Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing and Extension of Review Period of Advance Notice To Host Certain Core Clearance and Settlement Systems in a Public Cloud, 72128-72146 [2024-19762]
Download as PDF
72128
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
operative for 30 days from the date on
which it was filed, or such shorter time
as the Commission may designate, it has
become effective pursuant to Section
19(b)(3)(A)(iii) of the Act 22 and
subparagraph (f)(6) of Rule 19b–4
thereunder.23
At any time within 60 days of the
filing of the proposed rule change, the
Commission summarily may
temporarily suspend such rule change if
it appears to the Commission that such
action is necessary or appropriate in the
public interest, for the protection of
investors, or otherwise in furtherance of
the purposes of the Act. If the
Commission takes such action, the
Commission shall institute proceedings
to determine whether the proposed rule
should be approved or disapproved.
IV. Solicitation of Comments
Interested persons are invited to
submit written data, views and
arguments concerning the foregoing,
including whether the proposed rule
change is consistent with the Act.
Comments may be submitted by any of
the following methods:
For the Commission, by the Division of
Trading and Markets, pursuant to delegated
authority.24
Sherry R. Haywood,
Assistant Secretary.
Electronic Comments
[FR Doc. 2024–19769 Filed 9–3–24; 8:45 am]
• Use the Commission’s internet
comment form (https://www.sec.gov/
rules/sro.shtml); or
• Send an email to rule-comments@
sec.gov. Please include file number SR–
BX–2024–031 on the subject line.
BILLING CODE 8011–01–P
Paper Comments
• Send paper comments in triplicate
to Secretary, Securities and Exchange
Commission, 100 F Street NE,
Washington, DC 20549–1090.
All submissions should refer to file
number SR–BX–2024–031. This file
number should be included on the
subject line if email is used. To help the
Commission process and review your
comments more efficiently, please use
only one method. The Commission will
post all comments on the Commission’s
internet website (https://www.sec.gov/
rules/sro.shtml). Copies of the
submission, all subsequent
amendments, all written statements
with respect to the proposed rule
change that are filed with the
Commission, and all written
communications relating to the
proposed rule change between the
ddrumheller on DSK120RN23PROD with NOTICES1
Commission and any person, other than
those that may be withheld from the
public in accordance with the
provisions of 5 U.S.C. 552, will be
available for website viewing and
printing in the Commission’s Public
Reference Room, 100 F Street NE,
Washington, DC 20549, on official
business days between the hours of 10
a.m. and 3 p.m. Copies of the filing also
will be available for inspection and
copying at the principal office of the
Exchange. Do not include personal
identifiable information in submissions;
you should submit only information
that you wish to make available
publicly. We may redact in part or
withhold entirely from publication
submitted material that is obscene or
subject to copyright protection. All
submissions should refer to file number
SR–BX–2024–031 and should be
submitted on or before September 25,
2024.
22 15
U.S.C. 78s(b)(3)(A)(iii).
CFR 240.19b–4(f)(6). In addition, Rule 19b–
4(f)(6) requires a self-regulatory organization to give
the Commission written notice of its intent to file
the proposed rule change at least five business days
prior to the date of filing of the proposed rule
change, or such shorter time as designated by the
Commission. The Exchange has satisfied this
requirement.
23 17
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
SECURITIES AND EXCHANGE
COMMISSION
[Release No. 34–100852; File No. SR–FICC–
2024–803]
Self-Regulatory Organizations; Fixed
Income Clearing Corporation; Notice of
Filing and Extension of Review Period
of Advance Notice To Host Certain
Core Clearance and Settlement
Systems in a Public Cloud
August 28, 2024.
Pursuant to Section 806(e)(1) of Title
VIII of the Dodd-Frank Wall Street
Reform and Consumer Protection Act,
entitled Payment, Clearing and
Settlement Supervision Act of 2010
(‘‘Clearing Supervision Act’’) 1 and Rule
19b–4(n)(1)(i) 2 under the Securities
Exchange Act of 1934 (‘‘Act’’),3 notice is
hereby given that on August 14, 2024,
Fixed Income Clearing Corporation
(‘‘FICC’’) filed with the Securities and
Exchange Commission (‘‘Commission’’)
an advance notice as described in Items
I, II and III below, which Items have
been prepared primarily by the clearing
agency. The Commission is publishing
this notice to solicit comments on the
advance notice from interested persons
24 17
CFR 200.30–3(a)(12).
U.S.C. 5465(e)(1).
2 17 CFR 240.19b–4(n)(1)(i).
3 15 U.S.C. 78a et seq.
1 12
PO 00000
Frm 00251
Fmt 4703
Sfmt 4703
and to extend the review period of the
advance notice.
I. Clearing Agency’s Statement of the
Terms of Substance of the Advance
Notice
FICC files this advance notice seeking
no objection to host a specified set of
core clearance, settlement, and risk
applications, including any Regulation
Systems Compliance and Integrity
(‘‘Reg. SCI’’) systems and Critical SCI
systems,4 (‘‘Core C&S Systems’’) on an
on-demand network of configurable
information technology resources
running on a public cloud infrastructure
(‘‘Cloud’’ or ‘‘Cloud Infrastructure’’)
hosted by a single, third-party service
provider (‘‘Cloud Service Provider’’ or
‘‘CSP’’) (altogether, the ‘‘Cloud
Proposal’’), as described in greater detail
below.
II. Clearing Agency’s Statement of the
Purpose of, and Statutory Basis for, the
Advance Notice
In its filing with the Commission, the
clearing agency included statements
concerning the purpose of and basis for
the advance notice and discussed any
comments it received on the advance
notice. The text of these statements may
be examined at the places specified in
Item IV below. The clearing agency has
prepared summaries, set forth in
sections A and B below, of the most
significant aspects of such statements.
(A) Clearing Agency’s Statement on
Comments on the Advance Notice
Received From Members, Participants or
Others
FICC has not received or solicited any
written comments relating to this
proposal. If any written comments are
received, FICC will amend this filing to
publicly file such comments as an
Exhibit 2 to this filing, as required by
Form 19b–4 and the General
Instructions thereto.
Persons submitting written comments
are cautioned that, according to Section
IV (Solicitation of Comments) of the
Exhibit 1A in the General Instructions to
Form 19b–4, the Securities and
Exchange Commission (‘‘Commission’’)
does not edit personal identifying
information from comment submissions.
Commenters should submit only
information that they wish to make
available publicly, including their
name, email address, and any other
identifying information.
All prospective commenters should
follow the Commission’s instructions on
How to Submit Comments, available at
www.;sec.gov/regulatory-actions/how4 17
E:\FR\FM\04SEN1.SGM
CFR 242.1000 et seq.
04SEN1
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
to-submitcomments. General questions
regarding the rule filing process or
logistical questions regarding this filing
should be directed to the Main Office of
the Commission’s Division of Trading
and Markets at tradingandmarkets@
sec.gov or 202–551–5777.
FICC reserves the right to not respond
to any comments received.
(B) Advance Notices Filed Pursuant to
Section 806(e) of the Clearing, and
Settlement Supervision Act
I. Description of the Proposal
Pursuant to the Clearing Supervision
Act and Rule 19b–4(n)(1)(i) under the
Exchange Act,5 FICC files this advance
notice seeking no objection to the Cloud
Proposal, as described herein.
The specified set of Core C&S Systems
that the Clearing Agencies intend to
host in the Cloud, and the transition
schedule for such hosting, are listed in
Exhibit 3 to this advance notice filing.6
However, the Clearing Agencies
recognize that it may become necessary
to deviate from the proposed transition
schedule as risks change over time and
the proposed implementation would
occur over several years. The Clearing
Agencies’ process for monitoring,
assessing, and escalating such risks,
which may result in a deviation, is
described in Section I.D, below. If the
Clearing Agencies would need to
deviate from that schedule, they would
provide Commission staff notice of such
deviation, the reason for the deviation,
and how the implementation schedule
would be updated to account for the
deviation. Further, the Clearing
Agencies recognize that deviating from
the proposed transition schedule would
necessitate a separate analysis to
determine whether such deviation could
materially affect the nature or level of
risk posed by each of the Clearing
Agencies.
FICC’s two affiliate clearing agencies,
The Depository Trust Company (‘‘DTC’’)
and National Securities Clearing
Corporation (‘‘NSCC’’ and together with
FICC and DTC, the ‘‘Clearing
Agencies’’) 7 have each filed with the
5 17
CFR 240.19b–4(n)(1)(i).
Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the proposed transition
schedule (i.e., the Core C&S Systems to Move to
Cloud). The Clearing Agencies have provided this
schedule in confidential Exhibit 3 to this advance
notice filing.
7 The Clearing Agencies are each a subsidiary of
The Depository Trust & Clearing Corporation
(‘‘DTCC’’). DTCC operates on a shared service
model with respect to the Clearing Agencies. Most
corporate functions are established and managed on
an enterprise-wide basis pursuant to intercompany
agreements under which it is generally DTCC that
provides relevant services to the Clearing Agencies.
ddrumheller on DSK120RN23PROD with NOTICES1
6 The
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
Commission advance notices to adopt
the same Cloud Proposal. Accordingly,
each respective advance notice filing is
written from the perspective of the
Clearing Agencies, collectively, instead
of FICC, DTC, and NSCC individually.8
A. The Current System and Summary of
Proposed Change
Today, the Clearing Agencies’ Core
C&S Systems are hosted using
Compute,9 Storage and Networking, as
defined below, running in private data
centers (i.e., on-premises). The current
data-center footprint consists of a single
data center in each of two regions. Each
regional data center has a corresponding
data bunker used for synchronous data
protection and restoration.10
The Clearing Agencies view the
proposed transition to using a Cloud
Infrastructure to host the specified set of
Core C&S Systems as a natural
progression of the Clearing Agencies’
information technology strategy that
aligns with their overall corporate
strategy—to deliver on modernization
and maximize the value of their
platforms for stakeholders and continue
to invest in risk management excellence.
For over 11 years, the Clearing
Agencies have honed their expertise in
operating non-Core C&S Systems within
the Cloud.11 Throughout that time, the
Clearing Agencies have continually
refined their capabilities across
technical, risk, legal, and compliance
dimensions, in tandem with the Cloud’s
own evolution and the industry’s
increasing adoption of it. Given this
extensive maturity and development
over the past decade, the Clearing
Agencies believe that hosting Core C&S
Systems in the Cloud, via a single CSP,
is now appropriate and essential. By
8 Capitalized terms not otherwise defined herein
have the meaning as set forth in respective rules of
the Clearing Agencies, available at https://
www.dtcc.com/legal/rules-and-procedures.
9 The existing Compute platform consists of both
on-premises mainframe and private cloud
platforms.
10 Note: The data bunkers cannot run
applications, as they are only for data protection
and restoration.
11 Some of the non-Core C&S Systems already
operating in Cloud include systems that support
risk analysis, various reporting engines, and shared
infrastructure capabilities. More specifically, for
risk analysis, there are applications for certain risk
testing and calculations used to assess industry risk
postures for various Clearing Agency clients, as
well as warehousing large sets of risk data for
quantitative analytics. For the various report
engines, there are applications that provide publicly
disseminatable data sets and documentation,
certificate imaging, as well as certain archival
storage capabilities. For shared infrastructure
capabilities, there are applications that support the
Clearing Agencies’ engineering and development
departments for dev-op capabilities such as code
scanning, code repositories, and infrastructure-ascode deployment pipelines.
PO 00000
Frm 00252
Fmt 4703
Sfmt 4703
72129
consolidating resources under a single
CSP, the Clearing Agencies can optimize
efficiency, reduce costs, mitigate risks,
and maintain a cohesive environment
for seamless collaboration and
operation.
As described in greater detail in this
advance notice, the Clearing Agencies
propose to provision, within a single
CSP, logically segregated sections of the
Cloud Infrastructure that would provide
the Clearing Agencies with the virtual
equivalent of physical data center
resources, including scalable resources
that can (i) handle various
computationally intensive applications
with load-balancing and resource
management (‘‘Compute’’); (ii) provide
configurable storage (‘‘Storage’’); and
(iii) provide network resources and
services (‘‘Network’’). These resources
would be logically segregated from other
customers of the CSP. The Clearing
Agencies would leverage the CSP’s IaaS
(i.e., infrastructure as a service) and
PaaS (i.e., platform as a service) services
for building and running Core C&S
Systems.
The Clearing Agencies do not propose
to transition all Core C&S Systems
entirely out of their regional data
centers at this time, but rather, to host
a specified set of Core C&S Systems in
a Cloud Infrastructure while
maintaining the remaining applications
in the Clearing Agencies’ regional data
centers for the near term. The proposed
transition would be achieved
incrementally over a course of several
years and would result in the Clearing
Agencies hosting some Core C&S
Systems on-premises and others in a
Cloud Infrastructure.12
This phased approach to transitioning
to Cloud is to reduce risk. The Clearing
Agencies believe that a ‘‘big-bang’’
approach of moving all applications at
once introduces significant execution
risk, primarily driven by the sheer scale
and scope of such an effort. Moreover,
many clearance and settlement
applications on the Clearing Agencies’
mainframe are still tightly coupled
together. Even after such applications
are modernized, many could experience
latency dependencies with other
applications that have not yet been
modernized, hence the need to keep
some applications in the Clearing
Agencies’ existing data centers for the
near term. However, applications with
little to no coupling, particularly those
applications that have already been
modernized, are ripe for Cloud
12 A result of the Cloud Proposal would be that
the Clearing Agencies would operate Reg. SCI and
Critical SCI systems both on-premises and on a
Cloud Infrastructure.
E:\FR\FM\04SEN1.SGM
04SEN1
72130
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
transition and the subject of this Cloud
Proposal. As for the remaining clearance
and settlement applications that are not
part of this proposal and would
continue to be hosted on-premises, the
Clearing Agencies have not thoroughly
assessed when those applications would
transition to Cloud, which may take
several years, or whether such transition
would be the subject of a later, separate
advance notice proposal.
Integration between on-premises and
Cloud-based Core C&S Systems would,
as it is for non-Core C&S Systems that
are already hosted in private and public
cloud, leverage existing patterns and
processes. The primary methods of
application integration are application
program interfaces (a/k/a APIs),
messaging queues (a/k/a MQ
messaging), and file transfer. All three
are used to integrate internal and client
applications, and all three methods
provide interoperability between
applications running on mainframe,
private cloud, and public cloud.
For these reasons, the Clearing
Agencies strongly believe that the
phased approach enables the Clearing
Agencies to best approach the transition
to Cloud, safely and confidently.
B. Why Use Cloud
The Clearing Agencies believe there
are very strong and compelling reasons
to use Cloud as part of their diverse,
platform strategy, including, as
discussed below, the waning of the onpremises industry, improved resilience,
expanded security capabilities, and
increased scalability.
ddrumheller on DSK120RN23PROD with NOTICES1
1. Waning On-Premises Industry
Although on-premises mainframes
have been a stalwart for hosting critical
applications for many years, it is the
Clearing Agencies’ experience that
industry investment and development
in on-premises platforms is waning, and
the ability to source skilled and
experienced staff to operate such
platforms is increasingly challenging.
Meanwhile, vendor consolidations are
beginning to negatively affect
investment and innovation in the
private cloud space.13 As investment
dollars are increasingly allocated to
Cloud, vendor choice, innovation, and
support will continue to diminish for
on-premises platforms. This poses a
growing risk to the Clearing Agencies,
13 For example, the VBlock platform, which has
been the core, private cloud distributed hosting
platform of the Clearing Agencies for over a decade,
is no longer available for purchase. Another
example is the continued consolidation in the
private cloud software space, which has
concentrated the industry and reduce aggregate
investment in innovation.
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
who today continue to rely primarily
upon on-premises mainframes and
private cloud solutions from a resiliency
perspective.14 The Clearing Agencies
believe the best way to manage against
this risk at this time is to leverage a
diverse platform strategy that will
increase the use of and reliance upon
Cloud. The use of Cloud, as part of a
broader platform strategy, serves as an
important tool in enabling the Clearing
Agencies to anticipate and manage these
and other risks more effectively.
2. Improved Resilience
The Clearing Agencies must ensure
that any Core C&S Systems in the Cloud
have resiliency and recovery
capabilities commensurate with the
Clearing Agencies’ importance to the
functioning of the U.S. financial
markets. As explained in detail below,
the Clearing Agencies believe that Cloud
will enhance the resiliency of their Core
C&S Systems by virtue of the Clearing
Agencies’ architectural design
decisions, and the Cloud’s redundancy,
availability, and the Clearing Agencies’
disciplined approach to deployment of
Core C&S Systems to Cloud. In
particular, the Clearing Agencies believe
that Cloud will enhance their ability to
withstand and recover from adverse
conditions by provisioning redundant
Compute, Storage, and Network
resources in three availability zones, in
each of two autonomous and
geographically diverse regions, for a
total of six availability zones that are
comprised of many data centers.
The primary/hot region would be
operational and accepting traffic, while
the secondary/warm region would
receive replicated data from the hot
region with applications on stand-by.
This solution significantly reduces
operational complexity, mitigates the
risk of human error by providing tools
for automating routine tasks and
orchestrating complex workflows,
thereby reducing the need for manual
intervention,15 and provides resiliency
and assured capacity (although, the
Clearing Agencies would continue to
periodically review the CSP’s capacity
14 In this context, ‘‘resiliency’’ is the ‘‘ability to
anticipate, withstand, recover from, and adapt to
adverse conditions, stresses, attacks, or
compromises on systems that include cyber
resources.’’ Systems Security Engineering: Cyber
Resiliency Considerations for Engineering of
Trustworthy Secure Systems, Spec. Publ. NIST SP
No. 800–160, vol. 2 (2018).
15 The CSP’s built-in security features in its Cloud
Infrastructure also can reduce the risk of security
breaches caused by human error, such as
misconfigurations or improper access controls.
PO 00000
Frm 00253
Fmt 4703
Sfmt 4703
planning process through quarterly
reviews).16
The Clearing Agencies are assured of
adequate capacity with the proposed
hot/warm architecture because the
Compute resources of the warm,
‘‘recovery’’ region would be already
running with needed capacity.
Additionally, the Clearing Agencies
have reviewed the effect of a large,
regional outage with the CSP, which
indicated that a vast majority of the
CSP’s customers are not configured to
use the secondary region as a failover
region; thus, they would not be using
capacity in that region. Moreover, a
review of data from two large outages in
the primary region did not show a
change in capacity availability in the
secondary region.
The Clearing Agencies also believe
that Cloud reduces capacitymanagement risks when compared with
on-premises platforms in three
important ways: (1) capacity in Cloud
can be added almost instantly; (2) such
capacity can be added at magnitudes
greater than what is possible with
traditional, on-premises platforms; and
(3) the risk of a supply chain effect on
capacity realization (i.e., the risks
associated with receiving and deploying
servers necessary to create more
capacity) is greatly reduced.
The proposed hot/warm configuration
also enables application rotation
between regions. The Clearing Agencies
would have the ability to operationally
rotate either a single application, groups
of applications, or all applications to the
warm region for both planned and
unplanned events. Collectively, the
proposed design of the Cloud
Infrastructure helps ensure that the
Clearing Agencies can meet any
applicable two-hour recovery time
objective.
Each availability zone, in each of the
two regions, would be comprised of
multiple physical data centers. Each
data center would have its own distinct
physical infrastructure with separate
staff and dedicated connections to
utility power, standalone backup power
sources, independent mechanical
services, and independent network
connectivity.
Although not dependent on each
other, availability zones of a region are
connected to each other with private,
fiber-optic networking, enabling Core
C&S Systems to automatically failover
between a region’s availability zones
16 The Clearing Agencies would continue to
perform periodic business continuity and disaster
recovery tests to verify business continuity plans
and disaster recovery infrastructure will support a
two-hour recovery time objective for critical
systems.
E:\FR\FM\04SEN1.SGM
04SEN1
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
without interruption. Since each
availability zone can operate
independently, but failover capability is
nearly instantaneous, a loss of one
availability zone would not affect
operation in another; therefore, no Core
C&S System would be reliant on the
functioning of a single availability
zone.17
Altogether, the proposed Cloud
Infrastructure would afford the Clearing
Agencies six levels of redundancy (i.e.,
three availability zones, made up of
many data centers, in each of the two
regions), with primary/secondary
regions running in a hot/warm
configuration, respectively, in
geographically separate and segregated
locations, and with each region
containing multiple copies of the data.
Thus, even if an availability zone is lost
in the primary region, the Cloud can
continue to seamlessly operate Core
C&S Systems in the primary region,
thereby significantly reducing
availability risk and any attendant
consequences for the Clearing Agencies’
participants and customers. As a result,
the Cloud Infrastructure offers the
Clearing Agencies multiple
redundancies within which to run Core
C&S Systems, limits the effect of an
incident at the CSP to the smallest
footprint possible, and mitigates the
possibility of the Clearing Agencies
suffering an intra-, inter-, or multiregion outage.
By comparison, the Clearing
Agencies’ current on-premises hosting
capabilities, both mainframe and private
cloud, are operating on one primary
data center in one region, with a second,
recovery data center in a second region
(excluding data bunkers, which do not
have Compute capabilities). In other
words, it is many times less likely that
an unplanned, out of region failover
would be needed for Core C&S Systems
hosted in Cloud than currently hosted
on-premises. (Even in the unlikely event
that the Clearing Agencies needed to fail
over to the secondary Cloud region, the
decision and process of doing so would
continue to be in the sole discretion of
the Clearing Agencies.) This increased
redundancy represents a material
improvement in resiliency for the
ddrumheller on DSK120RN23PROD with NOTICES1
17 To
further ensure the resiliency of the
Compute, Storage, and Network capabilities, the
CSP’s services are divided into ‘‘data plane’’ and
‘‘control plane’’ services. The Clearing Agencies’
applications would run using data plane services,
while control plane services are used to configure
the environment. Resources and requests are further
partitioned into cells, or multiple instantiations of
a service that are segregated from each other and
invisible to the CSP’s customers, on each plane,
again minimizing the effect of a potential incident
to the smallest footprint possible.
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
Clearing Agencies and a material
reduction in risk for the industry.
Additionally, transitioning to Cloud
offers the Clearing Agencies a more
effective strategy for avoiding technical
debt and system degradation because
the CSP, in its role as such, would be
performing regular system upgrades and
maintenance, helping to ensure the
Cloud’s resiliency. Unlike on-premises
solutions that may struggle to keep pace
with evolving technology, due in part to
the waning demand for on-premises
infrastructure, CSPs take on the
responsibility of regularly updating and
maintaining their cloud infrastructure,
which they do in a competitive
environment. This approach helps
ensure that the CSP’s cloud
infrastructure remains up to date,
secure, and performs at its best,
minimizing the likelihood of
accumulating technical debt and
preventing the decline of system
capabilities and resiliency over time.
This is not to say that on-premises
infrastructures are not updated or
maintained today but, instead, that the
CSP does it better and faster. CSPs excel
in ensuring that systems remain up to
date, secure, and perform at their best
by leveraging automation, scalability,
built-in security measures, service level
agreements (‘‘SLAs’’), economies of
scale, and continuous monitoring and
improvement processes. These
advantages collectively enable CSPs to
provide more reliable, resilient, and
high-performance services compared to
traditional on-premises environments.
3. Expanded Security Capabilities
Hosting Core C&S Systems in Cloud
would not change the physical and
cybersecurity standards to which the
Clearing Agencies currently align—the
National Institute of Standards and
Technology (‘‘NIST’’) 18 and Center for
internet Security (‘‘CIS’’).19 Application
of NIST is considered a best practice for
financial services use of cloud.20
Moreover, as discussed further below,
the Clearing Agencies would continue
to apply existing security processes and
standards to include network and
identity and access management
(‘‘IAM’’) controls, security governance
18 National Institute of Standards and Technology
(2023) The NIST Cybersecurity Framework 2.0.
(National Institute of Standards and Technology,
Gaithersburg, MD), NIST Cybersecurity White Paper
(NIST CSWP) 29 ipd, Released August 8, 2023.
https://doi.org/10.6028/NIST.CSWP.29.ipd.
19 Center for internet Security Benchmarks,
cisecurity.org/cis-benchmarks.
20 U.S. Department of the Treasury, The Financial
Services Sector’s Adoption of Cloud Services
(February 8, 2024), available at https://
home.treasury.gov/system/files/136/TreasuryCloud-Report.pdf.
PO 00000
Frm 00254
Fmt 4703
Sfmt 4703
72131
and controls for sensitive data, security
configuration, provisioning, logging and
monitoring, and security testing and
validations.
By hosting in Cloud through the CSP
that the Clearing Agencies have
engaged, the Clearing Agencies would
be able to add cloud-specific security
capabilities and measures provided by
the CSP, as well as third-party tools. For
example, such capabilities and
measures would include automation,
monitoring, and security incident
response capabilities, as well as default
separation between Reg. SCI and nonReg. SCI operating domains, and
ubiquitous encryption, all of which are
not available in the current on-premises
data centers. Similarly, microsegmentation of applications and
infrastructure provided by the CSP,
which also is not available in the
Clearing Agencies data centers, limits
the effect of a security incident and
reduces the time to detection and
recovery.21
4. Increased Scalability
Cloud implementation would allow
for greater scalability of Compute,
Storage, and Network resources that
support Core C&S Systems.22 With a
Cloud Infrastructure, the Clearing
Agencies could quickly provision or deprovision Compute, Storage, or Network
resources to meet demands, including
elevated trade volumes, and provide
more flexibility to create development
and test environments, as well as other
system development needs.23 For
21 For example, the CSP provides infrastructure
capable of withstanding Distributed Denial of
Service (‘‘DDoS’’) attacks at far greater magnitudes
than the Clearing Agencies’ current capabilities, as
the CSP has exponentially more internet
bandwidth, given their business function, than the
Clearing Agencies. (DDoS is a cyberattack in which
the attacker floods a server with illegitimate traffic/
requests to prevent legitimate users from accessing
online services, websites, or computers connected
to the attacked server.)
22 The Clearing Agencies would continue to
follow existing policies and procedures regarding
capacity planning and change management. The
Clearing Agencies have separately submitted a
request for confidential treatment to the
Commission regarding the Change Management
Policy and the Technology Capacity and Demand
Assessment Policy. The Clearing Agencies have
provided these documents in confidential Exhibit 3
to this advance notice filing.
23 The Clearing Agencies periodically perform
capacity and availability planning analyses that
result in capacity baselines and forecasts, as an
input to technology delivery and strategic planning
to ensure cost-justifiable support of operational
business needs. These analyses are based on the
collection of performance data, trending, scenarios,
and periodic high-volume capacity stress tests and
include storage capacity for log and record
retention. Results are reported to senior technology
management as inputs to performance management
and investment planning. In addition, each quarter,
E:\FR\FM\04SEN1.SGM
Continued
04SEN1
72132
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
ddrumheller on DSK120RN23PROD with NOTICES1
example, the CSP could support elastic
workloads and scale dynamically
without the need for the Clearing
Agencies to procure, test, and install
additional servers, storage, or other
hardware.
The Clearing Agencies would preprovision Compute and Storage
resources proactively, in addition to
scaling resources on-demand. This
means that the Clearing Agencies would
be able to increase Compute capacity in
one or both regions via manual or
automated processes for Core C&S
Systems. The rapid deployment of
Compute capacity would allow the
Clearing Agencies to obtain access to
resources far more quickly than with onpremises data centers. The Clearing
Agencies would combine the preprovisioning of primary capacity with
regular capacity stress testing to verify
that the underlying Compute can
sustain required business volumes. The
stress testing data would be used to
determine the base levels of preprovisioned capacity.
The ability to quickly scale workloads
materially improves the Clearing
Agencies ability to respond to
unexpected market events and external
scenarios, such as a global pandemic.24
This capability also enables the Clearing
Agencies to run risk calculations more
frequently, at greater speeds, and with
more compute-intensive models than is
economically feasible compared to the
Clearing Agencies’ on-premises
infrastructure.
In sum, transitioning to Cloud not
only enhances scalability but also
significantly improves agility beyond
the Clearing Agencies’ on-premises
capabilities. The on-demand resources
provided by the CSP enable dynamic
scalability, helping to ensure optimal
performance during peak times, efficient
resource allocation during periods of
lower demand, and the ability to
innovate faster to meet evolving
business requirements.
the Clearing Agencies review the CSP’s capacity
planning accuracy for the prior quarter and review
the upcoming quarter’s forecast, along with
providing input to the CSP for anticipated major
changes in the Clearing Agencies’ proposed use of
resources. The Clearing Agencies’ IT Governance
Committee is the designated escalation point for
handling capacity management issues.
24 Supply chain challenges during the Covid-19
pandemic highlighted a lack of resiliency and
scalability in traditional IT vendors’ abilities to
deliver resources when needed. Lead times of up
to 18 months were experienced and delayed many
efforts to expand capacity. This was not the case
with CSPs, which did not experience capacity
constraints or an ability to meet demand. This
further demonstrates how the option to host Core
C&S Systems in Cloud is a critical risk mitigation
tool for managing against the long-term risk of a
waning on-premises industry.
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
C. Why a Single CSP is Appropriate
The Clearing Agencies strongly
believe that hosting Core C&S Systems
with a single CSP is appropriate. The
Clearing Agencies have assessed the
capabilities of the CSP in adherence
with the Clearing Agency Risk
Management Framework,25 which
requires the respective Board of
Directors of the Clearing Agencies to
approve policies governing
relationships with service providers,
such as the CSP, thus helping to ensure
alignment with the Clearing Agencies’
risk management principles.
Beyond simply being a well-known,
reputable, industry-leading, and capable
CSP, the Clearing Agencies and the CSP
have spent several years discussing the
Clearing Agencies’ needs, including
operational, legal, and regulatory
obligations; what-if scenarios; and
commercial implications. That
extensive effort led to a number of
benefits, including the CSP introducing
new products 26 and the establishment
of an exhaustive contractual agreement
between the Clearing Agencies and the
CSP that addresses the Clearing
Agencies’ needs for hosting Core C&S
Systems in Cloud (‘‘Cloud
Agreement’’).27 28
Meanwhile, it is generally understood
that in the present environment adding
a secondary CSP or an on-premises
backup introduces significant
complexity, costs, and risks that
outweigh expected benefits.29 An on25 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the Clearing Agency Risk
Management Framework. The Clearing Agencies
have provided this document in confidential
Exhibit 3 to this advance notice filing.
