Exposure Draft of The Risk-Based Cybersecurity Framework and Guidelines For Deposit Money Banks and Payment Service Banks
Exposure Draft of The Risk-Based Cybersecurity Framework and Guidelines For Deposit Money Banks and Payment Service Banks
Exposure Draft of The Risk-Based Cybersecurity Framework and Guidelines For Deposit Money Banks and Payment Service Banks
RISK-BASED CYBERSECURITY
FRAMEWORK AND GUIDELINES
FOR
August 2023
Contents
INTRODUCTION ........................................................................................................ 4
1.0 Cybersecurity Governance and Oversight ................................................... 5
1.1. Responsibilities of the Board of Directors ......................................................... 5
1.1.1.Cybersecurity Strategy and Framework .......................................................... 7
1.1.2.Cybersecurity Programme............................................................................... 7
1.2. Responsibilities of Senior Management ........................................................... 8
1.3. Responsibilities of the Chief Information Security Officer ................................. 8
1.4. Requirements for appointment as a Chief Information Security Officer ............ 9
1.5. The Information Security Steering Committee ................................................ 10
1.6. Other Risk Management Control Functions.................................................... 11
2.0 Cybersecurity Risk Management System .................................................. 12
2.1. The Risk Management System ...................................................................... 12
2.2. Vulnerability Identification ............................................................................... 13
2.3. Third party risk management .......................................................................... 14
2.4. Cybersecurity Maturity Assessment ............................................................... 14
2.5. Reporting Cybersecurity Self-Assessment ..................................................... 15
3.0 Enhancing Cybersecurity Resilience.......................................................... 16
3.1 Know Your Environment ................................................................................. 16
3.2 Implement Preventive Controls ...................................................................... 16
3.3 Monitor and Detect ......................................................................................... 16
3.4 Respond and Remediate ................................................................................ 17
3.5 Restore Service Operations ........................................................................... 17
3.6 Cyber-Threat Intelligence ............................................................................... 17
3.7 Sector-specific Cyber Resilience .................................................................... 17
4.0 Emerging Technologies ............................................................................... 18
4.1 New Payment Methods .................................................................................. 18
4.1 Open Banking ................................................................................................. 19
4.2 Distributed Ledger Technology....................................................................... 19
4.3 Artificial Intelligence and Machine Learning ................................................... 20
4.4 Cloud Computing ............................................................................................ 20
4.5 Internet of Things ........................................................................................... 21
4.6 FinTech Connections to Banks ....................................................................... 21
5.0 Metrics, Monitoring and Reporting ............................................................. 22
6.0 Compliance with Statutory and Regulatory Requirements ...................... 23
7.0 Enforcement ................................................................................................. 24
APPENDIX I: Critical Systems and Cyber-Incidents ................................................ 25
APPENDIX II: Know Your Environment.................................................................... 26
APPENDIX III: Cybersecurity Controls ..................................................................... 30
APPENDIX IV: Emerging Technologies ................................................................... 38
APPENDIX V: Informative References ..................................................................... 41
APPENDIX VI: Cybersecurity Self-Assessment Tools ............................................. 42
APPENDIX VII: Reporting Templates....................................................................... 43
Glossary ................................................................................................................... 47
ACRONYMS
ACM Access Control Matrix
AI Artificial Intelligence
API Application Programming Interface
ATM Automated Teller Machine
BOFIA Banks and Other Financial Institutions Act
BYOD Bring-Your-Own-Device
CCISO Certified Chief Information Security Officer
CISM Certified Information Security Manager
CISO Chief Information Security Officer
CISSP Certified Information Systems Security Professional
CSAT Cybersecurity Self-Assessment tool
CSP Cloud Service Providers
CTI Cyber-Threat Intelligence
DDoS Distributed Denial-of-Service
DLT Distributed Ledger Technology (DLT)
DMB Deposit Money Banks
ERM Enterprise-wide Risk Management
FS-ISAC Financial Services Information Sharing and Analysis Center
IaaS Infrastructure as a Service
ICAAP Internal Capital Adequacy Assessment Process
IDS Intrusion Detection System
IoT Internet of Things
IPS Intrusion Prevention System
IR Incident Response
ISSC Information Security Steering Committee
KYC Know Your Customer
MFA Multifactor Authentication
ML Machine Learning
NDPA Nigerian Data Protection Act
NeFF Nigeria Electronic Fraud Forum
NFC Near Field Communication
NFIC Nigeria Financial Industry CERT
NgCERT Nigeria Computer Emergency Response Team
NigFinCERT Nigeria Financial Nigeria Computer Emergency Response Team
OSINT Open-Source Intelligence
PaaS Platform as a Service
PAM Privileged Access Management
PoS Point of Sale
PSB Payment Service Banks
PT Penetration Test
QR Quick Response
RBAC Role Based Access Control
SaaS Software as a Service
SDLC Software Development Life Cycle
SFI Supervised Financial Institution
SLA Service Level Agreement
SOC Security Operation Centre
USSD Unstructured Supplementary Service Data
INTRODUCTION
The Nigerian financial system has witnessed remarkable growth in recent years, which
has led to an increase in products, services, institutions and stakeholders. To increase
public confidence in the financial system, it is imperative that banks operate in a safe
and secure environment.
