation requirement would promote efficiency by allowing covered 
entities to continue to rely on an enterprise-level ORF and governance 
structures that have acknowledged benefits while also ensuring that 
such enterprise-level ORF appropriately addresses the risks specific to 
the covered entity, and would ensure that the requirements of the 
Commission's proposed rule are addressed for those covered entities in 
the same way as they would for a covered entity that is not a part of a 
larger enterprise.\103\
---------------------------------------------------------------------------

    \101\ See paragraph (c)(4)(ii) of proposed Commission 
regulations 1.13 and 23.603.
    \102\ See paragraph (c)(3)(i) of proposed Commission regulations 
1.13 and 23.603.
    \103\ The Commission also believes this approach would be 
consistent with NFA's current interpretive notice on ISSPs. See NFA 
ISSP Notice, supra note 43 (``[T]o the extent a Member firm is part 
of a holding company that has adopted and implemented privacy and 
security safeguards organization-wide, then the Member firm can meet 
its supervisory responsibilities imposed by Compliance Rules 2-9, 2-
36 and 2-49 to address the risks associated with information systems 
through its participation in a consolidated entity ISSP.'').
---------------------------------------------------------------------------

5. Request for Comment
    The Commission invites comment on all aspects of the proposed 
governance requirements for the ORF, including the following questions:
    1. Governance structures. The proposed rule is intended to provide 
covered entities sufficient flexibility to integrate the proposed 
operational resilience requirements into existing reporting lines and 
operational structures, as well as to select the individual or body 
with senior-level responsibilities and authority to approve the 
component programs or plans of the ORF. Does the proposed rule 
accomplish this goal? If not, what other governance structure(s) should 
the Commission consider? Alternatively, should the Commission consider 
a more prescriptive, bright-line approach where only the senior officer 
or board of directors of the covered entity may provide any approvals 
required under the proposed rule? Please explain.
    2. Internal escalations. The proposed rule would require that the 
senior officer, an oversight body, or other senior-level official(s) of 
the covered entity be notified of circumstances that exceed risk 
tolerance limits or that require reporting to the Commission or 
counterparties or customers under the proposed rule. Should the 
Commission require internal escalation to any other specific personnel 
or under any other circumstances? Please identify and explain why.
    3. Consolidated program or plan. The proposed rule would allow 
covered entities relying on a consolidated program or plan to satisfy 
certain governance requirements by requiring the senior officer, an 
oversight body, or another senior-level official of the covered entity 
to attest in writing, on at least an annual basis, that the 
consolidated program or plan meets the requirements of the rule and 
reflects a risk appetite and risk tolerance limits appropriate to the 
covered entity. Is this standard workable for covered entities that 
function as a division or affiliate of a larger entity or holding 
company? Why or why not? Do such covered entities typically set their 
own risk appetite and risk tolerance limits, or are setting such limits 
conducted at the enterprise level? If they are set at the enterprise 
level, how is senior leadership of the covered entity typically 
involved in setting risk appetite and risk tolerance limits?

C. Information and Technology Security Program--Proposed Paragraph (d)

    As mentioned above, the proposed rule would require each covered 
entity's ORF to include an information and technology security program, 
defined as a written program reasonably designed to identify, monitor, 
manage, and assess risks relating to information and technology 
security and that meets the minimum requirements for the program, as 
set forth in the proposed rule and discussed below.\104\ The proposed 
rule would define ``information and technology security'' as the 
preservation of (a) the confidentiality, integrity, and availability of 
covered information and (b) the reliability, security, capacity, and 
resilience of covered technology.\105\ ``Covered information'' would be 
defined to mean any sensitive or confidential data or information 
maintained by a covered entity in connection with its business 
activities as a covered entity.\106\ ``Covered technology'' would be 
defined to mean any application, device, information technology asset, 
network service,

[[Page 4717]]

system, and other information-handling component, including the 
operating environment, that is used by a covered entity to conduct its 
business activities, or to meet its regulatory obligations, as a 
covered entity.\107\
---------------------------------------------------------------------------

    \104\ See paragraph (d) of proposed Commission regulations 1.13 
and 23.603. See also paragraph (a) of proposed Commission 
regulations 1.13 and 23.603 (defining ``information and technology 
security program'').
    \105\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``information and technology security'').
    \106\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``covered information'').
    \107\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``covered technology'').
---------------------------------------------------------------------------

    The proposed definition of ``covered information'' is intended to 
focus the requirements of the ORF on protecting data and information 
that are sensitive or otherwise intended to be kept confidential, 
whether by law or for business purposes. Notably, such data and 
information would include position, order, and account information, all 
of which covered entities have an obligation to keep confidential and 
which if made public could result in harm to customers, counterparties, 
or the markets more broadly. Often referred to as the ``CIA triad,'' 
confidentiality, integrity, and availability represent the three 
pillars of information security: preserving authorized restrictions on 
information access and disclosure, including means for protecting 
personal privacy and proprietary information; guarding against the 
improper modification or destruction of data and information, ensuring 
its authenticity; and ensuring the timely and reliable access to and 
use of information.\108\ The Commission therefore believes that 
compromising any aspect of the CIA triad with respect to covered 
information would have meaningful consequences for customers, 
counterparties, the covered entity, or even the market.
---------------------------------------------------------------------------

    \108\ See NIST, SP 1800-26, Data Integrity: Detecting and 
Responding to Ransomware and Other Destructive Events (Dec. 2020) 
(discussing the CIA triad).
---------------------------------------------------------------------------

    The proposed definition of ``information and technology security'' 
is likewise intended to ensure that the ORF is designed to address 
risks to two key facets of a covered entities' business for which they 
are registered with the Commission: the technology they use to conduct 
their regulated business activities and the sensitive information 
stored or transmitted therein. The proposed definition of ``covered 
technology'' is sufficiently broad to capture all types of technology 
(and related components) but is tailored to focus on the technology 
that is used by covered entities in the context of their regulated 
business activities, such that its disruption would have an impact on 
regulated business activities. The Commission preliminarily believes 
that reliability, security, capacity, and resilience are all key 
attributes of covered technology that must be preserved for it to 
function as intended without posing a disruption to operations. 
Accordingly, the Commission believes that having a program designed to 
preserve the confidentiality, integrity, and availability of covered 
information and the reliability, security, capacity, and resilience of 
covered technology is key to ensuring operational resilience.
    Under the proposed rule, each covered entity's information and 
technology security program would need to meet the (b)(3) standard, 
i.e., be appropriate and proportionate to the nature, size, scope, 
complexities and risk profiles of the covered entity's business 
activities, following generally accepted standards and best 
practices.\109\ The proposed rule would nevertheless establish certain 
minimum requirements for the information and technology security 
program, including a periodic risk assessment, effective controls, and 
an incident response plan. Each proposed minimum requirement is 
discussed in turn below.
---------------------------------------------------------------------------

    \109\ See paragraph (b)(3) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

1. Risk Assessment--Proposed Paragraph (d)(1)
    As part of the information and technology security program, covered 
entities would be required to conduct and document the results of a 
periodic and comprehensive risk assessment reasonably designed to 
identify, assess, and prioritize risks to information and technology 
security.\110\ Risk assessments are widely recognized as a necessary 
and effective first step to monitoring and managing risks to 
information and technology security.\111\ According to NIST, the 
purpose of a risk assessment is to inform decision makers and support 
risk responses by identifying: (i) relevant threats to organizations or 
threats directed through organizations against other organizations; 
(ii) vulnerabilities both internal and external to organizations; (iii) 
impact (i.e., harm) to organizations that may occur given the potential 
for threats exploiting vulnerabilities; and (iv) the likelihood that 
harm will occur.\112\ Given this broad and important purpose, the 
Commission believes conducting a comprehensive risk assessment would be 
reasonably necessary for covered entities to have a thorough 
understanding of their information and technology security risks, 
including the types of threats the covered entities face, internal and 
external vulnerabilities, the impact of such risks, and their relative 
priorities, to guide mitigation efforts.
---------------------------------------------------------------------------

    \110\ See paragraph (d)(1)(i) proposed Commission regulations 
1.13 and 23.603.
    \111\ See, e.g., ISO/IEC 27001:2022, supra note 48 (requiring a 
risk assessment to help organizations identify, analyze, and 
evaluate weaknesses in their information systems); ISO/IEC 
31010:2019, Risk management: Risk assessment techniques (July 2, 
2019); NIST, SP 800-39, Managing Information Security Risk: 
Organization, Mission, and Information System View at 37 (Mar. 2011) 
(NIST SP 800-39) (``Risk assessment identifies, prioritizes, and 
estimates risk to organizational operations (i.e., mission, 
functions, image, and reputation), organizational assets, 
individuals, other organizations, and the Nation, resulting from the 
operation and use of information systems. Risk assessments use the 
results of threat and vulnerability assessments to identify and 
evaluate risk in terms of likelihood of occurrence and potential 
adverse impact (i.e., magnitude of harm) to organizations, assets, 
and individuals.''); NIST, SP 800-30, Guide for Conducting Risk 
Assessments, Rev. 1, at ix (Sept. 2012) (NIST SP 800-30) (``Risk 
assessments are a key part of effective risk management and 
facilitate decision making . . .''). See also 12 CFR part 30, app. B 
(establishing a requirement to assess risk by identifying reasonably 
foreseeable threats, assessing the likelihood and potential damage 
of the threats, and assessing the sufficiency of arrangements to 
control risks); Prudential Operational Resilience Paper, supra note 
11, at 4 (``The firm's operational risk management function 
implements and maintains risk identification and assessment 
approaches that adequately capture business processes and their 
associated operational risks, including technology and third-party 
risks.'').
    \112\ See NIST SP 800-30 at 1.
---------------------------------------------------------------------------

    As stated, the risk assessment would need to identify, assess, and 
prioritize risks to information and technology security.\113\ In broad 
terms, the Commission anticipates that conducting the assessment could 
first involve taking an inventory of covered technology and then 
identifying and assessing the likelihood and potential impact of 
reasonably foreseeable threats and vulnerabilities to information and 
technology security (i.e., to the confidentiality, integrity, and 
availability of covered information, or to the reliability, security, 
capacity or resilience of covered technology) in light of the existing 
operational environment. Identified threats and vulnerabilities could 
derive from a wide array of sources, including both external cyber 
threats and internal gaps in existing systems or controls.
---------------------------------------------------------------------------

    \113\ See paragraph (d)(1)(i) proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

    The Commission would then expect the risks to be prioritized in 
light of the covered entity's stated risk appetite and risk tolerance 
limits to help direct resources and other activities in order to best 
support information and technology security. If the proposal is adopted 
as final, the Commission would expect covered entities to use the 
results of each risk assessment as a basis for designing, implementing, 
and refining other elements of its information and technology security 
program, including

[[Page 4718]]

but not limited to, the development of controls, testing protocols, and 
the incident response plan, as discussed further below.\114\ In this 
way, a well-conducted risk assessment should support the development of 
a more rational, effective, and valuable information and technology 
security framework, especially as the assessment is repeated and built 
upon over time.
---------------------------------------------------------------------------

    \114\ See NIST SP 800-39 at 34 (``Information generated during 
the risk assessment may influence the original assumptions, change 
the constraints regarding appropriate risk responses, identify 
additional tradeoffs, or shift priorities.'').
---------------------------------------------------------------------------

    The proposed rule would not prescribe a specific process or 
methodology for the risk assessment, but the risk assessment would need 
to be consistent with the proposed (b)(3) standard.\115\ Following 
generally accepted standards and best practices, covered entities would 
need to implement processes and methodologies that ensure the risk 
assessment reflects the nature, size, scope, complexities, and risk 
profile of its business activities as a covered entity. Any such 
processes or methodologies should also be sufficient to identify, 
assess, and prioritize risks to information and technology security and 
to evaluate their potential impact on covered technology and covered 
information.\116\
---------------------------------------------------------------------------

    \115\ See paragraph (b)(3) of proposed Commission regulations 
1.13 and 23.603, discussed supra. The Commission is aware of several 
sources for industry standards and best practices regarding 
information security risk assessments. See, e.g., NIST SP 800-39; 
see also FFIEC Information Security Booklet, supra note 69.
    \116\ See paragraph (d)(1)(i) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

    To ensure that the risk assessment is conducted objectively, the 
proposal would require that the personnel involved in conducting the 
assessment are not responsible for the development or implementation of 
the covered technology or related controls.\117\ Such personnel could 
be employees of the covered entity, an affiliated entity, or a third-
party service provider. To ensure that senior leadership is aware of 
risks to information security, and can appropriately prioritize them 
within the covered entity's broader strategy and risk management 
framework, the proposed rule would expressly require that the results 
of the risk assessment be provided to the senior officer, oversight 
body, or other senior-level official who approves the information and 
technology security program upon the risk assessment's completion.\118\ 
The Commission believes the results of the risk assessment would be key 
information for senior leadership in determining whether to approve an 
information and technology security program.
---------------------------------------------------------------------------

    \117\ See paragraph (d)(1)(ii) of proposed Commission 
regulations 1.13 and 23.603.
    \118\ See paragraph (d)(1)(iii) of proposed Commission 
regulations 1.13 and 23.603. See also NIST SP 800-30, supra note 
111, at 1 (``The purpose of risk assessments is to inform decision 
makers and support risk responses . . .'').
---------------------------------------------------------------------------

    The proposed rule would require that the covered entity conduct the 
risk assessment at a frequency consistent with the (b)(3) standard 
(i.e., a frequency appropriate and proportionate to the nature, scope, 
and complexities of its business activities as a covered entity, 
following generally accepted standards and best practices) but, in any 
case, no less frequently than annually.\119\ Given the rapidly evolving 
nature of technological developments and related threats, the 
Commission preliminarily believes that a uniform requirement to conduct 
a risk assessment on at least an annual basis would support the 
development of a strong, foundational level of information and 
technology security across the industry, thereby mitigating the overall 
threat of systemic risk. However, the Commission understands that 
generally accepted standards and best practices may encourage more 
frequent risk assessments for covered entities that engage in broader 
or more complex business activities and would expect covered entities 
to conduct risk assessments more frequently if the circumstances so 
require.
---------------------------------------------------------------------------

    \119\ See paragraph (d)(1)(ii) of proposed Commission 
regulations 1.13 and 23.603.
---------------------------------------------------------------------------

    As mentioned above, the proposed rule would allow covered entities 
to satisfy the requirement to have an information and technology 
security program through its participation in a consolidated 
information and technology security program.\120\ Accordingly, such 
covered entities would be allowed to rely on a risk assessment that is 
conducted at an enterprise level. In such cases, the Commission would 
expect that the covered entities review the program and supporting 
policies and procedures for conducting the risk assessment to ensure it 
captures and assesses the risks to the covered entity consistent with 
the proposed rule so as to support the related attestation 
requirement.\121\
---------------------------------------------------------------------------

    \120\ See paragraph (c)(4)(i) of proposed Commission regulations 
1.13 and 23.603.
    \121\ See paragraph (c)(4)(ii) of proposed Commission 
regulations 1.13 and 23.603.
---------------------------------------------------------------------------

2. Effective Controls--Proposed Paragraph (d)(2)
    The proposed rule would require that the information and technology 
security program establish, document, implement, and maintain controls 
reasonably designed to prevent, detect, and mitigate identified risks 
to information and technology security.\122\ An essential component of 
any information and technology security program, and a critical 
component of a covered entity's overall ORF, controls (also referred to 
as ``countermeasures'' or ``safeguards'') include any measures 
(actions, devices, procedures, techniques) designed to promote 
information and technology security.\123\ The selection, design, and 
implementation of controls can therefore have significant implications 
for a covered entity's information and technology security and overall 
operational resilience.\124\ Accordingly, the Commission believes 
effective controls would be a critical component of a covered entity's 
overall ORF.
---------------------------------------------------------------------------

    \122\ See paragraph (d)(2) of proposed Commission regulations 
1.13 and 23.603.
    \123\ See Committee on Payments and Market Infrastructures 
(CPMI), IOSCO, Guidance on cyber resilience for financial market 
infrastructures at 7 (Jun. 2016) (CPMI IOSCO Cyber Resilience 
Guidance) (noting that a strong information and communications 
technologies control environment is a fundamental and critical 
component of overall cyber resilience). See also NIST SP 800-53, 
supra note 46, at 8 (``Controls can be viewed as descriptions of the 
safeguards and protection capabilities appropriate for achieving the 
particular security and privacy objectives of the organization and 
reflecting the protection needs of organizational stakeholders. 
Controls are selected and implemented by the organization in order 
to satisfy the system requirements. Controls can include 
administrative, technical, and physical aspects.''); ISO/IEC 
27001:2022, supra note 48, Annex A (Information security management 
systems) (providing guidelines for 93 objectives and controls).
    \124\ See Prudential Operational Resilience Paper, supra note 
11, at 8 (identifying as a sound practice for operational resilience 
routinely applying and evaluating the effectiveness of processes and 
controls to protect confidentiality, integrity, availability, and 
overall security of data and information systems).
---------------------------------------------------------------------------

    Although the proposed rule would not mandate that covered entities 
implement specific controls, it would require covered entities to 
consider, at a minimum, certain categories of controls, discussed 
below, and adopt those consistent with the (b)(3) standard.\125\ If the 
proposal is adopted as final, the Commission would further expect that 
a particular covered entity's determination of which controls to 
implement would be guided by the results of its risk assessment, 
considering the covered entity's risk appetite and risk tolerance 
limits.\126\

[[Page 4719]]

Adopted controls would also need to address risks to information and 
technology security identified through other means, including outcomes 
of continuous monitoring of threats and vulnerabilities, actual and 
attempted cyber-attacks, threat intelligence, scenario analysis, and 
the likelihood and realistic impact of such attacks. In other words, 
the controls would need to be linked to and address the identified and 
prioritized risks to information and technology security. The 
Commission would advise covered entities to document their 
consideration of controls within each of the enumerated categories and 
their reasoning for adopting specific controls within any given 
category, or for declining to adopt any controls within a particular 
category. Further, the Commission would expect those controls to be 
reviewed and revised as needed to reflect the results of the covered 
entity's most recent risk assessment.
---------------------------------------------------------------------------

    \125\ See paragraphs (d)(2)(i)-(xii) of proposed Commission 
regulations 1.13 and 23.603 (identifying categories of controls for 
covered entities to consider). See also paragraph (b)(3) of proposed 
Commission regulations 1.13 and 23.603.
    \126\ See paragraph (c)(2) of proposed Commission regulations 
1.13 and 23.603 (requiring covered entities to establish and 
implement risk appetite and risk tolerance limits).
---------------------------------------------------------------------------

    The specific categories of controls the Commission would require 
covered entities to consider under the proposed rule include: access 
controls; access restrictions; encryption; dual control 
procedures,\127\ segregation of duties, and background checks; change 
management practices; system development and configuration management 
practices; flaw remediation; measures to protect against destruction, 
loss, or damage to covered information; monitoring systems and 
procedures to detect attacks or intrusions; response programs; and 
measures to promptly recover and secure any compromised covered 
information.\128\
---------------------------------------------------------------------------

    \127\ Dual control procedures refer to a technique that requires 
two or more separate persons, operating together, to protect 
sensitive data and information. Both persons are equally responsible 
for protecting the information and neither can access the 
information alone. See Interagency Guidelines Establishing Standards 
for Safeguarding Customer Information and Rescission of Year 2000 
Standards for Safety and Soundness, 66 FR 8616, 8622 (Feb. 1, 2001) 
(Interagency Guidelines Safeguarding Customer Information).
    \128\ See paragraphs (d)(2)(i)-(xi) of proposed Commission 
regulations 1.13 and 23.600.
---------------------------------------------------------------------------

    The Commission preliminarily believes that these categories of 
controls collectively represent a comprehensive array of controls for 
ensuring the information and technology security. Access controls, 
access restrictions, encryption, and background checks would limit 
access to covered technology and covered information to individuals 
with a legitimate business need in both physical and digital 
environments. Dual control procedures, segregation of duties, 
procedures relating to modifications to covered technology, and 
measures to protect against destruction, loss, or damage to covered 
information, would support the integrity and availability of covered 
information from accidental or intentional damage or disclosure to 
unauthorized recipients. Change management practices would ensure that 
the information and technology security program, and associated 
controls, continue to operate as intended over time as systems and 
processes are updated. Systems development, configuration management, 
and flaw remediation practices would operate to ensure the integrity 
and availability of covered technology throughout any updates to 
covered technology or following a vulnerability analysis.\129\ Measures 
to protect against destruction of covered information due to 
environmental hazards would further ensure that covered information 
remains available even following a physical disruption. Monitoring 
systems and procedures, response programs, and measures to promptly 
recover and secure any compromised covered information would serve to 
detect unauthorized access to covered information and to recover it if 
the covered entity's access to the covered information were impaired 
(e.g., through a ransomware attack).
---------------------------------------------------------------------------

    \129\ Based on its experience, the Commission further believes 
that that failures in change management, systems development, and 
vulnerability patching practices are common sources of disruption 
among financial institutions and are often neglected control areas.
---------------------------------------------------------------------------

    The proposed rule is modeled after an approach adopted by 
prudential regulators. Since the early 2000s, prudential regulators 
have required financial institutions to consider a similar list of 
categories of controls when designing their information security 
programs.\130\ In adopting their list of categories, prudential 
regulators described them as designed to control identified risks and 
to achieve the overall objective of ensuring the security and 
confidentiality of customer information.\131\ Prudential regulators 
further emphasized that the categories were broad enough to be adapted 
by institutions of varying sizes, scope of operations, and risk 
management structures, such that the manner of implementing the 
guidelines would vary from institution to institution.\132\ Given that 
the list of control categories developed by prudential regulators, many 
of which are included in the Commission's proposed rule, has a 
longstanding history of being effective and adaptable to the financial 
industry at large, the Commission preliminarily believes that 
incorporating a similar approach with respect to covered entities would 
also further the Commission's intent to adopt a flexible rule that can 
be tailored to each individual covered entity and adapted over time to 
respond to changing threat environments and risk profiles.\133\
---------------------------------------------------------------------------

    \130\ See Interagency Guidelines Safeguarding Customer 
Information, 66 FR 8616; see also 12 CFR part 30, app. B. The 
guidelines were expanded and retitled, ``Interagency Guidelines 
Establishing Information Security Standards'' in 2004, see Proper 
Disposal of Consumer Information Under the Fair and Accurate Credit 
Transactions Act of 2003, 69 FR 77610 (Dec. 28, 2004).
    \131\ See Interagency Guidelines Safeguarding Customer 
Information, 66 FR 8621.
    \132\ Commenters further supported the level of detail, see id. 
at 8622.
    \133\ NIST has compiled a comprehensive catalog of security and 
privacy controls for all types of computing platforms, including 
general purpose computing systems, cyber-physical systems, cloud 
systems, mobile systems, and Internet of Things (IoT) devices. See 
NIST SP 800-53, supra note 123.
---------------------------------------------------------------------------

3. Incident Response Plan--Proposed Paragraph (d)(3)
    The proposed rule would require that the information and technology 
security program include a written incident response plan that is 
reasonably designed to detect, assess, contain, mitigate the impact of, 
and recover from an incident.\134\ A hallmark of operational resilience 
is the recognition that although meaningful steps can be taken to 
prevent and deter risks to information and technology security, such 
risks may never be entirely eliminated.\135\ As the ION incident 
illustrated, quick and complete recovery of covered technology and 
operations may be key to mitigating the potential systemic impact to 
the financial markets. Accordingly, a crucial aspect of any information 
and technology security program, and therefore any ORF, is having a 
plan to respond to and recover from events that may create risks to 
information and technology security.\136\

[[Page 4720]]

The Commission believes, therefore, that an effective incident response 
plan would help covered entities minimize the potential impact to their 
operations and customers or counterparties when negative events occur, 
facilitating their recovery as swiftly and successfully as 
possible.\137\ It can also assist in securing against the destruction 
or theft of sensitive and important confidential customer or 
counterparty information, which could have a very real impact on their 
business and assets.
---------------------------------------------------------------------------

    \134\ See paragraph (d)(3) of proposed Commission regulations 
1.13 and 23.603. The Commission is aware that some covered entities 
may have established an incident response plan as a separate 
document or as an attachment to another plan, such as a BCDR plan. 
If the proposed rule is adopted, the Commission would be agnostic as 
to where a covered entity elects to house its incident response plan 
provided it otherwise meets the requirements of the proposed rule, 
including recordkeeping, furnishing it to the Commission upon 
request, and distributing it to personnel.
    \135\ See BCBS Operational Resilience Principles, supra note 12, 
at 1 (stating that, in recognition that ``the range of potential 
hazards cannot be prevented,'' the focus should be on ``the ability 
of banks to withstand, adapt to and recover from potential hazards 
and thereby mitigate potentially severe adverse impacts'').
    \136\ See, e.g., BCBS Operational Resilience Principles at 7, 
n.18 (``The goal of incident management is to limit the disruption 
and restore critical operations in line with the bank's risk 
tolerance for disruption.''). See also FFIEC Information Security 
Booklet, supra note 69, 50-51 (``containing the incident, 
coordinating with law enforcement and third parties, restoring 
systems, preserving data and evidence, providing assistance to 
customers, and otherwise facilitating operational resilience''); 
NIST, SP 800-184, Guide for Cybersecurity Event Recovery (Dec. 2016) 
(NIST SP 800-184) (``evaluate the potential impact, planned response 
activities, and resulting recovery processes long before an actual 
cyber event takes place''); CIS, Incident Response Policy Template: 
Critical Security Controls (Mar. 8, 2023) at 4 (``The primary goal 
of incident response is to identify threats on the enterprise, 
respond to them before they can spread, and remediate them before 
they can cause harm.'') (CIS Incident Response Template).
    \137\ See FFIEC, CAT at 52 (May 2017) (``The incident response 
plan is designed to ensure recovery from disruption of services, 
assurance of data integrity, and recovery of lost or corrupted data 
following a cybersecurity incident''); CPMI IOSCO Cyber Resilience 
Guidance, supra note 123, at 16 (recognizing the incident response 
plan enables the business ``to resume critical operations rapidly, 
safely and with accurate data'').
---------------------------------------------------------------------------

    For purposes of the proposed rule, ``incident'' would be defined as 
any event, occurrence, or circumstance that could jeopardize 
information and technology security, including if it occurs at a third-
party service provider.\138\ The purpose of the incident response plan 
is to identify and classify foreseeable types of incidents and to 
establish steps to detect, assess, contain, mitigate the impact of, and 
recover from incidents. The Commission's proposed definition of 
``incident'' is intentionally broad to ensure that the incident 
response plan would address any event that could reasonably jeopardize 
(i.e., endanger or put at risk) information and technology security, 
even if that danger never materializes or the incident response plan is 
otherwise successful at preventing or reversing the danger. As defined 
in the proposed rule, ``incident'' is broad enough to cover various 
types of risks to covered technology (e.g., disruption or modification) 
or covered information (e.g., disclosure or destruction), regardless of 
the source (e.g., external threat actor or internal staff, physical or 
electronic) or whether the event was accidental or malicious in nature, 
since intent may not be readily determined at the outset of an 
incident. Common examples of incidents would include unauthorized 
access to a system or data; unauthorized changes to system hardware, 
software, or data; or a failure of controls that could, if not 
addressed, endanger information and technology security.
---------------------------------------------------------------------------

    \138\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``incident'').
---------------------------------------------------------------------------

    Consistent with the general framework for the ORF as a whole, the 
proposal would require the incident response plan to meet certain 
minimum requirements.\139\ In broad terms, these requirements focus on 
identifying persons relevant to an incident response (i.e., personnel 
involved in responding to the incident and persons who should be 
notified of such incidents) and how and when they should be involved; 
documenting the nature of the covered entity's response; and 
remediating any weaknesses that lead to the incident.\140\ The 
Commission believes that clearly identifying parties who would be 
involved in incident response, including external parties like third-
party service providers and law enforcement, and establishing 
associated roles and responsibilities would help ensure that incidents 
are: (1) resolved in a timely manner and by appropriate personnel; (2) 
adequately resourced financially, operationally, and staffing-wise; and 
(3) disclosed to appropriate persons either within senior leadership of 
the covered entity or externally, where required.\141\ The process of 
documenting incidents and management's response, as well as any 
subsequent remediation efforts, would assist with any related reporting 
obligations and required information sharing, as well as with 
subsequent testing of the incident response plan or post-mortem 
analysis, which would potentially lead to adjustments in subsequent 
risk assessments and provide lessons learned that could serve to help 
prevent the occurrence of incidents in the future.\142\
---------------------------------------------------------------------------

    \139\ See paragraphs (d)(3)(i)-(vi) of proposed Commission 
regulations 1.13 and 23.603.
    \140\ See id.
    \141\ See also NIST SP 800-61 (``It is important to identify 
other groups within the organization that may need to participate in 
incident handling so that their cooperation can be solicited before 
it is needed. Every incident response team relies on the expertise, 
judgment, and abilities of others . . .'').
    \142\ See NIST SP 800-184, supra note 132; CIS Incident Response 
Template, supra note 136, at 4 (``Without understanding the full 
scope of an incident, how it happened, and what can be done to 
prevent it from happening again, defenders will just be in a 
perpetual `whack-a-mole' pattern.'').
---------------------------------------------------------------------------

    Among these minimum requirements for the incident response plan is 
the need for it to include escalation protocols, i.e., a process of 
identifying when to involve or alert specific personnel, including 
senior leadership, of an incident.\143\ Specifically, the proposed rule 
would require that the senior officer, oversight body, or other senior-
level official that has primary responsibility for overseeing the 
information and technology security program; the Chief Compliance 
Officer (CCO); \144\ and any other relevant personnel be timely 
informed of incidents that may significantly impact the covered 
entity's regulatory obligations or require notification to the 
Commission.\145\ This provision is designed to ensure that every 
individual who has a role in responding to an incident at a covered 
entity would be appropriately notified. CCOs of covered entities in 
particular have a duty to take reasonable steps to ensure compliance 
with Commission regulations relating to the covered entities' business 
as a covered entity.\146\ Timely disclosure of incidents to the CCO 
that could impact a covered entity's regulatory obligations or require 
disclosure to the Commission would therefore be crucial for a covered 
entity CCO to fulfill the duty to take reasonable steps to ensure 
compliance. As previously discussed above in the section addressing 
governance, the Commission believes that involving senior leadership in 
incident response would be particularly important to ensure that they 
are apprised of and held accountable for the ultimate effectiveness of 
the ORF, and that incidents receive proper attention and are swiftly 
addressed.
---------------------------------------------------------------------------

    \143\ See paragraph (d)(3)(ii) of proposed Commission 
regulations 1.13 and 23.603.
    \144\ See 17 CFR 3.3 (establishing the qualifications and duties 
of covered entity CCOs).
    \145\ See paragraph (d)(3)(ii) of proposed Commission 
regulations 1.13 and 23.603. See also paragraph (i) of proposed 
Commission regulations 1.13 and 23.603 (requiring notification of 
certain incidents to the Commission), discussed in section II.H of 
this release, infra.
    \146\ See 17 CFR 3.3(d)(3).
---------------------------------------------------------------------------

4. Request for Comment
    The Commission invites comment on all aspects of the proposed 
information and technology security program requirement, including the 
following questions:
    1. Risk Assessment.
    a. The proposed rule would require that the risk assessment be 
provided to relevant senior leadership of the covered entity upon its 
completion but would not require that such senior leadership certify in 
writing that they have received the results of the risk assessment or 
approve the results of the risk assessment. Such approvals and 
certifications may be required in other contexts to ensure that senior 
leadership

[[Page 4721]]

is aware of risk assessments and consider them in establishing 
strategic goals, risk appetite, and risk tolerance limits. Should the 
Commission require such a certification or approval? Why or why not? 
Please explain.
    b. Given the rapidly evolving technological and threat landscape, 
the proposed rule would require risk assessments to be performed on at 
least an annual basis to support the mitigation of systemic risk and 
develop a strong baseline standard across covered entities. The 
Commission is aware of standards imposing risk assessments as 
frequently as every six months and as infrequently as every two years. 
Should the Commission consider a shorter or longer baseline frequency 
for risk assessments? Why or why not? Please explain.
    2. Effective controls. The proposed rule would require covered 
entities to consider broad categories of controls and determine which 
to adopt consistent with the proposed (b)(3) standard. The Commission 
is also aware that certain controls, including firewalls, antivirus, 
and multifactor authentication (MFA) are commonly recommended within 
the industry. With respect to MFA, which requires users to present two 
or more authentication factors at login to verify their identity before 
they are granted access, CISA advises that implementing MFA is 
important because it makes it more difficult for threat actors to gain 
access to information systems, even if passwords or PINs are 
compromised through phishing attacks or other means.\147\ In 2021, 
FFIEC issued guidance advising financial institutions that MFA or 
controls of equivalent strength, including for those employees, could 
help more effectively mitigate risks when a financial institution's 
risk assessment indicates that single-factor authentication with 
layered security is inadequate.\148\ The guidance added that MFA 
factors, which may include memorized secrets, look-up secrets, out-of-
band devices, one-time-password devices, biometrics identifiers, and 
cryptographic keys, can vary in terms of usability, convenience, and 
strength and their ability to be exploited.\149\ That same year, the 
Federal Trade Commission updated its rule for safeguarding customer 
information to mandate financial institutions to adopt MFA for all 
users.\150\ The Commission preliminarily believes that requiring 
covered entities to implement such widely recommended controls, such as 
and including MFA, would help reduce cyber security risks and clarify 
expectations. Should the Commission mandate the use of any specific 
controls, including firewalls, antivirus, and/or MFA? Why or why not? 
Please explain.
---------------------------------------------------------------------------

    \147\ CISA, Multi-Factor Authentication Fact Sheet (Jan. 2022), 
available at https://www.cisa.gov/sites/default/files/publications/MFA-Fact-Sheet-Jan22-508.pdf. NIST defines MFA as ``[a]n 
authentication system that requires more than one distinct 
authentication factor for successful authentication. Multi-factor 
authentication can be performed using a multi-factor authenticator 
or by a combination of authenticators that provide different 
factors. The three authentication factors are something you know, 
something you have, and something you are.'' NIST, SP 800-63-3, 
Digital Identity Guidelines at 49 (June 2017).
    \148\ FFIEC, Authentication and Access to Financial Institution 
Services and Systems at 7 (rev. Jan. 5, 2022).
    \149\ Id.
    \150\ See Standards for Safeguarding Customer Information, 86 FR 
70272 (Dec. 9, 2021); see also 16 CFR 314.4(c)(5) (requiring 
financial intuitions to ``[i]mplement multi-factor authentication 
for any individual accessing any information system unless [a 
qualified individual, as defined in the rule] has approved in 
writing the use of reasonably equivalent or more secure access 
controls.'').
---------------------------------------------------------------------------

    3. Incident response plan. As proposed, covered entities would be 
required to notify their CCOs of incidents that they have determined 
may significantly impact regulatory obligations or require notification 
to the Commission. Commission staff are aware of instances where 
covered entity CCOs have not been notified of incidents sufficiently 
early to play a meaningful role in determining whether the incident 
implicates any CFTC requirements and in developing an appropriate 
remediation plan. Should covered entities be required to notify their 
CCOs of all incidents, only incidents that may require notification 
under the proposed rule, or incidents that may require notification 
under the proposed rule to other financial regulatory authorities? Why 
or why not?

D. Third-Party Relationship Program--Proposed Paragraph (e)

    The second program required to be included as part of the proposed 
ORF would be a third-party relationship program, defined as a written 
program reasonably designed to identify, monitor, manage, and assess 
risks relating to third-party relationships that meets the requirements 
of the proposed rule.\151\ The Commission understands that covered 
entities currently routinely rely upon third parties for a wide variety 
of products, services, and activities, including, for example, 
information technology, counterparty or customer relationship 
management, accounting, compliance, human resources, margin processing, 
trading, and risk management. Reliance on third-party service providers 
carries many potential benefits, including a reduction in operating 
costs and access to technological advancements that can improve 
operations and regulatory compliance.\152\
---------------------------------------------------------------------------

    \151\ See paragraph (e) of proposed Commission regulations 1.13 
and 23.603. See also paragraph (a) of proposed regulations 1.13 and 
23.603 (defining ``third-party relationship program'').
    \152\ See Prudential Third-Party Guidance, 88 FR 37927 (``The 
use of third parties can offer banking organizations significant 
benefits, such as access to new technologies, human capital, 
delivery channels, products, services, and markets.''); IOSCO 
Outsourcing Report, supra note 65, at 4 (``The benefits of 
outsourcing include lowering costs, increasing automation to speed 
up tasks and reduce the need for manual intervention, and providing 
flexibility to allow regulated entities to rapidly adjust both to 
the scope and scale of their activities.''); FFIEC, Information 
Technology Examination Handbook, Outsourcing Technology Services 
Booklet at 1 (June 2004) (``The ability to contract for technology 
services typically enables an institution to offer its customers 
enhanced services without the various expenses involved in owning 
the required technology or maintaining the human capital required to 
deploy and operate it.'').
---------------------------------------------------------------------------

    But that reliance is not riskless.\153\ As the ION incident 
illustrated, operational disruptions of third-party services, 
particularly of those important to a firm's operations or regulatory 
obligations, can present challenges for individual firms and even the 
financial system as a whole.\154\ The risks may vary from minor to 
significant, depending on the nature of the provider or the service 
being rendered, but they are inherent in the nature of a third-party 
service provider relationship, in which a firm relies on the 
performance of another entity and the quality and reliability of that 
performance is not in the direct control of the firm.\155\ The 
Commission accordingly believes that, in order to support their 
operational resilience, covered entities should have a plan in place to 
identify, monitor, manage, and assess the risks associated with third-
party relationships.\156\
---------------------------------------------------------------------------

    \153\ See Prudential Third-Party Guidance, 88 FR 37927 (``[T]he 
use of third parties can reduce a banking organization's direct 
control over activities and may introduce new risks or increase 
existing risks, such as operational, compliance, and strategic 
risks.'').
    \154\ See supra note 20 and accompanying text.
    \155\ See Prudential Third-Party Guidance, 88 FR 37927 
(``Increased risk often arises from greater operational or 
technological complexity, newer or different types of relationships, 
or potential inferior performance by the third party. A banking 
organization can be exposed to adverse impacts, including 
substantial financial loss and operational disruption, if it fails 
to appropriately manage the risks associated with third-party 
relationships.'').
    \156\ For purposes of the proposed rule, the Commission would 
construe ``third-party service provider'' broadly and consistently 
with the terms ``third-party'' and ``business arrangement'' as used 
in the Prudential Third-Party Relationship Guidance. See id. 
(``Third-party relationships can include, but are not limited to, 
outsourced services, use of independent consultants, referral 
arrangements, merchant payment processing services, services 
provided by affiliates and subsidiaries, and joint ventures. Some 
banking organizations may form third-party relationships with new or 
novel structures and features--such as those observed in 
relationships with some financial technology (fintech) 
companies.'').