26 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding two examples of CSP
Whitepapers. The Clearing Agencies have provided
these documents in confidential Exhibit 3 to this
advance notice filing.
27 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the Cloud Agreement. The
Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
28 Among other things, the Cloud Agreement sets
forth the CSP’s responsibility to maintain the
hardware, software, networking, and facilities that
run Cloud services. See also the separately
submitted Table of Reg. SCI Provisions provided in
confidential Exhibit 3 to this advance notice filing
that provides a summary of the terms and
conditions of the Cloud Agreement that the Clearing
Agencies believe help enable their compliance with
Reg. SCI.
29 As noted in the U.S. Department of Treasury’s
report, The Financial Services Sector’s Adoption of
Cloud Services, ‘‘No financial institution reported
the capability to [run applications across multiple
CSPs] for more complex use cases, such as running
core operations on multiple public clouds. Running
an application across multiple CSPs at the same
time may also be less desirable, given the costs,
staffing, and complexity involved in doing so,
PO 00000
Frm 00255
Fmt 4703
Sfmt 4703
premises or secondary CSP backup
would require the Clearing Agencies to
engineer their primary Cloud
Infrastructure to the lowest common
denominator, so that the systems
operating on the primary infrastructure
also could run on a completely separate
and distinct secondary, backup
infrastructure. This approach would
severely reduce the value that Cloud
provides, introduce significant cost with
little benefit, and greatly increase
operational complexity, all of which
would result in negative consequences
for the efficiency and resiliency of the
Clearing Agencies, their participants,
and the industry.
Notwithstanding the extensive
benefits from moving to Cloud, the
Clearing Agencies fully appreciate and
are committed to managing the risks
presented in relying on a single CSP, as
identified and discussed in Section II.A,
further below.
D. Transition Timeframe
The Clearing Agencies believe that
transitioning certain Core C&S Systems
to the Cloud is critical to managing the
risks that are inherent in technology and
vendor selection. However, as stated
above in Section I.A, the intent of the
Cloud Proposal is not to move all Core
C&S Systems to Cloud at one time. The
Clearing Agencies believe that a ‘‘bigbang’’ transition would introduce
unnecessary execution risk, primarily
driven by the sheer scale and scope of
such an effort. Moreover, many
applications on the mainframe are still
tightly coupled together and not ready
to be moved to public cloud. Rather, at
this time, the Clearing Agencies are
proposing to move only a subset of the
Core C&S Systems to the Cloud and to
do so on an incremental basis, in
consideration of the specifics of each
application and the needs of the
Clearing Agencies.30 This approach
helps enable the hosting of Core C&S
Systems on the most appropriate
platform, at the most appropriate time,
in an efficient and secure manner.
The subset of Core C&S Systems
selected for this proposal have been
initially identified based on several
particularly given the complexity associated with
identifying and managing risk across multiple cloud
environments.’’ Available at https://
home.treasury.gov/system/files/136/TreasuryCloud-Report.pdf at 6.
30 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Global Business
Continuity and Resilience Policy and Standards,
which defines the governance structure, high-level
roles and responsibilities, and the framework for
business continuity and resilience processes at the
Clearing Agencies. The Clearing Agencies have
provided this document in confidential Exhibit 3 to
this advance notice filing.
E:\FR\FM\04SEN1.SGM
04SEN1
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
preliminary criteria, including, but not
limited to, whether:
• the application would benefit from
the presence of data sets already present
in Cloud;
• the application would benefit from
elasticity enabled by Cloud (e.g., user
interfaces); and
• the application already meets
certain architectural patterns for Cloud
(e.g., the application has already been
modernized and currently hosted in
private cloud and/or is a siloed
application—little to no coupling with
other applications).
Assuming the Clearing Agencies
would receive no regulatory objection to
this advance notice, each application of
the proposed subset of Core C&S
Systems then would undergo an indepth, architectural review that would
follow the Clearing Agencies’
governance process, governed by the
System Delivery Process.31 The
governance process includes, where
applicable, a detailed review and
approval by the Information Technology
Architecture Review Board (‘‘ARB’’),32
the New Initiatives process,33 to include
the Business Case Council and the Risk
Assessment Council that vet the
financials and risks of the proposed
move, and the Investment Management
Committee.34 Further escalations would
be made to the Executive Committee
and applicable Board of Directors of the
Clearing Agencies, as needed. Replatforming efforts also would be
communicated to regulators in
accordance with the change reporting
requirements of Section 1003(a)(1) of
Reg. SCI, as applicable.35
The above-described governance
process does not include a specific set
ddrumheller on DSK120RN23PROD with NOTICES1
31 The
Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC System Delivery
Policy. The System Delivery Policy defines
requirements that support adherence to the System
Delivery Process for application development
projects. The Clearing Agencies have provided this
document in confidential Exhibit 3 to this advance
notice filing.
32 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the IT Architecture Policy
(‘‘ITA Policy’’). The ITA Policy provides a set of
controls that must be followed to adequately
address applicable risks. The Clearing Agencies
have provided this document in confidential
Exhibit 3 to this advance notice filing.
33 The Clearing Agencies also have separately
submitted a request for confidential treatment to the
Commission regarding the New Initiatives Policy.
The New Initiatives Policy provides the governance
and oversight structure for the Clearing Agencies to
bring initiatives to market timely and efficiently
while minimizing risk. The Clearing Agencies have
provided this document in confidential Exhibit 3 to
this advance notice filing.
34 Such reviews and decisions are based on highlevel architectural principles that may be applicable
to more than one application.
35 17 CFR 242.1003, et seq.
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
of criteria or thresholds for the ultimate
determination on whether an
application should or should not be
moved to Cloud—it is not a formulaic
decision. Rather, the Clearing Agencies
employ a more qualitative evaluation
process that involves various reviews
and considers high-level architectural
principles that may be applicable to
more than one application. However, at
this time, none of the Core C&S Systems
that have been initially identified as
part of the Cloud Proposal, based on the
preliminary criteria listed above, have
completed that more detailed
governance review process. Given the
extensiveness of the process, it would
not begin until after the Clearing
Agencies would receive no regulatory
objection to this advance notice.
Although the Clearing Agencies do
not anticipate needing to deviate from
the proposed transition schedule for the
selected Core C&S Systems, the Clearing
Agencies recognize that deviation may
be necessary, given that the more indepth governance review process has
not completed and because risks could
change over the proposed, multiyear
implementation period. For example, a
deviation may be necessary to address a
business need or a change in industry or
regulatory requirements or standards.
Regardless, any deviation would follow
the same detailed governance process,
and the Clearing Agencies would
provide notice of such deviation to
Commission staff, the reason for the
deviation, and how the proposed
implementation schedule would be
updated to account for the deviation.
Further, the Clearing Agencies recognize
that deviating from the proposed
transition schedule would necessitate a
separate analysis to determine whether
such deviation could materially affect
the nature or level of risk posed by each
of the Clearing Agencies.
Even though certain on-premises
infrastructure components would be
decommissioned after applications are
moved to Cloud, the Clearing Agencies’
private cloud, mainframe services, and
data-center facilities would remain
available for no less than five more
years to help facilitate exit plans from
Cloud that rely on an on-premises
option. However, to be clear, the onpremises option would not be available
to address short-term disruptions, where
the Cloud is temporarily unavailable.
Management of such disruptions is
discussed in Section II.B, further below.
II. Expected Effects on Risks to the
Clearing Agencies, Their Participants,
or the Market
Although the Clearing Agencies are
not proposing to transition all Core C&S
PO 00000
Frm 00256
Fmt 4703
Sfmt 4703
72133
Systems to Cloud for the reasons
described in Sections I.A and D, above,
transitioning the proposed subset of
Core C&S Systems from an on-premises
infrastructure supported by a
consolidating industry, as described in
Section I.B.1, above, to a new Cloud
Infrastructure maintained by an
industry-leading CSP provides
numerous advantages, as described in
Sections I.B.2–4 and C, above. However,
such transition is not without risk, as
discussed below.
A. Risks Presented by the Cloud
Proposal
1. Concentration Risk
The Clearing Agencies appreciate that
reliance on a single CSP for hosting the
subset of Core C&S Systems that are the
subject of this proposal creates
concentration risk, particularly in the
event of the CSP choosing to terminate
its services (i.e., commercial risk) or is
unexpectedly unavailable (i.e.,
operational risk). The Clearing Agencies
also appreciate that they would have
some reliance on the CSP to help meet
certain regulatory obligations of the
Clearing Agencies (i.e., regulatory risk),
thus introducing the familiar concept of
concentration risk in a relatively new
context. However, concentration risk
exists today as the Clearing Agencies are
dependent on a single mainframe
provider, a single database provider for
the mainframe, and a single
virtualization provider for private cloud.
Moreover, the Clearing Agencies believe
that they have adequately addressed
these risks, as discussed throughout
Sections II.B.1–4., below.
2. Cloud Management Risk
Managing the applicable subset of
Core C&S Systems hosted on a Cloud
Infrastructure presents different risks
and challenges than managing such
systems hosted on-premises because
many activities and services previously
provided by the Clearing Agencies
would now be provided by the CSP. For
example, the Clearing Agencies would
be dependent upon the CSP for fulfilling
all of its contractual obligations,
including security of the Cloud, proper
capacity planning, and protection of
Cloud services from prolonged
operational outages. As such, overseeing
the CSP becomes a critical activity to
ensure the CSP is delivering services
that meet or exceed the Clearing
Agencies’ requirements for operating
those select Core C&S Systems. As
discussed in Sections II.B.1–4, below,
the Clearing Agencies believe that they
have adequately addressed this risk.
E:\FR\FM\04SEN1.SGM
04SEN1
72134
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
B. Management and Mitigation of
Identified Risks
1. Cloud Agreement
The Clearing Agencies believe that the
Cloud Agreement, including all its
amendments and addendums, is a
strong tool in helping to effectively
mitigate the commercial and regulatory
risks borne from the concentration risk,
as described in Section II.A.1, above, as
well as risks in managing the CSP that
would host the subset of selected Core
C&S Systems in the Cloud, as described
in Section II.A.2, above. Following is a
summary of some of the key terms and
conditions covered in the agreement
and how they help mitigate these risks.
ddrumheller on DSK120RN23PROD with NOTICES1
i. Adequate Notice
Under the Cloud Agreement, the CSP
may not unilaterally terminate the
relationship with the Clearing Agencies
absent good cause or without sufficient
notice to allow the Clearing Agencies to
transition their applications elsewhere.
Specifically, the CSP must provide an
extensive notice if it wishes to terminate
the Cloud Agreement for convenience or
if it wishes to terminate an individual
CSP service offering or lower an existing
SLA on which the Clearing Agencies
rely.36
The CSP is permitted to terminate the
Cloud Agreement with shorter notice
periods in the event of a critical
breach 37 or an uncured material
breach 38 39 of the Cloud Agreement. In
the highly unlikely event that a critical
breach or uncured material breach
36 The Cloud Agreement permits an exception to
this sufficient notice provision in the event the CSP
must terminate the individual service offering if
necessary to comply with the law or requests of a
government entity or to respond to claims,
litigation, or loss of license rights related to thirdparty intellectual property rights. In this event, the
CSP must provide reasonable notice to the Clearing
Agencies of the termination of the individual
service offering. See Reg. SCI Addendum, Section
10 Termination. The Clearing Agencies have
provided this document in confidential Exhibit 3 to
this advance notice filing.
37 Critical breaches are material breaches (i) for
which the Clearing Agencies knew their behavior
would cause a material breach (such as a willful
violation of Cloud Agreement terms); (ii) that cause
ongoing material harm to the CSP, its services, or
its customers (e.g., criminal misuse of the services);
or (iii) for undisputed non-payment under the
Cloud Agreement. See Reg. SCI Addendum, Section
10 Termination. The Clearing Agencies have
provided this document in confidential Exhibit 3 to
this advance notice filing.
38 Typically, a breach is considered material only
if it goes to the root of the agreement between the
parties or is so substantial that it defeats the object
of the parties in making the contract. See Reg. SCI
Addendum, Section 10 Termination. The Clearing
Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
39 See Reg. SCI Addendum, Section 10
Termination. The Clearing Agencies have provided
this document in confidential Exhibit 3 to this
advance notice filing.
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
occurs, the Clearing Agencies would
have sufficient notice to shift their
operations away from the CSP. Contract
provisions that allow a party to
terminate for uncured material breaches
are designed to limit the types of actions
that could lead to contract termination
and to establish a period of time to
resolve an aggrieved party’s claim (often
30 days) followed by an additional
extended period in which to remediate
the claim. This gives the parties time
and incentive to address the problem
without having to resort to termination.
In other words, even if the CSP notifies
the Clearing Agencies of an alleged
breach (material or critical), termination
of services is not immediate.
Additionally, regardless of the need to
shift operations elsewhere—
convenience or breach—the Cloud
Agreement provides for the parties to
work together and for the CSP to
provide professional services to assist
with such a shift.40
The Clearing Agencies believe the risk
of termination under the abovediscussed shorter notice period is
minimal. In all cases of an alleged
breach, the CSP must notify the Clearing
Agencies in writing and provide time
for them to cure the alleged breach
(‘‘Notice Period’’).41 With respect to an
alleged material breach, which requires
the CSP to extend the Notice Period if
the Clearing Agencies demonstrate a
good faith effort to cure the alleged
material breach, the Clearing Agencies
would use the Notice Period to attempt
to cure the alleged material breach
while also preparing to transition
elsewhere. As a result, it is highly
unlikely that a critical breach or a
material breach would remain uncured
beyond the Notice Period. If one does
remain uncured, however, the CSP can
only terminate the rights or accounts
associated with the breach, not the
entire Cloud Agreement; 42 meanwhile,
and the Clearing Agencies would have
ample notice to shift operations to avoid
a disruption to Core C&S Systems, if
needed.
As explained above, adequate notice
under the Cloud Agreement plays an
important role in managing
concentration risk by providing the
Clearing Agencies with advance
40 See Reg. SCI Addendum, Section 11 PostTermination Services. The Clearing Agencies have
provided this document in confidential Exhibit 3 to
this advance notice filing.
41 See Reg. SCI Addendum, Section 10
Termination. The Clearing Agencies have provided
this document in confidential Exhibit 3 to this
advance notice filing.
42 See Amendment 1, Section 8 Temporary
Suspension, of the Cloud Agreement. The Clearing
Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
PO 00000
Frm 00257
Fmt 4703
Sfmt 4703
warning of potential disruptions or
changes in the agreement or services
thereunder, which would allow the
Clearing Agencies to take proactive
measures in mitigating the potential
impact of commercial and regulatory
risk, thereby reducing concentration
risk.
ii. Regulatory Compliance and CSP
Oversight
The Clearing Agencies’ transition to
Cloud does not alter their responsibility
to maintain compliance with applicable
regulations. Consistent with FFIEC
Guidance (as defined and discussed
further below), the Clearing Agencies’
will continue to fully comply with all
applicable regulatory obligations,
particularly Reg. SCI.43
The Clearing Agencies believe the
combination of the following would
provide them with reasonable assurance
that the proposed transition to Cloud
would enable them to continue to fully
satisfy their regulatory obligations,
including Reg. SCI, thus helping to
mitigate the regulatory risk highlighted
in Section II.A.1, above: (i) the Cloud
Agreement; (ii) the CSP’s compliance
programs as described in its
whitepapers 44 and publicly available
policies (e.g., its Penetration Testing
Policy),45 46 47 48 and user guides; (iii)
43 Reg. SCI imposes certain information security
and incident reporting standards on the Clearing
Agencies and requires them to adopt an information
technology governance framework reasonably
designed to ensure that ‘‘SCI systems,’’ and for
purpose of security, ‘‘indirect SCI systems,’’ have
adequate levels of capacity, integrity, resiliency,
availability, and security. 17 CFR 242.1000 et seq.
44 Supra note 25.
45 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the Operational &
Technology Risk Technology Risk Management
(‘‘OTR CS&TRM’’) Procedure—Application
Penetration Test which describes the application
penetration test procedures for the Clearing
Agencies’ web applications and supports
compliance with the Information Systems
Acquisition Policy, Development and Maintenance
Policy Security Control Standards, and Ethical
Application Penetration Testing (‘‘EAPT’’) Control
Standards. The Clearing Agencies have provided
this document in confidential Exhibit 3 to this
advance notice filing.
46 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the EAPT Control Standards.
The Clearing Agencies have provided this
document in confidential Exhibit 3 to this advance
notice filing.
47 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Information
Security—Systems Acquisition Development and
Maintenance Policy and Control Standards, which
governs the security aspects of information systems
acquisition, development, and maintenance for
DTCC and its subsidiaries. The Clearing Agencies
have provided this document in confidential
Exhibit 3 to this advance notice filing.
48 The Clearing Agencies have separately
submitted a request for confidential treatment to the
E:\FR\FM\04SEN1.SGM
04SEN1
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
ddrumheller on DSK120RN23PROD with NOTICES1
the CSP’s SLAs; 49 50 51 (iv) the CSP’s
Systems Organization Controls reports
(e.g., SOC 1, SOC 2, SOC 3) 52 and
International Organization for
Standardization (‘‘ISO’’) certifications
(e.g., ISO 27001); 53 (v) the CSP’s size,
scale, and ability to deploy extensive
resources to protect and secure its
facilities and services; and (vi) the CSP’s
commercial incentive to perform.
Moreover, as noted in Section II.B.ii.,
above, oversight of the CSP relationship
and services has become a standing
practice of the Clearing Agencies to
ensure that the CSP is meeting or
exceeding its contractual obligations,
including helping the Clearing Agencies
demonstrate their regulatory
compliance. Such oversight, which also
helps mitigate the cloud management
risk raised in Section II.A.2, above,
would include a strong relationship
between the CSP and the Clearing
Agencies, including between their
senior management. Within the Cloud
Agreement itself, there are established
obligations on the CSP to provide the
Clearing Agencies’ information
Commission regarding the DTCC Information
Security—Communications and Operations Policy
and Control Standards, which helps ensure the
correct and secure operation of information
processing facilities. The Clearing Agencies have
provided this document in confidential Exhibit 3
The Clearing Agencies have provided this
document in confidential Exhibit 3to this advance
notice filing.
49 The Clearing Agencies have provided the CSP’s
SLAs in confidential Exhibit 3 to this advance
notice filing.
50 Amendment 2, Section 2.2 To the Service Level
Agreements of the Cloud Agreement provides that
the CSP may change its SLAs from time to time but
must provide prior notice to the Clearing Agencies
before material reducing the benefits offered under
the SLAs. The Clearing Agencies have provided
Cloud Agreement in confidential Exhibit 3 to this
advance notice filing.
51 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Legal Review of
Third Party Vendor Contracts Policy, which (1)
defines the scope of Vendor Contracts, (2) clarifies
what agreements fall outside the scope and are
excluded from the definition of Vendor Contracts,
(3) details the process the Clearing Agencies follow
when receiving requests to review Vendor Contracts
and related materials from CPS Contracts, and (4)
establishes the requirements around the creation,
maintenance, update, review, and use of contract
templates and negotiation guidelines for third party
relationships. The Clearing Agencies have provided
this document in confidential Exhibit 3 to this
advance notice filing.
52 The FFIEC Guidance provides that the Clearing
Agencies may obtain SOC reports, other
independent audits, or ISO certification reports to
gain assurance that the CSP’s controls are operating
effectively. See FFIEC, Security in a Cloud
Computing Environment at 7. The Clearing
Agencies review the CSP’s SOC–2 on an annual
basis.
53 The CSP has certifications for the following
frameworks: NIST, Cloud Security Alliance, Control
Objectives for Information and Related Technology
(‘‘COBIT’’), ISO, and the Federal Information
Security Management Act (‘‘FISMA’’).
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
72135
To mitigate operational risk
associated with the concentration risk
from relying on a single CSP, the
Clearing Agencies would architect the
Cloud Infrastructure hosting their Core
C&S Systems to be highly resilient,
improving the availability of such
systems and related Clearing Agency
services during any degradation in CSP
services:
• Use of multiple availability zones
per region. The Clearing Agencies
would use at least three availability
zones, in each of the two CSP regions,
with each availability zone made up of
multiple data centers.
• Multi-regions. In the event of a
primary region outage, the Clearing
Agencies would recover in the
secondary region. Out-of-region
recovery would be tested annually by
the Clearing Agencies, and a primary/
secondary (i.e., hot/warm) model would
be used to ensure continuous data
replication and recovery is achieved.57
Recovery exercises of non-Core C&S
Systems currently hosted in cloud
demonstrate the ability to recover
applications within required recovery
time objectives, including meeting a 2hour recovery time objective for relevant
applications in the event of an out-ofregion recovery.
• Multi-node, high availability
clusters across availability zones.
Clusters (i.e., three or more servers or
nodes) protect against local hardware
and service failures providing
uninterrupted operations. Each cluster
would be distributed across three
availability zones. Clusters
synchronously replicate data across all
nodes to protect against data loss and
provide continuous availability.
• Static stability and static capacity
models. Static capacity would be preprovisioned for compute, storage, and
memory for applications based on
capacity stress testing results and
capacity requirements. The Clearing
Agencies would pre-provision capacity
needed for applications and services
and would not rely on capacity ondemand models, thus reducing the risk
of running out of capacity.
• Exit plans. The Clearing Agencies’
existing policies require that all
applications hosted in Cloud have
documented exit plans, with each plan
updated annually.58 The Clearing
Agencies’ Cloud architecture also
reduces ‘‘vendor lock-in’’ by using
capabilities such as ‘‘containers’’ 59 that
can exist in both the public and private
cloud, where appropriate and
applicable. For the foreseeable future,
the Clearing Agencies plan to continue
to own or lease private data center space
to host private cloud and mainframe
capabilities. The Clearing Agencies
private, on-premises data centers help
enable a long-term exit plan from Cloud,
if needed. However, such data centers
would not be a means to address a
short-term incident at the CSP.
Additionally, for the second CSP that
the Clearing Agencies already have
contracted and connected with for
hosting non-Core C&S Systems, they are
now working on the contractual and
operational requirements that would be
necessary to possibly host Core C&S
54 See Reg. SCI Addendum, Sections 8.1 Systems
Intrusion Notification and 4 Briefing Meetings. The
Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
55 Id.
56 See Reg. SCI Addendum, Sections 3 Customer
Right of Access and Audit and 4 Briefing Meetings.
The Clearing Agencies have provided this
document in confidential Exhibit 3 to this advance
notice filing.
57 See Reg. SCI Addendum, Section 5 Customer
Testing of CSP Systems. The Clearing Agencies
have provided this document in confidential
Exhibit 3 to this advance notice filing.
58 Supra note 29.
59 A container is a standard unit of software that
packages up code and all its dependencies, so the
application runs reliably from one computing
environment to another (e.g., public and private
clouds).
necessary for the Clearing Agencies to
satisfy certain compliance and
regulatory requirements, particularly
Reg. SCI. For example, the Cloud
Agreement obligates the CSP to provide
the Clearing Agencies with immediate
notification where a systems intrusion
by an unauthorized party or a systems
disruption is suspected.54 The
agreement also provides for detailed
quarterly briefing meetings between the
Clearing Agencies and the CSP, during
which the Clearing Agencies would be
provided information on and could
review service level performance,
material systems changes, capacity
management, SLA updates, and
important security notices.55
The Cloud Agreement permits the
Clearing Agencies to perform an annual
review of the CSP’s documentation and
services to gain comfort that the CSP is
meeting its contractual requirements
and that the notification procedures are
in place to allow the Clearing Agencies
to meet their regulatory requirements,
particularly Reg. SCI. The agreement
also allows a regulator of the Clearing
Agencies to receive information about
the Clearing Agencies’ usage of the CSP
services, and it allows the regulator to
perform its own on-site review, if
requested.56
2. Cloud Architecture
PO 00000
Frm 00258
Fmt 4703
Sfmt 4703
E:\FR\FM\04SEN1.SGM
04SEN1
72136
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
ddrumheller on DSK120RN23PROD with NOTICES1
Systems in its Cloud to further enable
exit plans from the primary CSP.
• Regional Isolation Architecture. A
cross-regional outage is highly unlikely
at the CSP, as the CSP has designed and
implemented a series of controls to
ensure that defects cannot be introduced
to more than a single region at a time.60
Services are regionally isolated with a
single exception—the IAM service. The
IAM service is not regionally isolated
and depends on a single region. If the
primary region for the IAM service fails,
the service will continue to operate but
as read-only. To mitigate this risk, the
Clearing Agencies would architect
applications and infrastructure services
in such a manner that they would not
require updates (i.e., writes) to the IAM
service in order to rotate out of region.
In summary, cloud architecture helps
mitigate operational risk borne from
concentration risk, as raised in Section
II.A.1, above, by providing resilient
infrastructure, scalable resources, robust
security measures, and disaster recovery
capabilities, all of which assist in
minimizing the impact of disruptions.
3. Standing Risk Management Practices
The Clearing Agencies’ standing risk
management practices also help
minimize operational risk by
systemically identifying, assessing,
mitigating, monitoring, and responding
to risk. For example, the Clearing
Agencies have considered the
possibility of the CSP being completely
and unexpectedly unavailable, whether
due to technical issues or other reasons.
The parallel risk exists today with
respect to the Clearing Agencies’
existing infrastructure. Just like with the
CSP, it is possible that the Clearing
Agencies’ two existing data centers—
one primary and one backup—become
completely and unexpectedly
unavailable. In fact, it is more likely that
those two data centers become
unavailable than the CSP’s data centers
because the CSP has so many more data
centers for each availability zone, in
both its primary and secondary regions,
with each data center, not just the
associated region or availability zone,
having its own physical infrastructure,
staff, power, backup power, mechanical
services, and network connectivity, as
discussed in Section I.B.2, above. Even
for the CSP’s IAM service that runs
cross regions, the applications in each
region operate off read-only versions of
the IAM roles and responsibilities, such
that loss of the primary would not affect
operation of those applications.
60 The CSP owns the control and has provided
documentation of the control to the Clearing
Agencies.
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
Nevertheless, to help manage a crisis
event, such as the Clearing Agencies’ or
the CSP’s data centers becoming
unavailable, the Clearing Agencies have
standing risk management plans and
practices already in place, as described
below.61
In the very unlikely event of an
unexpected single- or multi-region
outage in which the Clearing Agencies
operate, or a complete and unexpected
CSP outage, the Clearing Agencies
would initiate the existing Major
Incident Management (‘‘MIM’’) process,
which is an existing process that
involves evaluating the technical impact
of the event, and if the event is deemed
to have a material impact to the
business, the Business Incident
Management System (‘‘BIMS’’) 62 would
be activated. Depending on the severity
of the event, the DTCC Global Business
Continuity and Resilience (‘‘BCR’’)
Policy would provide a predictable
structure to be utilized during crises and
could be leveraged to address, respond
to, and manage an outage.63 In addition
to internal risk management practices,
the Clearing Agencies have plans to
help address various outage scenarios
and the potential effects of an outage.64
61 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the Operational Response
Capabilities Matrix. The Clearing Agencies have
provided these documents in confidential Exhibit 3
to this advance notice filing.
62 MIM is part of the IT organization that manages
technology specific incidents at the Clearing
Agencies that are typically resolved at the
application or hardware level with support from the
appropriate subject matter experts (‘‘SMEs’’).
Incidents that have a business impact are escalated
to BIMS and appropriate SMEs are added to manage
the impact, which includes Business Continuity
and Resilience. BIMS participants can request the
Crisis Management Team be activated if the
incident requires discussion or has escalated to a
potential disaster that may require a declaration of
disaster.
63 The Clearing Agencies are taking into
consideration the forthcoming requirements of
adopted and effective Rule 17ad–25(i) under the
Exchange Act, 17 CFR 240.17ad–25(i), and
anticipate that the Clearing Agencies’ approach in
managing the risk presented by a CSP outage for
Core C&S Systems would be consistent with those
requirements.
64 For example, there is an existing plan to
manage a Fedwire protracted outage. A Fedwire
protracted outage is an interruption or outage of
Federal Reserve Bank hardware or software that
prevents the bank from processing payment orders
online and that is not expected to be resolved before
the bank’s next Fedwire Funds Service Funds
Transfer Business Day. In the event of such an
outage, the Clearing Agencies will assess the
situation and employ, as needed and applicable, the
steps outlined in the BCR Policy and Standards, the
Federal Reserve Banks Operating Circulars (see,
e.g., Operating Circular No. 6, available at https://
www.frbservices.org/binaries/content/assets/
crsocms/resources/rules-regulations/070123operating-circular-6.pdf), and any other regulatory
guidance.
PO 00000
Frm 00259
Fmt 4703
Sfmt 4703
The BCR Policy and Standards is
structured to employ existing DTCC and
Clearing Agency teams and committees,
which become the tactical leadership to
react, respond, and manage a crisis
situation.65 The teams are comprised of
the following:
• Crisis Management Team.
Comprised of the Management
Committee, site General Managers, Head
of the Board Risk Committee,66 and
other SMEs, as needed.
• Crisis Response Teams.
Æ Business Continuity Coordinators
and Plan Approvers—These are
individuals who manage business
continuity at a plan level.
Æ Fair and Orderly Markets Groups—
These are crisis teams comprised of
internal stakeholders and top executives
from external firms deemed necessary to
ensure a fair and orderly market. They
would be activated (based on impact to
the legal entity) to gather information
during a large systemic event when
operational coordination is required
with clients and the sector.
Æ IT Management Team—Comprised
of Information Technology managing
directors and SMEs.
Æ Management Risk Committee—
Comprised of senior members across the
enterprise.
Æ Senior Site Management Team
(‘‘SSMT’’)—Each DTCC office with a
facility level resilience plan (‘‘FLRP’’)
has an SSMT, that is comprised of
senior leadership from the site.
Æ Site Assessment Team (‘‘SAT’’)—
Sites with an FLRP have a SAT that
responds to site-specific events. This
team is comprised of a primary/back-up
site General Manager and
representatives from BCR, IT,
Workplace Design and Service, Global
Security Management, and Human
Resources. A Data Center Services
representative also is added for sites
that have a data center.
