Technology Risk Management



Similar documents
Frequently Asked Questions: Notice on Technology Risk Management

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Monetary Authority of Singapore TECHNOLOGY RISK MANAGEMENT GUIDELINES

Technology Risk Management Are you ready?

Technology Risk Management

External Supplier Control Requirements

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Information Security Policies. Version 6.1

Top Ten Technology Risks Facing Colleges and Universities

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Newcastle University Information Security Procedures Version 3

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Critical Controls for Cyber Security.

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

External Supplier Control Requirements

INFORMATION TECHNOLOGY SECURITY STANDARDS

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

OUTSOURCING INVOLVING SHARED COMPUTING SERVICES (INCLUDING CLOUD) 6 July 2015

Attachment A. Identification of Risks/Cybersecurity Governance

TECHNOLOGY RISK MANAGEMENT GUIDELINES

Information Technology

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

COMPLIANCE CHECKLIST...

GUIDELINES ON CONTROL OBJECTIVES & PROCEDURES FOR OUTSOURCED SERVICE PROVIDERS

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Risk Management of Outsourced Technology Services. November 28, 2000

Certified Information Systems Auditor (CISA)

University of Sunderland Business Assurance Information Security Policy

Supplier Information Security Addendum for GE Restricted Data

University of Aberdeen Information Security Policy

Information Security and Risk Management

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Information security controls. Briefing for clients on Experian information security controls

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

OCIE CYBERSECURITY INITIATIVE

PCI Compliance for Cloud Applications

Regulations on Information Systems Security. I. General Provisions

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

How To Protect Decd Information From Harm

Managing internet security

FFIEC Cybersecurity Assessment Tool

Technical Standards for Information Security Measures for the Central Government Computer Systems

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

BMC s Security Strategy for ITSM in the SaaS Environment

Supplier Security Assessment Questionnaire

Lot 1 Service Specification MANAGED SECURITY SERVICES

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

How To Assess A Critical Service Provider

Nepal Rastra Bank Information Technology Guidelines

Intel Enhanced Data Security Assessment Form

LogRhythm and NERC CIP Compliance

Third Party Security Requirements Policy

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

ICANWK406A Install, configure and test network security

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority

Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)

The Protection Mission a constant endeavor

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Five keys to a more secure data environment

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

IT OUTSOURCING SECURITY

PII Compliance Guidelines

Domain 1 The Process of Auditing Information Systems

Cyber Exploits: Improving Defenses Against Penetration Attempts

Cloud Computing Security Considerations

Security Controls What Works. Southside Virginia Community College: Security Awareness

Central Agency for Information Technology

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

(a) the kind of data and the harm that could result if any of those things should occur;

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Electronic Payment Schemes Guidelines

Project Title slide Project: PCI. Are You At Risk?

A Rackspace White Paper Spring 2010

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Microsoft s Compliance Framework for Online Services

Consultative report. Committee on Payment and Settlement Systems. Board of the International Organization of Securities Commissions

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Securing the Service Desk in the Cloud

Enterprise Security Architecture

Internal Audit Takes On Emerging Technologies

ISO27001 Controls and Objectives

CISM ITEM DEVELOPMENT GUIDE

Addressing Cloud Computing Security Considerations

Transcription:

1 Monetary Authority of Singapore Technology Risk Guidelines & Notices New Requirements for Financial Services Industry Mark Ames Director, Seminar Program ISACA Singapore

2 MAS Supervisory Framework Impact Assessment Risk Assessment Impact on Singapore financial environment if the FI experiences distress Risk that a financial institution will not meet supervisory objectives Issues of Supervisory Concern Supervisory Intensity Specific Supervisory Plan Supervisory Requirements Technology Risk Guidelines Supervisory Objectives stable financial system; safe and sound financial intermediaries; safe and efficient financial infrastructure; fair, efficient and transparent organised markets; transparent and fair-dealing intermediaries and offerors; and well-informed and empowered consumers. MAS FRAMEWORK FOR IMPACT AND RISK ASSESSMENT OF FINANCIAL INSTITUTIONS

