Page 36 - Digital Financial Services security assurance framework
P. 36

(continued)

             Affected Entity  Risks and vulnerabilities     Controls
                           -  Inadequate user  access  validation  or  C59: Use strong multi-factor authentication for user and 3
                                                                                                           rd
                             user input validation (SD: Authentica- party provider access to DFS systems, e.g., token or biomet-
                             tion)                           rics, the use of multi-factor authentication to verify system
                                                             users increases non-repudiation of origin.
                                                             C60: Check incoming data against expected values in API
                                                             related data schema, for USSD, perform XML validation of
                                                             XML over HTTP requests.
                                                             C61: Use analytics systems to check user velocity between
             DFS provider                                    transactions, transaction time of day access tracking for
                                                             additional authorization validation checks.
                                                             C62: Regardless of the method used for producing receipts
                                                             (e.g., e-mail, SMS, or attached printer), the method should
                                                             mask the Primary Account Number (PAN) in support of
                                                             applicable laws, regulations, and payment-card policies. By
                                                             policy and practice, the DFS Provider/merchant should not
                                                             permit the use of non-secure channels such as e-mail and
                                                             SMS to send PAN or Sensitive authentication data (SAD).



            8�12 Threat: Unauthorized access to DFS data
            The general threat is the ability of an attacker to gain unauthorized access to DFS users' DFS data. The vulner-
            abilities are manifested in different ways at the Mobile network operator, DFS provider and Mobile User.

             Affected Entity  Risks and vulnerabilities      Controls
                             The risk of unauthorized access to DFS
                             user mobile data occurs because of the
                             following vulnerabilities:
                             -  Inadequate user account access  C63:  DFS users  should  set their  account PIN.  Where the
                               control mechanisms (SD: Access  first-time PIN is set by the DFS provider system or its
                               Control)                       agents, the PIN is unique for each user and must require
                                                              use change at first login.
                             -  Limited controls to access sensitive  C64: DFS users should set strong passwords and avoid eas-
                               data on the device (SD: Access Con- ily guessable pins for their devices like birthdays.
                               trol)                          C65: Ensure sensitive DFS information is stored in secure
             Mobile User                                      portions of the mobile device.
                                                              C66: App developers should ensure that before application
                                                              installation on the device, user authentication is required.
                                                              C67: App developers should ensure that access to DFS
                                                              infrastructure, application,  and  services  should  only  be
                                                              authorised after identity authentication. Use multi-factor
                                                              authentication, Something the user knows (such as a PIN),
                                                              Something they have (such as a SIMcard), Something they
                                                              are (such as a fingerprint or other biometric method).
                                                              C68: App developers should ensure that DFS applications
                                                              securely manage access credentials.
















           34    Digital Financial Services Security Assurance Framework
   31   32   33   34   35   36   37   38   39   40   41