65 The Clearing Agencies have established a list
of situations that are covered under the BCR Policy
and Standards, any of which could escalate to a
disaster and trigger use of the Standards. The
technology events include (i) infrastructure outage,
(ii) external hosting provider service outage, and
(iii) loss of logical access to a Clearing Agency
facility. The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the BCR Policy and
Standards which define the governance structure,
high-level roles and responsibilities, and the
framework for business continuity and resilience
processes at the Clearing Agencies. The Clearing
Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
66 The Board Risk Committee is a Board level
committee established by the Boards of the Clearing
Agencies to assist their respective Boards in
fulfilling their responsibilities for oversight of risk
management activities at the Clearing Agencies.
This includes oversight of credit, market, liquidity,
operational, and systemic risks.
E:\FR\FM\04SEN1.SGM
04SEN1
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
Æ MIM and BIMS Teams—Part of the
IT organization that manages technology
specific and are typically resolved at the
application or hardware level with
support from the appropriate SMEs.
• Crisis Communication Team. The
Crisis Communication Team is
comprised of officer-level members from
Marketing and Communication, Human
Resources, General Counsel’s Office,
and Regulatory Relations, as well as
members of their staffs, as applicable.
The Clearing Agencies believe that
these standing risk management
practices are key to managing the
operational risk borne from
concentration risk outlined in Section
II.A.1, above, by helping to promote
proactive risk management culture,
enhancing operational resilience, and
enabling the Clearing Agencies to better
navigate uncertainties and maintain
business continuity.
4. Industry Standards for Cloud
Management
i. Cloud Management: Federal Financial
Institutions Examination Council Cloud
Computing Guidance (‘‘FFIEC’’)
ddrumheller on DSK120RN23PROD with NOTICES1
On April 30, 2020, FFIEC 67 issued a
joint statement to address the use of
Cloud computing services and security
risk management principles in the
financial services sector (‘‘FFIEC
Guidance’’).68 While the FFIEC
Guidance does not contain regulatory
obligations, it highlights risk
management practices that financial
institutions should adopt for the safe
and sound use of Cloud computing
services in five broad areas (‘‘FFIEC Risk
Management Categories’’): Governance,
Cloud Security Management, Change
Management, Resilience and Recovery,
and Audit and Control Assessment. As
discussed below, the Clearing Agencies
would implement practices consistent
with the FFIEC Risk Management
Categories for Core C&S Systems
operated in Cloud to help address cloud
management risk, as highlighted in
Section II.A.2, above, by providing
frameworks, guidelines, and best
practices, that enhance transparency,
reliability, and security.
67 FFIEC is a formal interagency body empowered
to prescribe uniform principles, standards, and
report forms for the federal examination of financial
institutions by the Board of Governors of the
Federal Reserve System, the Federal Deposit
Insurance Corporation, the National Credit Union
Administration, the Office of the Comptroller of the
Currency, and the Consumer Financial Protection
Bureau, and to make recommendations to promote
uniformity in the supervision of financial
institutions.
68 Available at https://www.ffiec.gov/press/
pr043020.htm.
VerDate Sep<11>2014
00:10 Sep 04, 2024
Jkt 262001
(a) Governance
The Clearing Agencies and the CSP
rely on a shared responsibility model
that differentiates between security ‘‘of’’
the Cloud and security ‘‘in’’ the Cloud.69
This model is not specific to the
agreement between the Clearing
Agencies and the CSP; rather, it is a
more universally followed model for
public cloud services. Under the model,
the CSP maintains sole responsibility
and control over the security and
resiliency ‘‘of’’ the Cloud, and their
customers are responsible for the
security and resiliency ‘‘in’’ the Cloud
(i.e., security and resiliency of hosted
applications and data). This means that
the Clearing Agencies must manage
their own application architectures, data
backups, change management controls,
network configurations within
applications, and response to
application failures. In addition, the
Clearing Agencies must manage their
own data usage and data-at-rest
encryption configuration, IAM access
policies and roles, operating system
upkeep, security group configurations,
and network traffic encryption in transit
configurations. The Clearing Agencies
also manage how they place workloads
onto the CSP’s platform.
Meanwhile, the CSP must manage
backend hardware services for Compute,
Storage, Networking, database, and
global architectures such as regions,
availability zones, data centers, power,
and HVAC, as well as backend security
services that protect core
infrastructures. The CSP manages the
underlying infrastructure and upkeep,
so that the Clearing Agencies (and other
customers) can place workloads on the
CSP platform with proper security and
separation without having to manage
these traditional data center tasks. The
Clearing Agencies review the CSP’s
policies and procedures for these
functions during the quarterly reviews
and during annual risk assessments.
When looking more closely at
hardware management, the Clearing
Agencies believe there are benefits in
how the CSP manages hardware for
Cloud compared to how the Clearing
Agencies manage hardware for their
own data centers. For example, with onpremises data centers, the Clearing
Agencies must oversee a multifaceted
supply chain, involving many vendors
to obtain and administer physical
Compute, Storage, and Network
69 ‘‘Shared responsibility’’ conveys the
responsibility of the Clearing Agencies and the CSP
vis-à-vis each other from a business operations
perspective. It does not mean that the CSP has taken
on or that the Clearing Agencies have relinquished
any of their Reg. SCI compliance requirements.
PO 00000
Frm 00260
Fmt 4703
Sfmt 4703
72137
capacity. Delivery times may fluctuate,
and scarcities can affect project
outcomes, as seen during the Covid–19
pandemic. In contrast, with the
proposed Cloud Infrastructure, the CSP
controls the hardware supply chain and
even partakes in key areas of the
manufacturing process to circumvent
typical problems such as chip shortages.
Moreover, the Clearing Agencies get to
review the CSP’s equipment forecast for
each upcoming quarter, affording the
Clearing Agencies the opportunity to
address potential supply chain
difficulties, if any, without jeopardizing
their access to adequate capacity, by
leveraging capabilities such as reserved
capacity. Altogether, the Clearing
Agencies believe the CSP’s management
of Cloud hardware will be a benefit to
them.
The CSP would perform its own risk
and vulnerability assessments of the
CSP infrastructure on which the
Clearing Agencies would run their Core
C&S Systems. In published
documentation and in meetings
conducted with the CSP, the CSP asserts
that it maintains an industry-leading
automated test system, with strong
executive oversight, and conducts fullscope assessments of its hardware,
infrastructure, internal threats, and
application software. The CSP asserts
that it has an aggressive program for
conducting internal adversarial
assessments (‘‘Red Team’’) designed not
only to evaluate system security but also
the processes used to monitor and
defend its infrastructure. The CSP also
uses external, third-party assessments as
a cross-check against its own results and
to ensure that testing is conducted in an
independent fashion. Pursuant to the
CSP’s documentation, results of these
processes are reviewed weekly by the
CSP’s Chief Information Security Officer
and the Chief Executive Officer with
senior CSP leaders to discuss security
and action plans.70
The Clearing Agencies have the
responsibility to perform risk
assessments and technical security
testing, including control validation,
penetration testing, and adversarial
70 The CSP does not provide assessment results to
its customers, as doing so would constitute a breach
of generally accepted security best practices.
Instead, the CSP provides its customers with
industry-standard reports—such as SOC2 Type II—
prepared by an independent third-party auditor to
provide relevant contextual information to its
customers. The CSP also conducts periodic audit
meetings specifically designed to discuss security
concerns with its customers discussed later during
the ‘‘CSP Audit Symposium.’’ Additionally, the
Clearing Agencies have certain audit rights
(pursuant to Section 3 Customer Rights of Access
and Audit of the Reg. SCI Addendum) to review
information about the nature and scope of the CSP’s
vulnerability management program.
E:\FR\FM\04SEN1.SGM
04SEN1
72138
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
ddrumheller on DSK120RN23PROD with NOTICES1
testing of their applications running on
the Cloud Infrastructure. This includes
testing of the application interface layer
of some CSP provided services such as
storage and key management.
As mentioned, the Clearing Agencies’
testing includes assessing the
configuration of the CSP provided
services. The Clearing Agencies’
Technology Risk Management staff
would work with the Clearing Agencies’
Information Technology staff to ensure
that the CSP tools are configured to
appropriately manage and mitigate
potential sources of risk and will assess
the effectiveness of those
configurations.71 The Technology Risk
Management staff has developed an
application, Cloud Governance Insights
(‘‘CGI’’), to continuously monitor all
Cloud Infrastructure for alignment to
security baselines and configurations
best practices.72 The CGI dashboard
allows Information Technology and
Technology Risk Management staff to
understand the environment risk
posture and reporting of key risk
indicators (‘‘KRIs’’). The Clearing
Agencies’ Red Team would operate
freely ‘‘in the Cloud,’’ attempting to
subvert or circumvent controls.73 The
testing would include probing of the
CSP provided services to look for
weaknesses in the Clearing Agencies’
deployment of those tools.
Technology Risk Management staff
would routinely report test results to the
Technology Risk Management Steering
Committee and the Management Risk
Committee, appropriate functional
Operations and Information Technology
management, senior management, and
the Board of Directors of the Clearing
Agencies.74 75 Automated vulnerability
71 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the OTR TRM Core Process
Procedure—Security Configuration Violation Rules,
which is used to manage enterprise information
security risk by ensuring a consistent configuration
violation scoring process that provides timely
identification of configuration violations and their
severity ratings. The Clearing Agencies have
provided this document in confidential Exhibit 3 to
this advance notice filing.
72 CGI is the Clearing Agencies’ internally
developed solution to perform Cloud Security
Posture Management and assess Cloud
Infrastructure compliance against TRM Control
Standards and Security Baselines in near real-time.
73 Supra note 47.
74 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Information
Security—Information Security Management Policy
and Control Standards, which defines the roles,
responsibilities, and accountabilities for DTCC’s
security practices and organization structure suited
to protect DTCC’s critical systems and business
assets. Information Security Management evaluates
DTCC’s information security program’s overall
effectiveness, and establishes, maintains,
communicates, and periodically reassesses
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
scanning reports, source code analysis,
and results of specific assessments
would be risk-rated and assigned a
priority for remediation in accordance
with Clearing Agency Information
Security Program requirements.76 77
Management and oversight of the
Cloud implementation follows the
Clearing Agencies’ standard governing
principles for large information
technology projects.78 To maintain
accountability over the CSP’s
performance, regular reporting to the
Boards of the Clearing Agencies by
senior management is essential and
required, pursuant to the DTCC Third
Party Risk Procedures.79 Such reporting
helps ensure that senior management
takes appropriate actions to address
significant performance deterioration,
changing risks, or material issues
identified through ongoing monitoring,
thereby helping to ensure proactive risk
management and continuous
improvement.80 The Clearing Agencies’
Board of Directors has established a
Technology and Cyber Committee to
assist the Board of Directors in
overseeing information technology and
cybersecurity strategy and capabilities.
Information Technology and the
Enterprise Program Management Office
(‘‘EPMO’’) are responsible for the
identification, management, monitoring,
and reporting on the risks associated
with the modernization and migration
of applications to Cloud. To that end,
reports on the status and progress of
these efforts are reported to applicable
Clearing Agency committees based on
escalation criteria in the EPMO
Procedure.81 These reports include
overall risk and issue summaries and
analysis of key risk indicators for the
migration of applications to the public
cloud.
Finally, the Clearing Agencies’
Internal Audit Department (‘‘IAD’’), as
the independent third line of defense, is
responsible for assessing and
challenging the firm’s control
environment and risk management and
control frameworks, which include
those related to the Cloud, including,
but not limited to, security controls and
configurations, and report the results of
those assessments to management and
the Audit Committee of the Board.82
Ultimately, there is no primary/
secondary relationship, as the Clearing
Agencies and the CSP each have their
own set of responsibilities which, when
combined, address the entire risk space.
information security policies and a comprehensive
information security program that are approved by
management. The Clearing Agencies have provided
this document in confidential Exhibit 3 to this
advance notice filing.
75 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Information
Security—Risk Management Policy and Control
Standards, which provides (i) requirements for
establishing, implementing, maintaining, and
continually improving the information risk
management program, (ii) a governance structure
utilized for the escalation of information risks to an
appropriate management level, and (iii)
organizational roles and responsibilities for the
delivery of comprehensive information security and
technology risk management program. The Clearing
Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
76 Supra note 46.
77 Supra note 47.
78 Supra note 32.
79 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Third Party Risk
Procedures, which establish the standards and
practices to be used by certain business line
departments and/or functional units to manage the
potential risks associated with engaging with an
external service provider. The Clearing Agencies
have provided these documents in confidential
Exhibit 3 to this advance notice filing.
80 Supra note 62.
81 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the Enterprise Program
Management Office Procedure, which outlines the
minimum standards and practices the Clearing
Agencies use to manage, measure, and monitor the
performance of key processes aligned to the
Enterprise Program Management Office Policy. The
Clearing Agencies have provided these documents
in confidential Exhibit 3 to this advance notice
filing.
82 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the Internal Audit
Department Policies and Procedures, which
contains the policies and guidance that direct the
activities of the Clearing Agencies’ IAD. The
Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
83 Supra notes 46–47, 73–74.
84 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Information
Security—Asset Security Policy and Control
Standards, which governs management of security
for the information assets of the Clearing Agencies.
The Clearing Agencies have provided this
document in confidential Exhibit 3 to this advance
notice filing.
85 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Information
Security—Monitoring and Incident Management
Policy and Control Standards, which governs
PO 00000
Frm 00261
Fmt 4703
Sfmt 4703
(b) Cloud Security Management
The Clearing Agencies have
established a robust Cloud security
program to (i) manage the security of the
Core C&S Systems that would be
running on the Cloud Infrastructure
hosted by the CSP, and (ii) assess and
monitor the CSP management of
security of the Cloud Infrastructure that
it operates. The security program is built
upon Clearing Agency Information
Security Policies and Control Standards
that establish requirements that apply to
any technology system as well as any
tool that provides technology
services.83 84 85 86 Below describes
E:\FR\FM\04SEN1.SGM
04SEN1
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
elements of the Clearing Agencies’
Cloud security management in the areas
of (i) IAM controls (i.e., determining
who is accessing the systems, granting
access to the applications, and then
controlling what information they can
access); (ii) security governance and
controls for sensitive data; (iii) security
configuration, provisioning, logging,
and monitoring; and (iv) security
testing.
(1) Network and IAM Controls
ddrumheller on DSK120RN23PROD with NOTICES1
The Clearing Agencies recognize that
robust network security configuration
and IAM would provide reasonable
assurance that users—including
Clearing Agency employees, market
participants, and service accounts for
systems 87—are granted least-privileged
access 88 to the network, applications,
and data in the Cloud. The Clearing
Agencies would use third-party tools to
automate appropriate role-based access
to the Core C&S Systems running in the
Cloud. By enforcing strict separation of
duties and least-privileged access for
infrastructure, applications, and data,
the Clearing Agencies would protect the
confidentiality, availability, and
integrity of the data in the Cloud.
The Clearing Agencies have
established IAM requirements that build
upon the least-privileged model.89 As
part of the IAM program, all users must
be assigned an appropriate enterprise
identification. Additionally, the
Clearing Agencies have established
Highly Privileged Access Management
capabilities and policies to further
restrict highly privileged access to be
used only in pre-determined scenarios
DTCC’s information security monitoring and
incident management and specifies requirements
for (i) detecting unauthorized information
processing activities, (ii) ensuring information
security events and weaknesses associated with
information systems are communicated in a manner
allowing timely corrective action to be taken, and
(iii) ensuring a consistent and effective approach is
applied to the management of information security
incidents. The Clearing Agencies have provided
this document in confidential Exhibit 3 to this
advance notice filing.
86 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Information
Security—Asset Access Control Policy and
Standards, which governs management of security
for the information assets of the DTCC and its
subsidiaries. The Clearing Agencies have provided
this document in confidential Exhibit 3 to this
advance notice filing.
87 Service accounts are non-interactive accounts
that permit application access to support activities
such as monitoring, logging, or backup. Service
accounts are also used for machine-to-machine
communications.
88 Least-privileged access means users only have
the permission needed to perform their work, and
no more.
89 Supra note 85.
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
that must be tied to a change, incident,
request, or release records.90
Cloud users would be granted access
to systems via a standardized and
auditable approval process. The user
identifications and granted access
would be managed through their full
lifecycle from a centralized IAM system
maintained and administered by the
Clearing Agencies. Role-, attribute-, and
context-based access controls would be
used as defined by internal standards 91
consistent with industry recommended
practices to promote the principles of
least-privileged access and separation of
duties.92
The Clearing Agencies would use and
manage third-party tools not otherwise
provided by nor managed by the CSP for
single sign-on and least-privileged
access.93 The network also would
include hardware and software to limit
and monitor ingress and egress traffic,
encrypt data in transmission, and isolate
traffic between the Clearing Agencies
and the Cloud.94 Since the Clearing
Agencies would continue to provide
cryptographic services, including key
management, the CSP and other
network service providers would not be
able to decrypt Clearing Agency data
either at rest or while in transit.
(2) Security Governance and Controls
for Sensitive Data
The Clearing Agencies’ data
governance framework that would apply
to Cloud implementation is identified
within the Clearing Agency Information
Security Policies and Control
Standards.95 The Clearing Agency
Information Security Policies and
Control Standards address data moving
between systems within the Cloud as
well as data transiting and traversing
both trusted and untrusted networks.
For example, the Clearing Agencies’
Information Security Policies and
Control Standards require a system or
Software as a Service (i.e., SaaS) to (i)
90 Id.
91 Id.
92 (1) ISO/IEC 27002:2013—Information
technology—Security techniques—Code of practice
for information security controls; (2) NIST
Cybersecurity Framework (CSF) Version 1.1; (3)
NIST Special Publication 800–53 Revision 4—
Security and Privacy Controls for Federal
Information Systems and Organizations.
93 For example, the Clearing Agencies currently
use Bravura Security Privileged Access
Management (a/k/a PAM) for highly privileged
access management.
94 Supra notes 47, 84–85.
95 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Data Risk
Management Policy, which establishes
requirements for the sound management of data risk
across the data lifecycle. The Clearing Agencies
have provided this document in confidential
Exhibit 3 to this advance notice filing.
PO 00000
Frm 00262
Fmt 4703
Sfmt 4703
72139
store data and information, including all
copies of data and information in the
system, in the U.S., throughout its
lifecycle; (ii) be able to retrieve and
access the data and information
throughout its lifecycle; (iii) for data in
the system hosted in the Cloud, encrypt
such data with key pairs kept and
owned by the Clearing Agencies; (iv)
comply with U.S. federal and applicable
state data regulations regarding data
location; and (v) enable secure
disposition of non-records in
accordance with the Clearing Agencies’
Information Governance Policy.96
Furthermore, the Clearing Agencies’
policies establish the overall data
governance framework applied to the
management, use, and governance of
Clearing Agency information to include
digital instantiations, storage media, or
whether the information is located,
processed, stored, or transmitted on the
Clearing Agencies’ information systems
and networks; public, private, or hybrid
cloud infrastructures; third-party data
centers and data repositories; or SaaS
applications.97 The Information
Classification and Handling Policy 98
classifies the Clearing Agencies’
information into categories. System
owners of technology that enable
classification and/or labeling of
information are responsible for ensuring
the correct classification level is
designated in the system of record and
the applicable controls are enforced. All
information requiring disposal is
required to be disposed of securely in
accordance with all applicable
procedures. Sensitive data must be
handled in a manner consistent with
requirements in the Information
Classification and Handling Policy.
The Clearing Agencies would
implement key security components,
namely ubiquitous authentication, and
encryption via use of an automated
public key infrastructure, coupled with
responsive, highly available
authentication, authorization tools, and
key management strategies to ensure
appropriate industry standard security
controls are in place for sensitive data
both in transit to and at rest in Cloud.99
External connectivity to the Clearing
Agencies’ systems hosted by the CSP
would be provided, as it is now, through
dedicated private circuits or over
encrypted tunnels through the internet.
These network links also would have
additional security controls, including
encryption during transmission and
restrictions on network access to and
96 Supra
note 85.
note 46.
98 Supra note 83.
99 Supra note 47.
97 Supra
E:\FR\FM\04SEN1.SGM
04SEN1
72140
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
from the Cloud. Additionally, the
Clearing Agencies would use dedicated
redundant private network connections
between the Clearing Agencies data
centers and the CSP infrastructure. The
Clearing Agencies currently maintains
two data centers and will do so in the
near term to provide redundant,
geographically diverse connectivity for
market participants.
All network communications between
the Clearing Agencies and the Cloud
Infrastructure would rely on industry
standard encryption for traffic while in
transit. Data at rest would be
safeguarded through pervasive
encryption. The Clearing Agencies’
Encryption Standards 100 describe
requirements for implementation of the
minimum required strengths,
encryption at rest, and cryptographic
algorithms approved for use in
cryptographic technology deployments
across the Clearing Agencies. All
Clearing Agency identifying data is
encrypted in transit using industry
standard methods. The Key
Management Service (‘‘KMS’’)
Strategy 101 dictates that all CSP
endpoints support HTTPS for
encrypting data in transit. The Clearing
Agencies also secure connections to the
endpoint service by using virtual private
computer endpoints and ensures client
applications are properly configured to
ensure encapsulation between
minimum and maximum Transport
Layer Security versions pursuant to the
Clearing Agencies’ encryption standard.
The Clearing Agencies would have
exclusive control over the encryption
keys; only Clearing Agency authorized
users and approved third parties would
be able to access Clearing Agency data.
The CSP systems and staff would not
have access to the Clearing Agencies’
certificates or keys.102 The Clearing
Agencies would be responsible for the
application architecture, software,
configuration, and use of the CSP
services, and for the maintenance of the
environment, including ongoing
monitoring of the application
environment to achieve the appropriate
security posture. To do this, the
Clearing Agencies would follow (i)
existing security design and controls;
100 Supra
note 91.
Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Information
Security—Public Key Infrastructure Policy and
Control Standards, which governs the public key
infrastructures implemented and used within DTCC
and its subsidiaries. The Clearing Agencies have
provided this document in confidential Exhibit 3 to
this advance notice filing.
102 Certificate management is the process of
creating, monitoring, and handling digital keys
(certificates) to encrypt communications.
ddrumheller on DSK120RN23PROD with NOTICES1
101 The
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
(ii) Cloud-specific information security
controls defined in the Clearing
Agencies’ Information Security Policies
and Control Standards; 103 and (iii)
regulatory compliance requirements
detailed in sources or information
technology practices that are widely
available and issued by an authoritative
body that is a U.S. governmental entity
or agency including NIST–CSF,104
COBIT,105 and the FFIEC Guidelines.106
The Clearing Agencies would use
third-party and custom developed tools
for CSP security compliance monitoring,
security scanning, and reporting. Alerts
and all API-level actions would be
gathered using both CSP provided,
Clearing Agency developed, and thirdparty monitoring tools. The CSP
provided monitoring tool would be
enabled by default at the organization
level to monitor all CSP services
activity. Centralized logging provides
near real-time analysis of events and
contains information about all aspects of
user and role management, detection of
unauthorized, security relevant
configuration changes, and inbound and
outbound communication.
As discussed just above, the Clearing
Agencies would use a KMS Strategy to
encrypt data in transit and at rest in the
Cloud. KMS is designed so that no one,
including CSP employees, can retrieve
customer plaintext keys and use them.
The Federal Information Processing
Standards 140–2 validated Host
Security Modules (‘‘HSMs’’) in KMS
protect the confidentiality and integrity
of Clearing Agency customer keys.107
Customer plaintext keys are not written
to disk and are only used in protected,
volatile memory of the HSMs for the
time needed to perform the customer’s
requested cryptographic operation. KMS
keys are not transmitted outside of
Cloud regions in which they were
created. Updates to the KMS HSM
firmware will be controlled by quorumbased access control 108 that is audited
and reviewed by an independent group
within the CSP.
(3) Security Configuration, Provisioning,
Logging, and Monitoring
Automated delivery of business and
security capability via the use of
‘‘Infrastructure as Code’’ and continuous
103 Supra
note 91.
Cybersecurity Framework Version 1.1.
105 COBIT 2019 Framework: Governance and
Management Objectives.
106 FFIEC Information Technology Examination
Handbook—Information Security (September 2016).
107 The HSM is analogous to a safe to which only
the Clearing Agencies have the combination and the
ability to access the keys to locks stored within.
108 A quorum-based access mechanism requires
multiple users to provide credentials over a fixed
period in order to obtain access.
104 NIST
PO 00000
Frm 00263
Fmt 4703
Sfmt 4703
integration/continuous deployment
pipeline methods would permit security
controls to be consistently and
transparently deployed on-demand. The
Clearing Agencies would provision
Cloud Infrastructure using preestablished system configurations that
are deployed through Infrastructure as
Code, then scanned for compliance to
secure baseline configuration standards.
The Clearing Agencies also would
employ continuous configuration
monitoring and periodic vulnerability
scanning. The Clearing Agencies would
perform regular reviews and testing of
Clearing Agency systems running in
Cloud while relying upon information
provided by the CSP through the CSP’s
SOC2 and Audit Symposiums. Finally,
configuration, security incident, and
event monitoring would rely on a blend
of CSP native and third-party solutions.
The Clearing Agencies also plan to
use tools offered by the CSP, developed
by the Clearing Agencies, and third
parties to monitor the Core C&S Systems
running in Cloud. The Clearing
Agencies would track metrics, monitor
log files, set alarms, and have the ability
to act on changes to Core C&S Systems
and the environment in which they
operate. The CSP would provide a
dashboard to reflect-general health (e.g.,
up/down status of a region and CSP
provided services running in that
region) but would not give additional
insights into performance of services
and applications which run on those
services. The Clearing Agencies’
centralized logging system would
provide for a single frame of reference
for log aggregation, access, and
workflow management by ingesting the
CSP’s logs coming from native detective
tools and the Clearing Agencies’
instrumented controls for logging,
monitoring, and vulnerability
management. This instrumentation
would give the Clearing Agencies a realtime view into the availability of Cloud
services as well as the ability to track
historical data. By using the enterprise
monitoring tools that the Clearing
Agencies have in place, the Clearing
Agencies would be able to integrate the
availability and capacity management of
Cloud into the Clearing Agencies’
existing processes, hosted in Cloud, to
respond to issues in a timely manner.
The Clearing Agencies also would use
specialized third-party tools, as
discussed just above, to
programmatically configure Cloud
services and securely deploy
infrastructure. This automation of
configuration and deployment would
help ensure that Cloud services are
repeatably and consistently configured
securely and validated. Change
E:\FR\FM\04SEN1.SGM
04SEN1
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
detection tools providing event logs into
the incident management system also
are vital for reacting to and investigating
unexpected changes to the environment.
The Clearing Agencies would
implement tools for the Core C&S
Systems and back-office environments
that would be hosted on the Cloud
Infrastructure, notably, IAM, monitoring
and Security Information and Event
Management systems, the workflow
system of record for incident handling,
KMS, and enterprise Data Loss
Prevention.
Finally, the CSP prioritizes assurance
programs and certifications,
underscoring its ability to comply with
financial services regulations and
standards and to provide the Clearing
Agencies with a secure Cloud
Infrastructure.109
ddrumheller on DSK120RN23PROD with NOTICES1
(4) Security Testing and Verification
Security testing is integrated into
business-as-usual processes as outlined
in relevant policy and procedures.110
These documents define how testing is
initiated, executed, and tracked.
For new assets and application (or
code) releases, Technology Risk
Management determines whether and
what type of security testing is required
through a risk-based analysis.111 If
required, testing would be conducted
prior to implementation. The different
testing techniques are outlined below:
• Automated Security Testing. Using
industry standard security testing tools
and/or other security engineering
techniques specifically configured for
each test, the Clearing Agencies would
test to identify vulnerabilities and
deliver payloads with the intent to
break, change, or gain access to
unauthorized areas within an
application, data, or system.
• Manual Penetration Testing. Using
information gathered from automated
testing and/or other information
sources, the Clearing Agencies would
manually test to identify vulnerabilities
and deliver payloads with the intent to
break, change, or gain access to the
unauthorized area within an application
or system.
• Blue Team Testing. The Blue Team
identifies security threats and risks in
the operating environment and analyzes
the network, system, and SaaS
environments and their current state of
security readiness. Blue Team
assessment results guide risk mitigation
and remediation, validate the
109 The CSP has certifications for the following
frameworks: NIST, Cloud Security Alliance, COBIT,
ISO, and FISMA.
110 Supra note 46.
111 Supra note 30.
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
effectiveness of controls, and provide
evidence to support authorization or
approval decisions. Blue Team testing
ensures that the Clearing Agencies’
networks, systems, and SaaS solutions
are as secure as possible before
deploying to a production environment.
The results of the Clearing Agencies’
security controls testing are risk-rated
and managed to remediation via two
separate control standards.112
(c) Change Management: Software
Development and Release Process
Consistent with FFIEC Guidance, the
Clearing Agencies’ use of Cloud would
have sufficient change management
controls in place to effectively transition
systems and information assets to Cloud
and would help ensure the security and
reliability of applications in Cloud.113
The Clearing Agencies’ enterprise
software development lifecycle
processes 114 would help ensure the
same control environment for all
Clearing Agency resources. The Clearing
Agencies would establish baselines for
design inputs and control requirements
and enforce workload isolation and
segregation through Cloud using
existing Cloud native technical controls
and added new tools. The Clearing
Agencies also would plan to use other
specialized platform monitoring tools
for logging, scanning of configuration,
and systems process scanning. The
Clearing Agencies also would have
oversight as the code owner and would
have final review and approval for
related changes and code merges before
deployment into production. Finally,
the Clearing Agencies would
periodically conduct static code
scanning and perform vulnerability
scanning for external dependencies
prior to deployment in production,
along with manual penetration testing of
the provided application code. In
addition, the Clearing Agencies would
perform routine scans of Compute
resources with the existing enterprise
scanning tools. Any identified
vulnerabilities would be reviewed for
severity, prioritized, and logged for
remediation tracking in upcoming
development releases.
The Clearing Agencies would create a
‘‘user acceptance plan’’ prior to
promoting code to Cloud production.
This user acceptance plan would
include tests of all major functions,
processes, and interfacing systems, as
well as security tests. Through
acceptance tests, the Clearing Agencies’
users would be able to simulate
notes 46–47.
