Key Takeaways
- Structured finance is exposed to increases in the frequency and severity of cyber attacks, with loan servicers most commonly affected, though other transaction participants have also suffered.
- Securitizations have so far evaded cyber-incident-related losses due to a combination of structural features and luck, but issuers and key transaction parties with weak cyber security are exposed to greater risk.
- Potential liquidity issues resulting from a cyber event are the main concern, but an attack could increase credit risk too, and either factor could theoretically lead to negative rating actions.
Cyber risks are in a constant state of flux, characterized by cyber attacks and incidents that are increasing in frequency and sophistication, and cyber security that is maturing in application and engaged in a technology arms race.
Why it matters: The dynamic nature of the cyber risk environment necessitates the evolution of S&P Global Ratings' analytical approach to the assessment of cyber risk in structured finance.
In 2021, we published our view on the implications of cyber risk for structured finance (see "Credit FAQ: How Could Cyber Risks Affect Structured Finance Transactions?," Sept. 8, 2021). At that time, we noted structured finance transactions were not immune to cyber incidents and attacks that were increasingly common, wider in scope, and often increasingly sophisticated. Since then, attacks targeting structured finance issuers directly have been mercifully few. Yet there have been events of note, particularly against loan servicers--including Mr. Cooper Group (see "Mr. Cooper's Data Breach Reflects Increased Reputational Risks, Although Direct Costs Should Be Manageable," Dec. 15, 2023) and Latitude Finance Australia (see "Latitude Finance Australia's Master Trust Remains Functional After Cyber Attack," March 27, 2023)-- and their third-party vendors.
Increasing Cyber Risks Necessitate Continued Investment
Broadly speaking, cyber attacks affecting structured finance have shared some key similarities. They include quick resolution of the event, a lack of contagion from affected systems to other parts of the transactions, and timing that did not generally coincide with key securitization-related tasks (such as calculating and transferring remittance amounts). That combination of factors meant that cyber incidents have so far not affected securitization ratings.
That welcome record is, however, under constant and increasing threat (see chart 1). Megatrends, including ubiquitous digitalization and widespread deployment of AI (see "White Paper: Assessing How Megatrends May Influence Credit Ratings," April 18, 2024) could exacerbate cyber risk in financial markets. We expect that the increased cyber threat will have to be met with ongoing investment to maintain effective countermeasures.
Chart 1
Events Are Instructive Of Cyber Risks For Structured Finance
The sample scenarios we describe in our Credit FAQ, published in 2021, remain illustrative of some of the cyber risks faced by the structured finance sector. Two more recent events, noted earlier, also elucidate cyber risk elements as they pertain to the sector:
- The 2023 attack on Mr. Cooper interrupted user payment systems, which prevented client payments and exposed some customer information. Despite that, structural features in the transaction documents (including backup servicing advancers) enabled debt service payments to be made without interruption. The company said in a Dec. 15, 2023 filing with the SEC that it expected the attack would result in about $25 million of costs, including expenses relating to vendor services and the provision of complimentary identity protection for customers.
- The Latitude Finance cyber attack, also in 2023, cost the Australian credit card issuer about A$76 million (US$49 million), according to the company's first half 2023 results presentation, published on Aug. 18, 2023. Despite the severity of that incident, which included data theft, the potential for further damage was mitigated by the presence of sufficient backup systems and the fact that none of the 'credit card securitization trusts' were compromised.
Assessing Cyber Preparedness in Structured Finance
For structured finance transactions, cyber risk typically manifests as operational risk at various stages from collections, calculations, report generation, to distributions. These may ultimately have liquidity and credit implications.
The structural features of securitizations and the preparedness of key transaction parties have mitigated damage from past cyber attacks. Yet there has also been an element of luck. Damage and costs could have been worse if, for example, the incidents had coincided with vulnerable periods (such as when balances need to be calculated and remitted), had affected systems more important to a securitization transaction, or had taken longer to remedy. The possibility that negative rating actions could be a consequence of cyber related disruptions remains.
Our approach to evaluating an entity's cyber preparedness is inspired by the U.S.'s National Institute of Standards and Technology (NIST) framework, and incorporates a focus on its key elements: identify, protect, detect, respond, recover, and govern.
Cyber incidents aren't limited to the actions of malevolent parties, and can include outages in systems or communications infrastructure, including due to failed IT updates, programming bugs, accidents, and natural disasters.
