Page 34 - Digital Financial Services security assurance framework
P. 34

(continued)

             Affected entity  Risks and vulnerabilities     Controls
                            The risk of service outages and inabil- C46: Deactivate and remove default accounts and creden-
                            ity to transact  is due to the following  tials from databases, applications, operating systems, and
                            vulnerability:                   other access interfaces that interact with the production
                            -  Untested restoration practices (SD:   DFS system.
                              availability)                  C47: Review installation, vendor, support accounts, and
                                                             access points to DFS systems and infrastructure. All of these
                                                             accounts should be deactivated or allocated to appropriate
                                                             user profiles.
                            The risks of data exfiltration and mod- C48: Perform end-to-end tests after any changes to the
             DFS Provider   ification, compromise of transaction  DFS, MNO, SP, and third party systems, include regression
                            integrity,  and interruption of service  and capacity tests in the acceptance tests.  Also, ensure
                            are due to the following vulnerability:  there is a fall-back/blackout plan.
                            -  Inadequate data controls like failure to  C49: Have scheduled, regular backups for DFS systems.
                              implement atomicity of transactions,  Regularly test and securely store backups offline and offsite
                              allowing  them  to  exist  in a  partially  in an encrypted form.
                              completed state (SD: data integrity)
                                                             C50: Use standard ACID (Atomicity, Consistency, Isolation,
                                                             Durability) functionality of the databases to ensure transac-
                                                             tion integrity. DFS  operations should  either succeed  com-
                                                             pletely or fail completely.
                            The risk of inability for the user to trans- C50: DFS applications/3rd parties should support the use
                            act is due to the following vulnerability: of digital signatures, a secure digital signature provides
                            -  Inadequate mechanisms to assure   irrefutable evidence of the transaction's origin. Digital sig-
             Third-Party Pro-  data  integrity  and over-reliance on   natures are only valid as long as the PKI has not been com-
                                                             promised and must be tested with plans for assuring agility.
             vider            external trust anchors (SD: non-repu-
                              diation)                       By demonstrating that signing keys are adequately protect-
                                                             ed up to the root key, the DFS provider can withstand legal
                                                             challenges about the authenticity of a specific user and des-
                                                             puted transactions.

            8�10 Threat: SIM attacks
            The general threat is the ability of an attacker to gain unauthorized access to a DFS user's SIM card. The vulner-
            abilities are manifested in different ways at the Mobile network operator, DFS provider, and Mobile user.

             Affected entity  Risks and vulnerabilities     Controls
                            The risks of account takeover and unau- C51: MNOs should ensure that an identity verification pro-
                            thorized transactions occur because of  cess is in place before SIM swaps is performed.
                            the following vulnerabilities:   C52: The user’s identity should be verified using a combina-
                            -  Inadequate controls for user identi- tion of something they are, something they have, or some-
                              fication and verification before SIM  thing they know.  For example, with the presentation of a
                              swap and SIM recycling (SD: Authen- valid  ID, biometric  verification,  and knowledge  about the
             MNO              tication)                      DFS account details before a SIM swap/ SIM replacement
                                                             is performed.
                                                             C53: DFS and Payment Service Providers should be able
                                                             to detect real-time whenever a SIM card with DFS services
                                                             has swapped or replaced.  And perform further verification
                                                             before any high-value transaction or account changes are
                                                             authorised with new SIM.














           32    Digital Financial Services Security Assurance Framework
   29   30   31   32   33   34   35   36   37   38   39