Compliance Strategy

Information Security Policy Template: A Fintech and Community Bank Walkthrough

Table of Contents

TL;DR

  • The FTC Safeguards Rule requires nine specific program elements — most information security policies miss at least three of them.
  • Community banks face FFIEC Information Security Handbook requirements; fintechs face both FTC/GLBA and sponsor bank TPRM questions. The overlaps are bigger than you’d expect.
  • Your information security policy should be 5–12 pages max. If it’s longer, you’ve merged policy with standards — and examiners will notice.
  • The most common gap isn’t missing controls — it’s failing to document the Qualified Individual’s qualifications or not linking the policy to a current written risk assessment.

Got an MRA on information security in your last exam cycle? You’re in good company. The OCC’s 2025 Cybersecurity and Financial System Resilience Report flagged information security governance as a recurring deficiency at community banks. Not for lack of technology — for lack of paper. Banks with solid controls and inadequate written policies still fail exams.

At fintechs, the trigger is usually different: sponsor bank TPRM onboarding. The bank asks for your information security policy on day one of due diligence, and “we have controls in Notion” doesn’t close the loop.

This walkthrough covers what the policy document needs to contain, how it maps to the FTC Safeguards Rule and FFIEC requirements, what examiners actually look for, and how to structure a document that survives both an exam and an audit.

The Policy Hierarchy — Get This Wrong and the Rest Doesn’t Matter

Most organizations conflate policy, standards, and procedures. Regulators don’t.

LayerWhat it isWho approvesTypical length
PolicyGoverning statement of intent, scope, and accountabilityBoard of Directors5–12 pages
StandardsSpecific rules supporting the policy (e.g., encryption algorithms, password rules)CISO / CRO5–20 pages per standard
ProceduresStep-by-step operational instructionsOperations / ITVariable
GuidelinesAdvisory best practicesSubject matter expertsVariable

The information security policy sits at the top of this stack. It shouldn’t contain specifics like “passwords must be 12 characters” — that belongs in an Access Control Standard. What it should say is: “Access to systems must be controlled through role-based access controls, with minimum requirements defined in the Access Control Standard.” That reference structure lets you update technical specifics without triggering a board re-approval every time NIST issues new guidance.

The Nine Elements the FTC Safeguards Rule Requires

Under 16 CFR Part 314.4, your information security program must include all nine of the following. Your policy should either address each element directly or reference the standard that does.

#ElementWhat it requiresCommon gap
1Qualified IndividualDesignate someone responsible — document their qualifications and reporting lineDesignating a name without defining what “qualified” means or how they report to leadership
2Risk AssessmentWritten assessment identifying reasonably foreseeable risks to customer informationNo document exists, or it exists but hasn’t been updated in 2+ years
3SafeguardsControls designed to address identified risks across all three domainsControls exist but aren’t linked to specific risk assessment findings
4Regular Testing / MonitoringContinuous monitoring OR periodic penetration testing and vulnerability assessmentsAnnual pen test without any monitoring between cycles
5Service Provider OversightVendor contracts with security requirements; periodic assessmentContracts from 2019 with no security addendum and no evidence of monitoring
6Change ManagementEvaluate and adjust the program when operations or environment changeProgram last reviewed at company launch
7Incident Response PlanWritten plan for responding to security eventsIRP exists but hasn’t been tested; no tabletop exercise in last 12 months
8TrainingRegular security awareness training for all employeesAnnual video counts — but annual-only without phishing simulation may draw examiner questions
9Leadership ReportingRegular reporting to board or senior leadership on program effectivenessNo documented board reporting; verbal update only with no meeting minutes

The 2023 Safeguards Rule amendments added technical requirements on top of these structural elements: multi-factor authentication (MFA) for all access to systems containing customer information, encryption of data at rest and in transit, and — for organizations where a breach affects 500 or more customers — a breach notification obligation to the FTC within 30 days. These requirements apply to non-bank financial institutions including mortgage brokers, money service businesses, digital lenders, and any company “significantly engaged in” financial activities under the Bank Holding Company Act definition.

What FFIEC Expects from Community Banks

If you’re a nationally chartered bank, state-chartered bank, or credit union, the FFIEC IT Examination Handbook’s Information Security booklet is the primary reference. The OCC uses its Cybersecurity Supervision Work Program (Bulletin 2023-22) as the examiner evaluation guide.