---------------------------------------------------------------------------

[[Page 4722]]

    As mentioned above, the Commission appreciates that the risks 
presented by individual third-party relationships may vary depending on 
the firm, the provider, or service. For instance, risks may be more 
elevated if the service provider is a new entrant to the marketplace or 
the service relates to a new, untested technology, and covered entities 
with more numerous or intricate third-party relationships may 
experience greater overall risk from third parties by virtue of the 
number and complexity of their relationships. Accordingly, the proposed 
rule would not require third-party relationship programs to apply an 
identical degree of scrutiny and oversight to all third-party 
relationships. Instead, consistent with the principles-based focus of 
the proposed rule, and the proposed (b)(3) standard, the Commission 
would expect covered entities to adopt a third-party relationship 
program that helps them identify and assess the risks of their existing 
and future third-party relationships and adapt their risk management 
practices consistent with those risks, their risk appetite and risk 
tolerance limits, and the nature, size, scope, complexity, and risk 
profile of their business activities, following generally accepted 
standards and best practices.\157\
---------------------------------------------------------------------------

    \157\ See paragraph (b)(3) of proposed Commission regulations 
1.13 and 23.603. See also NFA Third-Party Notice, supra note 43 
(``NFA recognizes that a Member must have flexibility to adopt a 
written supervisory framework relating to outsourcing functions to a 
Third-Party Service Provider that is tailored to a Member's specific 
needs and business . . .''); Prudential Third-Party Guidance, 88 FR 
37924 (``[I]t is the responsibility of the banking organization to 
identify and evaluate the risks associated with each third-party 
relationship and to tailor its risk management practices, 
commensurate with the banking organization's size, complexity, and 
risk profile, as well as with the nature of its third-party 
relationships.'').
---------------------------------------------------------------------------

1. Third-Party Relationship Lifecyle Stages--Proposed Paragraph (e)(1)
    To guide covered entities in developing their third-party 
relationship programs, and to ensure that the programs address the full 
scope of risks that third-party relationships can present, the proposed 
rule would require the third-party relationship program to describe how 
the covered entity would address the risks attendant to each stage of 
the third-party relationship lifecycle.\158\ Specifically, the proposed 
rule would require the program to address: (i) pre-selection risk 
assessment; (ii) the due diligence process for prospective third-party 
relationships; \159\ (iii) contractual negotiations; (iv) ongoing 
monitoring during the course of the relationship; and (v) termination 
of the relationship, including preparations for planned and unplanned 
terminations.\160\
---------------------------------------------------------------------------

    \158\ See paragraph (e)(1) of proposed Commission regulations 
1.13 and 23.603.
    \159\ The proposed rule is not intended to interfere with the 
obligation in Commission regulation 1.11(e) for FCMs to conduct 
onboarding and ongoing due diligence on depositories carrying 
customer funds. See 17 CFR 1.11(e)(3)(i)(A)-(B).
    \160\ See paragraphs (e)(1)(i)-(v) of proposed Commission 
regulations 1.13 and 23.603. See also NFA Third-Party Notice 
(requiring NFA members to establish a written supervisory framework 
that includes an initial risk assessment, onboarding due diligence, 
ongoing monitoring, termination, and recordkeeping); 12 CFR part 30, 
app. B, III.D. (Oversee Service Provider Arrangements) (requiring 
financial institutions to exercise appropriate due diligence in 
selecting service providers, contract with service providers to 
implement ``appropriate measures designed to meet the objectives 
of'' prudential guidelines for information security; and, where 
indicated by its risk assessment, monitor service providers to 
confirm they have satisfied their obligations).
---------------------------------------------------------------------------

    Each of these stages offers covered entities opportunities to 
assess and take steps to mitigate the potential risks associated with 
reliance on third-party service providers. At the outset, covered 
entities should determine whether it is appropriate for a third-party 
service provider to perform a particular service and evaluate the 
associated risks.\161\ For instance, the determination to secure a 
third-party service provider may carry greater risks where the service 
directly impacts a regulatory requirement, where the third-party 
service provider would be given direct access to covered information, 
or where a disruption of services could impact regulatory compliance or 
have a negative impact on customers or counterparties. Due diligence 
provides covered entities with information to assess whether a 
prospective third-party service provider is equipped, operationally and 
otherwise, to perform as expected.\162\ Contractual negotiations offer 
a possibility to mitigate potential risks by including provisions to 
assign specific responsibilities or liabilities, but may also 
contribute to risks, especially where a covered entity may have more 
limited negotiating power.\163\ Ongoing monitoring of a third-party 
service provider's performance likewise aids covered entities in 
identifying whether selected third-party service providers remain able 
to perform as expected throughout the duration of the 
relationship.\164\ Finally, the manner in which the relationship ends 
can have a major impact on the covered entity, particularly if it ends 
due to a breach of performance. Plans to address the termination, 
through contingencies or otherwise, could therefore prove important to 
ensuring the covered entity's ongoing operations.\165\ The Commission 
therefore preliminarily believes that effective management of third-
party risks would require covered entities to have a program that 
establishes methodologies and practices to assess and manage the risks 
of third-party relationships throughout each of these five stages of 
the third-party relationship lifecycle.\166\
---------------------------------------------------------------------------

    \161\ See NFA Third-Party Notice (``At the outset, a Member 
should determine whether a particular regulatory function is 
appropriate to outsource and evaluate the risks associated with 
outsourcing the function.''); Prudential Third-Party Guidance, 88 FR 
37928 (``As part of sound risk management, effective planning allows 
a banking organization to evaluate and consider how to manage risks 
before entering into a third-party relationship.'').
    \162\ See IOSCO Outsourcing Report, supra note 65, at 18 (``It 
is important that regulated entities exercise due care, skill, and 
diligence in the selection of service providers. The regulated 
entity should be satisfied that the service provider has the ability 
and capacity to undertake the provision of the outsourced task 
effectively at all times.''); Prudential Third-Party Guidance, 88 FR 
37929 (``Conducting due diligence on third parties before selecting 
and entering into third-party relationships is an important part of 
sound risk management. It provides management with the information 
needed about potential third parties to determine if a relationship 
would help achieve a banking organization's strategic and financial 
goals. The due diligence process also provides a banking 
organization with the information needed to evaluate whether it can 
appropriately identify, monitor, and control risks associated with 
the particular third-party relationship.'').
    \163\ See IOSCO Outsourcing Report at 21 (``Contractual 
provisions can reduce the risks of non-performance or aid the 
resolution of disagreements about the scope, nature, and quality of 
the service to be provided.'').
    \164\ See id. at 18 (``The regulated entity should also 
establish appropriate processes and procedures for monitoring the 
performance of the service provider on an ongoing basis to ensure 
that it retains the ability and capacity to continue to provide the 
outsourced task.'').
    \165\ See id. at 33 (``Where a task is outsourced, there is an 
increased risk that the continuity of the particular task in terms 
of daily management and control of that task, related information 
and data, staff training, and knowledge management, is dependent on 
the service provider continuing in that role and performing that 
task.'').
    \166\ See Prudential Third-Party Guidance, 88 FR 37928 
(``Effective third-party risk management generally follows a 
continuous life cycle for third-party relationships.'').
---------------------------------------------------------------------------

2. Heightened Requirements for Critical Third-Party Service Providers--
Proposed Paragraph (e)(2)
    Although the Commission appreciates that third-party risks are not 
uniform, it nevertheless believes that certain circumstances warrant 
enhanced risk management practices across all covered entities. 
Specifically, the proposed rule would require that the third-party 
relationship program establish heightened due diligence and ongoing

[[Page 4723]]

monitoring practices with respect to third-party service providers 
deemed critical third-party service providers.\167\ The proposed rule 
would define ``critical third-party service provider'' to mean a third-
party service provider, the disruption of whose performance would be 
reasonably likely to either (a) significantly disrupt a covered 
entity's businesses operations or (b) significantly and adversely 
impact the covered entity's counterparties or customers.\168\ The 
Commission understands that it is common practice for financial 
institutions, whether by regulatory mandate or otherwise, to identify a 
subset of services or providers more central to their operations and 
apply greater scrutiny and oversight to them to ensure the services are 
provided without disruption. The proposed rule's definition of 
``critical third-party service provider'' focuses on the potential 
impact a disruption to performance would have on the covered entity's 
regulated business operations, customers, or counterparties. Where such 
an impact would be significant, as assessed in light of the covered 
entity's business activities, risk appetite, and risk tolerance limits, 
the Commission believes heightened due diligence for potential critical 
third-party service providers and ongoing monitoring for onboarded 
critical third-party service providers are warranted to both mitigate 
the potential for such an occurrence and to promote the ability for 
covered entities to take early and effective action if a critical 
third-party service provider's performance is disrupted to mitigate the 
impact and effectively recover.\169\
---------------------------------------------------------------------------

    \167\ See paragraph (e)(2) of proposed Commission regulations 
1.13 and 23.603.
    \168\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``critical third-party service provider'').
    \169\ See NFA Third-Party Notice, supra note 43 (``Additionally, 
a Member's onboarding due diligence process should be heightened for 
Third-Party Service Providers that obtain or have access to a 
Member's critical and/or confidential data and those that support a 
Member's critical regulatory-related systems (e.g., handling 
customer segregated funds, keeping required records, filing 
financial reports, etc.).'').
---------------------------------------------------------------------------

3. Third-Party Service Provider Inventory--Proposed Paragraph (e)(3)
    To help ensure that covered entities implement a comprehensive and 
consistent approach to identifying their critical third-party service 
providers, covered entities would be required to create, maintain, and 
regularly update an inventory of third-party service providers they 
have engaged to support their activities as a covered entity, 
identifying whether each third-party service provider in the inventory 
is a critical third-party service provider.\170\ The Commission 
preliminarily believes that the process of creating an inventory of 
service providers, particularly the deliberative process involved in 
designating certain providers as critical third-party service 
providers, would help covered entities assess and evaluate the risks 
they face from their third-party service providers, and determine when 
to apply heightened monitoring. Maintaining such an inventory would 
also reflect that not all third-party service providers present the 
same level and types of risks to a covered entity, and would help 
covered entities assess and evaluate who is providing services and the 
attendant risk that any disruption of those services would have on a 
covered entity's business. The inventory would also provide covered 
entities a holistic view of their third-party service providers, which 
would help them better understand how risks identified during due 
diligence and ongoing monitoring may interact or require additional 
management. Having a clear understanding of who is providing services, 
particularly those services identified as critical, would further 
assist covered entities in identifying potential interconnections that 
may not be readily apparent if the entities are not assembled and 
reviewed collectively.\171\
---------------------------------------------------------------------------

    \170\ See paragraph (e)(3) of proposed Commission regulations 
1.13 and 23.603.
    \171\ Prudential Third-Party Guidance, 88 FR 37927 
(``Maintaining a complete inventory of its third-party relationships 
and periodically conducting risk assessments for each third-party 
relationship supports a banking organization's determination of 
whether risks have changed over time and to update risk management 
practices accordingly.'').
---------------------------------------------------------------------------

    Covered entities relying on a consolidated third-party relationship 
program would be able to rely on an enterprise-wide third-party service 
provider inventory provided that the inventory meets the requirements 
of the proposed rule, including identifying critical third-party 
service providers specific to the covered entity.\172\
---------------------------------------------------------------------------

    \172\ See paragraph (c)(4)(i) of proposed Commission regulations 
1.13 and 23.603 (allowing covered entities to rely on consolidated 
programs).
---------------------------------------------------------------------------

4. Retention of Responsibility--Proposed Paragraph (e)(3)
    For the avoidance of doubt, the proposed rule would make clear 
that, notwithstanding their determination to rely on a third-party 
service provider, covered entities remain responsible for meeting their 
obligations under the CEA and Commission regulations.\173\ This 
provision reflects the principle, widely recognized among financial 
regulatory authorities, including the Commission, that while financial 
institutions may be able to delegate functions to third-party service 
providers, they cannot delegate their responsibility to comply with 
applicable laws and regulations.\174\ This provision is intended to 
ensure that covered entities are aware that they remain responsible for 
the performance of all applicable regulatory functions, whether 
performed by the covered entity or by a third-party service provider, 
and are accordingly fully subject to the Commission's jurisdiction, 
including its examination and enforcement authorities.
---------------------------------------------------------------------------

    \173\ See paragraph (e)(3) of proposed Commission regulations 
1.13 and 23.603.
    \174\ See NFA Third-Party Notice, supra note 43 (``If a Member 
outsources a regulatory function, however, it remains responsible 
for complying with NFA and/or CFTC Requirements and may be subject 
to discipline if a Third-Party Service Provider's performance causes 
the Member to fail to comply with those Requirements.''); Prudential 
Third-Party Guidance, 88 FR 37927 (``A banking organization's use of 
third parties does not diminish its responsibility to meet these 
requirements to the same extent as if its activities were performed 
by the banking organization in-house.''); IOSCO Outsourcing Report, 
supra note 65, at 12 (``The regulated entity retains full 
responsibility, legal liability, and accountability to the regulator 
for all tasks that it may outsource to a service provider to the 
same extent as if the service were provided in-house.''). See also 
17 CFR 37.204 (SEFs); 17 CFR 38.154 (DCMs); 17 CFR 39.18(d) (DCOs) 
(providing that such registered entities retain responsibility for 
meeting relevant regulatory requirements when entering into 
contractual outsourcing arrangements).
---------------------------------------------------------------------------

5. Application to Existing Third-Party Relationships
    Should the proposed rule be adopted as final, the Commission would 
expect covered entities to apply their third-party relationship 
programs across all stages of the relationship lifecycle on a going-
forward basis. Although the Commission would not require covered 
entities to renegotiate or terminate existing agreements, it would 
expect covered entities to conduct ongoing monitoring of existing 
third-party service providers consistent with the program and this 
regulation and, to the extent possible, to rely on its program with 
respect to termination. For any third-party service providers 
contemplated or onboarded after the effective date of the proposed 
rule, or for any contracts renegotiated or renewed after the effective 
date of the rule, however, the Commission would expect covered entities 
to apply the entirety of the third-party relationship program from pre-
selection through termination.

[[Page 4724]]

6. Guidance on Third-Party Relationship Programs--Proposed Paragraph 
(e)(4); Appendix A to Part 1; Appendix A to Subpart J of Part 23
    To assist covered entities in developing third-party relationship 
programs that adequately address risks from third-party relationships, 
the Commission is proposing guidance outlining potential risks, 
considerations, and strategies for covered entities to consider.\175\ 
The proposed guidance addresses all five stages of the relationship 
lifecycle and, if adopted, would be codified as appendices to parts 1 
and 23 of the Commission's regulations for FCMs and swap entities, 
respectively.\176\ Designed to be broadly applicable to all covered 
entities, the proposed guidance identifies actions and factors for 
covered entities to consider. The factors and actions identified are 
not exhaustive, nor should they be viewed as a required checklist. The 
nonbinding guidance would merely be intended to aid covered entities as 
they design third-party relationship programs tailored to their own 
unique circumstances, consistent with the general ORF ``appropriate and 
proportionate standard'' discussed above.
---------------------------------------------------------------------------

    \175\ See paragraph (e)(4) of proposed Commission regulations 
1.13 and 23.603.
    \176\ See proposed Appendix A to part 1 and proposed Appendix A 
to Subpart J of part 23.
---------------------------------------------------------------------------

    In developing the proposed guidance, the Commission considered the 
recommendations of international standard-setting bodies, including 
IOSCO and FSB, in light of observations and lessons derived from its 
own oversight activities.\177\ In an effort to incorporate as much 
consensus as possible, the Commission also gave special consideration 
to existing guidance from NFA and the guidance on third-party 
relationships recently adopted by prudential regulators, both of which 
currently apply to at least some covered entities.\178\
---------------------------------------------------------------------------

    \177\ See IOSCO Outsourcing Report, supra note 65; FSB Third-
Party Report, supra note 44.
    \178\ See NFA Third-Party Notice; Prudential Third-Party 
Guidance, 88 FR 37920.
---------------------------------------------------------------------------

    The full text of the guidance is included at the end of this notice 
as proposed appendix A to part 1 for FCMs and proposed appendix A to 
subpart J of part 23. The guidance is identical in substance for FCMs 
and swap entities.
7. Request for Comment
    The Commission invites comment on all aspects of the proposed 
third-party relationship program requirement and associated guidance, 
including the following questions:
    1. Scope of Application. NFA's interpretive notice on third-party 
relationships is limited in scope to ``outsourcing,'' which NFA defines 
as third-party relationships in which an NFA member has a third-party 
service provider or vendor perform certain functions that would 
otherwise by undertaken by the member itself to comply with NFA and 
CFTC requirements.\179\ The proposed rule would follow the approach 
taken by prudential regulators in their third-party guidance, which 
more broadly addresses any circumstances where banking organizations 
rely on third parties for products, services, or activities to 
``capture[ ] the full range of third-party relationships that may pose 
risk to banking organizations.'' \180\ Should the Commission consider 
limiting the scope of its guidance to outsourcing of CFTC regulatory 
obligations? Why or why not? Please explain.
---------------------------------------------------------------------------

    \179\ See NFA Third-Party Notice, supra note 43.
    \180\ See Prudential Third-Party Guidance, 88 FR 37921-22.
---------------------------------------------------------------------------

    2. Critical third-party service provider. The proposed rule 
includes a definition of ``critical third-party service provider.'' The 
Commission understands it is common practice for financial institutions 
to identify and apply heightened oversight of third-party service 
providers they deem critical. NFA's interpretive notice related to 
third-party relationships, for instance, advises members to tailor the 
frequency and scope of ongoing monitoring reviews to the criticality of 
and risk associated with the outsourced function but does not define 
``criticality'' for covered entities. Is the Commission's proposed 
definition consistent with existing standards or definitions of 
``criticality'' applied by covered entities? If not, how is it 
different? Should the Commission consider allowing covered entities to 
generate and apply their own definition of ``critical third-party 
service provider''? Why or why not? Please explain.
    3. Guidance--Affiliated Third-Party Service Providers. The proposed 
third-party relationship program requirement would apply to all third-
party relationships, including where the third-party is an affiliate of 
the covered entity. This position is consistent with both NFA and 
prudential guidance related to third-party relationships.\181\ 
Nevertheless, the Commission recognizes that arrangements with 
affiliates may present different or lower risks than with unaffiliated 
third parties. Should the Commission consider including any additional 
guidance with respect to the management of third-party service 
providers that are affiliated entities? If so, what factors should 
covered entities consider when evaluating relationships with affiliated 
third-party service providers?
---------------------------------------------------------------------------

    \181\ See NFA Third-Party Notice at n.1 (``Further, even if a 
Member outsources a regulatory obligation to an affiliate, . . . a 
Member should comply with this Notice's requirements.''); Prudential 
Third-Party Guidance, 88 FR 37927 (``Third-party relationships can 
include, but are not limited to, . . . services provided by 
affiliates and subsidiaries. . .'').
---------------------------------------------------------------------------

    4. Guidance--Due Diligence. The proposed guidance recommends that 
covered entities perform due diligence on prospective third-party 
service providers to assess their ability to deliver contracted 
services to an acceptable standard (i.e., consistent with risk appetite 
and risk tolerance limits) and provides examples of information that 
covered entities should review and sources for obtaining that 
information.
    a. Are there any additional due diligence tasks that should be 
conducted by the covered entity beyond reviewing information about the 
potential third-party service provider? Are there additional risks that 
should be included in the guidance for the covered entity to inquire 
into? If yes, please identify and explain.
    b. Are there additional sources of due diligence information beyond 
those listed in the guidance (see section B of the guidance) that 
should be included in the guidance? If yes, please identify and 
explain.
    c. Should covered entities be advised to periodically refresh their 
due diligence, or upon the occurrence of specific triggers (e.g., a 
material change to the service outsourced)? Why or why not? Would such 
a recommendation be duplicative of the covered entity's ongoing 
monitoring activities, or would the subsequent due diligence provide 
additional valuable information to the covered entity beyond that 
provided by ongoing monitoring? Why or why not? Please explain.
    d. The proposed guidance does not recommend that covered entities 
perform due diligence directly on any subcontractors secured by third-
party service providers. Rather, the Commission's guidance suggests 
that covered entities review the operational risk management practices 
of the potential third-party service provider with respect to their 
subcontractors. Should the Commission recommend more enhanced due 
diligence of subcontractors? Why or why not? What

[[Page 4725]]

means are practicable for covered entities to conduct due diligence on 
subcontractors to their third-party service providers? Please identify 
and explain.

E. Business Continuity and Disaster Recovery Plan--Proposed Paragraph 
(f)

    The third component of the ORF would be a business continuity and 
disaster recovery (BCDR) plan, defined as a written plan outlining the 
procedures to be followed in the event of an emergency or other 
significant disruption to the continuity of a covered entity's normal 
business operations and that meets the requirements of the proposed 
rule.\182\ Similar to the incident response plan (and, in extreme 
cases, possibly triggered by an incident covered by the incident 
response plan), the proposed BCDR plan requirement recognizes the 
operational reality that not all operational disruptions can be 
prevented or immediately mitigated and asks covered entities to 
strategize and implement plans for how to minimize the impact to 
operations, customers, and counterparties when such adverse events 
occur.
---------------------------------------------------------------------------

    \182\ See paragraph (f) proposed Commission regulations 1.13 and 
23.603. See also paragraph (a) of proposed Commission regulations 
1.13 and 23.603 (defining ``business continuity and disaster 
recovery plan'').
---------------------------------------------------------------------------

    Although NFA requires FCMs to establish and maintain a BCDR plan, 
if adopted, the proposed rule would create a new CFTC BCDR plan 
requirement for FCMs.\183\ Current Commission regulation 23.603 
contains an active BCDR plan requirement for swap entities.\184\ In 
essence, the proposal would make certain amendments to the CFTC BCDR 
plan requirement for swap entities and expand the requirement to 
include FCMs. The proposed amendments to the swap entity BCDR plan 
requirement have two general purposes. For the most part, the proposal 
would streamline and simplify some of the language to help it further 
conform to the proposed ORF rule more broadly, in ways the Commission 
intends to be non-substantive. The proposal would also make a few 
substantive changes, informed either by the Commission's review of 
NFA's and CME's current BCDR requirements for their members or by its 
decade of experience applying current Commission regulation 23.603 to 
swap entities.\185\ The proposed substantive changes, each subsequently 
discussed in this notice, relate to either the defined scope of and 
recovery objective for the BCDR plan or the testing and audit 
requirements for the plan.
---------------------------------------------------------------------------

    \183\ See NFA Rule 2-38, supra note 43.
    \184\ See 17 CFR 23.603.
    \185\ See NFA Rule 2-38; CME Rule 983 (Disaster Recovery and 
Business Continuity).
---------------------------------------------------------------------------

    Current Commission regulation 23.603 includes requirements that the 
proposed rule would apply to the entirety of the proposed ORF more 
broadly. Those requirements include requirements to: distribute the 
BCDR plan to relevant employees (current Commission regulation 
23.603(c)); notify the Commission of emergencies or disruptions 
(current Commission regulation 23.603(d)); identify emergency contacts 
(current Commission regulation 23.603(e)); review, test, and update the 
BCDR plan (current Commission regulation 23.603(f) and (g)); and 
recordkeeping (current Commission regulation 23.603(i)). Each of these 
requirements is discussed in the relevant sections of this notice that 
follow.\186\ Accordingly, the Commission's proposed amendment to the 
current BCDR audit requirement is discussed in the context of the ORF's 
broader proposed review and testing requirements.\187\
---------------------------------------------------------------------------

    \186\ See sections II.F (Training), G (Review and Testing), H 
(Required Notifications), and I (Emergency Contacts, Recordkeeping) 
of this notice, infra. The proposed rule would not retain Commission 
regulation 23.603(h), which merely articulates the fact that swap 
entities are required to comply with Commission's BCDR requirements 
in addition to any other applicable BCDR requirements from other 
regulatory bodies. See 17 CFR 23.603(h). The Commission accordingly 
views this amendment as non-substantive.
    \187\ See paragraph (h) of proposed Commission regulations 1.13 
and 23.603 and section II.G, infra.
---------------------------------------------------------------------------

1. Definition of ``Business Continuity and Disaster Recovery Plan''
    The proposed definition of ``business continuity and disaster 
recovery plan'' is slightly modified from the language in the current 
BCDR plan requirement for swap entities. Current Commission regulation 
23.603 requires swap entities to establish and maintain a BCDR plan 
that ``outlines the procedures to be followed in the event of an 
emergency or other disruption of its normal business activities.'' 
\188\ As stated above, the proposed rule would specify that the BCDR 
plan would need to address ``significant'' disruptions to the 
continuity of a covered entity's normal business operations, which the 
Commission preliminarily believes is more in line with what would 
constitute an ``emergency'' that would result in activation of a BCDR 
plan and how Commission regulation 23.603 has operated in 
practice.\189\
---------------------------------------------------------------------------

    \188\ See 17 CFR 23.603(a).
    \189\ See also NFA Rule 2-38, supra note 43 (requiring certain 
members, including FCMs, to establish a BCDR plan to be followed in 
the event of a ``significant business disruption''). The proposed 
language change from ``normal business activities'' to ``the 
continuity of normal business operations'' is intended only to bring 
the language more in line with the focus of the proposed ORF rule on 
the resiliency of operations and is not intended to have substantive 
effect. See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``business continuity and disaster recovery 
plan''); 17 CFR 23.603(a).
---------------------------------------------------------------------------

2. Purpose--Proposed Paragraph (f)(1)
    Under the proposed rule, the BCDR plan would need to be reasonably 
designed to enable covered entities to: (i) continue or resume normal 
business operations with minimal disruption to customers or 
counterparties and the markets and (ii) recover and make use of all 
covered information, as well as any other data, information, or 
documentation required to be maintained by law and regulation.\190\ The 
Commission preliminarily believes that this standard, which emphasizes 
the need to quickly resume regulated activities and to recover all 
information kept and required to be kept in connection with those 
activities, supports the overall regulatory objectives of the ORF rule 
of enhancing the operational resilience of covered entities to promote 
the protection of customers and the mitigation of system risk.
---------------------------------------------------------------------------

    \190\ See paragraphs (f)(1)(i)-(ii) of proposed Commission 
regulations 1.13 and 23.603. See also 17 CFR 23.603(a).
---------------------------------------------------------------------------

    Current Commission regulation 23.603 requires swap entities' BCDR 
plans to ``be designed to enable the [swap entity] to continue or to 
resume any operations by the next business day with minimal disturbance 
to its counterparties and the market.'' The proposed rule would modify 
this language by requiring that the BCDR plan be ``reasonably'' 
designed to continue or resume operations with minimal disruption and 
by removing the requirement that such operations be resumed ``by the 
next business day.'' \191\ The Commission views the qualification that 
the BCDR plan be ``reasonably'' designed as simply a more concrete 
expression of the Commission's current expectations, in recognition 
that what might be necessary to achieve recovery is not an absolute 
fact and may vary depending on the circumstances, including the nature, 
size, scope, complexity, and risk profile of a covered entity's 
business activities.\192\ The

[[Page 4726]]

reasonableness of the plan would thus be viewed in light of the 
proposed (b)(3) standard (i.e., what is appropriate and proportional to 
the covered entity, following generally accepted standards and best 
practices).
---------------------------------------------------------------------------

    \191\ The Commission views the use of the phrase ``minimal 
disturbance'' in current Commission regulation 23.603 as equivalent 
to the phrase ``minimal disruption'' in the proposed rule and 
therefore views this change in language with respect to swap 
entities to be non-substantive. Compare 17 CFR 23.603(a) with 
paragraph (f)(1) of proposed Commission regulations 1.13 and 23.603.
    \192\ See also NFA Rule 2-38 (requiring BCDR plans be 
``reasonably designed'') (emphasis added).
---------------------------------------------------------------------------

    The proposal not to include a next business day recovery time 
objective is based in the Commission's preliminary view that, depending 
on the circumstances, a next business day recovery standard could be 
either too short or too long, to the point where it may be misdirecting 
the focus of the rule. The Commission understands that the ``next 
business day'' standard has been common for businesses to employ for 
BCDR purposes in the context of purely physical disasters, such as 
power outages or natural disasters. Based on its experience in recent 
years, however, the Commission believes a next-day standard may in some 
cases be impractical in an era where rapid innovation has deepened and 
expanded reliance on technology among financial institutions, and 
pandemics and cyberattacks have become more prevalent or alarming forms 
of disruption. With the ION incident, for instance, it took weeks 
before back office operations were back to normal. Nevertheless, the 
impact to customers and the markets during that time was manageable. 
Were even one business day to stretch between FCMs paying and 
collecting margin, for example, the Commission does not believe the 
impact to customers or the markets could be characterized as minimal.
    Accordingly, the Commission preliminarily believes that by not 
including a precise recovery time objective, such as next business day, 
the emphasis of the proposed BCDR plan standard appropriately lies on 
ensuring that any disruption to customers, counterparties, and the 
markets is ``minimal.'' \193\ For that standard to be met, however, the 
Commission would still expect covered entities to plan for a recovery 
that is expeditious. The longer a covered entity is not operating as 
usual, the more likely it is that customers and counterparties may be 
affected and that a crisis in confidence could develop, potentially 
affecting the industry more broadly.
---------------------------------------------------------------------------

    \193\ The Commission notes that neither NFA nor CME includes a 
specific recovery time objective in its BCDR plan requirements. See 
NFA Rule 2-38; CME Rule 938.
---------------------------------------------------------------------------

    Current Commission regulation 23.603 requires swap entities' BCDR 
plans to be designed ``to recover all documentation and data required 
to be maintained by applicable law and regulation.'' The proposal to 
require covered entities to reasonably design their BCDR plans to 
``recover and make use of all covered information, as well as any other 
data, information, or documentation required to be maintained by law 
and regulation'' is intended to both incorporate the proposed defined 
term ``covered information,'' and make clear the need to also preserve 
the availability of the recovered data and information (i.e., reliable 
access to and use of information), which the Commission believes is an 
integral component of information and technology security.\194\ The 
Commission believes that making plans to ensure covered information--
sensitive or confidential information and data the proposed ORF rule is 
designed, at its core, to ensure covered entities protect--as well as 
any other information covered entities are legally required to 
maintain, is recovered and accessible following an emergency is key to 
ensuring the protection of customers and counterparties and the ongoing 
orderly functioning of the commodity interest markets, as this 
information is vital to a covered entity's ability to assess its 
ongoing compliance with the Commission's regulations governing the 
requirements for covered entities.\195\
---------------------------------------------------------------------------

    \194\ See supra note 108 and accompanying text (discussing the 
``CIA triad'' of confidentiality, integrity, and availability).
    \195\ In designing a BCDR plan that would meet this recovery 
standard, the Commission would advise covered entities to identify a 
broad range of events that could constitute emergencies or pose 
significant disruptions, including natural events (e.g., hurricanes, 
wildfires), technical events (e.g., power failures, system 
failures), malicious activity (e.g., fraud, cyberattacks), failures 
of controls, and low likelihood but high impact events (e.g., 
terrorist attacks, pandemics), and consider potential impact on 
business operations and data and information.
---------------------------------------------------------------------------

3. Minimum Contents--Proposed Paragraph (f)(2)
    Consistent with the proposed (b)(3) standard for the ORF as a 
whole, the BCDR plan would need to be appropriate and proportionate to 
the covered entity, following generally accepted standards and best 
practices.\196\ Accordingly, should the proposal be adopted as final, 
the Commission would expect each BCDR plan to be highly tailored to 
each specific covered entity. However, the proposed rule would also 
require the BCDR plan to include certain minimum contents, which are 
generally comparable to the current requirements in Commission 
regulation 23.603.\197\
---------------------------------------------------------------------------

    \196\ See paragraph (b)(3) of proposed Commission regulations 
1.13 and 23.603.
    \197\ See paragraph (f)(2) of proposed Commission regulations 
1.13 and 23.603. See also 17 CFR 23.603(b). Although the exact 
language of the proposed minimum contents in paragraph (f)(2) may 
diverge somewhat from that of current Commission regulation 
23.603(b), the modifications were intended to streamline language 
and incorporate the proposed terms ``covered information'' and 
``covered technology.'' The Commission does not intend any of the 
changes to have a substantive impact on compliance with the 
Commission's BCDR plan requirement for swap entities.
---------------------------------------------------------------------------

    First, the proposed rule would require the BCDR plan to identify 
its covered information, as well as any other data or information 
required to be maintained by law or regulation, and to establish and 
implement procedures to backup or copy it with sufficient frequency and 
to store it offsite in either hard-copy or electronic format.\198\ The 
BCDR plan would also need to identify any resources, including covered 
technology, facilities, infrastructure, personnel, and competencies, 
essential to the operations of the swap entity or to fulfill the 
regulatory obligations of the swap entity, and establish and maintain 
procedures and arrangements to provide for their backup in a manner 
that is sufficient to meet the requirements of the rule (i.e., to 
continue or resume operations with minimal disruption, to recover and 
make use of information).\199\ These minimum requirements are intended 
to ensure that the BCDR plan meets the proposed recovery standard by 
ensuring covered entities have gone through the process of cataloging 
everything they need (information, technology, infrastructure, human 
capital, etc.) to operate as a covered entity, and have established 
ways to recover them and to continue or resume operations with minimal 
disruption to customers, counterparties, or the markets. Furthermore, 
in establishing arrangements for backup resources, the Commission would 
want covered entities to consider diversification to the greatest 
extent possible to reduce the likelihood that an emergency that affects 
a primary operating resource affects any planned backups. Accordingly, 
the proposed rule would require covered entities to establish backup 
arrangements for resources that are in one or more areas geographically 
separate from the covered entity's primary resources (e.g., a different 
power grid than the primary facility).\200\ The proposed rule would 
make clear those resources could be

[[Page 4727]]

provided by third-party service providers.\201\
---------------------------------------------------------------------------

    \198\ See paragraph (f)(2)(i) of proposed Commission regulations 
1.13 and 23.603. See also 17 CFR 23.603(b)(1), (b)(6).
    \199\ See paragraph (f)(2)(ii) of proposed Commission 
regulations 1.13 and 23.603. See also 17 CFR 23.603(b)(2), (b)(4), 
(b)(5).
    \200\ See paragraph (f)(2)(ii) of proposed Commission 
regulations 1.13 and 23.603. See also 17 CFR 23.603(b)(5).
    \201\ See id.
---------------------------------------------------------------------------

    To ensure that critical third-party service providers are given 
particular consideration when planning for disruptions, the proposed 
rule would specifically require the BCDR plan to identify potential 
disruptions to critical third-party service providers and establish a 
plan to minimize the impact of such potential disruptions.\202\ 
Additionally, given the importance of internal and external 
communication in times of crisis, and for duties and responsibilities 
to be well established, the proposed rule would require the BCDR plan 
to identify supervisory personnel responsible for implementing the BCDR 
plan, along with the covered entity's required ORF emergency contacts, 
and establish a procedure for communicating with relevant persons in 
the event of an emergency or significant disruption.\203\
---------------------------------------------------------------------------

    \202\ See paragraph (f)(2)(iii) of proposed Commission 
regulations 1.13 and 23.603. See also 17 CFR 23.603(b)(7) (identify 
``potential business interruptions encountered by third parties that 
are necessary to the continued operations of the swap dealer or 
major swap participant and a plan to minimize the impact of such 
disruptions'').
    \203\ See paragraphs (f)(2)(iv)-(v) of proposed Commission 
regulations 1.13 and 23.603. See also paragraph (k) of proposed 
Commission regulations 1.13 and 23.603 (requiring emergency 
contacts), discussed in section II.I.1 of this notice, infra; 17 CFR 
23.603(b)(3).
---------------------------------------------------------------------------

    The minimum contents of the proposed BCDR plan requirement were 
designed to align with the substance of the ``essential components'' of 
a BCDR plan identified in current Commission regulation 23.603(b), with 
certain modifications.\204\ The changes are intended to streamline 
language, incorporate the proposed BCDR plan standard and defined terms 
(e.g., covered information, covered technology, critical third-party 
service provider), and reorder and combine elements to improve 
readability and application. Key changes include:
---------------------------------------------------------------------------

    \204\ See 17 CFR 23.603(b).
---------------------------------------------------------------------------

     Replacing the identification or backup of documents and 
information essential to the continued operations of the swap entity 
and/or to fulfill the regulatory obligations of the swap dealer or 
major swap participant with covered information, as well as any other 
data or information required to be maintained by law and 
regulation.\205\ This change is intended to align the information 
required to be identified in the proposed BCDR plan with its purpose 
(recover and make use of all covered information, as well as any other 
data, information, or documentation required to be maintained by law 
and regulation).
---------------------------------------------------------------------------

    \205\ See proposed paragraph (f)(2)(i) of Commission regulations 
1.13 and 23.603; 17 CFR 23.603(b)(1) (Identification of the 
documents and data essential to the continued operations of the swap 
entity and to fulfill the obligations of the swap entity); (b)(6) 
(Back-up or copying of documents and data essential to the 
operations of the swap entity or to fulfill the regulatory 
obligations of the swap entity'').
---------------------------------------------------------------------------

     Specifying that data and information must be backed up or 
copied with sufficient frequency ``to meet the requirements of this 
section,'' to make clear that the backup frequency should be linked to 
the broader purpose of the BCDR plan (i.e., to continue or resume 
operations with minimal disruption and to recover and make use of in-
scope information).\206\
---------------------------------------------------------------------------

    \206\ Cf. 17 CFR 23.603(b)(6) (Back-up or copying, with 
sufficient frequency, of documents and data).
---------------------------------------------------------------------------

     Removing the qualification that resource backups be 
designed to achieve the timely recovery of data and documentation and 
to resume operations as soon as reasonably possible and generally 
within the next business day.\207\ This language could be viewed as in 
contradiction with the overall proposed purpose of the BCDR plan, which 
would not include a ``next business day'' recovery time objective.
---------------------------------------------------------------------------

    \207\ See 17 CFR 23.603(b)(4) (Procedures for, and the 
maintenance of, back-up facilities, systems, infrastructure, 
alternative staffing and other resources to achieve the timely 
recovery of data and documentation and to resume operations as soon 
as reasonably possible and generally within the next business day.).
---------------------------------------------------------------------------

     Replacing third parties that are necessary to the 
continued operations of the swap dealer or major swap participant with 
critical third-party service provider, as defined in the proposed rule, 
as the Commission believes these terms are intended to capture similar 
concepts.\208\
---------------------------------------------------------------------------

    \208\ See 17 CFR 23.603(b)(7) (Identification of potential 
business interruptions encountered by third parties that are 
necessary to the continued operations of the swap dealer or major 
swap participant and a plan to minimize the impact of such 
disruptions.).
---------------------------------------------------------------------------

4. Accessibility--Proposed Paragraph (f)(3)
    Finally, to ensure that the BCDR plan is available in the event of 
an emergency or other significant disruption that prevents a covered 
entity from accessing its primary office location, the proposed rule 
would require each covered entity to maintain copies of its BCDR plan 
at one or more accessible off-site locations.\209\
---------------------------------------------------------------------------

    \209\ See paragraph (e)(3) of proposed Commission regulations 
1.13 and 23.603. See also 17 CFR 23.603(c).
---------------------------------------------------------------------------

5. Request for Comment
    The Commission invites comment on all aspects of the proposed 
business continuity and disaster recovery plan requirement, including 
the following question:
    1. Recovery time objective. Under current Commission regulation 
23.603, the Commission requires swap entities to establish and maintain 
a BCDR plan that is designed to enable the swap entity to continue or 
resume any operations ``by the next business day'' with minimal 
disturbance to is counterparties.\210\ Noting that such a standard may 
pose some challenges, the Commission has proposed to not include a 
recovery time objective, relying on covered entities to establish a 
BCDR plan that allows for sufficiently exigent recovery so as to impose 
``minimal disruption'' to customers, counterparties, or the markets.
---------------------------------------------------------------------------

    \210\ See 17 CFR 23.603(a).
---------------------------------------------------------------------------

    a. Has a next business day standard posed challenges for swap 
entities to implement? Would such a standard be achievable for FCMs? 
Why or why not? Please explain.
    b. Should the Commission consider including additional language to 
ensure covered entities design BCDR plans that enable quick recovery 
(e.g., ``as soon as possible'' or ``as soon as practicable'')? Why or 
why not? Please explain.
    2. Transfer of business to another entity. NFA and CME rules allow 
for BCDR plans to include the possibility of transferring their 
business to another regulated entity in the event of an emergency or 
disruption. NFA Rule 2-38 provides that a BCDR plan ``shall be 
reasonably designed to . . . transfer its business to another Member 
with minimal disruption to its customers, other members, and the 
commodity futures markets.'' \211\ CME Rule 983 provides that clearing 
members must have procedures in place to allow them to continue to 
operate during periods of stress ``or to transfer accounts to another 
fully operational clearing member with minimal disruption to either 
[CME] or their customers.'' \212\ Do any covered entities currently 
have arrangements with other covered entities to transfer business or 
accounts in the event of an emergency or disruption? Should the 
Commission consider adding the option to transfer business to another 
regulated entity into its proposed BCDR rule? Why or why not? How would 
such a transfer function in practice? Please explain.
---------------------------------------------------------------------------

    \211\ See NFA Rule 2-38, supra note 43.
    \212\ See CME Rule 983, supra note 185.
---------------------------------------------------------------------------

F. Training and Plan Distribution--Proposed Paragraph (g)

    To support the effectiveness of the ORF by ensuring personnel are 
aware of relevant policies, procedures, and

[[Page 4728]]

practices, the proposed rule would require that each covered entity 
establish, implement, and maintain training with respect to all aspects 
of the ORF.\213\ Relevant training is important to ensuring the ORF 
operates as intended, and to supporting a firm culture that promotes 
and prioritizes operational resilience.\214\ The training would 
therefore need to include, at a minimum, (i) cybersecurity awareness 
training for all personnel and (ii) role-specific training for 
personnel involved in establishing, documenting, implementing, and 
maintaining the ORF.\215\ The importance of cybersecurity training is 
widely recognized, as incidents commonly occur because well-intentioned 
employees or other users make preventable mistakes.\216\ The Commission 
would further expect that role-specific training would include not only 
training on relevant policies and procedures but additional relevant 
threat and vulnerability response training for personnel involved in 
the development and maintenance of the information and technology 
security program (e.g., system administration courses for IT 
professionals, secure coding training for web developers).\217\
---------------------------------------------------------------------------

    \213\ See paragraph (g) of proposed Commission regulations 1.13 
and 23.603.
    \214\ See FFIEC Information Security Booklet, supra note 69, at 
17 (``Training ensures personnel have the necessary knowledge and 
skills to perform their job functions.''); CIS Critical Security 
Controls v.8., Control no. 14 (Security Awareness and Skills 
Training) at 43 (May 2021) (CIS Control 14) (training helps 
``influence behavior among the workforce to be security conscious 
and properly skilled to reduce cybersecurity risks to the 
enterprise'').
    \215\ See paragraphs (g)(1)(i)-(ii) of proposed Commission 
regulations 1.13 and 23.603. Proposed paragraph (g)(1)(ii) would 
supplant the current requirement in Commission regulation 23.603 for 
swap entities to train relevant employees on applicable components 
of the BCDR plan. See 17 CFR 23.603(c). The Commission does not 
intend any substantive difference in the BCDR plan training for swap 
entities.
    \216\ The FSB found that most successful cyberattacks involved 
human error, which is why training is important for all personnel. 
See FSB, Summary Report on Financial Sector Cybersecurity 
Regulations, Guidance and Supervisory Practices at 7 (Oct. 13, 
2017), available at https://www.fsb.org/wp-content/uploads/P131017-1.pdf. See also CIS Control 14 (``Users themselves, both 
intentionally and unintentionally, can cause incidents as a result 
of mishandling sensitive data, sending an email with sensitive data 
to the wrong recipient, losing a portable end-user device, using 
weak passwords, or using the same password they use on public site . 
. .); Prudential Operational Resilience Paper, supra note 11, at 11 
(``The firm provides cybersecurity awareness education especially to 
personnel engaged in the operations of critical operations and core 
business lines, . . . and adequately trains them to perform their 
information security-related duties and responsibilities consistent 
with related processes and agreements.'').
    \217\ See CISA, Incident Response Plan (IRP) Basics (advising 
that all staff need to understand their role in maintaining and 
improving the security of the organization), available at https://www.cisa.gov/sites/default/files/publications/Incident-Response-Plan-Basics_508c.pdf.
---------------------------------------------------------------------------

    As with all aspects of the ORF, if the proposal is adopted as 
final, the Commission would expect each covered entity's ORF training 
to meet the (b)(3) standard (i.e., be appropriate and proportionate to 
the nature, scope, and complexities of its business activities as a 
covered entity, following generally accepted standards and best 
practices).\218\ To ensure the training remains relevant overtime and 
that personnel are adequately informed with respect to the ORF, covered 
entities would also be required to provide and update their ORF 
training as necessary, but no less frequently than annually.\219\ 
Requiring that the training occur annually would be a new CFTC 
requirement with respect to the BCDR plan training requirement for swap 
entities.\220\ The Commission nevertheless believes an annual training 
requirement is necessary for staff involved in BCDR planning to ensure 
they remain up-to-date on changes to the BCDR plan following the annual 
reviews and testing of the plan.\221\
---------------------------------------------------------------------------

    \218\ See paragraph (b)(3) of proposed Commission regulations 
1.13 and 23.603; supra note 63 and accompanying text.
    \219\ See paragraph (g)(2) of proposed Commission regulations 
1.13 and 23.603.
    \220\ See 17 CFR 23.603(c).
    \221\ See paragraph (h) of proposed Commission regulations 1.13 
and 23.603, discussed in section II.G, infra.
---------------------------------------------------------------------------

    To further support the proposed training requirement and ensure 
relevant personnel have access to and are aware of the current 
information and technology security, third-party relationships, and 
BCDR plans that form the ORF, the proposed rule would require that 
covered entities distribute copies of those plans to relevant personnel 
and promptly provide any significant revisions thereto.\222\ This 
proposed plan distribution requirement is consistent with the current 
BCDR plan distribution requirement for swap entities in current 
Commission regulation 23.603.\223\
---------------------------------------------------------------------------

    \222\ See paragraph (g)(3) of proposed Commission regulations 
1.13 and 23.603.
    \223\ See 17 CFR 23.603(c) (Each swap entity shall distribute a 
copy of its business continuity and disaster recovery plan to 
relevant employees and promptly provide any significant revision 
thereto.).
---------------------------------------------------------------------------

Request for Comment
    The Commission invites comment on all aspects of the proposed 
training requirement.

