joseph armstrong augusta Georgia | APRA’s new mandatory Prudential Standard, CPS-234, commenced on 1 July 2019


It specifies new cybersecurity requirements to ensure APRA-regulated entities tighten their cybersecurity against information security incidents (including cyberattacks). But does it go far enough?
The regulation seeks to minimise the likelihood of and impact of information security incidents concerning confidentiality, integrity and information systems, by ensuring information security capability is commensurate with information security vulnerabilities and threats.


Cyber Security Consulting reviewed this requirement against requirements set by industry bodies, including ISO 27001, NIST Cyber Security Framework, SOC2 Trust Services Criteria, The Australian Government Information Security Manual (ISM) and PCI DSS. They found the APRA CPS-234 regulation lacked aspects of information security control likely required to protect your organisation.

Comparison of APRA 234 information security requirements to other industry frameworks and standards.


Security policies based solely on CPS-234 may omit critical aspects of an information security management plan necessary to keep your organisation safe.
Cyber Security Consulting, has developed a list of 24 questions to uncover if your organisation is APRA CPS 234 compliant.


 This partial list includes questions on supply chain related areas in APRA CPS 234. This is a new focus for APRA, but one which Cyber Security Consulting believes will impact all industry sectors in the future.
Six Questions to ask your Supply Chain
Most likely tool to support an organisation in achieving this

Are security controls that protect your information assets, including those managed by third parties, implemented in a timely manner and are they commensurate with: (a) vulnerabilities and threats to the information assets; (b) the criticality and sensitivity of the information assets; (c) the stage at which the information assets are within their life-cycle; and (d) the potential consequences of an information security incident?
Information Security Policies and/or Framework
And
Risk Assessment Method
Does the organisation classify its information assets, including those managed by related parties and third parties, by criticality and sensitivity?
Information classification and handling policy and standard

Does your organisation assess the design of information security controls put in place by all third parties that manage information assets on your behalf?
Supply chain governance framework
Does your organisation assess whether third parties who manage your information assets have an appropriate systematic testing program? 
Supply chain governance framework
And
Information Security Testing Framework
Does your organisation have a formal governance process that assesses the information security capability of third parties and related third parties that manage information assets commensurate with the potential consequences of an information security incident affecting those assets? 
Supply chain governance framework
Does your organisations internal audit activities include a review of the design and operating effectiveness of information security controls, including those maintained by related parties and third parties (information security control assurance)?
Information Security Control Assurance guideline for audit team

Contact Cyber Security Consulting today for access to our full, detailed guidelines for implementing APRA 234, including templates. Or for general advice on how to deliver APRA CPS-234 as part of your overall information security program.



Comments

Popular posts from this blog

joseph armstrong augusta georgia | Relevance of Cyber Basics and also Actions for Qualification

joseph armstrong augusta Georgia | How Can Item Mangers Manage Individuals?

patrick armstrong Athens | Computer system Software application