113 Supra note 30.
114 Id.
Frm 00264
Fmt 4703
complete application functionality of
the live environment. The change would
move to the next stage of the Clearing
Agencies’ delivery model only after
satisfying the criteria for this phase.115
The Clearing Agencies would have
internal projects that would address
change management of the various
applications and services. In particular,
the Clearing Agencies would run a suite
of supporting services that enable
building, running, scaling, and
monitoring of the Clearing Agencies’
business applications in Cloud, in an
automated, resilient, and secure
manner.116 The application platform
relies on various CSP and third-party
tools for different components,
including IaaS, Infrastructure as Code,
CI/CD, Container as a Service,
Continuous Delivery, and Platform
Monitoring.
With respect to software development
in Cloud, the Clearing Agencies would
establish a closed, non-production
Cloud environment that would enable
the Clearing Agencies to develop, test,
and integrate new capabilities,
including those related to security
capabilities. This non-production Cloud
environment would focus on the
foundational security, operations, and
infrastructure requirements with the
intent to take lessons learned to
implement into future production. The
Clearing Agencies would maintain a
Cloud Reference Architecture that
defines necessary capabilities and
controls required to securely host Core
C&S Systems. The minimum
foundational security requirements
would be based on the NIST–CSF and
CIS benchmarks and include the design
and implementation requirements of a
secure Cloud account structure within a
multi-region Cloud environment. The
Clearing Agencies would maintain
enterprise security requirements that
provide structure for current and future
development. As the Cloud
environment is further developed and
expanded, there would be a
comprehensive process to identify any
incremental risks and develop and
implement controls to manage and
mitigate those risks.
(d) Resilience and Recovery
As noted earlier, given the Clearing
Agencies’ roles as systemically
important financial market utilities, it is
vital that operations moved to the Cloud
have appropriately robust resilience and
recovery capabilities. As discussed in
115 The ‘‘user acceptance plan’’ represents only
one aspect of the overall change management
program at the Clearing Agencies.
116 Supra note 30.
112 Supra
PO 00000
72141
Sfmt 4703
E:\FR\FM\04SEN1.SGM
04SEN1
72142
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
Section II.B.ii.2, above, the Cloud
Infrastructure would be architected to
include (i) two autonomous and
geographically diverse regions; (ii) three
availability zones per region, with each
availability zone comprised of multiple
data centers; (iii) multi-node, high
availability clusters across each
availability zone; (iv) static stability and
static capacity models; and (v) regional
isolation, all to help ensure the
persistent availability of Compute,
Storage, and Network capabilities in
Cloud.
Additionally, the CSP’s practice in
deploying service updates to Cloud
would help ensure that the
consequences of any incidents would be
limited to the fullest extent possible.117
The CSP achieves this by (i) fully
automating the build and deployment
process and (ii) deploying services to
production in a phased manner.
CSP service updates are first deployed
to cells, which minimizes the chance
that a disruption from a service update
in one cell would disrupt other cells.
Following a successful cell-based
deployment, service updates are next
deployed to a specific availability zone,
which limits any potential disruption to
that zone. Following a successful
availability zone deployment, service
updates are then deployed in a staged
manner to other availability zones,
starting with the same region and later
within other regions until the process is
complete.
The Clearing Agencies would meet
regularly with the CSP, in addition to
formal quarterly briefing meetings with
the CSP, as described in the Reg. SCI
Addendum.118 The informal discussions
and quarterly briefing meetings would
permit the Clearing Agencies to gather
information in advance of the quarterly
systems change report. Most reportable
systems changes would continue to
occur based on changes to Compute,
Storage, Network, or applications
controlled by the Clearing Agencies.
ddrumheller on DSK120RN23PROD with NOTICES1
(e) Audit Controls and Assessment
The Clearing Agencies would
regularly test security controls and
configurations, including by monitoring
the CSP’s technical, administrative, and
physical security controls that support
the Clearing Agencies’ systems in the
Cloud Infrastructure.
117 The Clearing Agencies would continue to
retain responsibility for patching, configuration,
and monitoring of the operating systems and
applications in Cloud.
118 See Reg. SCI Addendum, Section 4 Briefing
Meetings. The Clearing Agencies have provided this
document in confidential Exhibit 3 to this advance
notice filing.
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
(1) Internal Risk Assessments
As part of their existing third-party
vendor risk activities, the Clearing
Agencies’ Third-Party Risk department
(‘‘TPR’’) would assess the operational
risks of the CSP as a critical vendor
annually.119 120 121 Additionally, as a
critical vendor, the CSP is subject to
heightened risk management
requirements, as defined in the DTCC
Third Party Risk CriticalPlus Program
Procedures,122 which include an
executive sponsor that must be at the
Managing Director level or higher,
documented annual meetings, quarterly
reporting, and monthly notifications.
Issues rated moderate or above, negative
news, performance concerns or
remediations are directly escalated to
the Management Risk Committee
monthly.123
(2) Internal Audit Department
As mentioned in Section II.B.ii.4.(a),
above, the Clearing Agencies’ IAD, as
the third line of defense, is independent
from the Clearing Agencies’ business
lines, support areas, and controls
functions, and promotes resiliency and
security through the assessment of risk
management and control frameworks to
raise awareness of control risks and
changes for improving controls and
governance processes.
119 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Third Party Risk
Governance & Monitoring Procedures, which
describes the minimum requirements for practices
and standards to be used by business owners to
monitor and manage third party relationships for
DTCC and its subsidiaries. The Clearing Agencies
have provided this document in confidential
Exhibit 3 to this advance notice filing.
120 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Third Party Risk
Policy and the DTCC Third Party Risk Procedures,
which establish the standards and practices to be
used by certain business line departments and/or
functional units to manage the potential risks
associated with engaging with an external service
provider. The Clearing Agencies have provided
these documents in confidential Exhibit 3 to this
advance notice filing.
121 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the Third Party Risk—
Technology and Resilience Procedure, which
supplements the ‘‘DTCC Third Party Risk Policy’’,
‘‘DTCC Third Party Risk Procedures’’, and ‘‘DTCC
Third Party Risk Governance and Monitoring
Procedures’’ and covers the following: standard
technology risk assessments (e.g., due diligence),
fourth party reviews, NYDFS cyber security
assessments, and onsite assessments. The Clearing
Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
122 The Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the DTCC Third Party Risk
CriticalPlus Program Procedures. The Clearing
Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
123 Supra note 62.
PO 00000
Frm 00265
Fmt 4703
Sfmt 4703
IAD assesses the risks of the Clearing
Agencies, at least annually, as part of
the development of the risk-based audit
plan, which is reviewed and refreshed,
as needed, on a quarterly basis.124 The
development of the audit plan includes
the consideration of IADs risk
assessment results, which informs cycle
coverage requirements for Cloud.
Additional considerations include, but
are not limited to, regulatory
requirements and expectations,
initiatives, and institutional and
industry risk trends, including risks
associated with technology and cloudbased processes.
IAD’s specific reviews of Cloud
Infrastructure have not identified any
material deficiencies and the scope of
the reviews have included, but are not
limited to, consideration of governance
and oversight, contagion risk and logical
separation, access management, security
configuration and monitoring,
concentration risk, exit strategy,
business continuity and disaster
recovery. IAD also has assessed the
design of controls for a cloud platform
scheduled for use in 2024 and is
proposing a Cloud Security audit for
2024.125
(3) Key Risk and Key Performance
Indicators 126
The Clearing Agencies have
established processes to evaluate the
Clearing Agencies’ management of
CSPs. Cloud vendors are rated through
a quarterly TPR survey. If a survey
results in a poor rating, then it is
reported to the Management Risk
Committee (‘‘MRC’’).127 TPR is
responsible for the timely reporting and
escalation of third-party risks. On a
regular basis, TPR will review all active
assessments to identify any high risks or
potential issues that may require further
discussion or escalation to senior
management, Corporate Procurement
Services (‘‘CPS’’), or internal
stakeholders. The DTCC Third Party
Risk Procedures provide a list of events
that must be presented to the MRC.128
The Clearing Agencies have
developed key performance indicators
(‘‘KPIs’’) for Cloud and socialized these
KPIs internally. The KRIs already exist
for Core C&S Systems and are aligned to
overall systems availability, capacity,
124 Supra
note 81.
Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the Clearing Agencies’ Cloud
Platform Internal Audit Report. The Clearing
Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
126 Supra note 62.
127 Supra note 119.
128 Supra note 78.
125 The
E:\FR\FM\04SEN1.SGM
04SEN1
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
data integrity, and security.129 The CSP
KPIs would feed into existing KRIs and
would be used to evaluate the CSP’s
performance after Cloud
implementation. KPIs would be added
to monitor the performance and risks of
the CSP services for which the Clearing
Agencies have contracted. These postCloud implementation KRIs and KPIs
would allow the Clearing Agencies to
assess their ongoing use of the CSP
against their operational and security
requirements and would help
demonstrate the effectiveness of risk
controls and the CSP’s performance
against commitments in the SLAs, and
will be reported on a regular basis to the
Clearing Agencies’ Management
Committee, Board of Directors, and
Technology and Risk Committees of the
Board of Directors.
(4) Auditing the CSP and Access
Rights 130
The CSP hosts an annual Audit
Symposium. The Cloud Agreement
gives the Clearing Agencies the right to
attend the symposium so that the
Clearing Agencies may inspect and
verify evidence of the design and
effectiveness of the CSP’s control
environment.131 The CSP also hosts an
annual Cloud security conference
focused on security, governance, risk
and compliance, which the Clearing
Agencies would attend. Through
preparation for and attendance at these
events, the Clearing Agencies could
provide feedback and make requests of
the CSP for future modifications of its
control environment.
The Clearing Agencies’ Information
Technology staff currently meets with
CSP representatives weekly to focus on
technical issues related to the Clearing
Agencies’ proposed Cloud environment.
As required under the Cloud
Agreement, the Clearing Agencies hold
quarterly compliance briefings with the
CSP, wherein the Clearing Agencies
receive information, including any
necessary documentation, from the CSP
to help assure the Clearing Agencies
that the CSP is meeting its
obligations.132 The information
provided includes updates to services
and SLAs, CSP performance, and details
that help the Clearing Agencies meet
ddrumheller on DSK120RN23PROD with NOTICES1
129 The
Clearing Agencies have separately
submitted a request for confidential treatment to the
Commission regarding the IT–Q4 2023 Risk
Tolerance. The Clearing Agencies have provided
this document in confidential Exhibit 3 to this
advance notice filing.
130 Supra note 62.
131 See Reg. SCI Addendum, Section 3 Customer
Right of Access and Audit. The Clearing Agencies
have provided this document in confidential
Exhibit 3 to this advance notice filing.
132 Supra note 117.
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
their reporting obligations under
Section 1003(a)(1) of Reg. SCI. The
Clearing Agencies’ management,
including Security, Information
Technology, TPR, and the Internal
Audit Department, coordinate to ensure
appropriate representation during such
briefings. The CSP is required under
Cloud Agreement to maintain records
showing its compliance with the
agreements for a period of five years.133
The CSP would be required to
maintain an information security
program, including controls and
certifications, that is as protective as the
program evidenced by the CSP’s SOC–
2 report. The CSP must make available
on demand to the Clearing Agencies its
SOC–2 report as well as the CSP’s other
certifications from accreditation bodies
and information on its alignment with
various frameworks, including NIST–
CSF, and ISO.134
As part of the annual risk assessment
of the CSP, TPR collects risk and control
related assurance documents from the
CSP and coordinates review with the
Clearing Agencies’ respective subject
matters specialists. TPR, Security, and
Business Continuity would determine
the adequacy and reasonableness of the
documentation received to complete the
Third-Party Risk Assessment. Finally,
the Cloud Agreement provides that the
Clearing Agencies’ and their regulators
may visit the facilities of the CSP under
specified conditions. TPR would help
coordinate bi-annual visits of the data
centers.135
The Clearing Agencies plan to use the
CSP’s services combined with
additional third-party tools to monitor
systems deployed by ingesting logs into
a security incident and event
monitoring tool to provide a ‘‘single
133 See Reg. SCI Addendum, Section 7.3 CSP
Records. The Clearing Agencies have provided this
document in confidential Exhibit 3 to this advance
notice filing.
134 The FFIEC Guidance provides that the
Clearing Agencies may obtain SOC reports, other
independent audits, or ISO certification reports to
gain assurance that the CSP’s controls are operating
effectively. See FFIEC, Security in a Cloud
Computing Environment, at 7. The Clearing
Agencies review the CSP’s SOC–2 on an annual
basis. See Reg. SCI Addendum, Section 2 CSP
Information Security Program. The SOC reports,
along with other artifacts showing compliance with
these sections, are available to the Clearing
Agencies on demand. In addition, during each
Briefing Meeting (See Reg. SCI Addendum Section
4 Briefing Meetings), updates are provided on any
material changes to certification standards, policies,
procedures, controls or security standards at the
CSP. The Clearing Agencies have provided this
document in confidential Exhibit 3 to this advance
notice filing.
135 See Reg. SCI Addendum, Sections 3 Customer
Right of Access and Audit and 9 Regulatory
Supervision. The Clearing Agencies have provided
this document in confidential Exhibit 3 to this
advance notice filing.
PO 00000
Frm 00266
Fmt 4703
Sfmt 4703
72143
pane of glass’’ view into the Cloud
Infrastructure. When incidents are
detected, the Clearing Agencies would
follow their existing incident response
governance to identify, detect, contain,
eradicate, and recover from incidents.
III. Consistency With the Clearing
Supervision Act
The stated purpose of the Clearing
Supervision Act is to mitigate systemic
risk in the financial system and promote
financial stability by, among other
things, promoting uniform risk
management standards for systemically
important financial market utilities and
strengthening the liquidity of
systemically important financial market
utilities.136 Section 805(a)(2) of the
Clearing Supervision Act 137 also
authorizes the Commission to prescribe
risk management standards for the
payment, clearing and settlement
activities of designated clearing entities,
like the Clearing Agencies, for which
the Commission is the supervisory
agency. Section 805(b) of the Clearing
Supervision Act 138 states that the
objectives and principles for risk
management standards prescribed under
Section 805(a) shall be to:
• promote robust risk management;
• promote safety and soundness;
• reduce systemic risks; and
• support the stability of the broader
financial system.
The Commission adopted Rule 17ad–
22 under Section 805(a)(2) of the
Clearing Supervision Act and the
Exchange Act in furtherance of these
objectives and principles.139 Rule 17ad–
22 under the Exchange requires covered
clearing agencies, like the Clearing
Agencies, to establish, implement,
maintain, and enforce written policies
and procedures that are reasonably
designed to meet certain minimum
requirements for their operations and
risk management practices on an
ongoing basis.140
The Clearing Agencies believe that the
Cloud Proposal is consistent with
Section 805(b)(1) of the Clearing
Supervision Act 141 and the
requirements of Rules 17ad–22(e)(17)(ii)
under the Exchange Act.142
136 12
U.S.C. 5461(b).
U.S.C. 5464(a)(2).
138 12 U.S.C. 5464(b).
139 17 CFR 240.17ad–22. Exchange Act Release
Nos. 68080 (October 22, 2012), 77 FR 66220
(November 2, 2012) (S7–08–11) (Clearing Agency
Standards); 78961 (September 28, 2016), 81 FR
70786 (October 13, 2016) (S7–03–14) (Standards for
Covered Clearing Agencies).
140 17 CFR 240.17ad–22.
141 12 U.S.C. 5464(b)(1).
142 17 CFR 240.17ad–22(e)(17)(ii).
137 12
E:\FR\FM\04SEN1.SGM
04SEN1
ddrumheller on DSK120RN23PROD with NOTICES1
72144
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
A. Consistency With Section 805(b)(1)
of the Clearing Supervision Act
Promote Robust Risk Management. As
described above, the Clearing Agencies
believe that the Cloud Proposal
promotes robust risk management,
specifically operational risk
management, by providing scalable and
secure infrastructure for hosting Core
C&S Systems. The Cloud Proposal
would add additional security
capabilities, allow for regular updates
and maintenance of applications, and
reduce the risk of data breaches while
also ensuring compliance with industry
standards. Additionally, transitioning to
Cloud would offer flexibility in scaling
resources, which can enable the
Clearing Agencies to adapt quickly to
changing security needs and allocate
resources more efficiently.
Today, the Clearing Agencies’ ability
to risk manage extreme market events is
directly tied to their ability to scale their
on-premises resource during such
events, which is directly tied to the
Clearing Agencies having previously
expended enough capital to build
enough capacity based on earlier
performance testing of their applications
to withstand such extreme market
events. Although the Clearing Agencies
would continue to performance test
their applications regardless of where
the applications are hosted, by hosting
the applications in Cloud, the number of
scalable resources is already available,
when needed, without the Clearing
Agencies having to pre-purchase it or
build it. This level of nearly unbounded,
on-demand scalability provides a muchwelcomed risk-management feature for
extreme events, such as a global
pandemic as noted above.
Overall, risk management is
inherently strengthened by hosting in
Cloud through advanced security
features, real-time monitoring, ondemand scalability, and compliance
standards implemented by the CSP. By
leveraging these capabilities, the
Clearing Agencies can better proactively
identify and address risks, ensuring data
integrity and regulatory compliance.
Promote Safety and Soundness. The
Clearing Agencies also believe that the
Cloud Proposal promotes safety and
soundness. As discussed above,
transitioning to Cloud provides
centralized management and improved
scalability. The CSP provides cloudspecific security capabilities, including
encryption, access controls, and regular
updates, reducing the risk of security
breaches. Centralized monitoring allows
for better visibility into potential
threats, enabling quick response and
mitigation. The agility afforded by
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
Cloud would allow the Clearing
Agencies to respond to performance
challenges more efficiently and
effectively. For instance, as noted above,
in the face of unexpected surges in
demand, Cloud scalability would allow
the Clearing Agencies to seamlessly
adjust resources, helping to prevent
service disruptions and loss of
operations. Such agility not only
enhances the effectiveness of operations
but also mitigates the risks associated
with unexpected fluctuations in
workload performance. These benefits
improve the Clearing Agencies abilities
to maintain operational continuity and
resilience, which help promote safety
and soundness.
Reduce Systemic Risk. The Clearing
Agencies also believe that the Cloud
Proposal would reduce systemic risk by
improving overall resilience and
security. As described above, hosting
Core C&S Systems in Cloud would
provide distributed infrastructure and
data redundancy (i.e., multiple
availability zones, supported by many
data centers, across two regions),
making the systems less susceptible to
single points of failure. Moreover,
disaster recovery would be streamlined,
minimizing the effect of potential
disruptions, while automatic backup
systems, geographic redundancy, and
faster data recovery mechanisms would
all contribute to a more resilient
infrastructure. In the event of a localized
issue, the distributed nature of Cloud
would help prevent widespread
disruptions.
Production resiliency also is greatly
improved in Cloud compared to the
Clearing Agencies’ on-premises
capabilities, where a single location
hosts an application, on a single copy of
primary storage. Instead, Cloud would
host an application across three primary
availability zones, made of up of many
data centers, each of which contain
actively running instances and
synchronous copies of the data. If the
Clearing Agencies’ primary, on-premises
data center fails, an out of region
recovery will be necessary and will
likely result in approximately two hours
of downtime. By comparison, in Cloud,
even if an entire availability zone fails
(meaning the failure of multiple data
centers), Core C&S Systems would
continue to operate within the region,
thus avoiding an out of region recovery
and any downtime.
The Clearing Agencies would employ
meaningful security capabilities and
measures provided by the CSP and
third-party tools to further enhance the
security of the Clearing Agencies’ Core
C&S Systems. This approach to security
would help reduce systemic risks
PO 00000
Frm 00267
Fmt 4703
Sfmt 4703
associated with operational outages and
significantly reduce the risk associated
with data loss or downtime.
Additionally, the Cloud environment
facilitates regular updates and patch
management, ensuring that security
measures stay current. This proactive
maintenance helps mitigate
vulnerabilities that could otherwise
contribute to systemic risk. Overall, the
adoption of Cloud enhances the stability
and security of IT infrastructure,
contributing to a reduction in systemic
risks.
Altogether, the Clearing Agencies
believe that the benefits afford from
operating in a Cloud Infrastructure
would help the Clearing Agencies
reduce systemic risk.
Support the Stability of the Broader
Financial System. The Clearing
Agencies believe that the Cloud
Proposal supports the stability of the
broader financial system by enhancing
efficiency, resilience, and security of the
Clearing Agencies’ Core C&S Systems.
Cloud services would provide the
Clearing Agencies with scalable and
flexible infrastructure, allowing for
more efficient resource allocation and
cost management, which supports
operational resiliency and stability.
With the ability to rapidly deploy new
applications and services, the Clearing
Agencies would become more agile in
adapting to market trends and
participant and customer needs.
In terms of resilience, the Cloud
Infrastructure offers distributed data
storage and failover solutions, reducing
the impact of localized disruptions and
improving recovery capabilities. This
resilience is crucial for the Clearing
Agencies’ Core C&S Systems to continue
functioning even in the face of
unforeseen events. Moreover, the CSP’s
strengthened security capabilities help
protect sensitive data, mitigating the
risk of cyberattack or data breaches that
could undermine the stability of the
financial system. Overall, the transition
to Cloud fosters improved operational
efficiency, resilience, and robust
security practices, contributing to the
stability of the broader financial system.
Accordingly, the proposed changes
provided in this Cloud Proposal are
consistent with (i) promoting robust risk
management; (ii) promoting safety and
soundness; (iii) reducing systemic risks;
and (iv) promoting the stability of the
broader financial system, all in support
of the objectives and principles of
Section 805(b) of the Clearing
Supervision Act.143
143 12
E:\FR\FM\04SEN1.SGM
U.S.C. 5464(b).
04SEN1
ddrumheller on DSK120RN23PROD with NOTICES1
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
B. Consistency With Rule 17ad–
22(e)(17)(ii) Under the Exchange Act
Rule 17ad–22(e)(17)(ii) requires the
Clearing Agencies to establish,
implement, maintain, and enforce
written policies and procedures
reasonably designed to manage the
Clearing Agencies’ operational risk by
‘‘ensuring that systems have a high
degree of security, resiliency,
operational reliability, and adequate,
scalable capacity.’’ 144
Security. As described above and in
policies and procedures confidentially
filed, the Clearing Agencies have
established a robust Cloud security
program to manage the security of the
Core C&S Systems that would be
running in Cloud and to monitor the
CSP’s management of security of the
Cloud Infrastructure that it operates.
Processes are formally defined,
automated to the fullest extent,
repeatable with minimal variation,
accessible, adhered to, and timely. The
enterprise security program
encompasses all of the Clearing
Agencies’ assets existing in the Clearing
Agencies’ offices, data centers, and
within the Cloud Infrastructure, and
IAM controls ensure least-privileged
user access to applications in Cloud.
The Clearing Agencies have appropriate
controls in place to help ensure the
security of confidential information intransit between the Clearing Agencies’
data centers and the Cloud
Infrastructure, between systems within
the Cloud Infrastructure, and at-rest. All
network communications between the
Clearing Agencies and Cloud would rely
on industry standard encryption for
traffic while in transit, and data at rest
would be safeguarded through pervasive
encryption. Finally, automated delivery
of business and security capability via
the use of the Infrastructure as Code,
Cloud agnostic tools, and continuous
integration/continuous deployment
pipeline methods help ensure security
controls are consistently and
transparently deployed.
Resiliency and Operational
Reliability. As stated above, resiliency
and operational reliability of the Cloud
Infrastructure is built into the system
with functionality for the Clearing
Agencies’ Core C&S Systems to run in
multiple availability zones within
multiple regions. Regions are segregated
from one another and are designed to
minimize the possibility of a multi144 17 CFR 240.17ad–22(e)(17)(ii). The Clearing
Agencies maintain several policies specifically
designed to manage the risks associated with
maintaining adequate levels of system functionality,
confidentiality, integrity, availability, capacity, and
resiliency for systems that support core clearing,
risk management, and data management services.
VerDate Sep<11>2014
21:26 Sep 03, 2024
Jkt 262001
region outage. The Clearing Agencies
have designed their Cloud Infrastructure
to have primary (hot)/secondary (warm)
regions, at all times, ensuring Compute,
Storage, and Network resources would
be available in a new redundant region
in the event of a primary region failure.
As a result, the Cloud Infrastructure
offers the Clearing Agencies multiple
redundancies within which to run Core
C&S Systems, while simultaneously
restricting the effect of an incident at the
CSP to the smallest footprint possible.
Scalability. As described above, since
additional computing power can be
launched on demand, the scalability in
a Cloud computing environment is
considerable and instantaneous. The
Clearing Agencies could provision or
de-provision Compute, Storage, and
Network resources to meet demand at
any given point in time. In the current
on-premises environment, immediate
scalability is limited by the capacity of
the on-premises hardware. Additional
physical servers and network equipment
would be needed to scale beyond the
limits of the on-premises hardware,
potentially affecting the ability to
quickly adapt to evolving market
conditions, including spikes in trading
volume.
For these reasons, the Clearing
Agencies believe that the Cloud
Proposal would help ensure that the
Clearing Agencies’ systems have a high
degree of security, resiliency,
operational reliability, and adequate,
scalable capacity, consistent with Rule
17ad–22(e)(17)(ii) under the Exchange
Act.145
III. Date of Effectiveness of the Advance
Notice
The proposed change may be
implemented if the Commission does
not object to the proposed change
within 60 days of the later of (i) the date
the proposed change was filed with the
Commission or (ii) the date any
additional information requested by the
Commission is received.146 The clearing
agency shall not implement the
proposed change if the Commission has
any objection to the proposed change.147
The clearing agency shall post notice
on its website of proposed changes that
are implemented. The proposal shall not
take effect until all regulatory actions
required with respect to the proposal are
completed.
IV. Solicitation of Comments
Interested persons are invited to
submit written data, views, and
145 17
CFR 240.17ad–22(e)(17)(ii).
U.S.C. 5465(e)(1)(G).
147 12 U.S.C. 5465(e)(1)(F).
146 12
PO 00000
Frm 00268
Fmt 4703
Sfmt 4703
72145
arguments concerning the foregoing,
including whether the advance notice is
consistent with the Clearing
Supervision Act. Comments may be
submitted by any of the following
methods:
Electronic Comments
• Use the Commission’s internet
comment form (https://www.sec.gov/
rules/sro.shtml); or
• Send an email to rule-comments@
sec.gov. Please include file number
FICC–2024–803 on the subject line.
Paper Comments
• Send paper comments in triplicate
to Secretary, Securities and Exchange
Commission, 100 F Street NE,
Washington, DC 20549–1090.
All submissions should refer to file
number SR–FICC–2024–803. This file
number should be included on the
subject line if email is used. To help the
Commission process and review your
comments more efficiently, please use
only one method. The Commission will
post all comments on the Commission’s
internet website (https://www.sec.gov/
rules/sro.shtml). Copies of the
submission, all subsequent
amendments, all written statements
with respect to the advance notice that
are filed with the Commission, and all
written communications relating to the
advance notice between the
Commission and any person, other than
those that may be withheld from the
public in accordance with the
provisions of 5 U.S.C. 552, will be
available for website viewing and
printing in the Commission’s Public
Reference Room, 100 F Street NE,
Washington, DC 20549 on official
business days between the hours of 10
a.m. and 3 p.m. Copies of the filing also
will be available for inspection and
copying at the principal office of FICC
and on DTCC’s website (dtcc.com/legal/
sec-rule-filings). Do not include
personal identifiable information in
submissions; you should submit only
information that you wish to make
available publicly. We may redact in
part or withhold entirely from
publication submitted material that is
obscene or subject to copyright
protection. All submissions should refer
to File Number SR–FICC–2024–803 and
should be submitted on or before
September 25, 2024.
V. Date of Timing for Commission
Action
Section 806(e)(1)(G) of the Clearing
Supervision Act provides that FICC may
implement the changes if it has not
received an objection to the proposed
changes within 60 days of the later of (i)
E:\FR\FM\04SEN1.SGM
04SEN1
72146
Federal Register / Vol. 89, No. 171 / Wednesday, September 4, 2024 / Notices
ddrumheller on DSK120RN23PROD with NOTICES1
the date that the Commission receives
the Advance Notice or (ii) the date that
any additional information requested by
the Commission is received,148 unless
extended as described below.
Pursuant to Section 806(e)(1)(H) of the
Clearing Supervision Act, the
Commission may extend the review
period of an advance notice for an
additional 60 days, if the changes
proposed in the advance notice raise
novel or complex issues, subject to the
Commission providing the clearing
agency with prompt written notice of
the extension.149
Here, as the Commission has not
requested any additional information,
the date that is 60 days after FICC filed
the Advance Notice with the
Commission is October 13, 2024.
However, the Commission believes that
the changes proposed in the Advance
Notice raise novel and complex issues.
The Commission finds the issues novel
because FICC proposes a gradual
migration of a specified set of Core C&S
Systems to a public cloud infrastructure
hosted by a single, third-party service
provider. The Commission also finds
the issues raised by the Advance Notice
complex because the selection of the
subset of applications proposed for
migration involves a detailed
governance review process that would
require careful scrutiny and
consideration of its associated risks.
Therefore, the Commission finds it
appropriate to extend the review period
of the Advance Notice for an additional
60 days under Section 806(e)(1)(H) of
the Clearing Supervision Act.150
Accordingly, the Commission,
pursuant to Section 806(e)(1)(H) of the
Clearing Supervision Act,151 extends the
review period for an additional 60 days
so that the Commission shall have until
December 12, 2024 to issue an objection
or non-objection to advance notice SR–
FICC–2024–803.
All submissions should refer to File
Number SR–FICC–2024–803 and should
be submitted on or before September 25,
2024.
For the Commission, by the Division of
Trading and Markets, pursuant to delegated
authority.152
Sherry R. Haywood,
Assistant Secretary.
[FR Doc. 2024–19762 Filed 9–3–24; 8:45 am]
BILLING CODE 8011–01–P
148 12
149 12
SECURITIES AND EXCHANGE
COMMISSION
[Release No. 34–100862; File No. SR–
CBOE–2024–036]
Self-Regulatory Organizations; Cboe
Exchange, Inc.; Notice of Filing of a
Proposed Rule Change To Amend Rule
4.3 to List and Trade Options on
Ethereum Exchange-Traded Funds
August 28, 2024.
Pursuant to Section 19(b)(1) of the
Securities Exchange Act of 1934
(‘‘Act’’),1 and Rule 19b–4 thereunder,2
notice is hereby given that on August
19, 2024, Cboe Exchange, Inc.
(‘‘Exchange’’) filed with the Securities
and Exchange Commission
(‘‘Commission’’) the proposed rule
change as described in Items I, II, and
III below, which Items have been
prepared by the Exchange. The
Commission is publishing this notice to
solicit comments on the proposed rule
change from interested persons.
