Page 36 - ITU-T Focus Group Digital Financial Services – Technology, innovation and competition
P. 36

ITU-T Focus Group Digital Financial Services
                                              Technology, Innovation and Competition



               Identification and authentication

               •    Verify the identities of users, processes, or devices before allowing access to the organization’s information
                    systems.
               •    Use multifactor authentication for local and network access to privileged accounts.

               4.2    Systems development

               Recommendation summary

               Maintain systems to reflect patches to firmware and software and use integrity monitoring tools for information.
               Develop policy to prevent the use of unauthorized software. Use defensive software such as firewalls and
               intrusion detection systems to protect network perimeters. Implement cryptographic mechanisms and ensure
               they are using updated libraries to protect data in transit, and ensure appropriately strong cipher suites are in
               use. Migrate away from communication paradigms that do not support end-to-end security such as SMS and
               USSD in favour of SIM toolkit and smartphone apps.

               System development, configuration and change management

               •    Establish and maintain baseline configurations and inventories of organization’s information systems
                    (including  hardware,  software,  firmware,  and  documentation)  throughout  the  respective  system
                    development life cycles.
               •    Establish and enforce security configuration settings for information technology products employed in
                    organization’s information systems.
               •    Track, review, approve, or disapprove as consistent with organizational policy, and audit changes to
                    information systems.

               •    Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services.
               •    Apply deny-by-exception (blacklist) policy to prevent the use of unauthorized software or deny-all, permit-
                    by-exception (whitelisting) policy to allow the execution of authorized software.
               •    Identify, report, and correct information system flaws in a timely manner.
               •    Apply firmware, software, and operating system patches when new releases are available.

               •    Ensure anti-virus software is installed, configured, and running on all DFS information systems. In addition,
                    ensure antivirus definitions are regularly updated, periodic system scans are performed, and real-time
                    files scans are performed on external sources as files are downloaded, opened, or executed.
               •    Deploy a change detection mechanism, such as file integrity monitoring tools, to detect and alert
                    personnel to unauthorized changes, additions, or deletion of critical files, such as those associated with
                    consumer accounts or financial data.

               •    Employ architectural designs, software development techniques, and systems engineering principles
                    that promote effective information security within the organization’s information systems.

               Communication channel protection
               •    Protect the trusted network perimeter from untrusted sources through the use of network and application
                    firewalls, intrusion detection, and protection devices.
               •    Authorize and protect wireless access allowing limited connections and using authentication and
                    encryption methods. Limit or, preferably, eliminate the use of wireless connections to data centres and
                    segregate data centres from office LANs.

               •    Monitor, control, and protect the organization’s communications (i.e., information transmitted or received
                    by the organization’s information systems) at the external boundaries and key internal boundaries.

               •    Segment publicly accessible system components from internal networks.



                22
   31   32   33   34   35   36   37   38   39   40   41