Financial Institutions leverage information technology to expedite the flow of funds
among entities and for the provision of services to their customers. The technology
infrastructure and platforms that support their operations should be managed to
safeguard the confidentiality, integrity and availability of information assets, as well as
prevent financial loss and mitigate reputational risk.
Cybersecurity threats have continued to evolve and become more complex, with
increased frequency of threats such as phishing, ransomware, Distributed Denial-of-
Service (DDoS) attacks, amongst others. Consequently, financial institutions are
required to proactively secure their critical information assets to ensure that they
remain resilient in the face of these persistent threats. The prevalence of the use of
emerging technology by financial institutions to deliver services to customers has also
increased their attack surface.
It is in this regard that this framework, which outlines the minimum cybersecurity
controls to be put in place is being issued. The CBN’s Risk-Based Cybersecurity
Framework and Guidelines for Deposit Money Banks (DMBs) and Payment Service
Banks (PSBs) is designed to provide guidance in the implementation of cybersecurity
programmes towards enhancing their resilience.
The framework provides a risk-based approach to managing cybersecurity risk. The
document comprises seven parts: Cybersecurity Governance and Oversight;
Cybersecurity Risk Management System; Enhancing Cybersecurity Resilience;
Emerging Technologies; Metrics, Monitoring & Reporting; Compliance with Statutory
& Regulatory Requirements and Enforcement.
This framework replaces the Risk-based Cybersecurity Framework and Guidelines for
Deposit Money Banks and Payment Service Providers issued in October 2018 and
addresses the gaps that have arisen due to the passage of time. It equally considers
requirements of recent laws and regulations such as the Banks and Other Financial
Institutions Act (BOFIA 2020), Nigerian Data Protection Act (NDPA) 2023, etc. The
framework should be read in conjunction with all the provisions of all directives,
notices, circulars and guidelines that the CBN may issue from time to time.
The CBN Risk-based Cybersecurity Framework and Guidelines for DMBs and PSBs,
2023, shall apply to the following financial institutions under the purview of Banking
Supervision Department – Commercial banks, Merchant banks, Non-Interest banks
and Payment Service banks, which are hereinafter jointly referred to as Supervised
Financial Institutions (SFIs).
1.0 Cybersecurity Governance and Oversight
Cybersecurity governance and oversight sets the agenda and boundaries for
cybersecurity management and controls by defining, directing and supporting the
security efforts of SFIs. It outlines the responsibilities of the Board of Directors, Senior
Management, Chief Information Security Officer (CISO) and other relevant Risk
Management Control functions. Governance and oversight entail the development and
enforcement of policies, procedures and other forms of guidance that SFIs and their
stakeholders are required to comply with.
ii. cybersecurity is integrated with business functions and well managed across
the SFI.
iii. cybersecurity governance not only aligns with Corporate and Information
Technology (IT) governance but is driven by business objectives.
vi. the audit function is independent and staffed with skilled professionals who
possess relevant qualifications and experience.
vii. cybersecurity governance documents such as cybersecurity strategy,
framework and policies are established and aligned with the SFI’s business
goals and objectives.
viii. quarterly reports detailing the overall status of the cybersecurity programme are
presented by Senior Management. The reports shall, at a minimum, include the
following:
x. in the case of banking Groups, while institutions may collaborate with the group
CISO to ensure an effective enterprise-wide cybersecurity programme, a CISO
shall be appointed in conformity with the requirements in Section 1.4 of this
Framework.