G. Reviews and Testing--Proposed Paragraph (h)

    To ensure the ORF remains viable and effective over time, the 
proposed rule would require covered entities to establish, implement, 
and maintain a plan reasonably designed to assess its adherence to, and 
the effectiveness of, the ORF through regular reviews and risk-based 
testing.\224\ As discussed above, the purpose of the proposed ORF would 
be to identify, monitor, manage, assess, and report on risks relating 
to information and technology security, third-party relationships, and 
emergencies or other significant business disruptions.\225\ Monitoring 
and managing these risks is a dynamic, ever-evolving process, 
especially given the increased reliance on and rapid evolution of 
technological advancements and related cyber risks.\226\ The Commission 
believes regular reviews and testing are an important tool needed to 
confirm that systems and information remain protected, controls are 
working as expected, and policies and procedures are being 
followed.\227\ Accordingly, the Commission preliminarily believes that 
regular reviews and testing would provide covered entities with 
essential information about the actual quality, performance, and 
reliability of the ORF in relation to its objectives and regulatory 
requirements. The Commission further expects that reviews and testing 
would be key to revealing unknown gaps or weaknesses in systems or 
controls that could then be analyzed to identify corrective actions 
designed to improve overall operational resilience over time.\228\ The 
results of the reviews and testing should be used to support sound 
decision-making at the covered entity regarding prioritization and 
funding of resources in a manner

[[Page 4729]]

that furthers operational resilience.\229\ Without such regular reviews 
and testing, the Commission is concerned that the ORF would quickly 
grow stale and ineffective, allowing unseen vulnerabilities to go 
unaddressed and potentially weaken the stability of the covered entity 
or the financial system at large.
---------------------------------------------------------------------------

    \224\ See paragraph (h) of proposed Commission regulations 1.13 
and 23.603.
    \225\ See paragraph (b)(1) of proposed Commission regulations 
1.13 and 23.603, supra note 55 and accompanying text.
    \226\ See Prudential Operational Resilience Paper, supra note 
11, at 9 (``The firm also regularly reviews and updates its systems 
and controls for security against evolving threats including cyber 
threats and emerging or new technologies.'').
    \227\ See, e.g., 17 CFR 37.1401 (SEFs); 17 CFR 38.1051 (DCMs); 
17 CFR 39.18 (DCOs); 17 CFR 49.24 (SDRs) (requiring system safeguard 
testing). See also FFIEC Information Security Booklet, supra note 69 
(providing that entities should have a documented testing and 
evaluation plan).
    \228\ See also CPMI IOSCO Cyber Resilience Guidance, supra note 
123, at 18 (``Sound testing regimes produce findings that are used 
to identify gaps in stated resilience objectives and provide 
credible and meaningful inputs to the [entity's] cyber risk 
management process. Analysis of testing results provides direction 
on how to correct weaknesses or deficiencies in the cyber resilience 
posture and reduce or eliminate identified gaps.'').
    \229\ See id. at 18 (``The results of the testing programme 
should be used by the [entity] to support the ongoing improvement of 
its cyber resilience.'').
---------------------------------------------------------------------------

1. Reviews--Proposed Paragraph (h)(1)
    Under the proposed rule, reviews would need to include an analysis 
of the adherence to, and the effectiveness of, the ORF, as well as any 
recommendations for modifications or improvements that address root 
causes of issues identified by the review.\230\ Again, the Commission 
believes that the process of reviewing the ORF to evaluate both its 
current effectiveness and make recommendations for prospective 
improvements that relate to deficiencies found through the review would 
help ensure that the ORF remains effective at managing operational 
resilience as circumstances change over time.
---------------------------------------------------------------------------

    \230\ See paragraph (h)(1) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

    The proposed rule would require covered entities to conduct such 
reviews at least annually and in connection with any material change to 
the activities or operations of the covered entity that is reasonably 
likely to affect the risks addressed by the ORF.\231\ An annual review 
standard is consistent with the Commission's existing review 
requirement for the RMP for covered entities, the BCDR plan for swap 
entities, and NFA's ISSP Interpretive Notice.\232\ Although the 
Commission would expect the ORF to be reviewed at least annually in its 
entirety, including not only the required plans but training and 
governance, the reviews could be broken into phases, staged over the 
course of the year. The Commission preliminarily believes that 
requiring the ORF to be reviewed on at least an annual basis and in 
connection with any relevant, material business change is sufficiently 
frequent to help ensure that the ORF remains effective and continues to 
meet its objectives over time.
---------------------------------------------------------------------------

    \231\ Id.
    \232\ See 17 CFR 1.11(f)(1); 17 CFR 23.600(e)(1) (requiring 
covered entities to review their RMPs on an annual basis or upon any 
material change in the business reasonably likely to alter their 
risk profile); 17 CFR 23.603(f) (requiring an annual review of swap 
entities' BCDR plan); NFA ISSP Notice, supra note 43 (providing that 
members should perform a regular review of their information systems 
security program at least once every twelve months).
---------------------------------------------------------------------------

    The proposed review requirement for the ORF would replace the 
similar annual review requirement for swap entities' BCDR plans 
contained in current Commission regulation 23.603. Current Commission 
regulation 23.603(f) requires that a member of senior management for a 
swap entity review the BCDR plan annually or upon any material change 
to the business and to document any deficiencies found or corrective 
action taken.\233\ The Commission preliminarily believes that the 
proposed annual review of the ORF, which would encompass a review of 
the BCDR plan, is sufficient to ensure the ORF's effectiveness and that 
it would no longer be necessary for a separate review of the BCDR plan 
to be conducted by senior management.
---------------------------------------------------------------------------

    \233\ See 17 CFR 23.603(f).
---------------------------------------------------------------------------

2. Testing--Proposed Paragraph (h)(2)
    With respect to risk-based testing of the ORF, the proposed rule 
would generally provide that covered entities determine the frequency, 
nature, and scope of the testing consistent with the proposed (b)(3) 
standard.\234\ Covered entities have available to them a wide range of 
testing tools, techniques, and methodologies, particularly with respect 
to information and technology security. Those tools and techniques 
include open source analysis, network security assessments, physical 
security reviews, source code reviews, compatibility testing, 
performance testing, and end-to-end testing, just to name a few.\235\ 
Such testing methods can vary significantly in terms of what they test 
and how, and in the degree of sophistication and sensitivity they need 
to run them correctly and reliably.\236\ Covered technology among 
covered entities varies, both in terms of the sensitivity of the data 
and information it contains and transmits, as well as its operational 
importance and risk profile.
---------------------------------------------------------------------------

    \234\ See paragraph (h)(2) of proposed Commission regulations 
1.13 and 23.603. See also paragraph (b)(3) of proposed Commission 
regulations 1.13 and 23.603; supra note 63 and accompanying text.
    \235\ See NIST, SP 800-115, Technical Guide to Information 
Security Testing and Assessment (Sept. 2008).
    \236\ Id.
---------------------------------------------------------------------------

    The Commission therefore preliminarily believes that leaving the 
specifics of the design and implementation of ORF testing to the 
reasonable judgment of each covered entity would help ensure that such 
testing protocols remain nimble as operations and recommended testing 
techniques change progressively over time.\237\ Covered entities would, 
however, need to ensure that the testing is reasonably designed to test 
the effectiveness of the function or system being tested.\238\ Covered 
entities should determine which particular tests to incorporate, 
consistent with the (b)(3) standard and their risk assessments, to 
ensure the testing effectively targets their particular business lines, 
activities, operations, and risk profile. Covered entities would 
accordingly be encouraged to document the decision-making regarding how 
it determined the nature, scope, and frequency of testing.
---------------------------------------------------------------------------

    \237\ See also Interagency Guidelines Safeguarding Customer 
Information, 66 FR 8623 (``The Agencies believe that a variety of 
tests may be used to ensure the controls, systems, and procedures of 
the information security program work properly and also recognize 
that such tests will progressively change over time''); FINRA 
Cybersecurity Report, supra note 66, at 13 (``Many firms determined 
the systems to be tested and the frequency with which they should be 
tested based on a risk assessment where higher risk systems were 
tested more frequently.'').
    \238\ See paragraph (h) of proposed Commission regulations 1.13 
and 23.603 (requiring that the testing plan be reasonably designed 
to assess the adherence to, and the effectiveness of, the ORF).
---------------------------------------------------------------------------

    Although the proposed rule would generally not mandate the use of 
any specific techniques, it would establish certain minimum testing 
frequencies with respect to a few testing categories that have broad 
consensus. With respect to testing of the information and technology 
security program, the proposed rule would require testing of key 
controls and the incident response plan at least annually.\239\ 
Consistent with the definition in the Commission's system safeguard 
rules for registered entities, the proposal would define ``key 
controls'' as those controls that an appropriate risk analysis 
determines are either critically important for effective information 
and technology security, or are intended to address risks that evolve 
or change more frequently and therefore require more frequent review to 
ensure their continuing effectiveness in addressing such risks.\240\ 
Given their importance to preserving information and technology 
security and recovering from incidents, the Commission believes that 
regular testing of the incident response plan and key controls on at 
least an annual basis is an important baseline requirement to ensure 
the continued effectiveness of

[[Page 4730]]

the information and technology security program.\241\
---------------------------------------------------------------------------

    \239\ See paragraph (h)(2)(i)(A) of proposed Commission 
regulations 1.13 and 23.603.
    \240\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``key controls''). See also 17 CFR 
37.1401(h)(1) (SEFs); 17 CFR 38.1051(h)(1) (DCMs); 17 CFR 39.18(a) 
(DCOs); 17 CFR 49.24(j)(1) (SDRs) (defining ``key controls'' for 
purposes of system safeguard requirements).
    \241\ See 17 CFR 37.1401(h)(5) (SEFs); 17 CFR 38.1051(h)(5) 
(DCMs); 17 CFR 39.18(e)(5) (DCOs); 17 CFR 49.24(j)(5) (SDRs) (annual 
testing of incident response plans and key controls); see also 
FFIEC, Information Technology Handbook, Audit Booklet at A-15 (Apr. 
2012) (including testing of key controls at least annually as an 
examination point
---------------------------------------------------------------------------

    The proposed rule would also require that testing of the 
information and technology security program include vulnerability 
assessments and penetration testing.\242\ Vulnerability assessments 
include methods and techniques to identify, diagnose, and prioritize 
vulnerabilities in the security of covered technology.\243\ Technical 
vulnerabilities can be identified through scanner tools, which can be 
run continuously or periodically, often daily, and may include checking 
servers for security patches to ensure they are current.\244\ 
Penetration testing (or ``pen testing''), meanwhile, attempts to 
identify ways to exploit vulnerabilities and circumvent or defeat 
security features, mimicking potential real-world attacks. Experts have 
developed a wide variety of penetration tests (e.g., wireless, network, 
web application, cloud, client side, social engineering, physical, 
threat-led) and approaches to or modes of completing them (e.g., black 
box, white box, gray box).\245\ Some tests go further by using cyber-
threat intelligence in designing these simulated attacks, a testing 
referred to as threat-led penetration testing or ``red teaming.'' \246\
---------------------------------------------------------------------------

    \242\ See paragraphs (h)(2)(i)(B)-(C) of proposed Commission 
regulations 1.13 and 23.603.
    \243\ See FFIEC Information Security Booklet, supra note 69, at 
8.
    \244\ Id.
    \245\ See FINRA Cybersecurity Report, supra note 66, at 13.
    \246\ See FSI, FSI Insights on policy implementation No. 21, 
Varying shades of red: how red team testing frameworks can enhance 
the cyber resilience of financial institutions (Nov. 2019).
---------------------------------------------------------------------------

    With respect to vulnerability assessments, the proposed rule would 
require covered entities to test their information and technology 
security programs using vulnerability assessments, including daily or 
continuous automated vulnerability scans.\247\ The Commission 
preliminarily believes that some degree of vulnerability assessment is 
considered standard cybersecurity hygiene in order to monitor systems 
and controls for vulnerabilities, and that the availability of 
automated vulnerability scanning tools help provide a base level of 
monitoring that is easily accessible to all covered entities.\248\
---------------------------------------------------------------------------

    \247\ See paragraph (h)(2)(i)(B) of proposed Commission 
regulations 1.13 and 23.603. See also 17 CFR 37.1401(h)(2) (SEFs); 
17 CFR 38.1051(h)(2) (DCMs); 17 CFR 39.18(e)(2) (DCOs); 17 CFR 
49.24(j)(2) (SDRs) (requiring automated vulnerability scanning).
    \248\ For instance, CISA makes available a free vulnerability 
scanner. See CISA, Cyber Hygiene Services, available at https://www.cisa.gov/cyber-hygiene-services.
---------------------------------------------------------------------------

    With respect to penetration testing, the proposed rule would not 
require covered entities to undertake specific types of testing. Given 
the diverse nature of entities registered as FCMs and swap entities, 
the Commission believes that determination of the type and method of 
penetration testing would be best left to the reasoned judgement of 
each covered entity after conducting its own assessment. The Commission 
would, however, require that covered entities conduct some penetration 
testing at least annually.\249\ The Commission preliminarily believes 
that annual penetration testing of some type, determined consistent 
with the proposed (b)(3) standard, would be important for covered 
entities to have knowledge and awareness of the actual vulnerability of 
their covered technology to internal or external threats. According to 
FINRA's 2018 cyber risk report, firms with strong cybersecurity 
programs conducted penetration tests at least annually and more 
frequently for mission critical, high risk systems such as for an 
online trading system.\250\ Covered entities would also be encouraged 
to consider additional risk-based penetration testing after key events, 
such as any time a significant change is made to important elements of 
the firm's applications and systems infrastructure, in addition to any 
other regular compliance testing.
---------------------------------------------------------------------------

    \249\ See paragraph (h)(2)(i)(C) of proposed Commission 
regulations 1.13 and 23.603.
    \250\ FINRA Cybersecurity Report, supra note 66, at 13-14. 
FFIEC's exam book also appears to contemplate at least some degree 
of penetration testing among financial institutions. See FFIEC 
Information Security Booklet, supra note 69, at 55 (noting that 
independent testing, including penetration testing and vulnerability 
scanning, is conducted according to the risk assessment for 
external-facing systems and the internal network).
---------------------------------------------------------------------------

    Current Commission regulation 23.603 includes a testing requirement 
for the BCDR plan for swap entities.\251\ The proposed ORF testing 
provision would replace that requirement in current Commission 
regulation 23.603 and specify that, as part of the testing, covered 
entities would need to conduct a walk-through or tabletop exercise 
designed to test the effectiveness of backup facilities and 
capabilities at least annually.\252\ The Commission preliminarily 
believes that swap entities currently test their BCDR plans through 
such exercises and that they are an important way to test the 
effectiveness of a BCDR plan in practice. Unlike current Commission 
regulation 23.603, however, the proposed rule would not require that 
covered entities' BCDR plans be audited every three years by a 
qualified third-party service provider.\253\ Based on the Commission's 
experience, this audit requirement has proven redundant and unnecessary 
in light of the requirements to review and test the plan annually.
---------------------------------------------------------------------------

    \251\ See 17 CFR 23.603(g) (requiring the BCDR plan to tested 
annually by qualified, independent internal personnel or a qualified 
third-party service).
    \252\ Current Commission regulation 23.603 does not specify the 
nature of the BCDR testing, see id.
    \253\ See id. (``Each business continuity and disaster recovery 
plan shall be audited at least once every three years by a qualified 
third party service. The date the audit was performed shall be 
documented, together with the nature and scope of the audit, any 
deficiencies found, any corrective action taken, and the date that 
corrective action was taken.'').
---------------------------------------------------------------------------

3. Independence--Proposed Paragraph (h)(3)
    To support the reliability and objectivity of the review and 
testing results, the proposed rule would require the reviews and 
testing to be conducted by qualified personnel who are independent of 
the aspect of the ORF being reviewed or tested.\254\ The personnel 
conducting the testing could be employees of the covered entity itself, 
an affiliate, or of a third-party service provider, provided that such 
personnel are sufficiently trained and not responsible for the 
development, installation, operation, or maintenance of the ``object'' 
of the testing (e.g., covered technology, key controls, training, 
etc.). For example, a covered entity's internal audit department may be 
sufficiently trained and independent to test certain key controls but 
may need to secure a third-party to test certain systems or program 
installations if it does not have sufficient capabilities in-house. 
Covered entities would therefore be permitted under the proposal to 
determine whether a particular test should be conducted in-house or by 
a third-party service provider, provided that the qualification and 
independence requirements are met.\255\
---------------------------------------------------------------------------

    \254\ See paragraph (h)(3) of proposed Commission regulations 
1.13 and 23.603.
    \255\ If a covered entity determines to use a third-party 
service provider, the proposed requirements and guidance with 
respect to the management of third-party relationships would apply. 
See supra note 153 and accompanying text.
---------------------------------------------------------------------------

    This proposed independence requirement is consistent with the 
testing requirement for swap entity

[[Page 4731]]

BCDR plans in current Commission regulation 23.603.\256\
---------------------------------------------------------------------------

    \256\ See 17 CFR 23.603(g) (requiring the BCDR plan to tested 
annually by qualified, independent internal personnel or a qualified 
third-party service).
---------------------------------------------------------------------------

4. Documentation--Proposed Paragraph (h)(4)
    The proposed rule would require covered entities to document all 
reviews and testing of the ORF. The documentation would need to 
include, at a minimum: (i) the date the review or testing was 
conducted; (ii) the nature and scope of the review or testing, 
including methodologies employed; (iii) the results of the review or 
testing, including any assessment of effectiveness; (iv) any identified 
deficiencies and recommendations for remediation; and (v) any 
corrective action(s) taken, including the date(s) such actions were 
taken.\257\ The Commission primarily believes documenting these key 
aspects of the testing and related results would not only assist in 
ensuring accountability for the testing, but would help covered 
entities take full advantage of any insights the testing may provide 
and to build upon their resiliency from lessons learned. Such 
documentation would also assist the Commission in performing its 
oversight duties with respect to covered entities and their 
implementation of their ORF.
---------------------------------------------------------------------------

    \257\ See paragraph (h)(4)(i)-(v) of proposed Commission 
regulations 1.13 and 23.603.
---------------------------------------------------------------------------

    This proposed documentation requirement is consistent with the 
requirement for swap entity BCDR plans in current Commission regulation 
23.603.\258\
---------------------------------------------------------------------------

    \258\ See 17 CFR 23.603(g) (``The date the testing was performed 
shall be documented, together with the nature and scope of the 
testing, any deficiencies found, any corrective action taken, and 
the date that corrective action was taken.'').
---------------------------------------------------------------------------

5. Internal Reporting--Proposed Paragraph (h)(5)
    To support covered entities' compliance with the ORF rule and 
ensure that senior leadership is apprised of and held accountable for 
the effectiveness of the ORF, the proposed rule would expressly require 
covered entities to report on the results of their reviews and testing 
to the CCO and any other relevant senior-level official(s) and 
oversight body(ies).\259\ The proposed rule would not mandate the form, 
method, or frequency of such reporting, but the Commission would 
encourage the reporting to be provided in a sufficiently timely manner 
so as to allow the CCO and senior leadership to act upon the 
information to take steps to improve compliance and the overall 
effectiveness of the ORF.
---------------------------------------------------------------------------

    \259\ See paragraph (h)(5) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

    This requirement does not exist with respect to the swap entity 
BCDR plan requirement in current Commission regulation 23.603 and would 
therefore be a new requirement.
6. Request for Comment
    The Commission invites comment on all aspects of the proposed 
review and testing requirements, including the following question:
    1. Key Controls. The proposed rule would require covered entities 
to test key controls on at least an annual basis and includes a 
definition of ``key controls'' that is comparable to how the term is 
defined for purposes of the Commission's system safeguard requirements 
for registered entities.\260\ Are covered entities currently testing 
key controls? How are they determining what controls should be 
regularly tested? Should the Commission consider allowing covered 
entities to define ``key controls'' for themselves consistent with the 
proposed (b)(3) standard?
---------------------------------------------------------------------------

    \260\ See, e.g., 17 CFR 37.1401(h)(1) (SEFs); 17 CFR 
38.1051(h)(1) (DCMs); 17 CFR 39.18(a) (DCOs); 17 CFR 49.24(j)(1) 
(SDRs) (defining ``key controls'' for purposes of system safeguard 
requirements).
---------------------------------------------------------------------------

H. Required Notifications--Proposed Paragraphs (i) and (j)

    The proposed rule would require covered entities to notify the 
Commission, customers, or counterparties of certain events within the 
scope of the ORF. Notifications to the Commission would relate to 
incidents that have an adverse impact, or a covered entity's decision 
to activate its BCDR plan.\261\ Notifications to customers or 
counterparties would relate to incidents that adversely impact their 
interests.\262\ These notification provisions are discussed in turn 
below.
---------------------------------------------------------------------------

    \261\ See paragraph (i) of proposed Commission regulations 1.13 
and 23.603.
    \262\ See paragraph (j) of proposed Commission regulations 1.13 
and 23.603.
---------------------------------------------------------------------------

1. Commission Notification of Incidents--Proposed Paragraph (i)(1)
    The proposed rule would require covered entities to notify the 
Commission of any incident that adversely impacts, or is reasonably 
likely to adversely impact, (A) information and technology security, 
(B) the ability of the covered entity to continue its business 
activities as a covered entity, or (C) the assets or positions of a 
customer or counterparty.\263\ The notification would need to include 
any information available to the covered entity at the time of the 
notification that could assist the Commission in assessing and 
responding to the incident, including the date the incident was 
detected, possible cause(s) of the incident, its apparent or likely 
impacts, and any actions the covered entity has taken or is taking to 
mitigate or recover from the incident, including measures to protect 
customers or counterparties.\264\ Covered entities would need to 
provide the notification as soon as possible, but no later than 24 
hours after such incident has been detected.\265\
---------------------------------------------------------------------------

    \263\ See paragraph (i)(1)(A)-(C) of proposed Commission 
regulations 1.13 and 23.603.
    \264\ See paragraph (i)(1)(ii) of proposed Commission 
regulations 1.13 and 23.603.
    \265\ See paragraph (i)(1)(iii) of proposed Commission 
regulations 1.13 and 23.603.
---------------------------------------------------------------------------

    The purpose of this proposed notification provision is multifold. 
At a fundamental level, the proposed rule would allow the Commission to 
exercise its oversight function with respect to the ORF, offering the 
Commission a real-world, real-time insight into the effectiveness of a 
particular covered entity's ORF and whether it is operating as 
intended. Early warning of impactful incidents would also enable the 
Commission to be more responsive, providing guidance or appropriate 
relief to help the covered entity withstand and recover from the 
incident. The Commission would also expect such early warnings to aid 
it in identifying and reacting to events that could pose a more 
systemic threat, either to the markets due to the severity of the 
impact of the incident or to other covered entities due to the nature 
of the incident (e.g., a ransomware attack against multiple covered 
entities or a third-party service provider engaged by more than one 
covered entity). In such potentially systemic circumstances, early 
awareness of the incident is expected to facilitate the Commission's 
role in coordinating industry efforts and information sharing, allowing 
it to help forestall the impact of potential broad-scale threats by 
sharing information with other regulators through its involvement in 
Financial and Banking Information Infrastructure Committee (FBIIC), 
issue timely statements to stabilize public confidence, and potentially 
take emergency regulatory action. Over time, the Commission 
preliminarily believes that the knowledge and experience gained from 
these incident reports could provide the Commission a vantage point 
from which to identify trends and lessons learned that could improve 
its supervisory guidance supporting industry efforts to

[[Page 4732]]

enhance their ORF practices, or lead to other regulatory improvements.
    As discussed above, the proposed rule would define ``incident'' as 
any event, occurrence or circumstance that could jeopardize (i.e., put 
into danger) information and technology security.\266\ This standard 
would include events that have the potential to harm information and 
technology security regardless of whether a harm actually materializes. 
The proposed notification standard, by contrast, would limit the scope 
of incidents required to be reported to the Commission to those where 
there is an observable negative impact or harm, or such negative impact 
or harm is reasonably likely. Covered entities would not, for instance, 
need to notify the Commission of unsuccessful attempts at unauthorized 
access, as the detection and deterrence of such an attempt would not 
require Commission action and would appear to be suggestive of an ORF 
that is operating as expected. If, however, a covered entity determines 
that an unauthorized person did access covered information, the 
Commission would need to be notified, regardless of how much 
information was accessed or whether the covered entity believes it has 
been used. The Commission would similarly want to know of any 
successful distributed denial-of-service attack that disrupts business 
operations, regardless of the length of time of that disruption.\267\
---------------------------------------------------------------------------

    \266\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``incident'').
    \267\ Covered entities would not need to notify the Commission 
of routine testing or planned maintenance.
---------------------------------------------------------------------------

    The Commission appreciates that, at the outset, information 
regarding an incident is likely to be incomplete and in flux, and the 
full impact and root cause of an incident may take some time to reveal 
itself. Covered entities may also not be able to detect incidents 
immediately after their occurrence, and with sophisticated malicious 
attacks, culprits often take steps to hide their intrusions. 
Nevertheless, the Commission preliminarily believes that delays in 
reporting an incident to the Commission could impede its ability to 
make timely assessments and take appropriate action. The Commission is 
concerned that such delays could have broad implications, especially 
when there are potential sector-wide ramifications or spill-over 
effects to other regulated entities that the Commission could assist in 
managing.
    Accordingly, the proposed rule would not prescribe a specific form 
or content for the notification or include a materiality limiter. The 
proposed rule would only require that covered entities provide whatever 
information they have on hand at the time that could assist the 
Commission in its assessment and response activities.\268\ If the 
proposed rule is adopted, the Commission would simply expect that as an 
incident progresses, covered entities would continue to engage with the 
Commission and provide updates as needed.\269\
---------------------------------------------------------------------------

    \268\ See paragraph (i)(1)(ii) of proposed Commission 
regulations 1.13 and 23.603.
    \269\ For avoidance of doubt, the proposed rule would not have 
any impact on covered entities' obligations to notify criminal 
authorities as appropriate or required by other law or regulation.
---------------------------------------------------------------------------

    The proposed rule would not prescribe a particular form for the 
notification but would require notification via email.\270\
---------------------------------------------------------------------------

    \270\ See paragraph (i)(2)(iii) of proposed Commission 
regulations 1.13 and 23.603.
---------------------------------------------------------------------------

2. Commission Notification of BCDR Plan Activation--Proposed Paragraph 
(i)(2)
    For similar reasons, the proposed rule would also require covered 
entities to notify the Commission of any determination to activate its 
BCDR plan.\271\ Consistent with the proposed incident notification, 
covered entities would need to notify the Commission of its 
determination to activate their BCDR plan within 24 hours of making 
that determination.\272\ Current Commission regulation 23.603 requires 
swap entities to notify the Commission ``promptly'' of any emergency or 
other disruption that may affect the ability of a swap entity to 
fulfill its regulatory obligations or would have a significant adverse 
effect on the swap entity, its counterparties, or the market.\273\ 
Based on the Commission's experience with this provision, which became 
particularly relevant during the onset of the COVID-19 pandemic, the 
Commission believes this standard has been open to wide interpretation 
among swap entities, leading to broad variations in the timeliness of 
the notifications to the Commission regarding their decisions to 
implement their BCDR plans and employ a remote work posture. The 
Commission therefore preliminarily believes that a more bright-line 
test that centers on the decision to activate the BCDR plan, an action 
that presumably would not occur absent an emergency or significant 
disruption impacting the covered entity, would be easier to apply. The 
Commission also believes such a standard would facilitate the prompt 
delivery of information to the Commission so that it may consider 
whether any action to support the continued integrity of the markets 
during the course of the emergency is necessary to continue to fulfill 
its oversight obligations. For that purpose, the Commission believes 
that 24 hours from activation of the BCDR plan would both encourage 
covered entities to inform the Commission with sufficient time for it 
to take any needed action and encourage covered entities to focus 
initial efforts on resuming or continuing operations.
---------------------------------------------------------------------------

    \271\ See paragraph (i)(2)(i) of proposed Commission regulations 
1.13 and 23.603.
    \272\ See paragraph (i)(2)(iii) of proposed Commission 
regulations 1.13 and 23.603.
    \273\ See 17 CFR 23.603(d) (``Each swap dealer and major swap 
participant shall promptly notify the Commission of any emergency or 
other disruption that may affect the ability of the swap dealer or 
major swap participant to fulfill its regulatory obligations or 
would have a significant adverse effect on the swap dealer or major 
swap participant, its counterparties, or the market.'').
---------------------------------------------------------------------------

    Under the proposed rule, the notification would need to include all 
information available to the covered entity at that time, including the 
date of the emergency or disruption, a brief description thereof, its 
apparent impact, and any actions the covered entity has taken or is 
taking to mitigate or recover from the incident, including measures to 
protect customers and counterparties, as the Commission believes this 
information would be necessary for it to perform its oversight 
obligations and take responsive action if needed.\274\ The proposed 
rule would not prescribe a particular form for the notification but 
would require notification via email.\275\
---------------------------------------------------------------------------

    \274\ See paragraph (i)(2)(ii) of proposed Commission 
regulations 1.13 and 23.603.
    \275\ See paragraph (i)(2)(iii) of proposed Commission 
regulations 1.13 and 23.603. Current Commission regulation 23.603 
does not prescribe the contents of the notification or the method of 
notification, so these would be new requirements for swap entities. 
See 17 CFR 23.603(d) (``Each swap dealer and major swap participant 
shall promptly notify the Commission of any emergency or other 
disruption that may affect the ability of the swap dealer or major 
swap participant to fulfill its regulatory obligations or would have 
a significant adverse effect on the swap dealer or major swap 
participant, its counterparties, or the market.'').
---------------------------------------------------------------------------

3. Notifications to Customers or Counterparties--Proposed Paragraph (j)
    Finally, the proposed rule would require covered entities to notify 
customers or counterparties as soon as possible of any incident that 
could have adversely affected the confidentiality or integrity of such 
customer or counterparty's covered information or their assets or 
positions.\276\ Such incidents could include the identification of a 
longstanding vulnerability that left exposed covered information, 
regardless of whether the covered entity has determined that a

[[Page 4733]]

bad actor has obtained access to that information. The Commission 
preliminarily believes that covered entities owe an enhanced duty to 
protect the covered information provided to them by their customers and 
counterparties in order to ensure market integrity and support customer 
protections. The proposed notification standard therefore encompasses 
incidents where an impact on customers or counterparties may not be 
definite so that they may have an opportunity to take whatever actions 
they deem necessary to protect their interests.
---------------------------------------------------------------------------

    \276\ See paragraph (j)(1) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

    Unlike with the proposed notifications to the Commission, however, 
the Commission preliminarily believes that the accuracy of information 
provided to customers and counterparties should be prioritized over 
early delivery to avoid causing unnecessary panic that could have 
potentially negative and irreversible spill-over effects. Accordingly, 
the proposed customer/counterparty notification provision does not 
include a specific minimum timing requirement for the notification 
other than to require the notification to be provided to customers and 
counterparties as soon as possible.\277\ The proposed rule would 
further require covered entities to disclose to customers and 
counterparties information necessary for them to understand and assess 
the potential impact of the incident on their information, assets, or 
positions and take any necessary actions (e.g., closing accounts, 
changing passwords).\278\ Such information would include, at a minimum, 
a description of the incident, the particular way in which the customer 
or counterparty may have been adversely impacted, measures taken by the 
covered entity to protect against further harm, and contact information 
for the covered entity where the customer or counterparty may learn 
more or ask questions.\279\
---------------------------------------------------------------------------

    \277\ See id.
    \278\ See paragraphs (j)(2)(i)-(iv) of proposed Commission 
regulations 1.13 and 23.603.
    \279\ See id.
---------------------------------------------------------------------------

4. Request for Comment
    The Commission invites comment on all aspects of its proposed ORF 
notification provisions, including the following questions:
    1. Incident notification to Commission. The proposed rule would 
require covered entities to notify the Commission of any incident that 
``adversely impacts, or is reasonably likely to adversely impact,'' 
information and technology security, the ability of the covered entity 
to continue its business activities as a covered entity, or the assets 
or positions of a customer or counterparty. As discussed above, the 
Commission believes this standard would give the Commission an early 
warning of incidents that do result in an observable negative impact or 
harm, or such negative impact or harm is reasonably likely, i.e., where 
information and technology security, business operations, or customers/
counterparties is harmed or compromised. Given the purpose of the 
proposed rule as providing the Commission an early warning so that it 
may act to help mitigate the potential impacts of the event, the 
proposed rule does not include a materiality limiter. Should the 
Commission consider including changing the requirement to further limit 
the incident notice to the incidents with a ``material'' or 
``significant'' adverse impact, or where such a material or significant 
adverse impact would be reasonably likely? If yes, how would including 
such a materiality limiter change the scope of incidents that would be 
reported to the Commission? In other words, what types of incidents 
would not be reported to the Commission under a standard that includes 
a materiality limiter, and why should the Commission not receive an 
early warning of those types of incidents? Please explain and provide 
examples.
    2. BCDR notification to Commission. The Commission is proposing to 
change the notification requirement in Commission regulation 23.603 to 
trigger upon a covered entity's determination to activate its BCDR 
plan, rather than ``promptly'' after an emergency or other disruption. 
Do covered entities typically make a specific determination before 
activating the BCDR plan? What is the process for making that 
determination and who makes it? Are there aspects of the BCDR plan that 
may become active before any formal determination is made? Should the 
Commission instead require notification ``when'' or ``as soon as'' a 
BCDR plan is activated? Why or why not? Please explain.
    3. Notifications to customers or counterparties. The proposed rule 
would require covered entities to provide affected customers and 
counterparties information necessary for the affected customer/
counterparty to understand and assess the potential impact of the 
incident on its information, assets, or positions and to take any 
necessary action. Does the proposed rule provide sufficient information 
for covered entities to assess and comply with that standard?

I. Amendment and Expansion of Other Provisions in Current Commission 
Regulation 23.603

    As mentioned in previous sections of this notice, the proposed rule 
would expand and apply the substance of existing provisions in current 
Commission regulation 23.603 to all covered entities and the ORF in its 
entirety. Such provisions not yet addressed include (1) the 
establishment of emergency contacts for the Commission and (2) 
recordkeeping obligations.\280\
---------------------------------------------------------------------------

    \280\ See 17 CFR 23.603(e) and (i). The Commission would not 
retain Commission regulation 23.603(h) (business continuity and 
disaster recovery plans required by other regulatory authorities) as 
superfluous, see supra note 198.
---------------------------------------------------------------------------

1. Emergency Contacts--Proposed Paragraph (k)
    To assist the Commission in responding to a reported incident, or 
an emergency or other significant disruption causing a covered entity 
to activate its BCDR plan, the proposed rule would require each covered 
entity to provide the Commission the name and contact information for 
two employees with knowledge of the covered entity's incident response 
plan and two employees with knowledge of the covered entity's BCDR 
plan.\281\ Each identified employee would need to be authorized to make 
key decisions on behalf of the covered entity in the event of either an 
incident or the BCDR plan activation, as applicable, as the Commission 
would want to be sure to be contacting personnel with appropriate 
knowledge and authority.\282\ Any updates to the ORF contacts would 
need to be made to the Commission as necessary to ensure the 
Commission's contact information remains accurate and up to date.\283\
---------------------------------------------------------------------------

    \281\ See paragraph (k)(1) of proposed Commission regulations 
1.13 and 23.603. See also 17 CFR 23.603(e) (requiring the 
designation of two emergency contacts with respect to the BCDR plan 
for swap entities).
    \282\ See paragraph (k)(2) of proposed Commission regulations 
1.13 and 23.603. The two employee contacts identified with respect 
to the information and technology security program could be the same 
as the employee contacts for the BCDR plan, provided that they have 
the requisite authority. See id.
    \283\ See paragraph (k)(3) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

    This provision is consistent with the existing emergency contacts 
requirement in the swap entity BCDR plan requirement in current 
Commission regulation 23.603.\284\
---------------------------------------------------------------------------

    \284\ See 17 CFR 23.603(e) (``Each swap dealer and major swap 
participant shall provide to the Commission the name and contact 
information of two employees who the Commission can contact in the 
event of an emergency or other disruption. The individuals 
identified shall be authorized to make key decisions on behalf of 
the swap dealer or major swap participant and have knowledge of the 
firm's business continuity and disaster recovery plan. The swap 
dealer or major swap participant shall provide the Commission with 
any updates to this information promptly.'').

---------------------------------------------------------------------------

[[Page 4734]]

2. Recordkeeping--Proposed Paragraph (l)
    To aid the Commission in fulfilling its oversight responsibilities, 
the proposed rule would require each covered entity to maintain all 
records required pursuant to the proposed ORF rule, including the 
information and technology security program, the third-party 
relationship program, and the BCDR plan, in accordance with Commission 
regulation 1.31 and to make them available promptly upon request to 
representatives of the Commission and to representations of applicable 
prudential regulators as defined in section 1a(39) of the CEA.\285\ 
This provision is consistent with the existing recordkeeping 
requirement in the swap entity BCDR plan requirement in current 
Commission regulation 23.603.\286\
---------------------------------------------------------------------------

    \285\ See paragraph (l) of proposed Commission regulations 1.13 
and 23.603. See 7 U.S.C. 1(a)(39).
    \286\ See 17 CFR 23.603(i) (``The business continuity and 
disaster recovery plan of the swap dealer and major swap participant 
and all other records required to be maintained pursuant to this 
section shall be maintained in accordance with Commission Regulation 
Sec.  1.31 and shall be made available promptly upon request to 
representatives of the Commission and to representatives of 
applicable prudential regulators.'').
---------------------------------------------------------------------------

3. Request for Comment
    The Commission invites comment on all aspects of the proposed 
emergency contacts and recordkeeping requirements.

J. Cross-Border Application for Swap Entities

    In September 2020, the Commission published a final rule addressing 
the cross-border application of certain provisions of the CEA 
applicable to swap entities.\287\ The rule addresses the application of 
the registration thresholds and certain requirements applicable to swap 
entities and establishes a formal process for requesting comparability 
determinations for such requirements from the Commission.\288\ Therein, 
the Commission classified current Commission regulation 23.603 (BCDR 
requirements for swap entities) as a group A requirement.\289\ The 
Commission described the group A requirements as helping swap entities 
``implement and maintain a comprehensive and robust system of internal 
controls to ensure the financial integrity of the firm, and, in turn, 
the protection of the financial system'' and as ``constitut[ing] an 
important line of defense against financial, operational, and 
compliance risks that could lead to a firm's default.'' \290\ Pursuant 
to Commission regulation 23.23(f)(1), a non-U.S. swap entity may 
satisfy any applicable group A requirement on an entity-wide basis by 
complying with the applicable standards of a foreign jurisdiction to 
the extent permitted by, and subject to any conditions specified in, a 
comparability determination issued by the Commission.\291\ In 
determining to offer substituted compliance for group A requirements 
broadly to all non-U.S. swap entities, the Commission explained its 
belief that group A requirements cannot be effectively applied on a 
fragmented jurisdictional basis, such that it would not be practical to 
limit substituted compliance for group A requirements to transactions 
involving only non-U.S. persons.\292\
---------------------------------------------------------------------------

    \287\ See Cross-Border Application of the Registration 
Thresholds and Certain Requirements Applicable to Swap Dealers and 
Major Swap Participants, 85 FR 56924 (Sept. 14, 2020) (Final Cross 
Border Rule); 17 CFR 23.23.
    \288\ Id.
    \289\ Id. at 56964-65; 17 CFR 23.23(a)(6) (defining ``group A 
requirements'').
    \290\ Final Cross-Border Rule, 85 FR 56964 (providing that 
``requiring swap entities to rigorously monitor and address the 
risks they incur as part of their day-to-day businesses lowers the 
registrants' risk of default--and ultimately protects the public and 
the financial system.'').
    \291\ See 17 CFR 23.23(f)(1). See also 17 CFR 23.23(a)(11) 
(defining ``non-U.S. swap entity''); 17 CFR 23.23(g) (describing the 
process for the issuance of comparability determinations).
    \292\ See Final Cross-Border Rule, 85 FR 56977.
---------------------------------------------------------------------------

    As discussed above, the proposed rule would amend current 
Commission regulation 23.603 to contain the entirety of the ORF 
requirements applicable to swap entities, which would include 
requirements not only relating to BCDR but also those relating to 
information and technology security and third-party relationships. The 
Commission preliminarily believes that the same rationale for 
classifying BCDR requirements as a group A requirement would apply to 
the ORF rule more broadly. As discussed in detail above, the Commission 
preliminarily believes that the proposed information and technology 
security and third-party risk relationship requirements would also 
serve to help swap entities implement and maintain a comprehensive and 
robust system of internal controls, serving as an important line of 
defense against the threat of failure at the firm level and of the 
financial system more broadly. Accordingly, should the ORF rule be 
adopted, the Commission would continue to classify Commission 
regulation 23.603 in its entirety as a group A requirement, for which 
substituted compliance would broadly be available pursuant to the 
requirements of Commission regulation 23.23(f)(1).
    As mentioned above, Commission regulation 23.23(f)(1) only allows 
substituted compliance ``to the extent permitted by, and subject to any 
conditions specified in, a comparability determination issued by the 
Commission under [Commission regulation 23.23(g)].'' \293\ Current 
Commission comparability determinations do not address the entirety of 
the proposed ORF rule, as it has yet to be adopted. Rather, they only 
address the requirements in current Commission regulation 23.603, which 
are limited to the BCDR plan requirement.
---------------------------------------------------------------------------

    \293\ See 17 CFR 23.23(f)(1).
---------------------------------------------------------------------------

    The Commission appreciates that non-U.S. swap entities have come to 
rely on existing comparability determinations with respect to the 
current BCDR requirements in Commission regulation 23.603. Accordingly, 
in the interest of comity and good governance, should the proposed rule 
be adopted, the Commission has preliminarily determined to permit non-
U.S. swap entities to continue to rely on current comparability 
determinations with respect to the Commission's BCDR requirements, even 
as amended. However, for substituted compliance to be available for the 
ORF rule in its entirety, an eligible swap entity or foreign regulatory 
authority would need to submit a request for a comparability 
determination pursuant to Commission regulation 23.23(g). The 
submission would need to address the full complement of the provisions 
of the ORF rule, however codified in amended Commission regulation 
23.603, including the BCDR requirements. The Commission would then 
evaluate the request, considering amended Commission regulation 23.603 
in its entirety, and, if the Commission were to conclude it appropriate 
to do so, issue updated comparability determinations that would 
supersede any pre-existing comparability determinations with respect to 
BCDR requirements for swap entities.
Request for Comment
    The Commission invites comment on all aspects of the cross-border 
implications of the proposed rule.

[[Page 4735]]

K. Implementation Period

    Should the proposed rule be adopted, the Commission recognizes that 
covered entities may need time to establish an ORF or review and update 
existing plans and procedures for compliance with the proposed ORF 
rule. The Commission preliminarily believes that, given existing and 
applicable NFA, prudential, and foreign requirements, six months from 
the rule's adoption would be a sufficient amount of time for covered 
entities to achieve compliance with the ORF rule.
    The Commission invites comment on the Commission's proposed 
implementation period for the proposed ORF rule, including the 
following questions:
    1. Would six months be as sufficient amount of time for covered 
entities to develop compliant ORFs? If not, why not? Please explain.
    2. If covered entities would need more than six months to implement 
the ORF as proposed, how much more time would they estimate to need, 
and what would they be doing with that time? Please be as detailed as 
possible.

