Prudential Standard CPS 234 Information Security (CPS 234) is an APRA prudential standard that was released in response to increasing cyberattacks in the financial sector.
Australian Prudential Regulation Authority’s (APRA) mission is to establish and enforce prudential security standards designed to ensure that, under all reasonable circumstances, financial promises made by its regulated entities are met within a stable, efficient, and competitive financial services sector.
APRA Prudential Standard CPS 234 is one such standard aiming to ensure that an APRA-regulated entity takes measures to be resilient against information security incidents (including cyber-attacks) by maintaining an information security capability commensurate with information security vulnerabilities and threats.
The goal is to minimize the likelihood and impact of information security incidents on the confidentiality, integrity or availability of information assets, including those managed by related parties or third-party service providers by introducing security requirements (and testing of the implementation of controls) for information technology assets.
Discover how to improve compliance tracking efficiency with UpGuard's vendor questionnaire software.
CPS 234 is an important cybersecurity framework for Australian businesses because it is designed to ensure APRA-regulated entities are resilient to cyber-attacks and other security risks. Additionally, it requires that entities respond in a timely manner should a notifiable data breach or other security incident occur.
Cyber-attacks are increasing in frequency, sophistication and impact, with perpetrators continually refining their efforts to compromise systems, networks and information.
Financial institutions are some of the most prominent targets due to possible financial reward (APRA currently supervises institutions holding $6.5 trillion in assets) and access to the personally identifiable information (PII) and protected health information (PHI) that they hold on Australian citizens.
An accelerant to this trend is the increasing use of technology and third-party vendors by superannuation, banking and insurance companies who want to improve customer experience and drive operational efficiencies.
Consequently, stakeholders including Boards of directors, senior management, shareholders, customers, and regulators have heightened expectations for the effective safeguarding of information assets underpinned by a culture that promotes information security.
CPS 234 aims to reduce cyber risk and improve cybersecurity by requiring that APRA-regulated entities maintain an information security capability commensurate with their information security vulnerabilities and threats, and employ vendor risk management practices to reduce the likelihood and impact of incidents involving related or third-parties.
CPS 234 applies to all APRA-regulated entities namely:
Additionally, where an APRA-regulated entity's information assets are managed by a third party, the requirements in CPS 234 also apply to those information assets.
CPS 234 mandates that third-party vendors processing data from APRA-regulated entities also adhere to the regulation
Learn how UpGuard's reporting feature helps you track compliance >
The Board of an APRA-regulated entity is ultimately responsible for CPS 234 compliance. The Board must ensure that the entity maintains information security in a manner commensurate with the size and extent of threats to its information assets, and which enables the continued sound operation of the entity.
That said, the Board can delegate security roles and responsibilities to Board sub-committees, management committees or individuals. As long as the Board can clearly outline how it expects to be engaged with respect to information security, including escalation of risks, issues and reporting.
Additionally, entities must have clearly defined information security-related roles and responsibilities of the Board, senior management, governing bodies and individuals with responsibility for decision-making, approval, oversight, operations and other information security functions.
This is typically achieved through a combination of role statements, policy statements, reporting lines and charters of governing bodies. Common governing bodies and individuals with decision-making, approval, oversight, operations and other information security roles and responsibilities include:
These committees and individuals are typically located in separate business units, within the IT function, and within related and third-parties. This can result in a lack of ownership, unclear accountabilities, ineffective oversight and fragmentation of practices.
To address these issues, clear delineation of the responsibilities of each area and compensating security measures must be employed.
Additionally, the Board, governing bodies and individuals should define their information requirements (e.g. schedule, format, scope and content) to ensure they are provided with sufficient and timely information to effectively perform their roles and responsibilities.
This should include both quantitative and qualitative content. For non-technical audiences, technical information and metrics should be supplemented with appropriate thematic analysis and commentary on business implications.
This should be supported by defined escalation paths and thresholds, alongside a process to periodically review the audience relevance and fitness for use.
For additional guidance beyond this guide, we recommend reading Prudential Practice Guide CPG 234 Information Security.
