Page 12 - FIGI: Digital Financial Services security audit guideline
P. 12
(continued)
Impacted Group Risk and vulner- Control Security audit question Applicable policy
DFS Entity ability or procedure
MNO Network - Exposure of internal C15: Use Network Address Translation to Are there technical controls in place to limit Communications
Security network to external limit external exposure of DFS IP address exposure of internal DFS systems addresses Security Policy
adversaries (SD: and routing information. (like database IP addresses? - Network security
access control) management
DFS Network - Insufficient pro- C16: Avoid direct access by external Are there logical boundaries that limit access Communications
Provider Security tection of internal systems to the DFS backend systems by to the DFS systems from all other systems? Security Policy
systems against setting up a DMZ that logically separates (For example, are other unauthorized inter- - Network security
external adversaries the DFS system from all other internal and nal users logically and/physically limited on management
(SD: access control) external systems. the network from accessing DFS processing
systems)
DFS Privacy and - Reliance by DFS C17: Ensure that security libraries offered Are the cryptographic libraries used by the Cryptography policy
Provider Confidenti- application on secu- by the operating system are correctly operating system or by the application cor- - Cryptographic
ality rity libraries offered designed and implemented and that the rectly designed and implemented and are controls
by operating systems cipher suites they support are sufficiently they up to date? Do the cryptographic librar-
(SD: communication strong. ies support strong cryptographic ciphersuites
security) and do they prevent or discourage use of
weak ciphersuites? Are hashing algorithms
used that have not been deprecated and are
adequate digest lengths supported? (Any-
thing less than SHA512 is considered weak
today. MD5 and SHA1 have been broken.)
For symmetric encryption ciphers, are strong
ciphers used and are adequate key lengths
supported? (For example, AES is considered
secure to use while 3-DES is no longer a pre-
ferred cipher because of the SWEET-32 attack,
and it is encouraged to move away from it
to AES as soon as possible.) - For public-key
encryption, are key lengths chosen to be an
appropriate size for the public key algorithm
being used?
Are the criteria used for selecting cryp-
tographic algorithms and key sizes based on
public and well-examined standards? (For
example, NIST 800-57 special publication has
guidelines on minimum key sizes for each
algorithm and how long this key size is good
for)
MNO Privacy and - Weak encryption C18: Ensure all sensitive consumer data Has all sensitive consumer data been Cryptography policy
Confidenti- practices or sending such as PINs and passwords are encrypted, encrypted by the application or the operating - Cryptographic
ality sensitive information when traversing the network and while the system? Are unencrypted versions of the controls
in clear text over inse- data is at rest. data accessible in the device, for example,
cure traffic channels in temporary buffers or in memory? Is all
like SMS and USSD information sent over a network connection
(SD: communication encrypted with a strong encryption cipher?
security) (See C17 for more discussion of what com-
prises a strong encryption cipher.)
DFS Pro- Fraud - Inadequate data C19: Remove customer sensitive data from Do trace logs and event data records capture/ Operations secu-
vider and Detection protection controls trace logs. Examples of data that should store sensitive user data? (e.g. are customer rity - Logging and
Third-party (SD: privacy) be removed include cash retrieval voucher PINs stored in EDRs) monitoring
providers codes, bank account numbers, credentials.
Instead, use place holders, where possible,
to represent this data in logs.
DFS Pro- Privacy and - Exposure of cus- C20: DFS providers should restrict sharing Is there limitation on customer sensitive infor- Operations security
vider and Confidenti- tomer sensitive of DFS user information to the minimum mation shared during transaction processing policy - Operational
Third-party ality information during amount required for transactions with with third parties? (e.g. Only information procedures and
providers transactions or third parties and service providers. needed for processing the transaction is responsibilities
through APIs (SD: shared with the third party)
privacy)
10 Digital Financial Services security audit guideline