III. Related Matters

A. Regulatory Flexibility Act

    The Regulatory Flexibility Act (RFA) requires Federal agencies, in 
promulgating regulations, to consider the impact of those regulations 
on small entities--whether the rules will have a significant economic 
impact on a substantial number of small entities--and if so, to provide 
a regulatory flexibility analysis reflecting the impact.\294\ The 
Commission has established certain definitions of ``small entities'' to 
be used by the Commission in evaluating the impact of its rules on 
small entities in accordance with the RFA.\295\ The proposed 
regulations would affect FCMs, SDs, and MSPs. The Commission has 
previously determined that FCMs, SDs, and MSPs are not small entities 
for purposes of the RFA.\296\ Accordingly, the Chairman, on behalf of 
the Commission, hereby certifies pursuant to 5 U.S.C. 506(b) that the 
proposed rule and rule amendments would not have a significant economic 
impact on a substantial number of small entities.
---------------------------------------------------------------------------

    \294\ 5 U.S.C. 601 et seq.
    \295\ See Policy Statement and Establishment of Definitions of 
``Small Entities'' for Purposes of the Regulatory Flexibility Act, 
47 FR 18618 (Apr. 30, 1982) (RFA Definitions of ``Small Entities'').
    \296\ See RFA Definitions of ``Small Entities,'' 47 FR 18619 
(FCMs); Final Swap Entities RMP Rule, 77 FR 20193-94 (SDs and MSPs).
---------------------------------------------------------------------------

B. Paperwork Reduction Act

    The Paperwork Reduction Act (PRA) imposes certain requirements on 
federal agencies, including the Commission, in connection with 
conducting or sponsoring any ``collection of information,'' as defined 
by the PRA.\297\ The PRA is intended, in part, to minimize the 
paperwork burden created for individuals, businesses, and other persons 
as a result of the collection of information by federal agencies, and 
to ensure the greatest possible benefit and utility of information 
created, collected, maintained, used, shared, and disseminated by or 
for the Federal Government.\298\ The PRA applies to all information, 
regardless of form or format, whenever the Federal Government is 
obtaining, causing to be obtained, or soliciting information, and 
includes required disclosure to third parties or the public, of facts 
or opinions, when the information collection calls for answers to 
identical questions posed to, or identical reporting or recordkeeping 
requirements imposed on, ten or more persons.\299\
---------------------------------------------------------------------------

    \297\ 44 U.S.C. 3501 et seq.
    \298\ Id.
    \299\ See 44 U.S.C. 3502(3).
---------------------------------------------------------------------------

    This proposed rulemaking would result in new collection of 
information requirements within the meaning of the PRA. The Commission 
is therefore submitting this proposal to the Office of Management and 
Budget (OMB) for review.\300\ The title for this collection of 
information is ``Operational Resilience Framework for Futures 
Commission Merchants, Swap Dealers, and Major Swap Participants.'' The 
OMB has not yet assigned this collection a control number. An agency 
may not conduct or sponsor, and a person is not required to respond to, 
a collection of information unless it displays a currently valid 
control number.\301\
---------------------------------------------------------------------------

    \300\ See 44 U.S.C. 3507(d); 5 CFR 1320.11.
    \301\ See 44 U.S.C. 3507(a)(3); 5 CFR 1320.5(a)(3).
---------------------------------------------------------------------------

    If the proposed regulations are adopted, responses to this 
collection of information would be mandatory. The Commission will 
protect proprietary information according to the Freedom of Information 
Act and part 145 of the Commission's regulations, ``Commission Records 
and Information.'' \302\ In addition, section 8(a)(1) of the CEA 
strictly prohibits the Commission, unless specifically authorized by 
the CEA, from making public ``data and information that would 
separately disclose the business transactions or market positions of 
any person and trade secrets or names of customers.'' \303\ The 
Commission is also required to protect certain information contained in 
a government system of records according to the Privacy Act of 
1974.\304\
---------------------------------------------------------------------------

    \302\ See 5 U.S.C. 552. See also 17 CFR part 145.
    \303\ 7 U.S.C. 12(a)(1).
    \304\ See 5 U.S.C. 552a.
---------------------------------------------------------------------------

1. Information Provided by Reporting Entities/Persons
    The proposed regulations would require each covered entity to 
establish, document, implement, and maintain an ORF that includes an 
information and technology security program, a third-party relationship 
program, and a BCDR plan, each of which would need to be supported by 
written policies and procedures. In addition, the proposed regulations 
would impose the following reporting, recordkeeping, and disclosure 
obligations on each covered entity: (1) on an annual basis, written 
approval of each component program or plan of the ORF and of risk 
appetite and risk tolerance limits, or in the case of covered entities 
relying on a consolidated program or plan, written attestation; (2) on 
an annual basis, documenting review and testing of the ORF; (3) as 
applicable, notifying the Commission of certain ``incidents,'' as 
defined in the proposed rule; (4) as applicable, notifying the 
Commission upon activation of the BCDR plan; (5) as applicable, 
notifying customers or counterparties of certain ``incidents,'' as 
defined in the proposed rule; and (6) providing emergency contact 
information to the Commission in connection with the information and 
technology security program and the BCDR plan. These requirements will 
result in new PRA burdens for covered entities.
    For purposes of the PRA, the term ``burden'' means the ``time, 
effort, or financial resources expended by persons to generate, 
maintain, or provide information to or for a Federal Agency.'' \305\ 
This total includes the anticipated burden associated with the 
development of the required written policies and procedures, 
satisfaction of various reporting, recordkeeping, and disclosure 
obligations, the documentation of required ORF testing and review, and 
the documentation of risk appetite and risk tolerance limits approval.
---------------------------------------------------------------------------

    \305\ 44 U.S.C. 3502(2).
---------------------------------------------------------------------------

    As of October 31, 2023, there are 160 covered entities that would 
become subject to the proposed rule (100 registered swaps dealers, 54 
registered futures commission merchants, and 6 dually-registered swap 
dealers/futures commission merchants). The estimated burden associated 
with the proposed

[[Page 4736]]

information collections is calculated as follows:
a. Recordkeeping Requirements
    The proposed regulation contains recordkeeping requirements that 
would result in a collection of information from ten or more persons 
over a 12-month period.
    Establishing, documenting, implementing, and maintaining 
information and technology security program: As part of an overall ORF, 
proposed Commission regulations 1.13(d) and 23.603(d) would require 
covered entities to establish an information and technology security 
program reasonably designed to identify, monitor, manage, and assess 
risks relating to information and technology security, including 
through conducting and documenting risk assessments at least annually. 
Upon the risk assessment's completion, the results would need to be 
provided to the oversight body, senior officer, or other senior-level 
official who approves the information and technology security program. 
As part of the information and technology security program, the 
proposed rule would require the covered entity to establish, document, 
implement, and maintain controls to prevent, detect, and mitigate 
identified risks to information and technology security. In addition, 
the proposed rule would require that the information and technology 
security program include a written incident response plan reasonably 
designed to detect, assess, contain, mitigate the impact of, and 
recover from an incident.
    The Commission anticipates that a covered entity would require an 
estimated 200 hours to develop their information and technology 
security program, including conducting and documenting an annual risk 
assessment and developing an incident response plan. This yields a 
total annual burden of 32,000 burden hours (160 respondents x 200 hours 
= 32,000 hours).
    Accordingly, the aggregate annual estimate for the recordkeeping 
burden associated with this proposal would be as follows:\306\
---------------------------------------------------------------------------

    \306\ This estimate reflects the aggregate information 
collection burden estimate associated with the proposed 
recordkeeping requirement for the first annual period following 
implementation of the proposed regulations. Because proposed 
Commission regulations 1.13(d) and 23.603(d) would require the one-
time recordkeeping requirement as to developing the information and 
technology security program, Commission staff estimates that for 
each subsequent annual period, the number of burden hours would be 
reduced accordingly.
---------------------------------------------------------------------------

    Number of registrants: 160.
    Estimated number of responses: 1.
    Estimated total annual burden per registrant: 200 hours.
    Frequency of collection: Annually.
    Total annual burden: 32,000 burden hours [160 registrants x 200 
hours].
    Establishing, documenting, implementing, and maintaining third-
party relationship program: Proposed Commission regulations 1.13(e) and 
23.603(e) would require covered entities to develop a program 
reasonably designed to identify, monitor, manage, and assess risks 
relating to third-party relationships. The program would be required to 
address the risks attendant to each stage of the third-party 
relationship lifecycle and would be required to include an inventory of 
third-party service providers the covered entity has engaged to support 
its activities as a covered entity.
    The Commission anticipates that a covered entity would require an 
estimated 160 hours annually to develop their third-party relationship 
program, including creating and maintaining a third-party service 
provider inventory. This yields a total annual burden of 25,600 hours 
(160 respondents x 160 hours = 25,600 burden hours). The aggregate 
annual estimate for the recordkeeping burden associated with this 
proposal would be as follows: \307\
---------------------------------------------------------------------------

    \307\ This estimate reflects the aggregate information 
collection burden estimate associated with the proposed 
recordkeeping requirement for the first annual period following 
implementation of the proposed regulations. Because proposed 
Commission regulations 1.13(e) and 23.603(e) would require the one-
time recordkeeping requirement as to developing the third-party 
relationship program, Commission staff estimates that for each 
subsequent annual period, the number of burden hours would be 
reduced accordingly.
---------------------------------------------------------------------------

    Number of registrants: 160.
    Estimated number of responses: 1.
    Estimated total annual burden per registrant: 160 hours.
    Frequency of collection: Annually.
    Total annual burden: 25,600 burden hours [160 registrants x 160 
hours].
    Establishing, documenting, implementing, and maintaining BCDR plan: 
Proposed Commission regulations 1.13(f) and 23.603(f) would require 
covered entities to establish a written BCDR plan reasonably designed 
to identify, monitor, manage, and assess risks relating to emergencies 
or other significant disruptions to the continuity of normal business 
operations as a covered entity.\308\ The proposed rule would require 
the BCDR plan be reasonably designed to enable the covered entity to: 
(1) continue or resume any activities as a covered entity with minimal 
disruption to customers, counterparties, and markets; and (2) recover 
and make use of covered information, in addition to any other data, 
information, or documentation required to be maintained by law and 
regulation. These plans would be required to, among other things, 
establish procedures for data backup and establish and maintain 
arrangements to provide for redundancies or their backup for covered 
technology, facilities, infrastructure, personnel, and competencies.
---------------------------------------------------------------------------

    \308\ As discussed in section II.E (Continuity and Disaster 
Recovery Plan) of this notice, swap entities are already required to 
establish a written BCDR plan pursuant to current Commission 
regulation 23.603. The existing burdens for current Commission 
regulation 23.603 are found in the following information collection, 
Regulations Establishing and Governing the Duties of Swap Dealers 
and Major Swap Participants (OMB Control No. 3038-0084). The burden 
of swap entities updating their BCDR plan is included in the new 
collection of information established by the proposed rule, but the 
Commission is retaining its existing burden estimates under Control 
No. 3038-0084 at this time to avoid undercounting. The Commission 
will adjust its burden estimates associated with OMB Control No. 
3038-0084 at a later date, as necessary.
---------------------------------------------------------------------------

    The Commission anticipates that a covered entity would require an 
estimated 50 hours annually to develop or to update their existing 
written BCDR plan. This yields a total annual burden of 8,000 burden 
hours (160 respondents x 50 hours = 8,000 hours).
    Accordingly, the aggregate annual estimate for the recordkeeping 
burden associated with this proposal would be as follows:\309\
---------------------------------------------------------------------------

    \309\ This estimate reflects the aggregate information 
collection burden estimate associated with the proposed 
recordkeeping requirement for the first annual period following 
implementation of the proposed regulations. Because proposed 
Commission regulations 1.13(f) and 23.603(f) would require the one-
time recordkeeping requirement, as to developing the BCDR plan, 
Commission staff estimates that for each subsequent annual period, 
the number of burden hours would be reduced accordingly.
---------------------------------------------------------------------------

    Number of registrants: 160.
    Estimated number of responses: 1.
    Estimated total annual burden per registrant: 50 hours.
    Frequency of collection: Annually.
    Total annual burden: 8,000 burden hours [160 registrants x 50 
hours].
    Documentation of ORF review: Proposed Commission regulations 
1.13(h) and 23.603(h) would require covered entities to establish, 
implement, and maintain plans reasonably designed to assess their 
adherence to, and the effectiveness of, their ORF through regular 
reviews and risk-based testing.
    The proposed rule would require that reviews be conducted at least 
annually and when any material change to covered entities' activities 
or operations occurs that is reasonably likely to affect

[[Page 4737]]

the risks identified in the ORF. With regard to testing, the proposed 
rule would require that the testing of information and technology 
security program include, at a minimum, the testing of key controls and 
the incident response plan at least annually; daily or continuous 
automated vulnerability scans; and penetration testing at least 
annually. Additionally, the proposed rule would require that testing of 
the BCDR plan must include, at a minimum, a walk-through or tabletop 
exercise designed to test the effectiveness of backup facilities and 
capabilities at least annually.
    The proposed rule would also require covered entities to document 
all reviews and testing of their ORFs. The proposed rule would require 
that documentation to include, at a minimum, (i) the date the review or 
testing was conducted; (ii) the nature and scope of the review or 
testing, including methodologies employed; (iii) the results of the 
review or testing, including any assessment of effectiveness; (iv) any 
identified deficiencies and recommendations for remediation; and (v) 
any corrective action(s) taken or initiated, including the date(s) of 
such action(s).
    The Commission anticipates that covered entities would require an 
estimated 80 hours annually to establish a plan to assess adherence to, 
and the effectiveness of, its ORF, as well as documenting all reviews 
and testing of the ORF. This yields a total annual burden of 12,800 
hours (160 respondents x 80 hours = 12,800 burden hours).
    The aggregate annual estimate for the recordkeeping burden 
associated with this proposal would be as follows: \310\
---------------------------------------------------------------------------

    \310\ This estimate reflects the aggregate information 
collection burden estimate associated with the proposed 
recordkeeping requirement for the first annual period following 
implementation of the proposed regulations. Because proposed 
Commission regulations 1.13(h) and 23.603(h) would require the one-
time recordkeeping requirement as to developing a plan to assess the 
effectiveness of the ORF, Commission staff estimates that for each 
subsequent annual period, the number of burden hours would be 
reduced accordingly.
---------------------------------------------------------------------------

    Number of registrants: 160.
    Estimated number of responses: 1.
    Estimated total annual burden per registrant: 80 hours.
    Frequency of collection: Annually.
    Total annual burden: 12,800 burden hours [160 registrants x 80 
hours].
    Documentation of approval of the component programs or plan, risk 
appetite, and risk tolerance limits: Proposed Commission regulations 
1.13(c)(1) and 23.603(c)(1) would require covered entities to ensure 
that the information and technology security program, third-party 
relationship program, and BCDR plan are approved in writing on at least 
an annual basis by either the senior officer, an oversight body, or a 
senior-level official with primary responsibility for the component 
programs or plan. Proposed Commission regulations 1.13(c)(2) and 
23.603(c)(2) would require the risk appetite and risk tolerance limits 
established by covered entities be approved in writing at least 
annually by either the senior officer, an oversight body, or a senior-
level official. Proposed Commission regulations 1.13(c)(4)(ii) and 
23.603(c)(4)(ii) would allow covered entities that rely on a 
consolidated program or plan for its ORF to meet the annual approval 
requirement for the component programs or plan of the ORF, risk 
appetite, and risk tolerance limits through an annual written 
attestation by either the senior officer, an oversight body, or a 
senior-level official.
    The Commission anticipates that covered entities would require an 
estimated 20 hours annually to document approval of the ORF, risk 
appetite, and risk tolerance limits or to prepare the written 
attestation. This yields a total annual burden of 3,200 hours (160 
respondents x 20 hours = 3,200 burden hours).
    The aggregate annual estimate for the recordkeeping burden 
associated with this proposal would be as follows:
    Number of registrants: 160.
    Estimated number of responses: 1.
    Estimated total annual burden per registrant: 20 hours.
    Frequency of collection: Annually.
    Total annual burden: 3,200 burden hours [160 registrants x 20 
hours].
b. Reporting Requirements
    The proposed regulation contains reporting requirements that would 
result in a collection of information from ten or more persons over a 
12-month period.
    Notification of incidents to the Commission: Proposed Commission 
regulations 1.13(i)(1) and 23.603(i)(1) would require covered entities 
to notify the Commission regarding incidents that adversely impact or 
are reasonably likely to adversely impact: (1) information technology 
and security; (2) the covered entity's ability to continue its business 
activities; or (3) the assets or positions of a customer or 
counterparty. These notifications would be required to include 
information that may assist the Commission in assessing and responding 
to the incident, including the date the incident was detected, possible 
cause(s) of the incident, its apparent or likely impacts, and any 
actions the covered entity has taken or is taking to mitigate or 
recover from the incident. Notifications would be required to be 
submitted via email as soon as possible, but no later than 24 hours 
after an incident is detected.
    The Commission anticipates that covered entities may experience one 
reportable incident per year and that covered entities would expend 
approximately 10 hours to gather the information required and provide 
the required notification to the Commission. This would result in an 
estimated total annual burden of 1,600 hours (160 respondents x 1 
reportable incident per year x 10 hours per reportable incident = 1,600 
hours).
    The aggregate annual estimate for the reporting burden associated 
with this proposal would be as follows:
    Number of registrants: 160.
    Estimated number of responses: 1.
    Estimated total annual burden per registrant: 10 hours.
    Frequency of collection: As needed.
    Total annual burden: 1,600 burden hours [160 registrants x 10 
hours].
    Notification of BCDR plan activation: Proposed Commission 
regulations 1.13(i)(2) and 23.603(i)(2) would require covered entities 
to notify the Commission of any determination to activate the BCDR 
plan. Covered entities would be required to provide such notices via 
email and include any information available at the time of the 
notification that may assist the Commission in assessing or responding 
to the emergency or disruption, including the date of the emergency or 
disruption, a description thereof, the possible cause(s), its apparent 
or likely impacts, and any actions the covered entity has taken or is 
taking to mitigate or recover from the emergency or disruption, 
including measures taken or being taken to protect customers.
    The Commission anticipates that approximately 3 covered entities 
may activate their BCDR plan per year and that such covered entities 
would expend approximately 10 hours to gather the information required 
and to provide the required notification to the Commission. This would 
result in an estimated total annual burden of 30 burden hours (3 BCDR 
activations per year x 10 hours per BCDR activation = 30 hours).
    The aggregate annual estimate for the reporting burden associated 
with this proposal would be as follows:
    Number of registrants: 3.
    Estimated number of responses per respondent: 1.
    Estimated total annual burden per registrant: 10 hours.
    Frequency of collection: As needed.

[[Page 4738]]

    Total annual burden: 30 burden hours [3 BCDR activations per year x 
10 hours].
    Filing emergency contact information: Proposed Commission 
regulations 1.13(k) and 23.603(k) would require covered entities to 
provide the Commission with emergency contact information for employees 
to serve as contacts in connection with required incident notifications 
under the ORF and the activation of the covered entity's BCDR plan.
    The Commission anticipates that covered entities would require an 
estimated 1 hour annually to provide the Commission with emergency 
contact information. This yields a total annual burden of 160 burden 
hours (160 respondents x 1 hour = 160 burden hours).
    The aggregate annual estimate for the reporting burden associated 
with this proposal would be as follows: \311\
---------------------------------------------------------------------------

    \311\ This estimate reflects the aggregate information 
collection burden estimate associated with the proposed reporting 
requirement for the first annual period following implementation of 
the proposed regulations. Because proposed Commission regulations 
1.13(k) and 23.603(k) would require the emergency contact 
information provided to the Commission to be updated only as 
necessary, Commission staff estimates that for each subsequent 
annual period, the number of burden hours would be reduced 
accordingly.
---------------------------------------------------------------------------

    Number of registrants: 160.
    Estimated number of responses: 1.
    Estimated total annual burden per registrant: 1 hour.
    Frequency of collection: As needed.
    Total annual burden: 160 burden hours [160 registrants x 1 hour].
c. Disclosure Requirements
    The proposed regulation contains disclosure requirements that would 
result in a collection of information from ten or more persons over a 
12-month period.
    Notification of incidents to affected customers and counterparties: 
Proposed Commission regulations 1.13(j) and 23.603(j) would require 
covered entities to notify their customers and counterparties as soon 
as possible of any incident that is reasonably likely to have adversely 
affected the confidentiality or integrity of the customer's or 
counterparty's covered information, assets, or positions. The proposed 
rule would require that notifications include information necessary for 
the affected customer or counterparty to understand and assess the 
potential impact of the incident on its information, assets, or 
positions and to take any necessary action. Such notifications shall 
include, at a minimum, a description of the incident; the way the 
customer or counterparty, or its covered information, may have been 
adversely impacted; measures being taken by the covered entity to 
protect against further harm; and contact information for the covered 
entity where the customer or counterparty may learn more about the 
incident or ask questions.
    The Commission anticipates that covered entities may experience 17 
reportable incidents per year and that covered entities would expend 
approximately 50 hours to gather the required information necessary to 
provide notice of an incident and to prepare and deliver the required 
notification. This would result in an estimated total annual burden of 
850 burden hours (17 reportable incidents per year x 50 hours per 
reportable incident = 850 burden hours).
    The aggregate annual estimate for the disclosure burden associated 
with this proposal would be as follows:
    Number of registrants: 17.
    Estimated number of responses per respondent: 1.
    Estimated total annual burden per registrant: 50 hours.
    Frequency of collection: As needed.
    Total annual burden: 850 burden hours [17 reportable incidents per 
year x 50 hours].
d. Total Burden
    Based upon the estimates above, the aggregate annual cost for all 
covered entities is 84,240 burden hours.
    It is expected that covered entities will utilize existing 
software, information technology and systems. Thus, the Commission 
believes any additional capital/startup costs or operational/
maintenance costs incurred by respondents to report the information 
required by the proposed regulations to the Commission would be 
negligible, if any.
2. Request for Comment
    The Commission invites the public and other federal agencies to 
comment on any aspect of the reporting, recordkeeping, and disclosure 
burdens discussed above. Pursuant to 44 U.S.C. 3506(c)(2)(B), the 
Commission will consider public comments on this proposed collection of 
information in:
    (1) Evaluating whether the proposed collection of information is 
necessary for the proper performance of the functions of the 
Commission, including whether the information will have practical 
utility;
    (2) Evaluating the accuracy of the Commission's estimate of the 
burden of the proposed collection of information, including the degree 
to which the methodology and the assumptions that the Commission 
employed were valid;
    (3) Enhancing the quality, utility, and clarity of the information 
proposed to be collected; and
    (4) Minimizing the burden of the collection of information on 
covered entities, including through the use of appropriate automated, 
electronic, mechanical, or other technological information collection 
techniques, e.g., permitting electronic submission of responses.
    A copy of the supporting statements for the collections of 
information discussed above are available from the CFTC Clearance 
Officer, 1155 21st Street NW, Washington, DC 20581, 202-418-5714, or 
from https://www.RegInfo.gov. Organizations and individuals desiring to 
submit comments on the proposed information collection requirements 
should send those comments to:
     The Office of Information and Regulatory Affairs, Office 
of Management and Building, Room 10235, New Executive Office Building, 
Washington, DC 20503, Attn: Desk Officer of the Commodity Futures 
Trading Commission;
     202-395-6566 (fax);
     [email protected] (email).
    Please provide the Commission with a copy of submitted comments so 
that all comments can be summarized and addressed in the final 
rulemaking. Please refer to the ADDRESSES section of this notice of 
proposed rulemaking for comment submission instructions to the 
Commission. OMB is required to decide concerning the collection of 
information between 30 and 60 days after publication of this document 
in the Federal Register. Therefore, a comment is best assured of 
receiving full consideration if OMB (and the Commission) receives it 
within 30 calendar days of publication of this notice. Nothing in the 
foregoing affects the deadline enumerated above for public comment to 
the Commission on the proposed rule.

C. Cost-Benefit Considerations

    Section 15(a) of the CEA requires the Commission to consider the 
costs and benefits of its discretionary actions before promulgating a 
regulation under the CEA or issuing certain orders.\312\ Section 15(a) 
further specifies that the costs and benefits shall be evaluated in 
light of five broad areas of market and public concern: (1) Protection 
of market participants and the public; (2) efficiency, competitiveness, 
and financial integrity of swaps markets; (3) price discovery; (4) 
sound risk

[[Page 4739]]

management practices; and (5) other public interest 
considerations.\313\ In conducting its analysis, the Commission may, in 
its discretion, give greater weight to any one of the five enumerated 
areas of concern. The Commission considers the costs and benefits 
resulting from its discretionary determinations with respect to the 
considerations of section 15(a) of the CEA.
---------------------------------------------------------------------------

    \312\ See 7 U.S.C. 19(a).
    \313\ Id.
---------------------------------------------------------------------------

    As detailed above, the proposed rule would require covered entities 
(FCMs, SDs, and MSPs) to establish, document, implement, and maintain 
an ORF reasonably designed to identify, monitor, manage, and assess 
risks relating to (i) information and technology security, (ii) third-
party service providers, and (iii) emergencies or other significant 
disruptions to the continuity of their normal business operations.\314\ 
The ORF would accordingly need to include a program or plan directed at 
each of these three risk areas (an information and technology security 
program, a third-party relationship program, and a business continuity 
and disaster recovery plan), as well as a plan for the review and 
testing of the ORF, each of which would need to meet certain specified 
minimum requirements.\315\ The proposed rule would further establish 
governance, training, and recordkeeping requirements related to the 
ORF, as well as require notification of certain ORF-related events to 
the Commission and customers or counterparties.\316\ The main purpose 
of the proposed ORF, as discussed above, is to promote sound practices 
for managing risks relating to information and technology security, 
third-party relationships, and emergencies or other significant 
disruptions, so as to support covered entity operational resilience, to 
the benefit of customers, counterparties, and the derivatives markets 
more broadly.
---------------------------------------------------------------------------

    \314\ See paragraph (b)(1) of proposed Commission regulations 
1.13 and 23.603.
    \315\ See paragraphs (b)(2) (components), (d) (information and 
technology security program), (e) (third-party relationship 
program), (f) (business continuity and disaster recovery plan), and 
(h) (reviews and testing) of proposed Commission regulations 1.13 
and 23.603.
    \316\ See paragraphs (c) (governance), (g) (training), (i) 
(notifications to the Commission), (j) (notification of incidents to 
affected customers or counterparties), (k) (emergency contacts), and 
(l) (recordkeeping) of proposed Commission regulations 1.13 and 
23.603.
---------------------------------------------------------------------------

    The Commission identifies and considers the benefits and costs of 
the proposed amendments relative to the baseline of the current status 
quo. As discussed above, all of the proposed requirements would be new 
CFTC requirements for covered entities, with the exception of the BCDR 
plan requirement for swap entities, which the proposed rule would amend 
in certain respects.\317\ Nevertheless, the Commission preliminarily 
believes that many, if not all, covered entities currently registered 
with the Commission have likely adopted documents, policies, and 
practices consistent with the proposed ORF rule. Current NFA rules and 
interpretive notices, for instance, address the core risks at the 
center of the ORF--information and technology security, third-party 
risks, and BCDR planning--and establish related requirements that apply 
to covered entities, including a BCDR plan requirement for FCMs.\318\ 
Additionally, many covered entities are subject to prudential 
regulation, which includes requirements relating to information 
security and notifications of related incidents.\319\ Prudential 
regulators have also provided guidance relating to operational 
resilience and third-party relationships.\320\ Furthermore, based on 
its oversight activities, the Commission preliminarily believes that 
certain aspects of the proposed rule requirements are already employed 
by many covered entities as recommended best practices.
---------------------------------------------------------------------------

    \317\ See 17 CFR 23.603.
    \318\ See supra note 43; see also supra note 60 (noting that 
NFA's requirement to establish a business continuity and disaster 
recovery plan does not apply to swap entities).
    \319\ See Computer-Security Incident Notification Requirements 
for Banking Organizations and their Bank Service Providers, 86 FR 
66424 (Nov. 23, 2021); 12 CFR part 30, app. A (Interagency 
Guidelines Establishing Standards for Safety and Soundness); 12 CFR 
part 30, app. B (Interagency Guidelines Establishing Information 
Security Standards).
    \320\ See supra note 43. See also supra note 50. The Commission 
notes that the Prudential Operational Resilience Paper was ``written 
for use by the largest and most complex domestic firms,'' including 
financial institutions with average total consolidated assets 
greater than or equal to (a) $250 billion or (b) $100 billion and 
have $75 billion or more in average weighted short-term wholesale 
funding, average nonbank assets, or average off-balance-sheet 
exposure. See Prudential Operational Resilience Paper, supra note 
11, at 1.
---------------------------------------------------------------------------

    The Commission acknowledges that, no matter the degree to which a 
covered entity currently operates in a manner consistent with the 
requirements of the proposed rule, covered entities would all incur 
some level of costs in reviewing the proposed rule and comparing their 
existing practices and procedures against it to ensure they meet the 
minimum requirements and make any necessary updates. Nevertheless, the 
Commission preliminarily believes that the actual costs and benefits of 
the proposed rule as realized by most current covered entities may not 
be as significant as they would be for entities not already subject to 
NFA or prudential authority or that have not already adopted 
operational resilience practices in line with general standards and 
best practices. The Commission also preliminarily believes that 
leveraging existing standards and guidance and aligning with other 
applicable authorities to the degree sensible and appropriate, as 
recommended by the National Cyber Strategy, in itself is a benefit to 
covered entities and the markets more broadly, by reducing compliance 
burdens while promoting practices that have proven to support 
operational resilience and positive regulatory outcomes. Customers, 
counterparties, and the public more generally would likely benefit as 
well, as the proposed rule would allow the Commission to exercise its 
oversight authority to foster compliance with the ORF requirements that 
are currently absent from its regulations.
    By its terms, section 15(a) does not specifically require the 
Commission to quantify the costs and benefits of a new rule or to 
determine whether the benefits of the adopted rule outweigh its costs. 
Rather, section 15(a) requires the Commission to ``consider the costs 
and benefits'' of a subject rule.\321\ The Commission has endeavored to 
assess the expected costs and benefits of the proposed amendments in 
quantitative terms, including PRA related costs, where possible. In 
situations where the Commission is unable to quantify the costs and 
benefits, the Commission identifies and considers the costs and 
benefits of the applicable proposed amendments in qualitative terms. 
However, the Commission lacks the data necessary to reasonably quantify 
all of the costs and benefits considered below. Additionally, any 
initial and recurring compliance costs for any particular covered 
entity would depend on its size, existing infrastructure, practices, 
and cost structures, as well as the nature, size, scope, complexity, 
and risk profile of its operations as a covered entity. It is 
impossible to place a reliable dollar figure on potential future 
incidents that might be prevented through this rulemaking because the 
threats are too varied. The constantly changing nature of technology 
exacerbates this difficulty.\322\
---------------------------------------------------------------------------

    \321\ See 7 U.S.C. 19(a).
    \322\ FSI Cybersecurity Paper, supra note 15, at 1 (``The cyber 
threat landscape is also characterised by a significant and 
continuous rise in the cost of cyber incidents. Statista (2023) 
estimated the global cost of cyber crime in 2022 at $8.4 trillion 
and expects this to go beyond $11 trillion in 2023. This reflects an 
annual increase of 30% in the cost of cyber crime during the 2021-23 
period. Moreover, the average cost of a data breach between 2020 and 
2022 increased by 13%, with the financial industry scoring the 
second highest average cost after healthcare at $6 million. 
According to Chainalysis (202[3]), 2022 was the biggest year ever 
for crypto hacking, with $3.8 billion stolen from cryptocurrency 
businesses. Cyber insurance demand continues to outweigh supply and 
that the cyber protection gap appears to be widening amid a market 
characterised by rising premiums, narrowing coverage and tighter 
underwriting standards.'').

---------------------------------------------------------------------------

[[Page 4740]]

    Regarding covered entities' costs, while the Commission generally 
believes--based on anecdotal information and its general 
understanding--that covered entities have already instituted, to a 
large degree, the practices called for in the proposed rule, the 
Commission lacks empirical evidence or data to verify that belief 
(including the number of covered entities whose practices currently 
meet the requirements being proposed) and quantify what, if any, 
material costs covered entities would incur to comply with the proposed 
regulations. To the extent covered entities would need to make 
operational changes to comply with the proposed amendments, the 
Commission expects they would be proportionate to the nature, size, 
scope, complexity, and risk profile of their operations as covered 
entities. The Commission therefore invites comments providing data and 
other empirical information to allow it to quantify the degree to 
which: (1) covered entities currently have implemented (or independent 
of the proposed amendments, otherwise plan to implement) practices that 
are compliant with the Commission's proposed regulations and (2) the 
expected additional costs for any covered entities that, to date, have 
not completely done so or are otherwise moving independently towards 
doing so.
    The Commission notes that this cost-benefit consideration is based 
on its understanding that the derivatives markets regulated by the 
Commission function internationally with: (1) transactions that involve 
U.S. entities occurring across different international jurisdictions; 
(2) some entities organized outside of the United States that are 
registered with the Commission; and (3) some entities that typically 
operate both within and outside the United States and that follow 
substantially similar business practices wherever they are located. 
Where the Commission does not specifically refer to matters of 
location, the discussion of costs and benefits below refers to the 
effects of the proposed regulations on all relevant derivatives 
activity, whether based on their actual occurrence in the United 
States, or on their connection with, or effect on, U.S. commerce.
    In the sections that follow, the Commission discusses the costs and 
benefits associated with the proposed rule, as well as reasonable 
alternatives, relative to the baseline. The Commission generally 
requests comment on all aspects of its cost-benefit consideration, 
including the baseline; assumptions and methodology employed; the 
identification and measurement of costs and benefits relative to the 
baseline; the identification, measurement, and assessment of any costs 
and benefits not discussed herein; data and any other information to 
assist or otherwise inform the Commission's ability to better quantify 
or qualitatively understand and describe the costs and benefits of the 
proposed amendments; whether and what specific alternatives would be 
more reasonable in terms of their costs and benefits and why; and 
substantiating data, statistics, and any other information to support 
positions posited by commenters with respect to the Commission's 
discussion and/or requests for comments.
1. Costs and Benefits
    The following sections discuss the costs and benefits that the 
Commission preliminarily expects to result from the requirements in the 
proposed rule.
e. Generally--Proposed Paragraph (b)
    The proposed rule would require covered entities to establish, 
document, implement, and maintain an ORF reasonably designed to 
identify, monitor, manage, and assess risks relating to: (i) 
information and technology security; (ii) third-party relationships; 
and (iii) emergencies or other significant disruptions to the 
continuity of normal business operations as covered entities.\323\ The 
ORF would need to, at a minimum, include an information and technology 
security program, a third-party relationship program, and a business 
continuity and disaster recovery plan, and each component program or 
plan would need to be supported by written policies and 
procedures.\324\ Covered entities would further need to ensure that 
their ORF is appropriate and proportionate to the nature, size, scope, 
complexity, and risk profile of their business activities as covered 
entities, following generally accepted standards and best 
practices.\325\
---------------------------------------------------------------------------

    \323\ See paragraph (b)(1) of proposed Commission regulations 
1.13 and 23.603.
    \324\ See paragraph (b)(2) of proposed Commission regulations 
1.13 and 23.603.
    \325\ See paragraph (b)(3) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

    The Commission anticipates that the main source of costs associated 
with establishing, documenting, implementing, and maintaining the ORF, 
as required, would derive from creating and implementing the necessary 
core component programs and plan, the detailed requirements and costs 
and benefits of which are discussed in greater detail in the sections 
that follow. As discussed above, although the Commission expects that 
most covered entities have already established at least some of 
elements of the ORF in place by virtue of NFA or other requirements, 
covered entities would, at minimum, need to devote time and resources 
to reviewing their existing programs to ensure they meet the 
requirements of the proposed rule and making any necessary amendments. 
Accordingly, the Commission anticipates all covered entities would 
incur at least a one-time fixed cost associated with reviewing their 
existing programs to ensure compliance, and to identify and make any 
potential required updates. Specifically, the Commission expects 
covered entities would incur a one-time initial cost of $41,000 (410 
hours \326\ x $100/hour) to review their existing programs and identify 
and make any necessary changes, or an estimated aggregate dollar cost 
of $6,560,000 (160 covered entities x $41,000).\327\
---------------------------------------------------------------------------

    \326\ This hour estimate reflects the aggregate amount of time 
the Commission estimates covered entities will expend establishing, 
documenting, implementing and maintaining the core component 
programs and plan of their ORF (i.e., information and technology 
security program, third-party relationship program, and business 
continuity and disaster recovery plan). See section III.B (Paperwork 
Reduction Act) of this notice, supra.
    \327\ The cost estimates in this section were determined using 
an average salary of $100.00 per hour. The Commission believes that 
this is an appropriate salary estimate for purposes of the proposed 
rule based upon the May 2022 Bureau of Labor Statistics' average 
hourly rate for the following positions: (1) $63.08 for management 
occupations; (2) $41.39 for business and financial operations 
occupations; (3) $51.99 for computer and mathematical occupations; 
(4) $67.71 for computer engineering occupations; (5) $59.87 for 
legal occupations; and (6) $21.90 for office and administrative 
support occupations. Based on this data, the Commission took the 
mean hourly wage for these positions and increased it to $100 in 
recognition that some covered entities are large financial 
institutions whose employees' salaries may exceed the mean wage. See 
U.S. Bureau of Labor Statistics, May 2022 National Occupational 
Employment and Wage Estimates (last updated Apr. 25, 2023), 
available at https://www.bls.gov/oes/current/oes_nat.htm#43-0000.
---------------------------------------------------------------------------

    To the extent that covered entities' current operational resilience 
practices do not meet the minimum requirements

[[Page 4741]]

of the proposed rule, they may incur more and other forms of costs in 
updating the programs. Such costs could include fixed costs associated 
with securing new technology or other services (e.g., upgrading 
technology, incorporating penetration testing), or even adding new 
staffing to support new required functions, as well as new ongoing 
costs related to monitoring and training. By requiring that the ORF, 
and consequently the associated programs and plan, are appropriate and 
proportionate to the covered entity, the Commission expects that the 
extent of those costs should be reasonably mitigated, such that covered 
entities should be able to tailor their ORFs to their unique 
circumstances and not incur costs to adopt practices or technologies 
that would not be recommended or necessary for them.
    Additionally, to the extent costs in updating programs are 
unavoidable, the Commission believes the proposed ORF rule is 
reasonably designed to ensure that the costs would support covered 
entities' operational resilience, and the broader security of the 
derivatives markets as a whole, as discussed in greater detail below. 
More specifically, the Commission believes the proposed ORF rule is 
reasonably designed to ensure customer and counterparty information and 
assets remain protected, and that the derivatives markets remain stable 
and functioning, particularly as covered entities become ever more 
reliant on rapidly evolving technology and/or third-party service 
providers to support their operations. Requiring all covered entities 
to have a framework directed at operational resilience that meets 
certain minimum requirements, including governance, training, and 
testing requirements, would give the CFTC, customers, counterparties, 
and covered entities themselves confidence that there exists among all 
covered entities a certain foundational level of security and 
resilience. Requiring covered entities to base their ORFs on generally 
accepted standards and best practices further buttresses that assurance 
by making sure adopted practices are grounded in standards that are 
commonly known and accepted, widely recognized as effective, and 
require adaptation as risk profiles change. Relying on existing known 
standards should also help mitigate implementation costs compared to 
complying with specific and detailed requirements created by the 
Commission and applied more uniformly. Furthermore, as the Commission 
engages in oversight of ORFs, it would expect to be able to identify 
additional recommended best practices unique to covered entities that 
it could share through guidance or future rulemakings, which would 
operate to further support the stability of the derivatives markets.
f. Governance--Proposed Paragraph (c)
    The proposed rule would require that each of the three required 
component programs and plan (the information and technology security 
program, the third-party relationship program, and the business 
continuity and disaster recovery plan) be approved in writing, on at 
least an annual basis, by either the senior officer, an oversight body, 
or a senior-level official of the covered entity.\328\ Covered entities 
would likely experience some costs associated with selecting the 
responsible official or body to provide the approval and associated 
costs to obtain their approval, including the time and resources needed 
to develop any explanatory materials, making amendments in light of any 
comments from leadership, and ministerial costs associated with 
obtaining signatures. More specifically, the Commission estimates that 
covered entities would incur an initial cost of $4,000 (40 hours x 
$100/hour) to select the responsible official or body to approve the 
component programs and plan of the ORF,\329\ or an estimated aggregate 
dollar cost of $640,000 (160 covered entities x $4,000). Additionally, 
the Commission estimates that covered entities will incur an ongoing 
annual cost of $1,000 for the approval of the component programs or 
plan of the ORF (10 hours x $100/hour),\330\ or an estimated aggregate 
dollar cost of $160,000 (160 covered entities x $1,000).
---------------------------------------------------------------------------

    \328\ See paragraph (c)(1) of proposed Commission regulations 
1.13 and 23.603.
    \329\ Covered entities may also incur subsequent costs in the 
event there is a change in official or body responsible for the 
approval of the ORF component programs or plan.
    \330\ As discussed supra in section III.B (Paperwork Reduction 
Act) of this notice, the Commission expects covered entities will 
expend a total of 20 burden hours to approve the component programs 
and plan of the ORF, risk appetite, and risk tolerance limits, or to 
prepare a written attestation.
---------------------------------------------------------------------------

    However, the Commission anticipates that providing a covered entity 
broad discretion to select whomever it deems appropriate to provide the 
approval would serve to mitigate some of those costs by allowing the 
covered entity to embed the approval process within its existing 
operational structures. The Commission further believes that requiring 
regular and formal approval of the ORF component programs and plan by 
senior leadership would help ensure that the ORF is in line with 
operational strategy and risk capacity, improving the chances that the 
covered entity would be adequately prepared for, and able to withstand 
and recover from operational shocks, that could otherwise significantly 
harm customers, counterparties, or even have spillover effects into the 
derivatives market as a whole.
    The proposed rule would further require covered entities to 
establish risk appetite and risk tolerance limits with respect to the 
risk areas underlying the ORF (information and technology security, 
third-party relationships, and emergencies or other significant 
disruptions to the continuity of normal business operations).\331\ The 
Commission believes that establishing and operating within established 
risk appetite and risk tolerance limits would help ensure that covered 
entities do not engage in activities that would present risks beyond 
those they can comfortably manage, helping to mitigate the potential 
for covered entities to take on risk that could lead to intolerable 
harm to customers or disruption to the financial system at large.
---------------------------------------------------------------------------

    \331\ See paragraph (c)(2)(i) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

    Covered entities that do not currently have a practice of creating 
a risk appetite statement and establishing and monitoring metrics for 
risk tolerance limits would likely incur costs associated with 
establishing a methodology to identify them, which would involve time 
and staffing resources, or perhaps even the use of consultants, but the 
Commission anticipates such costs should be reduced year over year as 
such covered entities gain experience and streamline processes. 
Nevertheless, the Commission understands that establishing risk 
appetite and tolerance limits is common practice in the financial 
industry, and is included as a recommended part of governance in the 
NIST financial sector profile.\332\ To the extent that covered entities 
already follow this practice, such covered entities would incur general 
costs associated with reviewing their risk appetite and risk tolerance 
limits against the rule requirements to ensure they cover the full 
scope of the rule, but they would avoid the heavier resource burdens of 
developing risk appetite and risk tolerance limits from whole cloth.
---------------------------------------------------------------------------

    \332\ See CRI Profile Workbook, supra note 81, at 16 (``An 
appropriate governing authority . . . endorses and periodically 
reviews the cyber risk appetite and is regularly informed about the 
status of and material changes in the organization's inherent cyber 
risk profile).
---------------------------------------------------------------------------

    The risk appetite and risk tolerance limits would further need to 
be

[[Page 4742]]

reviewed and approved in writing on at least an annual basis by the 
oversight body, senior officer, or other senior-level official with 
primary responsibility for the relevant risk area.\333\ Similar to the 
broad approval of the ORF component programs and plan in general, 
covered entities would likely incur some costs preparing information 
for approval, making amendments in response to comments, and obtaining 
signatures. Specifically, the Commission estimates covered entities 
would incur an ongoing annual cost of $1,000 for the approval of risk 
appetite and risk tolerance limits (10 hours x $1,000),\334\ or an 
estimated aggregate dollar cost of $160,000 (160 covered entities x 
$1,000). The Commission believes that the process of securing formal 
approval would encourage covered entities to think critically about the 
risk appetite and risk tolerance limits they establish and to justify 
them in light of operational strategy. This exercise should bring more 
awareness to activities that create operational risk and lead to better 
outcomes from an operational resilience standpoint, with attendant 
benefits to customers, counterparties, and the market more broadly.
---------------------------------------------------------------------------

    \333\ See paragraph (c)(2)(ii) of proposed Commission 
regulations 1.13 and 23.603.
    \334\ As discussed in section III.B (Paperwork Reduction Act) of 
this notice, the Commission expects covered entities will expend a 
total of 20 burden hours annually to document approval of the 
component plans of the ORF, risk appetite, and risk tolerance 
limits, or to prepare a written attestation.
---------------------------------------------------------------------------

    Relatedly, the proposed rule would require covered entities to 
notify selected senior leadership of circumstances that exceed risk 
tolerance limits and incidents requiring notification to either the 
Commission or customers and counterparties.\335\ The Commission 
understands that such an internal escalation requirement would require 
covered entities to incur some costs in developing policies and 
procedures that reflect this requirement, or reviewing existing 
escalation protocols to ensure they meet the terms of the rule, but the 
Commission believes the requirement is sufficiently flexible to allow 
covered entities to rely on existing operational structures and 
reporting lines, and does not anticipate that any organizational 
changes, or attendant costs, would be necessary. Additionally, the 
Commission views the involvement and awareness of senior leadership in 
cases where risk tolerance limits are exceeded, or where significant 
incidents have occurred that clearly threaten operational resilience, 
as critical to ensuring recovery efforts are coordinated and thus more 
likely to be successful.
---------------------------------------------------------------------------

    \335\ See paragraphs (c)(3)(i)-(ii) of proposed Commission 
regulations 1.13 and 23.603.
---------------------------------------------------------------------------

    The proposed rule would allow covered entities that form a part of 
a larger enterprise to satisfy the requirements of the proposed rule 
through their participation in a consolidated program or plan that 
meets the requirements of the proposed rule.\336\ Additionally, a 
covered entity relying on a consolidated program or plan would be able 
to satisfy the requirements for senior leadership to approve both the 
component program or plan and risk appetite and risk tolerance limits 
by having senior leadership attest on an annual basis that the 
consolidated program or plan meet the requirements of the proposed ORF 
rule, and reflects risk appetite and risk tolerance limits appropriate 
to the covered entity.\337\ The Commission estimates that covered 
entities would incur an ongoing annual cost of $2,000 (20 hours x $100/
hour) to prepare an written attestation,\338\ or an estimated aggregate 
dollar cost of $320,000 (160 covered entities x $2,000). The Commission 
believes allowing covered entities to rely on a consolidated program or 
plan would mitigate costs for such entities, specifically by benefiting 
from economies of scale present in relying on shared corporate 
infrastructure and a larger parent company's resources to manage 
operational risk at a broader enterprise level, and through using 
existing practices that meet the requirements of the proposed rule.
---------------------------------------------------------------------------

    \336\ See paragraph (c)(4)(i) of proposed Commission regulations 
1.13 and 23.603.
    \337\ See paragraph (c)(4)(ii) of proposed Commission 
regulations 1.13 and 23.603.
    \338\ As discussed supra in section III.B (Paperwork Reduction 
Act) of this notice, the Commission expects covered entities will 
expend a total of 20 burden hours annually to document approval of 
the component programs or plans of the ORF, risk appetite, and risk 
tolerance limits, or to prepare a written attestation.
---------------------------------------------------------------------------

