We continue to see an increasing number of attacks on U.S. public finance entities. Cyber risk has moved beyond a specialized aspect to a priority that is integral to risk management, but adoption of baseline cyber-security frameworks still varies across entities.June 28, 2021
This report does not constitute a rating action.
Tiffany TribbittNew Yorktiffany.tribbitt@spglobal.com
Geoffrey E BuswickBostongeoffrey.buswick@spglobal.com
As cyberattacks increase in sophistication and frequency, U.S. public finance (USPF) issuers must embed cybersecurity into their comprehensive risk-mitigation strategies. We consider risk management and mitigation a governance factor under environmental, social, and governance (ESG). We believe most municipal issuers’ preparedness will support credit fundamentals and prevent significant financial or reputational fallout that could result from an attack. In our view, all USPF issuers should be taking steps to mitigate their exposure to event risk stemming from a cyberattack. An inability to fully restore operations in a timely manner after a cyberattack could lead to rating pressure. USPF issuers experienced cyberattacks before the COVID-19 pandemic, and we have been analyzing potential credit impacts for more than half a decade (see Related Research below). Our analysis of an issuer’s strategy to prepare for, respond to, and recover from an attack uses the National Institute of Standards and Technology (NIST) standards as a benchmark for a sound plan, as it has since cyberattacks first emerged as a credit risk several years ago. However, the universe of USPF issuers is broad and diverse and the NIST framework, first established in 2014 and updated regularly, is very detailed and focused on protecting critical infrastructure. Therefore, our analysis of an issuer’s preparedness and mitigation practices typically considers the role of the organization as well as the size and scope of its operations since many issuers are not responsible for critical infrastructure elements.
We expect all issuers to have a basic knowledge of their physical and digital assets, including personally identifiable data that may have special legal protection. In addition, we believe issuers should understand where vulnerabilities are in their systems. This understanding typically is documented in a device and network inventory and includes implementation processes to mitigate cyber threats. Furthermore, it includes an understanding of risks from vendors and third-party relationships for information technology, accounting, billing, or other purposes. Understanding what could be at risk is the first step in developing an effective mitigation strategy.
In addition, we expect issuers to take basic steps to protect their assets, such as implementing cyber hygiene practices and staff training. Good cyber hygiene practices include but are not limited to firewalls, antivirus software, multifactor identification requirements, security-patch management, phishing exercises, and email filters. Additional policies, including regular access audits and vendor management, should be implemented, as necessary, based on the size and sophistication of the issuer. Given the rise in social engineering fraud, controls around wire transfers and bank payments should also be in place, as necessary. Finally, for large issuers or those more frequently targeted, such as states, utilities, health care facilities, and higher education institutions, we would expect the issuer to have a dedicated chief information or chief information security officer, or to identify the person or department ultimately responsible for securing assets and data.
The longer cyber criminals have access to a system, the more damage they can inflict. Therefore, the ability to rapidly detect an attack could limit damage. At a minimum, we generally expect that issuers have some type of system monitoring to detect a potential threat. This could include a dedicated employee or team, but could also be electronic. The sophistication of the network or a large number of devices potentially exposed would increase our expectation that the issuer has a more advanced governance framework for cyber response.
We also typically expect issuers to consider what they would do in the event of an attack and have a basic plan for data recovery and systems backup. Regular data backups should be part of this plan. For certain issuers, particularly those that provide critical services, we would expect detailed response plans that include exercises to periodically evaluate the effectiveness of the plans using walkthroughs, and tabletop, functional, or full-scale exercises. Failure to have an effective plan could force the issuer to shut down operations, resulting in adverse effects on finances and life and safety. This could lead to a downgrade.
With the increasing sophistication and constantly changing attack strategies of cybercriminals, absolute avoidance of risk might not be possible. In our view, with proper preparedness and practiced response protocols, damage from a cyberattack could be limited. Recovering from an attack may mean restoring data from backup copies, reconfiguring systems, or using other means of regaining systems access. We also evaluate the sufficiency of an issuer’s liquidity to recover from a disruption in its cash flow after a cyber incident. Adequate and available reserves, particularly when supplemented by a cyber insurance policy, usually mitigate this risk. Finally, we look for disclosure of events and impact analysis to ascertain if improvements to risk-management policies and practices might be necessary following an attack. We view a full and timely disclosure following a cyberattack as critical to mitigating potential legal risk from parties potentially injured as a result of the attack, including bondholders. Also, such disclosure can help peers and other municipal issuers better prepare for similar attacks and help the capital markets identify trends and refine best mitigation practices.
The example below demonstrates the questions an analyst might ask to assess an issuer’s risk-management policies and practices for cybersecurity, with sample answers that would demonstrate risk mitigation for a small local government issuer. Although it’s not intended to be a checklist or to apply to every issuer or situation, it can provide a general example of what an analyst might consider when speaking with issuers. Analysts could ask for additional information or look for further policies and practices as the situation warrants.