3 From IBTRM to TRM++ MAS TRM Guidelines (recommended best practice) Extended from on-line banking services to: All banking financial services Financial advisors and fund managers, Trust companies Money changers In effect from 21 June 2013 New Mandatory Requirements- Notices Identify critical systems High level of reliability, availability, and recoverability of critical IT systems; Protect customer information from unauthorised access or disclosure. Mandatory Reporting Outages, Security Breaches These take effect from 1 July 2014 Remittance agents and money brokers Insurance providers and brokers Payment systems operators

4 Notices Identify Critical Systems a system, the failure of which will: cause significant disruption to operations, or materially impact service to customers, a system which (a) processes transactions that are time critical; or (b) provides essential services to customers; Organisations are required to establish a framework and process to identify critical systems as defined in the Notice and maintain a list of critical systems, if any By 1 July 2014

5 Notices Unscheduled Outages Apply to identified Critical Systems Establish a recovery time objective ( RTO ) of not more than 4 hours for each critical system. The RTO is the duration of time, from the point of disruption, within which a system must be restored. Ensure that maximum unscheduled downtime for each critical system does not exceed a total of 4 hours within any period of 12 months. Indications are that MAS expects no more than 4 cumulative hours annually of incidents that result in severe and widespread impact on operations, or material impact on service to customers Effective from 1 July 2013.

6 Notices - Mandatory Reporting Unscheduled outages of critical systems causing significant disruption of services to customers Security Incidents Critical Systems hacking, intrusion or denial of service attack All Systems compromise of customer information Must be Reported within one hour of discovery Root-cause and impact analysis report within 14 days Must notify MAS within 1 hour upon the discovery of a system malfunction or IT security incident regardless of when the malfunction or incident occurs. From 1 July 2014

7 MAS TRM Guidelines Principles and best practice standards focussing on: a. Robust technology risk management framework; b. System security, reliability, resiliency, and recoverability; and c. Strong authentication to protect customer data, transactions and systems. Guidelines are not legally binding: the degree of observance with the spirit of the Guidelines is an area of consideration in the risk assessment of the FI by MAS

8 MAS TRM expectations All financial institutions will address key areas of concern Risk Outsourcing Online Services Payment Cards With special emphasis on: Protecting Customer Information Cryptographic Functions Access Control and Privileged Access System Acquisition & Development Service & Continuity Planning Infrastructure & Data Centre Security Audit, Oversight & Governance

9 COBIT 5 and TRM Evaluate, Direct, & Monitor Governance Framework Deliver Benefits Manage Risk Optimise Resources Stakeholder Transparency Align, Plan, & Organise Framework Service Risk Security Monitor Performance Build, Acquire, & Implement Project Requirements Definition Build Change Asset Monitor & Assess Controls Deliver, Service, & Support Operations Service Incident Continuity Manage Security Services Monitor External Compliance Enterprise IT Processes Adapted from COBIT 5, figure 16. 2012 ISACA.

Protecting Customer Information Encrypt customer personal, account and transaction data: stored and processed in systems. (9.0.2) stored in all types of endpoint devices (9.1.3). exchanged with external parties (9.1.5) stored on IT systems, servers and databases (9.1.6) on backup tapes and disks, including USB disks (8.4.4) in storage and transmission within mobile online services and payments. (12.2.4) 10 Priority! You should now be identifying gaps and planning remediation as a priority

Protecting Customer Information Encrypt customer personal, account and transaction data: Don t forget the PDPA! stored and processed in systems. (9.0.2) Comes into force in parallel with TRM Legally binding with penalties for non-compliance stored in all types of endpoint devices (9.1.3). exchanged with external parties (9.1.5) You must know and document where and how you hold Customer personal information stored on IT systems, servers and databases (9.1.6) on backup tapes and disks, including USB disks (8.4.4) Consolidate customer personal information in storage and transmission within mobile online services and payments. (12.2.4) 11 Priority! You should now be identifying gaps and planning remediation as a priority

12 Cryptographic Functions Priority! Verify cryptographic implementations Use only cryptographic modules based on authoritative standards and reputable protocols. Review cryptographic algorithms and crypto-key configurations for deficiencies and loopholes. Thoroughly assess ciphers, key sizes, key exchange control protocols, hashing functions and random number generators. Rigorously test: all cryptographic operations (encryption, decryption, hashing, signing) and key management procedures (generation, distribution, installation, renewal, revocation and expiry) Ensure you have access to required expertise