    Nevertheless, the Commission expects that such covered entities 
would incur at least some costs associated with reviewing the 
consolidated program or plan to ensure it meets the requirements of the 
proposed rule and reflect risk appetite and risk tolerance limits 
appropriate to the covered entities. Such covered entities may face 
challenges in ensuring that their consolidated programs or plans, which 
may be written with the parent corporate entity as the primary focus, 
appropriately address the risks as they relate more specifically to the 
business and operations of the covered entity, which may be a 
relatively small line of business for the parent. Accordingly, a 
covered entity may incur some costs, in terms of time and staffing 
resources, associated with amending any consolidated program or plan to 
ensure it reflects the proposed rule's requirements and risk appetite 
and risk tolerance limits appropriate to the covered entity. The 
Commission cannot accurately quantify such costs, as these costs could 
range from minimal to more substantial depending on the complexity of 
the organization and how closely the current consolidated program or 
plan meets the requirements of the proposed rule, including how 
particularized they are with respect to identifying and managing the 
risks specific to the covered entity. The Commission believes that such 
requirements are important to ensuring that all covered entities, 
regardless of their operational structure, have a baseline level of 
operational risk management that is tailored to the entity itself, 
helping reduce risk to the overall financial system and the commodity 
derivatives markets in particular. The Commission also preliminarily 
believes that the overall costs of the proposed rule are reduced, 
without any loss of benefit, by allowing covered entities to rely on 
consolidated programs or plans over requiring them to duplicate 
existing larger corporate entity efforts to produce programs or plans 
that are independent and unique to the covered entity.
g. Information and Technology Security Program--Proposed Paragraph (d)
    The proposed rule would require covered entities to have an 
information and technology security program, defined as a written 
program reasonably designed to identify, monitor, manage, and assess 
risks relating to information and technology security and that meets 
certain requirements.\339\ Specifically, the information and technology 
security program would need to include (1) a risk assessment, conducted 
at least annually; (2) effective controls; and (3) an incident response 
plan.\340\ The proposed risk assessment requirement would require 
covered entities to identify and devote resources to planning and 
performing the risk assessment and then analyzing its results. These 
resources would need to include reliance on personnel not responsible 
for the development or implementation of covered technology or related 
controls, which could impose additional staffing needs on some

[[Page 4743]]

covered entities.\341\ The amount of time and resources expended would 
likely vary depending on the size, complexity, and risk profile of the 
covered entity and its degree of reliance on covered technology. The 
Commission believes that larger covered entities with more complex 
business operations and broader risk profiles would likely need to 
devote more permanent and extensive resources, staffing and otherwise, 
to performing and analyzing their risk assessments. Presenting the 
results of the assessment to selected senior leadership would also 
require the devotion of time and staffing resources to prepare for and 
respond to leadership feedback.
---------------------------------------------------------------------------

    \339\ See paragraphs (a) (defining ``information and technology 
security program'') and (b)(2) (components) of proposed Commission 
regulations 1.13 and 23.603.
    \340\ See paragraph (d) of proposed Commission regulations 1.13 
and 23.603.
    \341\ See paragraph (d)(1)(ii) of proposed Commission 
regulations 1.13 and 23.603.
---------------------------------------------------------------------------

    In establishing effective controls, covered entities would be 
required to consider a broad range of categories of controls, determine 
which to implement in line with identified risks, implement them, and 
then review and revise the controls as needed over time in response to 
continued risk assessments. Depending on the types of controls they 
would need to implement, covered entities may take on additional costs 
to acquire new security technology and/or hire additional staff or 
third-party service providers to oversee and implement the controls. 
Again, the Commission would expect any outlays to be appropriate and 
proportionate to the covered entity and its risk profile, so the exact 
costs would vary by covered entity. Nevertheless, given that the 
approach of the proposed rule, and list of required categories, closely 
aligns with the longstanding approach adopted by prudential regulators 
with respect to information and technology security controls, the 
Commission believes that costs for at least prudentially regulated 
covered entities may be reduced compared to other covered entities that 
have not been required to apply and consider such categories of 
controls.\342\
---------------------------------------------------------------------------

    \342\ See supra note 130 and accompanying text.
---------------------------------------------------------------------------

    Development of an incident response plan would likely require a 
noticeable devotion of resources at the outset, as staff would need to 
dedicate time and effort to forming and documenting the plan, including 
creating policies and procedures for identifying the types of incidents 
that need to be reported and to whom. Should an incident occur, the 
plan would require staff at the covered entity to devote time to 
documenting and responding to the incident, as well as identifying and 
taking on remediation efforts.
    Nevertheless, the Commission expects that, given the NFA's ISSP 
Notice, covered entities would likely not need to expend resources to 
develop an information and technology security program from scratch. 
Notably, NFA requires its members to adopt and enforce a written ISSP, 
assess and prioritize the risks associated with its use of information 
technology systems, document and describe in their ISSPs safeguards 
deployed in light of identified and prioritized threats and 
vulnerabilities, and create an incident response plan.\343\ 
Accordingly, some of the compliance burdens associated with 
implementing an information and technology security program should be 
reduced. Covered entities overseen by prudential regulators are also 
required to consider similar categories of controls to those in the 
proposed rule, so compliance costs as realized by prudentially 
regulated covered entities may be even further reduced.\344\ Notably, 
however, NFA does not mandate that a risk assessment be conducted at 
least annually by personnel not responsible for the development or 
implementation of covered technology or related controls. Although the 
Commission believes these requirements to be consistent with generally 
accepted standards and best practices, such that covered entities may 
be following them anyway, some covered entities may nevertheless 
experience some additional costs associated with ensuring or otherwise 
acquiring staff sufficiently independent to conduct the risk assessment 
and in potentially conducting the risk assessment more frequently than 
they currently do. The Commission also recognizes that, if adopted, the 
proposed rule would at minimum require covered entities to expend 
resources to review the ISSPs they established pursuant to NFA rules to 
ensure they meet the requirements of the information and technology 
security program.
---------------------------------------------------------------------------

    \343\ See NFA ISSP Notice, supra note 43.
    \344\ See 12 CFR part 30, app. B.
---------------------------------------------------------------------------

    Notwithstanding the potential operational and staffing costs to 
covered entities associated with the proposed rule, the Commission 
believes the benefits of the requirements of the proposed information 
and technology security program are well established. Risk assessments 
are crucial to identifying threats and vulnerabilities, which is key to 
directing resources to mitigate those risks in a way that increases the 
effectiveness of security efforts. The Commission likewise believes the 
benefits of an independent risk assessment (a more unbiased and 
reliable assessment) and conducting it at least annually (ensuring the 
information and technology security program is up-to-date and 
responsive in light of current threat landscape and vulnerabilities at 
the covered entity) are important to supporting covered entity 
operational resilience. Likewise, controls are the methods or 
techniques for monitoring and managing those risks and safeguarding 
information, operations, and assets. Without them, the potential for a 
system weakness to be exploited, and for customers and counterparties, 
covered entities, or the market at large to be harmed is increased, as 
the interconnected nature of the commodity derivatives markets enhances 
the possibility for spillover effects. Incident response plans operate 
to reduce the potential magnitude of the harm should a safeguard fail 
by creating a concrete plan, known in advance, for how the covered 
entity should respond, thereby shortening response times following an 
incident. Accordingly, the Commission believes the proposed minimum 
requirements of the information and technology security program, in 
combination with the Commission's oversight, would further support the 
development of a foundational level of operational risk management 
practices with respect to information and technology security that 
would benefit customers, counterparties, and the market at large.
h. Third-Party Relationship Program--Proposed Paragraph (e)
    The proposed rule would require covered entities to have a third-
party relationship program, defined as a written program reasonably 
designed to identify, monitor, manage, and assess risks relating to 
third-party relationships.\345\ The program would need to describe how 
covered entities address the risks attendant to each of the five 
identified stages of the third-party relationship lifestyle, ranging 
from pre-selection to termination, with heightened due diligence and 
monitoring required for critical third-party service providers.\346\ 
The proposed rule would further require covered entities to create, 
maintain, and regularly update an inventory of third-party service 
providers engaged to support their activities as covered entities, 
identifying whether each is a critical third-party service 
provider.\347\
---------------------------------------------------------------------------

    \345\ See paragraphs (a) (defining ``third-party relationship 
program'') and (e) (third-party relationship program) of proposed 
Commission regulations 1.13 and 23.603.
    \346\ See paragraphs (e)(1)(i)-(v) and (e)(2) of proposed 
Commission regulations 1.13 and 23.603.
    \347\ See paragraph (e)(3) of proposed Commission regulations 
1.13 and 23.603.

---------------------------------------------------------------------------

[[Page 4744]]

    As with the information and technology security program, complying 
with this aspect of the proposed rule would require covered entities to 
expend staff resources at the outset to develop the program and put it 
into writing. Although NFA requires its members, including covered 
entities, to have a written supervisory framework for its third-party 
service providers, which could help mitigate these costs, NFA's written 
supervisory framework only extends to outsourcing functions, i.e., 
regulatory functions that would otherwise be undertaken by the NFA 
member itself to comply with NFA and CFTC requirements.\348\ 
Accordingly, covered entities would likely experience at least some 
staffing burdens expanding their NFA frameworks to fit the broader 
scope of third-party relationships covered by the proposed rule and 
implementing it across their third-party service providers more 
broadly. However, applying the proposed (b)(3) standard, covered 
entities should be able to align their third-party risk management 
practices to the risks presented by each individual third-party service 
provider, which would allow covered entities to tailor and fit the 
costs of their third-party practices to their unique circumstances. 
Covered entities following prudential rules and guidance with respect 
to third-party service providers, which applies to all third-party 
relationships, would likely experience reduced costs compared to other 
covered entities with respect to any need to modify their existing 
programs.\349\ Additionally, the proposed rule would not require 
covered entities to perform due diligence or renegotiate contracts with 
existing third-party service providers, which would avoid a potentially 
substantial initial fixed cost from implementing the third-party 
relationship program.
---------------------------------------------------------------------------

    \348\ See NFA Third-Party Notice, supra note 43.
    \349\ See 12 CFR part 30, app. B, III.D. (Oversee Service 
Provider Arrangements); Prudential Third-Party Guidance, supra note 
43.
---------------------------------------------------------------------------

    Creating an initial inventory of third-party service providers, and 
assessing whether they meet the definition of ``critical third-party 
service provider'' would also require a temporary redirection of staff 
resources, with the amount of time and resources required varying 
depending on the extent and complexity of a given covered entity's 
reliance on third-party service providers. With respect to critical 
third-party service providers, the Commission preliminarily believes 
that many, if not all, covered entities currently have in place a 
process to identify and categorize covered entities as ``critical'' or 
otherwise requiring enhanced supervisory activities. Additionally, NFA 
requires its members to have heightened due diligence for third-party 
service providers that obtain or have access to critical and/or 
confidential data and those that support critical regulatory-related 
systems, which could potentially reduce burdens on covered entities in 
designing and implementing heightened due diligence and monitoring with 
respect to critical third-party service providers.\350\ Although the 
Commission preliminarily believes that its proposed definition of 
``critical third-party service provider'' should identify many, if not 
all, of the same providers covered entities would themselves identify 
as ``critical,'' the Commission recognizes that the process of applying 
the proposed definition to an existing process would, at minimum, 
require some initial expenditure of staff resources to ensure existing 
practices and taxonomies align with the proposed rule.\351\ 
Additionally, the process of creating an inventory of third-party 
service providers, which is not currently required by NFA or prudential 
regulators, could be particularly burdensome, especially for covered 
entities with a large number of complex third-party relationships, or 
that rely on an affiliate to secure and coordinate third-party service 
providers as part of a larger enterprise-wide function, potentially 
involving staff from many different departments or the review of 
multiple contracts or contract databases.
---------------------------------------------------------------------------

    \350\ See NFA Third-Party Notice, supra note 43.
    \351\ See paragraph (a) of proposed Commission regulations 1.13 
and 23.603 (defining ``critical third-party service provider'').
---------------------------------------------------------------------------

    Nevertheless, the Commission believes that requiring covered 
entities to have a program to identify, monitor, manage, and assess 
risks relating to third-party relationships, and inventory their third-
party service providers, would have meaningful benefits at the 
individual covered entity-level, as well as for customers and 
counterparties and the derivatives markets at large. Given their roles 
and interconnectedness in the derivatives markets, an operational shock 
at one covered entity can have ripple effects across the markets. 
Requiring covered entities to develop and maintain a program to help 
evaluate and address the risk at each stage of the third-party 
relationship--from before selecting a third-party service provider to 
how such a relationship would be supervised and terminated--may not 
only help covered entities be more fully aware of and manage the risks 
of their third-party relationships, it could also help increase overall 
confidence levels in the derivatives markets by ensuring customers and 
counterparties that there is a foundational level of third-party risk 
management practices across covered entities.
    Additionally, the proposed rule could operate to raise minimum 
standards with regards to how third-party risks are managed, by 
introducing enhanced due diligence or monitoring practices for critical 
third-party service providers, for instance, which could lead to real 
and measurable reduction in risk to the financial system. The act of 
creating an inventory of third-party service providers would also help 
increase the likelihood of identifying interdependencies or 
overdependencies, which could cause covered entities to reevaluate 
particular relationships (i.e., diversify third-party service providers 
to reduce concentration risk) or take on additional activities (e.g., 
insurance) to help mitigate those risks, thereby promoting operational 
resilience. Identifying critical third-party service providers should 
also help enhance operational awareness of those entities and ensure 
they receive the required heightened monitoring to ensure that the risk 
of disruption to critical services, which could have a broader impact 
on the markets or customers and counterparties, is mitigated.
i. Business Continuity and Disaster Recovery Plan--Proposed Paragraph 
(f)
    The proposed rule would require covered entities to have a BCDR 
plan, defined as a written plan outlining the procedures to be followed 
in the event of an emergency or other significant disruption to the 
continuity of normal business operations and that meets certain 
requirements.\352\ This would be a new CFTC requirement for FCMs, but 
current Commission regulation 23.603 imposes a BCDR plan requirement on 
swap entities that is substantially similar to the proposed rule, as 
the proposed rule was modeled after the current BCDR requirement for 
swap entities with certain modifications.\353\ Additionally, although 
the CFTC does not currently impose a BCDR plan requirement on FCMs, NFA 
and CME do, which the Commission believes should help FCMs mitigate the 
costs of establishing a BCDR plan for purposes of complying with the 
proposed rule, particularly since some of the amendments to the current 
BCDR plan requirement for swap entities have the effect of further 
aligning the regulatory

[[Page 4745]]

text with NFA and CME BCDR plan requirements.\354\
---------------------------------------------------------------------------

    \352\ See paragraphs (a) (defining ``business continuity and 
disaster recovery plan'') and (b)(2) (components) of proposed 
Commission regulation 1.13 and 23.603.
    \353\ See 17 CFR 23.603.
    \354\ See NFA Rule 3-38, supra note 43; CME Rule 983, supra note 
185.
---------------------------------------------------------------------------

    The proposed rule would require covered entities' BCDR plans to be 
reasonably designed to enable the covered entities to continue or 
resume any activities as a covered entity with minimal disruption to 
counterparties, customers, and the markets, and to recover and make use 
of covered information, as well as any other data, information, or 
documentation required to be maintained by law and regulation.\355\ The 
proposed rule would further require the BCDR plans to include certain 
minimum contents, including: identifying and backing up required 
information; identifying and developing backups for required resources, 
including technology, facilities, and staff; identifying potential 
disruptions to critical third-party service providers; identifying 
implicated personnel; and establishing a communication plan.\356\
---------------------------------------------------------------------------

    \355\ See paragraph (f)(1) of proposed Commission regulation 
1.13 and 23.603.
    \356\ See paragraph (f)(2) of proposed Commission regulation 
1.13 and 23.603.
---------------------------------------------------------------------------

    To design a BCDR plan that meets that standard, covered entities 
would need to expend resources to establish and preserve backup 
resources (staffing, technology, inputs) for use in the event of the 
BCDR plan's activation, and to create backups of the information the 
BCDR plan would cover. Depending on the size and complexity of a 
particular covered entity's business, those costs could be sizeable, as 
they may require negotiating and entering into new contracts with 
backup resource providers, or other third-party service providers. 
Covered entities would also need to expend resources to establish a 
plan to minimize the impact of disruptions and establish a 
communication plan, which would include identifying implicated persons 
and bodies and establishing potential contacts, methods, modes, and 
priorities of communication. Finally, the resources to document all of 
this work in the plan would likely be more than simply ministerial 
effort, as staff would likely have to spend time working through 
various deliberative points, at least at the outset in first developing 
the BCDR plan. The costs to maintaining the plan would likely be 
reduced compared to the initial fixed costs, however, as the plan put 
into action over time.
    Nevertheless, the Commission expects that most covered entities 
have already incurred at least some of these potential costs by virtue 
of either the existing CFTC BCDR plan requirements for swap entities, 
or the NFA and CME BCDR plan requirements applicable to FCMs. Notably, 
the ``essential elements'' of NFA's BCDR Notice aligns closely with the 
minimum requirements for the Commission's proposed BCDR plan 
requirement, requiring FCMs to establish backups in one more reasonably 
separate geographic areas, to backup or copy essential documents and 
data and store them off-site, to consider the impact of interruptions 
by third-parties and ways to minimize the impact, and to develop a 
communication plan.\357\ Accordingly, although the Commission expects 
FCMs would incur at least some costs reviewing their BCDR plans to 
ensure they meet the proposed CFTC requirements, the Commission 
preliminarily believes most FCMs would be able to avoid the more 
substantial initial costs of developing a BCDR plan from scratch.
---------------------------------------------------------------------------

    \357\ See NFA BCDR Notice, supra note 43.
---------------------------------------------------------------------------

    The Commission further believes that the expenditure of resources 
required to create the proposed plan would help give the derivatives 
markets and customers and/or counterparties confidence that covered 
entities' operations would be able to be quickly reestablished 
following an emergency or significant disruption, improving the overall 
resilience of the market and perhaps lowering customer/counterparty 
risk and its associated costs. Having a plan that centralizes key 
information related to an emergency--including identifying core 
information, personnel, systems, and resources needed to resume 
operations--should also help facilitate covered entities in achieving 
the recovery time objective of being back up and running with minimal 
disruption to counterparties, customers, and the derivatives markets, 
supporting market confidence and reducing overall systemic risk. 
Maintaining copies of the plan in accessible off-site locations should 
impose no more than ministerial costs and would help ensure that 
covered entities can access the plan in a crisis.
    The proposed rule would amend the current BCDR plan requirement for 
swap entities in a few ways, some of which the Commission expects would 
have cost-benefit implications.\358\ For instance, the proposed rule 
would require covered entities to ``recover and make use of all covered 
information, as well as any other data, information, or documentation 
required to be maintained by law and regulation,'' which expands the 
information BCDR plans would be required to cover beyond that required 
to be maintained by applicable law and regulation, and makes clear the 
information should not only be recovered but also accessible and still 
useable.\359\ Depending on current BCDR plan practices by swap 
entities, the proposal could potentially cause covered entities to 
expand the sources of information they need to backup and/or augment 
their backup systems to ensure the information stored there is useable. 
The proposed rule would also no longer require swap entities to ensure 
their BCDR plans are designed to enable swap entities to continue or 
resume operations ``by the next business day.'' \360\ Although the 
Commission does not believe that this change would have an impact on 
the actual recovery time of swap entities following an emergency or 
other significant disruption, given that both current Commission 
regulation 23.603 and the proposed rule require that the BCDR plan be 
designed to ensure recovery with minimal disruption to counterparties 
and the market, swap entities could need to dedicate at least some 
staff time to review their BCDR plans to ensure that they continue to 
meet the rule requirements.
---------------------------------------------------------------------------

    \358\ As with the other sections of this notice, portions of the 
BCDR plan requirement for swap entities in current Commission 
regulation 23.603 that have been expanded in the proposal to apply 
to the ORF more broadly, notably testing, are discussed in the 
context of the discussion of those specific requirements.
    \359\ See 17 CFR 23.603(a).
    \360\ Id.
---------------------------------------------------------------------------

j. Training and Distribution--Proposed Paragraph (g)
    The proposed rule would require covered entities to establish, 
implement, and maintain training with respect to the ORF, including 
general cybersecurity awareness training and role-specific training for 
personnel involved in the ORF.\361\ If the proposed rule is adopted, 
covered entities would need to expend resources to develop and/or 
evaluate and acquire externally sourced training. Those outlays would 
include the costs associated with establishing the training at the 
outset, as well as ongoing costs associated with updating and providing 
the training at least every year.\362\ There would also be 
administrative costs associated with distributing copies of the 
component programs or plan to relevant personnel and providing them 
with any significant revisions.\363\ Nevertheless, the

[[Page 4746]]

Commission believes that establishing, implementing, and maintaining a 
training program is crucial to realizing the benefits of the proposed 
ORF. Not only would it help ensure that employees of covered entities 
are kept aware of good cyber hygiene practices, which should reduce the 
potential for covered information to be compromised and customers and 
counterparties to be negatively impacted, training would help ensure 
that the ORF practices covered entities establish are accurately 
implemented and maintained by the personnel tasked with 
operationalizing the ORF. Although allowing covered entities to provide 
training less frequently than annually would reduce compliance costs 
for covered entities, the Commission believes that annual training is 
needed to preserve its benefits given the rapidly evolving pace of 
technology and the potential for human error to result in actual harm 
to operations or even customers or counterparties.\364\
---------------------------------------------------------------------------

    \361\ See paragraph (g)(1) of proposed Commission regulations 
1.13 and 23.603.
    \362\ See paragraph (g)(2) of proposed Commission regulations 
1.13 and 23.603
    \363\ See paragraph (g)(3) of proposed Commission regulations 
1.13 and 23.603.
    \364\ See supra note 18 and accompanying text.
---------------------------------------------------------------------------

k. Reviews and Testing--Proposed Paragraph (h)
    The proposed rule would require covered entities to establish, 
implement, and maintain a plan reasonably designed to assess adherence 
to, and the effectiveness of, their ORF through regular reviews and 
risk-based testing.\365\ At the outset, covered entities would need to 
dedicate staff resources to develop a review and testing plan for the 
ORF; ongoing staff resources would be needed to conduct reviews at 
least annually and risk-based testing at a frequency that is 
appropriate and proportionate to each covered entity's nature, size, 
scope, complexity, and risk profile, following generally accepted 
standards and best practices.\366\ Covered entities would further 
assume regular costs associated with documenting the reviews and 
testing (e.g., results of testing, assessment of effectiveness, 
recommendations for modifications/improvements/corrective actions) and 
reporting on them to the CCO and any other relevant senior-level 
official(s) and oversight body(ies).\367\ In general, the ongoing costs 
of the required testing and reviews are likely to vary by covered 
entity, with larger, more complicated covered entities likely expending 
significantly more resources to conduct testing consistent with the 
proposed (b)(3) standard.\368\
---------------------------------------------------------------------------

    \365\ See paragraph (h) of proposed Commission regulations 1.13 
and 23.603.
    \366\ See paragraph (b)(3) of proposed Commission regulations 
1.13 and 23.603.
    \367\ See paragraphs (h)(4) and (h)(5) of proposed Commission 
regulations 1.13 and 23.603.
    \368\ The Commission estimates, on average, that covered 
entities will incur an initial annual cost of $8,000 (80 hours x 
$100/hour) to establish a plan to assess adherence to, and the 
effectiveness of, its ORF, and to document all reviews and testing 
of the ORF, or an estimated aggregate dollar cost of $1,280,000 (160 
covered entities x $8,000).
---------------------------------------------------------------------------

    With respect to the reviews of the ORF, the proposed rule would 
require that they be conducted at least annually and in connection with 
any material change that is reasonably likely to affect the risks 
addressed by the ORF. The proposed rule would further require the 
reviews to include an analysis of adherence to, and the effectiveness 
of the ORF, as well as any recommendations for improvements.\369\ This 
standard is generally consistent with, and would replace, the current 
review standard in current Commission regulation 23.603 for swap entity 
BCDR plans, such that associated costs for reviewing the BCDR plan 
should not be affected by the proposal.\370\ NFA's ISSP Notice and BCDR 
Notice also require NFA members to review their ISSPs or BCDR pans on a 
regular or periodic basis.\371\ Accordingly, while covered entities may 
experience some staffing costs in assuring their reviews are at least 
annual, costs associated with establishing a review process more 
broadly should have already been realized by most covered entities.
---------------------------------------------------------------------------

    \369\ See paragraph (h)(1) of proposed Commission regulations 
1.13 and 23.603
    \370\ See 17 CFR 23.603(f) (``A member of the senior management 
of each swap dealer and major swap participant shall review the 
business continuity and disaster recovery plan annually or upon any 
material change to the business. Any deficiencies found or 
corrective action taken shall be documented.'')
    \371\ See NFA BCDR Notice, supra note 43; NFA ISSP Notice, supra 
note 43.
---------------------------------------------------------------------------

    For testing, the proposed rule would generally require that its 
frequency, nature, and scope would be determined consistent with the 
proposed (b)(3) standard.\372\ The Commission believes that such a 
risk-based standard would allow covered entities to tailor testing to 
their unique business and risk profile, focusing testing efforts on 
areas that would be the most impactful or revealing and avoiding 
unnecessary costs. Nevertheless, with respect to testing of the 
information and technology security program, the proposed rule would 
require covered entities to assume costs for some specific testing, 
including testing of key controls and the incident response plan, as 
well as daily or continuous vulnerability assessments and penetration 
testing at least annually.\373\ Although regular testing of key 
controls and the incident response plan is likely to require time and 
staff resources, the Commission believes that without testing, it would 
be impossible for covered entities to know whether the controls are 
functioning to mitigate risk as expected, and for the incident response 
plan to be actionable in times of emergency. Daily or continuous 
vulnerability assessments and penetration testing at least annually 
could require additional staff and technology outlays.\374\ The exact 
cost of testing as realized by each covered entity, however, is likely 
to vary depending on the scope and complexity of its operations, and 
the degree to which it has already incorporated vulnerability 
assessments and penetration testing as part of its ISSP.\375\
---------------------------------------------------------------------------

    \372\ See paragraph (h)(2) of proposed Commission regulations 
1.13 and 23.603.
    \373\ See paragraph (h)(2)(i) of proposed Commission regulations 
1.13 and 23.603.
    \374\ CISA makes available a free vulnerability scanner, see 
supra note 248.
    \375\ The NFA ISSP Notice provides that a member ``may include 
penetration testing of the firm's systems, the scope and timing of 
which is highly dependent upon the Member's size, business, 
technology, its electronic interconnectivity with other entities and 
the potential threats identified in its risk assessment.'' See NFA 
ISSP Notice, supra note 43.
---------------------------------------------------------------------------

    The Commission believes that vulnerability assessments and 
penetration testing are essential for covered entities to know what 
their vulnerabilities are and how they might be exploited, so they can 
take steps to mitigate associated risks, including by adapting internal 
controls, which are a key component of preserving operational 
resilience. Given the dynamic, ever changing nature of technology and 
cybersecurity, the Commission believes that continual and active action 
and engagement are necessary to ensure controls are operating as 
intended, and for covered entities to have an accurate assessment of 
the risks to their covered information and technology. By not mandating 
specific types of penetration testing, however, the Commission believes 
the proposed rule is adapted to allow the wide range of covered 
entities subject to the proposed rule to adopt types of testing that 
are recommended for and best fit their unique circumstances, so as to 
achieve the highest level of improved cybersecurity without incurring 
unnecessary costs. The Commission further believes such testing is 
essential cyber hygiene and their use among covered entities would help 
ensure a base level of monitoring in the derivatives markets that is 
readily accessible.

[[Page 4747]]

    With respect to testing of the BCDR plan, the proposed rule would 
require covered entities to dedicate time and staff resources to 
conduct a walk-through or tabletop exercise designed to test the 
effectiveness of backup facilities and capabilities at least annually, 
which could involve outreach to operators of backup facilities.\376\ 
Such a periodic effort would likely consume staff time and resources to 
put into place, including potentially in designing tabletop exercise 
scenarios. The Commission expects that this aspect of the proposed rule 
would not have any cost impact on swap entities, as current 23.603 
requires annual testing of their BCDR plan, and the Commission does not 
believe the clarification that the testing be a walk-through or 
tabletop exercise would have substantive effect.
---------------------------------------------------------------------------

    \376\ See paragraph (h)(2)(i) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

    Because the proposed rule would require the reviews and testing to 
be conducted by qualified personnel who are independent of the aspect 
of the ORF being reviewed or tested, the Commission anticipates this 
work would either be conducted by internal compliance audit staff, 
external independent auditors, or other internal staff, provided they 
were not involved in creating the ORF component being tested.\377\ 
Accordingly, this independence requirement could require covered 
entities to reassign duties or secure additional staffing resources, 
either of which would impose some additional costs.
---------------------------------------------------------------------------

    \377\ See proposed paragraph (h)(3) of proposed Commission 
regulations 1.13 and 23.603.
---------------------------------------------------------------------------

    Nevertheless, the Commission believes that annual reviews and 
testing are essential to ensuring that the ORF is operating as 
intended, and thus to ensuring the intended and expected benefits of 
the ORF with respect to protecting customers and mitigating systemic 
risk are actually realized. Without proper review and testing, 
determining whether the intended benefits of the ORF are being achieved 
would not be possible. Although eliminating the independence 
requirement could alleviate some potential staffing burdens on covered 
entities, the Commission believes that independence in reviews and 
testing is critical to preserving their benefits by helping to ensure 
that the results are reliable and unbiased. The Commission further 
believes that by allowing covered entities to adjust the frequency, 
nature, and scope of their risk-based testing of the ORF in a manner 
that is appropriate and proportionate to the circumstances, following 
generally accepted standards and best practices, the proposed rule 
would ensure that costs of the rule would be as well tailored to the 
covered entity as possible to realize benefits at the least cost.
    With respect to the BCDR plan requirement for swap entities in 
particular, the Commission believes the proposed rule could reduce 
review and testing costs. First, it would eliminate costs associated 
with securing an independent auditor to audit the plan every three 
years.\378\ Although there may be some benefits to having an 
independent audit of a BCDR plan, including having an external party 
with fresh eyes identify issues and potential improvements that might 
not be readily apparent to internal staff, the Commission preliminarily 
believes, based on its experience, that the internal reviews and 
testing of the BCDR plan are sufficient to achieve iterative 
improvements to the BCDR plan, making the costs associated with the 
independent audit unnecessary. Second, the proposed rule would 
eliminate the separate requirement that a member of senior management 
for a swap entity review the BCDR plan annually or upon any material 
change to the business and to document any deficiencies found or 
corrective action taken.\379\ While the proposed rule would retain the 
annual review requirement for the BCDR plan, not requiring the review 
to be undertaken by a member of senior management may result in at 
least some burden reduction for senior management.
---------------------------------------------------------------------------

    \378\ See 17 CFR 23.603(g).
    \379\ See 17 CFR 23.603(f).
---------------------------------------------------------------------------

l. Notification Provisions--Proposed Paragraphs (i) and (j)
    The proposed rule would require covered entities to provide certain 
notifications to either the Commission or affected customers or 
counterparties.\380\ Notifications to the Commission, made 
electronically via email, would relate either to the covered entity's 
determination to activate the BCDR plan, or an ``incident,'' as defined 
in the proposed rule, that adversely impacts, or is reasonably likely 
to adversely impact information and technology security, the covered 
entity's ability to operate, or the assets or positions of a customer 
or counterparty.\381\ In both cases, the notifications to the 
Commission would be intended to function as early warnings and thus 
would not need to be complete or detailed. Understanding that the 
information available to covered entities would be preliminary and 
incomplete at the time of the notification, the Commission would not 
expect covered entities to expend considerable resources to assemble 
notifications that are perfectly accurate and complete. Rather, the 
proposed rule would only require that the information provided to the 
Commission would be whatever the covered entity has available at the 
time that could assist the Commission in its oversight or response, 
with the understanding that resources should predominantly be directed 
at mitigating and recovering from the incident, emergency, or 
significant disruption.\382\ Prioritizing an early warning over 
complete information should not only reduce the costs for covered 
entities in delivering the notification, but also allow the Commission 
the best opportunity to take quick responsive action, if appropriate.
---------------------------------------------------------------------------

    \380\ See paragraphs (i) and (j) of proposed Commission 
regulations 1.13 and 23.603.
    \381\ See paragraph (i) of proposed Commission regulations 1.13 
and 23.603.
    \382\ See paragraphs (i)(1)(ii) and (i)(2)(ii) of proposed 
Commission regulations 1.13 and 23.603.
---------------------------------------------------------------------------

    Accordingly, while the Commission recognizes that there would be at 
least some information gathering and administrative costs associated 
with providing the notice, the Commission does not intend or expect the 
resource burden for providing the notification to be significant.\383\ 
This limited early-warning function for the notice requirement is 
further supported by the relatively brief 24-hour time period for 
providing the notices.\384\
---------------------------------------------------------------------------

    \383\ The Commission estimates that for each ``incident'' 
requiring notification, covered entities will incur a cost of $1,000 
(10 hours x $100/hour) to gather the information required and to 
provide notification to the Commission, or an estimated aggregate 
dollar cost of $160,000 (160 covered entities x $1,000).
    \384\ See paragraphs (i)(1)(iii) and (i)(2)(iii) of proposed 
Commission regulations 1.13 and 23.603.
---------------------------------------------------------------------------

    With respect to the BCDR plan in particular, the Commission does 
not believe covered entities would expend significant resources to 
notify the Commission, since the notification trigger (activation of 
the BCDR plan) is relatively bright-line. The Commission recognizes 
that with respect to the incident notification, however, covered 
entities may need to engage in some deliberation to determine whether 
an incident has or is reasonably likely to have an adverse impact, 
which would consume some staff resources. Preliminarily, the Commission 
estimates that covered entities activating their BCDR plan would incur 
a cost of $1000 (10 hours x $100/hour) to notify the Commission, or an 
estimated aggregate dollar cost of $160,000 (160 covered entities x 
$1,000). The Commission believes, however, that these costs may go down 
over time, as covered entities

[[Page 4748]]

gain familiarity in applying the notification provision. The Commission 
also preliminarily believes that an adverse impact standard would be 
potentially easier to apply than one that included a materiality 
limiter, which could introduce further need for interpretation and 
internal deliberation for covered entities to determine whether the 
impact is ``material'' or ``significant.'' Additionally, scoping 
notifications to incidents with a likely adverse impact and to BCDR 
activation would help focus the Commission's oversight activities and 
responsive efforts on cases where it could act to support the 
derivatives markets and customers and counterparties, potentially 
reducing the potential for ripple effects.
    In addition to notifications to the Commission, the proposed rule 
would require covered entities to notify affected customers or 
counterparties as soon as possible of any incident that is reasonably 
likely to have adversely affected the confidentiality or integrity of 
their covered information, assets, or positions.\385\ Because the rule 
does not contain a specific timing limit for providing this 
notification, the Commission does not expect that this notification 
requirement would cause covered entities to need to divert any 
resources while managing the incident to draft the notification. 
Rather, the Commission expects that most of the costs associated with 
this notification requirement would be in spending the necessary staff 
resources to gather and report facts as accurately as possible to aid 
affected customers and counterparties in understanding and assessing 
the potential impact of the incident on their information, assets, or 
positions and to take any necessary action.\386\ Covered entities may 
also need to dedicate staff resources to interacting with customers or 
counterparties after the notification is given to provide more 
information or answer questions. The Commission estimates that for each 
``incident'' requiring notification, covered entities will incur a cost 
of $5,000 (50 hours x $100/hour) to gather the required information 
necessary to provide notice to customers or counterparties and to 
prepare and deliver the required notification, or an estimated 
aggregate dollar cost of $800,000 (160 covered entities x $5,000). The 
Commission believes that this notification could produce substantial 
benefits to customers and counterparties, especially where state or 
other federal law does not otherwise require such notifications, as 
they would give customers and counterparties the information they would 
need to further protect their information and assets and allow them to 
seek other avenues of redress.
---------------------------------------------------------------------------

    \385\ See paragraph (j)(1) of proposed Commission regulations 
1.13 and 23.603.
    \386\ See paragraph (j)(2) of proposed Commission regulations 
1.13 and 23.603.
---------------------------------------------------------------------------

m. Emergency Contacts and Recordkeeping--Proposed Paragraphs (k) and 
(l)
    The proposed rule would require covered entities to provide the 
Commission with the name and contact information of employees in 
connection with incidents triggering notification to the Commission and 
in connection with the activation of the covered entity's BCDR 
plan.\387\ The identified employees would need to be authorized to make 
key decisions on behalf of the covered entity and have knowledge of the 
covered entity's incident response plan or BCDR plan, as 
appropriate.\388\ Covered entities would also need to update their 
contacts with the Commission, as necessary.\389\ The Commission 
believes that ensuring it has knowledgeable contacts with whom to 
direct communications during a crisis would aid the Commission's 
ability to take any necessary responsive action, and that the costs 
associated with identifying and updating the appropriate contacts would 
be ministerial in nature.\390\ With respect to BCDR plan emergency 
contacts for swap entities, the proposed rule is identical in substance 
to current Commission regulation 23.603, such that it should impose no 
additional costs on swap entities.\391\
---------------------------------------------------------------------------

    \387\ See paragraph (k)(1) of proposed Commission regulations 
1.13 and 23.603.
    \388\ See paragraph (k)(2) of proposed Commission regulations 
1.13 and 23.603.
    \389\ See paragraph (k)(3) of proposed Commission regulations 
1.13 and 23.603.
    \390\ The Commission estimates that covered entities will incur 
a cost of $100 (1 hour x $100/hour) to provide the Commission with 
emergency contact information, or an estimated aggregate dollar cost 
of $16,000 (160 covered entities x $100).
    \391\ See 17 CFR 23.603(3).
---------------------------------------------------------------------------

    The proposed rule would also further require covered entities to 
maintain all records required to be maintained pursuant to this section 
in accordance with Commission regulation 1.31, and make them available 
promptly upon request to representatives of the Commission and to 
representatives of applicable prudential regulators.\392\ Covered 
entities would incur costs associated with maintaining a recordkeeping 
system that allows for easy records retrieval, which would require both 
staff resources and likely reliance on electronic recordkeeping 
systems. The Commission believes these costs are likely mitigated for 
most covered entities, as they would be able to rely on existing 
recordkeeping systems designed to maintain other records in accordance 
with Commission regulation 1.31, and proper recordkeeping would help 
covered entities demonstrate compliance with the ORF rule, and ensure 
their ORFs are operating as expected as they conduct required reviews 
and testing.
---------------------------------------------------------------------------

    \392\ See paragraph (l) of proposed Commission regulations 1.13 
and 23.603.
---------------------------------------------------------------------------

2. Section 15(a) Factors
a. Protection of Market Participants and the Public
    The Commission believes the proposed rule would support protection 
of market participants and the public. The Commission preliminarily 
believes the proposed rule will help protect market participants and 
the public by increasing the operational resiliency of covered entities 
to disruptions caused by natural disasters, cyber-attacks, and failures 
at third-party service providers. As covered entities are responsible 
for safeguarding customers' accounts, executing trades, maintaining 
records, and reporting to relevant agencies, their operational 
resiliency will mitigate the negative impact on customers, clients, and 
counterparties in case of an incident. The proposed rule may also help 
reduce the likelihood of an incident due to proposed proactive measures 
such as penetration and vulnerability testing and cyber security 
training. For market participants and the public more generally, the 
benefits include enhanced market protection against the spread of 
contagion risk to the financial system from operational risks.
b. Efficiency, Competitiveness, and Financial Integrity of Markets
    The Commission believes the proposed rule would enhance the 
financial integrity of CFTC-regulated derivatives markets. SDs, MSPs, 
and FCMs are essential intermediaries in the financial markets 
regulated by the Commission. Due to the interconnectedness of markets, 
disruptions to the business operations of these intermediaries pose 
risks to other markets. The Commission believes that increasing and 
helping to ensure the operational resiliency of these covered entities 
would help improve the financial integrity of the derivatives markets. 
The proposed rule's requirement to report to the Commission incidents 
and BCDR plan

[[Page 4749]]

activation would assist the Commission effectuate a timely response to 
business disruptions, which will help mitigate the impact on other 
market participants and promote financial stability and confidence. 
Additionally, to the degree that the proposed rule aligns with other 
existing applicable requirements, including NFA rules and interpretive 
notices, and incorporates generally accepted standards and best 
practices currently broadly relied on by covered entities, the proposed 
rule would support regulatory convergence and the efficiencies that may 
generate.
c. Price Discovery
    The Commission does not anticipate the proposed rule directly 
impacting the price discovery process. Nevertheless, if a trading 
disruption would be prevented or shortened by this proposed rulemaking, 
then price discovery would be improved.
d. Sound Risk Management Practices
    The Commission believes the proposed rule would promote the 
development of sound risk management practices among covered entities. 
Programs, plans, policies, and procedures are required for operational 
risks, which now explicitly include cybersecurity and third-party risks 
that adhere to current best practices. These processes seek to help 
covered entities identify, protect, detect, respond, and recover from 
such risks. As such, the operational risk management processes of 
covered entities may be improved.
e. Other Public Interest Considerations
    The proposed rule relies on and incorporates aspects of existing 
standards and practices developed by other regulators and standard-
setting bodies, including NFA rules and interpretive notices; 
prudential rules and guidance; and NIST, ISO, FFIEC and other sources 
of cyber and operational resilience standards. Accordingly, the 
proposed rule should support the development of further convergence in 
the area of operational resilience and allow covered entities to 
develop ORFs that are adaptive and responsive to rapidly changing 
circumstances and technology, which the Commission believes could lead 
to better protection of markets against the spread of contagion risks 
to the financial system from operational risks, in general.
3. Request for Comments
    As noted, the Commission invites public comment on all aspects of 
its cost-benefit consideration, including, but not limited to the 
baseline and the identification and measurement of costs and benefits 
relative to it; the identification, measurement, and assessment of any 
costs and benefits not discussed herein; whether the Commission has 
misidentified any costs or benefits; what, if any, alternatives would 
be more reasonable in terms of their costs and benefits; and the 
Section 15(a) factors described above. The Commission asks that 
commenters explain and support the reasons for positions asserted in 
their comment letters and, further, include in them any data or other 
information that they may have to assist the Commission's ability to 
better quantify the costs and benefits of the Proposal.
    1. Has the Commission misidentified any costs or benefits? If so, 
please explain.
    2. Please explain whether compliance costs would increase or 
decrease as a result the proposed rule. Please provide all quantitative 
and qualitative costs, including, but not limited to personnel costs 
and technological costs.
    3. The Commission seeks additional information on the costs and 
benefits of the proposed rule's requirement for covered entities to 
have a governance regime for their ORF, including risk appetite and 
tolerance limits, consolidated programs or plans, and internal 
escalation policies. Specifically, to what extent do covered entities 
already have or plan to have relevant programs or plans, policies, and 
procedures compliant with those prescribed in the proposed rule? To 
what practical extent do NFA's requirements, prudential regulation and/
or best practices currently duplicate or differ from the ORF governance 
regime, including risk appetite limits, consolidated programs or plans, 
and internal escalation policies, being proposed? Will covered entities 
experience additional or lowered costs to comply with the proposed 
rule, and if so, to what degree?
    4. The Commission seeks additional information regarding the costs 
and benefits of establishing an information and technology security 
program. Specifically, to what extent are covered entities already 
conducting comprehensive risk assessments that follow standards 
described in the proposed rule? Are these assessments being conducted 
on at least an annual basis? Do existing effective controls likewise 
meet the standards in the proposed rule? Will covered entities 
experience additional or lowered costs relative to current practice to 
establish, document, and maintain an incident response plan as called 
for in the proposed rule, and if so, to what degree?
    5. The Commission seeks additional information regarding the costs 
and benefits of establishing a business continuity and disaster 
recovery plan. In particular, is the Commission's proposed rule 
different from current practice, and, if so, how? Would covered 
entities experience additional or lowered costs to comply with the 
proposed rule, and, if so, to what degree?
    6. The Commission seeks additional information regarding the costs 
and benefits of the proposed rule's required notice of ORF events to 
the Commission. Will covered entities experience additional or lowered 
costs to comply with the proposed rule, and, if so, to what degree? 
Will compliance with the 24-hour cap for as-soon-as-possible 
notification entail additional costs relative to some shorter or longer 
cap and, if so, why and to what degree?
    7. The Commission seeks additional information on the costs and 
benefits of the proposed rule's requirement that covered entities 
provide notification to customers and counterparties following an 
incident. In particular, is the Commission's proposed rule different 
from current practice, and, if so, how? Would covered entities 
experience additional or lowered costs to comply with the proposed 
rule, and, if so, to what degree?
    8. The Commission seeks additional information regarding the costs 
and benefits of ORF review and testing. In particular, to what extent, 
if any, does the proposed rule differ from existing procedures? How do 
covered entities determine the amount of review and testing that is 
appropriate? Do all covered entities currently undertake penetration 
and vulnerability testing, and at what frequency? Would covered 
entities experience additional or lowered costs to comply with the 
proposed rule, and, if so, to what degree?
    9. The Commission seeks additional information regarding the costs 
and benefits of the cross-border application of the proposed rule. 
Would added specificity in the proposed regulations improve the cost-
benefit calculus for those covered entities impacted by their cost-
benefit application? If so, in what areas would more specificity be 
helpful and how would costs and benefits be impacted?

