Federal Reserve Regulatory Service
3-1576.3
RATING SYSTEMS—Information Technology
Introduction
The quality, reliability, and integrity of a financial institution or service provider’s information technology (IT) affects all aspects of its performance. An assessment of the technology risk-management framework is necessary whether or not the institution or a third-party service provider manages these operations. The Uniform Rating System for Information Technology (URSIT) is an internal rating system used by federal and state regulators to uniformly assess financial-institution and service-provider risks introduced by IT. It also allows the regulators to identify those insured institutions and service providers whose information technology risk exposure or performance requires special supervisory attention. The rating system includes component- and composite-rating descriptions and the explicit identification of risks and assessment factors that examiners consider in assigning component ratings. Additionally, information technology can affect the risks associated with financial institutions. The effect on credit, operational, market, reputation, strategic, liquidity, interest-rate, and compliance risks should be considered for each IT rating component. The primary purpose of the rating system is to identify those entities whose condition or performance of information technology functions requires special supervisory attention. This rating system assists examiners in making an assessment of risk and compiling examination findings. However, the rating system does not drive the scope of an examination. Examiners should use the rating system to help evaluate the entity’s overall risk exposure and risk-management performance and determine the degree of supervisory attention believed necessary to ensure that weaknesses are addressed and that risk is properly managed.
Overview
The URSIT is based on a risk evaluation of four critical components: audit, management, development and acquisition, and support and delivery (AMDS). These components are used to assess the overall performance of IT within an organization. Examiners evaluate the functions identified within each component to assess the institution’s ability to identify, measure, monitor and control information technology risks. Each organization examined for IT is assigned a summary or composite rating based on the overall results of the evaluation. The IT composite rating and each component rating are based on a scale of 1 through 5 in ascending order of supervisory concern, 1 representing the highest rating and least degree of concern and 5 representing the lowest rating and highest degree of concern.
The first step in developing an IT composite rating for an organization is the assignment of a performance rating to the individual AMDS components. The evaluation of each of these components, their interrelationships, and relative importance is the basis for the composite rating. The composite rating is derived by making a qualitative summarization of all of the AMDS components. A direct relationship exists between the composite rating and the individual AMDS component performance ratings. However, the composite rating is not an arithmetic average of the individual components. An arithmetic approach does not reflect the actual condition of IT when using a risk-focused approach. A poor rating in one component may heavily influence the overall composite rating for an institution. For example, if the audit function is viewed as inadequate, the overall integrity of the IT systems is not readily verifiable. Thus, a composite rating of less than satisfactory (3-5) would normally be appropriate. A principal purpose of the composite rating is to identify those financial institutions and service providers that pose an inordinate amount of information technology risk and merit special supervisory attention. Thus, individual risk exposures that more explicitly affect the viability of the organization and/or its customers should be given more weight in the composite rating.
The FFIEC recognizes that management practices, particularly as they relate to risk management, vary considerably among financial institutions and service bureaus, depending on their size and sophistication, the nature and complexity of their business activities, and their risk profile. Accordingly, the FFIEC also recognizes that for less-complex information systems environments, detailed or highly formalized systems and controls are not required to receive the higher composite and component ratings.
The following two sections contain the URSIT composite-rating definitions, the assessment factors, and definitions for the four component ratings. These assessment factors and definitions outline various IT functions and controls that may be evaluated as part of the examination.
Composite Ratings1 Composite 1
Financial institutions and service providers rated composite 1 exhibit strong performance in every respect and generally have components rated 1 or 2. Weaknesses in IT are minor in nature and are easily corrected during the normal course of business. Risk-management processes provide a comprehensive program to identify and monitor risk relative to the size, complexity, and risk profile of the entity. Strategic plans are well defined and fully integrated throughout the organization. This allows management to quickly adapt to changing market, business, and technology needs of the entity. Management identifies weaknesses promptly and takes appropriate corrective action to resolve audit and regulatory concerns. The financial condition of the service provider is strong and overall performance shows no cause for supervisory concern.
Composite 2
Financial institutions and service providers rated composite 2 exhibit safe and sound performance but may demonstrate modest weaknesses in operating performance, monitoring, management processes, or system development. Generally, senior management corrects weaknesses in the normal course of business. Risk management processes adequately identify and monitor risk relative to the size, complexity, and risk profile of the entity. Strategic plans are defined but may require clarification, better coordination, or improved communication throughout the organization. As a result, management anticipates, but responds less quickly to changes in market, business, and technological needs of the entity. Management normally identifies weaknesses and takes appropriate corrective action. However, greater reliance is placed on audit and regulatory intervention to identify and resolve concerns. The financial condition of the service provider is acceptable, and while internal control weaknesses may exist, there are no significant supervisory concerns. As a result, supervisory action is informal and limited.