The FFIEC framework aligns with NIST CSF 2.0’s six functions: Govern, Identify, Protect, Detect, Respond, Recover. The OCC retired the FFIEC Cybersecurity Assessment Tool in 2024 — banks can now self-assess against NIST CSF 2.0, CIS Critical Security Controls v8, or the Cyber Risk Institute Profile. Any of these is acceptable; what isn’t acceptable is having no documented self-assessment at all.

Common policy gaps examiners flag at community banks:

Encryption language that’s vague. “We encrypt sensitive data” isn’t sufficient. The policy should reference which data types require encryption at rest versus in transit, with specific standards pointing to acceptable algorithms (AES-256, TLS 1.2+).

Mobile device and remote access policy missing. BYOD and remote work arrangements are chronically under-documented. If your employees access systems from personal devices, the policy needs to address that.

Third-party language that’s too thin. The FFIEC and OCC expect the policy to address evaluation and monitoring of service providers with access to customer information. Many community bank policies reference contracts without specifying minimum security requirements.

Fintech-Specific Considerations

If you’re subject to the FTC Safeguards Rule, write your information security policy to satisfy both FTC requirements and FFIEC expectations — even if you’re not a bank. That’s one document that covers your regulatory baseline and your sponsor bank’s TPRM review simultaneously.

Fintechs on BaaS models should specifically address three areas most policies skip:

Data segregation. Who owns what data, what the bank’s access rights are, and how customer data is isolated from operational and analytics data.

Incident notification obligations. The bank’s contract almost certainly requires notification within 24 to 72 hours of a security incident — even if you’re below the FTC’s 500-customer reporting threshold. The policy should reference this obligation.

Vendor chain coverage. If your stack runs on AWS and Snowflake and three SaaS tools, the bank wants evidence that you’ve evaluated each of those for security, not just your own internal systems. Your vendor management provisions need to extend to the full service provider chain.

For a detailed breakdown of your FTC Safeguards Rule obligations, see the FTC Safeguards Rule compliance guide for non-bank financial institutions.

Information Security Policy: A Working Structure

Here’s how to build the document. This structure satisfies FTC Safeguards Rule element requirements and FFIEC examiner expectations.

Section 1 — Purpose and Scope

Define what the policy governs (all information systems, all data types, all employees and contractors) and why (regulatory obligation, risk management, customer protection). One page maximum.

Section 2 — Roles and Responsibilities

Name the Qualified Individual by title, not name — policies shouldn’t require amendment every time someone changes roles. Define board responsibilities (approve policy, receive program reports), executive responsibilities (resource allocation, escalation), employee responsibilities (comply, report suspected incidents), and vendor responsibilities (minimum security requirements, with specifics referenced from your Vendor Management Standard).

Section 3 — Information Classification

Define your data tiers and the baseline protections required for each. At minimum: Public, Internal, Confidential, and Restricted. Customer financial information (NPI under GLBA) sits at Restricted. This section can reference a Data Classification Policy if one exists separately.

Section 4 — Access Control Principles

State the principles: least privilege, need-to-know, role-based access control, MFA required for all access to systems containing customer information. Technical specifics belong in an Access Control Standard.

Section 5 — Risk Assessment Requirement

State that a written risk assessment must be completed at least annually and whenever material operational changes occur. Reference where the current risk assessment is maintained.

Section 6 — Safeguards and Controls

High-level statement that controls exist across physical, technical, and administrative domains. Reference subordinate standards: Encryption Standard, Network Security Standard, Endpoint Security Standard, Vulnerability Management Standard.

Section 7 — Vendor and Third-Party Security

State the obligation: all service providers with access to customer information must be evaluated prior to engagement, required to implement appropriate safeguards by contract, and monitored throughout the relationship. See our vendor risk tiering guide for how to structure that oversight program.

Section 8 — Incident Response

Reference your Incident Response Plan. State that the plan must be tested at least annually and that the Qualified Individual is responsible for initiating response to confirmed incidents.

Section 9 — Training and Awareness

State the requirement: all employees receive security awareness training at hire and at least annually. Specify that the program includes phishing simulation and that completion records are maintained.

Section 10 — Testing and Monitoring

State that the program includes continuous monitoring of systems and networks, and that penetration testing is performed at least annually by a qualified party. Results are reviewed by the Qualified Individual and reported to leadership.

Section 11 — Reporting to Leadership

State that the Qualified Individual reports to the board or senior leadership committee at least annually on program status, material risks, and test results. Meeting minutes documenting that reporting must be maintained.