D. Antitrust Laws

    Section 15(b) of the CEA requires the Commission to ``take into 
consideration the public interest to be protected by the antitrust laws 
and endeavor to take the least anticompetitive means of achieving the 
purposes of the CEA, in

[[Page 4750]]

issuing any order or adopting any Commission rule or regulation 
(including any exemption under CEA section 4(c) or 4c(b)), or in 
requiring or approving any bylaw, rule, or regulation of a contract 
market or registered futures association established pursuant to 
section 17 of this Act.'' \393\
---------------------------------------------------------------------------

    \393\ 7 U.S.C. 19(b).
---------------------------------------------------------------------------

    The Commission preliminarily believes that the public interest to 
be protected by the antitrust laws is generally to protect competition. 
The Commission invites comment on whether the proposed rule implicates 
any other specific public interest to be protected by the antitrust 
laws.
    The Commission has also assessed the proposal for potential 
anticompetitive effects. To the extent that there are substantial fixed 
costs associated with improved operational risk management, there may 
be competitive implications, though likely anticompetitive impacts have 
not been identified. Smaller firms may bear a disproportionate cost 
relative to larger firms in total asset size due to this proposed rule. 
Nevertheless, smaller firms may be able to realize economies of scope 
and scale through outsourcing to third-parties, albeit at the cost of 
raising their third-party risk exposure. In addition, the proposed rule 
allows smaller firms to choose programs or plans, policies, and 
procedures that are appropriate to their businesses, further mitigating 
competitive concerns.
    The Commission invites comment on its CEA section 15(b) assessment, 
including what other means, if any, would be more procompetitive than 
what the Commission now proposes and why.

List of Subjects

17 CFR Part 1

    Brokers, Commodity futures, Consumer protection, Reporting and 
recordkeeping requirements.

17 CFR Part 23

    Banks, Banking, Commodity futures, Reporting and recordkeeping 
requirements, Swaps.

    For the reasons stated in the preamble, the Commodity Futures 
Trading Commission proposes to amend 17 CFR parts 1 and 23 as set forth 
below:

PART 1--GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT

0
1. The authority citation for part 1 continues to read as follows:

    Authority: 7 U.S.C. 1a, 2, 5, 6, 6a, 6b, 6c, 6d, 6e, 6f, 6g, 6h, 
6i, 6k, 6l, 6m, 6n, 6o, 6p, 6r, 6s, 7, 7a-1, 7a-2, 7b, 7b-3, 8, 9, 
10a, 12, 12a, 12c, 13a, 13a-1, 16, 16a, 19, 21, 23, and 24 (2012).

0
2. Add Sec.  1.13 to read as follows:


Sec.  1.13  Operational Resilience Framework for Futures Commission 
Merchants

    (a) Definitions. For purposes of this section:
    Affiliate means, with respect to any person, a person controlling, 
controlled by, or under common control with, such person.
    Business continuity and disaster recovery plan means a written plan 
outlining the procedures to be followed in the event of an emergency or 
other significant disruption to the continuity of normal business 
operations and that meets the requirements of paragraph (f) of this 
section.
    Consolidated program or plan means any information and technology 
security program, third-party relationship program, or business 
continuity and disaster recovery plan in which the futures commission 
merchant participates with one or more affiliates and that is managed 
and approved at the enterprise level.
    Covered information means any sensitive or confidential data or 
information maintained by a futures commission merchant in connection 
with its business activities as a futures commission merchant.
    Covered technology means any application, device, information 
technology asset, network service, system, and other information-
handling component, including the operating environment, that is used 
by a futures commission merchant to conduct its business activities, or 
to meet its regulatory obligations, as a futures commission merchant.
    Critical third-party service provider means a third-party service 
provider, the disruption of whose performance would be reasonably 
likely to:
    (i) Significantly disrupt a futures commission merchant's business 
operations as a futures commission merchant; or
    (ii) Significantly and adversely impact the futures commission 
merchant's customers.
    Information and technology security means the preservation of:
    (i) The confidentiality, integrity, and availability of covered 
information; and
    (ii) The reliability, security, capacity, and resilience of covered 
technology.
    Incident means any event, occurrence, or circumstance that could 
jeopardize information and technology security, including if it occurs 
at a third-party service provider.
    Information and technology security program means a written program 
reasonably designed to identify, monitor, manage, and assess risks 
relating to information and technology security and that meets the 
requirements of paragraph (d) of this section.
    Key controls mean controls that an appropriate risk analysis 
determines are either critically important for effective information 
and technology security or intended to address risks that evolve or 
change more frequently and therefore require more frequent review to 
ensure their continuing effectiveness in addressing such risks.
    Oversight body means any board, body, or committee of a board or 
body of the futures commission merchant specifically granted the 
authority and responsibility for making strategic decisions, setting 
objectives and overall direction, implementing policies and procedures, 
or overseeing the implementation of operations for the futures 
commission merchant.
    Risk appetite means the aggregate amount of risk a futures 
commission merchant is willing to assume to achieve its strategic 
objectives.
    Risk tolerance limit means the amount of risk, beyond its risk 
appetite, that a futures commission merchant is prepared to tolerate 
through mitigating actions.
    Senior officer means the chief executive officer or other 
equivalent officer of the futures commission merchant.
    Third-party relationship program means a written program reasonably 
designed to identify, monitor, manage, and assess risks relating to 
third-party relationships and that meets the requirements of paragraph 
(e) of this section.
    (b) Generally. (1) Purpose and scope. Each futures commission 
merchant shall establish, document, implement, and maintain an 
Operational Resilience Framework reasonably designed to identify, 
monitor, manage, and assess risks relating to:
    (i) information and technology security;
    (ii) third-party relationships; and
    (iii) emergencies or other significant disruptions to the 
continuity of normal business operations as a futures commission 
merchant.
    (2) Components. The Operational Resilience Framework shall include 
an information and technology security program, a third-party 
relationship program, and a business continuity and disaster recovery 
plan. Each component program or plan shall be supported by written 
policies and procedures.
    (3) Standard. The Operational Resilience Framework shall be

[[Page 4751]]

appropriate and proportionate to the nature, size, scope, complexity, 
and risk profile of its business activities as a futures commission 
merchant, following generally accepted standards and best practices.
    (c) Governance. (1) Approval of components. Each component program 
or plan required by paragraph (b)(2) of this section shall be approved 
in writing, on at least an annual basis, by either the senior officer, 
an oversight body, or a senior-level official of the futures commission 
merchant.
    (2) Risk appetite and risk tolerance limits. (i) Each futures 
commission merchant shall establish and implement appropriate risk 
appetite and risk tolerance limits with respect to the risk areas 
identified in paragraph (b)(1) of this section.
    (ii) The risk appetite and risk tolerance limits established 
pursuant to paragraph (c)(2)(i) of this section shall be reviewed and 
approved in writing on at least an annual basis by either the senior 
officer, an oversight body, or a senior-level official of the futures 
commission merchant.
    (3) Internal escalations. The senior officer, an oversight body, or 
a senior-level official of the futures commission merchant shall be 
notified of:
    (i) circumstances that exceed risk tolerance limits established and 
approved pursuant to paragraph (c)(2)(i) of this section; and
    (ii) incidents that require notification pursuant to paragraphs (i) 
or (j) of this section.
    (4) Futures commission merchants forming part of a larger 
enterprise. (i) Generally. A futures commission merchant may satisfy 
the requirements of paragraph (b)(2) of this section through its 
participation in a consolidated program or plan, provided that each 
consolidated program or plan meets the requirements of this section.
    (ii) Attestation. A futures commission merchant that relies on a 
consolidated program or plan pursuant to paragraph (c)(4)(i) of this 
section may satisfy the requirements in paragraphs (c)(1) and 
(c)(2)(ii) of this section provided that either the senior officer, an 
oversight body, or a senior-level official of the futures commission 
merchant attests in writing, on at least an annual basis, that the 
consolidated program or plan meets the requirements of this section and 
reflects a risk appetite and risk tolerance limits appropriate to the 
futures commission merchant.
    (d) Information and technology security program. (1) Risk 
assessment.
    (i) The information and technology security program shall require 
the futures commission merchant to conduct and document the results of 
a comprehensive risk assessment reasonably designed to identify, 
assess, and prioritize risks to information and technology security.
    (ii) Such risk assessment shall be conducted at a frequency 
consistent with the standard set forth in paragraph (b)(3) of this 
section, but at least annually, and be conducted by personnel not 
responsible for the development or implementation of covered technology 
or related controls.
    (iii) The results of the risk assessment shall be provided to the 
oversight body, senior officer, or other senior-level official who 
approves the information and technology security program upon the risk 
assessment's completion.
    (2) Effective controls. The information and technology security 
program shall require the futures commission merchant to establish, 
document, implement, and maintain controls reasonably designed to 
prevent, detect, and mitigate identified risks to information and 
technology security. Each futures commission merchant shall consider, 
at a minimum, the following types of controls and adopt those 
consistent with the standard set forth in paragraph (b)(3) of this 
section:
    (i) Access controls on covered technology, including controls to 
authenticate and permit access only by authorized individuals and 
controls preventing misappropriation or misuse of covered information 
by employees;
    (ii) Access restrictions designed to permit only authorized 
individuals to access physical locations containing covered 
information, including, but not limited to, buildings, computer 
facilities, and records storage facilities;
    (iii) Encryption of electronic covered information, including while 
in transit or in storage on networks or systems, to which unauthorized 
individuals may have access;
    (iv) Dual control procedures, segregation of duties, and background 
checks for employees or third-party service providers with 
responsibilities for or access to covered information;
    (v) Change management practices, including defined roles and 
responsibilities, logging, and monitoring practices;
    (vi) Systems development and configuration management practices, 
including practices for initializing, changing, testing, and monitoring 
configurations;
    (vii) Flaw remediation, including vulnerability patching practices;
    (viii) Measures to protect against destruction, loss, or damage of 
covered information due to potential environmental hazards, such as 
fire and water damage or technological failures;
    (ix) Monitoring systems and procedures to detect actual and 
attempted attacks on or intrusions into covered technology;
    (x) Response programs that specify actions to be taken when the 
futures commission merchant suspects or detects that unauthorized 
individuals have gained access to covered technology, including 
appropriate reports to regulatory and law enforcement agencies; and
    (xi) Measures to promptly recover and secure any compromised 
covered information.
    (3) Incident response plan. The information and technology security 
program shall include a written incident response plan that is 
reasonably designed to detect, assess, contain, mitigate the impact of, 
and recover from an incident. This incident response plan shall 
include, at a minimum:
    (i) The roles and responsibilities of the futures commission 
merchant's management, staff, and third-party service providers in 
responding to incidents;
    (ii) Escalation protocols, including a requirement to timely inform 
the oversight body, senior officer, or other senior-level official that 
has primary responsibility for overseeing the information and 
technology security program; the chief compliance officer of the 
futures commission merchant; and any other relevant personnel of 
incidents that may significantly impact the futures commission 
merchant's regulatory obligations or require notification to the 
Commission;
    (iii) The points of contact for external coordination of incident 
responses as determined necessary by the futures commission merchant 
based on the severity of incidents;
    (iv) The required reporting of incidents, whether by internal 
policy, contract, or law, including as required in this section;
    (v) Procedures for documenting incidents and managements' response; 
and
    (vi) The remediation of weaknesses in information and technology 
security, controls, and training, if any.
    (e) Third-party relationship program. (1) Third-party relationship 
lifecycle stages. The third-party relationship program shall describe 
how the futures commission merchant addresses the risks attendant to 
each stage of the third-party relationship lifecycle, including:
    (i) Pre-selection risk assessment;
    (ii) Due diligence of prospective third-party service providers;
    (iii) Contractual negotiations;

[[Page 4752]]

    (iv) Ongoing monitoring; and
    (v) Termination, including preparations for planned and unplanned 
terminations.
    (2) Heightened duties for critical third-party service providers. 
The third-party relationship program shall establish heightened due 
diligence practices for potential critical third-party service 
providers and heightened monitoring for critical third-party service 
providers.
    (3) Third-party service provider inventory. As part of its third-
party relationship program, each futures commission merchant shall 
create, maintain, and regularly update an inventory of third-party 
service providers the futures commission merchant has engaged to 
support its activities as a futures commission merchant, identifying 
whether each third-party service provider in the inventory is a 
critical third-party service provider.
    (3) Retention of responsibility. Notwithstanding a futures 
commission merchant's determination to rely on a third-party service 
provider, each futures commission merchant remains responsible for 
meeting its obligations under the Act and Commission regulations.
    (4) Guidance on third-party relationship program. For guidance 
outlining potential risks, considerations, and strategies for 
developing a third-party relationship program consistent with paragraph 
(e), see Appendix A to this part.
    (f) Business continuity and disaster recovery plan. (1) Purpose. 
The business continuity and disaster recovery plan shall be reasonably 
designed to enable the futures commission merchant to:
    (i) Continue or resume normal business operations with minimal 
disruption to customers and the markets; and
    (ii) Recover and make use of covered information, as well as any 
other data, information, or documentation required to be maintained by 
law and regulation.
    (2) Minimum contents. The business continuity and disaster recovery 
plan shall, at a minimum:
    (i) Identify covered information, as well as any other data or 
information required to be maintained by law and regulation, and 
establish and implement procedures to backup or copy all such data and 
information with sufficient frequency to meet the requirements of this 
section, and to store such data and information off-site in either 
hard-copy or electronic format;
    (ii) Identify any resources, including covered technology, 
facilities, infrastructure, personnel, and competencies, essential to 
the operations of the futures commission merchant or to fulfill the 
regulatory obligations of the futures commission merchant, and 
establish and maintain procedures and arrangements to provide for their 
backup in a manner that is sufficient to meet the requirements of this 
section. Such arrangements must provide for backups that are located in 
one or more areas that are geographically separate from the futures 
commission merchant's primary systems, facilities, infrastructure, and 
personnel, and may include the use of resources provided by third-party 
service providers;
    (iii) Identify potential disruptions to critical third-party 
service providers and establish a plan to minimize the impact of such 
disruptions;
    (iv) Identify supervisory personnel responsible for implementing 
each aspect of the business continuity and disaster recovery plan, 
including the emergency contacts required to be provided pursuant to 
paragraph (k) of this section; and
    (v) Establish a plan for communicating with the following persons 
in the event of an emergency or other significant disruption, to the 
extent applicable: employees; customers; swap data repositories; 
execution facilities; trading facilities; clearing facilities; 
regulatory authorities; data, communications and infrastructure 
providers and other vendors; disaster recovery specialists; and other 
persons essential to the recovery of documentation and data, the 
resumption of operations, and compliance with the Act and Commission 
regulations.
    (3) Accessibility. Each futures commission merchant shall maintain 
copies of its business continuity and disaster recovery plan at one or 
more accessible off-site locations.
    (g) Training and distribution. (1) Training. Each futures 
commission merchant shall establish, implement, and maintain training 
with respect to all aspects of the Operational Resilience Framework, 
including, but not limited to:
    (i) Cybersecurity awareness training for all personnel; and
    (ii) Role-specific training for personnel involved in establishing, 
documenting, implementing, and maintaining the Operational Resilience 
Framework.
    (2) Frequency. Each futures commission merchant shall provide and 
update the training required in paragraph (g)(1) as necessary, but no 
less frequently than annually.
    (3) Distribution. Each futures commission merchant shall distribute 
copies of each component program or plan required by paragraph (b)(2) 
of this section to relevant personnel and promptly provide any 
significant revisions thereto.
    (h) Reviews and Testing. Each futures commission merchant shall 
establish, implement, and maintain a plan reasonably designed to assess 
its adherence to, and the effectiveness of, its Operational Resilience 
Framework through regular reviews and risk-based testing.
    (1) Reviews. Reviews of the Operational Resilience Framework shall 
be conducted at least annually and in connection with any material 
change to the activities or operations of the futures commission 
merchant that is reasonably likely to affect the risks identified in 
paragraph (b)(1) of this section. Reviews shall include an analysis of 
adherence to, and the effectiveness of, the Operational Resilience 
Framework and any recommendations for modifications or improvements 
that address root causes of any issues identified by the review.
    (2) Testing. The frequency, nature, and scope of risk-based testing 
of the Operational Resilience Framework shall be determined by the 
futures commission merchant, consistent with the standard in paragraph 
(b)(3) of this section.
    (i) Testing of the information and technology security program 
shall include, at a minimum:
    (A) Testing of key controls and the incident response plan at least 
annually;
    (B) Vulnerability assessments, including daily or continuous 
automated vulnerability scans; and
    (C) Penetration testing at least annually.
    (ii) Testing of the business continuity and disaster recovery plan 
shall include, at a minimum, a walk-through or tabletop exercise 
designed to test the effectiveness of backup facilities and 
capabilities at least annually.
    (3) Independence. The reviews and testing shall be conducted by 
qualified personnel who are independent of the aspect of the 
Operational Resilience Framework being reviewed or tested.
    (4) Documentation. Each futures commission merchant shall document 
all reviews and testing of the Operational Resilience Framework. The 
documentation shall, at a minimum, include:
    (i) The date the review or testing was conducted;
    (ii) The nature and scope of the review or testing, including 
methodologies employed;

[[Page 4753]]

    (iii) The results of the review or testing, including any 
assessment of effectiveness;
    (iv) Any identified deficiencies and recommendations for 
remediation; and
    (v) Any corrective action(s) taken or initiated, including the 
date(s) such action(s) were taken.
    (5) Internal reporting. Each futures commission merchant shall 
report on the results of its reviews and testing to the futures 
commission merchant's chief compliance officer and any other relevant 
senior-level official(s) and oversight body(ies).
    (i) Notifications to the Commission. (1) Incidents. (i) 
Notification trigger. Each futures commission merchant shall notify the 
Commission of any incident that adversely impacts, or is reasonably 
likely to adversely impact:
    (A) information and technology security;
    (B) the ability of the futures commission merchant to continue its 
business activities as a futures commission merchant; or
    (C) the assets or positions of a customer of the futures commission 
merchant.
    (ii) Contents. The notification shall provide any information 
available to the futures commission merchant at the time of 
notification that may assist the Commission in assessing and responding 
to the incident, including the date the incident was detected, possible 
cause(s) of the incident, its apparent or likely impacts, and any 
actions the futures commission merchant has taken or is taking to 
mitigate or recover from the incident, including measures to protect 
customers.
    (iii) Timing and method. Each futures commission merchant shall 
provide the incident notification as soon as possible but in any event 
no later than 24 hours after such incident has been detected. The 
notification shall be provided via email to [email protected].
    (2) Business continuity and disaster recovery plan activation. (i) 
Notification trigger. Each futures commission merchant shall notify the 
Commission of any determination to activate the business continuity and 
disaster recovery plan.
    (ii) Contents. The notification shall provide any information 
available to the futures commission merchant at the time of 
notification that may assist the Commission in assessing or responding 
to the emergency or disruption, including the date of the emergency or 
disruption, a description thereof, the possible cause(s), its apparent 
or likely impacts, and any actions the futures commission merchant has 
taken or is taking to mitigate or recover from the emergency or 
disruption, including measures taken or being taken to protect 
customers.
    (iii) Timing and method. Each futures commission merchant shall 
provide the business continuity and disaster recovery plan activation 
notification within 24 hours of determining to activate the business 
continuity and disaster recovery plan. The notification shall be 
provided via email to [email protected].
    (j) Notification of incidents to affected customers. (1) 
Notification trigger. Each futures commission merchant shall notify a 
customer as soon as possible of any incident that is reasonably likely 
to have adversely affected the confidentiality or integrity of the 
customer's covered information, assets, or positions.
    (2) Contents. The notification to affected customers shall include 
information necessary for the affected customer to understand and 
assess the potential impact of the incident on its information, assets, 
or positions, and to take any necessary action. Such notification shall 
include, at a minimum:
    (i) a description of the incident;
    (ii) the particular way in which the customer, or its covered 
information, may have been adversely impacted;
    (iii) measures being taken by the futures commission merchant to 
protect against further harm; and
    (iv) contact information for the futures commission merchant where 
the customer may learn more about the incident or ask questions.
    (k) Emergency Contacts. (1) Each futures commission merchant shall 
provide the Commission the name and contact information of:
    (i) two employees whom the Commission may contact in connection 
with incidents triggering notification to the Commission under 
paragraph (i)(1) of this section; and
    (ii) two employees whom the Commission may contact in connection 
with the activation of the futures commission merchant's business 
continuity and disaster recovery plan triggering notification to the 
Commission under paragraph (i)(2) of this section.
    (2) The identified employees shall be authorized to make key 
decisions on behalf of the futures commission merchant and have 
knowledge of the futures commission merchant's incident response plan 
or business continuity and disaster recovery plan, as appropriate.
    (3) The futures commission merchant shall update its emergency 
contacts with the Commission as necessary.
    (l) Recordkeeping. Each futures commission merchant shall maintain 
all records required to be maintained pursuant to this section in 
accordance with section 1.31 of this chapter and shall make them 
available promptly upon request to representatives of the Commission 
and to representatives of applicable prudential regulators, as defined 
in section 1a(39) of the Act.
0
3. Add appendix A to part 1 to read as follows:

Appendix A to Part 1--Guidance on Third-Party Relationship Programs

    The following guidance offers factors, actions, and strategies 
for futures commission merchants to consider in preparing and 
implementing third-party relationship programs reasonably designed 
to identify, monitor, manage, and assess risks relating to third-
party relationships, as required by Commission regulation 1.13. The 
guidance is also not intended to reduce or replace the obligation of 
futures commission merchants to comply with the requirements in 
Commission regulation 1.13, including the requirement to ensure that 
each futures commission merchant's Operational Resilience Framework 
is appropriate and proportionate to the nature, size, scope, 
complexity, and risk profile of its business activities as a futures 
commission merchant, following generally accepted standards and best 
practices. The guidance is not exhaustive and is nonbinding.
    The guidance is written to be broadly relevant to all futures 
commission merchants, but it may not be universally applicable. The 
degree to which the guidance would be applicable to a particular 
futures commission merchant would depend on its unique facts and 
circumstances and may vary from relationship to relationship. Each 
futures commission merchant should assess the relevance of the 
guidance as it applies to its particular risk profile and tailor its 
third-party relationship program accordingly.
    Comparable guidance for swap dealers and major swap participants 
is included in Appendix A to subpart J of part 23 of the 
Commission's regulations.

A. Pre-Selection Risk Assessment--Commission Regulation 1.13(e)(1)(i)

    Before entering into a third-party relationship, futures 
commission merchants should determine which services should be 
performed by a third-party and plan for how to manage associated 
risks. The Commission appreciates that reliance on third-party 
service providers may be unavoidable, particularly given the rapid 
pace of technological innovation, which may render it uneconomical 
or even infeasible for financial institutions to meet all of their 
technological needs in-house.
    Nevertheless, given the risks associated with relying on third-
party service providers, and that each additional third-party 
relationship a futures commission merchant

[[Page 4754]]

employs is likely to add further risk and complexity, a futures 
commission merchant's third-party relationship program should 
include a deliberative process for affirmatively determining whether 
to source a particular service from a third-party service provider. 
In determining whether a particular function should be performed by 
a third-party service provider, futures commission merchants should 
consider whether:
     The service would support the futures commission 
merchant's strategic goals and objectives.
     The same goals and objectives could be addressed 
through an alternative means that may not require reliance on a 
third-party service provider.
     The futures commission merchant has or could otherwise 
secure the resources, financial and otherwise, to effectively 
monitor the third-party service provider.
     Relevant and reputable third-party service providers 
are available.
     The provision of the service would implicate 
information and technology security concerns, including by requiring 
the third-party service provider to obtain access to covered 
information or provide covered technology.
     A disruption of the service would have a negative 
impact on customers or regulatory compliance.
     The relationship could be structured to reduce 
associated risks, such as by limiting the third-party service 
provider's access to covered information or covered technology.
     Lack of direct control over performance of the service 
would present unacceptable risk, i.e., risk outside the futures 
commission merchant's risk tolerance limits.
    As the above considerations illustrate, futures commission 
merchants should consider ways in which they might structure their 
third-party relationships to reduce the associated risks. For 
example, where giving a third-party service provider direct access 
to its technology or data may be outside a futures commission 
merchant's risk tolerance, structuring the relationship to provide 
the third-party service provider access on a read-only basis or via 
reports delivered by the futures commission merchants could render 
the relationship more acceptable. Futures commission merchants 
should therefore consider the availability of safer means of 
performing the service as part of their assessment.
    Changes in technology, businesses practices, regulation, market 
structure, market participants (e.g., new entrants to the market), 
or service delivery may change the risk profile of the third-party 
relationship over time. Accordingly, futures commission merchants 
should consider periodically reassessing their selection of services 
to be performed by third-party service providers. Futures commission 
merchants should stay abreast of these changes by monitoring the 
external environment and communicating with current and prospective 
service providers and other participants in industry.

B. Due Diligence in Selecting Third-Party Service Providers--Commission 
Regulation 1.13(e)(1)(ii)

    After a futures commission merchant has determined that a 
service is suitable for a third-party to perform, it should conduct 
due diligence on prospective third-party service providers. Due 
diligence provides futures commission merchants with the information 
they need to assess and conclude, with a reasonable level of 
assurance, that the prospective third-party service provider is 
capable of effectively providing the service as expected, adhering 
to the futures commission merchant's policies, maintaining the 
futures commission merchant's compliance with Commission 
regulations, and protecting covered information. Appropriate due 
diligence should also enable futures commission merchants to 
evaluate whether they would be able to effectively monitor and 
manage the risks associated with a particular third-party 
relationship.
    Due diligence may be conducted before or contemporaneously with 
contractual negotiations with prospective third-party service 
providers but should be concluded prior to executing any agreements. 
Futures commission merchants should conduct due diligence even in 
situations where, for a particular service, there may only be one or 
a small number of providers with a dominant market share whose 
services are used by all or most of the futures commission 
merchants' industry peers, and futures commission merchants should 
not rely solely on those providers' reputations or prior experience 
with them. The depth and rigor of the due diligence should be 
proportionate to the nature of the third-party relationship, with 
the required heightened due diligence for potential critical third-
party service providers pursuant to Commission regulation 
1.13(e)(2). Specifically, when conducting due diligence for a 
potential critical third-party servicer provider, futures commission 
merchants should expand the type and sources of information they 
rely on, the rigor and scrutiny they apply in reviewing the 
information to identify potential risks, and the level of confidence 
in their assessment of the third-party service provider's ability to 
perform.
    When establishing their due diligence protocols, futures 
commission merchants should consider the full range of risks that 
reliance on the third-party service providers could introduce in 
light of the nature of the service they would be performing. 
Relevant considerations with respect to the potential third-party 
service provider include its:
     Financial condition, business experience and 
reputation, and business prospects, particularly the third-party 
service provider's experience providing services to financial 
institutions.
     Background, experience, and qualifications with respect 
to key personnel.
     Information and technology security practices, 
including incident reporting and incident management programs, and 
whether there are clearly documented processes for identifying and 
escalating incidents.
     Risk management practices, including governance, 
controls, testing, and issue management practices, as well as the 
results of any independent risk assessments.
     Regulatory environment, including the legal 
jurisdiction in which it is based and applicable regulatory or 
licensing requirements.
     History of disruptions to operations, including whether 
the third-party service provider has suffered incidents that would 
meet the standard for reporting to the Commission in Commission 
regulation 1.13(i).
     Violations of legal, compliance, or contractual 
obligations, including civil or criminal proceedings or 
administrative enforcement actions, including from self-regulatory 
organizations.
     Understanding of Commission regulatory requirements 
applicable to the futures commission merchant.
     Use of and reliance on subcontractors, including the 
volume and types of subcontracted activities, and the third-party 
service provider's process for identifying, assessing, managing, and 
monitoring associated risks.
     Business continuity and contingency plans.
     Financial protections, such as insurance coverage 
against losses or liabilities from intentional or negligent acts or 
hazards involving physical destruction and data or documentation 
losses.
    Futures commission merchants should memorialize their assessment 
of these factors and identify how the review was heightened for 
critical third-party service providers. Futures commission merchants 
should not rely solely on their prior knowledge of or experience 
with a potential third-party. Potential sources of due diligence 
information include:
     Audit reports, including pooled audit plans and System 
and Organizational Controls (SOC) reports.
     Financial statements and projections and relevant 
accompanying information (e.g., annual or quarterly reports, 
management commentary, auditors' opinions, and investor relations 
materials).
     Incident response plans, including the results of 
recent testing or assessments thereof.
     Business continuity and disaster recovery plans, as 
well as the result of recent testing or assessments thereof.
     Public filings.
     News reports, trade publications, and press releases.
     Reports from market intelligence providers.
     References from current or previous customers, or other 
parties which have had business relationships with the third-party 
service provider.
     Informal industry discussions.
     Information provided directly by the third-party 
service provider, such as internal performance metrics.
    Obtaining and reviewing audit reports, including SOC reports, 
may be of particular value for conducting heightened due diligence 
of critical third-party service providers. In certain circumstances, 
futures commission merchants may not be able to gather all the 
information necessary to reach an informed conclusion that a 
prospective third-party service provider is an adequate provider. 
Examples include instances where the third-party service provider is 
a new entrant into the market and little information exists; where 
information provided by the

[[Page 4755]]

third-party service provider is insufficient or appears unreliable; 
or where the third-party service provider is reluctant to provide 
internal information. In such cases, the futures commission merchant 
should identify and document the limitations of its due diligence, 
the attendant risks, and any available methods for mitigating them 
(e.g., obtaining alternate information, implementing enhanced 
monitoring or controls, negotiating protective contractual 
provisions). Ultimately, such factors could weigh against the use of 
the potential third-party service provider, particularly a potential 
critical third-party service provider. Futures commission merchants 
that proceed with the third-party service arrangements 
notwithstanding the limited due diligence should do so with caution, 
applying heightened scrutiny of the information they do receive, and 
consider the implementation of their own mitigating controls to 
compensate for the uncertainty.

C. Contractual Negotiations--Commission Regulation 1.13(e)(1)(iii)

    After selecting a third-party service provider, futures 
commission merchants should proceed to finalizing the agreement, 
typically through entering into an enforceable written contract. 
Written contracts are an important tool for clarifying the scope of 
services to be delivered, establishing standards or performance 
benchmarks, allocating risks and responsibilities, and facilitating 
resolution of disputes. They can also reduce the risks of non-
performance and assist in monitoring the third-party service 
provider. Because of their importance, the Commission recommends 
that futures commission merchants enter written agreements with 
third-party service providers before services are delivered, 
particularly with critical third-party service providers.
    In negotiating a written contract, futures commission merchants 
should seek to negotiate contractual provisions that would support 
their ability to mitigate, manage, and monitor the risks associated 
with the relationship, as identified through their initial pre-
selection and due diligence activities. The contractual provisions 
should be informed by the nature of the service provided and be 
proportionate to the criticality of the services provided. In 
particular, futures commission merchants should consider negotiating 
for the contract to include the following provisions:
     Timely notification to the futures commission merchant 
of any incidents suffered by third-party service providers, or of 
significant disruptions to the operations of the third-party service 
provider.
     Timely notification to the futures commission merchant 
of any material changes to the services provided.
     Required periodic, independent audits of the third-
party service provider, the results of which would be shared with 
the futures commission merchant.
     Restrictions on the third-party service provider's use 
of the futures commission merchant's covered information, except as 
necessary to deliver the service or meet legal obligations.
     Security measures to protect the futures commission 
merchant's covered information and covered technology to which the 
third-party service provider has access.
     Insurance, guarantees, indemnification, and limitations 
on liability.
     Dispute resolution procedures.
     Performance measures or benchmarks.
     Remediation of identified performance issues.
     Dispute resolution procedures.
     Compliance with regulatory requirements, including 
reasonable assurances that the third-party service provider is 
willing and able to coordinate with the futures commission merchant 
for the purpose of ensuring the futures commission merchant complies 
with its legal and regulatory obligations.
     Use of subcontractors, including notification or 
approval procedures for their use, the extension of contractual 
rights of the futures commission merchant against the third-party 
service provider to its subcontractors, and contractual obligations 
for reporting on or oversight of subcontractors.
     Termination provisions, including rights to terminate 
following breaches of the third-party service provider's 
obligations, notice requirements, obligations of the third-party 
service provider to provide support for a successful transition, and 
the return or destruction of records or covered information, as 
further described in section E of this guidance.
     Information sharing necessary to facilitate other 
provisions of this proposed guidance (for example, reporting 
requirements to support ongoing monitoring, as discussed in section 
D of this guidance, or notice requirements for termination, as 
discussed in section E of this guidance).
    These provisions focus on key risk factors generally associated 
with third-party service provider relationships. They are not 
exhaustive of all contractual provisions futures commission 
merchants should seek to include in their written contracts, 
including ordinary commercial contract terms (e.g., choice of law 
provisions) and terms that may relate only to specific services, 
among other provisions. While third-parties may initially offer a 
standard contract, a futures commission merchant may seek to request 
modifications, additional contractual provisions, or addendums to 
satisfy its needs. Futures commission merchants should work to 
tailor the level of detail and comprehensiveness of the contractual 
provisions based on the risk and complexity posed by the particular 
third-party relationship, contracts with critical third-party 
service providers likely being the most tailored.
    In some circumstances, a futures commission merchant may be at a 
bargaining power disadvantage, which prevents it from negotiating 
optimal contractual provisions. For example, a prospective third-
party service provider may be the sole provider of a service or may 
have such dominant market share that it can offer its services on a 
``take-it-or-leave-it'' basis. In such situations, the futures 
commission merchant should work to understand any resulting 
limitations in the contract and attendant risks and consider whether 
it can achieve outcomes comparable to those provided by contractual 
protections through non-contractual means. Examples could include 
the futures commission merchant implementing additional controls, 
augmenting its monitoring of the third-party service provider using 
public sources or market intelligence services, or purchasing 
insurance. The futures commission merchant should make an 
assessment, however, of whether these alternatives would provide an 
adequate substitute for the unobtained contractual protections and 
document its assessment and mitigation plan, considering its risk 
appetite and risk tolerance limits. Where a third-party service 
provider is unable or unwilling to agree to provisions necessary for 
the futures commission merchant to meet its obligations under 
Commission regulations, particularly a critical third-party service 
provider, the futures commission merchant should consider finding an 
alternative third-party service provider.

D. Ongoing Monitoring--Commission Regulation 1.13(e)(1)(iv)

    After a third-party service provider has initiated performance, 
futures commission merchants should engage in ongoing monitoring. 
Ongoing monitoring is important to ensure the third-party service 
provider is properly carrying out its outsourced function and 
contractual obligations, as well as meeting quality or performance 
expectations. Effective monitoring can aid futures commission 
merchants in the early identification of performance deficits, 
allowing for a quicker response that may then mitigate the impact.
    Ongoing monitoring should occur throughout the duration of a 
third-party relationship, commensurate with the level of risk and 
complexity of the relationship and the activity performed by the 
third-party. Examples of possible monitoring activities include:
     Reviewing reports on performance and effectiveness of 
controls, including independent audit reports and SOC reports.
     Periodic on-site visits or meetings to discuss open 
issues and plans for changes to the relationship.
     Reviewing updated due diligence information.
     Documenting service-level agreements with the third-
party service provider to establish performance targets.
     Establishing measures for the third-party service 
provider to identify, record, and remediate instances of failure to 
meet contractual obligations or unsatisfactory performance and to 
report such instances to the futures commission merchant on a timely 
basis.
     Direct testing of the third-party service provider's 
control environment.
    The frequency and depth of the futures commission merchant's 
monitoring activities should reflect the nature of the third-party 
relationship, including heightened monitoring for critical third-
party service providers, and may change over the duration of the 
relationship. The futures commission merchant should dedicate 
sufficient staffing

[[Page 4756]]

resources to its monitoring activities and be particularly alert to 
any circumstances that could signal that a third-party service 
provider may not be able to perform to an acceptable standard. A 
futures commission merchant should be cognizant that certain events 
may trigger the need for it to take further action, including 
terminating its relationship with the third-party service provider. 
Such events could include cyberattacks, natural disasters, financial 
distress or insolvency, adverse or qualified audit opinions, or 
litigation or enforcement actions.
    In addition to the continuous monitoring described above, 
futures commission merchants should periodically review and 
reevaluate their relationships with third-party service providers 
holistically. Such reviews should be more thorough than routine 
monitoring and may involve additional personnel, such as in-house or 
outside auditors, compliance and risk functions, information 
technology staff, or by a central function or committee whose 
visibility into other third-party relationships could provide 
valuable context for the relationship at issue. Additionally, to the 
extent a futures commission merchant uses enterprise risk management 
techniques, it should seek to integrate the information gathered 
from its ongoing monitoring with those practices. For example, to 
the extent that a futures commission merchant maintains a 
standardized approach across risk types to escalate concerns or 
issues to senior management or governance bodies (e.g., through the 
use of predefined criteria or escalation paths), the futures 
commission merchant should consider using the same protocols for 
escalating concerns identified through its ongoing monitoring of 
third-party service providers. The ongoing monitoring approach 
itself may be subject to enterprise risk management practices, such 
as periodic self-assessment for effectiveness, independent testing, 
and quality assurance.
    To the extent that monitoring activities reveal a change in 
their assessment of the risks associated with the third-party 
relationship, futures commission merchants should adjust the 
frequency and types of monitoring they conduct, including reports, 
regular testing, and on-site visits. One example of information that 
may change the level of monitoring is a notification that a third-
party service provider has suffered or may suffer from a severe 
adverse event that could trigger a material change in the systems or 
process used to carry out an outsourced function.

E. Terminating the Third-Party Relationship--Commission Regulation 
1.13(e)(1)(v)

    Futures commission merchants should ensure that their third-
party service provider relationship programs include advance 
preparation for the termination of the third-party relationship to 
ensure an orderly transition. Futures commission merchants should 
prepare for both planned terminations (i.e., where one or both 
parties elects to end the relationship pursuant to their contract) 
and unplanned terminations (e.g., following a sudden withdrawal of 
the third-party service). The plans should include both the 
contractual provisions for terminating the service (termination 
provisions), and the futures commission merchant's plan to 
facilitate an orderly transition of the function to an alternative 
provider or to bring it in-house (exit strategy). The goal of 
termination planning is to support an efficient transition to 
alternative arrangements for the provision of the service, 
regardless of the circumstances of the termination.
    Termination provisions include all terms needed by the futures 
commission merchant to wind down a third-party service relationship 
while ensuring that the futures commission merchant can continue to 
serve its customers without interruption and to meet its regulatory 
compliance obligations. Because information, data, staff training, 
and knowledge may reside in the third-party service provider, there 
is an increased risk of disruption during the termination phase. 
When negotiating termination provisions, a futures commission 
merchant should ensure that the terms negotiated support its exit 
strategy. For example, a futures commission merchant should ensure 
that termination rights are accompanied by notice periods that leave 
the futures commission merchant enough time to find an alternative 
provider (or to provide the service itself) to ensure an orderly 
transition.
    Similarly, the futures commission merchant should ensure that 
all customer data or other covered information in the third-party 
service provider's possession is promptly returned to the futures 
commission merchant or destroyed, as appropriate. The futures 
commission merchant should also verify that the third-party's access 
to its systems and covered information ceases at termination. 
Futures commission merchants should also consider negotiating more 
stringent terms for third-party service providers that breach their 
obligations under the agreement, other than for ``no-fault'' 
terminations. Such breaches may signal an inability of the third-
party service provider to provide the services contracted for and 
thereby threaten the ability of the futures commission merchant to 
serve its customers and meet its regulatory obligations. (See 
section C of this guidance for examples of termination provisions.)
    Futures commission merchants' exit strategies should include the 
steps needed to end the service provision with the third-party 
service provider and retain a new service provider or begin 
providing the service in-house. Although elements of an exit 
strategy may be reflected in termination provisions, not all 
elements of the exit strategy may be suitable for the contract. 
Examples include approvals, identification of alternative providers, 
description of the roles of staff in the futures commission 
merchant, and other internal matters. These elements may be 
memorialized in a procedure or similar document, such as the third-
party relationship program. The exit strategy should contain the 
internal steps to be taken to ensure notification to the third-party 
service provider, identification of the proposed new provider, or, 
if bringing the function in-house, the hiring and training of 
personnel, development of procedures, and launch of new technology, 
along with the time periods and responsible personnel for each.
    Futures commission merchants should be aware that, in practice, 
implementing an exit strategy may be complex and time-consuming and 
that the exercise of termination arrangements may be difficult. 
Futures commission merchants should also be aware that some third 
parties possess expertise that is not readily available and plan 
accordingly. Futures commission merchants should ensure that their 
plans are flexible enough to account for a range of plausible 
termination scenarios, including situations where the third-party 
service provider rapidly becomes unviable. Futures commission 
merchants may need to design backup or interim procedures sufficient 
to meet regulatory requirements in such situations.

PART 23--SWAP DEALERS AND MAJOR SWAP PARTICIPANTS

0
4. The authority citation for part 23 continues to read as follows:

    Authority: 7 U.S.C. 1a, 2, 6, 6a, 6b, 6b-1, 6c, 6p, 6r, 6s, 6t, 
9, 9a, 12, 12a, 13b, 13c, 16a, 18, 19, 21.
    Section 23.160 also issued under 7 U.S.C. 2(i); Sec. 721(b), 
Pub. L. 111-203, 124 Stat. 1641 (2010).

0
5. Revise Sec.  23.603 to read as follows:


Sec.  23.603  Operational Resilience Framework for Swap Dealers and 
Major Swap Participants.