The Board is responsible for the SFI’s cybersecurity strategy and shall ensure that:
ii. the approved cybersecurity framework aligns with business objectives and
technological approaches to address cyber risks and clearly defines key
cybersecurity roles and responsibilities.
iii. the cybersecurity policy clearly conveys its intent and the SFI’s approach to
achieving the cybersecurity objectives.
iv. the cybersecurity policy is reviewed annually at a minimum, or when there are
significant changes to the SFI’s cyber-risk exposure.
• Risk assessment
• Security policy development
• Incident response planning
• Vulnerability management
• Log monitoring
• Data backup and recovery plan
• Security awareness and training
• List of initiatives to attain target maturity level
• Metrics to assess the effectiveness of the programme
1.2. Responsibilities of Senior Management
Senior Management shall be responsible for the implementation of Board-approved
cybersecurity policies, standards and the delineation of cybersecurity responsibilities.
They shall be required to:
i. recommend to the Board the appointment of a CISO that meets the regulatory
requirements.
iii. provide periodic reports (at a minimum quarterly); to the Board on the overall
status of the cybersecurity programme as stipulated in Section 1.1 (vii).
iv. ensure that staff of the Information Security function attend relevant training
programmes regularly.
iii. There shall be no direct or indirect report to the Head of Information Technology
(IT) operations or Chief Risk Officer to avoid conflict of interest.
iv. The Appointment of a CISO shall be in line with the provisions of the Revised
Assessment Criteria for Approved Persons’ Regime for Financial Institutions,
2015 or any subsequent regulation.
v. Where the SFI is part of a Group that has a Group CISO charged with
establishing and maintaining an enterprise vision, strategy and programme, the
SFI’s CISO is required to replicate the responsibilities as required in Section
1.4 of this Framework.
vi. The CISO shall possess relevant qualifications with Information Security
Certifications such as Certified Information Systems Security Professional
(CISSP), Certified Information Security Manager (CISM) and Certified Chief
Information Security Officer (CCISO) among others and a minimum of ten
year’s in-depth experience in any of the following roles: Cybersecurity,
Information Technology, IT Risk Management or IT Audit.
ii. The roles, responsibilities, scope, and activities of the ISSC shall be as defined
in the Terms of Reference.
iv. The agenda for the meeting shall include a presentation on the “State of
cybersecurity” and address recent cyber events, vulnerabilities and proposals
for controls to reduce cyber risks. The summary of the report shall be included
in the reports to the Board referenced in Section 1.1(vii).
i. ensuring that SFI’s security policies and processes align with the business
objectives.
iv. providing strategic direction and cybersecurity governance for the SFI.
1.6. Other Risk Management Control Functions
All SFIs shall ensure the effectiveness of their cybersecurity governance by reviewing
their processes and controls annually. In this regard, these risk management control
functions shall have the following responsibilities:
ii. Senior Management shall ensure that staff or external risk management
professionals engaged to evaluate the institution's cybersecurity posture
possess the requisite qualifications and experience.
1.6.2. Audit
i. The Audit function shall be independent and the scope of cybersecurity audits
shall be clearly defined.
ii. The SFI’s cybersecurity programme shall be reviewed by the Audit function,
internal or external, with a view to determine the effectiveness of the controls
put in place and ascertain if they are adequate for the institution’s risk exposure.
iii. Senior Management shall ensure that internal or outsourced audit staff
engaged to review the institution's cybersecurity posture possess requisite
qualifications and experience.
1.6.3 Compliance
The Compliance function of SFIs shall periodically review the cybersecurity
programmes and processes to ensure adherence to relevant CBN directives and
extant regulations.
2.0 Cybersecurity Risk Management System
The Risk Management programme shall be based on an understanding of threats,
vulnerabilities, risk profile and level of risk tolerance of SFIs. The process shall also
be dynamic in view of the constantly changing risk landscape.
This process should be carried out annually and whenever major changes occur within
the institution such as an acquisition, merger or when new technology is deployed to
handle key business processes. The outcome of this process should be documented
in a Cybersecurity Risk Control Self-Assessment.