I. Self-Regulatory Organization’s
Statement of the Terms of Substance of
the Proposed Rule Change
Cboe Exchange, Inc. (the ‘‘Exchange’’
or ‘‘Cboe Options’’) proposes to amend
Rule 4.3. The text of the proposed rule
change is provided in Exhibit 5.
The text of the proposed rule change
is also available on the Exchange’s
website (https://www.cboe.com/
AboutCBOE/
CBOELegalRegulatoryHome.aspx), at
the Exchange’s Office of the Secretary,
and at the Commission’s Public
Reference Room.
II. Self-Regulatory Organization’s
Statement of the Purpose of, and
Statutory Basis for, the Proposed Rule
Change
In its filing with the Commission, the
Exchange included statements
concerning the purpose of and basis for
the proposed rule change and discussed
any comments it received on the
proposed rule change. The text of these
statements may be examined at the
places specified in Item IV below. The
Exchange has prepared summaries, set
forth in sections A, B, and C below, of
the most significant aspects of such
statements.
U.S.C. 5465(e)(1)(G).
U.S.C. 5465(e)(1)(H).
150 Id.
1 15
151 Id.
152 17
CFR 200.30–3(a)(91).
VerDate Sep<11>2014
21:26 Sep 03, 2024
2 17
Jkt 262001
PO 00000
U.S.C. 78s(b)(1).
CFR 240.19b–4.
Frm 00269
Fmt 4703
Sfmt 4703
A. Self-Regulatory Organization’s
Statement of the Purpose of, and
Statutory Basis for, the Proposed Rule
Change
1. Purpose
The Exchange proposes to amend
Rule 4.3 regarding the criteria for
underlying securities. Specifically, the
Exchange proposes to amend Rule 4.3,
Interpretation and Policy .06(a)(4) to
allow the Exchange to list and trade
options on Units 3 that represent
interests in the following exchangetraded products: the Fidelity Ethereum
Fund (the ‘‘Fidelity Fund’’), the
21Shares Core Ethereum ETF (the
‘‘21Shares Fund’’), the Invesco Galaxy
Ethereum ETF (the ‘‘Invesco Fund’’), the
Franklin Ethereum ETF (the ‘‘Franklin
Fund’’), the VanEck Ethereum Trust (the
‘‘VanEck Fund’’), the Grayscale
Ethereum Trust (the ‘‘Grayscale Fund’’),
the Grayscale Mini Ethereum Trust (the
‘‘Grayscale Mini Fund’’), the Bitwise
Ethereum ETF (the ‘‘Bitwise Fund’’),
and the iShares Ethereum Trust ETF
(the ‘‘iShares Fund and, collectively, the
‘‘Ethereum Funds’’), designating them
as ‘‘Units’’ deemed appropriate for
options trading on the Exchange.
Current Rule 4.3, Interpretation and
Policy .06 provides that, subject to
certain other criteria set forth in that
Rule, securities deemed appropriate for
options trading include Units that
represent certain types of interests,4
3 Rule 1.1 defines a ‘‘Unit’’ (which may also be
referred to as an exchange-traded fund (‘‘ETF’’)) as
a share or other security traded on a national
securities exchange and defined as an NMS stock
as set forth in Rule 4.3.
4 See Rule 4.3, Interpretation and Policy .06(a),
which permits options trading on Units that
represent (1) interests in registered investment
companies (or series thereof) organized as open-end
management investment companies, unit
investment trusts or similar entities that hold
portfolios of securities and/or financial instruments
including, but not limited to, stock index futures
contracts, options on futures, options on securities
and indexes, equity caps, collars and floors, swap
agreements, forward contracts, repurchase
agreements and reverse purchase agreements (the
‘‘Financial Instruments’’), and money market
instruments, including, but no limited to, U.S.
government securities and repurchase agreements
(the ‘‘Money Market Instruments’’) comprising or
otherwise based on or representing investments in
indexes or portfolios of securities and/or Financial
Instruments and Money Market Instruments (or that
hold securities in one or more other registered
investment companies that themselves hold such
portfolios of securities and/or Financial Instruments
and Money Market Instruments); (2) interests in a
trust or similar entity that holds a specified nonU.S. currency deposited with the trust or similar
entity when aggregated in some specified minimum
number may be surrendered to the trust by the
beneficial owner to receive the specified non-U.S.
currency and pays the beneficial owner interest and
other distributions on deposited non-U.S. currency,
if any, declared and paid by the trust (‘‘Currency
Trust Shares’’); (3) commodity pool interests
principally engaged, directly or indirectly, in
E:\FR\FM\04SEN1.SGM
04SEN1
Agencies
[Federal Register Volume 89, Number 171 (Wednesday, September 4, 2024)]
[Notices]
[Pages 72128-72146]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-19762]
-----------------------------------------------------------------------
SECURITIES AND EXCHANGE COMMISSION
[Release No. 34-100852; File No. SR-FICC-2024-803]
Self-Regulatory Organizations; Fixed Income Clearing Corporation;
Notice of Filing and Extension of Review Period of Advance Notice To
Host Certain Core Clearance and Settlement Systems in a Public Cloud
August 28, 2024.
Pursuant to Section 806(e)(1) of Title VIII of the Dodd-Frank Wall
Street Reform and Consumer Protection Act, entitled Payment, Clearing
and Settlement Supervision Act of 2010 (``Clearing Supervision Act'')
\1\ and Rule 19b-4(n)(1)(i) \2\ under the Securities Exchange Act of
1934 (``Act''),\3\ notice is hereby given that on August 14, 2024,
Fixed Income Clearing Corporation (``FICC'') filed with the Securities
and Exchange Commission (``Commission'') an advance notice as described
in Items I, II and III below, which Items have been prepared primarily
by the clearing agency. The Commission is publishing this notice to
solicit comments on the advance notice from interested persons and to
extend the review period of the advance notice.
---------------------------------------------------------------------------
\1\ 12 U.S.C. 5465(e)(1).
\2\ 17 CFR 240.19b-4(n)(1)(i).
\3\ 15 U.S.C. 78a et seq.
---------------------------------------------------------------------------
I. Clearing Agency's Statement of the Terms of Substance of the Advance
Notice
FICC files this advance notice seeking no objection to host a
specified set of core clearance, settlement, and risk applications,
including any Regulation Systems Compliance and Integrity (``Reg.
SCI'') systems and Critical SCI systems,\4\ (``Core C&S Systems'') on
an on-demand network of configurable information technology resources
running on a public cloud infrastructure (``Cloud'' or ``Cloud
Infrastructure'') hosted by a single, third-party service provider
(``Cloud Service Provider'' or ``CSP'') (altogether, the ``Cloud
Proposal''), as described in greater detail below.
---------------------------------------------------------------------------
\4\ 17 CFR 242.1000 et seq.
---------------------------------------------------------------------------
II. Clearing Agency's Statement of the Purpose of, and Statutory Basis
for, the Advance Notice
In its filing with the Commission, the clearing agency included
statements concerning the purpose of and basis for the advance notice
and discussed any comments it received on the advance notice. The text
of these statements may be examined at the places specified in Item IV
below. The clearing agency has prepared summaries, set forth in
sections A and B below, of the most significant aspects of such
statements.
(A) Clearing Agency's Statement on Comments on the Advance Notice
Received From Members, Participants or Others
FICC has not received or solicited any written comments relating to
this proposal. If any written comments are received, FICC will amend
this filing to publicly file such comments as an Exhibit 2 to this
filing, as required by Form 19b-4 and the General Instructions thereto.
Persons submitting written comments are cautioned that, according
to Section IV (Solicitation of Comments) of the Exhibit 1A in the
General Instructions to Form 19b-4, the Securities and Exchange
Commission (``Commission'') does not edit personal identifying
information from comment submissions. Commenters should submit only
information that they wish to make available publicly, including their
name, email address, and any other identifying information.
All prospective commenters should follow the Commission's
instructions on How to Submit Comments, available at www.;sec.gov/
regulatory-actions/how-
[[Page 72129]]
to-submitcomments. General questions regarding the rule filing process
or logistical questions regarding this filing should be directed to the
Main Office of the Commission's Division of Trading and Markets at
[email protected] or 202-551-5777.
FICC reserves the right to not respond to any comments received.
(B) Advance Notices Filed Pursuant to Section 806(e) of the Clearing,
and Settlement Supervision Act
I. Description of the Proposal
Pursuant to the Clearing Supervision Act and Rule 19b-4(n)(1)(i)
under the Exchange Act,\5\ FICC files this advance notice seeking no
objection to the Cloud Proposal, as described herein.
---------------------------------------------------------------------------
\5\ 17 CFR 240.19b-4(n)(1)(i).
---------------------------------------------------------------------------
The specified set of Core C&S Systems that the Clearing Agencies
intend to host in the Cloud, and the transition schedule for such
hosting, are listed in Exhibit 3 to this advance notice filing.\6\
However, the Clearing Agencies recognize that it may become necessary
to deviate from the proposed transition schedule as risks change over
time and the proposed implementation would occur over several years.
The Clearing Agencies' process for monitoring, assessing, and
escalating such risks, which may result in a deviation, is described in
Section I.D, below. If the Clearing Agencies would need to deviate from
that schedule, they would provide Commission staff notice of such
deviation, the reason for the deviation, and how the implementation
schedule would be updated to account for the deviation. Further, the
Clearing Agencies recognize that deviating from the proposed transition
schedule would necessitate a separate analysis to determine whether
such deviation could materially affect the nature or level of risk
posed by each of the Clearing Agencies.
---------------------------------------------------------------------------
\6\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the proposed
transition schedule (i.e., the Core C&S Systems to Move to Cloud).
The Clearing Agencies have provided this schedule in confidential
Exhibit 3 to this advance notice filing.
---------------------------------------------------------------------------
FICC's two affiliate clearing agencies, The Depository Trust
Company (``DTC'') and National Securities Clearing Corporation
(``NSCC'' and together with FICC and DTC, the ``Clearing Agencies'')
\7\ have each filed with the Commission advance notices to adopt the
same Cloud Proposal. Accordingly, each respective advance notice filing
is written from the perspective of the Clearing Agencies, collectively,
instead of FICC, DTC, and NSCC individually.\8\
---------------------------------------------------------------------------
\7\ The Clearing Agencies are each a subsidiary of The
Depository Trust & Clearing Corporation (``DTCC''). DTCC operates on
a shared service model with respect to the Clearing Agencies. Most
corporate functions are established and managed on an enterprise-
wide basis pursuant to intercompany agreements under which it is
generally DTCC that provides relevant services to the Clearing
Agencies.
\8\ Capitalized terms not otherwise defined herein have the
meaning as set forth in respective rules of the Clearing Agencies,
available at https://www.dtcc.com/legal/rules-and-procedures.
---------------------------------------------------------------------------
A. The Current System and Summary of Proposed Change
Today, the Clearing Agencies' Core C&S Systems are hosted using
Compute,\9\ Storage and Networking, as defined below, running in
private data centers (i.e., on-premises). The current data-center
footprint consists of a single data center in each of two regions. Each
regional data center has a corresponding data bunker used for
synchronous data protection and restoration.\10\
---------------------------------------------------------------------------
\9\ The existing Compute platform consists of both on-premises
mainframe and private cloud platforms.
\10\ Note: The data bunkers cannot run applications, as they are
only for data protection and restoration.
---------------------------------------------------------------------------
The Clearing Agencies view the proposed transition to using a Cloud
Infrastructure to host the specified set of Core C&S Systems as a
natural progression of the Clearing Agencies' information technology
strategy that aligns with their overall corporate strategy--to deliver
on modernization and maximize the value of their platforms for
stakeholders and continue to invest in risk management excellence.
For over 11 years, the Clearing Agencies have honed their expertise
in operating non-Core C&S Systems within the Cloud.\11\ Throughout that
time, the Clearing Agencies have continually refined their capabilities
across technical, risk, legal, and compliance dimensions, in tandem
with the Cloud's own evolution and the industry's increasing adoption
of it. Given this extensive maturity and development over the past
decade, the Clearing Agencies believe that hosting Core C&S Systems in
the Cloud, via a single CSP, is now appropriate and essential. By
consolidating resources under a single CSP, the Clearing Agencies can
optimize efficiency, reduce costs, mitigate risks, and maintain a
cohesive environment for seamless collaboration and operation.
---------------------------------------------------------------------------
\11\ Some of the non-Core C&S Systems already operating in Cloud
include systems that support risk analysis, various reporting
engines, and shared infrastructure capabilities. More specifically,
for risk analysis, there are applications for certain risk testing
and calculations used to assess industry risk postures for various
Clearing Agency clients, as well as warehousing large sets of risk
data for quantitative analytics. For the various report engines,
there are applications that provide publicly disseminatable data
sets and documentation, certificate imaging, as well as certain
archival storage capabilities. For shared infrastructure
capabilities, there are applications that support the Clearing
Agencies' engineering and development departments for dev-op
capabilities such as code scanning, code repositories, and
infrastructure-as-code deployment pipelines.
---------------------------------------------------------------------------
As described in greater detail in this advance notice, the Clearing
Agencies propose to provision, within a single CSP, logically
segregated sections of the Cloud Infrastructure that would provide the
Clearing Agencies with the virtual equivalent of physical data center
resources, including scalable resources that can (i) handle various
computationally intensive applications with load-balancing and resource
management (``Compute''); (ii) provide configurable storage
(``Storage''); and (iii) provide network resources and services
(``Network''). These resources would be logically segregated from other
customers of the CSP. The Clearing Agencies would leverage the CSP's
IaaS (i.e., infrastructure as a service) and PaaS (i.e., platform as a
service) services for building and running Core C&S Systems.
The Clearing Agencies do not propose to transition all Core C&S
Systems entirely out of their regional data centers at this time, but
rather, to host a specified set of Core C&S Systems in a Cloud
Infrastructure while maintaining the remaining applications in the
Clearing Agencies' regional data centers for the near term. The
proposed transition would be achieved incrementally over a course of
several years and would result in the Clearing Agencies hosting some
Core C&S Systems on-premises and others in a Cloud Infrastructure.\12\
---------------------------------------------------------------------------
\12\ A result of the Cloud Proposal would be that the Clearing
Agencies would operate Reg. SCI and Critical SCI systems both on-
premises and on a Cloud Infrastructure.
---------------------------------------------------------------------------
This phased approach to transitioning to Cloud is to reduce risk.
The Clearing Agencies believe that a ``big-bang'' approach of moving
all applications at once introduces significant execution risk,
primarily driven by the sheer scale and scope of such an effort.
Moreover, many clearance and settlement applications on the Clearing
Agencies' mainframe are still tightly coupled together. Even after such
applications are modernized, many could experience latency dependencies
with other applications that have not yet been modernized, hence the
need to keep some applications in the Clearing Agencies' existing data
centers for the near term. However, applications with little to no
coupling, particularly those applications that have already been
modernized, are ripe for Cloud
[[Page 72130]]
transition and the subject of this Cloud Proposal. As for the remaining
clearance and settlement applications that are not part of this
proposal and would continue to be hosted on-premises, the Clearing
Agencies have not thoroughly assessed when those applications would
transition to Cloud, which may take several years, or whether such
transition would be the subject of a later, separate advance notice
proposal.
Integration between on-premises and Cloud-based Core C&S Systems
would, as it is for non-Core C&S Systems that are already hosted in
private and public cloud, leverage existing patterns and processes. The
primary methods of application integration are application program
interfaces (a/k/a APIs), messaging queues (a/k/a MQ messaging), and
file transfer. All three are used to integrate internal and client
applications, and all three methods provide interoperability between
applications running on mainframe, private cloud, and public cloud.
For these reasons, the Clearing Agencies strongly believe that the
phased approach enables the Clearing Agencies to best approach the
transition to Cloud, safely and confidently.
B. Why Use Cloud
The Clearing Agencies believe there are very strong and compelling
reasons to use Cloud as part of their diverse, platform strategy,
including, as discussed below, the waning of the on-premises industry,
improved resilience, expanded security capabilities, and increased
scalability.
1. Waning On-Premises Industry
Although on-premises mainframes have been a stalwart for hosting
critical applications for many years, it is the Clearing Agencies'
experience that industry investment and development in on-premises
platforms is waning, and the ability to source skilled and experienced
staff to operate such platforms is increasingly challenging. Meanwhile,
vendor consolidations are beginning to negatively affect investment and
innovation in the private cloud space.\13\ As investment dollars are
increasingly allocated to Cloud, vendor choice, innovation, and support
will continue to diminish for on-premises platforms. This poses a
growing risk to the Clearing Agencies, who today continue to rely
primarily upon on-premises mainframes and private cloud solutions from
a resiliency perspective.\14\ The Clearing Agencies believe the best
way to manage against this risk at this time is to leverage a diverse
platform strategy that will increase the use of and reliance upon
Cloud. The use of Cloud, as part of a broader platform strategy, serves
as an important tool in enabling the Clearing Agencies to anticipate
and manage these and other risks more effectively.
---------------------------------------------------------------------------
\13\ For example, the VBlock platform, which has been the core,
private cloud distributed hosting platform of the Clearing Agencies
for over a decade, is no longer available for purchase. Another
example is the continued consolidation in the private cloud software
space, which has concentrated the industry and reduce aggregate
investment in innovation.
\14\ In this context, ``resiliency'' is the ``ability to
anticipate, withstand, recover from, and adapt to adverse
conditions, stresses, attacks, or compromises on systems that
include cyber resources.'' Systems Security Engineering: Cyber
Resiliency Considerations for Engineering of Trustworthy Secure
Systems, Spec. Publ. NIST SP No. 800-160, vol. 2 (2018).
---------------------------------------------------------------------------
2. Improved Resilience
The Clearing Agencies must ensure that any Core C&S Systems in the
Cloud have resiliency and recovery capabilities commensurate with the
Clearing Agencies' importance to the functioning of the U.S. financial
markets. As explained in detail below, the Clearing Agencies believe
that Cloud will enhance the resiliency of their Core C&S Systems by
virtue of the Clearing Agencies' architectural design decisions, and
the Cloud's redundancy, availability, and the Clearing Agencies'
disciplined approach to deployment of Core C&S Systems to Cloud. In
particular, the Clearing Agencies believe that Cloud will enhance their
ability to withstand and recover from adverse conditions by
provisioning redundant Compute, Storage, and Network resources in three
availability zones, in each of two autonomous and geographically
diverse regions, for a total of six availability zones that are
comprised of many data centers.
The primary/hot region would be operational and accepting traffic,
while the secondary/warm region would receive replicated data from the
hot region with applications on stand-by. This solution significantly
reduces operational complexity, mitigates the risk of human error by
providing tools for automating routine tasks and orchestrating complex
workflows, thereby reducing the need for manual intervention,\15\ and
provides resiliency and assured capacity (although, the Clearing
Agencies would continue to periodically review the CSP's capacity
planning process through quarterly reviews).\16\
---------------------------------------------------------------------------
\15\ The CSP's built-in security features in its Cloud
Infrastructure also can reduce the risk of security breaches caused
by human error, such as misconfigurations or improper access
controls.
\16\ The Clearing Agencies would continue to perform periodic
business continuity and disaster recovery tests to verify business
continuity plans and disaster recovery infrastructure will support a
two-hour recovery time objective for critical systems.
---------------------------------------------------------------------------
The Clearing Agencies are assured of adequate capacity with the
proposed hot/warm architecture because the Compute resources of the
warm, ``recovery'' region would be already running with needed
capacity. Additionally, the Clearing Agencies have reviewed the effect
of a large, regional outage with the CSP, which indicated that a vast
majority of the CSP's customers are not configured to use the secondary
region as a failover region; thus, they would not be using capacity in
that region. Moreover, a review of data from two large outages in the
primary region did not show a change in capacity availability in the
secondary region.
The Clearing Agencies also believe that Cloud reduces capacity-
management risks when compared with on-premises platforms in three
important ways: (1) capacity in Cloud can be added almost instantly;
(2) such capacity can be added at magnitudes greater than what is
possible with traditional, on-premises platforms; and (3) the risk of a
supply chain effect on capacity realization (i.e., the risks associated
with receiving and deploying servers necessary to create more capacity)
is greatly reduced.
The proposed hot/warm configuration also enables application
rotation between regions. The Clearing Agencies would have the ability
to operationally rotate either a single application, groups of
applications, or all applications to the warm region for both planned
and unplanned events. Collectively, the proposed design of the Cloud
Infrastructure helps ensure that the Clearing Agencies can meet any
applicable two-hour recovery time objective.
Each availability zone, in each of the two regions, would be
comprised of multiple physical data centers. Each data center would
have its own distinct physical infrastructure with separate staff and
dedicated connections to utility power, standalone backup power
sources, independent mechanical services, and independent network
connectivity.
Although not dependent on each other, availability zones of a
region are connected to each other with private, fiber-optic
networking, enabling Core C&S Systems to automatically failover between
a region's availability zones
[[Page 72131]]
without interruption. Since each availability zone can operate
independently, but failover capability is nearly instantaneous, a loss
of one availability zone would not affect operation in another;
therefore, no Core C&S System would be reliant on the functioning of a
single availability zone.\17\
---------------------------------------------------------------------------
\17\ To further ensure the resiliency of the Compute, Storage,
and Network capabilities, the CSP's services are divided into ``data
plane'' and ``control plane'' services. The Clearing Agencies'
applications would run using data plane services, while control
plane services are used to configure the environment. Resources and
requests are further partitioned into cells, or multiple
instantiations of a service that are segregated from each other and
invisible to the CSP's customers, on each plane, again minimizing
the effect of a potential incident to the smallest footprint
possible.
---------------------------------------------------------------------------
Altogether, the proposed Cloud Infrastructure would afford the
Clearing Agencies six levels of redundancy (i.e., three availability
zones, made up of many data centers, in each of the two regions), with
primary/secondary regions running in a hot/warm configuration,
respectively, in geographically separate and segregated locations, and
with each region containing multiple copies of the data. Thus, even if
an availability zone is lost in the primary region, the Cloud can
continue to seamlessly operate Core C&S Systems in the primary region,
thereby significantly reducing availability risk and any attendant
consequences for the Clearing Agencies' participants and customers. As
a result, the Cloud Infrastructure offers the Clearing Agencies
multiple redundancies within which to run Core C&S Systems, limits the
effect of an incident at the CSP to the smallest footprint possible,
and mitigates the possibility of the Clearing Agencies suffering an
intra-, inter-, or multi-region outage.
By comparison, the Clearing Agencies' current on-premises hosting
capabilities, both mainframe and private cloud, are operating on one
primary data center in one region, with a second, recovery data center
in a second region (excluding data bunkers, which do not have Compute
capabilities). In other words, it is many times less likely that an
unplanned, out of region failover would be needed for Core C&S Systems
hosted in Cloud than currently hosted on-premises. (Even in the
unlikely event that the Clearing Agencies needed to fail over to the
secondary Cloud region, the decision and process of doing so would
continue to be in the sole discretion of the Clearing Agencies.) This
increased redundancy represents a material improvement in resiliency
for the Clearing Agencies and a material reduction in risk for the
industry.
Additionally, transitioning to Cloud offers the Clearing Agencies a
more effective strategy for avoiding technical debt and system
degradation because the CSP, in its role as such, would be performing
regular system upgrades and maintenance, helping to ensure the Cloud's
resiliency. Unlike on-premises solutions that may struggle to keep pace
with evolving technology, due in part to the waning demand for on-
premises infrastructure, CSPs take on the responsibility of regularly
updating and maintaining their cloud infrastructure, which they do in a
competitive environment. This approach helps ensure that the CSP's
cloud infrastructure remains up to date, secure, and performs at its
best, minimizing the likelihood of accumulating technical debt and
preventing the decline of system capabilities and resiliency over time.
This is not to say that on-premises infrastructures are not updated or
maintained today but, instead, that the CSP does it better and faster.
CSPs excel in ensuring that systems remain up to date, secure, and
perform at their best by leveraging automation, scalability, built-in
security measures, service level agreements (``SLAs''), economies of
scale, and continuous monitoring and improvement processes. These
advantages collectively enable CSPs to provide more reliable,
resilient, and high-performance services compared to traditional on-
premises environments.
3. Expanded Security Capabilities
Hosting Core C&S Systems in Cloud would not change the physical and
cybersecurity standards to which the Clearing Agencies currently
align--the National Institute of Standards and Technology (``NIST'')
\18\ and Center for internet Security (``CIS'').\19\ Application of
NIST is considered a best practice for financial services use of
cloud.\20\ Moreover, as discussed further below, the Clearing Agencies
would continue to apply existing security processes and standards to
include network and identity and access management (``IAM'') controls,
security governance and controls for sensitive data, security
configuration, provisioning, logging and monitoring, and security
testing and validations.
---------------------------------------------------------------------------
\18\ National Institute of Standards and Technology (2023) The
NIST Cybersecurity Framework 2.0. (National Institute of Standards
and Technology, Gaithersburg, MD), NIST Cybersecurity White Paper
(NIST CSWP) 29 ipd, Released August 8, 2023. https://doi.org/10.6028/NIST.CSWP.29.ipd.
\19\ Center for internet Security Benchmarks, cisecurity.org/cis-benchmarks.
\20\ U.S. Department of the Treasury, The Financial Services
Sector's Adoption of Cloud Services (February 8, 2024), available at
https://home.treasury.gov/system/files/136/Treasury-Cloud-Report.pdf.
---------------------------------------------------------------------------
By hosting in Cloud through the CSP that the Clearing Agencies have
engaged, the Clearing Agencies would be able to add cloud-specific
security capabilities and measures provided by the CSP, as well as
third-party tools. For example, such capabilities and measures would
include automation, monitoring, and security incident response
capabilities, as well as default separation between Reg. SCI and non-
Reg. SCI operating domains, and ubiquitous encryption, all of which are
not available in the current on-premises data centers. Similarly,
micro-segmentation of applications and infrastructure provided by the
CSP, which also is not available in the Clearing Agencies data centers,
limits the effect of a security incident and reduces the time to
detection and recovery.\21\
---------------------------------------------------------------------------
\21\ For example, the CSP provides infrastructure capable of
withstanding Distributed Denial of Service (``DDoS'') attacks at far
greater magnitudes than the Clearing Agencies' current capabilities,
as the CSP has exponentially more internet bandwidth, given their
business function, than the Clearing Agencies. (DDoS is a
cyberattack in which the attacker floods a server with illegitimate
traffic/requests to prevent legitimate users from accessing online
services, websites, or computers connected to the attacked server.)
---------------------------------------------------------------------------
4. Increased Scalability
Cloud implementation would allow for greater scalability of
Compute, Storage, and Network resources that support Core C&S
Systems.\22\ With a Cloud Infrastructure, the Clearing Agencies could
quickly provision or de-provision Compute, Storage, or Network
resources to meet demands, including elevated trade volumes, and
provide more flexibility to create development and test environments,
as well as other system development needs.\23\ For
[[Page 72132]]
example, the CSP could support elastic workloads and scale dynamically
without the need for the Clearing Agencies to procure, test, and
install additional servers, storage, or other hardware.
---------------------------------------------------------------------------
\22\ The Clearing Agencies would continue to follow existing
policies and procedures regarding capacity planning and change
management. The Clearing Agencies have separately submitted a
request for confidential treatment to the Commission regarding the
Change Management Policy and the Technology Capacity and Demand
Assessment Policy. The Clearing Agencies have provided these
documents in confidential Exhibit 3 to this advance notice filing.
\23\ The Clearing Agencies periodically perform capacity and
availability planning analyses that result in capacity baselines and
forecasts, as an input to technology delivery and strategic planning
to ensure cost-justifiable support of operational business needs.
These analyses are based on the collection of performance data,
trending, scenarios, and periodic high-volume capacity stress tests
and include storage capacity for log and record retention. Results
are reported to senior technology management as inputs to
performance management and investment planning. In addition, each
quarter, the Clearing Agencies review the CSP's capacity planning
accuracy for the prior quarter and review the upcoming quarter's
forecast, along with providing input to the CSP for anticipated
major changes in the Clearing Agencies' proposed use of resources.
The Clearing Agencies' IT Governance Committee is the designated
escalation point for handling capacity management issues.
---------------------------------------------------------------------------
The Clearing Agencies would pre-provision Compute and Storage
resources proactively, in addition to scaling resources on-demand. This
means that the Clearing Agencies would be able to increase Compute
capacity in one or both regions via manual or automated processes for
Core C&S Systems. The rapid deployment of Compute capacity would allow
the Clearing Agencies to obtain access to resources far more quickly
than with on-premises data centers. The Clearing Agencies would combine
the pre-provisioning of primary capacity with regular capacity stress
testing to verify that the underlying Compute can sustain required
business volumes. The stress testing data would be used to determine
the base levels of pre-provisioned capacity.
The ability to quickly scale workloads materially improves the
Clearing Agencies ability to respond to unexpected market events and
external scenarios, such as a global pandemic.\24\ This capability also
enables the Clearing Agencies to run risk calculations more frequently,
at greater speeds, and with more compute-intensive models than is
economically feasible compared to the Clearing Agencies' on-premises
infrastructure.
---------------------------------------------------------------------------
\24\ Supply chain challenges during the Covid-19 pandemic
highlighted a lack of resiliency and scalability in traditional IT
vendors' abilities to deliver resources when needed. Lead times of
up to 18 months were experienced and delayed many efforts to expand
capacity. This was not the case with CSPs, which did not experience
capacity constraints or an ability to meet demand. This further
demonstrates how the option to host Core C&S Systems in Cloud is a
critical risk mitigation tool for managing against the long-term
risk of a waning on-premises industry.
---------------------------------------------------------------------------
In sum, transitioning to Cloud not only enhances scalability but
also significantly improves agility beyond the Clearing Agencies' on-
premises capabilities. The on-demand resources provided by the CSP
enable dynamic scalability, helping to ensure optimal performance
during peak times, efficient resource allocation during periods of
lower demand, and the ability to innovate faster to meet evolving
business requirements.
C. Why a Single CSP is Appropriate
The Clearing Agencies strongly believe that hosting Core C&S
Systems with a single CSP is appropriate. The Clearing Agencies have
assessed the capabilities of the CSP in adherence with the Clearing
Agency Risk Management Framework,\25\ which requires the respective
Board of Directors of the Clearing Agencies to approve policies
governing relationships with service providers, such as the CSP, thus
helping to ensure alignment with the Clearing Agencies' risk management
principles.