    (a) Definitions. For purposes of this section:
    Affiliate means, with respect to any person, a person 
controlling, controlled by, or under common control with, such 
person.
    Business continuity and disaster recovery plan means a written 
plan outlining the procedures to be followed in the event of an 
emergency or other significant disruption to the continuity of 
normal business operations and that meets the requirements of 
paragraph (f) of this section.
    Consolidated program or plan means any information and 
technology security program, third-party relationship program, or 
business continuity and disaster recovery plan in which the swap 
entity participates with one or more affiliates and that is managed 
and approved at the enterprise level.
    Covered information means any sensitive or confidential data or 
information maintained by a swap entity in connection with its 
business activities as a swap entity.
    Covered technology means any application, device, information 
technology asset, network service, system, and other information-
handling component, including the operating environment, that is 
used by a swap entity to conduct its business activities, or to meet 
its regulatory obligations, as a swap entity.
    Critical third-party service provider means a third-party 
service provider, the disruption of whose performance would be 
reasonably likely to:

[[Page 4757]]

    (1) Significantly disrupt a swap entity's business operations as 
a swap entity; or
    (2) Significantly and adversely impact the swap entity's 
counterparties.
    Information and technology security means the preservation of:
    (1) The confidentiality, integrity, and availability of covered 
information; and
    (2) The reliability, security, capacity, and resilience of 
covered technology.
    Incident means any event, occurrence, or circumstance that could 
jeopardize information and technology security, including if it 
occurs at a third-party service provider.
    Information and technology security program means a written 
program reasonably designed to identify, monitor, manage, and assess 
risks relating to information and technology security and that meets 
the requirements of paragraph (d) of this section.
    Key controls mean controls that an appropriate risk analysis 
determines are either critically important for effective information 
and technology security or intended to address risks that evolve or 
change more frequently and therefore require more frequent review to 
ensure their continuing effectiveness in addressing such risks.
    Oversight body means any board, body, or committee of a board or 
body of the swap entity specifically granted the authority and 
responsibility for making strategic decisions, setting objectives 
and overall direction, implementing policies and procedures, or 
overseeing the implementation of operations for the swap entity.
    Risk appetite means the aggregate amount of risk a swap entity 
is willing to assume to achieve its strategic objectives.
    Risk tolerance limit means the amount of risk, beyond its risk 
appetite, that a swap entity is prepared to tolerate through 
mitigating actions.
    Senior officer means the chief executive officer or other 
equivalent officer of the swap entity.
    Swap entity means a person that is registered with the 
Commission as a swap dealer or major swap participant pursuant to 
the Act.
    Third-party relationship program means a written program 
reasonably designed to identify, monitor, manage, and assess risks 
relating to third-party relationships and that meets the 
requirements of paragraph (e) of this section.
    (b) Generally. (1) Purpose and scope. Each swap entity shall 
establish, document, implement, and maintain an Operational 
Resilience Framework reasonably designed to identify, monitor, 
manage, and assess risks relating to:
    (i) information and technology security;
    (ii) third-party relationships; and
    (iii) emergencies or other significant disruptions to the 
continuity of normal business operations as a swap entity.
    (2) Components. The Operational Resilience Framework shall 
include an information and technology security program, a third-
party relationship program, and a business continuity and disaster 
recovery plan. Each component program or plan shall be supported by 
written policies and procedures.
    (3) Standard. The Operational Resilience Framework shall be 
appropriate and proportionate to the nature, size, scope, 
complexity, and risk profile of its business activities as a swap 
entity, following generally accepted standards and best practices.
    (c) Governance. (1) Approval of components. Each component 
program or plan required by paragraph (b)(2) of this section shall 
be approved in writing, on at least an annual basis, by either the 
senior officer, an oversight body, or a senior-level official of the 
swap entity.
    (2) Risk appetite and risk tolerance limits. (i) Each swap 
entity shall establish and implement appropriate risk appetite and 
risk tolerance limits with respect to the risk areas identified in 
paragraph (b)(1) of this section.
    (ii) The risk appetite and risk tolerance limits established 
pursuant to paragraph (c)(2)(i) of this section shall be reviewed 
and approved in writing on at least an annual basis by either the 
senior officer, an oversight body, or a senior-level official of the 
swap entity.
    (3) Internal escalations. The senior officer, an oversight body, 
or a senior-level official of the swap entity shall be notified of:
    (i) circumstances that exceed risk tolerance limits established 
and approved pursuant to paragraph (c)(2)(i) of this section; and
    (ii) incidents that require notification pursuant to paragraphs 
(i) or (j) of this section.
    (4) Swap entities forming part of a larger enterprise. (i) 
Generally. A swap entity may satisfy the requirements of paragraph 
(b)(2) of this section through its participation in a consolidated 
program or plan, provided that each consolidated program or plan 
meets the requirements of this section.
    (ii) Attestation. A swap entity that relies on a consolidated 
program or plan pursuant to paragraph (c)(4)(i) of this section may 
satisfy the requirements in paragraphs (c)(1) and (c)(2)(ii) of this 
section provided that either the senior officer, an oversight body, 
or a senior-level official of the swap entity attests in writing, on 
at least an annual basis, that the consolidated program or plan 
meets the requirements of this section and reflects a risk appetite 
and risk tolerance limits appropriate to the swap entity.
    (d) Information and technology security program. (1) Risk 
assessment.
    (i) The information and technology security program shall 
require the swap entity to conduct and document the results of a 
comprehensive risk assessment reasonably designed to identify, 
assess, and prioritize risks to information and technology security.
    (ii) Such risk assessment shall be conducted at a frequency 
consistent with the standard set forth in paragraph (b)(3) of this 
section, but at least annually, and be conducted by personnel not 
responsible for the development or implementation of covered 
technology or related controls.
    (iii) The results of the risk assessment shall be provided to 
the oversight body, senior officer, or other senior-level official 
who approves the information and technology security program upon 
the risk assessment's completion.
    (2) Effective controls. The information and technology security 
program shall require the swap entity to establish, document, 
implement, and maintain controls reasonably designed to prevent, 
detect, and mitigate identified risks to information and technology 
security. Each swap entity shall consider, at a minimum, the 
following types of controls and adopt those consistent with the 
standard set forth in paragraph (b)(3) of this section:
    (i) Access controls on covered technology, including controls to 
authenticate and permit access only by authorized individuals and 
controls preventing misappropriation or misuse of covered 
information by employees;
    (ii) Access restrictions designed to permit only authorized 
individuals to access physical locations containing covered 
information, including, but not limited to, buildings, computer 
facilities, and records storage facilities;
    (iii) Encryption of electronic covered information, including 
while in transit or in storage on networks or systems, to which 
unauthorized individuals may have access;
    (iv) Dual control procedures, segregation of duties, and 
background checks for employees or third-party service providers 
with responsibilities for or access to covered information;
    (v) Change management practices, including defined roles and 
responsibilities, logging, and monitoring practices;
    (vi) Systems development and configuration management practices, 
including practices for initializing, changing, testing, and 
monitoring configurations;
    (vii) Flaw remediation, including vulnerability patching 
practices;
    (viii) Measures to protect against destruction, loss, or damage 
of covered information due to potential environmental hazards, such 
as fire and water damage or technological failures;
    (ix) Monitoring systems and procedures to detect actual and 
attempted attacks on or intrusions into covered technology;
    (x) Response programs that specify actions to be taken when the 
swap entity suspects or detects that unauthorized individuals have 
gained access to covered technology, including appropriate reports 
to regulatory and law enforcement agencies; and
    (xi) Measures to promptly recover and secure any compromised 
covered information.
    (3) Incident response plan. The information and technology 
security program shall include a written incident response plan that 
is reasonably designed to detect, assess, contain, mitigate the 
impact of, and recover from an incident. This incident response plan 
shall include, at a minimum:
    (i) The roles and responsibilities of the swap entity's 
management, staff, and third-party service providers in responding 
to incidents;
    (ii) Escalation protocols, including a requirement to timely 
inform the oversight body, senior officer, or other senior-level 
official that has primary responsibility for overseeing the 
information and technology security program; the chief compliance 
officer of the swap entity; and any other relevant personnel of 
incidents that may

[[Page 4758]]

significantly impact the swap entity's regulatory obligations or 
require notification to the Commission;
    (iii) The points of contact for external coordination of 
incident responses as determined necessary by the swap entity based 
on the severity of incidents;
    (iv) The required reporting of incidents, whether by internal 
policy, contract, or law, including as required in this section;
    (v) Procedures for documenting incidents and managements' 
response; and
    (vi) The remediation of weaknesses in information and technology 
security, controls, and training, if any.
    (e) Third-party relationship program. (1) Third-party 
relationship lifecycle stages. The third-party relationship program 
shall describe how the swap entity addresses the risks attendant to 
each stage of the third-party relationship lifecycle, including:
    (i) Pre-selection risk assessment;
    (ii) Due diligence of prospective third-party service providers;
    (iii) Contractual negotiations;
    (iv) Ongoing monitoring; and
    (v) Termination, including preparations for planned and 
unplanned terminations.
    (2) Heightened duties for critical third-party service 
providers. The third-party relationship program shall establish 
heightened due diligence practices for potential critical third-
party service providers and heightened monitoring for critical 
third-party service providers.
    (3) Third-party service provider inventory. As part of its 
third-party relationship program, each swap entity shall create, 
maintain, and regularly update an inventory of third-party service 
providers the swap entity has engaged to support its activities as a 
swap entity, identifying whether each third-party service provider 
in the inventory is a critical third-party service provider.
    (3) Retention of responsibility. Notwithstanding a swap entity's 
determination to rely on a third-party service provider, each swap 
entity remains responsible for meeting its obligations under the Act 
and Commission regulations.
    (4) Guidance on third-party relationship programs. For guidance 
outlining potential risks, considerations, and strategies for 
developing a third-party relationship program consistent with 
paragraph (e), see Appendix A to Subpart J of this part.
    (f) Business continuity and disaster recovery plan. (1) Purpose. 
The business continuity and disaster recovery plan shall be 
reasonably designed to enable the swap entity to:
    (i) Continue or resume normal business operations with minimal 
disruption to counterparties and the markets; and
    (ii) Recover and make use of covered information, as well as any 
other data, information, or documentation required to be maintained 
by law and regulation.
    (2) Minimum contents. The business continuity and disaster 
recovery plan shall, at a minimum:
    (i) Identify covered information, as well as any other data or 
information required to be maintained by law and regulation, and 
establish and implement procedures to backup or copy all such data 
and information with sufficient frequency to meet the requirements 
of this section and to store such data and information off-site in 
either hard-copy or electronic format;
    (ii) Identify any resources, including covered technology, 
facilities, infrastructure, personnel, and competencies, essential 
to the operations of the swap entity or to fulfill the regulatory 
obligations of the swap entity, and establish and maintain 
procedures and arrangements to provide for their backup in a manner 
that is sufficient to meet the requirements of this section. Such 
arrangements must provide for backups that are located in one or 
more areas that are geographically separate from the swap entity's 
primary systems, facilities, infrastructure, and personnel, and may 
include the use of resources provided by third-party service 
providers;
    (iii) Identify potential disruptions to critical third-party 
service providers and establish a plan to minimize the impact of 
such disruptions;
    (iv) Identify supervisory personnel responsible for implementing 
each aspect of the business continuity and disaster recovery plan, 
including the emergency contacts required to be provided pursuant to 
paragraph (k) of this section; and
    (v) Establish a plan for communicating with the following 
persons in the event of an emergency or other significant 
disruption, to the extent applicable: employees; counterparties; 
swap data repositories; execution facilities; trading facilities; 
clearing facilities; regulatory authorities; data, communications 
and infrastructure providers and other vendors; disaster recovery 
specialists; and other persons essential to the recovery of 
documentation and data, the resumption of operations, and compliance 
with the Act and Commission regulations.
    (3) Accessibility. Each swap entity shall maintain copies of its 
business continuity and disaster recovery plan at one or more 
accessible off-site locations.
    (g) Training and distribution. (1) Training. Each swap entity 
shall establish, implement, and maintain training with respect to 
all aspects of the Operational Resilience Framework, including, but 
not limited to:
    (i) Cybersecurity awareness training for all personnel; and
    (ii) Role-specific training for personnel involved in 
establishing, documenting, implementing, and maintaining the 
Operational Resilience Framework.
    (2) Frequency. Each swap entity shall provide and update the 
training required in paragraph (g)(1) as necessary, but no less 
frequently than annually.
    (3) Distribution. Each swap entity shall distribute copies of 
each component program or plan required by paragraph (b)(2) of this 
section to relevant personnel and promptly provide any significant 
revisions thereto.
    (h) Reviews and Testing. Each swap entity shall establish, 
implement, and maintain a plan reasonably designed to assess its 
adherence to, and the effectiveness of, its Operational Resilience 
Framework through regular reviews and risk-based testing.
    (1) Reviews. Reviews of the Operational Resilience Framework 
shall be conducted at least annually and in connection with any 
material change to the activities or operations of the swap entity 
that is reasonably likely to affect the risks identified in 
paragraph (b)(1) of this section. Reviews shall include an analysis 
of adherence to, and the effectiveness of, the Operational 
Resilience Framework and any recommendations for modifications or 
improvements that address root causes of any issues identified by 
the review.
    (2) Testing. The frequency, nature, and scope of risk-based 
testing of the Operational Resilience Framework shall be determined 
by the swap entity, consistent with the standard in paragraph (b)(3) 
of this section.
    (i) Testing of the information and technology security program 
shall include, at a minimum:
    (A) Testing of key controls and the incident response plan at 
least annually;
    (B) Vulnerability assessments, including daily or continuous 
automated vulnerability scans; and
    (C) Penetration testing at least annually.
    (ii) Testing of the business continuity and disaster recovery 
plan shall include, at a minimum, a walk-through or tabletop 
exercise designed to test the effectiveness of backup facilities and 
capabilities at least annually.
    (3) Independence. The reviews and testing shall be conducted by 
qualified personnel who are independent of the aspect of the 
Operational Resilience Framework being reviewed or tested.
    (4) Documentation. Each swap entity shall document all reviews 
and testing of the Operational Resilience Framework. The 
documentation shall, at a minimum, include:
    (i) The date the review or testing was conducted;
    (ii) The nature and scope of the review or testing, including 
methodologies employed;
    (iii) The results of the review or testing, including any 
assessment of effectiveness;
    (iv) Any identified deficiencies and recommendations for 
remediation; and
    (v) Any corrective action(s) taken or initiated, including the 
date(s) such action(s) were taken.
    (5) Internal reporting. Each swap entity shall report on the 
results of its reviews and testing to the swap entity's chief 
compliance officer and any other relevant senior-level official(s) 
and oversight body(ies).
    (i) Notifications to the Commission. (1) Incidents.
    (i) Notification trigger. Each swap entity shall notify the 
Commission of any incident that adversely impacts, or is reasonably 
likely to adversely impact:
    (A) Information and technology security;
    (B) The ability of the swap entity to continue its business 
activities as a swap entity; or
    (C) The assets or positions of a counterparty of the swap 
entity.
    (ii) Contents. The notification shall provide any information 
available to the swap entity at the time of notification that may 
assist the Commission in assessing and responding to the incident, 
including the date the incident was detected, possible cause(s) of 
the incident, its apparent or likely impacts, and any actions the 
swap entity has taken or is taking to mitigate or recover from the

[[Page 4759]]

incident, including measures to protect counterparties.
    (iii) Timing and method. Each swap entity shall provide the 
incident notification as soon as possible but in any event no later 
than 24 hours after such incident has been detected. The 
notification shall be provided via email to [email protected].
    (2) Business continuity and disaster recovery plan activation. 
(i) Notification trigger. Each swap entity shall notify the 
Commission of any determination to activate the business continuity 
and disaster recovery plan.
    (ii) Contents. The notification shall provide any information 
available to the swap entity at the time of notification that may 
assist the Commission in assessing or responding to the emergency or 
disruption, including the date of the emergency or disruption, a 
description thereof, the possible cause(s), its apparent or likely 
impacts, and any actions the swap entity has taken or is taking to 
mitigate or recover from the emergency or disruption, including 
measures taken or being taken to protect counterparties.
    (iii) Timing and method. Each swap entity shall provide the 
business continuity and disaster recovery plan activation 
notification within 24 hours of determining to activate the business 
continuity and disaster recovery plan. The notification shall be 
provided via email to [email protected].
    (j) Notification of incidents to affected counterparties. (1) 
Notification trigger. Each swap entity shall notify a counterparty 
as soon as possible of any incident that is reasonably likely to 
have adversely affected the confidentiality or integrity of the 
counterparty's covered information, assets, or positions.
    (2) Contents. The notification to affected counterparties shall 
include information necessary for the affected counterparty to 
understand and assess the potential impact of the incident on its 
information, assets, or positions, and to take any necessary action. 
Such notification shall include, at a minimum:
    (i) A description of the incident;
    (ii) The particular way in which the counterparty, or its 
covered information, may have been adversely impacted;
    (iii) Measures being taken by the swap entity to protect against 
further harm; and
    (iv) Contact information for the swap entity where the 
counterparty may learn more about the incident or ask questions.
    (k) Emergency Contacts. (1) Each swap entity shall provide the 
Commission the name and contact information of:
    (i) Two employees whom the Commission may contact in connection 
with incidents triggering notification to the Commission under 
paragraph (i)(1) of this section; and
    (ii) Two employees whom the Commission may contact in connection 
with the activation of the swap entity's business continuity and 
disaster recovery plan triggering notification to the Commission 
under paragraph (i)(2) of this section.
    (2) The identified employees shall be authorized to make key 
decisions on behalf of the swap entity and have knowledge of the 
swap entity's incident response plan or business continuity and 
disaster recovery plan, as appropriate.
    (3) The swap entity shall update its emergency contacts with the 
Commission as necessary.
    (l) Recordkeeping. Each swap entity shall maintain all records 
required to be maintained pursuant to this section in accordance 
with section 1.31 of this chapter and shall make them available 
promptly upon request to representatives of the Commission and to 
representatives of applicable prudential regulators, as defined in 
section 1a(39) of the Act.
0
6. Add appendix A to subpart J of part 23 to read as follows:

Appendix A to Subpart J of Part 23--Guidance on Third-Party 
Relationship Programs

    The following guidance offers factors, actions, and strategies 
for swap entities to consider in preparing and implementing third-
party relationship programs reasonably designed to identify, 
monitor, manage, and assess risks relating to third-party 
relationships, as required by Commission regulation 23.603. The 
guidance is also not intended to reduce or replace the obligation of 
swap entities to comply with the requirements in Commission 
regulation 23.603, including the requirement to ensure that each 
swap entity's Operational Resilience Framework is appropriate and 
proportionate to the nature, size, scope, complexity, and risk 
profile of its business activities as a swap entity, following 
generally accepted standards and best practices. The guidance is not 
exhaustive and is nonbinding.
    The guidance is written to be broadly relevant to all swap 
entities, but it may not be universally applicable. The degree to 
which the guidance would be applicable to a particular swap entity 
would depend on its unique facts and circumstances and may vary from 
relationship to relationship. Each swap entity should assess the 
relevance of the guidance as it applies to its particular risk 
profile and tailor its third-party relationship program accordingly.
    Comparable guidance for futures commission merchants is included 
in Appendix A to part 1 of the Commission's regulations.

A. Pre-Selection Risk Assessment--Commission Regulation 23.603(e)(1)(i)

    Before entering into a third-party relationship, swap entities 
should determine which services should be performed by a third-party 
and plan for how to manage associated risks. The Commission 
appreciates that reliance on third-party service providers may be 
unavoidable, particularly given the rapid pace of technological 
innovation, which may render it uneconomical or even infeasible for 
financial institutions to meet all of their technological needs in-
house.
    Nevertheless, given the risks associated with relying on third-
party service providers, and that each additional third-party 
relationship a swap entity employs is likely to add further risk and 
complexity, a swap entity's third-party relationship program should 
include a deliberative process for affirmatively determining whether 
to source a particular service from a third-party service provider. 
In determining whether a particular function should be performed by 
a third-party service provider, swap entities should consider 
whether:
     The service would support the swap entity's strategic 
goals and objectives.
     The same goals and objectives could be addressed 
through an alternative means that may not require reliance on a 
third-party service provider.
     The swap entity has or could otherwise secure the 
resources, financial and otherwise, to effectively monitor the 
third-party service provider.
     Relevant and reputable third-party service providers 
are available.
     The provision of the service would implicate 
information and technology security concerns, including by requiring 
the third-party service provider to obtain access to covered 
information or provide covered technology.
     A disruption of the service would have a negative 
impact on counterparties or regulatory compliance.
     The relationship could be structured to reduce 
associated risks, such as by limiting the third-party service 
provider's access to covered information or covered technology.
     Lack of direct control over performance of the service 
would present unacceptable risk, i.e., risk outside the swap 
entity's risk tolerance limits.
    As the above considerations illustrate, swap entities should 
consider ways in which they might structure their third-party 
relationships to reduce the associated risks. For example, where 
giving a third-party service provider direct access to its 
technology or data may be outside a swap entity's risk tolerance, 
structuring the relationship to provide the third-party service 
provider access on a read-only basis or via reports delivered by the 
swap entity could render the relationship more acceptable. Swap 
entities should therefore consider the availability of safer means 
of performing the service as part of their assessment.
    Changes in technology, businesses practices, regulation, market 
structure, market participants (e.g., new entrants to the market), 
or service delivery may change the risk profile of the third-party 
relationship over time. Accordingly, swap entities should consider 
periodically reassessing their selection of services to be performed 
by third-party service providers. Swap entities should stay abreast 
of these changes by monitoring the external environment and 
communicating with current and prospective service providers and 
other participants in industry.

B. Due Diligence in Selecting Third-Party Service Providers--Commission 
Regulation 23.603(e)(1)(ii)

    After a swap entity has determined that a service is suitable 
for a third-party to perform, it should conduct due diligence on 
prospective third-party service providers. Due diligence provides 
swap entities with the information they need to assess and conclude, 
with a reasonable level of assurance, that the prospective third-
party service provider is capable of effectively

[[Page 4760]]

providing the service as expected, adhering to the swap entity's 
policies, maintaining the swap entity's compliance with Commission 
regulations, and protecting covered information. Appropriate due 
diligence should also enable swap entities to evaluate whether they 
would be able to effectively monitor and manage the risks associated 
with a particular third-party relationship.
    Due diligence may be conducted before or contemporaneously with 
contractual negotiations with prospective third-party service 
providers but should be concluded prior to executing any agreements. 
Swap entities should conduct due diligence even in situations where, 
for a particular service, there may only be one or a small number of 
providers with a dominant market share whose services are used by 
all or most of the swap entities' industry peers, and swap entities 
should not rely solely on those providers' reputations or prior 
experience with them. The depth and rigor of the due diligence 
should be proportionate to the nature of the third-party 
relationship, with the required heightened due diligence required 
for potential critical third-party service providers pursuant to 
Commission regulation 23.603(e)(2). Specifically, when conducting 
due diligence for a potential critical third-party servicer 
provider, swap entities should expand the type and sources of 
information they rely on, the rigor and scrutiny they apply in 
reviewing the information to identify potential risks, and the level 
of confidence in their assessment of the third-party service 
provider's ability to perform.
    When establishing their due diligence protocols, swap entities 
should consider the full range of risks that reliance on the third-
party service providers could introduce in light of the nature of 
the service they would be performing. Relevant considerations with 
respect to the potential third-party service provider include its:
     Financial condition, business experience and 
reputation, and business prospects, particularly the third-party 
service provider's experience providing services to financial 
institutions.
     Background, experience, and qualifications with respect 
to key personnel.
     Information and technology security practices, 
including incident reporting and incident management programs, and 
whether there are clearly documented processes for identifying and 
escalating incidents.
     Risk management practices, including governance, 
controls, testing, and issue management practices, as well as the 
results of any independent risk assessments.
     Regulatory environment, including the legal 
jurisdiction in which it is based and applicable regulatory or 
licensing requirements.
     History of disruptions to operations, including whether 
the third-party service provider has suffered incidents that would 
meet the standard for reporting to the Commission in Commission 
regulation 23.603(i).
     Violations of legal, compliance, or contractual 
obligations, including civil or criminal proceedings or 
administrative enforcement actions, including from self-regulatory 
organizations.
     Understanding of Commission regulatory requirements 
applicable to the swap entity.
     Use of and reliance on subcontractors, including the 
volume and types of subcontracted activities, and the third-party 
service provider's process for identifying, assessing, managing, and 
monitoring associated risks.
     Business continuity and contingency plans.
     Financial protections, such as insurance coverage 
against losses or liabilities from intentional or negligent acts or 
hazards involving physical destruction and data or documentation 
losses.
    Swap entities should memorialize their assessment of these 
factors and identify how the review was heightened for critical 
third-party service providers. Swap entities should not rely solely 
on their prior knowledge of or experience with a potential third-
party. Potential sources of due diligence information include:
     Audit reports, including pooled audit plans, and System 
and Organizational Controls (SOC) reports.
     Financial statements and projections and relevant 
accompanying information (e.g., annual or quarterly reports, 
management commentary, auditors' opinions, and investor relations 
materials).
     Incident response plans, including the results of 
recent testing or assessments thereof.
     Business continuity and disaster recovery plans, as 
well as the result of recent testing or assessments thereof.
     Public filings.
     News reports, trade publications, and press releases.
     Reports from market intelligence providers.
     References from current or previous customers, or other 
parties which have had business relationships with the third-party 
service provider.
     Informal industry discussions.
     Information provided directly by the third-party 
service provider, such as internal performance metrics.
    Obtaining and reviewing audit reports, including SOC reports, 
may be of particular value for conducting heightened due diligence 
of critical third-party service providers. In certain circumstances, 
swap entities may not be able to gather all the information 
necessary to reach an informed conclusion that a prospective third-
party service provider is an adequate provider. Examples include 
instances where the third-party service provider is a new entrant 
into the market and little information exists; where information 
provided by the third-party service provider is insufficient or 
appears unreliable; or where the third-party service provider is 
reluctant to provide internal information. In such cases, the swap 
entity should identify and document the limitations of its due 
diligence, the attendant risks, and any available methods for 
mitigating them (e.g., obtaining alternate information, implementing 
enhanced monitoring or controls, negotiating protective contractual 
provisions). Ultimately, such factors could weigh against the use of 
the potential third-party service provider, particularly a potential 
critical third-party service provider. Swap entities that proceed 
with the third-party service arrangements notwithstanding the 
limited due diligence should do so with caution, applying heightened 
scrutiny of the information they do receive, and consider the 
implementation of their own mitigating controls to compensate for 
the uncertainty.

C. Contractual Negotiations--Commission Regulation 23.603(e)(1)(iii)

    After selecting a third-party service provider, swap entities 
should proceed to finalizing the agreement, typically through 
entering into an enforceable written contract. Written contracts are 
an important tool for clarifying the scope of services to be 
delivered, establishing standards or performance benchmarks, 
allocating risks and responsibilities, and facilitating resolution 
of disputes. They can also reduce the risks of non-performance and 
assist in monitoring the third-party service provider. Because of 
their importance, the Commission recommends that swap entities enter 
written agreements with third-party service providers before 
services are delivered, particularly with critical third-party 
service providers.
    In negotiating a written contract, swap entities should seek to 
negotiate contractual provisions that would support their ability to 
mitigate, manage, and monitor the risks associated with the 
relationship, as identified through their initial pre-selection and 
due diligence activities. The contractual provisions should be 
informed by the nature of the service provided and be proportionate 
to the criticality of the services provided. In particular, swap 
entities should consider negotiating for the contract to include the 
following provisions:
     Timely notification to the swap entity of any incidents 
suffered by third-party service providers, or of significant 
disruptions to the operations of the third-party service provider.
     Timely notification to the swap entity of any material 
changes to the services provided.
     Required periodic, independent audits of the third-
party service provider, the results of which would be shared with 
the swap entity.
     Restrictions on the third-party service provider's use 
of the swap entity's covered information, except as necessary to 
deliver the service or meet legal obligations.
     Security measures to protect the swap entity's covered 
information and covered technology to which the third-party service 
provider has access.
     Insurance, guarantees, indemnification, and limitations 
on liability.
     Dispute resolution procedures.
     Performance measures or benchmarks.
     Remediation of identified performance issues.
     Compliance with regulatory requirements, including 
reasonable assurances that the third-party service provider is 
willing and able to coordinate with the swap entity for the purpose 
of ensuring the swap entity complies with its legal and regulatory 
obligations.
     Use of subcontractors, including notification or 
approval procedures for their use, the extension of contractual 
rights of the

[[Page 4761]]

swap entity against the third-party service provider to its 
subcontractors, and contractual obligations for reporting on or 
oversight of subcontractors.
     Termination provisions, including rights to terminate 
following breaches of the third-party service provider's 
obligations, notice requirements, obligations of the third-party 
service provider to provide support for a successful transition, and 
the return or destruction of records or covered information, as 
further described in section E of this guidance.
     Information sharing necessary to facilitate other 
provisions of this proposed guidance (for example, reporting 
requirements to support ongoing monitoring, as discussed in section 
D of this guidance, or notice requirements for termination, as 
discussed in section E of this guidance).
    These provisions focus on key risk factors generally associated 
with third-party service provider relationships. They are not 
exhaustive of all contractual provisions swap entities should seek 
to include in their written contracts, including ordinary commercial 
contract terms (e.g., choice of law provisions) and terms that may 
relate only to specific services, among other provisions. While 
third-parties may initially offer a standard contract, a swap entity 
may seek to request modifications, additional contractual 
provisions, or addendums to satisfy its needs. Swap entities should 
work to tailor the level of detail and comprehensiveness of the 
contractual provisions based on the risk and complexity posed by the 
particular third-party relationship, contracts with critical third-
party service providers likely being the most tailored.
    In some circumstances, a swap entity may be at a bargaining 
power disadvantage, which prevents it from negotiating optimal 
contractual provisions. For example, a prospective third-party 
service provider may be the sole provider of a service or may have 
such dominant market share that it can offer its services on a 
``take-it-or-leave-it'' basis. In such situations, the swap entity 
should work to understand any resulting limitations in the contract 
and attendant risks and consider whether it can achieve outcomes 
comparable to those provided by contractual protections through non-
contractual means. Examples could include the swap entity 
implementing additional controls, augmenting its monitoring of the 
third-party service provider using public sources or market 
intelligence services, or purchasing insurance. The swap entity 
should make an assessment, however, of whether these alternatives 
would provide an adequate substitute for the unobtained contractual 
protections and document its assessment and mitigation plan, 
considering its risk appetite and risk tolerance limits. Where a 
third-party service provider is unable or unwilling to agree to 
provisions necessary for the swap entity to meet its obligations 
under Commission regulations, particularly a critical third-party 
service provider, the swap entity should consider finding an 
alternative third-party service provider.

D. Ongoing Monitoring--Commission Regulation 23.603(e)(1)(iv)

    After a third-party service provider has initiated performance, 
swap entities should engage in ongoing monitoring. Ongoing 
monitoring is important to ensure the third-party service provider 
is properly carrying out its outsourced function and contractual 
obligations, as well as meeting quality or performance expectations. 
Effective monitoring can aid swap entities in the early 
identification of performance deficits, allowing for a quicker 
response that may then mitigate the impact.
    Ongoing monitoring should occur throughout the duration of a 
third-party relationship, commensurate with the level of risk and 
complexity of the relationship and the activity performed by the 
third-party. Examples of possible monitoring activities include:
     Reviewing reports on performance and effectiveness of 
controls, including independent audit reports and SOC reports.
     Periodic on-site visits or meetings to discuss open 
issues and plans for changes to the relationship.
     Reviewing updated due diligence information.
     Documenting service-level agreements with the third-
party service provider to establish performance targets.
     Establishing measures for the third-party service 
provider to identify, record, and remediate instances of failure to 
meet contractual obligations or unsatisfactory performance and to 
report such instances to the swap entity on a timely basis.
     Direct testing of the third-party service provider's 
control environment.
    The frequency and depth of the swap entity's monitoring 
activities should reflect the nature of the third-party 
relationship, including heightened monitoring for critical third-
party service providers, and may change over the duration of the 
relationship. The swap entity should dedicate sufficient staffing 
resources to its monitoring activities and be particularly alert to 
any circumstances that could signal that a third-party service 
provider may not be able to perform to an acceptable standard. A 
swap entity should be cognizant that certain events may trigger the 
need for it to take further action, including terminating its 
relationship with the third-party service provider. Such events 
could include cyberattacks, natural disasters, financial distress or 
insolvency, adverse or qualified audit opinions, or litigation or 
enforcement actions.
    In addition to the continuous monitoring described above, swap 
entities should periodically review and reevaluate their 
relationships with third-party service providers holistically. Such 
reviews should be more thorough than routine monitoring and may 
involve additional personnel, such as in-house or outside auditors, 
compliance and risk functions, information technology staff, or by a 
central function or committee whose visibility into other third-
party relationships could provide valuable context for the 
relationship at issue. Additionally, to the extent a swap entity 
uses enterprise risk management techniques, it should seek to 
integrate the information gathered from its ongoing monitoring with 
those practices. For example, to the extent that a swap entity 
maintains a standardized approach across risk types to escalate 
concerns or issues to senior management or governance bodies (e.g., 
through the use of predefined criteria or escalation paths), the 
swap entity should consider using the same protocols for escalating 
concerns identified through its ongoing monitoring of third-party 
service providers. The ongoing monitoring approach itself may be 
subject to enterprise risk management practices, such as periodic 
self-assessment for effectiveness, independent testing, and quality 
assurance.
    To the extent that monitoring activities reveal a change in 
their assessment of the risks associated with the third-party 
relationship, swap entities should adjust the frequency and types of 
monitoring they conduct, including reports, regular testing, and on-
site visits. One example of information that may change the level of 
monitoring is a notification that a third-party service provider has 
suffered or may suffer from a severe adverse event that could 
trigger a material change in the systems or process used to carry 
out an outsourced function.

E. Terminating the Third-Party Relationship--Commission Regulation 
23.603(e)(1)(v)

    Swap entities should ensure that their third-party service 
provider relationship programs include advance preparation for the 
termination of the third-party relationship to ensure an orderly 
transition. Swap entities should prepare for both planned 
terminations (i.e., where one or both parties elects to end the 
relationship pursuant to their contract) and unplanned terminations 
(e.g., following a sudden withdrawal of the third-party service). 
The programs should include both the contractual provisions for 
terminating the service (termination provisions), and the swap 
entity's plan to facilitate an orderly transition of the function to 
an alternative provider or to bring it in-house (exit strategy). The 
goal of termination planning is to support an efficient transition 
to alternative arrangements for the provision of the service, 
regardless of the circumstances of the termination.
    Termination provisions include all terms needed by the swap 
entity to wind down a third-party service relationship while 
ensuring that the swap entity can continue to serve its 
counterparties without interruption and to meet its regulatory 
compliance obligations. Because information, data, staff training, 
and knowledge may reside in the third-party service provider, there 
is an increased risk of disruption during the termination phase. 
When negotiating termination provisions, a swap entity should ensure 
that the terms negotiated support its exit strategy. For example, a 
swap entity should ensure that termination rights are accompanied by 
notice periods that leave the swap entity enough time to find an 
alternative provider (or to provide the service itself) to ensure an 
orderly transition.
    Similarly, the swap entity should ensure that all customer data 
or other covered information in the third-party service provider's 
possession is promptly returned to

[[Page 4762]]

the swap entity or destroyed, as appropriate. The swap entity should 
also verify that the third-party's access to its systems and covered 
information ceases at termination. Swap entities should also 
consider negotiating more stringent terms for third-party service 
providers that breach their obligations under the agreement, other 
than for ``no-fault'' terminations. Such breaches may signal an 
inability of the third-party service provider to provide the 
services contracted for and thereby threaten the ability of the swap 
entity to serve its customers and meet its regulatory obligations. 
(See section C of this guidance for examples of termination 
provisions.)
    Swap entities' exit strategies should include the steps needed 
to end the service provision with the third-party service provider 
and retain a new service provider or begin providing the service in-
house. Although elements of an exit strategy may be reflected in 
termination provisions, not all elements of the exit strategy may be 
suitable for the contract. Examples include approvals, 
identification of alternative providers, description of the roles of 
staff in the swap entity, and other internal matters. These elements 
may be memorialized in a procedure or similar document, such as the 
third-party relationship program. The exit strategy should contain 
the internal steps to be taken to ensure notification to the third-
party service provider, identification of the proposed new provider, 
or, if bringing the function in-house, the hiring and training of 
personnel, development of procedures, and launch of new technology, 
along with the time periods and responsible personnel for each.
    Swap entities should be aware that, in practice, implementing an 
exit strategy may be complex and time-consuming and that the 
exercise of termination arrangements may be difficult. Swap entities 
should also be aware that some third parties possess expertise that 
is not readily available and plan accordingly. Swap entities should 
ensure that their plans are flexible enough to account for a range 
of plausible termination scenarios, including situations where the 
third-party service provider rapidly becomes unviable. Swap entities 
may need to design backup or interim procedures sufficient to meet 
regulatory requirements in such situations.

    Issued in Washington, DC, on December 22, 2023, by the 
Commission.
Robert Sidman,
Deputy Secretary of the Commission.

    NOTE:  The following appendices will not appear in the Code of 
Federal Regulations.

Appendices to Operational Resilience Framework for Futures Commission 
Merchants, Swap Dealers, and Major Swap Participants--Voting Summary 
and Chairman's and Commissioners' Statements

Appendix 1--Voting Summary

    On this matter, Chairman Behnam, Commissioners Johnson, 
Goldsmith Romero, Mersinger and Pham voted in the affirmative. No 
Commissioner voted in the negative.

Appendix 2--Statement of Support of Chairman Rostin Behnam

    I support the Commission's approval of the notice of proposed 
rulemaking to require futures commission merchants (FCMs), swap 
dealers (SDs), and major swap participants (MSPs) to establish an 
operational resilience framework (ORF).
    The proposal recognizes that while FCMs, SDs, and MSPs 
(collectively, ``covered entities'') have generally withstood 
challenging market conditions since the Commission promulgated its 
risk management program requirements over a decade ago, the 
Commission must bolster that foundational framework to promote 
operational resilience in the face of increasingly sophisticated 
cyberattacks and heightened technological disruptions. A strong ORF 
is especially important as the financial sector increasingly relies 
on third-party service providers; the disruption of which can lead 
to major interruptions in--and potential corruption of--FCM and SD 
operations. In addition to market impacts, events like these may 
impact covered entities' ability to comply with the Commission's 
statutory and regulatory requirements.
    FCMs' customers and SDs' counterparties expect covered entities 
to take a 360-degree approach to identify, monitor, manage, and 
assess risks for potential vulnerabilities. Similarly, the 
Commission must identify, monitor, manage, and assess any potential 
gaps in its own risk management requirements that could impede sound 
risk management practices, expose the U.S. financial system to 
unmanaged risk, or weaken customer protection. Operational 
disruptions that place a covered entity's financial resources at 
risk; disrupt the segregation and protection of customer funds; 
hinder recordkeeping; introduce uncertainty or delay; or otherwise 
inject operational risk into the derivatives market must be avoided 
to the extent possible to ensure customers, counterparties, and 
market participants have confidence in the integrity of our markets.
    The operational resilience framework proposal is the product of 
many months of in-depth research regarding operational resilience 
standards and guidance issued by the prudential regulators, the U.S. 
Securities and Exchange Commission, the National Futures 
Association, the International Organization of Securities 
Commissions, the Financial Stability Board, and other subject matter 
experts to avoid those operational disruptions and failures. The 
proposal also reflects staff's own observations and lessons learned 
from its own oversight activities.
    The proposal is a holistic, principles-based approach that is 
calibrated with certain minimum requirements. Specifically, the 
proposed rule would require covered entities to establish, document, 
implement, and maintain an ORF reasonably designed to identify, 
monitor, manage, and assess risks relating to three key risk areas: 
(1) information and technology security, (2) third-party 
relationships, and (3) emergencies and other significant 
disruptions. The ORF would also include requirements related to 
governance, training, testing, and recordkeeping.
    The proposal would require covered entities to establish risk 
appetite and risk tolerance limits and would allow these registrants 
to rely on an information and technology security program, third-
party relationship program, or business continuity and disaster 
recovery plan in which the covered entity participates with one or 
more affiliates and that is managed and approved at the enterprise 
level. Testing would need to be risk-based and include, at a 
minimum, daily or continuous vulnerability assessment and annual 
penetration testing, among others. The proposed rule would also 
require certain notifications to the Commission and customers or 
counterparties. The Commission is also proposing non-binding 
guidance that FCMs and SDs could consider to identify factors, 
actions, and strategies as they design their third-party 
relationship programs.
    The Commission recognizes that covered entities subject to this 
proposal include many different business models. As a result, the 
proposal is tailored to accommodate firms that vary in size and 
complexity, including corporate structures in which operational 
resilience frameworks may be managed at an enterprise level and have 
governance arrangements with different reporting line structures. In 
the same vein, the proposed ORF standard would require covered 
entities to implement an ORF that is appropriate and proportionate 
to the nature, size, scope, complexity, and risk profile of the 
firm's business as an FCM or SD, following generally accepted 
standards and best practices.
    I look forward to reading the public's comments on how the 
proposed operational resilience framework requirements and guidance 
can strengthen the operational resilience of FCMs, SDs, and MSPs as 
well as help protect their respective customers and counterparties 
in the derivatives markets. The 75-day comment period will begin 
upon the Commission's publication of the release on its website.
    I thank staff in the Market Participants Division, Office of the 
General Counsel, and the Office of the Chief Economist for all of 
their work on the proposal.

Appendix 3--Statement of Commissioner Kristin N. Johnson

    Cyberattacks are an ever-increasing threat. The rising cost, 
frequency, and severity of cyber threats represent one of the most 
critical issues facing city, state, and federal government 
authorities, businesses in each sector of our economy, educational 
and philanthropic institutions, and significant energy and 
transportation infrastructure, and national security resources.
    Less than a month before the White House released its National 
Cybersecurity Strategy in March of this year, international media 
headlines reported a ransomware attack that demonstrated that ``big 
financial firms'' are among the most attractive targets of cyber 
threats.\1\ Even for firms that have successfully

[[Page 4763]]

developed business continuity plans to identify, assess, or mitigate 
cyber threats, the networked or interconnected systems that comprise 
our operational market infrastructure may still render 
sophisticated, well-resourced firms vulnerable to the knock-on 
effects of cyberattacks leveled against critical third-party service 
providers.
---------------------------------------------------------------------------

    \1\ James Rundle, Wall Street Journal, Cyberattack on ION 
Derivatives Unit Had Ripple Effects on Financial Markets (Feb. 10, 
2023), https://www.wsj.com/articles/cyberattack-on-ion-derivatives-unit-had-ripple-effects-on-financial-markets-11675979210.
---------------------------------------------------------------------------

    The ransomware attack, carried out on a critical third-party 
service provider, ION Cleared Derivatives,\2\ disrupted trade 
settlement and reconciliation in derivatives markets.
---------------------------------------------------------------------------

    \2\ See Press Release, ION Markets, Cleared Derivatives Cyber 
Event (Jan. 31, 2023), https://iongroup.com/press-release/markets/cleared-derivatives-cyber-event/.
---------------------------------------------------------------------------

    ION provides trading, clearing, analytics, treasury, and risk 
management services for capital markets and futures and derivatives 
markets. A significant number of market participants, including a 
notable number of futures commission merchants (FCMs), rely on ION 
for back-office trade processing and settlement of exchange-traded 
derivatives.
    The cyber-incident that disrupted ION's operations caused a 
ripple effect across markets, halting deal matching, requiring 
affected parties to rely on manual (old school) trade processing, 
and causing delays in reconciliation and information sharing and 
reporting.

MRAC Leads on Cyber Reform Discussions

    I sponsor the Market Risk Advisory Committee (MRAC). On March 8, 
2023, the MRAC held a first-of-its-kind convening focused on the 
interconnectedness of our markets and the potential for 
interconnectedness and correlation to amplify contagion in the event 
of successful cyberattacks against critical infrastructure 
resources.\3\ At the March MRAC meeting, Futures Industry 
Association (FIA) President Walt Lukken announced the creation of a 
Cyber Risk Taskforce, charged with ``recommend[ing] ways to improve 
the ability of the exchange-traded and cleared derivatives industry 
to withstand the disruptive impacts of a cyberattack.'' \4\
---------------------------------------------------------------------------

    \3\ Kristin N. Johnson, Commissioner, CFTC, Opening Statement 
Before the Market Risk Advisory Committee Meeting (Mar. 8, 2023), 
https://www.cftc.gov/PressRoom/SpeechesTestimony/johnsonstatement030823.
    \4\ Futures Industry Association, FIA Taskforce on Cyber Risk, 
After Action Report and Findings, at 3 (Sept. 28, 2023), https://www.fia.org/sites/default/files/2023-09/FIA_Taskforce%20on%20Cyber%20Risk_Recommendations_SEPT2023_Final2.pdf
.
---------------------------------------------------------------------------

    The After Action Report issued by the FIA at the conclusion of 
the Taskforce's work outlines the challenges that both markets and 
regulators faced as a result of the ION cyber-incident. Trade 
reconciliation for affected firms continued to lag. For weeks 
following the ION cyberattack, the Commission continued to work to 
consistently publish the Commitments of Traders (COT) report on a 
timely basis because ``reporting firms continu[ed] to experience . . 
. issues submitting timely and accurate data to the CFTC.'' \5\ The 
COT report is designed to help the public understand the dynamics of 
the futures and options on futures markets.\6\ The COT report is a 
reflection of the effectiveness of the Commission's surveillance of 
markets; it increases transparency and aids in price discovery. 
Thus, indirectly, the ION incident disrupted regulatory functions 
even though the cyberattack was not directed at the Commission nor 
any of the Commission's registrants.
---------------------------------------------------------------------------

    \5\ Press Release No. 8662-23, CFTC, CFTC Announces Postponement 
of Commitments of Traders Report (Feb. 16, 2023), https://www.cftc.gov/PressRoom/PressReleases/8662-23.
    \6\ CFTC, Commitments of Traders Reports Descriptions, https://www.cftc.gov/MarketReports/CommitmentsofTraders/index.htm.
---------------------------------------------------------------------------

    As a consequence, it is imperative to begin to examine the scope 
of our regulations governing cyber-system safeguards not only for 
registered market participants, but for mission-critical third-party 
service providers. There is increasing reliance on third parties for 
the provision of important services, particularly, for example, 
services that facilitate digital connectivity and cloud-based 
services.
    While outsourcing may allow companies to rely on outside 
expertise, reduce operating costs, and enhance operational 
infrastructure necessary for executing business activities, 
reliance, may, in some instances, create vulnerability and risks 
that must be identified, managed, and mitigated.