Risk acceptance criteria should be clearly defined and approved by the Board. In
cases where the SFI chooses to transfer risk, a detailed risk assessment for
outsourcing or cyber risk insurance should be documented.
ii. SFIs shall ensure the conduct of yearly vulnerability assessments and threat
analysis to detect and evaluate risk to its information assets and determine the
appropriateness of security controls to mitigate identified risk.
iv. SFIs shall ensure that internal vulnerability scans are carried out quarterly.
2.3. Third party risk management
SFIs should implement a third-party risk management framework to assess and
mitigate the risks associated with such relationships. The third-party risk management
framework should include processes for vendor selection, due diligence, contract
negotiations, ongoing monitoring and incident response.
Third parties should be routinely assessed using audits, test results, or other forms of
evaluations to confirm that contractual obligations are fulfilled.
Service Level Agreements (SLAs) should specify SFIs’ right to audit third parties or
receive audit reports.
Business continuity response and recovery planning and testing should be conducted
with third-party providers.
SFIs should implement some form of Insurance cover for various insurable technology
risks to mitigate financial losses.
SFIs are required to establish procedures to enhance their cyber resilience. This will
ultimately strengthen the financial industry’s cybersecurity posture.
The following are the minimum controls that an SFI shall put in place to ensure the
confidentiality, integrity and availability of critical information assets among others.
SFIs shall avoid creating single points of failure in the industry and proactively define
plans to mitigate such risks.
4.0 Emerging Technologies
Emerging technologies refer to innovative advancements that are in the early stages of
development or adoption and have the potential to significantly influence various
industries. SFIs are adopting new technologies and global trends that are transforming
various aspects of banking operations and customer experiences.
b. Voice-initiated services
2. Open Banking
5. Cloud Computing
Cyber-risks associated with the use of USSD include smishing, social engineering,
Distributed Denial of Service (DDoS) and SIM Swap.
The Regulatory Framework for Open Banking in Nigeria establishes principles for data
sharing across the banking and payments system to promote innovation and broaden
the range of financial products and services available to bank customers.
Cyber-risks associated with open banking include data privacy, fraud, identity theft and
API compromise.
SFIs should ensure compliance with the provisions of the Regulatory Framework for
Open Banking in Nigeria and Operational Guidelines for Open Banking in Nigeria.
Cyber-risks involved with DLT include API compromise, data privacy, data loss, Smart
Contract vulnerabilities, Money Laundering, Terrorism Financing and Proliferation
Financing.
Cyber-risks involved with the use of AI and ML include data breach, data leak, limited
data, poor data quality, breach of privacy laws, opaque algorithms, lack of skilled data
professionals.
SFIs have embraced the use of third-party cloud services in their operations for the
benefit of scalability, cost-efficiency, accessibility, security and reliability.
However, such engagements introduce risks including data breach, API compromise,
Insider threats, account hijacking, data loss, lack of visibility, Compliance and legal
issues.
4.5 Internet of Things
Internet of Things (IoT) refers to the network of physical devices, objects embedded with
sensors, software and connectivity. SFIs use IoT to facilitate efficient data collection,
processing and automation of key processes.
Cyber-risks involved with the use of IoT include Insecurely configured or poorly
protected IoT devices, poor firmware configurations, connectivity and power
dependencies, insecure communication and data breach.
FinTech connections expose SFIs to cyber risks such as fraud, API compromise,
unauthorised access, data privacy, data breach, compliance and legal issues.
SFIs are required to comply with the following regulations in the use of emerging
technologies:
The minimum-security controls that SFIs shall put in place in the adoption or
implementation of new technologies are detailed in Appendix IV.
5.0 Metrics, Monitoring and Reporting
SFIs are required to measure the effectiveness of their cybersecurity programme and
provide assurance to relevant authorities by defining and implementing performance
metrics.
Defined metrics should be aligned with strategic objectives and provide the information
needed for effective decision-making at the strategic, management and operational
levels.
ii. The metrics should help to identify deficiencies, failed security controls as well
as highlight the progress made in resolving issues.
iv. The Board shall be provided with quarterly reports to inform them of the status
of the Cybersecurity programme. The contents of the reports shall be as defined
in Section 1.1(vii) of this framework.
v. SFIs are required to report all cyber incidents (as defined in Appendix I) not
later than 24 hours after such incident is detected to the Director of Banking
Supervision, Central Bank of Nigeria using the report format in Appendix VII or
any other format that may be advised from time to time. Where necessary and
applicable, additional information should be provided afterwards.
