Joint-Standard 1 of 2023 IT Governance Risk Management
Joint-Standard 1 of 2023 IT Governance Risk Management
9 OF 2017)
JOINT STANDARD 1 OF 2023
INFORMATION TECHNOLOGY (IT) GOVERNANCE AND RISK MANAGEMENT
REQUIREMENTS FOR FINANCIAL INSTITUTIONS
The Financial Sector Conduct Authority and the Prudential Authority, under section
107 of the Financial Sector Regulation Act, 2017 (Act No. 9 of 2017), read with
sections 105(1), 106(1) and 108 of such Act, hereby makes the ‘Joint Standard 1 of
2023 – Information Technology (IT) Governance and Risk Management Requirements
for Financial Institution’ as per the Schedule below.
This Joint Standard sets out the principles and minimum requirements for information
technology (IT) governance and risk management that financial institutions must
adhere to, in line with sound practices and processes in managing IT.
It is the responsibility of the governing body of a financial institution to ensure that the
financial institution meets the requirements set out in this Joint Standard on a
continuous basis.
Contents
1. Commencement ................................................................................................3
2. Legislative authority ...........................................................................................3
3. Definitions and interpretation .............................................................................3
4. Application .........................................................................................................5
5. Roles and responsibilities ..................................................................................5
6. IT strategy ..........................................................................................................6
7. IT risk management framework .........................................................................6
8. Oversight of IT risk management .......................................................................8
9. IT operations ......................................................................................................8
10. Handling of sensitive or confidential information ...............................................9
11. Risks associated with financial products and financial services ......................10
12. IT programme and/or project management .....................................................10
13. IT resilience and business continuity ...............................................................11
14. IT assurance ....................................................................................................13
15. Notification and reporting requirements ...........................................................13
16. Short-title .........................................................................................................13
2
SCHEDULE
1. Commencement
1 15 November 2024
2. Legislative authority
2.1 This Joint Standard is made under section 107 read with sections 105, 106
and 108 of the Financial Sector Regulation Act, 2017 (Act No. 9 of 2017) (the
Act).
3.1 In this Joint Standard, ‘the Act’ means the Financial Sector Regulation Act,
2017 (Act No. 9 of 2017) and any word or expression to which a meaning has
been assigned in the Act bears the meaning so assigned to it, unless the
context indicates otherwise-
3
SCHEDULE
financial institution who has authorised such person to access the financial
institution’s systems;
‘fit and proper requirements’ means requirements relating to—
(a) honesty and integrity;
(b) good standing;
(c) competence, including —
(i) experience or expertise; and
(ii) knowledge, qualifications or certification.
‘FSP’ means financial services provider as defined in section 1 of the FAIS
Act;
‘governing body’ means ‘governing body’ as defined in section 1 of the Act;
‘hardware’ means physical components of a computer system;
‘independent review’ means a review conducted by internal or external audit
function or an independent control function;
‘information asset’ means any piece of data, device or other component of
the environment that supports information-related activities. In the context of
this Joint Standard, information assets include data, hardware and software
and excludes paper-based information;
‘IT’ means information technology;
‘IT asset’ means an asset including software, hardware, internal and external-
facing network system that are found in the business environment;
‘IT environment’ means the IT components which comprise the IT assets,
operations and human elements of a financial institution;
‘IT programme and project’ means any project or programme, or part
thereof, where IT systems and services are changed, replaced, dismissed or
implemented. IT projects can be part of wider IT or business transformation
projects or programmes;
‘IT system’ means the integration of IT assets within the IT environment;
‘material incident’ means a disruption of a business activity, process or
function which has, or is likely to have, a severe and widespread impact on
the financial institution’s operations, services to its customers, or the broader
financial system and economy;
‘network’ means a group of computers that use a set of common
communication protocols over digital interconnections for the purpose of
sharing resources located on, or provided by, the network nodes;
‘risk identification’ means the determination of the threats and vulnerabilities
to a financial institution’s IT environment;
‘RPO’ means the recovery point objective and refers to the acceptable amount
of data loss for an IT system, should a disaster or system disruption occur;
‘RTO’ means the recovery time objective and means the duration of time, from
the point of disruption, within which a system should be restored;
‘senior management’ means -
(a) the chief executive officer or the person who is in charge of a financial
institution; or
(b) a person, other than a director or a head of a control function-
(i) who makes or participates in making decisions that-
(aa) affect the whole or a substantial part of the business of a
financial institution; or
(bb) have the capacity to significantly affect the financial
standing of a financial institution; or
4
SCHEDULE
4. Application
5.1 The governing body is ultimately responsible for ensuring that the financial
institution complies with the requirements as set out in this Joint Standard.
