The Department of Labor (DoL) recently released new guidelines on protecting $9.3 trillion in retirement benefits for over 34 million participants in contribution plans by making sure proper cybersecurity best practices are in place.

CDM Central
Inoculating against current and future hack impacts. Learn More

DoL’s Employee Benefits Security Administration (EBSA) put together best practices for plan-related IT systems and data to be used by recordkeepers and other service providers responsible for these systems, and for plan fiduciaries making decisions on service providers they should hire.

“Responsible plan fiduciaries have an obligation to ensure proper mitigation for cybersecurity risks,” the guidance states.

According to the guidance, plans’ service providers should do the following:

  1. “Have a formal, well documented cybersecurity program;
  2. Conduct prudent annual risk assessments;
  3. Have a reliable annual third-party audit of security controls;
  4. Clearly define and assign information security roles and responsibilities;
  5. Have strong access control procedures;
  6. Ensure that any assets or data stored in a cloud or managed by a third-party service provider are subject to appropriate security reviews and independent security assessments;
  7. Conduct periodic cybersecurity awareness training;
  8. Implement and manage a secure system development life cycle (SDLC) program;
  9. Have an effective business resiliency program addressing business continuity, disaster recovery, and incident response;
  10. Encrypt sensitive data, stored and in transit;
  11. Implement strong technical controls in accordance with best security practices; and
  12. Appropriately respond to any past cybersecurity incidents.”

According to EBSA, a “sound cybersecurity program identifies and assesses internal and external cybersecurity risks” that threaten stored nonpublic information.

Read More About
Recent
More Topics
About
Jordan Smith
Jordan Smith
Jordan Smith is a MeriTalk Staff Reporter covering the intersection of government and technology.
Tags