Cybersecurity has become one of the most critical compliance priorities for financial services firms in Hong Kong. Both the Securities and Futures Commission (SFC) and the Insurance Authority (IA) have progressively strengthened their expectations regarding how licensed firms protect their systems, data, and client information from cyber threats. In an era of increasingly sophisticated attacks, firms that fail to implement robust cybersecurity measures face not only regulatory sanctions but also significant reputational and financial damage.

This comprehensive guide examines the cybersecurity requirements and expectations imposed by both regulators, offering practical guidance for firms seeking to build or enhance their cybersecurity frameworks. Whether you are a newly licensed firm establishing your cybersecurity posture or an established firm reviewing your existing measures, this article provides the essential information you need.

1. SFC Baseline Cybersecurity Requirements

The SFC has issued several circulars and guidelines establishing baseline cybersecurity standards for licensed corporations. The key requirements stem from the Guidelines for Reducing and Mitigating Hacking Risks Associated with Internet Trading and subsequent circulars on cybersecurity.

The SFC's baseline requirements encompass the following areas:

  • Infrastructure Security: Firms must implement adequate network security controls including firewalls, intrusion detection/prevention systems, and network segmentation to isolate critical systems from general office networks.
  • Access Controls: Strict access control mechanisms must be in place, including role-based access, principle of least privilege, and regular review of user access rights. Privileged access accounts must be closely monitored and controlled.
  • Data-in-Transit Protection: All sensitive data transmitted over public networks must be encrypted using industry-standard protocols (TLS 1.2 or above). This includes client communications, trading data, and internal data transfers.
  • Data-at-Rest Protection: Sensitive data stored on servers, databases, and portable devices must be encrypted. This includes client personal data, trading records, and financial information.
  • Patch Management: Firms must maintain a systematic patch management process to ensure all systems, applications, and firmware are kept up to date with security patches. Critical patches should be applied within a defined timeframe.
  • Endpoint Security: All endpoints including workstations, laptops, and mobile devices must have up-to-date anti-malware protection. Removable media controls should be implemented.

2. IA Cybersecurity Expectations

The Insurance Authority has established its own set of cybersecurity expectations for authorised insurers and licensed insurance intermediaries. While the IA's approach shares many similarities with the SFC's framework, there are specific requirements tailored to the insurance industry.

The IA expects licensed firms to:

  • Establish a cybersecurity governance framework with clear roles, responsibilities, and accountability at board and senior management level
  • Conduct regular cyber risk assessments to identify, evaluate, and prioritise cybersecurity risks specific to their operations
  • Implement appropriate technical controls proportionate to the size, nature, and complexity of the firm's operations
  • Maintain cyber incident response plans that are regularly tested and updated
  • Ensure adequate cybersecurity awareness training for all staff, with enhanced training for those in high-risk roles
  • Exercise due diligence in managing third-party cybersecurity risks, particularly for outsourced IT services and cloud computing arrangements

Insurance brokers handling policyholder data must pay particular attention to data protection requirements, as they often process large volumes of sensitive personal and medical information.

3. Two-Factor Authentication (2FA) Requirements

Two-factor authentication has become a non-negotiable requirement for licensed firms. The SFC mandates 2FA for:

  • Internet trading systems: All client-facing internet trading platforms must implement 2FA for login and transaction authorisation
  • Remote access: Any remote access to the firm's internal systems and networks must use 2FA
  • Privileged access: Administrative access to critical systems, databases, and network equipment must require 2FA
  • Email systems: Access to corporate email from external networks should be protected by 2FA

Acceptable forms of second authentication factors include hardware tokens, software tokens (authenticator apps), SMS one-time passwords (though these are increasingly discouraged due to SIM-swap risks), and biometric authentication. The SFC has indicated a preference for more secure methods such as hardware tokens and authenticator apps over SMS-based verification.

Important Note on SMS-Based 2FA

While SMS one-time passwords remain technically acceptable, the SFC has expressed concern about the vulnerability of SMS-based authentication to SIM-swap attacks and interception. Firms are encouraged to transition to more robust authentication methods such as authenticator apps or hardware security keys.

4. Data Protection and Privacy (PDPO)

Hong Kong's Personal Data (Privacy) Ordinance (PDPO) applies to all licensed firms and establishes six Data Protection Principles (DPPs) that firms must comply with. The intersection of PDPO requirements with cybersecurity obligations creates a comprehensive data protection framework.

Key PDPO requirements relevant to cybersecurity include:

  • DPP 4 - Data Security: Personal data must be protected against unauthorised or accidental access, processing, erasure, loss, or use. Firms must implement security measures appropriate to the sensitivity of the data and the potential harm from a breach.
  • Data Breach Notification: While Hong Kong does not currently have a mandatory data breach notification law, both the SFC and IA expect firms to report significant cybersecurity incidents. The Privacy Commissioner has issued guidance recommending voluntary notification of affected individuals and the Commissioner's office.
  • Cross-Border Data Transfers: Firms transferring personal data outside Hong Kong must ensure adequate protection measures are in place, including contractual safeguards and assessment of the data protection regime in the receiving jurisdiction.
  • Data Retention: Firms must establish clear data retention policies that balance regulatory record-keeping requirements with the PDPO principle of not retaining personal data longer than necessary.