---------------------------------------------------------------------------
\25\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the Clearing
Agency Risk Management Framework. The Clearing Agencies have
provided this document in confidential Exhibit 3 to this advance
notice filing.
---------------------------------------------------------------------------
Beyond simply being a well-known, reputable, industry-leading, and
capable CSP, the Clearing Agencies and the CSP have spent several years
discussing the Clearing Agencies' needs, including operational, legal,
and regulatory obligations; what-if scenarios; and commercial
implications. That extensive effort led to a number of benefits,
including the CSP introducing new products \26\ and the establishment
of an exhaustive contractual agreement between the Clearing Agencies
and the CSP that addresses the Clearing Agencies' needs for hosting
Core C&S Systems in Cloud (``Cloud Agreement'').\27\ \28\
---------------------------------------------------------------------------
\26\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding two examples
of CSP Whitepapers. The Clearing Agencies have provided these
documents in confidential Exhibit 3 to this advance notice filing.
\27\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the Cloud
Agreement. The Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
\28\ Among other things, the Cloud Agreement sets forth the
CSP's responsibility to maintain the hardware, software, networking,
and facilities that run Cloud services. See also the separately
submitted Table of Reg. SCI Provisions provided in confidential
Exhibit 3 to this advance notice filing that provides a summary of
the terms and conditions of the Cloud Agreement that the Clearing
Agencies believe help enable their compliance with Reg. SCI.
---------------------------------------------------------------------------
Meanwhile, it is generally understood that in the present
environment adding a secondary CSP or an on-premises backup introduces
significant complexity, costs, and risks that outweigh expected
benefits.\29\ An on-premises or secondary CSP backup would require the
Clearing Agencies to engineer their primary Cloud Infrastructure to the
lowest common denominator, so that the systems operating on the primary
infrastructure also could run on a completely separate and distinct
secondary, backup infrastructure. This approach would severely reduce
the value that Cloud provides, introduce significant cost with little
benefit, and greatly increase operational complexity, all of which
would result in negative consequences for the efficiency and resiliency
of the Clearing Agencies, their participants, and the industry.
---------------------------------------------------------------------------
\29\ As noted in the U.S. Department of Treasury's report, The
Financial Services Sector's Adoption of Cloud Services, ``No
financial institution reported the capability to [run applications
across multiple CSPs] for more complex use cases, such as running
core operations on multiple public clouds. Running an application
across multiple CSPs at the same time may also be less desirable,
given the costs, staffing, and complexity involved in doing so,
particularly given the complexity associated with identifying and
managing risk across multiple cloud environments.'' Available at
https://home.treasury.gov/system/files/136/Treasury-Cloud-Report.pdf
at 6.
---------------------------------------------------------------------------
Notwithstanding the extensive benefits from moving to Cloud, the
Clearing Agencies fully appreciate and are committed to managing the
risks presented in relying on a single CSP, as identified and discussed
in Section II.A, further below.
D. Transition Timeframe
The Clearing Agencies believe that transitioning certain Core C&S
Systems to the Cloud is critical to managing the risks that are
inherent in technology and vendor selection. However, as stated above
in Section I.A, the intent of the Cloud Proposal is not to move all
Core C&S Systems to Cloud at one time. The Clearing Agencies believe
that a ``big-bang'' transition would introduce unnecessary execution
risk, primarily driven by the sheer scale and scope of such an effort.
Moreover, many applications on the mainframe are still tightly coupled
together and not ready to be moved to public cloud. Rather, at this
time, the Clearing Agencies are proposing to move only a subset of the
Core C&S Systems to the Cloud and to do so on an incremental basis, in
consideration of the specifics of each application and the needs of the
Clearing Agencies.\30\ This approach helps enable the hosting of Core
C&S Systems on the most appropriate platform, at the most appropriate
time, in an efficient and secure manner.
---------------------------------------------------------------------------
\30\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Global Business Continuity and Resilience Policy and Standards,
which defines the governance structure, high-level roles and
responsibilities, and the framework for business continuity and
resilience processes at the Clearing Agencies. The Clearing Agencies
have provided this document in confidential Exhibit 3 to this
advance notice filing.
---------------------------------------------------------------------------
The subset of Core C&S Systems selected for this proposal have been
initially identified based on several
[[Page 72133]]
preliminary criteria, including, but not limited to, whether:
the application would benefit from the presence of data
sets already present in Cloud;
the application would benefit from elasticity enabled by
Cloud (e.g., user interfaces); and
the application already meets certain architectural
patterns for Cloud (e.g., the application has already been modernized
and currently hosted in private cloud and/or is a siloed application--
little to no coupling with other applications).
Assuming the Clearing Agencies would receive no regulatory
objection to this advance notice, each application of the proposed
subset of Core C&S Systems then would undergo an in-depth,
architectural review that would follow the Clearing Agencies'
governance process, governed by the System Delivery Process.\31\ The
governance process includes, where applicable, a detailed review and
approval by the Information Technology Architecture Review Board
(``ARB''),\32\ the New Initiatives process,\33\ to include the Business
Case Council and the Risk Assessment Council that vet the financials
and risks of the proposed move, and the Investment Management
Committee.\34\ Further escalations would be made to the Executive
Committee and applicable Board of Directors of the Clearing Agencies,
as needed. Re-platforming efforts also would be communicated to
regulators in accordance with the change reporting requirements of
Section 1003(a)(1) of Reg. SCI, as applicable.\35\
---------------------------------------------------------------------------
\31\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
System Delivery Policy. The System Delivery Policy defines
requirements that support adherence to the System Delivery Process
for application development projects. The Clearing Agencies have
provided this document in confidential Exhibit 3 to this advance
notice filing.
\32\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the IT
Architecture Policy (``ITA Policy''). The ITA Policy provides a set
of controls that must be followed to adequately address applicable
risks. The Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
\33\ The Clearing Agencies also have separately submitted a
request for confidential treatment to the Commission regarding the
New Initiatives Policy. The New Initiatives Policy provides the
governance and oversight structure for the Clearing Agencies to
bring initiatives to market timely and efficiently while minimizing
risk. The Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
\34\ Such reviews and decisions are based on high-level
architectural principles that may be applicable to more than one
application.
\35\ 17 CFR 242.1003, et seq.
---------------------------------------------------------------------------
The above-described governance process does not include a specific
set of criteria or thresholds for the ultimate determination on whether
an application should or should not be moved to Cloud--it is not a
formulaic decision. Rather, the Clearing Agencies employ a more
qualitative evaluation process that involves various reviews and
considers high-level architectural principles that may be applicable to
more than one application. However, at this time, none of the Core C&S
Systems that have been initially identified as part of the Cloud
Proposal, based on the preliminary criteria listed above, have
completed that more detailed governance review process. Given the
extensiveness of the process, it would not begin until after the
Clearing Agencies would receive no regulatory objection to this advance
notice.
Although the Clearing Agencies do not anticipate needing to deviate
from the proposed transition schedule for the selected Core C&S
Systems, the Clearing Agencies recognize that deviation may be
necessary, given that the more in-depth governance review process has
not completed and because risks could change over the proposed,
multiyear implementation period. For example, a deviation may be
necessary to address a business need or a change in industry or
regulatory requirements or standards. Regardless, any deviation would
follow the same detailed governance process, and the Clearing Agencies
would provide notice of such deviation to Commission staff, the reason
for the deviation, and how the proposed implementation schedule would
be updated to account for the deviation. Further, the Clearing Agencies
recognize that deviating from the proposed transition schedule would
necessitate a separate analysis to determine whether such deviation
could materially affect the nature or level of risk posed by each of
the Clearing Agencies.
Even though certain on-premises infrastructure components would be
decommissioned after applications are moved to Cloud, the Clearing
Agencies' private cloud, mainframe services, and data-center facilities
would remain available for no less than five more years to help
facilitate exit plans from Cloud that rely on an on-premises option.
However, to be clear, the on-premises option would not be available to
address short-term disruptions, where the Cloud is temporarily
unavailable. Management of such disruptions is discussed in Section
II.B, further below.
II. Expected Effects on Risks to the Clearing Agencies, Their
Participants, or the Market
Although the Clearing Agencies are not proposing to transition all
Core C&S Systems to Cloud for the reasons described in Sections I.A and
D, above, transitioning the proposed subset of Core C&S Systems from an
on-premises infrastructure supported by a consolidating industry, as
described in Section I.B.1, above, to a new Cloud Infrastructure
maintained by an industry-leading CSP provides numerous advantages, as
described in Sections I.B.2-4 and C, above. However, such transition is
not without risk, as discussed below.
A. Risks Presented by the Cloud Proposal
1. Concentration Risk
The Clearing Agencies appreciate that reliance on a single CSP for
hosting the subset of Core C&S Systems that are the subject of this
proposal creates concentration risk, particularly in the event of the
CSP choosing to terminate its services (i.e., commercial risk) or is
unexpectedly unavailable (i.e., operational risk). The Clearing
Agencies also appreciate that they would have some reliance on the CSP
to help meet certain regulatory obligations of the Clearing Agencies
(i.e., regulatory risk), thus introducing the familiar concept of
concentration risk in a relatively new context. However, concentration
risk exists today as the Clearing Agencies are dependent on a single
mainframe provider, a single database provider for the mainframe, and a
single virtualization provider for private cloud. Moreover, the
Clearing Agencies believe that they have adequately addressed these
risks, as discussed throughout Sections II.B.1-4., below.
2. Cloud Management Risk
Managing the applicable subset of Core C&S Systems hosted on a
Cloud Infrastructure presents different risks and challenges than
managing such systems hosted on-premises because many activities and
services previously provided by the Clearing Agencies would now be
provided by the CSP. For example, the Clearing Agencies would be
dependent upon the CSP for fulfilling all of its contractual
obligations, including security of the Cloud, proper capacity planning,
and protection of Cloud services from prolonged operational outages. As
such, overseeing the CSP becomes a critical activity to ensure the CSP
is delivering services that meet or exceed the Clearing Agencies'
requirements for operating those select Core C&S Systems. As discussed
in Sections II.B.1-4, below, the Clearing Agencies believe that they
have adequately addressed this risk.
[[Page 72134]]
B. Management and Mitigation of Identified Risks
1. Cloud Agreement
The Clearing Agencies believe that the Cloud Agreement, including
all its amendments and addendums, is a strong tool in helping to
effectively mitigate the commercial and regulatory risks borne from the
concentration risk, as described in Section II.A.1, above, as well as
risks in managing the CSP that would host the subset of selected Core
C&S Systems in the Cloud, as described in Section II.A.2, above.
Following is a summary of some of the key terms and conditions covered
in the agreement and how they help mitigate these risks.
i. Adequate Notice
Under the Cloud Agreement, the CSP may not unilaterally terminate
the relationship with the Clearing Agencies absent good cause or
without sufficient notice to allow the Clearing Agencies to transition
their applications elsewhere. Specifically, the CSP must provide an
extensive notice if it wishes to terminate the Cloud Agreement for
convenience or if it wishes to terminate an individual CSP service
offering or lower an existing SLA on which the Clearing Agencies
rely.\36\
---------------------------------------------------------------------------
\36\ The Cloud Agreement permits an exception to this sufficient
notice provision in the event the CSP must terminate the individual
service offering if necessary to comply with the law or requests of
a government entity or to respond to claims, litigation, or loss of
license rights related to third-party intellectual property rights.
In this event, the CSP must provide reasonable notice to the
Clearing Agencies of the termination of the individual service
offering. See Reg. SCI Addendum, Section 10 Termination. The
Clearing Agencies have provided this document in confidential
Exhibit 3 to this advance notice filing.
---------------------------------------------------------------------------
The CSP is permitted to terminate the Cloud Agreement with shorter
notice periods in the event of a critical breach \37\ or an uncured
material breach \38\ \39\ of the Cloud Agreement. In the highly
unlikely event that a critical breach or uncured material breach
occurs, the Clearing Agencies would have sufficient notice to shift
their operations away from the CSP. Contract provisions that allow a
party to terminate for uncured material breaches are designed to limit
the types of actions that could lead to contract termination and to
establish a period of time to resolve an aggrieved party's claim (often
30 days) followed by an additional extended period in which to
remediate the claim. This gives the parties time and incentive to
address the problem without having to resort to termination. In other
words, even if the CSP notifies the Clearing Agencies of an alleged
breach (material or critical), termination of services is not
immediate. Additionally, regardless of the need to shift operations
elsewhere--convenience or breach--the Cloud Agreement provides for the
parties to work together and for the CSP to provide professional
services to assist with such a shift.\40\
---------------------------------------------------------------------------
\37\ Critical breaches are material breaches (i) for which the
Clearing Agencies knew their behavior would cause a material breach
(such as a willful violation of Cloud Agreement terms); (ii) that
cause ongoing material harm to the CSP, its services, or its
customers (e.g., criminal misuse of the services); or (iii) for
undisputed non-payment under the Cloud Agreement. See Reg. SCI
Addendum, Section 10 Termination. The Clearing Agencies have
provided this document in confidential Exhibit 3 to this advance
notice filing.
\38\ Typically, a breach is considered material only if it goes
to the root of the agreement between the parties or is so
substantial that it defeats the object of the parties in making the
contract. See Reg. SCI Addendum, Section 10 Termination. The
Clearing Agencies have provided this document in confidential
Exhibit 3 to this advance notice filing.
\39\ See Reg. SCI Addendum, Section 10 Termination. The Clearing
Agencies have provided this document in confidential Exhibit 3 to
this advance notice filing.
\40\ See Reg. SCI Addendum, Section 11 Post-Termination
Services. The Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
---------------------------------------------------------------------------
The Clearing Agencies believe the risk of termination under the
above-discussed shorter notice period is minimal. In all cases of an
alleged breach, the CSP must notify the Clearing Agencies in writing
and provide time for them to cure the alleged breach (``Notice
Period'').\41\ With respect to an alleged material breach, which
requires the CSP to extend the Notice Period if the Clearing Agencies
demonstrate a good faith effort to cure the alleged material breach,
the Clearing Agencies would use the Notice Period to attempt to cure
the alleged material breach while also preparing to transition
elsewhere. As a result, it is highly unlikely that a critical breach or
a material breach would remain uncured beyond the Notice Period. If one
does remain uncured, however, the CSP can only terminate the rights or
accounts associated with the breach, not the entire Cloud Agreement;
\42\ meanwhile, and the Clearing Agencies would have ample notice to
shift operations to avoid a disruption to Core C&S Systems, if needed.
---------------------------------------------------------------------------
\41\ See Reg. SCI Addendum, Section 10 Termination. The Clearing
Agencies have provided this document in confidential Exhibit 3 to
this advance notice filing.
\42\ See Amendment 1, Section 8 Temporary Suspension, of the
Cloud Agreement. The Clearing Agencies have provided this document
in confidential Exhibit 3 to this advance notice filing.
---------------------------------------------------------------------------
As explained above, adequate notice under the Cloud Agreement plays
an important role in managing concentration risk by providing the
Clearing Agencies with advance warning of potential disruptions or
changes in the agreement or services thereunder, which would allow the
Clearing Agencies to take proactive measures in mitigating the
potential impact of commercial and regulatory risk, thereby reducing
concentration risk.
ii. Regulatory Compliance and CSP Oversight
The Clearing Agencies' transition to Cloud does not alter their
responsibility to maintain compliance with applicable regulations.
Consistent with FFIEC Guidance (as defined and discussed further
below), the Clearing Agencies' will continue to fully comply with all
applicable regulatory obligations, particularly Reg. SCI.\43\
---------------------------------------------------------------------------
\43\ Reg. SCI imposes certain information security and incident
reporting standards on the Clearing Agencies and requires them to
adopt an information technology governance framework reasonably
designed to ensure that ``SCI systems,'' and for purpose of
security, ``indirect SCI systems,'' have adequate levels of
capacity, integrity, resiliency, availability, and security. 17 CFR
242.1000 et seq.
---------------------------------------------------------------------------
The Clearing Agencies believe the combination of the following
would provide them with reasonable assurance that the proposed
transition to Cloud would enable them to continue to fully satisfy
their regulatory obligations, including Reg. SCI, thus helping to
mitigate the regulatory risk highlighted in Section II.A.1, above: (i)
the Cloud Agreement; (ii) the CSP's compliance programs as described in
its whitepapers \44\ and publicly available policies (e.g., its
Penetration Testing Policy),\45\ \46\ \47\ \48\ and user guides; (iii)
[[Page 72135]]
the CSP's SLAs; \49\ \50\ \51\ (iv) the CSP's Systems Organization
Controls reports (e.g., SOC 1, SOC 2, SOC 3) \52\ and International
Organization for Standardization (``ISO'') certifications (e.g., ISO
27001); \53\ (v) the CSP's size, scale, and ability to deploy extensive
resources to protect and secure its facilities and services; and (vi)
the CSP's commercial incentive to perform.
---------------------------------------------------------------------------
\44\ Supra note 25.
\45\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the
Operational & Technology Risk Technology Risk Management (``OTR
CS&TRM'') Procedure--Application Penetration Test which describes
the application penetration test procedures for the Clearing
Agencies' web applications and supports compliance with the
Information Systems Acquisition Policy, Development and Maintenance
Policy Security Control Standards, and Ethical Application
Penetration Testing (``EAPT'') Control Standards. The Clearing
Agencies have provided this document in confidential Exhibit 3 to
this advance notice filing.
\46\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the EAPT
Control Standards. The Clearing Agencies have provided this document
in confidential Exhibit 3 to this advance notice filing.
\47\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Information Security--Systems Acquisition Development and
Maintenance Policy and Control Standards, which governs the security
aspects of information systems acquisition, development, and
maintenance for DTCC and its subsidiaries. The Clearing Agencies
have provided this document in confidential Exhibit 3 to this
advance notice filing.
\48\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Information Security--Communications and Operations Policy and
Control Standards, which helps ensure the correct and secure
operation of information processing facilities. The Clearing
Agencies have provided this document in confidential Exhibit 3 The
Clearing Agencies have provided this document in confidential
Exhibit 3to this advance notice filing.
\49\ The Clearing Agencies have provided the CSP's SLAs in
confidential Exhibit 3 to this advance notice filing.
\50\ Amendment 2, Section 2.2 To the Service Level Agreements of
the Cloud Agreement provides that the CSP may change its SLAs from
time to time but must provide prior notice to the Clearing Agencies
before material reducing the benefits offered under the SLAs. The
Clearing Agencies have provided Cloud Agreement in confidential
Exhibit 3 to this advance notice filing.
\51\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Legal Review of Third Party Vendor Contracts Policy, which (1)
defines the scope of Vendor Contracts, (2) clarifies what agreements
fall outside the scope and are excluded from the definition of
Vendor Contracts, (3) details the process the Clearing Agencies
follow when receiving requests to review Vendor Contracts and
related materials from CPS Contracts, and (4) establishes the
requirements around the creation, maintenance, update, review, and
use of contract templates and negotiation guidelines for third party
relationships. The Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
\52\ The FFIEC Guidance provides that the Clearing Agencies may
obtain SOC reports, other independent audits, or ISO certification
reports to gain assurance that the CSP's controls are operating
effectively. See FFIEC, Security in a Cloud Computing Environment at
7. The Clearing Agencies review the CSP's SOC-2 on an annual basis.
\53\ The CSP has certifications for the following frameworks:
NIST, Cloud Security Alliance, Control Objectives for Information
and Related Technology (``COBIT''), ISO, and the Federal Information
Security Management Act (``FISMA'').
---------------------------------------------------------------------------
Moreover, as noted in Section II.B.ii., above, oversight of the CSP
relationship and services has become a standing practice of the
Clearing Agencies to ensure that the CSP is meeting or exceeding its
contractual obligations, including helping the Clearing Agencies
demonstrate their regulatory compliance. Such oversight, which also
helps mitigate the cloud management risk raised in Section II.A.2,
above, would include a strong relationship between the CSP and the
Clearing Agencies, including between their senior management. Within
the Cloud Agreement itself, there are established obligations on the
CSP to provide the Clearing Agencies' information necessary for the
Clearing Agencies to satisfy certain compliance and regulatory
requirements, particularly Reg. SCI. For example, the Cloud Agreement
obligates the CSP to provide the Clearing Agencies with immediate
notification where a systems intrusion by an unauthorized party or a
systems disruption is suspected.\54\ The agreement also provides for
detailed quarterly briefing meetings between the Clearing Agencies and
the CSP, during which the Clearing Agencies would be provided
information on and could review service level performance, material
systems changes, capacity management, SLA updates, and important
security notices.\55\
---------------------------------------------------------------------------
\54\ See Reg. SCI Addendum, Sections 8.1 Systems Intrusion
Notification and 4 Briefing Meetings. The Clearing Agencies have
provided this document in confidential Exhibit 3 to this advance
notice filing.
\55\ Id.
---------------------------------------------------------------------------
The Cloud Agreement permits the Clearing Agencies to perform an
annual review of the CSP's documentation and services to gain comfort
that the CSP is meeting its contractual requirements and that the
notification procedures are in place to allow the Clearing Agencies to
meet their regulatory requirements, particularly Reg. SCI. The
agreement also allows a regulator of the Clearing Agencies to receive
information about the Clearing Agencies' usage of the CSP services, and
it allows the regulator to perform its own on-site review, if
requested.\56\
---------------------------------------------------------------------------
\56\ See Reg. SCI Addendum, Sections 3 Customer Right of Access
and Audit and 4 Briefing Meetings. The Clearing Agencies have
provided this document in confidential Exhibit 3 to this advance
notice filing.
---------------------------------------------------------------------------
2. Cloud Architecture
To mitigate operational risk associated with the concentration risk
from relying on a single CSP, the Clearing Agencies would architect the
Cloud Infrastructure hosting their Core C&S Systems to be highly
resilient, improving the availability of such systems and related
Clearing Agency services during any degradation in CSP services:
Use of multiple availability zones per region. The
Clearing Agencies would use at least three availability zones, in each
of the two CSP regions, with each availability zone made up of multiple
data centers.
Multi-regions. In the event of a primary region outage,
the Clearing Agencies would recover in the secondary region. Out-of-
region recovery would be tested annually by the Clearing Agencies, and
a primary/secondary (i.e., hot/warm) model would be used to ensure
continuous data replication and recovery is achieved.\57\ Recovery
exercises of non-Core C&S Systems currently hosted in cloud demonstrate
the ability to recover applications within required recovery time
objectives, including meeting a 2-hour recovery time objective for
relevant applications in the event of an out-of-region recovery.
---------------------------------------------------------------------------
\57\ See Reg. SCI Addendum, Section 5 Customer Testing of CSP
Systems. The Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
---------------------------------------------------------------------------
Multi-node, high availability clusters across availability
zones. Clusters (i.e., three or more servers or nodes) protect against
local hardware and service failures providing uninterrupted operations.
Each cluster would be distributed across three availability zones.
Clusters synchronously replicate data across all nodes to protect
against data loss and provide continuous availability.
Static stability and static capacity models. Static
capacity would be pre-provisioned for compute, storage, and memory for
applications based on capacity stress testing results and capacity
requirements. The Clearing Agencies would pre-provision capacity needed
for applications and services and would not rely on capacity on-demand
models, thus reducing the risk of running out of capacity.
Exit plans. The Clearing Agencies' existing policies
require that all applications hosted in Cloud have documented exit
plans, with each plan updated annually.\58\ The Clearing Agencies'
Cloud architecture also reduces ``vendor lock-in'' by using
capabilities such as ``containers'' \59\ that can exist in both the
public and private cloud, where appropriate and applicable. For the
foreseeable future, the Clearing Agencies plan to continue to own or
lease private data center space to host private cloud and mainframe
capabilities. The Clearing Agencies private, on-premises data centers
help enable a long-term exit plan from Cloud, if needed. However, such
data centers would not be a means to address a short-term incident at
the CSP. Additionally, for the second CSP that the Clearing Agencies
already have contracted and connected with for hosting non-Core C&S
Systems, they are now working on the contractual and operational
requirements that would be necessary to possibly host Core C&S
[[Page 72136]]
Systems in its Cloud to further enable exit plans from the primary CSP.
---------------------------------------------------------------------------
\58\ Supra note 29.
\59\ A container is a standard unit of software that packages up
code and all its dependencies, so the application runs reliably from
one computing environment to another (e.g., public and private
clouds).
---------------------------------------------------------------------------
Regional Isolation Architecture. A cross-regional outage
is highly unlikely at the CSP, as the CSP has designed and implemented
a series of controls to ensure that defects cannot be introduced to
more than a single region at a time.\60\ Services are regionally
isolated with a single exception--the IAM service. The IAM service is
not regionally isolated and depends on a single region. If the primary
region for the IAM service fails, the service will continue to operate
but as read-only. To mitigate this risk, the Clearing Agencies would
architect applications and infrastructure services in such a manner
that they would not require updates (i.e., writes) to the IAM service
in order to rotate out of region.
---------------------------------------------------------------------------
\60\ The CSP owns the control and has provided documentation of
the control to the Clearing Agencies.
---------------------------------------------------------------------------
In summary, cloud architecture helps mitigate operational risk
borne from concentration risk, as raised in Section II.A.1, above, by
providing resilient infrastructure, scalable resources, robust security
measures, and disaster recovery capabilities, all of which assist in
minimizing the impact of disruptions.
3. Standing Risk Management Practices
The Clearing Agencies' standing risk management practices also help
minimize operational risk by systemically identifying, assessing,
mitigating, monitoring, and responding to risk. For example, the
Clearing Agencies have considered the possibility of the CSP being
completely and unexpectedly unavailable, whether due to technical
issues or other reasons. The parallel risk exists today with respect to
the Clearing Agencies' existing infrastructure. Just like with the CSP,
it is possible that the Clearing Agencies' two existing data centers--
one primary and one backup--become completely and unexpectedly
unavailable. In fact, it is more likely that those two data centers
become unavailable than the CSP's data centers because the CSP has so
many more data centers for each availability zone, in both its primary
and secondary regions, with each data center, not just the associated
region or availability zone, having its own physical infrastructure,
staff, power, backup power, mechanical services, and network
connectivity, as discussed in Section I.B.2, above. Even for the CSP's
IAM service that runs cross regions, the applications in each region
operate off read-only versions of the IAM roles and responsibilities,
such that loss of the primary would not affect operation of those
applications. Nevertheless, to help manage a crisis event, such as the
Clearing Agencies' or the CSP's data centers becoming unavailable, the
Clearing Agencies have standing risk management plans and practices
already in place, as described below.\61\
---------------------------------------------------------------------------
\61\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the
Operational Response Capabilities Matrix. The Clearing Agencies have
provided these documents in confidential Exhibit 3 to this advance
notice filing.
---------------------------------------------------------------------------
In the very unlikely event of an unexpected single- or multi-region
outage in which the Clearing Agencies operate, or a complete and
unexpected CSP outage, the Clearing Agencies would initiate the
existing Major Incident Management (``MIM'') process, which is an
existing process that involves evaluating the technical impact of the
event, and if the event is deemed to have a material impact to the
business, the Business Incident Management System (``BIMS'') \62\ would
be activated. Depending on the severity of the event, the DTCC Global
Business Continuity and Resilience (``BCR'') Policy would provide a
predictable structure to be utilized during crises and could be
leveraged to address, respond to, and manage an outage.\63\ In addition
to internal risk management practices, the Clearing Agencies have plans
to help address various outage scenarios and the potential effects of
an outage.\64\
---------------------------------------------------------------------------
\62\ MIM is part of the IT organization that manages technology
specific incidents at the Clearing Agencies that are typically
resolved at the application or hardware level with support from the
appropriate subject matter experts (``SMEs''). Incidents that have a
business impact are escalated to BIMS and appropriate SMEs are added
to manage the impact, which includes Business Continuity and
Resilience. BIMS participants can request the Crisis Management Team
be activated if the incident requires discussion or has escalated to
a potential disaster that may require a declaration of disaster.
\63\ The Clearing Agencies are taking into consideration the
forthcoming requirements of adopted and effective Rule 17ad-25(i)
under the Exchange Act, 17 CFR 240.17ad-25(i), and anticipate that
the Clearing Agencies' approach in managing the risk presented by a
CSP outage for Core C&S Systems would be consistent with those
requirements.
\64\ For example, there is an existing plan to manage a Fedwire
protracted outage. A Fedwire protracted outage is an interruption or
outage of Federal Reserve Bank hardware or software that prevents
the bank from processing payment orders online and that is not
expected to be resolved before the bank's next Fedwire Funds Service
Funds Transfer Business Day. In the event of such an outage, the
Clearing Agencies will assess the situation and employ, as needed
and applicable, the steps outlined in the BCR Policy and Standards,
the Federal Reserve Banks Operating Circulars (see, e.g., Operating
Circular No. 6, available at https://www.frbservices.org/binaries/content/assets/crsocms/resources/rules-regulations/070123-operating-circular-6.pdf), and any other regulatory guidance.
---------------------------------------------------------------------------
The BCR Policy and Standards is structured to employ existing DTCC
and Clearing Agency teams and committees, which become the tactical
leadership to react, respond, and manage a crisis situation.\65\ The
teams are comprised of the following:
---------------------------------------------------------------------------
\65\ The Clearing Agencies have established a list of situations
that are covered under the BCR Policy and Standards, any of which
could escalate to a disaster and trigger use of the Standards. The
technology events include (i) infrastructure outage, (ii) external
hosting provider service outage, and (iii) loss of logical access to
a Clearing Agency facility. The Clearing Agencies have separately
submitted a request for confidential treatment to the Commission
regarding the BCR Policy and Standards which define the governance
structure, high-level roles and responsibilities, and the framework
for business continuity and resilience processes at the Clearing
Agencies. The Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
---------------------------------------------------------------------------
Crisis Management Team. Comprised of the Management
Committee, site General Managers, Head of the Board Risk Committee,\66\
and other SMEs, as needed.
---------------------------------------------------------------------------
\66\ The Board Risk Committee is a Board level committee
established by the Boards of the Clearing Agencies to assist their
respective Boards in fulfilling their responsibilities for oversight
of risk management activities at the Clearing Agencies. This
includes oversight of credit, market, liquidity, operational, and
systemic risks.
---------------------------------------------------------------------------
Crisis Response Teams.
[cir] Business Continuity Coordinators and Plan Approvers--These
are individuals who manage business continuity at a plan level.
