Dictionary · CPMI-IOSCO Guidance on Cyber Resilience for Financial Market Infrastructures
L2 — definitions grouped by regulatory framework.
Verbs
3 senses- recover
To restore any capabilities or services that have been impaired due to a cyber event.
- resume
To recommence functions following a cyber incident. An FMI should resume critical services as soon as it is safe and practicable to do so without causing unnecessary risk to the wider sector or further detriment to financial stability.
- respond
Of an FMI, to develop and implement appropriate activities to be able to take action when it detects a cyber event.
Nouns
44 senses- vulnerability
A weakness, susceptibility or flaw in a system that an attacker can access and exploit to compromise system security. Vulnerability arises from the confluence of three elements: the presence of a susceptibility or flaw in a system; an attacker’s access to that flaw; and an attacker’s capability to exploit the flaw.
- attack surface
The sum of an information system’s characteristics in the broad categories (software, hardware, network, processes and human) which allows an attacker to probe, enter, attack or maintain a presence in the system and potentially cause damage to an FMI. A smaller attack surface means that the FMI is less exploitable and an attack less likely.
- Availability
The property of being accessible and usable as expected upon demand.
- critical operations
Any activity, function, process, or service, the loss of which, for even a short period of time, would materially affect the continued operation of an FMI, its participants, the market it serves, and/or the broader financial system.
- business process
A collection of linked activities that takes one or more kinds of input and creates an output that is of value to an FMI’s stakeholders. A business process may comprise several assets, including information, ICT resources, personnel, logistics and organisational structure, which contribute either directly or indirectly to the added value of the service.
- cyber resilience strategy
An FMI’s high level principles and medium term plans to achieve its objective of managing cyber risks.
- Cyber Attack
The use of an exploit by an adversary to take advantage of a weakness(es) with the intent of achieving an adverse effect on the ICT environment.
- cyber maturity model
A mechanism to have cyber resilience controls, methods and processes assessed according to management best practice, against a clear set of external benchmarks.
- cyber risk
The combination of the probability of an event occurring within the realm of an organisation’s information assets, computer and communication resources and the consequences of that event for an organisation.
- cyber threat
A circumstance or event with the potential to intentionally or unintentionally exploit one or more vulnerabilities in an FMI’s systems, resulting in a loss of confidentiality, integrity or availability.
- cyber risk management
The process used by an FMI to establish an enterprise-wide framework to manage the likelihood of a cyber attack and develop strategies to mitigate, respond to, learn from and coordinate its response to the impact of a cyber attack. The management of an FMI’s cyber risk should support the business processes and be integrated in the FMI’s overall risk management framework.
- cyber resilience
An FMI’s ability to anticipate, withstand, contain and rapidly recover from a cyber attack.
- cyber risk tolerance
The propensity to incur cyber risk, being the level of cyber risk that an FMI intends to assume in pursuing its strategic objectives.
- cyber
Refers to the interconnected information infrastructure of interactions among persons, processes, data, and information and communications technologies, along with the environment and conditions that influence those interactions.
- cyber governance
Arrangements an organisation puts in place to establish, implement and review its approach to managing cyber risks.
- cyber event
An observable occurrence in an information system or network.
- cyber risk profile
The cyber risk actually assumed, measured at a given point in time.
- cyber resilience framework
Consists of the policies, procedures and controls an FMI has established to identify, protect, detect, respond to and recover from the plausible sources of cyber risks it faces.
- cyber threat intelligence
Information that provides relevant and sufficient understanding for mitigating the impact of a potentially harmful event (may also be referred to as “cyber threat information”).
- defence in depth
The security controls deployed throughout the various layers of the network to provide for resiliency in the event of the failure or the exploitation of a vulnerability of another control (may also be referred to as “layered protection”).
- detection
Development and implementation of the appropriate activities in order to identify the occurrence of a cyber event.
- disruption
A disruption is an event affecting an organisation’s ability to perform its critical operations.
- ecosystem
A system or group of interconnected elements, formed linkages and dependencies. For an FMI, this may include participants, linked FMIs, service providers, vendors and vendor products.
- financial market infrastructure
A multilateral system among participating institutions, including the operator of the system, used for the purposes of clearing, settling or recording payments, securities, derivatives or other financial transactions.
- forensic readiness
The ability of an FMI to maximise the use of digital evidence to identify the nature of a cyber attack.
- forensic investigation
The application of investigative and analytical techniques to gather and preserve evidence from a digital device impacted by a cyber attack.
- ICT
Information and communications technologies. ICT can also be read as IT (information technology) in this document.
- Identification
To develop the organisational understanding required to manage cyber risk to systems, assets, data and capabilities.
- indicator
An occurrence or sign which reveals that an incident may have occurred or be in progress.
- information asset
Any piece of data, device or other component of the environment that supports information-related activities. In the context of this report, information assets include data, hardware and software.25 Information assets are not limited to those that are owned by the entity. They also include those that are rented or leased, and those that are used by service providers to deliver their services.
- Integrity
With reference to information, an information system or a component of a system, the property of not having been modified or destroyed in an unauthorised manner.26
- layered protection
As relying on any single defence against a cyber threat may be inadequate, an FMI can use a series of different defences to cover the gaps in and reinforce other protective measures. For example, the use of firewalls, intrusion detection systems, malware scanners, integrity auditing procedures and local storage encryption tools can serve to protect information assets in a complementary and mutually reinforcing manner. May also be referred to as “defence in depth”.
- leading standards, guidelines and practices
Standards, guidelines and practices which reflect industry best approaches to managing cyber threats, and which incorporate what are generally regarded as the most effective cyber resilience solutions.
- Malware
Malicious software used to disrupt the normal operation of an information system in a manner that adversely impacts its confidentiality, availability or integrity.
- operational resilience
The ability of an FMI to: (i) maintain essential operational capabilities under adverse conditions or stress, even if in a degraded or debilitated state; and (ii) recover to effective operational capability in a time frame consistent with the provision of critical economic services.
- protection
Development and implementation of appropriate safeguards, controls and measures to enable reliable delivery of critical infrastructure services.
- Red Team
An independent group that challenges the cyber resilience of an organisation to test its defences and improve its effectiveness. A red team views the cyber resilience of an FMI from an adversary’s perspective.
- situational awareness
The ability to identify, process and comprehend the critical elements of information through a cyber threat intelligence process that provides a level of understanding that is relevant to act upon to mitigate the impact of a potentially harmful event.
- threat
A circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact (create adverse consequences for) organisational operations, organisational assets (including information and information systems), individuals, other organisations or society in general.
- actionable intelligence
Information that can be acted upon to address, prevent or mitigate a cyber threat. The sum of an information system’s characteristics in the broad categories (software, hardware, network, processes and human) which allows an attacker to probe, enter, attack or maintain a presence in the system and potentially cause damage to an FMI. A smaller attack surface means that the FMI is less exploitable and an attack less likely.
- resilience by design
The embedding of security in technology and system development from the earliest stages of conceptualisation and design.
- risk-based approach
An approach whereby FMIs identify, assess and understand the risks to which they are exposed to and take measures commensurate with these risks.
- Risk tolerance
The amount and type of risk that an organisation is willing to take in order to meet its strategic objectives (may also be referred to as “risk appetite”).
- security operations centre
A function or service responsible for monitoring, detecting and isolating incidents.