5. Incident Reporting Obligations

Both the SFC and IA have established clear expectations regarding the reporting of cybersecurity incidents. Prompt reporting is essential, and failure to report material incidents can itself constitute a regulatory breach.

SFC Reporting Requirements

Licensed corporations must report material cybersecurity incidents to the SFC as soon as practicable, typically within the same business day of discovery. Reportable incidents include:

  • Successful or attempted unauthorised access to client accounts or trading systems
  • Data breaches involving client personal data or trading information
  • Ransomware or malware incidents affecting business operations
  • Distributed denial-of-service (DDoS) attacks impacting service availability
  • Any incident resulting in significant financial loss or disruption to operations

IA Reporting Requirements

The IA similarly expects licensed insurance intermediaries and authorised insurers to report significant cybersecurity incidents promptly. The IA's focus areas include incidents affecting policyholder data, claims processing systems, and premium collection mechanisms.

In both cases, firms should prepare an initial report containing the nature of the incident, estimated impact, immediate containment measures taken, and planned remediation steps. A detailed follow-up report should be submitted once the investigation is complete.

6. Third-Party Vendor Risk Management

The increasing reliance on third-party technology providers, cloud services, and outsourced IT functions has made vendor risk management a critical component of cybersecurity compliance. Both the SFC and IA expect firms to conduct thorough due diligence on their technology vendors and maintain ongoing oversight.

Key requirements for third-party vendor management include:

  • Pre-Engagement Due Diligence: Assess the cybersecurity posture of potential vendors before engagement, including their security certifications (ISO 27001, SOC 2), incident history, and data handling practices
  • Contractual Safeguards: Ensure service agreements include cybersecurity requirements, audit rights, incident notification obligations, data handling and return/destruction provisions, and service level agreements for security
  • Ongoing Monitoring: Regularly review vendor security performance, request updated security assessments, and conduct periodic audits or request audit reports
  • Cloud-Specific Considerations: For cloud computing arrangements, firms should assess data sovereignty, encryption, access controls, and the cloud provider's compliance with relevant regulations
  • Exit Strategy: Maintain a viable exit strategy to ensure business continuity in case a vendor relationship must be terminated, including provisions for data migration and transition

7. Penetration Testing and Vulnerability Assessment

Regular penetration testing and vulnerability assessments are expected by both regulators as a means of proactively identifying security weaknesses before they can be exploited by malicious actors.

Penetration Testing

Firms should conduct penetration testing at least annually, or more frequently if significant changes are made to systems or infrastructure. Penetration tests should be performed by qualified independent third parties and should cover:

  • External network penetration testing (perimeter security)
  • Internal network penetration testing
  • Web application testing (including client-facing platforms)
  • Mobile application testing (if applicable)
  • Social engineering testing (phishing simulations)

Vulnerability Assessments

In addition to annual penetration testing, firms should conduct regular vulnerability scans, ideally on a monthly or quarterly basis. Identified vulnerabilities should be categorised by severity and remediated according to defined timelines: critical vulnerabilities within 48 hours, high within one week, medium within one month, and low within a reasonable period.

8. Business Continuity for Cyber Events

Cybersecurity incidents can cause significant business disruption, making it essential for firms to have specific business continuity plans addressing cyber events. This goes beyond standard business continuity planning to address the unique challenges posed by cyber incidents.

A cyber-specific business continuity plan should address:

  • Incident Classification: A framework for classifying cyber incidents by severity and determining appropriate response levels
  • Communication Protocols: Pre-defined communication plans for notifying regulators, clients, staff, and other stakeholders during a cyber incident
  • System Recovery: Detailed procedures for recovering critical systems, including backup restoration, system rebuilding, and data recovery processes
  • Alternative Operations: Plans for maintaining essential business operations while systems are being recovered, including manual processing procedures
  • Forensic Investigation: Procedures for preserving evidence and conducting forensic analysis to understand the attack vector and prevent recurrence

9. Staff Awareness and Training

Human error remains one of the most significant cybersecurity vulnerabilities. Both regulators emphasise the importance of comprehensive and ongoing cybersecurity awareness training for all staff. A well-designed training programme should include:

