CENTRAL BANK OF KENYA ISSUES GUIDANCE NOTE ON CYBERSECURITY (2024)

On August 18, 2017, the Central Bank of Kenya (“CBK”) used its authority under Section 33(4) of the Banking Act to publish a Guidance Note on identifying and mitigating cyber risk. The Guidance Note directs institutions licensed under the Banking Act (Cap. 488) (“Institutions”) to develop and implement a comprehensive set of program requirements to mitigate cybersecurity risk. According to a 2016 report by Serianu, a Kenya-based IT services and business consulting firm, Kenya lost approximately $175 million to cybercrime
in 2016. The report identifies the introduction of e-services in both the private and public sector as a major factor behind the dramatic increase in new cyber weaknesses. Other experts say the interconnectivity of the Kenyan economy and the automation of banking services have further exposed Kenya’s financial sector to risk. In issuing the Guidance Note, the CBK also recognized the “interconnectedness” of financial Institutions and the need for a coordinated approach and information sharing to maintain “public trust and confidence in the financial system.” As a result, CBK’s Guidance Note establishes minimum requirements that Institutions should adopt in order to develop effective cybersecurity policies and procedures, but recognizes that it is “not a replacement for and does not supersede the legislation, regulations and guidelines that institutions must comply with as part of their regulatory obligations.” Among other things, the Guidance Note provides regulatory guidance for the following key areas:

Governance: The Guidance Note emphasizes a top-down approach to risk-management, and imposes obligations at all levels of the organization: boards of directors and executive management are directly responsible for strategic aspects of the cybersecurity risk mitigation, and Institutions must identify a Chief Information Security Officer to develop and implement cybersecurity policies and controls across the organization.

Members of Institutions’ boards of directors are expected to “set the right tone at the top” by elevating the importance and awareness of the Institution’s cybersecurity policies and procedures. In addition, they should allocate an adequate cybersecurity budget based on their Institution’s structure and ensure that their cybersecurity policy applies to all of their Institution’s operating entities, including subsidiaries, joint ventures, and geographic regions. Members of senior management are responsible for the implementation of their Institution’s cybersecurity risk identification and mitigation strategy, as well as ensuring the creation of a containment strategy and documenting a cybersecurity incident response plan to be used in event of a breach. The CISO should be a part of senior management and should focus on the tactical and operational aspects of the Institution’s cybersecurity policy, such as ensuring that information systems meet the needs of the Institution and its Information and Communication Technology (ICT) strategy, as well as testing the Institution’s disaster recovery and business continuity plans.

Moreover, the Guidance Note provides that the CISO should report to the Institution’s CEO no less than once per quarter on the CISO’s assessment of the confidentiality, integrity, and availability of information systems in the Institution; exceptions to the approved cybersecurity policies and procedures; the CISO’s assessment of the effectiveness of the cybersecurity program; and all material cybersecurity events that occurred during the period.

Independent Assessments/Tests: The Guidance Note requires Institutions to have in place functions for internal audits, risk management, and external audits. The internal audit function must include assessments of the design and effectiveness of the Institution’s cybersecurity framework, as well as threat and vulnerability assessment tests. The findings of such assessments must be reported to the board. The external audit function should conduct similar assessments (and also is required to report findings to the board and CBK on an annual basis). In addition, the risk management function must include monitoring of current and emerging risks, as well as changes to applicable laws and regulations.

Outsourcing: The Guidance Note specifically highlights the cybersecurity risks posed by the use of third-party services, such as cloud services. The Guidance Note therefore advises Institutions to have in place adequate outsourcing agreements, due diligence procedures for prospective service providers, and monitoring processes for service delivery.

Training/Awareness: Institutions are instructed to provide IT security awareness training programs for all personnel—including senior management and the board. In addition, there should be a formalized plan in place that details the technical training that will be provided to Institutions’ cybersecurity specialists on an ongoing basis. Finally, cybersecurity awareness and information should be provided to a variety of the Institution’s third-party stakeholders, from clients and suppliers to partners and service providers.

Institutions are required to submit their cybersecurity policy consistent with the requirements outlined in the Guidance Note to CBK by November 30, 2017. In addition, Institutions are required to notify CBK of any cybersecurity incidents that could have a “significant and adverse impact” on business operations, finances, or reputation within 24 hours and to submit quarterly reports to CBK regarding the occurrence and handling of all cybersecurity incidents. The Banking Act provides that failure to comply with any direction or order under Section 33 shall, in addition to the penalty prescribed under Section 49 of the Banking Act, be liable “to such additional penalty as may be prescribed for each day or part thereof during which the offense continues.”