Composite 3
Financial institutions and service providers rated composite 3 exhibit some degree of supervisory concern due to a combination of weaknesses that may range from moderate to severe. If weaknesses persist, further deterioration in the condition and performance of the institution or service provider is likely. Risk management processes may not effectively identify risks and may not be appropriate for the size, complexity, or risk profile of the entity. Strategic plans are vaguely defined and may not provide adequate direction for IT initiatives. As a result, management often has difficulty responding to changes in business, market, and technological needs of the entity. Self-assessment practices are weak and are generally reactive to audit and regulatory exceptions. Repeat concerns may exist, indicating that management may lack the ability or willingness to resolve concerns. The financial condition of the service provider may be weak and/or negative trends may be evident. While financial or operational failure is unlikely, increased supervision is necessary. Formal or informal supervisory action may be necessary to secure corrective action.
Composite 4
Financial institutions and service providers rated composite 4 operate in an unsafe and unsound environment that may impair the future viability of the entity. Operating weaknesses are indicative of serious managerial deficiencies. Risk-management processes inadequately identify and monitor risk, and practices are not appropriate given the size, complexity, and risk profile of the entity. Strategic plans are poorly defined and not coordinated or communicated throughout the organization. As a result, management and the board are not committed to, or may be incapable of ensuring that technological needs are met. Management does not perform self-assessments and demonstrates an inability or unwillingness to correct audit and regulatory concerns. The financial condition of the service provider is severely impaired and/or deteriorating. Failure of the financial institution or service provider may be likely unless IT problems are remedied. Close supervisory attention is necessary and, in most cases, formal enforcement action is warranted.
Composite 5
Financial institutions and service providers rated composite 5 exhibit critically deficient operating performance and are in need of immediate remedial action. Operational problems and serious weaknesses may exist throughout the organization. Risk management processes are severely deficient and provide management little or no perception of risk relative to the size, complexity, and risk profile of the entity. Strategic plans do not exist or are ineffective, and management and the board provide little or no direction for IT initiatives. As a result, management is unaware of, or inattentive to technological needs of the entity. Management is unwilling or incapable of correcting audit and regulatory concerns. The financial condition of the service provider is poor and failure is highly probable due to poor operating performance or financial instability. Ongoing supervisory attention is necessary.
Component Ratings2 Audit
Financial institutions and service providers are expected to provide independent assessments of their exposure to risks and the quality of internal controls associated with the acquisition, implementation, and use of information technology.3 Audit practices should address the IT risk exposures throughout the institution and its service provider(s) in the areas of user and data center operations, client/server architecture, local and wide area networks, telecommunications, information security, electronic data interchange, systems development, and contingency planning. This rating should reflect the adequacy of the organization’s overall IT audit program, including the internal and external auditor’s abilities to detect and report significant risks to management and the board of directors on a timely basis. It should also reflect the internal and external auditor’s capability to promote a safe, sound, and effective operation.
The performance of audit is rated based upon an assessment of factors such as:
- the level of independence maintained by audit and the quality of the oversight and support provided by the board of directors and management
- the adequacy of audit’s risk-analysis methodology used to prioritize the allocation of audit resources and to formulate the audit schedule
- the scope, frequency, accuracy, and timeliness of internal and external audit reports
- the extent of audit participation in application development, acquisition, and testing, to ensure the effectiveness of internal controls and audit trails
- the adequacy of the overall audit plan in providing appropriate coverage of IT risks
- the auditor’s adherence to codes of ethics and professional audit standards
- the qualifications of the auditor, staff succession, and continued development through training
- the existence of timely and formal follow-up and reporting on management’s resolution of identified problems or weaknesses
- the quality and effectiveness of internal and external audit activity as it relates to IT controls
Ratings.
-
1.
-
2.
-
3.
-
4.
-
5.
This rating reflects the abilities of the board and management as they apply to all aspects of IT acquisition, development, and operations. Management practices may need to address some or all of the following IT-related risks: strategic planning, quality assurance, project management, risk assessment, infrastructure and architecture, end-user computing, contract administration of third-party service providers, organization and human resources, and regulatory and legal compliance. Generally, directors need not be actively involved in day-to-day operations; however, they must provide clear guidance regarding acceptable risk-exposure levels and ensure that appropriate policies, procedures, and practices have been established. Sound management practices are demonstrated through active oversight by the board of directors and management, competent personnel, sound IT plans, adequate policies and standards, an effective control environment, and risk monitoring. This rating should reflect the board’s and management’s ability as it applies to all aspects of IT operations.
