Page 23 - FIGI: Digital Financial Services security audit guideline
P. 23

E.g., input validation, amounts, special characters in   4�4�7   Do the DFS customers get alerts when DFS
            amounts, currency checks etc.                      transactions are performed on their accounts?
            4�2�14  Is there additional authorisation and authen-  4�4�8   Do  trace  logs  and  event  data  records
            tication for high value transactions and changes on   capture/store sensitive user data? (e.g., are customer
            DFS user accounts? For example, what additional    PINs stored in EDRs)
            checks are done when increasing transaction limits?  4�4�9   Does the app store transactions for later
            4�2�15  Does the DFS system have capability to     transmission?
            detect out-of-pattern transactions based on custom-  4�4�10  Does the DFS provider implement Role
            er profile?  Are the DFS provider performing checks   Based Access Controls?
            based on user transactions profile? E.g., agent shops   4�4�11   Is there a mechanism in place to review
            performing late transactions, DFS users perfuming   administrative privileges?
            transactions in two different locations?           4�4�12  Is there more than one person required to
                                                               complete a critical DFS tasks?
            4�3  Availability
            4�3�1   Are there policies in place to assure manage-  4�5  Network Security
            ment during system downtime?                       4�5�1   Are all devices used to connect to DFS
            4�3�2   Are there end to end tests been performed   systems scanned for threats and checked for the
            after changes or upgrades to the DFS systems? End   latest software patches?
            to end tests may include capacity tests, security   4�5�2   Are code changes tested and approved
            tests, QoS tests, user acceptance tests etc.       before moving it into production? For example, user
            4�3�3   Are there regular vulnerability scans that are   and internal acceptance certificates that show that
            performed on the DFS systems?                      the code was tested.
            4�3�4   Are there systems in place to ensure service   4�5�3   Are encryption keys were changed from
            availability? Example (service redundancy) Are there   default  at  installation?  Are  default  SNMP  strings
            reports and utilities to measure system response   changed?
            time and down time?                                4�5�4   Are the clocks within the DFS ecosystem
            4�3�5   Are there systems to measure quality of    synchronized?
            service and quality of experience? Do the QoS and   4�5�5   Are the DFS systems patched against known
            QoE conform to the standards for DFS?              vulnerabilities?
            4�3�6   Does the DFS provider have regular sched-  4�5�6   Are the DFS systems updated to the latest
            uled backups? Are the backups encrypted and stored   versions to protect against new threats?
            on an offsite location?                            4�5�7   Are the encryption algorithms and keys used
                                                               are strong enough to protect customer PINs and
            4�4  Fraud Detection                               data?
            4�4�1   Are DFS logs stored securely in a tamper   4�5�8   Are the firewall rules adequately configured?
            proof module? E.g., SIEM                           e.g. port whitelisting, packet filtering
            4�4�2   Are there mechanisms in place to detect    4�5�9   Are there adequate protections against
            data modification and tampering on the database?   network attacks like firewalls and traffic filters with
            4�4�3   Are  there  mechanisms  to  detect  SMS  and   proper configurations?
            call spoofing? E.g., CLI analysis?                 4�5�10  Are there logical boundaries that limit
            4�4�4   Are there sufficient controls to review and   access to the DFS systems from all other systems?
            approve for critical changes on accounts? e.g., is   (For example, are other unauthorized internal users
            there maker-checker and approval process before    logically and/physically limited on the network from
            changes are made?                                  accessing DFS processing systems)
            4�4�5   Are there sufficient mechanisms to monitor   4�5�11   Are there operational controls to detect
            transactions processed through payment APIs? Does   threats associated with APIs? Are there controls in
            the DFS provider have nondisclosure agreements     place to detect rouge/malicious APIs?
            pertaining to customer sensitive data with third   4�5�12  Are  there  pending  transactions,  duplicate
            parties? Are there strong cryptographic algorithms   transactions in the DFS system? Has the transaction
            used when transferring data with third parties?    been fully executed?
            4�4�6   Do the audit logs provided sufficiently track   4�5�13  Are there procedures in place to moni-
            all changes on the DFS system or MNO systems that   tor software updates and are the updates installed
            affect DFS services?                               securely?



                                                                      Digital Financial Services security audit guideline  21
   18   19   20   21   22   23   24   25   26   27   28