CPS 234 requires APRA-regulated entities to:
These key requirements can be broken down further into eight categories, namely:
The requirements of CPS 234 were designed to align with the security standards of ISO 27001, so if you’ve already implemented ISO 27001, CPS 234 compliance should be easier.
UpGuard empowers organizations to clearly define the roles and responsibilities of all security staff to ensure the efficient deployment of remediation efforts for all information assets.
With UpGuard's executive reporting functionality, a comprehensive report can be instantly generated for APRA to keep them informed of all your security posture improvement efforts.
Get a free trial of UpGuard >
CPS 234 requires APRA-regulated entities to:
To meet these requirements, APRA-regulated entities would typically review the adequacy of resourcing, including funding and staffing, timely access to necessary skill sets and the comprehensiveness of the control environment.
Typical controls may include:
Additionally, entities must also understand the sufficiency of resources, skills and controls of third-parties and related parties, including the consideration of sub-contracting and on-sourcing arrangements (fourth-party risk).
This can be achieved through a combination of interview, service reporting, control testing, certifications, attestations (e.g. SOC 2), referrals and independent assurance assessments.
As CPS 234 requires entities to actively maintain their information security capability, entities should adopt an adaptive and forward-looking approach including ongoing investment in resources, skills and controls. This could be informed by existing and emerging information security vulnerabilities and threats, contemporary industry practices, information security incidents (internal and external), and known information security issues.
UpGuard continuously monitors the entire attack surface, both internal and throughout the vendor network to help organizations effectively manage threats and remediate vulnerabilities.
UpGuard also mitigates both third-party and fourth-party risks with targeted risk assessments and remediation workflows.
Get a free trial of UpGuard >
Under CPS 234, APRA-regulated entities are required to maintain an information security policy framework commensurate to their exposure to vulnerabilities and threats. This policy should provide direction on the responsibilities of all parties who have an obligation to maintain information security, including governing bodies, staff, contractors, consultants, related parties, third-parties and customers.
Typically this framework is structured as a hierarchy, with higher level policies supported by underlying standards, guidelines and procedures. Common areas addressed in the policy framework include:
This policy framework would typically be consistent with other entity frameworks such as risk management, service provider management and project management.
Additionally, entities should include an exemption policy defining registration, authorisation and duration requirements. This would typically be a register detailing the nature, rationale and expiry date of exemptions.
This allows entities to review and assess the adequacy of compensating controls both initially and on an ongoing basis.
Finally, the policy should be periodically evaluated to determine its effectiveness and completeness, and adjustments should be made to ensure its continued effectiveness where needed.
UpGuard is a complete end-to-end threat management solution allowing businesses to instantly detect and address vulnerabilities that could be exploited by cybercriminals.
With UpGuard's custom questionnaire builder, organizations can create contextualized assessments to assess compliance with the information security policy framework.
Get a free trial of UpGuard >
APRA-regulated entities must classify information assets, including those managed by related parties and third-parties by criticality and sensitivity.
This includes infrastructure, ancillary systems such as environmental control systems and physical access control systems, as well as information assets managed by third-parties and related parties.
The interrelationships between information assets, including those which are not intrinsically critical or sensitive but could be used to compromise information assets which are critical or sensitive.
Furthermore, this should reflect the degree to which information security incidents have the potential to affect, financially or non-financially, the entity or the interests of depositors, policyholders, beneficiaries or other customers.
To provide clarity to internal and external stakeholders, entities should maintain a classification methodology that provides context about what constitutes information assets, granularity considerations, and the method for rating criticality and sensitivity. It's important to note that assets may have a different rating for criticality and sensitivity.
It is up to the entity to determine whether to assess information assets at a granular level or an aggregated level on a case-by-case basis. That said, where an entity has chosen to aggregate a number of underlying components into a single assets, the criticality and sensitivity rating for that asset would typically inherit the criticality and sensitivity rating of the constituent components with the highest rating.
To assist with this, entities generally employ an information asset inventory repository such as a configuration management database (CMBD) to registry and map interrelationships to other assets.
Finally, it is common for entities to leverage their existing business continuity impact analyses to assess criticality and other processes to assess sensitivity.
UpGuard instantly rates the criticality of all discovered vulnerbitlies so that remediation efforts can be efficiently distributed. This capability extends to all third-party vendors and their information assets.