The performance of management and the quality of risk management are rated based upon an assessment of factors such as:
- the level and quality of oversight and support of the IT activities by the board of directors and management
- the ability of management to plan for and initiate new activities or products in response to information needs and to address risks that may arise from changing business conditions
- the ability of management to provide information reports necessary for informed planning and decision making in an effective and efficient manner
- the adequacy of, and conformance with, internal policies and controls addressing the IT operations and risks of significant business activities
- the effectiveness of risk monitoring systems
- the timeliness of corrective action for reported and known problems
- the level of awareness of and compliance with laws and regulations
- the level of planning for management succession
- the ability of management to monitor the services delivered and to measure the organization’s progress toward identified goals in an effective and efficient manner
- the adequacy of contracts and management’s ability to monitor relationships with third-party servicers
- the adequacy of strategic-planning and risk-management practices to identify, measure, monitor, and control risks, including management’s ability to perform self-assessments
- the ability of management to identify, measure, monitor, and control risks and to address emerging information technology needs and solutions
In addition to the above, factors such as the following are included in the assessment of management at service providers:
- the financial condition and ongoing viability of the entity
- the impact of external and internal trends and other factors on the ability of the entity to support continued servicing of client financial institutions
- the propriety of contractual terms and plans
Ratings.
-
1.
-
2.
-
3.
-
4.
-
5.
This rating reflects an organization’s ability to identify, acquire, install, and maintain appropriate information technology solutions. Management practices may need to address all or parts of the business process for implementing any kind of change to the hardware or software used. These business processes include an institution’s or service provider’s purchase of hardware or software, development and programming performed by the institution or service provider, purchase of services from independent vendors or affiliated data centers, or a combination of these activities. The business process is defined as all phases taken to implement a change, including researching alternatives available, choosing an appropriate option for the organization as a whole, and converting to the new system or integrating the new system with existing systems. This rating reflects the adequacy of the institution’s systems-development methodology and related risk-management practices for acquisition and deployment of information technology. This rating also reflects the board’s and management’s ability to enhance and replace information technology prudently in a controlled environment.
The performance of systems development and acquisition and related risk-management practice is rated based upon an assessment of factors such as:
- the level and quality of oversight and support of systems development and acquisition activities by senior management and the board of directors
- the adequacy of the organizational and management structures to establish accountability and responsibility for IT systems and technology initiatives
- the volume, nature, and extent of risk exposure to the financial institution in the area of systems development and acquisition
- the adequacy of the institution’s Systems Development Life Cycle (SDLC) and programming standards
- the quality of project-management programs and practices which are followed by developers, operators, executive management/owners, independent vendors or affiliated servicers, and end-users.
- the independence of the quality-assurance function and the adequacy of controls over program changes
- the quality and thoroughness of system documentation
- the integrity and security of the network, system, and application software
- the development of information technology solutions that meet the needs of end users
- the extent of end-user involvement in the system development process
In addition to the above, factors such as the following are included in the assessment of development and acquisition at service providers:
- the quality of software releases and documentation
- the adequacy of training provided to clients
Ratings.
-
1.
-
2.
-
3.
-
4.
-
5.
This rating reflects an organization’s ability to provide technology services in a secure environment. It reflects not only the condition of IT operations but also factors such as reliability, security, and integrity, which may affect the quality of the information-delivery system. The factors include customer support and training and the ability to manage problems and incidents, operations, system performance, capacity planning, and facility and data management. Risk-management practices should promote effective, safe, and sound IT operations that ensure the continuity of operations and the reliability and availability of data. The scope of this component rating includes operational risks throughout the organization and service providers.
The rating of IT support and delivery is based on a review and assessment of requirements such as:
- the ability to provide a level of service that meets the requirements of the business
- the adequacy of security policies, procedures, and practices in all units and at all levels of the financial institution and service providers
- the adequacy of data controls over preparation, input, processing, and output
- the adequacy of corporate contingency planning and business resumption for data centers, networks, service providers, and business units
- the quality of processes or programs that monitor capacity and performance
- the adequacy of controls and the ability to monitor controls at service providers
- the quality of assistance provided to users, including the ability to handle problems
- the adequacy of operating policies, procedures, and manuals
- the quality of physical and logical security, including the privacy of data
- the adequacy of firewall architectures and the security of connections with public networks
In addition to the above, factors such as the following are included in the assessment of support and delivery at service providers:
- the adequacy of customer service provided to clients
- the ability of the entity to provide and maintain service-level performance that meets the requirements of the client
Ratings.
-
1.
-
2.
-
3.
-
4.
-
5.
Issued by the Federal Financial Institutions Examination Council, Jan. 13, 1999; effective April 1, 1999 (SR-99-8).
1
The descriptive examples in the numeric-composite-rating definitions are intended to provide guidance to examiners as they evaluate the overall condition of information technology. Examiners must use professional judgment when making this assessment and assigning the numeric rating.
2
The descriptive examples in the numeric component rating definitions are intended to provide guidance to examiners as they evaluate the individual components. Examiners must use professional judgement when assessing a component area and assigning a numeric-rating value as it is likely that examiners will encounter conditions that correspond to descriptive examples in two or more numeric-rating-value definitions.
3
Financial institutions that outsource their data processing operations should obtain copies of internal audit reports, SAS 70 reviews, and/or regulatory examination reports of their service providers.