  • Induction Training: All new employees should receive cybersecurity awareness training as part of their onboarding process, covering the firm's cybersecurity policies, acceptable use policies, and basic security hygiene
  • Regular Refresher Training: Annual refresher training for all staff, covering emerging threats, updated policies, and lessons learned from recent incidents
  • Role-Specific Training: Enhanced training for staff in high-risk roles, including IT administrators, compliance officers, and those handling sensitive client data
  • Phishing Simulations: Regular phishing simulation exercises to test staff awareness and identify areas where additional training is needed
  • Senior Management Awareness: Board and senior management should receive tailored briefings on cybersecurity risks, the firm's risk posture, and their governance responsibilities

10. Regulatory Enforcement Actions

Both the SFC and IA have demonstrated their willingness to take enforcement action against firms with inadequate cybersecurity measures. Regulatory consequences for cybersecurity failures can include:

  • Reprimands: Public or private reprimands for inadequate cybersecurity controls
  • Fines: Monetary penalties which can be substantial, particularly where client data has been compromised or significant financial losses have occurred
  • Licence Conditions: Additional conditions imposed on the firm's licence, such as requirements for enhanced monitoring, independent reviews, or restrictions on certain activities
  • Suspension or Revocation: In severe cases, temporary suspension of licence or revocation of authorisation
  • Personal Liability: Responsible Officers and senior management can face personal regulatory consequences for failure to ensure adequate cybersecurity governance

Notable enforcement actions in recent years have targeted firms that suffered data breaches due to inadequate security controls, failed to implement required 2FA measures, or did not report cybersecurity incidents promptly. These cases serve as important reminders of the regulatory expectations and the consequences of non-compliance.

11. Practical Implementation Checklist

The following checklist provides a practical framework for firms to assess and enhance their cybersecurity posture:

Governance and Policy

  • Cybersecurity governance framework with clear board-level accountability
  • Comprehensive cybersecurity policy approved by senior management
  • Dedicated cybersecurity officer or CISO appointed (or outsourced equivalent)
  • Regular cybersecurity reporting to board/senior management
  • Cyber risk integrated into enterprise risk management framework

Technical Controls

  • Next-generation firewalls and intrusion detection/prevention systems
  • Two-factor authentication implemented for all required access points
  • Data encryption for data in transit (TLS 1.2+) and data at rest
  • Endpoint detection and response (EDR) solutions deployed
  • Network segmentation isolating critical systems
  • Systematic patch management process with defined timelines
  • Secure backup systems with offline/offsite copies
  • Email security (SPF, DKIM, DMARC) and anti-phishing measures

Operations and Monitoring

  • 24/7 security monitoring or managed security service provider (MSSP)
  • Security information and event management (SIEM) system
  • Incident response plan with defined roles and escalation procedures
  • Regular penetration testing (minimum annually) by independent testers
  • Monthly or quarterly vulnerability scanning
  • Third-party vendor security assessment programme

People and Awareness

  • Cybersecurity awareness training programme for all staff
  • Regular phishing simulation exercises
  • Clear acceptable use policy communicated to all staff
  • Background checks for staff with access to sensitive systems
  • Secure onboarding and offboarding procedures

"Cybersecurity is not merely a technology issue; it is a fundamental business and regulatory risk. Boards and senior management must take an active role in understanding and overseeing their firm's cybersecurity posture. The regulators expect nothing less."

Key Takeaway

Building a robust cybersecurity framework is an ongoing process, not a one-time project. Firms should adopt a continuous improvement approach, regularly reviewing and enhancing their measures in response to evolving threats and regulatory expectations. Starting with a gap analysis against the regulatory requirements outlined in this guide is a practical first step.

Need Help with Cybersecurity Compliance?

We help licensed firms develop and implement cybersecurity frameworks that meet SFC and IA expectations. From gap analysis to policy development and implementation support, we guide you every step of the way.

Chat with Us on WhatsApp

網絡安全已成為香港金融服務機構最重要的合規重點之一。證券及期貨事務監察委員會(證監會)和保險業監管局(保監局)持續提高對持牌機構在保護系統、數據及客戶資料方面的期望。在網絡攻擊日益複雜的時代,未能實施完善網絡安全措施的機構不僅面臨監管制裁,還會遭受重大的聲譽和財務損失。

本綜合指南審視兩個監管機構對網絡安全的要求和期望,為尋求建立或加強網絡安全框架的機構提供實用指導。無論您是正在建立網絡安全體系的新持牌機構,還是正在檢視現有措施的成熟機構,本文都提供了您所需的基本資訊。

1. 證監會基線網絡安全要求

證監會已發出多份通函及指引,為持牌法團制定基線網絡安全標準。主要要求源自《降低及減輕與互聯網交易相關的黑客入侵風險指引》及其後有關網絡安全的通函。

證監會的基線要求涵蓋以下範疇:

  • 基礎設施安全:機構必須實施足夠的網絡安全控制措施,包括防火牆、入侵偵測/防禦系統,以及網絡分段以將關鍵系統與一般辦公網絡隔離。
  • 存取控制:必須實施嚴格的存取控制機制,包括基於角色的存取、最小權限原則,以及定期檢視用戶存取權限。特權存取帳戶必須受到嚴密監控。
  • 傳輸中數據保護:所有透過公共網絡傳輸的敏感數據必須使用業界標準協議加密(TLS 1.2或以上),包括客戶通訊、交易數據及內部數據傳輸。
  • 靜態數據保護:儲存在伺服器、數據庫及可攜式裝置上的敏感數據必須加密,包括客戶個人資料、交易記錄及財務資訊。
  • 修補程式管理:機構必須維持系統性的修補程式管理流程,確保所有系統、應用程式及韌體均保持最新的安全修補程式。關鍵修補程式應在指定時間內套用。
  • 端點安全:所有端點(包括工作站、筆記本電腦及流動裝置)必須安裝最新的防惡意軟體保護。應實施可移除媒體控制。

2. 保監局網絡安全期望

保險業監管局已為獲授權保險人及持牌保險中介人制定了一套網絡安全期望。雖然保監局的方針與證監會的框架有許多相似之處,但也有針對保險業的特定要求。

保監局期望持牌機構:

  • 建立網絡安全治理框架,在董事會及高級管理層層面明確角色、責任和問責
  • 定期進行網絡風險評估,以識別、評估及優先處理針對其業務的網絡安全風險
  • 實施與機構規模、性質及業務複雜程度相稱的適當技術控制措施
  • 維護定期測試和更新的網絡事件應急計劃
  • 確保所有員工接受足夠的網絡安全意識培訓,為高風險崗位人員提供加強培訓
  • 在管理第三方網絡安全風險方面進行盡職審查,特別是針對外包IT服務及雲端運算安排

處理保單持有人數據的保險經紀必須特別注意數據保護要求,因為他們經常處理大量敏感的個人和醫療資訊。

3. 雙重認證(2FA)要求

雙重認證已成為持牌機構的基本要求。證監會規定以下情況必須使用2FA:

  • 互聯網交易系統:所有面向客戶的互聯網交易平台必須實施2FA以進行登入及交易授權
  • 遠端存取:任何對機構內部系統及網絡的遠端存取必須使用2FA
  • 特權存取:對關鍵系統、數據庫及網絡設備的管理存取必須要求2FA
  • 電郵系統:從外部網絡存取企業電郵應受2FA保護

可接受的第二認證因素包括硬件令牌、軟件令牌(認證器應用程式)、短訊一次性密碼(儘管因SIM卡交換風險而日益不受推薦)及生物特徵認證。證監會已表示偏好更安全的方法,如硬件令牌和認證器應用程式。

有關短訊2FA的重要提示

雖然短訊一次性密碼在技術上仍然可以接受,但證監會已對短訊認證容易受到SIM卡交換攻擊和截取的脆弱性表示關注。鼓勵機構過渡到更穩健的認證方法,如認證器應用程式或硬件安全金鑰。

4. 數據保護及私隱(《個人資料(私隱)條例》)

香港的《個人資料(私隱)條例》(PDPO)適用於所有持牌機構,並確立了機構必須遵守的六項保障資料原則。PDPO要求與網絡安全義務的交匯創建了一個全面的數據保護框架。

與網絡安全相關的主要PDPO要求包括:

  • 保障資料原則4 - 資料安全:個人資料必須受到保護,防止未經授權或意外的存取、處理、刪除、遺失或使用。機構必須實施與數據敏感性及違規潛在危害相稱的安全措施。
  • 數據外洩通知:雖然香港目前沒有強制性的數據外洩通知法律,但證監會和保監局均期望機構報告重大網絡安全事件。私隱專員公署已發出指引,建議自願向受影響個人及公署通報。
  • 跨境數據傳輸:將個人資料轉移至香港以外的機構必須確保有適當的保護措施,包括合同保障及對接收司法管轄區的數據保護制度的評估。
  • 數據保留:機構必須制定明確的數據保留政策,在監管記錄保存要求與不應保留個人資料超過所需時間的PDPO原則之間取得平衡。

5. 事故報告義務

證監會及保監局均已就網絡安全事件的報告制定了明確的期望。及時報告至關重要,未能報告重大事件本身就可能構成監管違規。

證監會報告要求

持牌法團必須在發現重大網絡安全事件後盡快向證監會報告,通常在發現後的同一個工作天內。須報告的事件包括:

  • 成功或企圖未經授權存取客戶帳戶或交易系統
  • 涉及客戶個人資料或交易資訊的數據外洩
  • 影響業務運營的勒索軟件或惡意軟件事件
  • 影響服務可用性的分散式阻斷服務(DDoS)攻擊
  • 任何導致重大財務損失或業務中斷的事件

