WHO DOES IT APPLY TO

  • Applies to all financial institutions that MAS regulates, ranging from large banks to venture capital firms and payment services firms
  • Not all mandatory: use a risk-based approach

EXPECTATIONS FOR FINANCIAL INSTITUTIONS

  • Financial institutions should conduct gap analysis to determine non-compliance
  • Any non-compliance as a result of implementation difficulties should be documented and explained with mitigating controls identified
  • Financial institutions’ compliance with guidelines will be assessed by external auditors or MAS

EXPECTATIONS FOR SERVICE PROVIDERS

  • While MAS does not expect service providers to comply with the guidelines, any regulated client may expect service providers to have similar or identical requirements as per the guidelines
  • At a minimum, service providers need to have secure and resilient systems

FOCUS ON BOARD OF DIRECTORS AND SENIOR MANAGEMENT

  • Ensure technology risk management framework is established
  • Appoint Chief Information Officer (or its equivalent)
  • Appoint Chief Security Officer (or its equivalent)
  • Directors and senior managers be trained on technology risks and practices
  • Manage information assets

TECHNOLOGY RISK MANAGEMENT APPLICABILITY

  • Risk applies to any third party delivered using IT, third party storing or electronically processing confidential or sensitive customer information
  • Manage third party IT risks prior to engagement
  • Ensure third party applies high standard care and diligence concerning data confidentiality and system resilience

INHOUSE SOFTWARE REQUIREMENTS

  • Adopt secure coding, source code review and application security testing if in-house software developed
  • Consider third party service provider IT risks and development and provision of services

ENHANCED DATA AND INFRASTRUCTURE SECURITY

  • Focus on non-traditional areas such as Internet of Things (loT), Shadow IT, and Bring Your Own Device (BYOD)

CYBER SECURITY OPERATIONS

  • Collect and process information on cyber events, threat intelligence and system vulnerabilities
  • Assess potential impact to the financial institutions’ business and IT environment
  • Exchange timely and actionable cyber threat information with other parties
  • Establish cyber security operations centre or acquire managed security services to monitor cyber threats
  • Establish cyber incident response and management plan to resolve cyber threats

ASSESS CYBER SECURITY

  • Carry out scenario-based exercises such as social engineering or cyber range exercises to check speed of response and readiness
  • Perform adversarial attack simulation exercises
  • Set up remediation to track and resolve issues identified from cyber exercises

HOW CAN ARGUS HELP

Argus is able to assist in set up of the fund as well as the fund manager in the following manner:

  • Perform gap analysis against current Technology Risk Management Guidelines and provide recommendations and improvement.
  • Assist to review third party service providers and provide assessment on whether they are able to meet the Technology Risk Management Guidelines requirements.
  • Draft/review Technology Risk Management Policy.
  • Provide periodic reviews on technology risk management and provide assessment report.

If you intend to know more, have any queries or need further information on any matters relating to the above mentioned, feel free to reach out to us at info@argusglobal.co.

Pin It on Pinterest

Contact us
close slider
Contact us

Fill up the form below to get in touch with us!

Online Training
AML/CFT Training 2021
Friday, 25 June 2021
2.30 - 4.00 SGT

days to go


Save your Seat