6.0 Compliance with Statutory and Regulatory Requirements
i. The Board and Senior Management of SFIs shall ensure compliance with all
relevant statutes and regulations such as the Nigerian Cybercrimes Prohibition,
Prevention Act, 2015, NDPA, 2023, National Cybersecurity Policy and Strategy,
2021, etc., and all CBN directives to avoid breaches of legal, statutory,
regulatory obligations on Cybersecurity.
ii. SFIs shall participate in Industry cyber exercises and programmes to evaluate
their individual and joint response to potential cyber incidents that may have
systemic consequences, as may be advised from time to time. Such exercises
may be conducted by the Nigeria Financial Nigeria Computer
Emergency Response Team (NigFinCERT) or any other body as may be
advised periodically.
iii. Non-compliance with the provisions of this framework shall attract appropriate
sanctions as defined in Section 68 of BOFIA, 2020 or subsequent regulations.
7.0 Enforcement
i. The CBN shall monitor and enforce compliance with the provisions of this
framework.
ii. This shall be done through the annual Cybersecurity Supervisory Review and
Evaluation exercise, Risk Based Examination, Annual Industry Standard
Compliance audit and periodic spot check exercises.
APPENDICES
For the purpose of this framework, ‘critical system’ shall mean any IT infrastructure
(servers, applications, databases, network, ATM, POS, etc.) whose unavailability
(such as failure, unplanned downtime, etc.), corruption, unauthorized access and/or
interception of the information it stores, processes or transmit will result in a significant
financial loss and negatively impact business operation and service to customers.
b. Establish asset ownership and assign responsibility for managing each asset
to a specific individual or team.
c. Ensure that all identified devices are categorized by the criticality and sensitivity
of the data/information they store, process or transmit.
f. Maintain an inventory of all data assets, including locations, owners and access
controls.
k. Regularly review the catalog and remove any connection that is no longer
required.
SFIs shall:
d. where possible, monitor the dark web for mentions of the institution, critical
assets, or sensitive information such as customers’ data or staff’s access
credentials.
d. evaluate the security controls and processes of the CSP before adopting a
cloud service. Where applicable the data centre and network infrastructure
facilities of third parties should be visited, their cybersecurity policies should
be reviewed to ensure that all cybersecurity concerns are addressed.
b. regularly review the ACM to ensure privileges are withdrawn once staff
role changes.
c. ensure that risks associated with this category of persons are regularly
assessed as part of the enterprise risk assessment framework.
APPENDIX III: Cybersecurity Controls
SFIs shall:
a. at a minimum, biennially conduct background checks on employees such as
System administrators, Database Administrators, Application Administrators,
Information Security professionals etc., who implement policies and procedures
to protect sensitive information. These checks should include CRMS checks,
address verification, social media checks, lifestyle analysis, amongst others.
d. ensure that all logs and audit trails of privileged users’ activities are preserved
and regularly reviewed in accordance with the institution’s security policy.
f. ensure that logon credentials of default system accounts including test and
development servers are changed before they are commissioned for use.
c. ensure that vendors are not left unattended when accessing information
assets.
1.4. Physical Access Controls
SFIs shall:
a. establish physical security measures including, but not be limited, to physical
access controls such as video surveillance, biometrics, etc.
SFIs shall:
b. ensure that policies for security solutions are managed centrally and cannot
be turned off locally by users.
e. Ensure that wireless network use strong encryption and the frequency of
encryption key change has been defined.
1.6. Application and Data Security
SFIs shall:
b. ensure secure coding practices and conduct regular security testing throughout
the Software Development Life Cycle (SDLC) to identify and address
vulnerabilities in applications and systems.
c. ensure that Open-Source codes or libraries are properly tested before use.
g. ensure regular data backup, implement secure backup storage and regularly
test the restoration process as well as the security of stored data.
i. ensure compliance with relevant data protection and privacy regulations such
as Nigeria Data Protection Act (NDPA) 2023 and any subsequent legislation,
among others.