Get a free trial of UpGuard >
Under CPS 234, APRA-regulated entities must implement information security controls to protect information assets, including those managed by related or third-parties, in a timely manner and commensurate with:
UpGuard monitors both internal and third-party information assets to detect and remediate critical vulnerabilities that could expose sensitive data.
This level of data protection extends across the entire lifecycle of information assets to prevent overlooked exposures at all stages of business development.
Get a free trial of UpGuard >
APRA-regulated entities should ensure existing and emerging security vulnerabilities and cyber threats, especially those pertaining to critical and sensitive information assets, are identified, assessed and remediated in a timely manner.
This includes those which are not critical or sensitive but could be used to expose critical or sensitive information assets.
To do this, entities typically:
An important but often overlooked aspect of vulnerability management is minimising vulnerabilities while maintaining supportability. Many exploitable vulnerabilities arise from hardware and software which is outdated or has limited or no support (whether managed in-house or by a third-party or related party).
A well-known example is the Eternal Blue zero-day exploit that resulted in the spread of the WannaCry ransomware worm.
To reduce this risk, entities should decommission systems:
When considering the implementation of new technology, entities should only authorize its use in a production environment when the technology has:
To facilitate this, many entities develop a technology authorization process and maintain an approved technology register.
This generally means allocating responsibility and accountability of an information asset to an information asset owner, typically an individual location within the business function most dependent on the asset.
Planning and design controls are the first phase of the information asset lifecycle, typically in place to ensure information security is incorporated from the beginning and typically comply with the entity's information security policy framework.
To prevent the introduction of new information assets compromising existing assets, acquisition and implementation controls are typically in place. Ongoing support and maintenance controls are typically in place to ensure assets continue to meet information security requirements, such as:
Finally, decommissioning and destruction controls ensure information security is not compromised when assets reach the end of their life. Controls include archiving strategies and secure data deletion of sensitive information prior to disposal of physical assets.
As with other information security practices, entities should regularly assess the completeness of their controls by comparing themselves to peers and contemporary industry practices.
Lifecycle management controls are particularly important for end-user developed/configured software which has the purpose of automating day-to-day business processes or facilitating decision-making. As such, entities must introduce processes to identify and classify end-user developed/configure software and assess risk exposures.
The absence of physical and environmental controls can compromise the effectiveness of otherwise well-informed information security controls. As such, APRA-regulated entities typically have the following physical and environmental controls in place:
Common change management controls include:
APRA-regulated entities typically implement secure software development and acquisition techniques to ensure software:
APRA-regulated entities typically have data leakage controls commensurate with the sensitivity of the data including:
In short, access to sensitive data (e.g. customer databases or intellectual property) should be highly restricted to reduce the risk of data leaks.
Common targets include:
UpGuard is capable of detecting and remediating internal data leaks. This propriety solution is supported by a team of cybersecurity experts that can detect data leaks on your behalf and revise them to eliminate all false positives.
Watch the video below for an overview of UpGuard's data leak detection features.
Cryptographic techniques should be used as a form of access control to sensitive data in storage and in transit, with the strength of encryption commensurate with the sensitivity and criticality of the data and supplementary or compensating controls.
In general, an end-to-end approach should be used where encryption is applied from the point of entry to the final destination to minimise the risk of exposure.
Where appropriate, technology controls such as firewalls, network access control, intrusion detection/prevention devices, anti-malware, encryption and monitoring or log analysis tools should be deployed.
How reliant entities can be on technology solutions depends on:
APRA-regulated entities must evaluate the design of information security controls of third-parties and related parties.
This can be achieved through a combination of interview, survey, control testing, certifications, contractual review, attestations and independent assurance assessments.
Once controls are identified, they should be compared to common industry controls, the entity's internal controls and the information assets involved.
Additionally, the entity should understand whether sub-contracting or on-sourcing agreements are permissible within the agreements and if so, awareness of changes to the services they outsource is needed.
Typically, information security considerations should be captured as contractual obligations with oversight agreements.
UpGuard offers a TPRM solution that includes third-party risk assessments and remediation controls that can be efficiently scaled with the support of expert cybersecurity staff.
