Page 21 - FIGI: Digital Financial Services security audit guideline
P. 21

(continued)

             Impacted   Group  Risk and vulner-      Control              Security audit question  Applicable policy
             DFS Entity           ability                                                         or procedure
             MNO, DFS   Network   - Discovery of new   C109: MNOs along with DFS providers and   Are the DFS systems patched against known   Operations secu-
             providers,   Security  exploits against   payment services providers should patch   vulnerabilities?  rity - Technical
             and Third        deployed systems   systems to the latest versions provided        vulnerability
             parties          and the inability to   by the vendor to defend against attacks
                              deploy solutions   that have been developed from older
                              against these exploits  vulnerabilities
                              (SD: Data Confidenti-
                              ality, Access Control,
                              Availability)
             MNO, DFS   Access   - Discovery of new   C110: Providers and MNOs should have   Are there policies and processes in place to   Operations security
             providers,   control  exploits against   contingency plans in place with vendors to  manage a new threats and attacks to the DFS   - Technical vulnera-
             and Third        deployed systems   quickly acquire patches and system reme-  systems?  bility management
             parties          and the inability to   diation if a zero-day attack has been found
                              deploy solutions   in the wild. Part of this strategy involves
                              against these exploits  the proper use of backups.
                              (SD: Data Confidenti-
                              ality, Access Control,
                              Availability)
             MNO     Network   - Insecure devices   C111: MNOs should monitor devices used   Are all devices used to connect to DFS sys-  Operations security
                     Security  connected to the DFS  to connect to or otherwise access the   tems scanned for threats and checked for the   - Technical vulnera-
                              infrastructure (SD:   DFS system to ensure that such devices   latest software patches?  bility management
                              Data Integrity)  have the latest patches, updated antivirus
                                           software, are scanned for rootkits and
                                           key loggers, and do not support network
                                           extenders.
                     Authentica-  - Overly permissive   C115: Before authenticating DFS users,   Is the DFS provider checking the IMSI of   Access control
                     tion     access to the DFS   when possible, validate the IMSI, device,   mobile numbers used for DFS transactions to   Policy - User access
                              infrastructure (SD:   and location, and IP address of the user   protect against SIM swaps?  management
                              Authentication)  to establish their identity and to prevent
                                           unauthorized access to the network
                                           infrastructure.
             Third-Party   Fraud   - Inadequate transac-  C116: Payment service providers should   Do the DFS customers get alerts when DFS   Access control
             Provider  detection  tion verification (SD:   ensure that companion general-purpose   transactions are performed on their accounts? Policy - User access
                              Non-Repudiation)  reloadable cards linked to DFS accounts         management
                                           require the use of EMV chips with card-
                                           holder verification methods, such as PINs
                                           or biometrics, when practical, and that all
                                           transactions result in an alert to customers.
             DFS     Privacy and   - Inadequate over-  C117: DFS providers should ensure that   Is there proper segregation of data   Asset management
             Provider  Confidenti-  sight and controls in   customer data in production environments  implemented for tests and production   -  Media handling
                     ality    test environments   is not used in test environments unless   environments?
                              (SD: privacy)  anonymized according to best practices.    Are there processes that limit the use of
                                           Conversely, test data should not be
                                           migrated to the product.  customer data for test purposes? Such as data
                                                                     anonymization.
             Third-Party   Privacy and   - Exposure of cus-  C118: Third-party providers should restrict   Are there processes that limit the data shared   Asset management
             Provider  Confidenti-  tomer-sensitive   the sharing of information with other par-  with third parties when transactions are being  -  Media handling
                     ality    information in trans-  ties such as payment service providers and  performed?
                              actions or through   DFS providers to the minimum required to
                              APIs (SD: privacy)  assure the integrity of the transaction.
             Third-Party   Privacy and   - Insufficient data   C119: Providers should ensure that cus-  Do event logs contain customer-sensitive   Operations secu-
             Provider  Confidenti-  protection controls   tomer-sensitive data is removed from   data such as PINs?   rity - Logging and
                     ality    (SD: privacy)  environments such as trace logs (for exam-         monitoring
                                           ple, cash retrieval voucher codes, bank
                                           account numbers, and credentials). Use
                                           place holders whenever possible to repre-
                                           sent this data in log files.

            This audit checklist table [4] above is available to download in excel using this link:  https:// itu .int/ en/ ITU -T/ extcoop/
            figisymposium/ Documents/ Digital %20Financial %20Services %20security %20audit %20checklist .xlsm











                                                                      Digital Financial Services security audit guideline  19
   16   17   18   19   20   21   22   23   24   25   26