保監局報告要求

保監局同樣期望持牌保險中介人及獲授權保險人及時報告重大網絡安全事件。保監局的重點範疇包括影響保單持有人數據、理賠處理系統及保費收取機制的事件。

在兩種情況下,機構均應準備一份初步報告,包含事件性質、估計影響、已採取的即時控制措施及計劃的補救步驟。在調查完成後應提交詳細的後續報告。

6. 第三方供應商風險管理

隨著對第三方技術供應商、雲端服務及外包IT功能的依賴日益增加,供應商風險管理已成為網絡安全合規的關鍵組成部分。證監會及保監局均期望機構對技術供應商進行徹底的盡職審查並維持持續監督。

第三方供應商管理的主要要求包括:

  • 委聘前盡職審查:在委聘前評估潛在供應商的網絡安全狀況,包括其安全認證(ISO 27001、SOC 2)、事件歷史及數據處理慣例
  • 合同保障:確保服務協議包含網絡安全要求、審計權利、事件通知義務、數據處理及退回/銷毀條款,以及安全方面的服務水平協議
  • 持續監控:定期檢視供應商安全表現,要求更新的安全評估,並進行定期審計或要求審計報告
  • 雲端特定考慮:對於雲端運算安排,機構應評估數據主權、加密、存取控制以及雲端供應商是否符合相關法規
  • 退出策略:維持可行的退出策略,以確保在必須終止供應商關係時的業務持續性,包括數據遷移和過渡的條款

7. 滲透測試及漏洞評估

兩個監管機構均期望定期進行滲透測試和漏洞評估,作為主動識別安全弱點的手段。

滲透測試

機構應至少每年進行一次滲透測試,如對系統或基礎設施進行了重大更改,則應更頻繁地進行。滲透測試應由合資格的獨立第三方執行,涵蓋範圍包括:

  • 外部網絡滲透測試(邊界安全)
  • 內部網絡滲透測試
  • 網絡應用程式測試(包括面向客戶的平台)
  • 流動應用程式測試(如適用)
  • 社交工程測試(釣魚模擬)

漏洞評估

除年度滲透測試外,機構應定期進行漏洞掃描,理想情況下每月或每季度進行。已識別的漏洞應按嚴重程度分類,並按規定的時間表進行修復:嚴重漏洞在48小時內、高危在一週內、中等在一個月內、低風險在合理時間內。

8. 網絡事件的業務持續性

網絡安全事件可能導致重大業務中斷,因此機構必須制定專門針對網絡事件的業務持續計劃。這超越了標準業務持續性規劃,以應對網絡事件帶來的獨特挑戰。

網絡專門的業務持續計劃應涵蓋:

  • 事件分類:按嚴重程度對網絡事件進行分類並確定適當應對級別的框架
  • 通訊協議:在網絡事件期間通知監管機構、客戶、員工及其他利益相關者的預定通訊計劃
  • 系統恢復:恢復關鍵系統的詳細程序,包括備份還原、系統重建及數據恢復流程
  • 替代運營:在系統恢復期間維持基本業務運營的計劃,包括人手處理程序
  • 取證調查:保存證據及進行取證分析以了解攻擊途徑和防止再次發生的程序

9. 員工意識及培訓

人為錯誤仍然是最重要的網絡安全漏洞之一。兩個監管機構均強調為所有員工提供全面和持續的網絡安全意識培訓的重要性。完善的培訓計劃應包括:

  • 入職培訓:所有新員工應在入職過程中接受網絡安全意識培訓,涵蓋機構的網絡安全政策、可接受的使用政策及基本安全衛生
  • 定期複習培訓:為所有員工提供年度複習培訓,涵蓋新興威脅、更新的政策及近期事件的教訓
  • 特定角色培訓:為高風險崗位員工提供加強培訓,包括IT管理員、合規主任及處理敏感客戶數據的人員
  • 釣魚模擬:定期進行釣魚模擬演練,以測試員工意識並識別需要額外培訓的領域
  • 高級管理層意識:董事會及高級管理層應接受有關網絡安全風險、機構風險狀況及其治理責任的專門簡報

10. 監管執法行動

證監會及保監局均已展示其願意對網絡安全措施不足的機構採取執法行動。網絡安全失敗的監管後果可能包括:

  • 譴責:因網絡安全控制不足而受到公開或非公開譴責
  • 罰款:金額可能相當可觀的罰款,特別是在客戶數據被洩露或造成重大財務損失的情況下
  • 牌照條件:對機構牌照施加額外條件,例如要求加強監控、獨立審查或限制某些活動
  • 暫停或撤銷:在嚴重情況下,暫時暫停牌照或撤銷授權
  • 個人責任:負責人員及高級管理層可能因未能確保適當的網絡安全治理而面臨個人監管後果

近年來的著名執法行動針對的是因安全控制不足而遭受數據外洩、未能實施所需2FA措施或未能及時報告網絡安全事件的機構。這些案例是對監管期望及不合規後果的重要提醒。

11. 實務實施清單

以下清單為機構評估和加強其網絡安全狀況提供實用框架:

