Notifications

Sunday 03 March 2024


Sunday 03 March 2024

CBUAE: "FATF" Announcement of UAE Completion of the Requirements is a Testament of Concerted National Efforts to Combat Money Laundering and Terrorism Financing

Press Release

Tuesday 06 February 2024


Tuesday 06 February 2024

CBUAE revokes the licence and registration of Smart and Secure Insurance Agent

Press Release

Monday 05 February 2024


Monday 05 February 2024

CBUAE launches the fifth cohort of the Executive Certificate for Risk-Based Supervision Professionals

Press Release

Wednesday 31 January 2024


Wednesday 31 January 2024

CBUAE Maintains the Base Rate at 5.40%

Press Release

Tuesday 30 January 2024


Tuesday 30 January 2024

CBUAE imposes a financial sanction of AED 1.2 million on an insurance company operating in the UAE

Press Release

Monday 29 January 2024


Monday 29 January 2024

Mansour bin Zayed witnesses UAE Central Bank's Golden Jubilee

Press Release

Tuesday 16 January 2024


Tuesday 16 January 2024

Summary Report - Monetary Banking Developments - November 2023

Press Release

Accessibility settings

Text size

A-

A+

Theme color

Color blind mode

Night reading mode

Rate this page

Rated by 0 People

Thanks for rating

Please provide a valid value for Name
Please provide a valid value for Email Address
Please provide a valid value for Phone number
Please provide a valid value for Subject
Please provide a valid value for Message

Information Sharing Platform

UAE-FS-ISAC is equipped with a centralized threat intelligence platform (TIP) that can connect various UAE Financial institutions and UAE Government entities to share threat intelligence information efficiently and securely.

As attackers step up with their tactics to act upon financial motives and target financial institutions continuously, there is a requirement to identify and establish standard information exchange channels. Specific challenges:

 

  1. No centralised platform to exchange threat intelligence data between the UAE financial sector and Government entities.
  2. Absence of standard sharable data format which is enriched, machine readable, accurate and relevant to the context.

Mission and Vision

  • Creating and establishing secure infrastructure that enables the sharing and dissemination of intelligence with peers.

  • Providing immediate information on major or crisis-level incidents related to the industry and/or its members.

  • Permitting all peer members to have the capability to submit threat information or other artifacts voluntarily.

  • Utilising the sector's vast resources (people, process, and technology) to aid the entire industry with situational awareness and advance warning of new physical and cyber security threats, incidents and challenges.

The Central Bank of UAE encourages financial institutions to be part of the community to communicate and share indicators of compromise, phishing campaigns, and other potential attack information with the community for awareness, and to implement relevant preventive measures.

Kindly download, complete and send the document to the following email: uaefsisac@cbuae.gov.ae

32

32

Participants can create events related to cyber incidents and share them across the community via MISP. Below are the types of threat information that could be shared:

 

  1. Indicators of Compromise (IOCs): such as malicious files, suspected or compromised email addresses, malicious IP addresses, or malware samples; or information about threat actors.
  2. Modus operandi, Tactics, Techniques, and Procedures (TTP): Awareness of cyber-criminal behaviour and understanding their tactics, techniques and procedures (TTP).
  3. Attributing factors: Information about the threat observed such as internet address, location, any names and/or any other information associated with the threat.
  4. Cyber-threat intelligence and analysis:  Gather and analyse threat intelligence from various sources and types of information to build reports, metrics, trends, and projections.
  5. Best practice awareness and lessons learned: Information on enhancing security management systems and/or security controls.
  6. Tool Configurations: Recommendations for setting up and using tools (mechanisms) that support the collection, exchange, processing, analysis, and use of cyber-threat information.

Rate this page

Rated by 0 People

Thanks for rating

Last updated on: Monday 09 October 2023

Total visitors 2081