5.2 The governing body must ensure, together with senior management, that a
sound and robust IT risk management framework and IT strategy is
established and maintained.
5.3 The governing body must clearly define the roles and responsibilities of all
management, execution, oversight and control functions as well as
committees established for the purpose of exercising oversight of IT risks.
5
SCHEDULE
6. IT strategy
6.1 A financial institution must ensure that its IT strategy is approved by the
governing body and aligned with its overall business strategy.
6.2 The IT strategy of a financial institution must be reviewed regularly, but at least
annually, in consideration of market, industry, technology and other relevant
developments.
6.3 A financial institution must -
(a) establish a set of action plans that contain measures to be taken in order
to achieve the objective of its IT strategy. The action plans must be
communicated to all relevant staff and must be reviewed regularly, but
at least on a quarterly basis, to ensure relevance and appropriateness;
(b) establish processes to monitor and measure the effectiveness of the
implementation of its IT strategy; and
(c) ensure that the responsible authority for the financial sector law in terms
of which the financial institution is licensed or registered, is notified when
a deviation from the IT strategy that may contravene this Joint Standard
or any other financial sector law relating to IT risk management is
discovered. The notification must be done in the form, manner and time-
period determined by the Authorities.
6
SCHEDULE
7
SCHEDULE
9. IT operations
8
SCHEDULE
(b) maintain efficiency of its IT operations, including, but not limited to the
need to consider how to minimise potential incidents arising from the
execution of manual tasks;
(c) implement appropriate logging and monitoring procedures for critical IT
operations to allow the detection, analysis and correction of incidents;
(d) store the configuration of the IT assets and the links and
interdependencies between the different IT assets, to enable an
appropriate configuration management process;
(e) implement performance, capacity planning and monitoring processes to
prevent, detect and respond to important performance issues of IT
systems and IT capacity shortages in a timely manner;
(f) define and implement IT system backup and restoration procedures to
ensure recovery of IT systems as required;
(g) establish and implement an effective IT change management process to
ensure that all changes to IT systems are recorded, tested, assessed,
approved, implemented and verified in a controlled manner; and
(h) establish and implement a problem and incident management process to
identify, track (including timing), log, categorise and classify incidents
according to priority, based on business criticality. In addition, the
problem management procedure must be able to analyse and solve the
root cause behind the incidents.
9.4 The scope and frequency of backups, as referred to in paragraph 9.3(f) above,
must be set out in line with:
(a) business recovery requirements; and
(b) the criticality of the data and the IT systems, evaluated according to a
performed risk assessment.
9.5 Testing of the backup and restoration procedures must be undertaken
regularly, but at least annually.
9.6 A financial institution must implement appropriate segregation of duties
between development, testing and operations environments, as applicable.
9
SCHEDULE
11.1 A financial institution must clearly identify IT risks associated with the types of
financial products or financial services being offered, and formulate security
controls, system availability and recovery capabilities, which are
commensurate with the level of risk exposure for all operations, including the
internet-facing operations.