1.7. Remote Work Security
SFIs shall:
a. ensure that remote access to the network is through secure VPN connections
or other encrypted remote access solutions. The use of unencrypted Remote
Desktop Protocol for connection to corporate systems over the internet shall
not be allowed.
c. ensure the use of secure collaboration and communication tools that offer end-
to-end encryption, secure file sharing, and protected video conferencing
capabilities.
d. provide security awareness for staff working remotely to ensure they observe
security best practices.
b. ensure uniform security policies are adopted in infrastructure in the cloud and
on-premise.
SFIs shall:
a. ensure that responsibilities and timelines for remediation of identified
vulnerabilities are specified for different categories.
b. ensure that vulnerability remediation and patch application processes are
regularly audited and reports presented to Senior Management.
d. deploy security updates promptly after thorough testing and in accordance with
its Patch Management Policy.
c. specify and document log retention period based on the criticality of data. The
retention period should be approved by the Board.
SFI shall:
b. ensure that incident response plan have clear specifications for moving to the
recovery stage including verifying that all threats have been effectively
addressed prior to restoring affected systems, data or access.
The minimum controls required in adopting emerging technologies shall include the
identification of risks and opportunities, establishment of security controls, monitoring
and reporting.
d. encrypt sensitive data both in-transit and at rest and implement cryptographic
controls using the appropriate industry-standard protocols.
f. establish data protection measures and comply with data privacy laws and
regulations.
g. adhere to regulatory requirements and adopt industry best practices and cloud
provider recommendations for secure configuration of cloud resources.
j. implement secure coding practices when developing and using APIs. Employ
strong authentication and authorisation methods for API access, enforce usage
limits, and regularly audit and monitor API activities.
o. establish adequate SLAs with providers (cloud, Edge, API. etc.) that defines the
service level expectations, resolution of identified issues and penalties for
breach of agreement.
r. conduct regular security audits to ensure control measures are effective and up
to date.
3. Monitor and Report
SFIs shall:
g. ensure that the cloud service providers comply with relevant regulations and
have appropriate security controls.
APPENDIX V: Informative References
Below are a few risk assessment tools that can guide SFIs in achieving cyber resilience.
Other suitable resources may also be adopted but caution should be exercised on open-
source cyber-threat intelligence feeds due to high rate of false positive and/or false
negative alerts.
APPENDIX VII: Reporting Templates
Introduction
In accordance with Section 2.5 of the Central Bank of Nigerian Risk-based Cybersecurity
Security Framework, Deposit Money Banks (DMBs) and Payment Service Banks (PSBs)
are expected to conduct a cybersecurity self-assessment. This assessment shall identify
all cybersecurity vulnerabilities, threats, likelihood of successful exploit, potential impact
(reputational, financial, and regulatory) to information assets; and the associated risks.
The self-assessment shall include but not limited to identifying the adequacy of
cybersecurity governance, policies, procedures and standards; inherent risks in the
institution’s business operations; visibility to all emerging threats to information assets;
capability to swiftly respond and recover from cyber-incidents; and determining the
potency of existing controls to mitigate the identified risks.
In-view of this extant regulation, DMBs and PSBs shall conduct and report their Risk-
based Cybersecurity Self-Assessment using the CBN Cybersecurity Self-assessment tool
(CSAT), or any other tool as may be advised from time to time, annually but not later than
March 31st. The CSAT shall be prepared by the Chief Information Security Officer, with
inputs from other relevant functions, and shall also be endorsed by the CISO and
Executive Management. The report shall be submitted to the Director, Banking
Supervision Department, Central Bank of Nigeria.
Central Bank of Nigeria
Additional Contact:
____________________________________________________________________________________________
INCIDENT DETAILS
Incident Category
Financial Loss
Financial Loss:
Recoveries:
High
Moderate
Low
Incident Impact (By Risk):
Does the affected critical system(s)/ network(s) have potential impact on another critical
system/critical asset(s) of the DMB/PSB?
If “Yes”, please provide more details:
Incident Notification
Internal Management Affected Customer
CBN Law enforcement (Police, EFCC, etc.)
Others: Fire Service
INCIDENT ACTIONS
Incident Detection: (Date, Time and Details):
Affected System or Network: (Date, Time and Details):
Containment Measures:
Eradication Measures:
Recovery Measures: