Policies and procedures
|
- Adopt and implement cyber security policies and procedures
- Tailor policies and procedures to fit the nature and scope of the business.
- Indicate parties responsible for administration, implementation, and communication.
- Reviewed at least annually
|
Risk assessment
|
- Categorize and prioritize risk.
- Identify Service providers that receive, maintain or process adviser or fund information (Vendor Management).
- Risk assessment should include written documentation.
- Risk assessment should be conducted periodically.
|
User security and access
|
- Require standards of behavior (Acceptable Use Policy, or AUP).
- Identify and authenticate individual users.
- Create procedures for distribution, revocation and replacement of passwords or authentication methods.
- Restrict access to adviser or fund information or those who require access to perform their job function.
- Secure remote access technologies
|
Information protection
|
- Assess the sensitivity and importance of adviser or fund information.
- Identify any adviser or fund information that is personal.
- Assess where and how adviser or fund information is access, stored and transmitted AND monitoring this information in transmission.
- Assess adviser or fund information systems access control and malware protection. Assess the potential effect of a cyber security incident involving an adviser or fund information on the adviser or fund and its clients or shareholders including the ability to continue to provide service.
|
Threat and vulnerability management
|
- Detect, mitigate, and remediate threats and vulnerabilities through ongoing monitoring including internal and externally facing systems.
- Once identified threats and vulnerabilities should minimize the window of opportunity to exploit vulnerable hardware and software.
- Adopt policies that establish accountability including intake, assignment, escalation, remediation, and testing.
|
Cyber security incident response and recovery
|
- Implement measures to detect respond to and recover from a cyber security incident including the continued operation of the fund or adviser, the protection of systems and information therein, the sharing of communications both internal and external as well as reporting to the Commission.
- Prepare written documentation of ANY cyber security incident including response and recovery from an incident.
|
Annual review and required written reports
|
- Review and assess the cyber security policies and procedures including any changes over the review period.
- Prepare a written report that contains: the annual review, the assessment, control tests performed, and documentation of any cyber security incidents that occurred since the last report as well as any material changes in policies and procedures since the last report.
|
Fund board oversight
|
- The fund’s board must approve the funds cyber security policies and procedures and review the written report in cyber security incidents and material changes to the cyber security policies.
- Board oversight should not be a passive activity.
|
Recordkeeping
|
- Advisers must maintain a copy of their cyber security policies and procedures that are in effect or have been in effect for the last 5 years.
- a copy of the written report/annual review for the last 5 years.
- a copy of any completed ADV-C completed for the last 5 years.
- Records of documenting cyber security incidents including response and recovery for the last 5 years.
- Records documenting a risk assessment for the last 5 years.
|
Incident reporting (Form ADV-C)
|
- Disclose and Report a cyber security incident via the IARD system and completion of form ADV-C within 48 hours.
- Amend and update the form as new information is uncovered and as necessary.
- A new form housed within the IARD system for the reporting of a cyber security incident. See sample attached.
|
Adviser disclosure of a cyber security incident
|
- Disclose cyber security risks in plain English.
- “Cyber security Risks and Incidents” will be added to Form ADV’s narrative brochure, or Part 2A.
- Disclose ALL cyber security risks that could materially impact advisory services as well as how they address, prioritize, and address risk
- Deliver an interim disclose to existing clients.
- List cyber security incidents within the last 2 fiscal years that led to harm the adviser or clients.
|
Fund disclosure of a cyber security incident
|
- Disclose cyber security risks in plain English to prospective and current investors.
- The fund would be required to disclose any significant fund cyber security incident that has occurred during its last two fiscal years.
|