治理及政策

  • 具有明確董事會層面問責的網絡安全治理框架
  • 經高級管理層批准的全面網絡安全政策
  • 委任專職網絡安全主管或CISO(或外包等效職位)
  • 定期向董事會/高級管理層報告網絡安全情況
  • 將網絡風險納入企業風險管理框架

技術控制

  • 新一代防火牆及入侵偵測/防禦系統
  • 在所有要求的存取點實施雙重認證
  • 傳輸中數據(TLS 1.2+)及靜態數據加密
  • 部署端點偵測及回應(EDR)解決方案
  • 網絡分段隔離關鍵系統
  • 具有明確時間表的系統性修補程式管理流程
  • 具離線/異地副本的安全備份系統
  • 電郵安全(SPF、DKIM、DMARC)及反釣魚措施

運營及監控

  • 全天候安全監控或託管安全服務供應商(MSSP)
  • 安全資訊及事件管理(SIEM)系統
  • 具有明確角色和升級程序的事件應急計劃
  • 由獨立測試人員進行定期滲透測試(最少每年一次)
  • 每月或每季度進行漏洞掃描
  • 第三方供應商安全評估計劃

人員及意識

  • 為所有員工提供網絡安全意識培訓計劃
  • 定期進行釣魚模擬演練
  • 向所有員工傳達明確的可接受使用政策
  • 對有權存取敏感系統的員工進行背景調查
  • 安全的入職及離職程序

「網絡安全不僅僅是技術問題,更是基本的業務和監管風險。董事會和高級管理層必須積極了解和監督其機構的網絡安全狀況。監管機構的期望不亞於此。」

重點總結

建立穩健的網絡安全框架是一個持續的過程,而非一次性的項目。機構應採取持續改進的方法,定期檢視和加強措施以應對不斷演變的威脅和監管期望。以本指南中概述的監管要求進行差距分析是一個實際的第一步。

需要網絡安全合規方面的協助?

我們協助持牌機構制定和實施符合證監會及保監局期望的網絡安全框架。從差距分析到政策制定和實施支持,我們全程指導。

透過 WhatsApp 聯繫我們

网络安全已成为香港金融服务机构最重要的合规重点之一。证券及期货事务监察委员会(证监会)和保险业监管局(保监局)持续提高对持牌机构在保护系统、数据及客户信息方面的期望。在网络攻击日益复杂的时代,未能实施完善网络安全措施的机构不仅面临监管制裁,还会遭受重大的声誉和财务损失。

本综合指南审视两个监管机构对网络安全的要求和期望,为寻求建立或加强网络安全框架的机构提供实用指导。无论您是正在建立网络安全体系的新持牌机构,还是正在审视现有措施的成熟机构,本文都提供了您所需的基本信息。

1. 证监会基线网络安全要求

证监会已发出多份通函及指引,为持牌法团制定基线网络安全标准。主要要求源自《降低及减轻与互联网交易相关的黑客入侵风险指引》及其后有关网络安全的通函。

证监会的基线要求涵盖以下领域:

  • 基础设施安全:机构必须实施足够的网络安全控制措施,包括防火墙、入侵检测/防御系统,以及网络分段以将关键系统与一般办公网络隔离。
  • 访问控制:必须实施严格的访问控制机制,包括基于角色的访问、最小权限原则,以及定期审查用户访问权限。特权访问账户必须受到严密监控。
  • 传输中数据保护:所有通过公共网络传输的敏感数据必须使用业界标准协议加密(TLS 1.2或以上),包括客户通信、交易数据及内部数据传输。
  • 静态数据保护:存储在服务器、数据库及便携式设备上的敏感数据必须加密,包括客户个人资料、交易记录及财务信息。
  • 补丁管理:机构必须维持系统性的补丁管理流程,确保所有系统、应用程序及固件均保持最新的安全补丁。关键补丁应在规定时间内应用。
  • 端点安全:所有端点(包括工作站、笔记本电脑及移动设备)必须安装最新的防恶意软件保护。应实施可移动媒体控制。

2. 保监局网络安全期望

保险业监管局已为获授权保险人及持牌保险中介人制定了一套网络安全期望。虽然保监局的方针与证监会的框架有许多相似之处,但也有针对保险业的特定要求。

保监局期望持牌机构:

  • 建立网络安全治理框架,在董事会及高级管理层层面明确角色、责任和问责
  • 定期进行网络风险评估,以识别、评估及优先处理针对其业务的网络安全风险
  • 实施与机构规模、性质及业务复杂程度相称的适当技术控制措施
  • 维护定期测试和更新的网络事件应急计划
  • 确保所有员工接受足够的网络安全意识培训,为高风险岗位人员提供加强培训
  • 在管理第三方网络安全风险方面进行尽职调查,特别是针对外包IT服务及云计算安排