Section 12 — Exceptions and Waivers

Define how an exception to policy is requested, who has authority to approve it, what documentation is required, and how long an exception is valid. Unmanaged exceptions are a recurring audit finding.

Section 13 — Review and Update Cycle

The policy is reviewed at least annually by the Qualified Individual, updated as needed, and reapproved by the board. The effective date on the document must reflect the most recent board approval.

What Examiners Actually Check

When an OCC examiner or a sponsor bank’s vendor management team reviews your information security policy, they’re doing five things:

  1. Checking the approval date. A policy last approved 18+ months ago is a finding before the examiner reads a single word.
  2. Locating the Qualified Individual designation. Is it there? Are qualifications documented? Is there a reporting structure defined?
  3. Testing for risk assessment linkage. Is there a current risk assessment on file, and does the policy reference it?
  4. Verifying MFA and encryption language. Post-2023 Safeguards Rule amendments, these are non-negotiable and specific — not general principles.
  5. Asking for board reporting evidence. Meeting minutes, not verbal assertions. Examiners will request meeting minutes showing the report was presented and the policy was approved at the board level.

For a detailed look at building the testing and monitoring program that supports your policy, see our compliance monitoring and testing guide.

So What?

An information security policy isn’t a bureaucratic checkbox. It’s the document that proves your controls aren’t accidental — that someone with authority made deliberate decisions about what to protect, how to protect it, and who’s responsible. When an examiner asks “how do you govern your information security program?”, this document is the answer. When a sponsor bank asks how employees know what to do with customer data, this document sets the rules.

The gap most organizations have isn’t technology — it’s paper. A modern stack with MFA, encryption, and robust endpoint protection, run by a team that has no governing policy, is still a program without governance. Write the policy. Get board approval. Date it. Link it to a current risk assessment. Review it annually. That’s the minimum — and it’s ahead of where most organizations are when the first examiner question arrives.

Frequently Asked Questions

Do I need a separate information security policy if I already have SOC 2 or ISO 27001?
Yes. SOC 2 and ISO 27001 certifications prove you have controls — but they're not the policy document itself. Your information security policy is the governing document that sets direction, assigns accountability, and defines scope. Auditors and examiners will ask for the policy independent of your certification. The policy feeds the SOC 2 trust service criteria; it doesn't substitute for them.
What's the difference between an information security policy and an information security program?
The policy is the short, board-approved governing document stating what you must do and who owns it. The program is everything underneath it: standards, procedures, controls, training, testing, incident response. The FTC Safeguards Rule requires both — a written information security program with nine specific elements, and senior leadership oversight of that program.
How long should an information security policy be?
Short. Five to twelve pages for the policy document itself. If your 'information security policy' is 80 pages, what you actually have is a policy combined with standards and procedures. Examiners and auditors have to read these. A concise governing document with references to subordinate standards is far more credible — and far more maintainable — than a monolith.
Does the FTC Safeguards Rule require a written information security policy?
The Safeguards Rule (16 CFR Part 314) requires a written information security program with nine specific elements. You need: a designated Qualified Individual, a written risk assessment, documented access controls, encryption standards, monitoring, incident response, vendor management, training, and board/leadership reporting. A policy document is the logical vehicle to establish accountability and scope for all of this.
How often does the information security policy need to be reviewed?
Annually at minimum, and whenever there's a material change to your environment, products, or regulatory requirements. Under the FTC Safeguards Rule, you're required to evaluate and adjust your program in response to operational changes. FFIEC guidance for banks requires annual policy review with board approval. Build in a formal review cycle and document the date — that's what examiners check first.
What if an examiner asks for my information security policy and I don't have one?
That's an MRA (Matter Requiring Attention) waiting to happen. The OCC, FDIC, and state banking regulators all expect a written information security policy as baseline. Fintechs face the same demand from sponsor banks during TPRM onboarding. If you're starting from scratch, prioritize getting a board-approved policy in place within 30 days and document your remediation plan in writing.
Rebecca Leung

Rebecca Leung

Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.

Related Framework

SOC 2 Compliance Checklist

151 controls mapped to AICPA Trust Services Criteria with evidence collection guidance.

Immaterial Findings ✉️

Weekly newsletter

Sharp risk & compliance insights practitioners actually read. Enforcement actions, regulatory shifts, and practical frameworks — no fluff, no filler.

Join practitioners from banks, fintechs, and asset managers. Delivered weekly.