We may employ a variety of means to assess a transaction parties' cyber preparedness, ranging from utilizing third-party evaluations to incorporating questions on cyber hygiene and response planning in our management review process (see box: Cyber Hygiene Queries).
Cyber Hygiene Queries
The following questions are used to gain insight into an entity's cyber risks and cyber security preparedness, and could be complemented by requests for additional information, if warranted. These are examples of the questions our analysts ask and are not intended as a checklist for all situations.
Have you adopted a security framework, such as the one developed by NIST?
- What is the scope?
- Has its implementation been reviewed by an external party?
What measures have been taken to reduce risks associated with cyber attacks?
- That could include multi-factor authentication ( MFA), access control, firewalls, breach detection, patching, penetration testing, among others.
What steps have been taken to identify and protect assets and data from cyberattacks?
Can you share your cyber risk management plan?
Who is responsible for overseeing the information security process (i.e., a chief information officer or some other responsible party).
- To the extent your IT function is outsourced, who is responsible within the organization to oversee the vendor?
What policies, practices, and training have been implemented to enable detection, response, and recovery following a cyberattack?
Do you conduct periodic penetration/disaster recovery testing?
- What schedules are in place?
Describe your back-up and disaster recovery procedures.
Do you have a cyber insurance policy?
- Are there any exclusions?
- Is the plan renewable, and do you intend to renew?
Describe any material cyber security breaches that have occurred and your response.
- How long did it take to discover and recover from the breaches?
- Were important systems brought down by the breach and for how long?
- Did anything change in your preparedness planning following such breaches?
- After the breach, were updates made to the point of entry to improve security?
Vendor Risks Can Be A Key Cyber Risk Element
The ubiquity of software and communications outsourcing means that rated entities' cyber risks inevitably include their ability to manage and mitigate exposure to third-party cyber risk. The potential for contagion from disruptions at key vendors is thus a consideration in our assessment, which will typically include appraisal of an entities' ability to work around vendor outages (part of business continuity planning); the ability to return to normal operations (recovery planning); and, where an event has occurred, an entity's understanding of the root cause and the adjustments that should be made to prevent similar incidents in the future.
The importance of an entity's third party cyber risk exposure, and management of those risks, is thus a further element of our analysts' assessment of cyber risk in structured finance, and may result in a number of related queries (see box: Third Party Risk Queries).
Third-Party Risk Queries
The following questions are used to gain insight into an entity's exposure to third-party (vendor) cyber risk and could be complemented by requests for additional information. These are examples of the questions our analysts could ask and are not intended as a checklist for all situations.
Do you have third-party risk management (TPRM) roles and responsibilities that are defined and documented?
- Is your TPRM team involved with vendor approval prior to signing a contract?
- Do you have any tools that help manage your TPRM processes?
How is a vendor assessed?
- What kind of security do you require at vendors before signing a contract?
- Do you reassess their security annually?
- Do you ask for a copy of the vendor's cyber insurance policy?
How do you onboard new vendors?
How often do you review existing vendors?
Change Is The Constant In Cyber Risk, Cyber Security, And Our Evaluation
The management of credit risk by structured finance entities will continue to motivate them to keep abreast of emerging cyber security risks, including those linked to new threat actors, attack vectors and tactics, and newer technologies. To be effective, their cyber security systems will have to adapt in scope, implementation, and technology.
That imperative is notably evident in relation to the accelerating application of AI, which poses threats to established cyber security systems, while also promising to bolster cyber defenses and improve cyber risk management. AI's application also has the scope to affect structured finance entities' risk profile and management in other ways, for example by refining risk assessment in asset underwriting and increasing asset-servicing efficiency.
As cyber threats and defenses evolve, so too will our assessment. The questions posed by our analysts will be adapted to ensure that our evaluation remains relevant and provides a comprehensive overview of entities' cyber risks and their potential to affect wider credit risks. By publishing those questions here, it is our hope to play a part in prompting structured finance entities to review their cyber preparedness, adopt rigorous cyber risk management frameworks (such as that provided by NIST), and be better positioned to adapt to the dynamic cyber risk landscape.
