Page 45 - Digital Financial Services security assurance framework
P. 45

leverage these interfaces to attack the system, with successful exploits often having consequences that affect not merely the exploited stakeholders
                        but others within the ecosystem. We consider the detailed diagram below showing the different vulnerable points in the DFS infrastructure in this
                   There are many interaction points between different parties within the DFS. Consequently, there are also a number of ways in which attackers can
                                               Billers  Billers  Insurance  Insurance  & Loan Providers & Loan Providers  Postal   Postal   Postal   Nework  Nework  Nework



                                     3 rd  Parties  Government & Government &  Regulator  Regulator  Merchant  Merchant  PoS  SME  Inherently Insecure External  External  Internal Network  User Interaction




                                               Bank  Bank      Remittances Remittances Remittances & Remittances &  Cross Border  Cross Border  Cross Border Payments Cross Border Payments  Payments  Payments   Aggregator
                           section. The numbers will be used as a means of describing the vulnerability surface that occurs at that interaction point.




                                                           ˆ


                                     DFS Provider                    -DFS application systems -DFS reporting system

               Annex 1 Detailed DFS ecosystem infrastructure and threats



                                                                  DFS  -DFS database  -DFS firewalls  -DFS O&M





                                                             MVNO
                                          ‡







                                    Mobile Network Operator  SMSC  SMSC  NSDT GW NSDT GW  S@T GW  S@T GW  †  USSD GW  USSD GW  MSC  MSC  IVR  IVR  Internet GW Internet GW  Internet  Internet

                              Figure 14 - Mapping of threats to security controls








                                                                      station
                                                                      station
                                                                     Base
                                                                     Base
                                                                                       …
                                                               „

                                                      Mobile   device   Agent   device  DFS access point


                                                              Mobile User  ƒ   DFS Agent







                                                                Digital Financial Services Security Assurance Framework  43
   40   41   42   43   44   45   46   47   48   49   50