CENTRAL BANK OF KENYA ISSUES GUIDANCE NOTE ON CYBERSECURITY (2024)

FAQs

CENTRAL BANK OF KENYA ISSUES GUIDANCE NOTE ON CYBERSECURITY? ›

The leveraging on technology by banks exposes them to increased cyber risks. In this regard, the Central Bank of Kenya (CBK) has issued a Guidance Note on Cybersecurity that outlines the minimum requirements for banks to enhance their cyber security.

What are the cyber security challenges in Kenya? ›

Increased connectivity has brought about increased risk of theft, fraud, and other cyber related crimes. As Kenyans become more reliant on modern technology, they also become more vulnerable to cyberattacks such as corporate security breaches, spear phishing, and social media fraud.

What is the cyber security policy in Kenya? ›

Prevent the unlawful use of computer systems; Facilitate the prevention, detection, investigation, prosecution, and punishment of cybercrimes; Protect the rights to privacy, freedom of expression, and access to information as guaranteed under the constitution of Kenya 2010; and.

What is the biggest issue in cyber security? ›

Top 10 Cybersecurity Threats:
  • Social Engineering.
  • Third-Party Exposure.
  • Configuration Mistakes.
  • Poor Cyber Hygiene.
  • Cloud Vulnerabilities.
  • Mobile Device Vulnerabilities.
  • Internet of Things.
  • Ransomware.
Jan 4, 2024

What are the challenges facing CBK in Kenya? ›

From the findings it was observed that CBK faces many challenges including systemic and behavioral resistance, a turbulent external environmental and poor planning, among others.

What are the 3 major threats to cyber security today? ›

Ransomware. Distributed denial of service (DDoS) attacks. Spam and Phishing.

What are the 5 threats to cyber security? ›

Defending against cyberthreats is a critical and ongoing process that requires a proactive and multifaceted approach. Social engineering, third-party exposure, cloud vulnerabilities, ransomware, and IoT are the top threats that organizations should focus on to protect their data, systems, and reputations.

What is the fee structure for cyber security in Kenya? ›

This course costs Ksh 70,000. Take advantage of our flexible installment plan or get a Ksh 5,000 discount for a lump sum payment for the certificate.

What are ICT policies in Kenya? ›

The ICT policy requires that: Service charters be published by the public sector and citizens sensitised about them. Government services be easily accessible to all citizens using their mobile devices anywhere and anytime. All procurement and tender processes be electronically published and open to all.

What are cyber security issues and challenges? ›

Cybersecurity is the practice of protecting systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. Cybersecurity challenges are the threats and vulnerabilities that organizations face in protecting their information and systems from these threats.

Why is cyber security an issue? ›

One single security breach can lead to exposing the personal information of millions of people. These breaches have a strong financial impact on the companies and also loss of the trust of customers. Hence, cyber security is very essential to protect businesses and individuals from spammers and cyber criminals.

What are the problems with cybersecurity in 2024? ›

The landscape of cyber threats will include more sophisticated artificial intelligence techniques, such as advanced phishing campaigns and deepfakes, for which organizations must prepare.

Who owns CBK in Kenya? ›

Central Bank of Kenya
CBK's head office in Nairobi
Ownership100% state ownership
GovernorKamau Thugge
Central bank ofKenya
CurrencyKenyan shilling KES (ISO 4217)
6 more rows

What are the functions of CBK Kenya? ›

Sub-section (2) of Article 231 of the Constitution provides for the role of the CBK thus: formulating monetary policy, promoting price stability, issuing currency and performing other functions conferred on it by an Act of Parliament.

What are the advantages of Central Bank of Kenya? ›

The Central Bank of Kenya's role as banker to the government provides several benefits, including ensuring the efficient functioning of the government's financial operations, supporting the government's fiscal policy objectives, and strengthening the government's financial management systems.

What are the cybersecurity policies? ›

A cybersecurity policy sets the standards of behavior for activities such as the encryption of email attachments and restrictions on the use of social media. Cybersecurity policies are important because cyberattacks and data breaches are potentially costly.

What does a cyber security policy include? ›

A cyber security policy typically covers access control, password management, network security, data protection, incident response, and disaster recovery.

Top Articles
Latest Posts
Article information

Author: Neely Ledner

Last Updated:

Views: 5677

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Neely Ledner

Birthday: 1998-06-09

Address: 443 Barrows Terrace, New Jodyberg, CO 57462-5329

Phone: +2433516856029

Job: Central Legal Facilitator

Hobby: Backpacking, Jogging, Magic, Driving, Macrame, Embroidery, Foraging

Introduction: My name is Neely Ledner, I am a bright, determined, beautiful, adventurous, adventurous, spotless, calm person who loves writing and wants to share my knowledge and understanding with you.