Page 14 - FIGI: Digital Financial Services security audit guideline
P. 14

(continued)

             Impacted   Group  Risk and vulner-      Control              Security audit question  Applicable policy
             DFS Entity           ability                                                         or procedure
             DFS     Network   - Addition of test data  C30: The DFS provider should employ   Is the DFS provider performing input valida-  System acquisition,
             Provider  Security  into production data   robust input validation routines on   tion checks?  development,
                              (SD: data integrity)  external-facing services by checking        and maintenance
                                           out-of-range values and unpermitted char-            - Security in devel-
                                           acters in fields, and by constraining and            opment and support
                                           sanitizing input. Input validation should            processes
                                           happen at the earliest possible point and
                                           should be done both on the client, and
                                           server-side, however, the server should not
                                           rely solely on client-side validation.  Addi-
                                           tionally, block, log and review all requests
                                           that violate the Web Services Description
                                           Language (WSDL) and schemas.
             DFS     Fraud    - Addition of test data  C31: Use database fingerprinting to detect  Are there mechanisms in place to detect data   Operations secu-
             Provider  detection  into production data   tampering and modification of data after it  modification and tampering on the database? rity - Logging and
                              (SD: data integrity)  has been stored                             monitoring
             DFS              - Addition of test data  C32: Ensure all test data is removed from   Is test data and test user accounts deleted   System acquisition,
             Provider         into production data   code before it is migrated to the produc-  from the production environment?  development, and
                              (SD: data integrity)  tion environment.                           maintenance -  Test
                                                                                                data
             DFS     Fraud    - Absence of logging,  C33: DFS systems should use logging   Are DFS logs stored securely in a tamper proof  Operations secu-
             Provider  detection  ability to alter logs,   mechanisms, including capturing the prov- module? e.g., SIEM  rity - Logging and
                              and insufficient infor-  enance of user actions or logging of critical   monitoring
                              mation in logs (SD:   actions into tamper-proof storage, secure
                              non-repudiation)  DFS system logs from tampering, editing,
                                           deleting, stopping.
             DFS     Network   - Inaccurate and   C34:  Ensure clock accuracy synchroniza-  Are the clocks within the DFS ecosystem   Operations secu-
             Provider  Security  unsynchronised   tion on all systems connected to the DFS   synchronized?  rity - Operational
                              clocks (SD: data   system. NTP and SNTP are some of the pro-      procedures and
                              integrity)   tocols used to sync accurate time; however,          responsibilities
                                           these must be deployed securely.
             MNO     Network   - Weak over-the-air   C38: Discontinue the use of A5/0, A5/1,   Has the use of known weak ciphers been   Communications
                     security  encryption (SD: com-  and A5/2 GSM encryption ciphers. Closely   discontinued? Has the deployment been   security: Informa-
                              munication security)  monitor results from the security and   prepared for new ciphers?  tion transfer
                                           cryptographic community regarding the
                                           feasibility and ease of compromising A5/3
                                           and A5/4 and begin considering stronger
                                           ciphers. Have a deployment strategy ready
                                           for these newer ciphers.
             MNO     Fraud    - Weak Calling Line   C39: MNOs should do CLI analysis for calls/  Are there mechanisms to detect SMS and call   Communications
                     detection  Identification filtering  SMS to detect calls and SMS that may be   spoofing? E.g., CLI analysis?  security: Informa-
                              (SD: communication   spoofed to appear like DFS provider calls.   tion transfer
                              security)
             DFS     Authentica-  -Missing/Inad-  C40: Require user authentication and   Is there additional authorisation and authen-  Access control
             Provider  tion   equate account   authorization for high-risk account   tication for high value transactions and   Policy - User access
                              configuration and   changes and transaction and deny per-  changes on DFS user accounts? For example,   management
                              authorisation controls  forming of transactions even when the   what additional checks are done when
                              (SD: authentication)  device is logged in until knowledge of PIN   increasing transaction limits?
                                           or password has been demonstrated.
             Third-Party   Privacy and   - Weak encryption   C41: Sufficiently secure encryption should   Have strong encryption ciphers and integrity
             Providers  confidenti-  algorithms used on   be employed for both data protection   protection mechanisms such as message   Cryptography policy
                     ality    data stored in the   within the mobile application and com-  authentication codes been used for data   - Cryptographic
                              device and data   munication with backend DFS systems   stored on the device and when data is com-
                              transmitted (SD:   and whenever possible, mask, truncate or   municated to backend DFS systems? (See   controls
                              privacy)     redact customer confidential information.  C17 for a discussion of strong encryption
                                                                     algorithms.) Are policies in place to assure the
                                                                     reaction of sensitive customer confidential
                                                                     information?
             Third-Party   Privacy and   - Lack of encryption   C42: Use digital signatures to identify third  Are digital signatures used to identify third   Access control
             Providers  confidenti-  of communications   parties connected to the DFS system when  party providers that connect to the DFS   Policy -  System and
                     ality    (SD - communication  transactions are performed.  systems?        application access
                              security)                                                         control








            12   Digital Financial Services security audit guideline
   9   10   11   12   13   14   15   16   17   18   19