Ransomware Self-Assessment Tool: OCTOBER 2020
Ransomware Self-Assessment Tool: OCTOBER 2020
Self-Assessment
Tool
OCTOBER 2020
Developed by the Bankers Electronic Crimes Task Force, State Bank Regulators, and the
United States Secret Service
Purpose
The Bankers Electronic Crimes Taskforce (BECTF), State Bank Regulators, and the United States Secret
Service developed this tool. It was developed to help financial institutions assess their efforts to mitigate
risks associated with ransomware 1 and identify gaps for increasing security. This document provides
executive management and the board of directors with an overview of the institution’s preparedness
towards identifying, protecting, detecting, responding, and recovering from a ransomware attack.
Ransomware is a type of malicious software (malware) that encrypts data on a computer, making it
difficult or impossible to recover. The attackers usually offer to provide a decryption key after a ransom is
paid; however, they might not provide one or it might not work if provided, which could make the financial
institution’s critical records unavailable. Companies that facilitate ransomware payments to cyber actors
on behalf of victims, including financial institutions, cyber insurance firms, and companies involved in
digital forensics and incident response, not only encourage future ransomware payment demands but
also may risk violating OFAC regulations 2.
Preparer Information
Please provide the following information regarding the preparer of this document.
1
Refer to Federal Financial Institutions Examination Council (FFIEC) Joint Statement Cyber Attacks Involving
Extortion
2
Refer to FinCEN Advisory Ransomware and the Use of the Financial System to Facilitate Ransom Payments and
OFAC Ransomware Advisory
2
3
Refer to Center for Internet Security’s The 20 CIS Controls & Resources
4
American Institute of CPAs System and Organization Controls (AICPA SOC), Center for Internet Security’s (CIS)
Controls, Control Objectives for Information Technologies (COBIT), Federal Financial Institutions Examination
Council Cybersecurity Assessment Tool (FFIEC CAT), Financial Services Sector Coordinating Council (FSSCC)
Cybersecurity Profile, International Organization for Standardization (ISO), National Institute of Standards and
Technology (NIST) Cybersecurity Framework, and Payment Card Industry Data Security Standard (PCI DSS).
5
Refer to the FFIEC Joint Statement - Cyber Insurance and Its Potential Role in Risk Management Programs
3
In-House Outsourced
Core Processing ☐ ☐
Network Administration ☐ ☐
Email Service ☐ ☐
Image Files (Checks, Loans, etc.) ☐ ☐
Trust ☐ ☐
Mortgage Loans ☐ ☐
Investments (Bonds, Stocks, etc.) ☐ ☐
Other Critical Data (Please List below):
☐ ☐
☐ ☐
☐ ☐
☐ ☐
☐ ☐
5. Do any third-party vendors (including any MSPs) have
continuous or intermittent remote access to the network? YES NO
If yes, explain the different types of access that they have (such as remote scripting,
patching, sharing screens, VPN, etc.)
If yes, are controls implemented to prevent ransomware and threat actors from
moving from the third-party’s network to the institution’s network via these types
of access?
☐ YES ☐ NO
Have all third-party vendors with remote access provided an independent audit
that confirms these controls are in place?
☐ YES ☐ NO
If yes, are common potential attack vectors (e.g., phishing, watering holes, malicious
ads, third-party apps, attached files, etc.) identified?
☐ YES ☐ NO
8. Indicate which of the following are included annually as part of employee security awareness
training programs. (Check all that apply.)
☐ Ransomware
9. Indicate which controls have been implemented for backing up Core Processing and
Network Administration data. (Check all that apply and provide explanations where needed
in the comment box below.) For other critical data, such as Trust services, Mortgage Loans,
Securities - Investments, and others, use the form in the Appendix. If any of this data is
managed by an outside vendor, consider asking the vendor to complete the questions.
☐ ☐
c) At least daily full system (vs incremental) backups are
made. (If not, please describe on next page.)
☐ ☐
each is stored on different media (disk, cloud, flash
drive, etc.) and they are stored separately. (Please
describe on next page.)
☐ ☐
e) At least one backup is offline, also known as air gapped
or immutable. (Please describe method on next page.)
Describe controls.
10. Indicate which of the following preventative controls have been implemented. (Check all
that apply.)
☐ with an app that generates a security code (vs a push text/SMS code)
☐ Adopted “least privileged access” concept for granting users access to shared
folders and other resources.
☐ Use of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
that detect and block ransomware activity including exchanging encryption keys.
DETECT
12. Indicate which of the following monitoring practices for servers, workstations, networks,
endpoints, and backup systems are utilized. (Check all that apply.)
☐ Data Loss Prevention Program that provides alerts for (and prevents) large
amounts of data from being exfiltrated by the ransomware.
RESPOND
13. Does the Incident Response Plan identify a person (internal or third-
party) with the expertise to manage/coordinate all aspects of a ☐ YES ☐ NO
ransomware response?
10
14. Indicate which of the following ransomware response procedures are included in the
Incident Response Plan. (Check all that apply.)
☐ Contact legal counsel and cyber insurance company (if applicable) so they are
immediately notified.
☐ Prepare document for internal staff to use when responding to customer questions.
☐ Establish procedures to ensure forensic information and audit logs are preserved
before any restoration is performed.
☐ Determine the scope of the infection by hiring specialized third parties or, if
appropriately experienced, by using in-house or MSP resources.
☐ Contact federal law enforcement as they periodically obtain decryption keys for
some variants of ransomware and they know how to preserve digital evidence.
☐ Periodically update contact information for firms that assist with incident response.
☐ Contact regulators.
☐ Other _____________________________________________________________
11
RECOVER
16. Indicate which of the following are included in return to normal operations procedures.
(Check all that apply.)
☐ User testing after restoration.
☐ After action review to identify lessons learned.
☐ Updating the Incident Response Plan with lessons learned.
☐ Notifying stakeholders as appropriate (employees, board, stockholders).
☐ Other:
____________________________________________________________________
COMMENTS (Optional)
12
☐ ☐ ☐
c) At least daily full system (vs incremental) backups
are made. (If not, please describe on next page.)
☐ ☐ ☐
maintained, each is stored on different media
(disk, cloud, flash drive, etc.) and they are stored
separately. (Please describe on next page.)
13
Comments on Controls
14