[cir] Fair and Orderly Markets Groups--These are crisis teams
comprised of internal stakeholders and top executives from external
firms deemed necessary to ensure a fair and orderly market. They would
be activated (based on impact to the legal entity) to gather
information during a large systemic event when operational coordination
is required with clients and the sector.
[cir] IT Management Team--Comprised of Information Technology
managing directors and SMEs.
[cir] Management Risk Committee--Comprised of senior members across
the enterprise.
[cir] Senior Site Management Team (``SSMT'')--Each DTCC office with
a facility level resilience plan (``FLRP'') has an SSMT, that is
comprised of senior leadership from the site.
[cir] Site Assessment Team (``SAT'')--Sites with an FLRP have a SAT
that responds to site-specific events. This team is comprised of a
primary/back-up site General Manager and representatives from BCR, IT,
Workplace Design and Service, Global Security Management, and Human
Resources. A Data Center Services representative also is added for
sites that have a data center.
[[Page 72137]]
[cir] MIM and BIMS Teams--Part of the IT organization that manages
technology specific and are typically resolved at the application or
hardware level with support from the appropriate SMEs.
Crisis Communication Team. The Crisis Communication Team
is comprised of officer-level members from Marketing and Communication,
Human Resources, General Counsel's Office, and Regulatory Relations, as
well as members of their staffs, as applicable.
The Clearing Agencies believe that these standing risk management
practices are key to managing the operational risk borne from
concentration risk outlined in Section II.A.1, above, by helping to
promote proactive risk management culture, enhancing operational
resilience, and enabling the Clearing Agencies to better navigate
uncertainties and maintain business continuity.
4. Industry Standards for Cloud Management
i. Cloud Management: Federal Financial Institutions Examination Council
Cloud Computing Guidance (``FFIEC'')
On April 30, 2020, FFIEC \67\ issued a joint statement to address
the use of Cloud computing services and security risk management
principles in the financial services sector (``FFIEC Guidance'').\68\
While the FFIEC Guidance does not contain regulatory obligations, it
highlights risk management practices that financial institutions should
adopt for the safe and sound use of Cloud computing services in five
broad areas (``FFIEC Risk Management Categories''): Governance, Cloud
Security Management, Change Management, Resilience and Recovery, and
Audit and Control Assessment. As discussed below, the Clearing Agencies
would implement practices consistent with the FFIEC Risk Management
Categories for Core C&S Systems operated in Cloud to help address cloud
management risk, as highlighted in Section II.A.2, above, by providing
frameworks, guidelines, and best practices, that enhance transparency,
reliability, and security.
---------------------------------------------------------------------------
\67\ FFIEC is a formal interagency body empowered to prescribe
uniform principles, standards, and report forms for the federal
examination of financial institutions by the Board of Governors of
the Federal Reserve System, the Federal Deposit Insurance
Corporation, the National Credit Union Administration, the Office of
the Comptroller of the Currency, and the Consumer Financial
Protection Bureau, and to make recommendations to promote uniformity
in the supervision of financial institutions.
\68\ Available at https://www.ffiec.gov/press/pr043020.htm.
---------------------------------------------------------------------------
(a) Governance
The Clearing Agencies and the CSP rely on a shared responsibility
model that differentiates between security ``of'' the Cloud and
security ``in'' the Cloud.\69\ This model is not specific to the
agreement between the Clearing Agencies and the CSP; rather, it is a
more universally followed model for public cloud services. Under the
model, the CSP maintains sole responsibility and control over the
security and resiliency ``of'' the Cloud, and their customers are
responsible for the security and resiliency ``in'' the Cloud (i.e.,
security and resiliency of hosted applications and data). This means
that the Clearing Agencies must manage their own application
architectures, data backups, change management controls, network
configurations within applications, and response to application
failures. In addition, the Clearing Agencies must manage their own data
usage and data-at-rest encryption configuration, IAM access policies
and roles, operating system upkeep, security group configurations, and
network traffic encryption in transit configurations. The Clearing
Agencies also manage how they place workloads onto the CSP's platform.
---------------------------------------------------------------------------
\69\ ``Shared responsibility'' conveys the responsibility of the
Clearing Agencies and the CSP vis-[agrave]-vis each other from a
business operations perspective. It does not mean that the CSP has
taken on or that the Clearing Agencies have relinquished any of
their Reg. SCI compliance requirements.
---------------------------------------------------------------------------
Meanwhile, the CSP must manage backend hardware services for
Compute, Storage, Networking, database, and global architectures such
as regions, availability zones, data centers, power, and HVAC, as well
as backend security services that protect core infrastructures. The CSP
manages the underlying infrastructure and upkeep, so that the Clearing
Agencies (and other customers) can place workloads on the CSP platform
with proper security and separation without having to manage these
traditional data center tasks. The Clearing Agencies review the CSP's
policies and procedures for these functions during the quarterly
reviews and during annual risk assessments.
When looking more closely at hardware management, the Clearing
Agencies believe there are benefits in how the CSP manages hardware for
Cloud compared to how the Clearing Agencies manage hardware for their
own data centers. For example, with on-premises data centers, the
Clearing Agencies must oversee a multifaceted supply chain, involving
many vendors to obtain and administer physical Compute, Storage, and
Network capacity. Delivery times may fluctuate, and scarcities can
affect project outcomes, as seen during the Covid-19 pandemic. In
contrast, with the proposed Cloud Infrastructure, the CSP controls the
hardware supply chain and even partakes in key areas of the
manufacturing process to circumvent typical problems such as chip
shortages. Moreover, the Clearing Agencies get to review the CSP's
equipment forecast for each upcoming quarter, affording the Clearing
Agencies the opportunity to address potential supply chain
difficulties, if any, without jeopardizing their access to adequate
capacity, by leveraging capabilities such as reserved capacity.
Altogether, the Clearing Agencies believe the CSP's management of Cloud
hardware will be a benefit to them.
The CSP would perform its own risk and vulnerability assessments of
the CSP infrastructure on which the Clearing Agencies would run their
Core C&S Systems. In published documentation and in meetings conducted
with the CSP, the CSP asserts that it maintains an industry-leading
automated test system, with strong executive oversight, and conducts
full-scope assessments of its hardware, infrastructure, internal
threats, and application software. The CSP asserts that it has an
aggressive program for conducting internal adversarial assessments
(``Red Team'') designed not only to evaluate system security but also
the processes used to monitor and defend its infrastructure. The CSP
also uses external, third-party assessments as a cross-check against
its own results and to ensure that testing is conducted in an
independent fashion. Pursuant to the CSP's documentation, results of
these processes are reviewed weekly by the CSP's Chief Information
Security Officer and the Chief Executive Officer with senior CSP
leaders to discuss security and action plans.\70\
---------------------------------------------------------------------------
\70\ The CSP does not provide assessment results to its
customers, as doing so would constitute a breach of generally
accepted security best practices. Instead, the CSP provides its
customers with industry-standard reports--such as SOC2 Type II--
prepared by an independent third-party auditor to provide relevant
contextual information to its customers. The CSP also conducts
periodic audit meetings specifically designed to discuss security
concerns with its customers discussed later during the ``CSP Audit
Symposium.'' Additionally, the Clearing Agencies have certain audit
rights (pursuant to Section 3 Customer Rights of Access and Audit of
the Reg. SCI Addendum) to review information about the nature and
scope of the CSP's vulnerability management program.
---------------------------------------------------------------------------
The Clearing Agencies have the responsibility to perform risk
assessments and technical security testing, including control
validation, penetration testing, and adversarial
[[Page 72138]]
testing of their applications running on the Cloud Infrastructure. This
includes testing of the application interface layer of some CSP
provided services such as storage and key management.
As mentioned, the Clearing Agencies' testing includes assessing the
configuration of the CSP provided services. The Clearing Agencies'
Technology Risk Management staff would work with the Clearing Agencies'
Information Technology staff to ensure that the CSP tools are
configured to appropriately manage and mitigate potential sources of
risk and will assess the effectiveness of those configurations.\71\ The
Technology Risk Management staff has developed an application, Cloud
Governance Insights (``CGI''), to continuously monitor all Cloud
Infrastructure for alignment to security baselines and configurations
best practices.\72\ The CGI dashboard allows Information Technology and
Technology Risk Management staff to understand the environment risk
posture and reporting of key risk indicators (``KRIs''). The Clearing
Agencies' Red Team would operate freely ``in the Cloud,'' attempting to
subvert or circumvent controls.\73\ The testing would include probing
of the CSP provided services to look for weaknesses in the Clearing
Agencies' deployment of those tools.
---------------------------------------------------------------------------
\71\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the OTR TRM
Core Process Procedure--Security Configuration Violation Rules,
which is used to manage enterprise information security risk by
ensuring a consistent configuration violation scoring process that
provides timely identification of configuration violations and their
severity ratings. The Clearing Agencies have provided this document
in confidential Exhibit 3 to this advance notice filing.
\72\ CGI is the Clearing Agencies' internally developed solution
to perform Cloud Security Posture Management and assess Cloud
Infrastructure compliance against TRM Control Standards and Security
Baselines in near real-time.
\73\ Supra note 47.
---------------------------------------------------------------------------
Technology Risk Management staff would routinely report test
results to the Technology Risk Management Steering Committee and the
Management Risk Committee, appropriate functional Operations and
Information Technology management, senior management, and the Board of
Directors of the Clearing Agencies.74 75 Automated
vulnerability scanning reports, source code analysis, and results of
specific assessments would be risk-rated and assigned a priority for
remediation in accordance with Clearing Agency Information Security
Program requirements.76 77
---------------------------------------------------------------------------
\74\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Information Security--Information Security Management Policy and
Control Standards, which defines the roles, responsibilities, and
accountabilities for DTCC's security practices and organization
structure suited to protect DTCC's critical systems and business
assets. Information Security Management evaluates DTCC's information
security program's overall effectiveness, and establishes,
maintains, communicates, and periodically reassesses information
security policies and a comprehensive information security program
that are approved by management. The Clearing Agencies have provided
this document in confidential Exhibit 3 to this advance notice
filing.
\75\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Information Security--Risk Management Policy and Control Standards,
which provides (i) requirements for establishing, implementing,
maintaining, and continually improving the information risk
management program, (ii) a governance structure utilized for the
escalation of information risks to an appropriate management level,
and (iii) organizational roles and responsibilities for the delivery
of comprehensive information security and technology risk management
program. The Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
\76\ Supra note 46.
\77\ Supra note 47.
---------------------------------------------------------------------------
Management and oversight of the Cloud implementation follows the
Clearing Agencies' standard governing principles for large information
technology projects.\78\ To maintain accountability over the CSP's
performance, regular reporting to the Boards of the Clearing Agencies
by senior management is essential and required, pursuant to the DTCC
Third Party Risk Procedures.\79\ Such reporting helps ensure that
senior management takes appropriate actions to address significant
performance deterioration, changing risks, or material issues
identified through ongoing monitoring, thereby helping to ensure
proactive risk management and continuous improvement.\80\ The Clearing
Agencies' Board of Directors has established a Technology and Cyber
Committee to assist the Board of Directors in overseeing information
technology and cybersecurity strategy and capabilities.
---------------------------------------------------------------------------
\78\ Supra note 32.
\79\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Third Party Risk Procedures, which establish the standards and
practices to be used by certain business line departments and/or
functional units to manage the potential risks associated with
engaging with an external service provider. The Clearing Agencies
have provided these documents in confidential Exhibit 3 to this
advance notice filing.
\80\ Supra note 62.
---------------------------------------------------------------------------
Information Technology and the Enterprise Program Management Office
(``EPMO'') are responsible for the identification, management,
monitoring, and reporting on the risks associated with the
modernization and migration of applications to Cloud. To that end,
reports on the status and progress of these efforts are reported to
applicable Clearing Agency committees based on escalation criteria in
the EPMO Procedure.\81\ These reports include overall risk and issue
summaries and analysis of key risk indicators for the migration of
applications to the public cloud.
---------------------------------------------------------------------------
\81\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the
Enterprise Program Management Office Procedure, which outlines the
minimum standards and practices the Clearing Agencies use to manage,
measure, and monitor the performance of key processes aligned to the
Enterprise Program Management Office Policy. The Clearing Agencies
have provided these documents in confidential Exhibit 3 to this
advance notice filing.
---------------------------------------------------------------------------
Finally, the Clearing Agencies' Internal Audit Department
(``IAD''), as the independent third line of defense, is responsible for
assessing and challenging the firm's control environment and risk
management and control frameworks, which include those related to the
Cloud, including, but not limited to, security controls and
configurations, and report the results of those assessments to
management and the Audit Committee of the Board.\82\
---------------------------------------------------------------------------
\82\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the Internal
Audit Department Policies and Procedures, which contains the
policies and guidance that direct the activities of the Clearing
Agencies' IAD. The Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
---------------------------------------------------------------------------
Ultimately, there is no primary/secondary relationship, as the
Clearing Agencies and the CSP each have their own set of
responsibilities which, when combined, address the entire risk space.
(b) Cloud Security Management
The Clearing Agencies have established a robust Cloud security
program to (i) manage the security of the Core C&S Systems that would
be running on the Cloud Infrastructure hosted by the CSP, and (ii)
assess and monitor the CSP management of security of the Cloud
Infrastructure that it operates. The security program is built upon
Clearing Agency Information Security Policies and Control Standards
that establish requirements that apply to any technology system as well
as any tool that provides technology services.83 84 85 86
Below describes
[[Page 72139]]
elements of the Clearing Agencies' Cloud security management in the
areas of (i) IAM controls (i.e., determining who is accessing the
systems, granting access to the applications, and then controlling what
information they can access); (ii) security governance and controls for
sensitive data; (iii) security configuration, provisioning, logging,
and monitoring; and (iv) security testing.
---------------------------------------------------------------------------
\83\ Supra notes 46-47, 73-74.
\84\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Information Security--Asset Security Policy and Control Standards,
which governs management of security for the information assets of
the Clearing Agencies. The Clearing Agencies have provided this
document in confidential Exhibit 3 to this advance notice filing.
\85\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Information Security--Monitoring and Incident Management Policy and
Control Standards, which governs DTCC's information security
monitoring and incident management and specifies requirements for
(i) detecting unauthorized information processing activities, (ii)
ensuring information security events and weaknesses associated with
information systems are communicated in a manner allowing timely
corrective action to be taken, and (iii) ensuring a consistent and
effective approach is applied to the management of information
security incidents. The Clearing Agencies have provided this
document in confidential Exhibit 3 to this advance notice filing.
\86\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Information Security--Asset Access Control Policy and Standards,
which governs management of security for the information assets of
the DTCC and its subsidiaries. The Clearing Agencies have provided
this document in confidential Exhibit 3 to this advance notice
filing.
---------------------------------------------------------------------------
(1) Network and IAM Controls
The Clearing Agencies recognize that robust network security
configuration and IAM would provide reasonable assurance that users--
including Clearing Agency employees, market participants, and service
accounts for systems \87\--are granted least-privileged access \88\ to
the network, applications, and data in the Cloud. The Clearing Agencies
would use third-party tools to automate appropriate role-based access
to the Core C&S Systems running in the Cloud. By enforcing strict
separation of duties and least-privileged access for infrastructure,
applications, and data, the Clearing Agencies would protect the
confidentiality, availability, and integrity of the data in the Cloud.
---------------------------------------------------------------------------
\87\ Service accounts are non-interactive accounts that permit
application access to support activities such as monitoring,
logging, or backup. Service accounts are also used for machine-to-
machine communications.
\88\ Least-privileged access means users only have the
permission needed to perform their work, and no more.
---------------------------------------------------------------------------
The Clearing Agencies have established IAM requirements that build
upon the least-privileged model.\89\ As part of the IAM program, all
users must be assigned an appropriate enterprise identification.
Additionally, the Clearing Agencies have established Highly Privileged
Access Management capabilities and policies to further restrict highly
privileged access to be used only in pre-determined scenarios that must
be tied to a change, incident, request, or release records.\90\
---------------------------------------------------------------------------
\89\ Supra note 85.
\90\ Id.
---------------------------------------------------------------------------
Cloud users would be granted access to systems via a standardized
and auditable approval process. The user identifications and granted
access would be managed through their full lifecycle from a centralized
IAM system maintained and administered by the Clearing Agencies. Role-,
attribute-, and context-based access controls would be used as defined
by internal standards \91\ consistent with industry recommended
practices to promote the principles of least-privileged access and
separation of duties.\92\
---------------------------------------------------------------------------
\91\ Id.
\92\ (1) ISO/IEC 27002:2013--Information technology--Security
techniques--Code of practice for information security controls; (2)
NIST Cybersecurity Framework (CSF) Version 1.1; (3) NIST Special
Publication 800-53 Revision 4--Security and Privacy Controls for
Federal Information Systems and Organizations.
---------------------------------------------------------------------------
The Clearing Agencies would use and manage third-party tools not
otherwise provided by nor managed by the CSP for single sign-on and
least-privileged access.\93\ The network also would include hardware
and software to limit and monitor ingress and egress traffic, encrypt
data in transmission, and isolate traffic between the Clearing Agencies
and the Cloud.\94\ Since the Clearing Agencies would continue to
provide cryptographic services, including key management, the CSP and
other network service providers would not be able to decrypt Clearing
Agency data either at rest or while in transit.
---------------------------------------------------------------------------
\93\ For example, the Clearing Agencies currently use Bravura
Security Privileged Access Management (a/k/a PAM) for highly
privileged access management.
\94\ Supra notes 47, 84-85.
---------------------------------------------------------------------------
(2) Security Governance and Controls for Sensitive Data
The Clearing Agencies' data governance framework that would apply
to Cloud implementation is identified within the Clearing Agency
Information Security Policies and Control Standards.\95\ The Clearing
Agency Information Security Policies and Control Standards address data
moving between systems within the Cloud as well as data transiting and
traversing both trusted and untrusted networks. For example, the
Clearing Agencies' Information Security Policies and Control Standards
require a system or Software as a Service (i.e., SaaS) to (i) store
data and information, including all copies of data and information in
the system, in the U.S., throughout its lifecycle; (ii) be able to
retrieve and access the data and information throughout its lifecycle;
(iii) for data in the system hosted in the Cloud, encrypt such data
with key pairs kept and owned by the Clearing Agencies; (iv) comply
with U.S. federal and applicable state data regulations regarding data
location; and (v) enable secure disposition of non-records in
accordance with the Clearing Agencies' Information Governance
Policy.\96\
---------------------------------------------------------------------------
\95\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC Data
Risk Management Policy, which establishes requirements for the sound
management of data risk across the data lifecycle. The Clearing
Agencies have provided this document in confidential Exhibit 3 to
this advance notice filing.
\96\ Supra note 85.
---------------------------------------------------------------------------
Furthermore, the Clearing Agencies' policies establish the overall
data governance framework applied to the management, use, and
governance of Clearing Agency information to include digital
instantiations, storage media, or whether the information is located,
processed, stored, or transmitted on the Clearing Agencies' information
systems and networks; public, private, or hybrid cloud infrastructures;
third-party data centers and data repositories; or SaaS
applications.\97\ The Information Classification and Handling Policy
\98\ classifies the Clearing Agencies' information into categories.
System owners of technology that enable classification and/or labeling
of information are responsible for ensuring the correct classification
level is designated in the system of record and the applicable controls
are enforced. All information requiring disposal is required to be
disposed of securely in accordance with all applicable procedures.
Sensitive data must be handled in a manner consistent with requirements
in the Information Classification and Handling Policy.
---------------------------------------------------------------------------
\97\ Supra note 46.
\98\ Supra note 83.
---------------------------------------------------------------------------
The Clearing Agencies would implement key security components,
namely ubiquitous authentication, and encryption via use of an
automated public key infrastructure, coupled with responsive, highly
available authentication, authorization tools, and key management
strategies to ensure appropriate industry standard security controls
are in place for sensitive data both in transit to and at rest in
Cloud.\99\
---------------------------------------------------------------------------
\99\ Supra note 47.
---------------------------------------------------------------------------
External connectivity to the Clearing Agencies' systems hosted by
the CSP would be provided, as it is now, through dedicated private
circuits or over encrypted tunnels through the internet. These network
links also would have additional security controls, including
encryption during transmission and restrictions on network access to
and
[[Page 72140]]
from the Cloud. Additionally, the Clearing Agencies would use dedicated
redundant private network connections between the Clearing Agencies
data centers and the CSP infrastructure. The Clearing Agencies
currently maintains two data centers and will do so in the near term to
provide redundant, geographically diverse connectivity for market
participants.
All network communications between the Clearing Agencies and the
Cloud Infrastructure would rely on industry standard encryption for
traffic while in transit. Data at rest would be safeguarded through
pervasive encryption. The Clearing Agencies' Encryption Standards \100\
describe requirements for implementation of the minimum required
strengths, encryption at rest, and cryptographic algorithms approved
for use in cryptographic technology deployments across the Clearing
Agencies. All Clearing Agency identifying data is encrypted in transit
using industry standard methods. The Key Management Service (``KMS'')
Strategy \101\ dictates that all CSP endpoints support HTTPS for
encrypting data in transit. The Clearing Agencies also secure
connections to the endpoint service by using virtual private computer
endpoints and ensures client applications are properly configured to
ensure encapsulation between minimum and maximum Transport Layer
Security versions pursuant to the Clearing Agencies' encryption
standard.
---------------------------------------------------------------------------
\100\ Supra note 91.
\101\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Information Security--Public Key Infrastructure Policy and Control
Standards, which governs the public key infrastructures implemented
and used within DTCC and its subsidiaries. The Clearing Agencies
have provided this document in confidential Exhibit 3 to this
advance notice filing.
---------------------------------------------------------------------------
The Clearing Agencies would have exclusive control over the
encryption keys; only Clearing Agency authorized users and approved
third parties would be able to access Clearing Agency data. The CSP
systems and staff would not have access to the Clearing Agencies'
certificates or keys.\102\ The Clearing Agencies would be responsible
for the application architecture, software, configuration, and use of
the CSP services, and for the maintenance of the environment, including
ongoing monitoring of the application environment to achieve the
appropriate security posture. To do this, the Clearing Agencies would
follow (i) existing security design and controls; (ii) Cloud-specific
information security controls defined in the Clearing Agencies'
Information Security Policies and Control Standards; \103\ and (iii)
regulatory compliance requirements detailed in sources or information
technology practices that are widely available and issued by an
authoritative body that is a U.S. governmental entity or agency
including NIST-CSF,\104\ COBIT,\105\ and the FFIEC Guidelines.\106\
---------------------------------------------------------------------------
\102\ Certificate management is the process of creating,
monitoring, and handling digital keys (certificates) to encrypt
communications.
\103\ Supra note 91.
\104\ NIST Cybersecurity Framework Version 1.1.
\105\ COBIT 2019 Framework: Governance and Management
Objectives.
\106\ FFIEC Information Technology Examination Handbook--
Information Security (September 2016).
---------------------------------------------------------------------------
The Clearing Agencies would use third-party and custom developed
tools for CSP security compliance monitoring, security scanning, and
reporting. Alerts and all API-level actions would be gathered using
both CSP provided, Clearing Agency developed, and third-party
monitoring tools. The CSP provided monitoring tool would be enabled by
default at the organization level to monitor all CSP services activity.
Centralized logging provides near real-time analysis of events and
contains information about all aspects of user and role management,
detection of unauthorized, security relevant configuration changes, and
inbound and outbound communication.
As discussed just above, the Clearing Agencies would use a KMS
Strategy to encrypt data in transit and at rest in the Cloud. KMS is
designed so that no one, including CSP employees, can retrieve customer
plaintext keys and use them. The Federal Information Processing
Standards 140-2 validated Host Security Modules (``HSMs'') in KMS
protect the confidentiality and integrity of Clearing Agency customer
keys.\107\ Customer plaintext keys are not written to disk and are only
used in protected, volatile memory of the HSMs for the time needed to
perform the customer's requested cryptographic operation. KMS keys are
not transmitted outside of Cloud regions in which they were created.
Updates to the KMS HSM firmware will be controlled by quorum-based
access control \108\ that is audited and reviewed by an independent
group within the CSP.
---------------------------------------------------------------------------
\107\ The HSM is analogous to a safe to which only the Clearing
Agencies have the combination and the ability to access the keys to
locks stored within.
\108\ A quorum-based access mechanism requires multiple users to
provide credentials over a fixed period in order to obtain access.
---------------------------------------------------------------------------
(3) Security Configuration, Provisioning, Logging, and Monitoring
Automated delivery of business and security capability via the use
of ``Infrastructure as Code'' and continuous integration/continuous
deployment pipeline methods would permit security controls to be
consistently and transparently deployed on-demand. The Clearing
Agencies would provision Cloud Infrastructure using pre-established
system configurations that are deployed through Infrastructure as Code,
then scanned for compliance to secure baseline configuration standards.
The Clearing Agencies also would employ continuous configuration
monitoring and periodic vulnerability scanning. The Clearing Agencies
would perform regular reviews and testing of Clearing Agency systems
running in Cloud while relying upon information provided by the CSP
through the CSP's SOC2 and Audit Symposiums. Finally, configuration,
security incident, and event monitoring would rely on a blend of CSP
native and third-party solutions.
The Clearing Agencies also plan to use tools offered by the CSP,
developed by the Clearing Agencies, and third parties to monitor the
Core C&S Systems running in Cloud. The Clearing Agencies would track
metrics, monitor log files, set alarms, and have the ability to act on
changes to Core C&S Systems and the environment in which they operate.
The CSP would provide a dashboard to reflect-general health (e.g., up/
down status of a region and CSP provided services running in that
region) but would not give additional insights into performance of
services and applications which run on those services. The Clearing
Agencies' centralized logging system would provide for a single frame
of reference for log aggregation, access, and workflow management by
ingesting the CSP's logs coming from native detective tools and the
Clearing Agencies' instrumented controls for logging, monitoring, and
vulnerability management. This instrumentation would give the Clearing
Agencies a real-time view into the availability of Cloud services as
well as the ability to track historical data. By using the enterprise
monitoring tools that the Clearing Agencies have in place, the Clearing
Agencies would be able to integrate the availability and capacity
management of Cloud into the Clearing Agencies' existing processes,
hosted in Cloud, to respond to issues in a timely manner.
The Clearing Agencies also would use specialized third-party tools,
as discussed just above, to programmatically configure Cloud services
and securely deploy infrastructure. This automation of configuration
and deployment would help ensure that Cloud services are repeatably and
consistently configured securely and validated. Change
[[Page 72141]]
detection tools providing event logs into the incident management
system also are vital for reacting to and investigating unexpected
changes to the environment.
The Clearing Agencies would implement tools for the Core C&S
Systems and back-office environments that would be hosted on the Cloud
Infrastructure, notably, IAM, monitoring and Security Information and
Event Management systems, the workflow system of record for incident
handling, KMS, and enterprise Data Loss Prevention.
Finally, the CSP prioritizes assurance programs and certifications,
underscoring its ability to comply with financial services regulations
and standards and to provide the Clearing Agencies with a secure Cloud
Infrastructure.\109\
---------------------------------------------------------------------------
\109\ The CSP has certifications for the following frameworks:
NIST, Cloud Security Alliance, COBIT, ISO, and FISMA.
---------------------------------------------------------------------------
(4) Security Testing and Verification
Security testing is integrated into business-as-usual processes as
outlined in relevant policy and procedures.\110\ These documents define
how testing is initiated, executed, and tracked.
---------------------------------------------------------------------------
\110\ Supra note 46.
---------------------------------------------------------------------------
For new assets and application (or code) releases, Technology Risk
Management determines whether and what type of security testing is
required through a risk-based analysis.\111\ If required, testing would
be conducted prior to implementation. The different testing techniques
are outlined below:
---------------------------------------------------------------------------
\111\ Supra note 30.
---------------------------------------------------------------------------
Automated Security Testing. Using industry standard
security testing tools and/or other security engineering techniques
specifically configured for each test, the Clearing Agencies would test
to identify vulnerabilities and deliver payloads with the intent to
break, change, or gain access to unauthorized areas within an
application, data, or system.
Manual Penetration Testing. Using information gathered
from automated testing and/or other information sources, the Clearing
Agencies would manually test to identify vulnerabilities and deliver
payloads with the intent to break, change, or gain access to the
unauthorized area within an application or system.
Blue Team Testing. The Blue Team identifies security
threats and risks in the operating environment and analyzes the
network, system, and SaaS environments and their current state of
security readiness. Blue Team assessment results guide risk mitigation
and remediation, validate the effectiveness of controls, and provide
evidence to support authorization or approval decisions. Blue Team
testing ensures that the Clearing Agencies' networks, systems, and SaaS
solutions are as secure as possible before deploying to a production
environment.
The results of the Clearing Agencies' security controls testing are
risk-rated and managed to remediation via two separate control
standards.\112\
---------------------------------------------------------------------------
\112\ Supra notes 46-47.
---------------------------------------------------------------------------
(c) Change Management: Software Development and Release Process
Consistent with FFIEC Guidance, the Clearing Agencies' use of Cloud
would have sufficient change management controls in place to
effectively transition systems and information assets to Cloud and
would help ensure the security and reliability of applications in
Cloud.\113\ The Clearing Agencies' enterprise software development
lifecycle processes \114\ would help ensure the same control
environment for all Clearing Agency resources. The Clearing Agencies
would establish baselines for design inputs and control requirements
and enforce workload isolation and segregation through Cloud using
existing Cloud native technical controls and added new tools. The
Clearing Agencies also would plan to use other specialized platform
monitoring tools for logging, scanning of configuration, and systems
process scanning. The Clearing Agencies also would have oversight as
the code owner and would have final review and approval for related
changes and code merges before deployment into production. Finally, the
Clearing Agencies would periodically conduct static code scanning and
perform vulnerability scanning for external dependencies prior to
deployment in production, along with manual penetration testing of the
provided application code. In addition, the Clearing Agencies would
perform routine scans of Compute resources with the existing enterprise
scanning tools. Any identified vulnerabilities would be reviewed for
severity, prioritized, and logged for remediation tracking in upcoming
development releases.
---------------------------------------------------------------------------
\113\ Supra note 30.
\114\ Id.
