Under active development Content is continuously updated and improved

3.2.3Critical Asset Protection

>Control Description

FRFIs should employ enhanced controls and functionality to rapidly contain cyber security threats, defend its critical technology assets and remain resilient against cyber attacks by considering the following: Identifying cyber security controls required to secure its critical technology assets; Designing application controls to contain and limit the impact of a cyber attack; Implementing, monitoring and reviewing appropriate security standards, configuration baselines and security hardening requirements; and Deploying additional layers of security controls, as appropriate, to defend against cyber attacks (e.g., volumetric, low/slow network and application business logic attacks).

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.