处理保单持有人数据的保险经纪必须特别注意数据保护要求,因为他们经常处理大量敏感的个人和医疗信息。

3. 双重认证(2FA)要求

双重认证已成为持牌机构的基本要求。证监会规定以下情况必须使用2FA:

  • 互联网交易系统:所有面向客户的互联网交易平台必须实施2FA以进行登录及交易授权
  • 远程访问:任何对机构内部系统及网络的远程访问必须使用2FA
  • 特权访问:对关键系统、数据库及网络设备的管理访问必须要求2FA
  • 电邮系统:从外部网络访问企业电邮应受2FA保护

可接受的第二认证因素包括硬件令牌、软件令牌(认证器应用程序)、短信一次性密码(尽管因SIM卡交换风险而日益不受推荐)及生物特征认证。证监会已表示偏好更安全的方法,如硬件令牌和认证器应用程序。

有关短信2FA的重要提示

虽然短信一次性密码在技术上仍然可以接受,但证监会已对短信认证容易受到SIM卡交换攻击和截取的脆弱性表示关注。鼓励机构过渡到更稳健的认证方法,如认证器应用程序或硬件安全密钥。

4. 数据保护及隐私(《个人资料(隐私)条例》)

香港的《个人资料(隐私)条例》(PDPO)适用于所有持牌机构,并确立了机构必须遵守的六项保障资料原则。PDPO要求与网络安全义务的交汇创建了一个全面的数据保护框架。

与网络安全相关的主要PDPO要求包括:

  • 保障资料原则4 - 资料安全:个人资料必须受到保护,防止未经授权或意外的访问、处理、删除、遗失或使用。机构必须实施与数据敏感性及违规潜在危害相称的安全措施。
  • 数据泄露通知:虽然香港目前没有强制性的数据泄露通知法律,但证监会和保监局均期望机构报告重大网络安全事件。隐私专员公署已发出指引,建议自愿向受影响个人及公署通报。
  • 跨境数据传输:将个人资料转移至香港以外的机构必须确保有适当的保护措施,包括合同保障及对接收司法管辖区的数据保护制度的评估。
  • 数据保留:机构必须制定明确的数据保留政策,在监管记录保存要求与不应保留个人资料超过所需时间的PDPO原则之间取得平衡。

5. 事故报告义务

证监会及保监局均已就网络安全事件的报告制定了明确的期望。及时报告至关重要,未能报告重大事件本身就可能构成监管违规。

证监会报告要求

持牌法团必须在发现重大网络安全事件后尽快向证监会报告,通常在发现后的同一个工作天内。须报告的事件包括:

  • 成功或企图未经授权访问客户账户或交易系统
  • 涉及客户个人资料或交易信息的数据泄露
  • 影响业务运营的勒索软件或恶意软件事件
  • 影响服务可用性的分布式拒绝服务(DDoS)攻击
  • 任何导致重大财务损失或业务中断的事件

保监局报告要求

保监局同样期望持牌保险中介人及获授权保险人及时报告重大网络安全事件。保监局的重点领域包括影响保单持有人数据、理赔处理系统及保费收取机制的事件。

在两种情况下,机构均应准备一份初步报告,包含事件性质、估计影响、已采取的即时控制措施及计划的补救步骤。在调查完成后应提交详细的后续报告。

6. 第三方供应商风险管理

随着对第三方技术供应商、云服务及外包IT功能的依赖日益增加,供应商风险管理已成为网络安全合规的关键组成部分。证监会及保监局均期望机构对技术供应商进行彻底的尽职调查并维持持续监督。

第三方供应商管理的主要要求包括:

  • 委聘前尽职调查:在委聘前评估潜在供应商的网络安全状况,包括其安全认证(ISO 27001、SOC 2)、事件历史及数据处理惯例
  • 合同保障:确保服务协议包含网络安全要求、审计权利、事件通知义务、数据处理及退回/销毁条款,以及安全方面的服务水平协议
  • 持续监控:定期审查供应商安全表现,要求更新的安全评估,并进行定期审计或要求审计报告
  • 云端特定考虑:对于云计算安排,机构应评估数据主权、加密、访问控制以及云供应商是否符合相关法规
  • 退出策略:维持可行的退出策略,以确保在必须终止供应商关系时的业务持续性,包括数据迁移和过渡的条款

7. 渗透测试及漏洞评估

两个监管机构均期望定期进行渗透测试和漏洞评估,作为主动识别安全弱点的手段。

渗透测试

机构应至少每年进行一次渗透测试,如对系统或基础设施进行了重大更改,则应更频繁地进行。渗透测试应由合格的独立第三方执行,涵盖范围包括:

  • 外部网络渗透测试(边界安全)
  • 内部网络渗透测试
  • 网络应用程序测试(包括面向客户的平台)
  • 移动应用程序测试(如适用)
  • 社交工程测试(钓鱼模拟)