Editor: Paul Whitfield
Related Research
- AI and Quantum Computing: The Fundamentals, Sept. 10, 2024
- The Importance Of Cyber Security For U.S. And Canadian Servicers In A Challenging Environment, Aug. 12, 2024
- CrowdStrike Update Issues Highlight The Perils To Global IT Systems From Interdependency And Concentration, July 19, 2024
- White Paper: Assessing How Megatrends May Influence Credit Ratings, April 18, 2024
- Bulletin: Mr. Cooper's Data Breach Reflects Increased Reputational Risks, Although Direct Costs Should Be Manageable, Dec. 15, 2023
- Bulletin: Latitude Finance Australia's Master Trust Remains Functional After Cyber Attack, March 27, 2023
- Credit FAQ: How Could Cyber Risks Affect Structured Finance Transactions?, Sept 08, 2021
- Global Framework For Assessing Operational Risk In Structured Finance Transactions, Oct. 9, 2014
This report does not constitute a rating action.
Primary Credit Analysts: | Mauricio Tello, Englewood + 1 (212) 438 1206; mauricio.tello@spglobal.com |
Sujoy Saha, New York + 1 (212) 438 3902; sujoy.saha@spglobal.com | |
Alexander J Gombach, New York + 1 (212) 438 2882; alexander.gombach@spglobal.com | |
Secondary Credit Analyst: | Joshua C Saunders, Chicago + 1 (312) 233 7059; joshua.saunders@spglobal.com |
No content (including ratings, credit-related analyses and data, valuations, model, software, or other application or output therefrom) or any part thereof (Content) may be modified, reverse engineered, reproduced, or distributed in any form by any means, or stored in a database or retrieval system, without the prior written permission of Standard & Poor’s Financial Services LLC or its affiliates (collectively, S&P). The Content shall not be used for any unlawful or unauthorized purposes. S&P and any third-party providers, as well as their directors, officers, shareholders, employees, or agents (collectively S&P Parties) do not guarantee the accuracy, completeness, timeliness, or availability of the Content. S&P Parties are not responsible for any errors or omissions (negligent or otherwise), regardless of the cause, for the results obtained from the use of the Content, or for the security or maintenance of any data input by the user. The Content is provided on an “as is” basis. S&P PARTIES DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, ANY WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR USE, FREEDOM FROM BUGS, SOFTWARE ERRORS OR DEFECTS, THAT THE CONTENT’S FUNCTIONING WILL BE UNINTERRUPTED, OR THAT THE CONTENT WILL OPERATE WITH ANY SOFTWARE OR HARDWARE CONFIGURATION. In no event shall S&P Parties be liable to any party for any direct, indirect, incidental, exemplary, compensatory, punitive, special or consequential damages, costs, expenses, legal fees, or losses (including, without limitation, lost income or lost profits and opportunity costs or losses caused by negligence) in connection with any use of the Content even if advised of the possibility of such damages.
Credit-related and other analyses, including ratings, and statements in the Content are statements of opinion as of the date they are expressed and not statements of fact. S&P’s opinions, analyses, and rating acknowledgment decisions (described below) are not recommendations to purchase, hold, or sell any securities or to make any investment decisions, and do not address the suitability of any security. S&P assumes no obligation to update the Content following publication in any form or format. The Content should not be relied on and is not a substitute for the skill, judgment, and experience of the user, its management, employees, advisors, and/or clients when making investment and other business decisions. S&P does not act as a fiduciary or an investment advisor except where registered as such. While S&P has obtained information from sources it believes to be reliable, S&P does not perform an audit and undertakes no duty of due diligence or independent verification of any information it receives. Rating-related publications may be published for a variety of reasons that are not necessarily dependent on action by rating committees, including, but not limited to, the publication of a periodic update on a credit rating and related analyses.
To the extent that regulatory authorities allow a rating agency to acknowledge in one jurisdiction a rating issued in another jurisdiction for certain regulatory purposes, S&P reserves the right to assign, withdraw, or suspend such acknowledgement at any time and in its sole discretion. S&P Parties disclaim any duty whatsoever arising out of the assignment, withdrawal, or suspension of an acknowledgment as well as any liability for any damage alleged to have been suffered on account thereof.
S&P keeps certain activities of its business units separate from each other in order to preserve the independence and objectivity of their respective activities. As a result, certain business units of S&P may have information that is not available to other S&P business units. S&P has established policies and procedures to maintain the confidentiality of certain nonpublic information received in connection with each analytical process.
S&P may receive compensation for its ratings and certain analyses, normally from issuers or underwriters of securities or from obligors. S&P reserves the right to disseminate its opinions and analyses. S&P's public ratings and analyses are made available on its Web sites, www.spglobal.com/ratings (free of charge), and www.ratingsdirect.com (subscription), and may be distributed through other means, including via S&P publications and third-party redistributors. Additional information about our ratings fees is available at www.spglobal.com/usratingsfees.