Roles and Responsibilities of the Management
CRA-5.8.4
The management is responsible for:
(a) Establishing and implementing cyber security policies and procedures that commensurate with the level ofcyber security risk exposure and its impact on thelicensee . These policies and procedures must take into account the following:(i) The sensitivity and confidentiality of data which thelicensee maintains;(ii) Vulnerabilities of thelicensee's information systems and operating environment across thelicensee ; and(iii) The existing and emergingcyber security threats .(b) ensuring that employees, agents (where relevant) and third party service providers are aware and understand thecyber security risk policies and procedures, the possible impact of variouscyber security threats and their respective roles in managing such threats;(c) recommending to the board on appropriate strategies and measures to managecyber security risk , including making necessary changes to existing policies and procedures, as appropriate; and(d) reporting to the board of any cyber security breaches and periodically update the board on emergingcyber security threats and their potential impact on the entity.Amended: April 2023
Amended: January 2020
Added: April 2019CRA-5.8.4A
Management must ensure that:
(a) Thelicensee has identified clear internal ownership and classification for all information assets and data;(b) Thelicensee has maintained an inventory of the information assets and data which is reviewed and updated regularly;(c) Employees responsible for cyber security are adequate to manage thelicensee’s cyber security risks and facilitate the performance and continuous improvement of all relevant cyber security controls; and(d) It provides and requires employees involved in cyber security to attend regular cyber security update and training sessions (for example Security+, CEH, CISSP, CISA, CISM, CCSP) to stay abreast of changing cyber security threats and countermeasures.Added: April 2023CRA-5.8.4B
With respect to Paragraph CRA-5.8.4A(a), data classification entails analyzing the data the licensee retains, determining its importance and value, and then assigning it to a category. When classifying data, the following aspects should be determined:
(a) Who has access to the data;(b) How the data is secured;(c) How long the data is retained (this includes backups);(d) What method should be used to dispose of the data;(e) Whether the data needs to be encrypted; and(f) What use of the data is appropriate.The general guideline for data classification is that the definition of the classification should be clear enough so that it is easy to determine how to classify the data. The owner of data (i.e. the relevant business function) should be involved in such classification.
Added: April 2023