漏洞评估

除年度渗透测试外,机构应定期进行漏洞扫描,理想情况下每月或每季度进行。已识别的漏洞应按严重程度分类,并按规定的时间表进行修复:严重漏洞在48小时内、高危在一周内、中等在一个月内、低风险在合理时间内。

8. 网络事件的业务持续性

网络安全事件可能导致重大业务中断,因此机构必须制定专门针对网络事件的业务持续计划。这超越了标准业务持续性规划,以应对网络事件带来的独特挑战。

网络专门的业务持续计划应涵盖:

  • 事件分类:按严重程度对网络事件进行分类并确定适当应对级别的框架
  • 通信协议:在网络事件期间通知监管机构、客户、员工及其他利益相关者的预定通信计划
  • 系统恢复:恢复关键系统的详细程序,包括备份还原、系统重建及数据恢复流程
  • 替代运营:在系统恢复期间维持基本业务运营的计划,包括人工处理程序
  • 取证调查:保存证据及进行取证分析以了解攻击途径和防止再次发生的程序

9. 员工意识及培训

人为错误仍然是最重要的网络安全漏洞之一。两个监管机构均强调为所有员工提供全面和持续的网络安全意识培训的重要性。完善的培训计划应包括:

  • 入职培训:所有新员工应在入职过程中接受网络安全意识培训,涵盖机构的网络安全政策、可接受的使用政策及基本安全卫生
  • 定期复习培训:为所有员工提供年度复习培训,涵盖新兴威胁、更新的政策及近期事件的教训
  • 特定角色培训:为高风险岗位员工提供加强培训,包括IT管理员、合规主任及处理敏感客户数据的人员
  • 钓鱼模拟:定期进行钓鱼模拟演练,以测试员工意识并识别需要额外培训的领域
  • 高级管理层意识:董事会及高级管理层应接受有关网络安全风险、机构风险状况及其治理责任的专门简报

10. 监管执法行动

证监会及保监局均已展示其愿意对网络安全措施不足的机构采取执法行动。网络安全失败的监管后果可能包括:

  • 谴责:因网络安全控制不足而受到公开或非公开谴责
  • 罚款:金额可能相当可观的罚款,特别是在客户数据被泄露或造成重大财务损失的情况下
  • 牌照条件:对机构牌照施加额外条件,例如要求加强监控、独立审查或限制某些活动
  • 暂停或撤销:在严重情况下,暂时暂停牌照或撤销授权
  • 个人责任:负责人员及高级管理层可能因未能确保适当的网络安全治理而面临个人监管后果

近年来的著名执法行动针对的是因安全控制不足而遭受数据泄露、未能实施所需2FA措施或未能及时报告网络安全事件的机构。这些案例是对监管期望及不合规后果的重要提醒。

11. 实务实施清单

以下清单为机构评估和加强其网络安全状况提供实用框架:

治理及政策

  • 具有明确董事会层面问责的网络安全治理框架
  • 经高级管理层批准的全面网络安全政策
  • 委任专职网络安全主管或CISO(或外包等效职位)
  • 定期向董事会/高级管理层报告网络安全情况
  • 将网络风险纳入企业风险管理框架

技术控制

  • 新一代防火墙及入侵检测/防御系统
  • 在所有要求的访问点实施双重认证
  • 传输中数据(TLS 1.2+)及静态数据加密
  • 部署端点检测及响应(EDR)解决方案
  • 网络分段隔离关键系统
  • 具有明确时间表的系统性补丁管理流程
  • 具离线/异地副本的安全备份系统
  • 电邮安全(SPF、DKIM、DMARC)及反钓鱼措施

运营及监控

  • 全天候安全监控或托管安全服务提供商(MSSP)
  • 安全信息及事件管理(SIEM)系统
  • 具有明确角色和升级程序的事件应急计划
  • 由独立测试人员进行定期渗透测试(最少每年一次)
  • 每月或每季度进行漏洞扫描
  • 第三方供应商安全评估计划

人员及意识

  • 为所有员工提供网络安全意识培训计划
  • 定期进行钓鱼模拟演练
  • 向所有员工传达明确的可接受使用政策
  • 对有权访问敏感系统的员工进行背景调查
  • 安全的入职及离职程序

"网络安全不仅仅是技术问题,更是基本的业务和监管风险。董事会和高级管理层必须积极了解和监督其机构的网络安全状况。监管机构的期望不亚于此。"

重点总结

建立稳健的网络安全框架是一个持续的过程,而非一次性的项目。机构应采取持续改进的方法,定期审视和加强措施以应对不断演变的威胁和监管期望。以本指南中概述的监管要求进行差距分析是一个实际的第一步。

需要网络安全合规方面的协助?

我们协助持牌机构制定和实施符合证监会及保监局期望的网络安全框架。从差距分析到政策制定和实施支持,我们全程指导。

通过 WhatsApp 联系我们