3.2.3—Critical Asset Protection
>Control Description
FRFIs should employ enhanced controls and functionality to rapidly contain cyber security threats, defend its critical technology assets and remain resilient against cyber attacks by considering the following:
Identifying cyber security controls required to secure its critical technology assets;
Designing application controls to contain and limit the impact of a cyber attack;
Implementing, monitoring and reviewing appropriate security standards, configuration baselines and security hardening requirements; and
Deploying additional layers of security controls, as appropriate, to defend against cyber attacks (e.g., volumetric, low/slow network and application business logic attacks).
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.