Security Awareness Training (SAT) Text

Review the text of the SAT below.

Security Awareness Training MUST be taken every 365 days.

This Security Awareness Training addresses the following topics:

Why is security important in the CDR?

What We Are Protecting

Cybersecurity refers to the protection of networks, systems, devices, and data from unauthorized access and use. There are three elements to protecting information systems:

  1. Confidentiality: Protecting information from unauthorized disclosure to people or processes
  2. Integrity: Assuring the reliability and accuracy of data and information technology (IT) resources
  3. Availability: Defending information systems and resources from malicious and unauthorized users to ensure accessibility by authorized users

Cybersecurity and Privacy protection are interconnected. You are responsible for securing SI and PII when it is in transit AND when stored on a hard drive, laptop, flash drive, or archived.

What CDR Data is Considered Sensitive?

The majority of Call data is public information, except for those items listed in the General Instructions section of the Call Report instructions, all entity contact information, edit explanations by institutions, and analyst comments. The confidentiality of Call data elements is determined by the FFIEC Task Force on Reports. The confidential determination of data elements is modified from time to time, i.e., a data element deemed confidential in one quarter may be classified as non-confidential in a subsequent quarter and vice-versa.

Application Security Architecture

The application security architecture of the CDR is based on authentication, authorization, and role based access control (RBAC).

Authentication

The CDR calls for the following types of authentication.

Authentication methods include the following.

Authorization

The application security architecture is based on role-based security. Consequently, a user is authorized to use a particular application resource if and only if the user has been authenticated and the resource role is contained in the set of roles assigned to the user. Roles may be assigned to a user only by the CDR Security Administrator or by the Delegated Site Administrator (DSA) of the user's organization.

CDR Security Administrators manage users across all the organizations that exist within the CDR. The CDR allows users that belong to the FFIEC agencies, Financial Institutions (banks) or Report Data Preparation Software Vendors the ability to register themselves with the CDR. DSAs are created for each organization within the CDR to manage the users that belong to their respective organizations. Registration requests for accounts within the CDR must be approved either by the Organization's DSA for the organization that a user is registering for, or by the CDR Security Administrators.

A CDR Security Administrator or a DSA assigns roles to a user based upon the access privileges that the user would need to perform their job function. Certain users within the CDR may perform more than one role. CDR Security Administrators and DSAs may assign roles by a Role Group.

CDR users will be automatically logged out of the application after 30 minutes of inactivity.

Gaining Access to the CDR

Individuals MUST request a CDR account in their own name. CDR accounts MUST NOT be shared by multiple users. Users may request a CDR account by clicking the “Request An Account” link on the CDR Application Login page.

CDR User Accounts and Multifactor Authentication (MFA)

Delegated Site Administrators (DSA)

A DSA manages user accounts for their organization.

The organization's DSA must be the FIRST account requested for the organization. The CDR Security Administrators verify the identity of the DSA account requestor and then create the account with appropriate roles. Subsequent user accounts for the organization are created and assigned roles by the organization's DSA. Each organization should set up and maintain two DSAs to ensure adequate user support.

DSAs are responsible for managing all user accounts for their organization. The CDR responsibilities and duties that all DSAs must accept on behalf of their organization include:

Non- DSAs

Non-DSA accounts may also be requested using the “Request An Account” link on the CDR Application Login page. Requested accounts are sent to the DSA of the organization selected in the request. The DSA verifies the identity of the requestor and then creates the account and assigns appropriate roles.

Conclusion