Page 32 - Digital Financial Services security assurance framework
P. 32

(continued)

             Affected entity  Risks and vulnerabilities    Controls
                           The following vulnerabilities cause the  C30: The DFS provider should employ robust input validation
                           risk of  data inaccuracy and inconsis- routines on external-facing services by checking out-of-range
                           tency:                           values and unpermitted characters in fields, and by constrain-
                                                            ing and sanitizing input. Input validation should happen at the
                                                            earliest possible point and should be done both on the client
                                                            and server-side, however, the server should not rely solely on
                                                            client-side validation.  Additionally, block, log and review all
                                                            requests that violate the Web Services Description Language
                                                            (WSDL) and schemas.
                           -  Addition of test data into production  C31: Use database fingerprinting to detect tampering and
                             data (SD: data integrity)      modification of data after it has been stored. Techniques such
                                                            as digital signatures across database columns can be used to
             DFS Provider                                   detect user data modification.
                                                            C32: Ensure all test data is removed from code before it is
                                                            migrated to the production environment.
                           -  Absence of logging, ability to alter  C33: DFS systems should use logging mechanisms, including
                             logs,  and insufficient  information in  capturing the provenance of user actions or logging of critical
                             logs (SD: non-repudiation)     actions into tamper-proof storage, secure DFS system logs
                                                            from tampering, editing, deleting, stopping. Use digital signa-
                                                            tures attached to actions, particularly those that arrive over a
                                                            network connection.
                           -  Inaccurate  and  unsynchronised C34:  Ensure clock accuracy synchronization on all systems
                             clocks (SD: data integrity)    connected to the DFS system. NTP and SNTP are some of the
                                                            protocols used to sync accurate time; however, these have to
                                                            be deployed securely.


            8�8  Threat: Man-in-the-middle and social engineering attacks
            We group these two types of attacks because they both involve an adversary actively interposing themselves
            into communication or interaction (e.g., between a user and device or MNO, or a communication interposition
            between parties).

             Affected entity  Risks and vulnerabilities    Controls
                           The risk of data exposure and modifi-
                           cation is due to the following vulnera-
                           bilities:
                           -  Unverified and unsigned applications  C35: Critical focus should be on guiding the customer to
                             (SD: privacy, data integrity)  access and download DFS applications through official appli-
                                                            cation release channels to mitigate the risk of running mal-
                                                            ware-infected apps.
             Mobile User
                           -  Unverified inputs such as unsolicited  C36: MNOs and DFS providers should undertake active
                             SMS  messages,  in-app  advertise- customer awareness campaigns  to educate consumers and
                             ments, or e-mails  (SD: data integrity) internal staff about malicious messages, phishing attacks,
                                                            and spoofing.
                           -  Insufficiently protected credentials  C37: Mask user passwords and PINs, actively educate cus-
                             (SD: access control)           tomers on shoulder surfing and safe PIN/password usage to
                                                            avoid shoulder surfing and writing down of passwords.
















           30    Digital Financial Services Security Assurance Framework
   27   28   29   30   31   32   33   34   35   36   37