Comparison Overview

U.S. Bank

VS

ICICI Bank

U.S. Bank

800 Nicollet Mall, None, Minneapolis, MN, US, 55402
Last Update: 2025-12-09

At U.S. Bank, we help millions of clients achieve their goals with a balance of best-in-class technology and human expertise tailored to individual needs. As the fifth-largest commercial bank in the United States, we’ve built a reputation for strength and stability across a diversified mix of businesses, including commercial and institutional banking, business banking, payments, wealth management and consumer banking. We’ve been named one of the World’s Most Ethical Companies® by the Ethisphere Institute and the most admired superregional bank by Fortune. In addition to thousands of branches serving consumers, U.S. Bank offers a complete suite of products, services and strategic partnerships for business. Within our Wealth, Corporate, Commercial and Institutional Banking division, we serve more than half a million clients across the country and around the world, ranging from wealthy individuals and families to the largest corporations, including 90% of Fortune 1000 companies. We’re also consistently recognized as a great place to work. We’re shaping our company culture with intention, focused on creating a workplace where it’s safe to speak up, share ideas and try new things. We’re proud to be recognized as a “Best for Vets” employer by the Military Times and included on Fair360’s (formerly DiversityInc.) list of Top 50 Companies for Diversity. U.S. Bank, NA. Member FDIC. Equal Housing Lender.

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 79,818
Subsidiaries: 4
12-month incidents
0
Known data breaches
2
Attack type number
2

ICICI Bank

ICICI Bank Towers, Bandra-Kurla Complex, Mumbai , Maharashtra, 400 051, IN
Last Update: 2025-12-09
Between 800 and 849

ICICI Bank is one of India’s leading private sector banks, offering a wide range of banking products and services to corporate, Small and Medium Enterprises (SME) and individual customers across the country. The Bank offers multi-channel touch points including branches, ATMs, mobile banking, internet banking, and phone banking. The Bank has a network of 6,742 branches and 16,277 ATMs and cash recycling machines across India, as at December 31, 2024. For any assistance on products and services, please call ICICI Bank’s customer care number 1800 1080. Disclaimer: The content herein is only for information and does not amount to an offer, invitation or solicitation to buy or sell, and is not intended to create any rights or obligations. It is also not intended for distribution to, or use by, any person in any jurisdiction where such distribution or use would be contrary to law or would subject ICICI Bank Limited (“ICICI Bank”) or its affiliate(s) to any licensing or registration requirements. Nothing contained herein is intended to constitute advice or opinion; please obtain professional advice before relying on any information contained herein. ICICI Bank disclaims any liability with respect to accuracy of information or any error or omission or any loss or damage incurred by anyone in reliance on the contents herein.

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 164,277
Subsidiaries: 0
12-month incidents
0
Known data breaches
2
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/us-bank.jpeg
U.S. Bank
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/icici-bank.jpeg
ICICI Bank
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
U.S. Bank
100%
Compliance Rate
0/4 Standards Verified
ICICI Bank
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Banking Industry Average (This Year)

No incidents recorded for U.S. Bank in 2025.

Incidents vs Banking Industry Average (This Year)

No incidents recorded for ICICI Bank in 2025.

Incident History — U.S. Bank (X = Date, Y = Severity)

U.S. Bank cyber incidents detection timeline including parent company and subsidiaries

Incident History — ICICI Bank (X = Date, Y = Severity)

ICICI Bank cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/us-bank.jpeg
U.S. Bank
Incidents

Date Detected: 9/2022
Type:Breach
Attack Vector: Inadvertent sharing of a file by a vendor
Blog: Blog

Date Detected: 3/2021
Type:Cyber Attack
Attack Vector: Credential Stuffing
Blog: Blog

Date Detected: 7/2020
Type:Breach
Attack Vector: Physical Theft
Blog: Blog
https://images.rankiteo.com/companyimages/icici-bank.jpeg
ICICI Bank
Incidents

Date Detected: 04/2023
Type:Breach
Blog: Blog

Date Detected: 10/2016
Type:Breach
Attack Vector: ATM Network Processing
Motivation: Financial Gain
Blog: Blog

FAQ

ICICI Bank company demonstrates a stronger AI Cybersecurity Score compared to U.S. Bank company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

U.S. Bank company has faced a higher number of disclosed cyber incidents historically compared to ICICI Bank company.

In the current year, ICICI Bank company and U.S. Bank company have not reported any cyber incidents.

Neither ICICI Bank company nor U.S. Bank company has reported experiencing a ransomware attack publicly.

Both ICICI Bank company and U.S. Bank company have disclosed experiencing at least one data breach.

U.S. Bank company has reported targeted cyberattacks, while ICICI Bank company has not reported such incidents publicly.

Neither U.S. Bank company nor ICICI Bank company has reported experiencing or disclosing vulnerabilities publicly.

Neither U.S. Bank nor ICICI Bank holds any compliance certifications.

Neither company holds any compliance certifications.

U.S. Bank company has more subsidiaries worldwide compared to ICICI Bank company.

ICICI Bank company employs more people globally than U.S. Bank company, reflecting its scale as a Banking.

Neither U.S. Bank nor ICICI Bank holds SOC 2 Type 1 certification.

Neither U.S. Bank nor ICICI Bank holds SOC 2 Type 2 certification.

Neither U.S. Bank nor ICICI Bank holds ISO 27001 certification.

Neither U.S. Bank nor ICICI Bank holds PCI DSS certification.

Neither U.S. Bank nor ICICI Bank holds HIPAA certification.

Neither U.S. Bank nor ICICI Bank holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X