Financial Sector Cyber Exercise Template
Financial Sector Cyber Exercise Template
Financial Sector Cyber Exercise Template
Exercise Overview
The Financial Sector Cyber Exercise Template provides financial sector companies,
especially small and medium-sized institutions, with a scenario-based exercise that
highlights strategic business decision points and corresponding technical concerns that
should be considered when responding to a significant cybersecurity incident.
The exercise template’s customizable format allows companies to tailor the cybersecurity
incident scenario to their individual needs. The corresponding discussion questions allow
companies to explore their understanding of their cybersecurity risks and the processes
they have in place to respond to a significant cybersecurity incident.
3
Exercise Structure
The exercise scenario involves four parts:
1. An introductory section that provides companies with an opportunity to review their
current cybersecurity incident identification, protection, and detection capabilities, as
well as processes for information sharing and relationships with external entities;
2. An escalation section that tests companies’ processes for responding to and
recovering from a significant cyber incident and poses questions about incident
governance;
3. A wrap-up section that guides participants to reflect on their companies’ overall ability
to identify, protect, detect, respond to, and recover from the exercise scenario; and
4. A next step section that invites participants to identify their companies’ necessary
after-action steps following the exercise.
The exercise’s discussion questions use the lexicon—identify, protect, detect, respond,
and recover—introduced by the National Institute of Standards and Technology (NIST)
Framework for Improving Critical Infrastructure Cybersecurity and used by the G-7
Fundamental Elements of Cybersecurity for the Financial Sector.
5
Follow-on Work: Institutions may wish to produce a summary report capturing lessons
learned and next steps to close any identified gaps.
6
Law enforcement and the Financial Services Information Sharing and Analysis
Center (FS-ISAC) have tracked a spike in reports from members of the
financial sector indicating increased malicious cyber activity, including targeted
scanning and intrusion attempts.
What are our strategies and processes for sharing cyber threat and
vulnerability information internally and externally, and who is
responsible for these strategies and processes?
What processes exist for sharing cyber threats and vulnerabilities with law
enforcement, regulators, sector information sharing forums, and other
stakeholders? Who within the company serves as the primary contact for this
sharing?
What processes are in place to facilitate timely sharing of information
generated internally? What are the processes to obtain, disseminate, and use
information received from external sources?
What internal and external triggers exist to notify law enforcement, regulators,
sector information sharing forums, and other stakeholders of information on
threats and vulnerabilities?
8
Questions: Monitoring
Who identifies cyber threats and vulnerabilities facing our company and
our cybersecurity controls? What capabilities do our personnel or
functions have; do they have sufficient resources?
Questions: Governance
Have we identified our critical business operations and accounted for those
operations in our cybersecurity strategy and associated information security-
related plans?
Have we identified our high-value assets (e.g., systems, data sets) most in need
of protection from malicious cyber actors? How have we prioritized protection of
those assets?
What controls are in place to address our identified cyber risks: multi-factor
authentication, limited privileged access, regular maintenance and software
patching, effective system scanning, and system segregation?
How do we manage our residual cyber risk (i.e., the risk that controls cannot
mitigate)? Is our residual cyber risk within the cyber risk tolerance set by the
board?
Do any of our third-party service providers or other vendors expose us to cyber
risk? If so, which ones and how? Do our contracts with those third-party service
providers and vendors address and mitigate that risk? If so, how?
13
Following a security review, your service provider reports that an onsite contractor with
privileged access to your network fell victim to a spearphishing campaign, inadvertently
providing a malicious actor access to your internal systems.
As the service provider continues its investigation, it discovers a malicious cyber actor
established command and control within the network using the contractor as its attack
vector. Prior to detection, the actor apparently used illicitly obtained login information for
customer account systems. The actor has denied employees access to the accounts in
an effort to cover its tracks. The service provider’s investigation reveals that this issue
impacts a significant number of customer accounts. As a result, questions now exist
about the accuracy of the company’s internal business information.
14
Questions: Response
How do we respond to a cyber incident like this? What are our
processes end to end?
What are our processes for assessing the nature, scope, and impact of the
incident, and our processes for containing and mitigating that impact?
To whom have we escalated the incident internally at this point; has the board
been notified?
When and how do we notify our regulators and law enforcement, and who
specifically do we contact? What do we tell them?
Does this incident exceed our in-house technical capability to contain? Do we
request technical assistance from the government? If so, how?
How do we address customer inquiries? Who is leading our customer
response efforts?
Is our service provider or other service providers helping us to respond; are
they contractually required to help? If so, how and who internally is
responsible for coordinating this help?
Are our business continuity plans triggered? If so, how?
15
News of the incident leaks to the media and quickly spreads among your
customers.
17
Questions: Response
Questions: Recovery
Questions: Recovery
Exercise Wrap-Up
Summarize key findings and address any identified gaps for possible follow-up
actions. Preparing a summary report could help track lessons learned and
provide guidance moving forward.
22
Additional Resources
NIST Framework
G-7 Fundamental Elements of Cybersecurity for the Financial Sector
PPD-41
PPD-41 Incident Severity Schema
Cyber Incident Reporting - Key Federal Points of Contact
US-CERT
FBI Cyber
DHS Cyber Incident Reporting Guidelines