Page 10 - FIGI: Digital Financial Services security audit guideline
P. 10

ii)  Authentication                                       customer personal data and steal customer
                                                                      funds from a DFS system.
                   Audit guidelines in this group assess a DFS
                   application's capability to verify the authen-  v)  Network security
                   ticity of the users.
                                                                      Audit guidelines in this group assess the
            iii)  Availability                                        controls in place to  protect the underlying
                                                                      network infrastructure from unauthorized
                   Audit guidelines in this group assess the DFS      access, misuse, malfunction, modification,
                   infrastructure and application for reliability     destruction, or improper disclosure. These
                   and ability to grant timely access to autho-       can also be used to test whether information
                   rised DFS  users. The application  and infra-      only flows between authorized endpoints
                   structure are validated for resistance to deni-    without being diverted or intercepted.
                   al-of-service attacks.
                                                               vi)  Privacy and confidentiality
            iv)  Fraud detection
                                                                      Audit guidelines in this group assess the
                   Audit guidelines in this group to assess the       controls in place to protect DFS partici-
                   controls in place within the DFS systems to        pants/user's data from unauthorised disclo-
                   detect intentional and unlawful intercep-          sure, including data protection that might be
                   tion by internal or external entities to obtain    derived from observing network activity.


            The DFS security audit guideline is structured in the format below:

             Impacted DFS  Group       Risk and Vulner-  Control     Security audit    Applicable policy or
             Entity                    ability                       question          procedure

            The table above shows the DFS security risks and vulnerabilities, the DFS entities affected by those risks,
            controls to mitigate the risks, the security audit question an auditor would ask and the respective policy and
            procedure.

            •   The "Impacted DFS entity" lists the entity affected by the risk and vulnerability within the DFS ecosystem.
            •   The "Risk and vulnerability" column outlines the threats that an entity within the DFS ecosystem will face
                based on the eight security dimensions (SD).
            •   The "control" column lists the DFS controls for each of the DFS entities within the ecosystem.
            •   The "Security audit question" column outlines the auditor's question for compliance checking of the specif-
                ic control.
            •   The "Applicable policy or procedure" column suggests the applicable policy or procedure documents that
                guide the day-to-day actions and strategies of a particular entity based on ISO/IEC 27001- Information
                Security Management [2].

            The structure table above is elaborated in section 3 and includes the detailed audit checklist for all the security
            controls in DFS security assurance framework. The table outlines the various security checks that need to be
            undertaken at the DFS provider and mobile network operator level to verify compliance.  This table can be used
            as a guideline by telco and financial services regulators, security auditors, and DFS providers for internal and
            external security audits.
            Section 4 describes the process the security auditors may adopt by outlining a series of questions from Table 1
            grouped by category for easy reference.









            8    Digital Financial Services security audit guideline
   5   6   7   8   9   10   11   12   13   14   15