Written by: Patrick Avery/ Practice Lead ‑ GRC & Audit

The Federal Financial Institutions Examination Council (FFIEC) has announced that it will sunset the Cybersecurity Assessment Tool (CAT) on August 31, 2025. Now, financial institutions must look for alternatives to demonstrate to regulators that their cybersecurity internal controls align with their risk profile. The FFIEC has provided some replacement options like the NIST CSF, Cyber Risk Institute (CRI) Profile, and Center for Internet Security (CIS) Critical Security Controls, none of which have been officially endorsed as the preferred tool for regulators. Choosing the right cybersecurity tool post the FFIEC CAT sunset is important because it will have a lasting impact on how your financial institution reports on its information security program in the ever-changing threat landscape.

In this blog post, we explore why the FFIEC CAT is being sunset and discuss why we recommend the CRI Profile as a strong alternative to CAT for financial institutions.

audit icon

what was the FFIEC CAT and why is it being sunset?

In June 2015, the FFIEC CAT was introduced as a voluntary assessment tool to help financial institutions like banks and credit unions to identify their cybersecurity risk profile and preparedness. For a decade, the tool has provided financial institutions and even examiners at FFIEC member agencies with a measurable and structured approach to evaluating cyber risk.

However, the cybersecurity landscape is constantly evolving. And, with many new government and industry resources available to financial institutions to better manage cyber risks, the FFIEC has decided not to update the CAT content and to remove the tool from its website in August.

testing-icon

what to consider when selecting a new cybersecurity assessment tool

As you explore new cybersecurity assessment tools to replace the FFIEC CAT, here are two things to keep in mind.

Data migration

You’ll have to look at how to migrate your CAT data to your replacement tool’s control framework of choice, whether that be Cyber Risk Institute (aligned with NIST), CIS Critical Security Controls (aligned with CIS Benchmarks/CIS Controls), among others.

Most financial institutions will not be fully aligned with all the recommended controls for their risk profile after the first pass. This is because FFIEC guidance isn’t fully aligned with other tools’ control frameworks, like NIST, for example.

i

Adapting to the new assessment framework

Second, developing a long-term strategy to achieve full alignment with your new assessment tool’s recommended controls should be on your radar. You should also have a plan to address concerns from management and stakeholders about your information security program and why it’s not fully aligned with the controls recommended for your risk profile, even though you might have been Baseline or a higher control maturity with the CAT.

audit icon

why the CRI Profile is a great alternative to the FFIEC CAT

At GraVoc, we are supporting clients in migrating from FFIEC CAT to the CRI Profile tool. We find it offers a smoother transition for those moving away from CAT.

Developed by a coalition of financial institutions and trade associations, the CRI Profile provides a tailored and efficient solution to cyber risk management for financial institutions. It is built to address banking-specific cybersecurity risks and align with the industry’s regulatory compliance expectations, making it a great alternative to the FFIEC CAT.

The CRI Profile is also based on the widely recognized National Institute of Standards and Technology’s (NIST) ‘Framework for Improving Critical Infrastructure Cybersecurity.’

testing-icon

comparing FFIEC CAT to CRI Profile: what to consider

If you’re wondering how the CRI Profile compares to the CAT and what you should consider as you prepare for a move, we have got you covered. Here are some important differences between the two assessment tools and how to navigate them.

R

Risk profile

Unlike the CAT, where your inherent risk profile is generated by responses from granular questions about your institution’s environment like the number of banking delivery channels for customers and volume of transactions processed by transaction type, generating your CRI risk profile is a little different. After completing nine questions related to your institution’s inherent risk, systemic risk, and more, you’ll be assigned one of four impact tier levels. When you hear impact tiers, think Maturity Levels from the CAT. Your impact tier level will drive which of the four corresponding control tiers you should be aligned with.

R

Impact tiers

Speaking of the four impact tiers, they range greatly! Most of you reading this will have your financial institution fall into Tier 4, which essentially means a cyberattack at your institution would have a limited impact on the financial sector as whole.

In comparison, Tiers 1-3 are for institutions that if impacted by a cyber event would have a national, sub-national, or direct financial sector impact, respectively. These tiers are designed to hold institutions that are critical to the nation’s financial sector to a higher control standard.

R

Control questions and implementation

The CRI Profile offers a flexible range of response options—including “Yes,” “No,” “Partial,” “Yes, Risk-Based,” “Yes, with Compensating Controls,” “Not Tested,” “Don’t Know,” and “To Be Assessed.” So, for example, if you have to attest to application access review frequency or MFA enforcement, you can answer “yes, with a risk-based approach.” This way, the CRI tool gives you more flexibility on control implementation. The “To Be Assessed” response option also comes in handy as you likely won’t be able to answer “yes” for each control question since the NIST framework doesn’t perfectly map to FFIEC.

R

Reporting to stakeholders

You’ll also have to start game planning for how you report on your information security program to your Steering Committee, Audit Committee, and Board, after your first use of the new CRI Profile. Specifically, you’ll have to plan for reporting on controls you either don’t have in place or haven’t tested, emphasizing the need for an action plan to become fully aligned with the recommended controls.

R

Assessment results

Lastly, unlike the CAT, once you go through the exercise of answering the control questions, you will not get a clean cybersecurity maturity graph, along with a breakdown of your compliance with each control domain. With the CRI Profile, you will simply get a total count, by response, for each domain. This is not a bad thing – just something to be aware of when it comes to building your report deliverables for Senior Management, Technology Steering Committees, the Board, and other stakeholders.

Cloud

navigating the shift from FFIEC CAT to CRI Profile?

If your financial institution is unsure how to approach the transition from CAT to the CRI Profile, our information security team can help! From gap assessments and control mapping to stakeholder education, we can provide practical, tailored support and advisory to make your migration smooth and effective.

Click below to explore our information security services or contact us today to get started!

Related articles