11.2 A financial institution must -
(a) properly evaluate security requirements associated with its internet
facing systems and adopt encryption algorithms which align with well-
established practices and international standards;
(b) establish appropriate security monitoring systems and processes to
detect or monitor IT risk exposure in relation to financial services offered;
(c) implement measures to plan and track capacity utilisation as well as
guard against online attacks; and
(d) implement reasonable measures to protect IT users, including
customers, who use online systems to interact with the financial
institution and access and transact with its financial products and
financial services. Additionally, a financial institution must ensure
customer awareness of security measures that are put in place by the
financial institution to protect the customers in an online environment.
10
SCHEDULE
(b) ensure that its IT programme and project management policy confirms
that IT security requirements are analysed and approved by a function
that is independent from the development function;
(c) identify, monitor and mitigate risks deriving from its portfolio of IT
programmes and projects, considering risks that may result from
interdependencies between different IT programmes and projects and
from dependencies of multiple programmes and projects utilising the
same resources and/or expertise;
(d) ensure that before any acquisition or development of IT systems takes
place, the functional and non-functional requirements (including
information security requirements) are clearly defined and approved by
the relevant governance structure;
(e) follow its methodology for testing and approval of IT systems prior to
implementation into the production environment. This methodology must
consider the criticality of business processes and assets. The testing
must ensure that new IT systems perform as intended. It must also use
test environments that adequately reflect the production environment;
(f) where feasible, implement controls in the IT environment to ensure
adequate segregation of duties between the pre-production environment
that is a mirror of the production environment to mitigate the impact of
risks introduced to the production systems. A financial institution must
also ensure the segregation of production environments from
development, testing and other non-production environments;
(h) implement appropriate measures to protect the integrity of the source
codes of IT systems that are developed in-house. In addition, a financial
institution must document the development, implementation, operation
and/or configuration of the IT systems comprehensively to reduce any
unnecessary dependency on subject matter experts;
(i) ensure that the documentation of the IT system contains, where
applicable, user documentation, technical system documentation and
operating procedures;
(j) ensure that processes for acquisition and development of IT systems
applied by the department(s) responsible for IT must also apply to IT
systems acquired by business functions outside the IT department, using
a risk-based approach; and
(k) maintain a register of the critical applications, business functions and
processes.
11
SCHEDULE
12
SCHEDULE
the responsible authority4 for the financial sector law in terms of which the
financial institution is licensed or registered, must be notified. The notification
must be done in the form, manner and time-period determined by the
Authorities.
13.9 A financial institution must ensure that it implements appropriate network
redundancy contingency plans such as arrangements with different network
service providers or a network service provider with alternate network paths.
14. IT assurance
14.1 The control functions and/or external assurance providers, must, have the
capacity to independently review and provide objective assurance of
compliance with all IT-related activities as outlined in the financial institution’s
policies and procedures as well as with external requirements.
14.2 A financial institution must through the control functions or an external
assurance provider -
(a) establish an organisational structure and reporting lines for IT assurance
within the control functions, where appropriate, in a way that preserves
the independence and objectivity of the control functions;
(b) determine whether changes in the existing operational environment
influence the existing IT controls or require the adoption of additional
measures to mitigate the risks involved. These changes must be in
accordance with the financial institution’s formal change management
process; and
(c) maintain an IT assurance plan to examine and evaluate the adequacy
and effectiveness of the financial institution’s IT systems, internal control
mechanisms and governance arrangements.
15.1 A financial institution must notify the responsible authority of the financial
sector law in terms of which the financial institution is licensed or registered,
in the form and manner determined by the Authorities, of any systems failure,
malfunction, delay or other disruptive event, within the determined timeframe,
after classifying the event as a material incident.
15.2 In addition, to the requirements of paragraph 15.1 above, the Authorities may,
through ongoing supervisory review and evaluation processes, request for
specific information or regulatory reports as well as assurance in terms of
compliance with this Joint Standard.
16. Short-title
16.1 This Joint Standard is called ‘IT Governance and Risk Management for
Financial Institutions, 2023’.
4 The responsible authority for the respective financial sector law is identified in Schedule 2 of the Act.
13