Page 20 - FIGI: Digital Financial Services security audit guideline
P. 20

(continued)

             Impacted   Group  Risk and vulner-      Control              Security audit question  Applicable policy
             DFS Entity           ability                                                         or procedure
             Third-  Network   - Inadequate col-  C99: Merchants and DFS providers should   Are there procedures in place to monitor soft-  Operations security
             Party, DFS   Security  laboration with the   require the following from their solution   ware updates and are the updates installed in  - Technical vulnera-
             Provider         solution provider on   provider:       a securely?                bility management
                              the security of mobile
                              devices purchased   - The solution provider should regularly
                              (SD: Availability and   update their payment application and
                                           indicate to the merchant when updates are
                              Confidentiality)
                                           available and are safe to install.
                                           - The solution provider should have restric-
                                           tions on their payment application so
                                           that it only functions on a device running
                                           approved firmware.
                                           - The solution provider should supply
                                           documentation that details any update
                                           procedures the merchant needs to follow.
                                           - The DFS solution provider should com-
                                           municate with the DFS provider and
                                           make them aware of newly discovered
                                           vulnerabilities in their payment-accep-
                                           tance solution. Additionally, the solution
                                           provider should guide merchants when
                                           new vulnerabilities are discovered, as well
                                           as provide tested patches for any of these
                                           vulnerabilities.
             Third-  Fraud    - Open undetected   C100: The merchant should work with its   Do the audit logs provided sufficiently track   Operations security
             Party, DFS   detection  system application   solution provider to ensure that any audit   all changes on the DFS system or MNO sys-  - Technical vulnera-
             Provider         weaknesses (SD: Data  or logging capability is enabled. The solu-  tems that affect DFS services?  bility management
                              Confidentiality)  tion provider should ensure that logging
                                           capabilities exist with enough granularity
                                           to detect abnormal events.
                                           The solution provider should guide the
                                           merchant on the merchant's responsi-
                                           bility to review the logs. Additionally,
                                           regularly inspect system logs and reports
                                           for abnormal activity. If abnormal activity
                                           is suspected or discovered, discontinue
                                           access to the mobile device and its pay-
                                           ment application until the issue has been
                                           resolved. Abnormal activities include, but
                                           are not limited to, unauthorized access
                                           attempts, escalated privileges, and unau-
                                           thorized updates to software or firmware.
             Third-  Network   - Network exposure   C101: DFS Applications should be sub-  Is there regular penetration testing of the DFS  Operations security
             Party, DFS   Security  to outside attacks   jected to regular security penetration   systems?  - Technical vulnera-
             Provider         (SD: Availability)  scans and penetration testing. In particular,   bility management
                                           applications should be designed to be
                                           robust against phishing software.
             MNO     Availability  - Network exposure   C107: Perform regular vulnerability scans   Are there regular vulnerability scans that are   Operations security
                              to outside attacks   and penetration tests on MNO infrastruc-  performed on the DFS systems?  - Technical vulnera-
                              (SD: Availability)  ture to check exposure to attacks that        bility management
                                           could affect system availability.
             MNO     Network   - Network exposure   C108: Install and regularly update the   Are the DFS systems updated to the latest   Operations security
                     Security  to outside attacks   latest anti-malware software (if available)   versions to protect against new threats?  - Protection from
                              (SD: Availability)  and make this available to end-users.         malware
                                           Consider application wrapping, which
                                           can be employed with an MDM (Mobile
                                           Device Management) solution to prevent
                                           and remove malicious software and
                                           applications.












            18   Digital Financial Services security audit guideline
   15   16   17   18   19   20   21   22   23   24   25