With continuous visibility into the vendor threat landscape, organizations can remain informed about the resilience of all third-party security controls.
Get a free trial of UpGuard >
APRA-regulated entities should consider low likelihood, extreme impact (financial or non-financial) events that could threaten their ongoing ability to meet their obligations, such as:
Understanding these plausible worst case scenarios can help entities identify and implement additional controls to prevent or reduce the impact of such events.
Under CPS 234, APRA-regulated entities must have robust mechanisms in place to detect and respond to information security incidents in a timely manner.
Detection mechanisms typically include scanning, sensing, monitoring and logging solutions.
The strength and nature of these controls will depend on the impact of a potential security incident, typically covering a broad set of events, ranging from physical hardware to higher order business activities like payments and changes to user access.
Common techniques include:
There should be a clear allocation of responsibilities for monitoring processes with appropriate tools in place for timely detection.
Additionally, entities should maintain incident response plans to respond to information security incidents that could plausibly occur, including mechanisms for:
Common information security incidents include:
The level of detail of response plans should be sufficient to minimise the amount of decision-making required, provide clarity regarding roles and responsibilities, and provide mechanisms for managing all relevant stages of an incident including:
Incident response plans should be reviewed annually and tested to ensure they remain effective and fit-for-purpose.
Additionally, entities should seek to formalise the roles and responsibilities of themselves, third-parties and related parties in situations that require collaboration and coordination between them.
Finally, entities that place reliance on the information security of related or third-parties should seek evidence of the party's periodic testing of their own incident response plans.
This work can be assisted by business continuity, crisis management, continuity plans and recovery plans.
UpGuard combines threat detection with remediation management so to help security teams rapidly respond to internal and third-party threats.
Get a free trial of UpGuard >
Under CPS 234, APRA-regulated entities must test the effectiveness of information security controls through a systematic testing program whose nature and frequency is commensurate with:
That said, it is APRA's view that security controls are tested at least annually, or whenever there is a material change to information assets or the business environment, in order to validate controls remain effective.
It is important that success criteria for tests are clearly defined, including the circumstances under which re-testing would be required. Test results should be escalated and reported to the Board or senior management, with associated follow-up actions formally tracked and reported in a timely manner.
Finally, testing should be conducted by appropriately skilled and functionally independent specialists who can provide a sufficiently bias-free assessment of controls.
UpGuard facilitates a consistent communication stream between businesses and the information security controls of their vendors.
This is achieved by harmonizing security ratings, risk assessments, and third-party vulnerability and data leak detection.
Get a free trial of UpGuard >
Internal audit is an important vehicle by which the Board can gain assurance that information security is maintained.
This assurance is generally achieved through the inclusion of information security within the entity's internal audit activities and a review of the design and operating effectiveness of information security controls, including those maintained by related and third-parties.
Information security control assurance must be provided by personnel appropriately skilled in providing such assurance.
Additionally, the internal audit function must assess the information security control assurance provided by related or third-parties where:
If the assessment identifies deficiencies or no assurance is available, the issue is typically raised with the Board for consideration.
APRA must be notified as soon as possible and no later than 72 hours after an entity becomes aware of an information security incident that:
APRA expects the following information to be provided:
Additionally, APRA must be notified as soon as possible and no later than 10 business days after an entity becomes aware of a material information security control weakness, which the entity does not expect to remediate in a timely manner. APRA expects the following information to be provided:
These material control weaknesses can be identified through control testing, assurance activities, information security incidents (external or internal), vulnerability notification by software and hardware vendors, and other forms of notification by related or third-parties.
UpGuard's Vendor Risk Management software can minimize the amount of time your organization spends assessing related and third-party information security controls by automating vendor questionnaires and providing vendor questionnaire templates that map to CPS 234 requirements.
We can help you continuously monitor your vendors' external security controls and provide an unbiased security rating based on 70+ critical attack vectors including:
Our expertise has been featured in the likes of The New York Times, The Wall Street Journal, Bloomberg, The Washington Post, Forbes, Reuters, and TechCrunch. You can also read more about what our customers are saying on Gartner reviews