Operational Resilience Proposed Rulemaking

    Today, the Market Participants Division (MPD) has introduced a 
robust and comprehensive proposed rulemaking that addresses: 
business continuity and disaster planning, cybersecurity, and 
assessment of the risk posed by reliance on third parties. I want to 
commend MPD, in particular Pamela Geraghty, Elise Bruntel, Fern 
Simmons, and Amanda Olear.
    The Commission has the authority to direct swap entities (swap 
dealers and major swap participants) to establish this operational 
resilience framework under Section 4s(j)(2) and (7) of the Commodity 
Exchange Act (CEA), which require swap entities to establish risk 
management systems over their day-to-day business and their 
operational risk.\7\ Likewise, the Commission may require 
operational resilience framework of FCMs (collectively with swap 
entities, ``covered entities'') under Section 8a(5) of the CEA,\8\ 
which authorizes the Commission to promulgate regulations sufficient 
to accomplish the purposes of the CEA, including, for example, the 
need to maintain records of the operational risk of affiliates,\9\ 
and to establish safeguards to protect the confidentiality of 
nonpublic personal information.\10\
---------------------------------------------------------------------------

    \7\ 7 U.S.C. 6s(j)(2), (7).
    \8\ 7 U.S.C. 12a(5).
    \9\ 7 U.S.C. 6f.
    \10\ 7 U.S.C. 7b-2; 15 U.S.C. 6801.
---------------------------------------------------------------------------

    The proposed rulemaking sets out three major pillars of its 
operational resilience framework: (1) information and technology 
security; (2) a third-party relationship program to manage risks 
presented by mission-critical third-party service providers; and (3) 
a business continuity and disaster recovery plan.\11\
---------------------------------------------------------------------------

    \11\ Proposed Sec. Sec.  1.13(b)(2), 23.603(b)(2).
---------------------------------------------------------------------------

    Layered on top of the of the three pillars are corporate 
governance reforms that will dictate how each covered entity will 
incorporate the components of the plan into existing organizational 
structures. Each of the components of the operational resilience 
framework must be reviewed by senior leadership.\12\ Covered 
entities must also establish a risk appetite--the level of risk 
acceptable on an ongoing basis--and risk tolerance limits--the level 
of excess risk the entity is willing to accept should a particular 
risk materialize \13\--and the entities will be required to escalate 
incidents that exceed their risk tolerance limit.\14\ The rule also 
allows for flexibility for entities that function as a division or 
affiliate of a larger organization; such entities will be allowed to 
operate under the umbrella company's operational resilience plan so 
long as that plan meets the rule's requirements and considers the 
covered entity's particular risks.\15\
---------------------------------------------------------------------------

    \12\ Proposed Sec. Sec.  1.13(c)(1), 23.603(c)(1).
    \13\ Proposed Sec. Sec.  1.13(c)(1), 23.603(c)(2).
    \14\ Proposed Sec. Sec.  1.13(c)(3), 23.603(c)(3).
    \15\ Proposed Sec. Sec.  1.13(c)(4), 23.603(c)(4).
---------------------------------------------------------------------------

    The information and technology security program requires the 
covered entities to comprehensively assess, on at least an annual 
basis, the types of threats the entity faces, the entity's internal 
and external vulnerabilities, the likely impact of those threats or 
the exploitation of those vulnerabilities, and appropriate 
priorities for addressing those risks.\16\ With that background, 
covered entities must then implement controls reasonably designed to 
prevent, detect, and mitigate the identified risks, threats, and 
vulnerabilities.\17\ The program then requires the covered entities 
to develop a written incident response plan, reasonably designed to 
detect incidents where risks to information and technology are 
realized, and then provide for how the entity will mitigate the 
impact of and recover from such an incident.\18\
---------------------------------------------------------------------------

    \16\ Proposed Sec. Sec.  1.13(d)(1), 23.603(d)(1).
    \17\ Proposed Sec. Sec.  1.13(d)(2), 23.603(d)(2).
    \18\ Proposed Sec. Sec.  1.13(d)(3), 23.603(d)(3).
---------------------------------------------------------------------------

    The third-party relationship plan requires covered entities to 
understand the risks posed by all third-party service providers at 
each stage of the relationship: pre-selection, diligence, contract 
negotiation, ongoing monitoring, and termination.\19\ The proposed 
rule then imposes a heightened level of required diligence and 
monitoring for ``critical'' third parties, defined as those parties 
for whom disruption of performance on their service contract would 
either ``significantly disrupt'' the covered entity's business 
operations, or ``significantly and adversely impact'' the entity's 
counterparties or customers.\20\ Covered entities will also have to 
maintain an inventory of their critical and non-critical third-party 
service providers.\21\ Finally, regardless of any

[[Page 4764]]

decision to rely on a third-party service provider, each covered 
entity remains responsible for meeting its obligations under the CEA 
and Commission regulations.\22\
---------------------------------------------------------------------------

    \19\ Proposed Sec. Sec.  1.13(e)(1), 23.603(e)(1).
    \20\ Proposed Sec. Sec.  1.13(e)(2), 23.603(e)(2).
    \21\ Proposed Sec. Sec.  1.13(e)(3), 23.603(e)(3).
    \22\ Id.
---------------------------------------------------------------------------

    Each entity's business continuity and disaster recovery plan 
(BCDR plan) must ``outline[ ] the procedures to be followed in the 
event of an emergency or other disruption of its normal business 
activities.'' \23\ The goal of a BCDR plan will be to enable covered 
entities to continue or resume business operations with minimal 
disruption to customers, counterparties, or the markets, and recover 
any affected data or information.\24\ At minimum, the BCDR plan must 
define backup plans for covered information and data; identify 
essential technology, facilities, infrastructure, and personnel; 
identify potential disruptions to critical third-party service 
providers; and identify supervisory personnel responsible for 
carrying out the plan in the event of an emergency.\25\ Covered 
entities must also maintain the plan at one or more off-site 
locations.\26\
---------------------------------------------------------------------------

    \23\ See 17 CFR 23.603(a).
    \24\ Proposed Sec. Sec.  1.13(f)(1)(i)-(ii), 23.603(f)(1)(i)-
(ii).
    \25\ Proposed Sec. Sec.  1.13(f)(2), 23.603(f)(2).
    \26\ Proposed Sec. Sec.  1.13(f)(3), 23.603(f)(3).
---------------------------------------------------------------------------

    To support the pillars of the operational resilience framework, 
the proposed rule also lays out training,\27\ review, and testing 
requirements to ensure the framework evolves with newly generated 
risks. Covered entities must review their framework annually,\28\ 
and engage in regular independent and documented testing, including 
penetration testing, vulnerability assessments, and testing of the 
incident response and BCDR plans.\29\ Results of that testing must 
be reported to the entity's chief compliance officer and other 
relevant senior personnel.\30\ Finally, the proposed rule lays out 
the instances in which the Commission must be notified of incidents 
and of activation of the BCDR plan.\31\
---------------------------------------------------------------------------

    \27\ Proposed Sec. Sec.  1.13(g), 23.603(g).
    \28\ Proposed Sec. Sec.  1.13(h)(1), 23.603(h)(1).
    \29\ Proposed Sec. Sec.  1.13(h)(2)-(3), 23.603(h)(2)-(3).
    \30\ Proposed Sec. Sec.  1.13(h)(5), 23.603(h)(5).
    \31\ Proposed Sec. Sec.  1.13(i)-(j), 23.603(i)-(j).
---------------------------------------------------------------------------

    This proposed rulemaking is both expansive and thoroughly 
considered. It galvanizes much of the preexisting guidance on these 
subjects, recognizing that the vast majority of our market 
participants already have programs in place to address these risks 
and often already are subject to other regulators' rules and 
obligations, both domestically and internationally. The rule also 
recognizes the vast range in the size of the operations of our 
registered market participants--from some of the world's largest 
financial institutions acting as swap dealers to small, independent 
futures commissions merchants--and consequently builds flexibility 
into the proposed rule to allow businesses to tailor their 
operational resilience frameworks to the realities of their business 
needs.

The Need for Operational Resilience for Other Commission Registrants

    This rule is necessarily limited in scope to FCMs and the swap 
entities overseen by MPD. The risks that this rule intends to 
mitigate, however, are not similarly siloed. Designated Contract 
Markets (DCM), Swap Execution Facilities (SEF), and Swap Data 
Repositories (SDR), overseen by the Division of Market Oversight, 
and Derivative Clearing Organizations (DCO), overseen by the 
Division of Clearing and Risk, similarly rely on mission-critical 
third-party service providers, similarly are targeted by 
cyberattacks, and similarly risk business disruption caused by 
unforeseen disaster scenarios.
    Rulemakings completed in 2016 created system safeguard testing 
requirements for each of these entities, currently codified in Parts 
37, 38, 39, and 49 of the CFR.\32\ These rules include obligations 
for business continuity and disaster recovery and cybersecurity. 
Since 2016, however, the core issues surrounding the concept of 
operational resilience have shifted, most importantly around the 
ideas of mission-critical third parties. DCOs are increasingly 
contracting with third parties to manage and conduct aspects of 
their regulatory obligations, and just like with the covered 
entities subject to the rule at issue today, the onboarding of these 
new third parties also onboards new risks. The proposed rulemaking 
today considers the system safeguards provisions already on the 
books; \33\ the Commission now needs to continue to press forward by 
considering this proposed rule for future parallel regulations, for 
DCOs in particular.
---------------------------------------------------------------------------

    \32\ See Final Rule, System Safeguards Testing Requirements, 81 
FR 64272 (Sept. 19, 2016) (covering DCMs, SEFs, and SDRs); Final 
Rule, System Safeguards Testing Requirements for Derivatives 
Clearing Organizations, 81 FR 64322, 64329 (Sept. 19, 2016) 
(``System Safeguards for DCOs'') (describing the CFTC's approach to 
system safeguards for DCOs as providing DCOs with ``flexibility to 
design systems and testing procedures based on the best practices 
that are most appropriate for that DCO's risks'').
    \33\ C.f., e.g., System Safeguards for DCOs, 81 FR 64322-23; 17 
CFR 39.18(b)(3) (requiring DCOs to follow generally accepted 
standards and best practices with respect to the development, 
operation, reliability, security, and capacity of automated 
systems).
---------------------------------------------------------------------------

    The pandemic underscored the importance of business operational 
resilience, namely the ability of our registrants to react to and 
withstand unforeseen disasters. The FIA conducted its annual 
Disaster Recovery Exercise this fall with the stated goal of probing 
participants' ability to ``conduct critical business functions'' in 
the wake of a large-scale disaster.\34\ Last year's exercise saw 
participation from 19 major U.S. and international futures exchanges 
and clearinghouses, who indicated that this type of probing helped 
them to: ``Exercise their business continuance/disaster resilience 
plans[, i]dentify internal and external single points of failure . . 
. [, and t]ighten up and improve the documentation of their business 
continuity procedures.'' \35\
---------------------------------------------------------------------------

    \34\ Presentation, Futures Industry Association, Business 
Continuity Disaster Recovery Test, at 4 (Aug. 23, 2023), https://www.fia.org/sites/default/files/2023-10/FIA_DR_Test_Briefing_2023_1010_0.pptx.
    \35\ Summary Report, Futures Industry Association, 2022 FIA 
Industry-Wide Disaster Recovery Test, at 4 (Dec. 16, 2021), https://www.fia.org/sites/default/files/2023-05/2022_DR_Test_Results_v2.pdf.
---------------------------------------------------------------------------

    In 2021, the International Organization of Securities 
Commissions (IOSCO) initiated a consultation examining business 
continuity planning.\36\ IOSCO's initial recommendations to member 
jurisdictions stated that all regulators should require firms to 
have in place ``mechanisms to help ensure the resiliency, 
reliability and integrity (including security) of critical systems'' 
including an appropriate ``Business Continuity Plan.'' \37\
---------------------------------------------------------------------------

    \36\ The Board of The International Organization of Securities 
Commissions, Thematic Review on Business Continuity Plans with 
respect to Trading Venues and Intermediaries (May 21, 2021), https://www.iosco.org/library/pubdocs/pdf/IOSCOPD675.pdf.
    \37\ Id. at 1.
---------------------------------------------------------------------------

    Every industry advisory board and oversight group to have 
studied cybersecurity has reached the same conclusion: risks to 
financial institutions from cyberattacks continue to grow. The 
Financial Stability Oversight Council noted in its 2022 annual 
report that from 2015 to 2020 the finance and insurance industries 
were subject to the most cyberattacks of any industry, and that the 
current global geopolitical climate has only increased the need for 
vigilance against cyber threats.\38\ In April 2020, the Financial 
Stability Board (FSB) issued a guide on cyber incident response that 
explained that ``[a] significant cyber incident, if not properly 
contained, could seriously disrupt the financial system, including 
critical financial infrastructure, leading to broader financial 
stability implications.'' \39\ Similarly, in its 2019 Cyber Task 
Force report, IOSCO reiterated that cyber risk is one of the top 
threats to financial markets today given the ``economic costs of 
such events can be immense . . . and could potentially undermine the 
integrity of global financial markets.'' \40\ IOSCO went further in 
their recommendations to the crypto industry earlier this year that 
``[r]egulators should require a [crypto-asset service provider] to 
put in place sufficient measures to address cyber and system 
resiliency.'' \41\
---------------------------------------------------------------------------

    \38\ Financial Stability Oversight Council, 2002 Annual Report, 
at 37 (Dec. 16, 2022), https://home.treasury.gov/system/files/261/FSOC2022AnnualReport.pdf.
    \39\ The Financial Stability Board, Effective Practices for 
Cyber Incident Response and Recovery, at 1 (Oct. 19, 2020), https://www.fsb.org/wp-content/uploads/P191020-1.pdf.
    \40\ The Board of The International Organization of Securities 
Commissions, Cyber Task Force: Final Report, at 3 (June 19, 2019), 
https://www.iosco.org/library/pubdocs/pdf/IOSCOPD633.pdf.
    \41\ The Board of The International Organization of Securities 
Commissions, Policy Recommendations for Crypto and Digital Asset 
Markets Consultation Report, at 39 (Nov. 16, 2023), https://www.iosco.org/library/pubdocs/pdf/IOSCOPD747.pdf.
---------------------------------------------------------------------------

Next Steps for Derivatives Clearing Organizations

    At the MRAC meeting this past Monday, I announced a new 
workstream for the CCP Risk and Governance subcommittee that will 
focus on third-party risk for central clearing counterparties. Work 
will begin imminently, with the goal of presenting a proposal for

[[Page 4765]]

vote by the parent committee in the first quarter of 2024. DCOs 
already retain responsibility for meeting regulatory requirements 
when entering into contractual outsourcing arrangements; \42\ the 
question now is how DCOs should be required to assess and monitor 
the risks associated with doing so.
---------------------------------------------------------------------------

    \42\ 17 CFR 39.18(d) (2022) (providing that registered entities 
such as DCOs retain responsibility for meeting relevant regulatory 
requirements when entering into contractual outsourcing 
arrangements).
---------------------------------------------------------------------------

    Such a rule should in my view broadly track the rule for FCMs 
and swap entities proposed today, but deep consideration must be 
given to the ways in which the core DCO business differs. For 
example, DCOs already occupy a quasi-oversight role with respect to 
their clearing members; should a rule on third-party risk require 
DCOs to consider not only the risk posed by their own outsourcing 
contracts, but also require that DCOs consider their clearing 
members' third-party risks, perhaps as an aspect of a DCO's 
assessment of its counterparty risk? How else might the rule differ 
given the disparity between DCOs' and FCMs' relative frequency of 
interaction with end users? How might these rules coordinate with 
prudential regulators?
    A cyberattack on a third party that affected FCMs last winter 
was already disruptive enough, but given their status as SIFMUs some 
DCOs are quite literally systemically important entities. DCOs serve 
irreplaceable market functions, and we need update their operational 
resilience requirements to take into account this new conception of 
third-party risk. I look forward to the new MRAC workstream diving 
into this critical issue, and of course to what Division of Clearing 
and Risk staff might bring forward in an eventual proposed 
rulemaking.
    I once again commend the staff of MPD on their tremendous effort 
bringing forth this proposed rule, and look forward to hearing the 
thoughts of my fellow Commissioners.

Appendix 4--Statement of Commissioner Christy Goldsmith Romero

    Today we have before us our first proposed cyber and operational 
resilience rule that would apply to swap dealers (including banks) 
and futures commission merchants (FCMs). I'm excited to see the 
proposed rule up for vote today. I support the rule and thank the 
staff for their more than one year of hard work. I also thank all 
who engaged with us in an extensive collaborative effort. I also 
thank Chairman Behnam for entrusting me to help with this rule.
    This is a critical rule for the CFTC. FBI Director Christopher 
Wray recently said ``that today's cyber threats are more pervasive, 
hit a wider array of victims, and carry the potential for greater 
damage than ever before'' and we face ``some of our most complex, 
most severe, and most rapidly evolving threats.'' \1\ This rule 
proposes to help advance our markets from a mentality of incident 
response to one of cyber resilience. This would further President 
Biden's White House National Cybersecurity Strategy and Executive 
Order on Improving the Nation's Cybersecurity.\2\
---------------------------------------------------------------------------

    \1\ See FBI, Director Wray's Remarks at the Mandiant/mWISE 2023 
Cybersecurity Conference (Sept. 18, 2023).
    \2\ The E.O.'s policy statement of policy is ``Protecting our 
Nation from malicious cyber actors requires the Federal Government 
to partner with the private sector. The private sector must adapt to 
the continuously changing threat environment, ensure its products 
are built and operate securely, and partner with the Federal 
Government to foster a more secure cyberspace. In the end, the trust 
we place in our digital infrastructure should be proportional to how 
trustworthy and transparent that infrastructure is, and to the 
consequences we will incur if that trust is misplaced.'' The White 
House, Executive Order on Improving the Nation's Cybersecurity (May 
12, 2021).
---------------------------------------------------------------------------

    Cyber resilience is one of my top priorities, and a critical 
issue on which I am engaged. Over the last year, the CFTC staff and 
I have been engaged with the White House, other financial 
regulators, the Department of Commerce's National Institute of 
Standards and Technology (NIST), the National Futures Association 
(NFA), swap dealers, FCMs, trade groups like the Futures Industry 
Association, the International Swaps and Derivatives Association, 
and the Securities Industry and Financial Markets Association, 
public interest groups, and third-party vendors. I also sponsor the 
Technology Advisory Committee that covers cybersecurity, and has a 
dedicated Cybersecurity subcommittee stacked with well-regarded 
cybersecurity experts.\3\
---------------------------------------------------------------------------

    \3\ See CFTC, Commissioner Goldsmith Romero Announces Technology 
Advisory Committee Subcommittee Co-Chairs and Members (July 14, 
2023); see also CFTC Technology Advisory Committee July 18 Meeting 
(July 18, 2023); CFTC Technology Advisory Committee March 22 Meeting 
(March 22, 2023).
---------------------------------------------------------------------------

    It takes this type of collective public and private engagement 
to thwart cybercrime, stay ahead of the continuously changing 
threat, and protect our nation's critical infrastructure. Director 
Wray has spoken about how malicious cyber actors seeking to cause 
destruction are working to hit us somewhere that's going to hurt--
U.S. critical infrastructure sectors.\4\ According to the FBI, in 
2021, there were ransomware incidents against 14 of the 16 U.S. 
critical infrastructure sectors.\5\ That includes an attack on 
Colonial Pipeline that led to gas shortages, and an attack on the 
world's largest meat supplier JBS, that led to meat shortages and 
spiking prices.\6\
---------------------------------------------------------------------------

    \4\ See FBI, Director's Remarks to the Boston Conference on 
Cyber Security 2022 (June 1, 2022).
    \5\ See FBI, FBI Partnering with the Private Sector to Counter 
the Cyber Threat, Remarks at the Detroit Economic Club (Mar. 22, 
2022).
    \6\ See Id. (discussing how an attack led to Colonial shutting 
down pipeline operations and a panic among people in the Southeast 
that led to a run on gas and how an attack on JBS resulted in a 
complete stoppage of meat production, leading to spiking prices and 
less availability of meat).
---------------------------------------------------------------------------

    As Director Wray has said, ``ransomware gangs love to go after 
things we can't do without.'' \7\ Our nation cannot do without the 
commercial agriculture, energy, metals, and financial markets, on 
which derivatives markets are based.
---------------------------------------------------------------------------

    \7\ See FBI, Director's Remarks to the Boston Conference on 
Cyber Security 2022 (June 1, 2022).
---------------------------------------------------------------------------

    In June, I presented five key pillars of cyber resilience, 
pillars that are contained in the proposed rule: \8\
---------------------------------------------------------------------------

    \8\ Commissioner Christy Goldsmith Romero, Advancing from 
Incident Response to Cyber Resilience, (June 20, 2023).
---------------------------------------------------------------------------

    1. A proportionate and appropriate approach;
    2. Following generally accepted standards and best practices;
    3. Elevating responsibility through governance;
    4. Building resilience to third-party risk; and
    5. Leveraging the important work already done in this space, 
including by prudential regulators and NFA.

Taking a Proportionate and Appropriate Approach

    There is no one-size fits all approach. The proposed rule would 
require swap dealers and FCMs to ensure that their operational 
resilience programs are appropriate and proportionate to the nature 
and risk profile of their business. This follows the White House 
National Cybersecurity Strategy.\9\ Our swap dealers include 
Globally Systemically Important Banks (GSIBs). Additionally, some of 
our swap dealers and FCMs are involved in U.S. critical 
infrastructure such as in the energy or agricultural sectors, or in 
supply chains.
---------------------------------------------------------------------------

    \9\ See The White House, National Cybersecurity Strategy (March 
2023) (recommending that organizations ``demonstrate a principles-
based approach that is sufficiently nimble to adapt to meet the 
challenges of the ever-evolving technological threat landscape and 
to fit the unique business and risk profile of each individual 
covered entity.''
---------------------------------------------------------------------------

    FBI Director Wray testified before Congress this month that one 
of the most worrisome facets of state-sponsored adversaries is their 
focus on compromising U.S. critical infrastructure, especially 
during a crisis, and that there is often no bright line that 
separates where nation state activity ends and cybercriminal 
activity begins.\10\ He testified about the disruptive impact of a 
supply chain attack in the SolarWinds attack, conducted by the 
Russian Foreign Intelligence Service.\11\ This summer, Director Wray 
said that the FBI is seeing the effects of Russia's invasion of 
Ukraine here at home, as the FBI has seen Russia conducting 
reconnaissance on the U.S. energy sector.\12\
---------------------------------------------------------------------------

    \10\ See FBI, Statement of Christopher A. Wray Director Federal 
Bureau of Investigation Before the Committee on the Judiciary United 
States Senate (Dec. 5, 2023).
    \11\ See Id.
    \12\ See FBI, Director Wray's Remarks at the FBI Atlanta Cyber 
Threat Summit (July 26, 2023).
---------------------------------------------------------------------------

    Director Wray also has said that, ``China operates on a scale 
Russia doesn't come close to. They've got a bigger hacking program 
than all other major nations combined. They've stolen more American 
personal and corporate data than all nations combined.'' \13\ 
Director Wray has said that ``the Chinese government has hacked more 
than a dozen U.S. oil and gas pipeline operators, not just stealing 
their

[[Page 4766]]

information, but holding them, and all of us, at risk.'' \14\ Swap 
dealers and FCMs involved in critical infrastructure sectors will 
need to build resilience for these cyber threats.
---------------------------------------------------------------------------

    \13\ See FBI, Director's Remarks to the Boston Conference on 
Cyber Security 2022 (June 1, 2022).
    \14\ See FBI, FBI Partnering with the Private Sector to Counter 
the Cyber Threat, Remarks at the Detroit Economic Club (Mar. 22, 
2022).
---------------------------------------------------------------------------

    The proposal also recognizes that cyber resilience requires 
continuous attention. What is appropriate or proportionate may 
change with the changing threat vector. It may also change when a 
swap dealer or FCM enters a new line of business, onboards a new 
vendor, or takes other action that can carry cyber risk.

Following Generally Accepted Standards and Practices

    The proposal, like the CFTC's rules for exchanges and 
clearinghouses, would require swap dealers and FCMs to follow 
generally accepted standards and industry best practices, like NIST 
or ISO (for international companies). The NIST Cybersecurity 
Framework creates a clear set of cybersecurity expectations that are 
risk-and outcome-based rather than prescriptive, and adaptable to 
the size and types of businesses.\15\ These standards are regularly 
updated to reflect the evolving technology and threat landscape. The 
proposed rule also requires at least annual assessment, testing and 
updates to the operational resilience framework.
---------------------------------------------------------------------------

    \15\ See Presentation of Kevin Stine, Chief of the Applied 
Security Division at NIST Information Technology Laboratory, 
``Managing Cybersecurity Risks,'' CFTC Technology Advisory Committee 
Meeting (March 22, 2023).
---------------------------------------------------------------------------

Elevating Responsibility Through Governance

    The vision of the Biden Administration's National Cybersecurity 
Strategy is to rebalance the responsibility to defend cyberspace by 
shifting the burden for cybersecurity away from individuals and 
small businesses, and onto the organizations that are most capable 
and best positioned to reduce risks.\16\ This strategy gets away 
from vulnerability caused by one person in an organization clicking 
on the wrong thing that leads to total disruption. The banks and 
commodity firms this rule would apply to are capable and best 
positioned to reduce cyber risk and cybercrime losses.
---------------------------------------------------------------------------

    \16\ See The White House, National Cybersecurity Strategy (March 
2023).
---------------------------------------------------------------------------

    Building cyber resilience requires elevating responsibility to 
those who make strategic decisions about the business. The stakes 
for businesses are high. There is potential legal risk, reputational 
risk, risk to national security, as well as financial risk. In 2022, 
the FBI reported $10.3 billion in cybercrime losses, shattering the 
record from the prior year.\17\ Tone at the top, including the C-
suite's active participation in cyber resilience programs as well as 
making cyber resilience a top priority, can determine whether an 
organization will successfully be cyber resilient and operationally 
resilient.
---------------------------------------------------------------------------

    \17\ FBI, Internet Crime Report 2022 (March 22, 2023).
---------------------------------------------------------------------------

    The proposed rule would require operational resilience plans to 
be approved annually by a senior leader and for incidents to be 
escalated promptly. It also would require senior leaders to set and 
approve the firm's risk appetite and risk tolerance limit. Leaders 
should make strategic decisions about the risk they are willing to 
take on, as well as the metrics they will monitor. I am interested 
in hearing if the proposal's definitions of these terms set a clear 
expectation and align with generally accepted standards.

Building Resilience to Third-Party Risk

    Swap dealers and FCMs routinely rely upon third party (as well 
as fourth party) service providers to access new technologies and 
expertise, and for efficiencies in business functions. The rule 
requires building resilience to third party risk, an issue brought 
sharply into focus with this year's cyber-attack on third-party 
vendor ION Markets.
    Because third parties create points of entry that need to be 
secured from cyber criminals, the banking regulators released 
updated interagency guidance on third party risk management that 
would apply to many of the swap dealers subject to the proposed 
rule.\18\ The staff and I met with the Federal Reserve, Federal 
Deposit Insurance Corporation, and the Office of the Comptroller of 
the Currency about their guidance and their efforts to promote cyber 
resilience. Like that interagency guidance, the proposed rule 
includes an inventory of all third-party service providers, 
assessments of risk throughout the lifecycle of the third-party 
relationship, the identification of critical third-parties, and 
subjects those critical third parties to heightened due diligence 
and monitoring.
---------------------------------------------------------------------------

    \18\ Board of Governors of the Federal Reserve System, Federal 
Deposit Insurance Corporation, and Office of the Comptroller of the 
Currency, Interagency Guidance on Third Party Relationships: Risk 
Management (Jun. 6, 2023).
---------------------------------------------------------------------------

    The proposed definition of who is a critical third-party service 
provider takes a flexible approach, asking entities to consider the 
impact of a disruption.\19\ At his TAC presentation, Todd Conklin, 
Deputy Assistant Secretary of Treasury's Office of Cybersecurity and 
Critical Infrastructure Protection (OCCIP) and TAC member discussed 
how ION Markets received less scrutiny because it was not treated as 
a critical third-party vendor by most firms.\20\ I look forward to 
comment.
---------------------------------------------------------------------------

    \19\ I heard from many banks and brokers that identifying who is 
a critical third-party service provider is an issue they regularly 
grapple with, and that it often comes down to specific facts and 
circumstances, and not just the products and service they provide.
    \20\ See Presentation of Todd Conklin, Deputy Assistant 
Secretary of Treasury's Office of Cybersecurity and Critical 
Infrastructure Protection (OCCIP), ``The Cyber Threat Landscape for 
Financial Markets: Lessons Learned from ION Markets, Cloud Use in 
Financial Services, and Beyond,'' CFTC Technology Advisory Committee 
Meeting (March 22, 2023) (``many institutions didn't even classify 
[ION Markets] necessarily as a `critical' third-party vendor. So 
many firms who onboarded ION didn't use the highest-level scrutiny 
that they use for their most critical third-party vendors.'').
---------------------------------------------------------------------------

    The CFTC also proposes separate guidance on managing third-party 
risks. I am interested in commenters' views on this guidance, and 
whether we have it right for harmonization.

Leveraging the Important Work of Others, Including Prudential 
Regulators and the NFA

    The White House's 2023 Cybersecurity Strategy recommends 
organizations ``harmonize where sensible and appropriate to achieve 
better outcomes.'' \21\ The proposal recognizes that many of our 
regulated entities are part of a larger enterprise, with cyber and 
operational resilience programs managed at the enterprise level, and 
can use those programs under this rule. I am interested in 
commenters' views on whether we have achieved appropriate 
harmonization or whether we need greater harmonization with bank 
regulators' rules and guidance and NFA guidance.\22\
---------------------------------------------------------------------------

    \21\ See The White House, National Cybersecurity Strategy, 
(March 2023).
    \22\ These requirements and guidance include the prudential 
regulator's Sound Practices to Strengthen Operational Resilience 
paper, the Interagency Guidelines Establishing Standards for 
Safeguard Customer Information, and the recently released 
Interagency Guidance on Third-Party Relationships: Risk Management, 
as well as NFA guidance on information security, third-party service 
provider risk management, and notification of regulators and 
business continuity and disaster recovery.
---------------------------------------------------------------------------

Stronger Together

    We are stronger together. The CFTC is part of coordinated 
government efforts to learn about and disseminate information about 
emerging cyber threats. We want to work with our swap dealers and 
FCMs to help strengthen their operational resilience, especially 
prior to any disruptive event.
    Should a disruptive event occur, resilience requires rapid 
collaboration among the CFTC and all those who are potentially 
affected to contain any potential damage and to keep critical market 
functions running. The proposed rule includes specific requirements 
for notifying the CFTC of an incident as soon as possible, but no 
later than 24 hours after detection. I support immediate 
notification to the CFTC because if we know, we can work with 
regulated entities and markets to assess and minimize damage, 
trigger appropriate regulatory and law enforcement action, help in 
recovery, and protect customers. I note that this time frame and 
reporting standards differs from other regulators, and look forward 
to comment.
    A two-way flow of information can play a significant role in the 
ability to build resilience, which means the ability to recover 
quickly after an attack. According to Deputy Assistant Secretary 
Conklin, collaboration between the government and industry helped 
mitigate the impact of the ION Markets attack.\23\ The proposal 
would also require notification to customers and counterparties as 
soon as possible of attacks that affect them. Early notice helps 
minimize the impact of an

[[Page 4767]]

attack by allowing them to secure their personal data, monitor 
affected accounts, and make alternative arrangements for accessing 
critical funds or markets.
---------------------------------------------------------------------------

    \23\ See Presentation of Todd Conklin, Deputy Assistant 
Secretary of Treasury's Office of Cybersecurity and Critical 
Infrastructure Protection (OCCIP), ``The Cyber Threat Landscape for 
Financial Markets: Lessons Learned from ION Markets, Cloud Use in 
Financial Services, and Beyond,'' CFTC Technology Advisory Committee 
Meeting (Mar. 22, 2023).
---------------------------------------------------------------------------

    If we can all work together, we can harden our defenses, thwart 
cyber criminals, and protect critical U.S. infrastructure and 
national security. Together, we can build a safer and more resilient 
cyberspace.

Appendix 5--Statement of Commissioner Caroline D. Pham

    I support the Notice of Proposed Rulemaking on Operational 
Resilience Framework for Futures Commission Merchants, Swap Dealers, 
and Major Swap Participants (Operational Resilience Proposal) \1\ 
because I believe this approach is largely consistent with 
international standards for operational resilience, as well as U.S. 
prudential regulations and non-U.S. regulations, which have been 
implemented for several years now. I thank the staff of the Market 
Participants Division (MPD), especially Pamela Geraghty, Elise 
Bruntel, and Amanda Olear, as well as Chairman Behnam and 
Commissioner Goldsmith Romero, for working with me over the past 
year to address my concerns.
---------------------------------------------------------------------------

    \1\ Because there are no registered major swap participants, as 
a practical matter, this statement will refer to swap dealers and 
futures commission merchants (FCMs).
---------------------------------------------------------------------------

Background

    My discussions with MPD staff, formerly the Division of Swap 
Dealer and Intermediary Oversight (DSIO), in fact date back to 2016 
when I was in the private sector. MPD staff have been considering 
many of the elements of an operational resilience framework for 
years, including operational risk and cybersecurity risk. I 
appreciate the staff's focus on all of these important issues that 
contribute to ensuring that our registrants have robust risk 
management and compliance programs, and that the CFTC is doing our 
job to uphold financial stability and protect against systemic risk.
    I would like to mention my background and experience, as well as 
familiarity, with the subject areas covered by the Operational 
Resilience Proposal to provide context for my efforts to support the 
development of this Proposal and address my concerns that the CFTC's 
approach should not be overly prescriptive and generally takes a 
principles-based approach in recognition of the extensive years-long 
global implementation of operational resilience requirements by U.S. 
and non-U.S. regulators and banking organizations.
    In my previous roles at a global systemically important bank 
(GSIB), I have been involved with operational resilience since 2019, 
including the oversight and coordination of global regulatory 
advocacy with the Financial Stability Board (FSB) and regulatory 
authorities such as the U.S. prudential regulators,\2\ the Bank of 
England, and European Union (EU) authorities. I also was on the 
enterprise-wide operational resilience program steering committee, 
and I have implemented enterprise-wide programs across a global 
financial institution across all regions and both institutional or 
wholesale and consumer businesses.
---------------------------------------------------------------------------

    \2\ U.S. prudential regulators refers to the Board of Governors 
of the Federal Reserve System (Fed), the Office of the Comptroller 
of the Currency (OCC), and the Federal Deposit Insurance Corporation 
(FDIC).
---------------------------------------------------------------------------

    Among the specific elements encompassed in the Operational 
Resilience Proposal, I have enhanced the swap dealer and futures 
commission merchant (FCM) risk management programs. I have drafted 
an enterprise-wide risk appetite statement. I have implemented the 
National Futures Association's (NFA) update to its information 
systems security programs requirements, which addresses 
cybersecurity risk. I have participated in tabletop exercises, 
drills, and simulations of responses to cyber attacks. I was the 
lead from the Compliance department on the third-party risk 
management program for cross-asset activities or other programmatic 
aspects across the global markets business. I have enhanced the 
business continuity and disaster recovery (BCDR) swap dealer 
policies and procedures and integration with the enterprise-wide 
continuity of business program. I have delivered training for, 
respectively, 9,000 and 17,000 employees across nearly 100 countries 
and multiple languages. I have had a compliance monitoring team that 
reported directly to me. I have advised on the design and 
implementation of the enterprise-wide Volcker Rule independent 
testing program. I was part of global regulatory notification 
protocols for cybersecurity or other incidents. And also, of course, 
I have been subject to regulatory examinations on each one of these 
areas. This practical experience has informed my engagement on this 
significant rulemaking initiative.

The CFTC's Approach to Operational Resilience Must Be Consistent With 
International Standards and Prudential Regulations

    I am pleased that the CFTC is seeking an approach that is 
consistent with international standards and best practices for 
regulators in addressing operational resilience. I will reiterate my 
previous remarks on the many years of work by policymakers such as 
the FSB, the Basel Committee on Banking Supervision (BCBS), the 
International Organization of Securities Commissions (IOSCO), and 
other regulatory authorities around the world to implement laws, 
regulations, and standards for operational resilience. Operational 
resilience, as noted by U.S. prudential regulators in 2020, 
encompasses governance, operational risk management, business 
continuity management, third-party risk management, scenario 
analysis, secure and resilient information system management, 
surveillance and reporting, and cyber risk management. Regulated 
entities, including the vast majority of our swap dealers and FCMs 
that are part of banking organizations, have already implemented 
comprehensive enterprise-wide operational resilience programs.\3\
---------------------------------------------------------------------------

    \3\ Opening Statement of Commissioner Caroline D. Pham before 
the Technology Advisory Committee, U.S. Commodity Futures Trading 
Commission (Jul. 18, 2023), https://www.cftc.gov/PressRoom/SpeechesTestimony/phamstatement071823.
---------------------------------------------------------------------------

    Issuing this Proposal can be beneficial to initiate an open 
process to request information and stimulate dialogue with the 
public. That is why, although there has been some hesitation or 
trepidation around what the Commission might do since we are coming 
onto the tail end of operational resilience implementation globally, 
I do think it is important that we are taking this step today, 
because it is critical that the public has the opportunity to 
provide input on any amendment or expansion of our existing 
programmatic requirements that is informed by actual experience from 
risk management and compliance officers, other control functions, 
and practitioners who have implemented and complied with operational 
resilience requirements pursuant to other regulations.
    Further, as I have noted previously, because the CFTC's rules 
are often only one part of a much broader risk governance framework 
for financial institutions, the Commission must ensure that it has 
the full picture before coming to conclusions to ensure that our 
rules not only address any potential regulatory gaps or changes in 
risk profiles, but also to avoid issuing rules that are conflicting, 
duplicative, or unworkable with other regulatory regimes.\4\
---------------------------------------------------------------------------

    \4\ Statement of Commissioner Caroline D. Pham on Risk 
Management Program for Swap Dealers and Futures Commission Merchants 
Advance Notice of Proposed Rulemaking, U.S. Commodity Futures 
Trading Commission (Jun. 1, 2023), https://www.cftc.gov/PressRoom/SpeechesTestimony/phamstatement060123.
---------------------------------------------------------------------------

    For example, when I last checked earlier this year, the CFTC 
currently has 106 provisionally registered swap dealers. Of these 
106 entities, both U.S. and non-U.S., all but a handful are also 
registered with and supervised by another agency or authority, such 
as a prudential, functional, or market regulator. Most of these swap 
dealers are subject to three or more regulatory regimes.\5\
---------------------------------------------------------------------------

    \5\ Id.
---------------------------------------------------------------------------

    It is imperative that the Commission and the staff consider how 
our rules work in practice together with the rules of other 
regulators, whether foreign or domestic. This key point is easily 
apparent in looking at the CFTC's substituted compliance regime for 
non-U.S. swap dealers, where the Commission has expressly found that 
non-U.S. swap dealers in certain jurisdictions are subject to 
comparable and comprehensive regulation, and therefore, our rules 
permit such non-U.S. swap dealers to, for example, substitute 
compliance with their home jurisdiction risk management regulations 
to satisfy our risk management program rules under CFTC Regulation 
23.600.\6\
---------------------------------------------------------------------------

    \6\ Id.
---------------------------------------------------------------------------

Specific Areas for Public Comment

    As a preliminary matter, regarding discussion of the CFTC's 
approach to system safeguards requirements for designated contract 
markets (DCMs) and derivatives clearing organizations (DCOs) and its 
impact on the development of today's Operational Resilience 
Proposal, I note that swap dealers

[[Page 4768]]

and FCMs are very different from exchanges and clearinghouses. The 
CFTC should not overly rely upon its approach to the system 
safeguards rulesets because it is akin to the difference between, 
for example, the Securities and Exchange Commission's (SEC) 
Regulation SCI and the U.S. prudential regulators' Heightened 
Standards for Risk Governance. I believe that the staff has tried to 
balance these considerations, and I welcome public comment on this 
approach.

Definitions

    Words matter, and it is very important for the Commission to be 
precise in the words that we use for defined terms. I encourage all 
commenters to review the Proposal's definitions and advise whether 
the definitions are appropriate or need to be revised.

Third-Party Relationship Program Guidance

    The Operational Resilience Proposal includes an appendix to the 
rule text with more prescriptive guidance on third-party 
relationships (third-party risk management). This is unusual because 
I do not believe that the CFTC has this level of prescriptiveness 
for any other category of risk, such as credit risk. I question 
whether this heralds a change to the CFTC's approach to setting 
forth risk management requirements, and why would the Commission 
issue prescriptive guidance for third-party risk, but not other 
risks such as operational risk or market risk.
    I also question the approach of issuing Commission guidance, 
which would have to undergo notice-and-comment rulemaking and that 
could take a year or two to update, instead of issuing staff 
guidance, which could be updated more flexibly. I believe that any 
prescriptive guidance would be more appropriate as staff guidance, 
not Commission guidance, because staff guidance can be kept up-to-
date more easily to address changes in best practices or to adapt to 
emerging risks. This is similar to how, for example, U.S. prudential 
regulators update their bank examiners handbook or circulars.
    I am interested in public comment on the CFTC's requirements for 
third-party risk management, and whether it should be issued as 
Commission guidance or staff guidance.

Risk Appetite

    The Operational Resilience Proposal refers to risk appetite, 
which is a new concept to CFTC regulations. I am interested in 
whether commenters believe risk appetite is workable under the 
CFTC's regulatory framework, which is focused on enforcement rather 
than ongoing supervision. Indeed, I have repeatedly noted that the 
CFTC lacks a swap dealer examination program. As a consequence, non-
material operational or technical issues are the subject of 
enforcement actions, rather than addressed more appropriately 
through supervisory findings and exam reports like every other 
regulatory authority in the world. This makes the CFTC an outlier 
amongst U.S. and non-U.S. regulators, and therefore prudential 
concepts like risk appetite may not be workable.

Risk Tolerance Limits

    Risk tolerance limits are a requirement under the CFTC's risk 
management program (RMP) rules for swap dealers and FCMs. The 
Operational Resilience Proposal also requires risk tolerance limits, 
but sets forth a different definition and does not refer to the risk 
tolerance limits under the RMP rules. I am interested in public 
comment on whether the two differing requirements may cause 
confusion or can be implemented without any issues.

Annual Attestation

    The Operational Resilience Proposal requires an annual 
attestation by the senior officer, an oversight body, or a senior-
level official of a swap dealer or FCM that relies on a consolidated 
operational resilience program. Such attestation is to the effect 
that the consolidated program meets CFTC requirements and reflects 
the risk appetite and risk tolerance limits appropriate to the swap 
dealer or FCM. I encourage commenters to discuss the attestation 
requirement and suggest appropriate attestation language.

Substituted Compliance

    Under the Operational Resilience Proposal, substituted 
compliance would be available for non-U.S. swap dealers subject to a 
comparability determination issued by the Commission. I appreciate 
the recognition in the Proposal of the importance of a home-host 
regulator approach to maintaining regulatory cohesion and addressing 
systemic risk and financial stability. I am interested in whether 
commenters believe the Proposal presents any cross-border issues in 
implementation.

Conclusion

    I believe in continuous improvement for not only our market 
participants, but also for the Commission and its regulations, and 
that is why I would like to thank the MPD staff again for being 
proactive in thinking about these issues. I want to particularly 
recognize the leadership of Commissioner Goldsmith Romero in first 
highlighting these risks and exploring ways to address them through 
the work of the CFTC's Technology Advisory Committee, which she 
sponsors.
    As I have stated before, the benefit of the CFTC's principles-
based regulatory framework is that it can quickly anticipate and 
adapt to changes in risk profiles or the operating environment. That 
is why I believe our rules must be broad and flexible enough to be 
forward-looking and evergreen, because it is simply not possible to 
prescribe every last requirement for the unknown future. Consistent 
with international standards, I have discussed the importance of 
utilizing existing risk governance frameworks and risk management 
disciplines to identify, measure, monitor, and control emerging 
risks and new technologies. Swap dealers and FCMs must be vigilant 
and address new and emerging risks through various risk stripes as 
appropriate, whether from changing market conditions, technological 
developments, geopolitical concerns, or any other event, and 
maintain operational resilience.
    With that, I welcome the input from the public comments to 
inform the Commission and the staff regarding the application of the 
Operational Resilience Proposal to swap dealers and FCMs, especially 
those entities that are part of a banking organization and have 
already implemented operational resilience requirements pursuant to 
U.S. or non-U.S. regulations.

[FR Doc. 2023-28745 Filed 1-23-24; 8:45 am]
BILLING CODE 6351-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.