---------------------------------------------------------------------------
The Clearing Agencies would create a ``user acceptance plan'' prior
to promoting code to Cloud production. This user acceptance plan would
include tests of all major functions, processes, and interfacing
systems, as well as security tests. Through acceptance tests, the
Clearing Agencies' users would be able to simulate complete application
functionality of the live environment. The change would move to the
next stage of the Clearing Agencies' delivery model only after
satisfying the criteria for this phase.\115\
---------------------------------------------------------------------------
\115\ The ``user acceptance plan'' represents only one aspect of
the overall change management program at the Clearing Agencies.
---------------------------------------------------------------------------
The Clearing Agencies would have internal projects that would
address change management of the various applications and services. In
particular, the Clearing Agencies would run a suite of supporting
services that enable building, running, scaling, and monitoring of the
Clearing Agencies' business applications in Cloud, in an automated,
resilient, and secure manner.\116\ The application platform relies on
various CSP and third-party tools for different components, including
IaaS, Infrastructure as Code, CI/CD, Container as a Service, Continuous
Delivery, and Platform Monitoring.
---------------------------------------------------------------------------
\116\ Supra note 30.
---------------------------------------------------------------------------
With respect to software development in Cloud, the Clearing
Agencies would establish a closed, non-production Cloud environment
that would enable the Clearing Agencies to develop, test, and integrate
new capabilities, including those related to security capabilities.
This non-production Cloud environment would focus on the foundational
security, operations, and infrastructure requirements with the intent
to take lessons learned to implement into future production. The
Clearing Agencies would maintain a Cloud Reference Architecture that
defines necessary capabilities and controls required to securely host
Core C&S Systems. The minimum foundational security requirements would
be based on the NIST-CSF and CIS benchmarks and include the design and
implementation requirements of a secure Cloud account structure within
a multi-region Cloud environment. The Clearing Agencies would maintain
enterprise security requirements that provide structure for current and
future development. As the Cloud environment is further developed and
expanded, there would be a comprehensive process to identify any
incremental risks and develop and implement controls to manage and
mitigate those risks.
(d) Resilience and Recovery
As noted earlier, given the Clearing Agencies' roles as
systemically important financial market utilities, it is vital that
operations moved to the Cloud have appropriately robust resilience and
recovery capabilities. As discussed in
[[Page 72142]]
Section II.B.ii.2, above, the Cloud Infrastructure would be architected
to include (i) two autonomous and geographically diverse regions; (ii)
three availability zones per region, with each availability zone
comprised of multiple data centers; (iii) multi-node, high availability
clusters across each availability zone; (iv) static stability and
static capacity models; and (v) regional isolation, all to help ensure
the persistent availability of Compute, Storage, and Network
capabilities in Cloud.
Additionally, the CSP's practice in deploying service updates to
Cloud would help ensure that the consequences of any incidents would be
limited to the fullest extent possible.\117\ The CSP achieves this by
(i) fully automating the build and deployment process and (ii)
deploying services to production in a phased manner.
---------------------------------------------------------------------------
\117\ The Clearing Agencies would continue to retain
responsibility for patching, configuration, and monitoring of the
operating systems and applications in Cloud.
---------------------------------------------------------------------------
CSP service updates are first deployed to cells, which minimizes
the chance that a disruption from a service update in one cell would
disrupt other cells. Following a successful cell-based deployment,
service updates are next deployed to a specific availability zone,
which limits any potential disruption to that zone. Following a
successful availability zone deployment, service updates are then
deployed in a staged manner to other availability zones, starting with
the same region and later within other regions until the process is
complete.
The Clearing Agencies would meet regularly with the CSP, in
addition to formal quarterly briefing meetings with the CSP, as
described in the Reg. SCI Addendum.\118\ The informal discussions and
quarterly briefing meetings would permit the Clearing Agencies to
gather information in advance of the quarterly systems change report.
Most reportable systems changes would continue to occur based on
changes to Compute, Storage, Network, or applications controlled by the
Clearing Agencies.
---------------------------------------------------------------------------
\118\ See Reg. SCI Addendum, Section 4 Briefing Meetings. The
Clearing Agencies have provided this document in confidential
Exhibit 3 to this advance notice filing.
---------------------------------------------------------------------------
(e) Audit Controls and Assessment
The Clearing Agencies would regularly test security controls and
configurations, including by monitoring the CSP's technical,
administrative, and physical security controls that support the
Clearing Agencies' systems in the Cloud Infrastructure.
(1) Internal Risk Assessments
As part of their existing third-party vendor risk activities, the
Clearing Agencies' Third-Party Risk department (``TPR'') would assess
the operational risks of the CSP as a critical vendor
annually.119 120 121 Additionally, as a critical vendor, the
CSP is subject to heightened risk management requirements, as defined
in the DTCC Third Party Risk CriticalPlus Program Procedures,\122\
which include an executive sponsor that must be at the Managing
Director level or higher, documented annual meetings, quarterly
reporting, and monthly notifications. Issues rated moderate or above,
negative news, performance concerns or remediations are directly
escalated to the Management Risk Committee monthly.\123\
---------------------------------------------------------------------------
\119\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Third Party Risk Governance & Monitoring Procedures, which describes
the minimum requirements for practices and standards to be used by
business owners to monitor and manage third party relationships for
DTCC and its subsidiaries. The Clearing Agencies have provided this
document in confidential Exhibit 3 to this advance notice filing.
\120\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Third Party Risk Policy and the DTCC Third Party Risk Procedures,
which establish the standards and practices to be used by certain
business line departments and/or functional units to manage the
potential risks associated with engaging with an external service
provider. The Clearing Agencies have provided these documents in
confidential Exhibit 3 to this advance notice filing.
\121\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the Third
Party Risk--Technology and Resilience Procedure, which supplements
the ``DTCC Third Party Risk Policy'', ``DTCC Third Party Risk
Procedures'', and ``DTCC Third Party Risk Governance and Monitoring
Procedures'' and covers the following: standard technology risk
assessments (e.g., due diligence), fourth party reviews, NYDFS cyber
security assessments, and onsite assessments. The Clearing Agencies
have provided this document in confidential Exhibit 3 to this
advance notice filing.
\122\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the DTCC
Third Party Risk CriticalPlus Program Procedures. The Clearing
Agencies have provided this document in confidential Exhibit 3 to
this advance notice filing.
\123\ Supra note 62.
---------------------------------------------------------------------------
(2) Internal Audit Department
As mentioned in Section II.B.ii.4.(a), above, the Clearing
Agencies' IAD, as the third line of defense, is independent from the
Clearing Agencies' business lines, support areas, and controls
functions, and promotes resiliency and security through the assessment
of risk management and control frameworks to raise awareness of control
risks and changes for improving controls and governance processes.
IAD assesses the risks of the Clearing Agencies, at least annually,
as part of the development of the risk-based audit plan, which is
reviewed and refreshed, as needed, on a quarterly basis.\124\ The
development of the audit plan includes the consideration of IADs risk
assessment results, which informs cycle coverage requirements for
Cloud. Additional considerations include, but are not limited to,
regulatory requirements and expectations, initiatives, and
institutional and industry risk trends, including risks associated with
technology and cloud-based processes.
---------------------------------------------------------------------------
\124\ Supra note 81.
---------------------------------------------------------------------------
IAD's specific reviews of Cloud Infrastructure have not identified
any material deficiencies and the scope of the reviews have included,
but are not limited to, consideration of governance and oversight,
contagion risk and logical separation, access management, security
configuration and monitoring, concentration risk, exit strategy,
business continuity and disaster recovery. IAD also has assessed the
design of controls for a cloud platform scheduled for use in 2024 and
is proposing a Cloud Security audit for 2024.\125\
---------------------------------------------------------------------------
\125\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the Clearing
Agencies' Cloud Platform Internal Audit Report. The Clearing
Agencies have provided this document in confidential Exhibit 3 to
this advance notice filing.
---------------------------------------------------------------------------
(3) Key Risk and Key Performance Indicators \126\
---------------------------------------------------------------------------
\126\ Supra note 62.
---------------------------------------------------------------------------
The Clearing Agencies have established processes to evaluate the
Clearing Agencies' management of CSPs. Cloud vendors are rated through
a quarterly TPR survey. If a survey results in a poor rating, then it
is reported to the Management Risk Committee (``MRC'').\127\ TPR is
responsible for the timely reporting and escalation of third-party
risks. On a regular basis, TPR will review all active assessments to
identify any high risks or potential issues that may require further
discussion or escalation to senior management, Corporate Procurement
Services (``CPS''), or internal stakeholders. The DTCC Third Party Risk
Procedures provide a list of events that must be presented to the
MRC.\128\
---------------------------------------------------------------------------
\127\ Supra note 119.
\128\ Supra note 78.
---------------------------------------------------------------------------
The Clearing Agencies have developed key performance indicators
(``KPIs'') for Cloud and socialized these KPIs internally. The KRIs
already exist for Core C&S Systems and are aligned to overall systems
availability, capacity,
[[Page 72143]]
data integrity, and security.\129\ The CSP KPIs would feed into
existing KRIs and would be used to evaluate the CSP's performance after
Cloud implementation. KPIs would be added to monitor the performance
and risks of the CSP services for which the Clearing Agencies have
contracted. These post-Cloud implementation KRIs and KPIs would allow
the Clearing Agencies to assess their ongoing use of the CSP against
their operational and security requirements and would help demonstrate
the effectiveness of risk controls and the CSP's performance against
commitments in the SLAs, and will be reported on a regular basis to the
Clearing Agencies' Management Committee, Board of Directors, and
Technology and Risk Committees of the Board of Directors.
---------------------------------------------------------------------------
\129\ The Clearing Agencies have separately submitted a request
for confidential treatment to the Commission regarding the IT-Q4
2023 Risk Tolerance. The Clearing Agencies have provided this
document in confidential Exhibit 3 to this advance notice filing.
---------------------------------------------------------------------------
(4) Auditing the CSP and Access Rights \130\
---------------------------------------------------------------------------
\130\ Supra note 62.
---------------------------------------------------------------------------
The CSP hosts an annual Audit Symposium. The Cloud Agreement gives
the Clearing Agencies the right to attend the symposium so that the
Clearing Agencies may inspect and verify evidence of the design and
effectiveness of the CSP's control environment.\131\ The CSP also hosts
an annual Cloud security conference focused on security, governance,
risk and compliance, which the Clearing Agencies would attend. Through
preparation for and attendance at these events, the Clearing Agencies
could provide feedback and make requests of the CSP for future
modifications of its control environment.
---------------------------------------------------------------------------
\131\ See Reg. SCI Addendum, Section 3 Customer Right of Access
and Audit. The Clearing Agencies have provided this document in
confidential Exhibit 3 to this advance notice filing.
---------------------------------------------------------------------------
The Clearing Agencies' Information Technology staff currently meets
with CSP representatives weekly to focus on technical issues related to
the Clearing Agencies' proposed Cloud environment. As required under
the Cloud Agreement, the Clearing Agencies hold quarterly compliance
briefings with the CSP, wherein the Clearing Agencies receive
information, including any necessary documentation, from the CSP to
help assure the Clearing Agencies that the CSP is meeting its
obligations.\132\ The information provided includes updates to services
and SLAs, CSP performance, and details that help the Clearing Agencies
meet their reporting obligations under Section 1003(a)(1) of Reg. SCI.
The Clearing Agencies' management, including Security, Information
Technology, TPR, and the Internal Audit Department, coordinate to
ensure appropriate representation during such briefings. The CSP is
required under Cloud Agreement to maintain records showing its
compliance with the agreements for a period of five years.\133\
---------------------------------------------------------------------------
\132\ Supra note 117.
\133\ See Reg. SCI Addendum, Section 7.3 CSP Records. The
Clearing Agencies have provided this document in confidential
Exhibit 3 to this advance notice filing.
---------------------------------------------------------------------------
The CSP would be required to maintain an information security
program, including controls and certifications, that is as protective
as the program evidenced by the CSP's SOC-2 report. The CSP must make
available on demand to the Clearing Agencies its SOC-2 report as well
as the CSP's other certifications from accreditation bodies and
information on its alignment with various frameworks, including NIST-
CSF, and ISO.\134\
---------------------------------------------------------------------------
\134\ The FFIEC Guidance provides that the Clearing Agencies may
obtain SOC reports, other independent audits, or ISO certification
reports to gain assurance that the CSP's controls are operating
effectively. See FFIEC, Security in a Cloud Computing Environment,
at 7. The Clearing Agencies review the CSP's SOC-2 on an annual
basis. See Reg. SCI Addendum, Section 2 CSP Information Security
Program. The SOC reports, along with other artifacts showing
compliance with these sections, are available to the Clearing
Agencies on demand. In addition, during each Briefing Meeting (See
Reg. SCI Addendum Section 4 Briefing Meetings), updates are provided
on any material changes to certification standards, policies,
procedures, controls or security standards at the CSP. The Clearing
Agencies have provided this document in confidential Exhibit 3 to
this advance notice filing.
---------------------------------------------------------------------------
As part of the annual risk assessment of the CSP, TPR collects risk
and control related assurance documents from the CSP and coordinates
review with the Clearing Agencies' respective subject matters
specialists. TPR, Security, and Business Continuity would determine the
adequacy and reasonableness of the documentation received to complete
the Third-Party Risk Assessment. Finally, the Cloud Agreement provides
that the Clearing Agencies' and their regulators may visit the
facilities of the CSP under specified conditions. TPR would help
coordinate bi-annual visits of the data centers.\135\
---------------------------------------------------------------------------
\135\ See Reg. SCI Addendum, Sections 3 Customer Right of Access
and Audit and 9 Regulatory Supervision. The Clearing Agencies have
provided this document in confidential Exhibit 3 to this advance
notice filing.
---------------------------------------------------------------------------
The Clearing Agencies plan to use the CSP's services combined with
additional third-party tools to monitor systems deployed by ingesting
logs into a security incident and event monitoring tool to provide a
``single pane of glass'' view into the Cloud Infrastructure. When
incidents are detected, the Clearing Agencies would follow their
existing incident response governance to identify, detect, contain,
eradicate, and recover from incidents.
III. Consistency With the Clearing Supervision Act
The stated purpose of the Clearing Supervision Act is to mitigate
systemic risk in the financial system and promote financial stability
by, among other things, promoting uniform risk management standards for
systemically important financial market utilities and strengthening the
liquidity of systemically important financial market utilities.\136\
Section 805(a)(2) of the Clearing Supervision Act \137\ also authorizes
the Commission to prescribe risk management standards for the payment,
clearing and settlement activities of designated clearing entities,
like the Clearing Agencies, for which the Commission is the supervisory
agency. Section 805(b) of the Clearing Supervision Act \138\ states
that the objectives and principles for risk management standards
prescribed under Section 805(a) shall be to:
---------------------------------------------------------------------------
\136\ 12 U.S.C. 5461(b).
\137\ 12 U.S.C. 5464(a)(2).
\138\ 12 U.S.C. 5464(b).
---------------------------------------------------------------------------
promote robust risk management;
promote safety and soundness;
reduce systemic risks; and
support the stability of the broader financial system.
The Commission adopted Rule 17ad-22 under Section 805(a)(2) of the
Clearing Supervision Act and the Exchange Act in furtherance of these
objectives and principles.\139\ Rule 17ad-22 under the Exchange
requires covered clearing agencies, like the Clearing Agencies, to
establish, implement, maintain, and enforce written policies and
procedures that are reasonably designed to meet certain minimum
requirements for their operations and risk management practices on an
ongoing basis.\140\
---------------------------------------------------------------------------
\139\ 17 CFR 240.17ad-22. Exchange Act Release Nos. 68080
(October 22, 2012), 77 FR 66220 (November 2, 2012) (S7-08-11)
(Clearing Agency Standards); 78961 (September 28, 2016), 81 FR 70786
(October 13, 2016) (S7-03-14) (Standards for Covered Clearing
Agencies).
\140\ 17 CFR 240.17ad-22.
---------------------------------------------------------------------------
The Clearing Agencies believe that the Cloud Proposal is consistent
with Section 805(b)(1) of the Clearing Supervision Act \141\ and the
requirements of Rules 17ad-22(e)(17)(ii) under the Exchange Act.\142\
---------------------------------------------------------------------------
\141\ 12 U.S.C. 5464(b)(1).
\142\ 17 CFR 240.17ad-22(e)(17)(ii).
---------------------------------------------------------------------------
[[Page 72144]]
A. Consistency With Section 805(b)(1) of the Clearing Supervision Act
Promote Robust Risk Management. As described above, the Clearing
Agencies believe that the Cloud Proposal promotes robust risk
management, specifically operational risk management, by providing
scalable and secure infrastructure for hosting Core C&S Systems. The
Cloud Proposal would add additional security capabilities, allow for
regular updates and maintenance of applications, and reduce the risk of
data breaches while also ensuring compliance with industry standards.
Additionally, transitioning to Cloud would offer flexibility in scaling
resources, which can enable the Clearing Agencies to adapt quickly to
changing security needs and allocate resources more efficiently.
Today, the Clearing Agencies' ability to risk manage extreme market
events is directly tied to their ability to scale their on-premises
resource during such events, which is directly tied to the Clearing
Agencies having previously expended enough capital to build enough
capacity based on earlier performance testing of their applications to
withstand such extreme market events. Although the Clearing Agencies
would continue to performance test their applications regardless of
where the applications are hosted, by hosting the applications in
Cloud, the number of scalable resources is already available, when
needed, without the Clearing Agencies having to pre-purchase it or
build it. This level of nearly unbounded, on-demand scalability
provides a much-welcomed risk-management feature for extreme events,
such as a global pandemic as noted above.
Overall, risk management is inherently strengthened by hosting in
Cloud through advanced security features, real-time monitoring, on-
demand scalability, and compliance standards implemented by the CSP. By
leveraging these capabilities, the Clearing Agencies can better
proactively identify and address risks, ensuring data integrity and
regulatory compliance.
Promote Safety and Soundness. The Clearing Agencies also believe
that the Cloud Proposal promotes safety and soundness. As discussed
above, transitioning to Cloud provides centralized management and
improved scalability. The CSP provides cloud-specific security
capabilities, including encryption, access controls, and regular
updates, reducing the risk of security breaches. Centralized monitoring
allows for better visibility into potential threats, enabling quick
response and mitigation. The agility afforded by Cloud would allow the
Clearing Agencies to respond to performance challenges more efficiently
and effectively. For instance, as noted above, in the face of
unexpected surges in demand, Cloud scalability would allow the Clearing
Agencies to seamlessly adjust resources, helping to prevent service
disruptions and loss of operations. Such agility not only enhances the
effectiveness of operations but also mitigates the risks associated
with unexpected fluctuations in workload performance. These benefits
improve the Clearing Agencies abilities to maintain operational
continuity and resilience, which help promote safety and soundness.
Reduce Systemic Risk. The Clearing Agencies also believe that the
Cloud Proposal would reduce systemic risk by improving overall
resilience and security. As described above, hosting Core C&S Systems
in Cloud would provide distributed infrastructure and data redundancy
(i.e., multiple availability zones, supported by many data centers,
across two regions), making the systems less susceptible to single
points of failure. Moreover, disaster recovery would be streamlined,
minimizing the effect of potential disruptions, while automatic backup
systems, geographic redundancy, and faster data recovery mechanisms
would all contribute to a more resilient infrastructure. In the event
of a localized issue, the distributed nature of Cloud would help
prevent widespread disruptions.
Production resiliency also is greatly improved in Cloud compared to
the Clearing Agencies' on-premises capabilities, where a single
location hosts an application, on a single copy of primary storage.
Instead, Cloud would host an application across three primary
availability zones, made of up of many data centers, each of which
contain actively running instances and synchronous copies of the data.
If the Clearing Agencies' primary, on-premises data center fails, an
out of region recovery will be necessary and will likely result in
approximately two hours of downtime. By comparison, in Cloud, even if
an entire availability zone fails (meaning the failure of multiple data
centers), Core C&S Systems would continue to operate within the region,
thus avoiding an out of region recovery and any downtime.
The Clearing Agencies would employ meaningful security capabilities
and measures provided by the CSP and third-party tools to further
enhance the security of the Clearing Agencies' Core C&S Systems. This
approach to security would help reduce systemic risks associated with
operational outages and significantly reduce the risk associated with
data loss or downtime. Additionally, the Cloud environment facilitates
regular updates and patch management, ensuring that security measures
stay current. This proactive maintenance helps mitigate vulnerabilities
that could otherwise contribute to systemic risk. Overall, the adoption
of Cloud enhances the stability and security of IT infrastructure,
contributing to a reduction in systemic risks.
Altogether, the Clearing Agencies believe that the benefits afford
from operating in a Cloud Infrastructure would help the Clearing
Agencies reduce systemic risk.
Support the Stability of the Broader Financial System. The Clearing
Agencies believe that the Cloud Proposal supports the stability of the
broader financial system by enhancing efficiency, resilience, and
security of the Clearing Agencies' Core C&S Systems. Cloud services
would provide the Clearing Agencies with scalable and flexible
infrastructure, allowing for more efficient resource allocation and
cost management, which supports operational resiliency and stability.
With the ability to rapidly deploy new applications and services, the
Clearing Agencies would become more agile in adapting to market trends
and participant and customer needs.
In terms of resilience, the Cloud Infrastructure offers distributed
data storage and failover solutions, reducing the impact of localized
disruptions and improving recovery capabilities. This resilience is
crucial for the Clearing Agencies' Core C&S Systems to continue
functioning even in the face of unforeseen events. Moreover, the CSP's
strengthened security capabilities help protect sensitive data,
mitigating the risk of cyberattack or data breaches that could
undermine the stability of the financial system. Overall, the
transition to Cloud fosters improved operational efficiency,
resilience, and robust security practices, contributing to the
stability of the broader financial system.
Accordingly, the proposed changes provided in this Cloud Proposal
are consistent with (i) promoting robust risk management; (ii)
promoting safety and soundness; (iii) reducing systemic risks; and (iv)
promoting the stability of the broader financial system, all in support
of the objectives and principles of Section 805(b) of the Clearing
Supervision Act.\143\
---------------------------------------------------------------------------
\143\ 12 U.S.C. 5464(b).
---------------------------------------------------------------------------
[[Page 72145]]
B. Consistency With Rule 17ad-22(e)(17)(ii) Under the Exchange Act
Rule 17ad-22(e)(17)(ii) requires the Clearing Agencies to
establish, implement, maintain, and enforce written policies and
procedures reasonably designed to manage the Clearing Agencies'
operational risk by ``ensuring that systems have a high degree of
security, resiliency, operational reliability, and adequate, scalable
capacity.'' \144\
---------------------------------------------------------------------------
\144\ 17 CFR 240.17ad-22(e)(17)(ii). The Clearing Agencies
maintain several policies specifically designed to manage the risks
associated with maintaining adequate levels of system functionality,
confidentiality, integrity, availability, capacity, and resiliency
for systems that support core clearing, risk management, and data
management services.
---------------------------------------------------------------------------
Security. As described above and in policies and procedures
confidentially filed, the Clearing Agencies have established a robust
Cloud security program to manage the security of the Core C&S Systems
that would be running in Cloud and to monitor the CSP's management of
security of the Cloud Infrastructure that it operates. Processes are
formally defined, automated to the fullest extent, repeatable with
minimal variation, accessible, adhered to, and timely. The enterprise
security program encompasses all of the Clearing Agencies' assets
existing in the Clearing Agencies' offices, data centers, and within
the Cloud Infrastructure, and IAM controls ensure least-privileged user
access to applications in Cloud. The Clearing Agencies have appropriate
controls in place to help ensure the security of confidential
information in-transit between the Clearing Agencies' data centers and
the Cloud Infrastructure, between systems within the Cloud
Infrastructure, and at-rest. All network communications between the
Clearing Agencies and Cloud would rely on industry standard encryption
for traffic while in transit, and data at rest would be safeguarded
through pervasive encryption. Finally, automated delivery of business
and security capability via the use of the Infrastructure as Code,
Cloud agnostic tools, and continuous integration/continuous deployment
pipeline methods help ensure security controls are consistently and
transparently deployed.
Resiliency and Operational Reliability. As stated above, resiliency
and operational reliability of the Cloud Infrastructure is built into
the system with functionality for the Clearing Agencies' Core C&S
Systems to run in multiple availability zones within multiple regions.
Regions are segregated from one another and are designed to minimize
the possibility of a multi-region outage. The Clearing Agencies have
designed their Cloud Infrastructure to have primary (hot)/secondary
(warm) regions, at all times, ensuring Compute, Storage, and Network
resources would be available in a new redundant region in the event of
a primary region failure. As a result, the Cloud Infrastructure offers
the Clearing Agencies multiple redundancies within which to run Core
C&S Systems, while simultaneously restricting the effect of an incident
at the CSP to the smallest footprint possible.
Scalability. As described above, since additional computing power
can be launched on demand, the scalability in a Cloud computing
environment is considerable and instantaneous. The Clearing Agencies
could provision or de-provision Compute, Storage, and Network resources
to meet demand at any given point in time. In the current on-premises
environment, immediate scalability is limited by the capacity of the
on-premises hardware. Additional physical servers and network equipment
would be needed to scale beyond the limits of the on-premises hardware,
potentially affecting the ability to quickly adapt to evolving market
conditions, including spikes in trading volume.
For these reasons, the Clearing Agencies believe that the Cloud
Proposal would help ensure that the Clearing Agencies' systems have a
high degree of security, resiliency, operational reliability, and
adequate, scalable capacity, consistent with Rule 17ad-22(e)(17)(ii)
under the Exchange Act.\145\
---------------------------------------------------------------------------
\145\ 17 CFR 240.17ad-22(e)(17)(ii).
---------------------------------------------------------------------------
III. Date of Effectiveness of the Advance Notice
The proposed change may be implemented if the Commission does not
object to the proposed change within 60 days of the later of (i) the
date the proposed change was filed with the Commission or (ii) the date
any additional information requested by the Commission is
received.\146\ The clearing agency shall not implement the proposed
change if the Commission has any objection to the proposed change.\147\
---------------------------------------------------------------------------
\146\ 12 U.S.C. 5465(e)(1)(G).
\147\ 12 U.S.C. 5465(e)(1)(F).
---------------------------------------------------------------------------
The clearing agency shall post notice on its website of proposed
changes that are implemented. The proposal shall not take effect until
all regulatory actions required with respect to the proposal are
completed.
IV. Solicitation of Comments
Interested persons are invited to submit written data, views, and
arguments concerning the foregoing, including whether the advance
notice is consistent with the Clearing Supervision Act. Comments may be
submitted by any of the following methods:
Electronic Comments
Use the Commission's internet comment form (https://www.sec.gov/rules/sro.shtml); or
Send an email to [email protected]. Please include
file number FICC-2024-803 on the subject line.
Paper Comments
Send paper comments in triplicate to Secretary, Securities
and Exchange Commission, 100 F Street NE, Washington, DC 20549-1090.
All submissions should refer to file number SR-FICC-2024-803. This file
number should be included on the subject line if email is used. To help
the Commission process and review your comments more efficiently,
please use only one method. The Commission will post all comments on
the Commission's internet website (https://www.sec.gov/rules/sro.shtml). Copies of the submission, all subsequent amendments, all
written statements with respect to the advance notice that are filed
with the Commission, and all written communications relating to the
advance notice between the Commission and any person, other than those
that may be withheld from the public in accordance with the provisions
of 5 U.S.C. 552, will be available for website viewing and printing in
the Commission's Public Reference Room, 100 F Street NE, Washington, DC
20549 on official business days between the hours of 10 a.m. and 3 p.m.
Copies of the filing also will be available for inspection and copying
at the principal office of FICC and on DTCC's website (dtcc.com/legal/sec-rule-filings). Do not include personal identifiable information in
submissions; you should submit only information that you wish to make
available publicly. We may redact in part or withhold entirely from
publication submitted material that is obscene or subject to copyright
protection. All submissions should refer to File Number SR-FICC-2024-
803 and should be submitted on or before September 25, 2024.
V. Date of Timing for Commission Action
Section 806(e)(1)(G) of the Clearing Supervision Act provides that
FICC may implement the changes if it has not received an objection to
the proposed changes within 60 days of the later of (i)
[[Page 72146]]
the date that the Commission receives the Advance Notice or (ii) the
date that any additional information requested by the Commission is
received,\148\ unless extended as described below.
---------------------------------------------------------------------------
\148\ 12 U.S.C. 5465(e)(1)(G).
---------------------------------------------------------------------------
Pursuant to Section 806(e)(1)(H) of the Clearing Supervision Act,
the Commission may extend the review period of an advance notice for an
additional 60 days, if the changes proposed in the advance notice raise
novel or complex issues, subject to the Commission providing the
clearing agency with prompt written notice of the extension.\149\
---------------------------------------------------------------------------
\149\ 12 U.S.C. 5465(e)(1)(H).
---------------------------------------------------------------------------
Here, as the Commission has not requested any additional
information, the date that is 60 days after FICC filed the Advance
Notice with the Commission is October 13, 2024. However, the Commission
believes that the changes proposed in the Advance Notice raise novel
and complex issues. The Commission finds the issues novel because FICC
proposes a gradual migration of a specified set of Core C&S Systems to
a public cloud infrastructure hosted by a single, third-party service
provider. The Commission also finds the issues raised by the Advance
Notice complex because the selection of the subset of applications
proposed for migration involves a detailed governance review process
that would require careful scrutiny and consideration of its associated
risks. Therefore, the Commission finds it appropriate to extend the
review period of the Advance Notice for an additional 60 days under
Section 806(e)(1)(H) of the Clearing Supervision Act.\150\
---------------------------------------------------------------------------
\150\ Id.
---------------------------------------------------------------------------
Accordingly, the Commission, pursuant to Section 806(e)(1)(H) of
the Clearing Supervision Act,\151\ extends the review period for an
additional 60 days so that the Commission shall have until December 12,
2024 to issue an objection or non-objection to advance notice SR-FICC-
2024-803.
---------------------------------------------------------------------------
\151\ Id.
---------------------------------------------------------------------------
All submissions should refer to File Number SR-FICC-2024-803 and
should be submitted on or before September 25, 2024.
For the Commission, by the Division of Trading and Markets,
pursuant to delegated authority.\152\
---------------------------------------------------------------------------
\152\ 17 CFR 200.30-3(a)(91).
---------------------------------------------------------------------------
Sherry R. Haywood,
Assistant Secretary.
[FR Doc. 2024-19762 Filed 9-3-24; 8:45 am]
BILLING CODE 8011-01-P