Skip to main content

๐Ÿ’ผ 8 Under CPS 234, the Board of an APRA-regulated entity is ultimately responsible for the information security of the entity. In order for a Board to be able to more effectively discharge its responsibilities (including oversight, seeking assurance and, as appropriate, challenging management), it could consider the following:

  • Contextual name: ๐Ÿ’ผ 8 Under CPS 234, the Board of an APRA-regulated entity is ultimately responsible for the information security of the entity. In order for a Board to be able to more effectively discharge its responsibilities (including oversight, seeking assurance and, as appropriate, challenging management), it could consider the following:
  • ID: /frameworks/apra-cpg-234/01/08
  • Located in: ๐Ÿ’ผ 1 Considerations for the Board

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-c-b356ae8c

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 8a roles and responsibilities โ€” clearly outline for management how the Board expects to be engaged, including delegation of responsibilities, escalation of risks, issues and reporting requirements (including schedule, format, scope and content). Refer to Attachment H for common examples of the types of information that the Board might find useful to effectively fulfil its role and discharge its responsibilities.
๐Ÿ’ผ 8b information security capability โ€” consider the sufficiency of the regulated entityโ€™s information security capability in relation to vulnerabilities and threats; ensure sufficiency of investment to support the information security capability; and review progress with respect to execution of the information security strategy.
๐Ÿ’ผ 8c policy framework โ€” whether information security policies reflect Board expectations.
๐Ÿ’ผ 8d implementation of controls โ€” regularly seek assurance from and, as appropriate, challenge management on reporting regarding the effectiveness of the information security control environment and the overall health of the entityโ€™s information assets.
๐Ÿ’ผ 8e testing control effectiveness โ€” regularly seek assurance from and, as appropriate, challenge management on the sufficiency of testing coverage across the control environment; form a view as to the effectiveness of the information security controls based on the results of the testing conducted.
๐Ÿ’ผ 8f internal audit โ€” consider the sufficiency of internal auditโ€™s coverage, skills, capacity and capabilities with respect to the provision of independent assurance that information security is maintained; form a view as to the effectiveness of information security controls based on audit conclusions; and consider where further assurance, including through expert opinion or other means, is warranted.