Page 33 - FIGI Digital Financial Services security assurance framework
P. 33

(continued)

             Affected entity  Risks and vulnerabilities    Controls
                           The risk of unauthorized access to user  C38: Discontinue the use of A5/0, A5/1, and A5/2 GSM
                           data is due to the following vulnerabil- encryption ciphers. Closely monitor results from the security
                           ity:                             and cryptographic community regarding the feasibility  and
                           -  Weak over-the-air encryption (SD:   ease of compromising A5/3 and A5/4 and begin considering
                             communication security)        stronger ciphers. Have a deployment strategy ready for these
             MNO                                            newer ciphers.
                           The risk of user impersonation is due to  C39: MNOs should do CLI analysis for calls/SMS to detect
                           the following vulnerability:     calls and SMS that may be spoofed to appear like DFS pro-
                           -  Weak Calling Line Identification fil-  vider calls.
                             tering (SD: communication security)
                           The risk of user account takeover is due  C40: Require user authentication and authorization for high-
                           to the following vulnerability:  risk account changes and transaction, and deny performing
             DFS Provider  -  Missing/Inadequate account config-  of transactions even when the device is logged in until knowl-
                             uration  and  authorisation  controls   edge of PIN or password has been demonstrated.
                             (SD: authentication)
                           The risk of exposure of sensitive infor-
                           mation is due to the following vulner-
                           abilities:
                           -  Weak encryption algorithms used on  C41: Sufficiently secure encryption should be employed for
                             data stored in the device and data  both data protection within the mobile application and com-
                             transmitted (SD: privacy)      munication with backend DFS systems and whenever possible,
                                                            mask, truncate or redact customer confidential information.
                           -  Lack of encryption of communica- C42: Use digital signatures to identify third parties connected
                             tions (SD: communication security)  to the DFS system when transactions are being performed.
             Third-Party Pro-
             viders        -  Insufficient  management  of  certif- C43: Only trusted keys and certificates should be accepted
                             icate or key materials (SD: access  to allow data exchange between DFS providers and third par-
                             control)                       ties, and they should be protected from disclosure.
                           The risk of  identity theft and failed  C44: Set procedural and technical controls for effective
                           transactions  is  due  to  the  following  management  during  system  downtime  with  related  service
                           vulnerability:                   providers. For example, set controls to manage offline trans-
                           -  DFS Provider or MNO System Fail-  actions (e.g., SIM swaps) when access to the DFS system is
                             ure leading  to agents/third parties   intermittent. Have additional checks for remittances and third
                             reverting to offline processes (SD:   party payments when DFS system or 3rd party system access
                             availability)                  is intermittent.



            8�9  Threat: Compromise of DFS Infrastructure
            We characterize these attacks as targeting the underlying infrastructure of the DFS ecosystem.

             Affected entity  Risks and vulnerabilities     Controls
                            The risk of     infrastructure and data  C45: Use multi-factor or multi-model authentication for
                            compromise is due to the following vul- access to DFS accounts.
                            nerability:
             DFS Provider 
                            -  Insecure and inadequate access con-
                              trols on user accounts (SD: access
                              control)















                                                                Digital Financial Services Security Assurance Framework  31
   28   29   30   31   32   33   34   35   36   37   38