An APRA Audit of Australia's Financial Institutions Unveiled Key Weaknesses in their Cyber defences
Data breaches have marred Australian news in recent times. Large-scale incidents at Medibank health insurance, Optus and Latitude Financial Services have grabbed headlines and claimed tens of millions of Australians as unlucky victims.
Given this backdrop, it may not be a shock that an audit of Australian institutions has unearthed substantial weaknesses in their cyber resilience and security preparedness.
The audit, the first of four tranches to be conducted by the Australian Prudential Regulation Authority (APRA), aims to help regulated companies within the financial services industry patch glaring holes in their security strategies.
The verdict from the first tranche, however, was damning. It found that organisations struggle to meet cyber security expectations and, in many cases, have yet to implement the core requirements in the four years since CPS 234 standards were introduced. It highlighted six fundamental areas of weakness when assessed against the prudential standards.
The Role of APRA and CPS 234 within our financial system
APRA, Australia's prudential supervisor, shoulders the responsibility for maintaining stability, competitiveness, and efficiency in our financial system. It has the power to licence financial organisations, supervise the industry, and set and enforce prudential security standards to promote and achieve its goals.
In 2019, in response to increasing cyberattacks in the financial sector, APRA implemented CPS 234. The purpose of this prudential standard is to ensure that regulated financial entities, including banks, insurers, and superannuation trustees, are:
In an environment where cyber threats are escalating and attackers are becoming more sophisticated, financial institutions need to pay close attention to the audit findings or run the risk of joining the long list of headline-grabbing organisations following a breach.
The Audit Process Found Six Key Weaknesses Across Organisations
The APRA audit, part of its 2020–2024 Cyber Security Strategy, is the largest of its kind, aiming to cover more than 300 banks, insurers, and superannuation trustees by the end of 2023.
The audit scrutinised around a quarter of APRA's regulated entities in the first tranche of assessments. Unfortunately, the results mirrored the concerning gaps found in a small pilot completed in mid-2021. The audit exposed six common areas of weakness, shown in the diagram below, which fundamentally undermine an organisation's cyber resilience.
In response to these findings, APRA urged every entity to review the common weaknesses and the proposed recommendations to address their cyber security control and governance policy shortfalls.
"The APRA encourages every entity to review those common weaknesses, along with the prudential standard itself, and incorporate relevant strategies and plans to address shortfalls in their cyber security controls and governance policies." - APRA
The regulator has also stated that it will continue to work with entities that do not sufficiently meet CPS 234 requirements, and it will further engage with the industry to lift the benchmark for cyber resilience.
These findings are crucial given the persistent threat to the finance sector and the highly-sensitive data that it safeguards
Four years since the inception of CPS 234, it’s deeply concerning that numerous financial services providers continue to struggle to meet cyber security standards. Many have yet to adopt the core requirements of the regulation, underlining a persistent and worrying gap between cyber security best practices and the harsh realities in the industry.
These findings are particularly alarming given that the finance sector consistently ranks second for cyber attacks in Australia, according to the OAIC notifiable data breach reports. The enormous volume of highly-sensitive information held by these institutions makes them a prime target for cyber attacks.
Considering these gaps, it's reasonable to assume they extend well beyond the companies already audited. Financial institutions in future tranches should heed these findings carefully. And it's not just the finance industry at risk - organisations in other sectors would benefit from assessing whether their cyber security strategy is exposed to the same vulnerabilities.
The APRA audit may have focused on financial institutions, but the lessons are universal - and urgently need to be heeded.
Below, we provide a summary of the common gaps following the phase of APRA audits as well as recommendations proposed by the APRA.
1. Incomplete identification and classification for critical and sensitive information assets;
“Without proper identification and classification, it can be difficult for entities to determine the appropriate information security controls to protect critical and sensitive data from unauthorised access or disclosure.” - APRA
Common gaps:
Recommendations:
2. Limited assessment of third-party information security capability;
"Achieving sufficient assurance of information security controls operated by third-party service providers is a common challenge. This is a concern as more and more entities are relying on service providers to manage critical systems." - APRA
Common gaps:
领英推荐
Recommendations:
3. Inadequate definition and execution of control testing programs;?
"In many cases, the testing programs of entities are incomplete, inconsistent, lack independence and do not provide adequate assurance for management and the Board." - APRA
Common gaps:
Recommendations:
4. Incident response plans not regularly reviewed or tested;
"Information security incident response plans were found to be incomplete, lack regular testing and review." - APRA
Common gaps:
Recommendations:
5. Limited internal audit review of information security controls;?
"Internal audit activities must include a review of the effectiveness of information security controls, including those maintained by third parties. Findings from the assessment indicate that internal audit assessment of third-party information security controls is limited across the industry." - APRA
Common gaps:
Recommendations:
6. Inconsistent reporting of material incidents and control weaknesses to APRA in a timely manner.
"APRA must be notified of material incidents and control weaknesses in every entity’s cyber security system. The assessment found that the process to identify and define these for reporting to APRA is often inconsistent, unclear and, in some cases, not in place at all." - APRA
Common gaps:
Recommendations:
If you would like to learn more about what we are building at Onqlave to help protect sensitive data, visit us at www.onqlave.com to get started, follow our updates via LinkedIn or feel free to get in touch with any of our team.
Sources:
Leading with Integrity to Build High Performance Teams | Tech | Leadership | Security | D365 | D&I Advocate
1 年Eye opening!