13 Priority! Access Control and Privileged Access apply stringent selection criteria and thorough screening controls and security practices are unchanged from IBTRM: a. Implement strong authentication mechanisms such as two-factor authentication for privileged users; b. Institute strong controls over remote access by privileged users; c. Restrict the number of privileged users; d. Grant privileged access on a need-tohave basis; e. Maintain audit logging of system activities performed by privileged users; f. Disallow privileged users from accessing systems logs in which their activities are being captured; g. Review privileged users activities on a timely basis; h. Prohibit sharing of privileged accounts; i. Disallow vendors and contractors from gaining privileged access to systems without close supervision and monitoring; and j. Protect backup data from unauthorised access. Enact in policies, standards and procedures. Document controls.

14 TRM Risk Framework Establish a technology risk management framework to manage technology risks in a systematic and consistent manner. a. Roles and responsibilities in managing technology risks; b. Identification and prioritisation of information system assets; c. Identification and assessment of impact and likelihood of current and emerging threats, risks and vulnerabilities; d. Implementation of appropriate practices and controls to mitigate risks; and e. Periodic update and monitoring of risk assessment to include changes in systems, environmental or operating conditions that would affect risk analysis. New requirements maintain a risk register develop IT risk metrics and quantify potential impacts and consequences of risks across the business and operations.

15 TRM Risk Framework Establish a technology risk management framework to manage technology Risk Measurement: risks in a systematic and consistent manner. * Likelihood/Probability (of something happening) X a. Roles * Consequences/Impact and responsibilities (of in loss managing or disruption technology of service) risks; b. Identification Example: and prioritisation of information system assets; c. Identification Likelihood of and Credit assessment Card of impact system and likelihood failing of current and emerging threats, (based on risks previous and vulnerabilities; experience and experience in other organisations) Is once in two years. Annual probability =50% d. Implementation of appropriate practices and controls to mitigate risks; and e. Periodic Impact update average and outage monitoring two hours: of risk assessment to include changes in systems, Lost revenue environmental = $200 or operating conditions that would affect risk analysis. Recovery cost = $6,500 Customer complaints = 30 > $100 per complaint to resolve = $3,000 maintain Total Impact a risk register = $9,700 New requirements develop IT risk metrics and quantify potential impacts and consequences Annualised of Risk risks =.50 across X $9,700 the business = $4,850and operations. Document accountabilities, processes and actions.

16 TRM IT Outsourcing Risks Directors and Senior are liable For understanding risks and exercising due diligence in entering outsourcing arrangements Regulators (e.g. MAS) must have access to outsourced systems and facilities. Maintain security of operations Thorough Contingency and Recovery Planning Including failure of outsourcing firm Cloud Computing Keep customer data and information assets separate Contractual arrangements to remove/ retreive data Recovery capability (RTO) consistent with business and regulatory requirements Apply the same Risk Appetite and controls.

17 TRM System Development & Acquisition All Applications: Apply appropriate security controls based on the type and complexity of services provided. Project Framework project risk assessment, risk classification, critical success factors Full documentation standards Specify Security Requirements access control authentication transaction authorisation data integrity Oversight and monitoring system activity logging audit trails security event tracking exception handling Develop a standard Controls Library.

18 TRM System Development & Acquisition 2 Testing Full testing methodology including regression testing Penetration and vulnerability testing Separate environments. Source Code Review Identify: security vulnerabilities and deficiencies, mistakes in system design or functionality End User Applications Identify important end-user applications spreadsheets, macros, scripts, etc Include in recovery and support plans Apply similar reviews as for large applications Vendors and partners must also comply: Inform them and put in contracts.

19 TRM Service & Continuity Change & Migration Fully documented framework including staged approvals and assessment of risks Fall back/roll back planning Synchronisation with backup and recovery environments Incident & Problem Refer to requirements in Notices regarding Security Incidents Reporting and analysis of Major incidents Fully documented framework including Classification of severity especially for security incidents Escalation and response plans action plan to address public relations issues Establish a computer emergency response team comprising staff within the FI with necessary technical and operational skills to handle major incidents. Comply with Notices on Incident Reporting as a priority.

20 TRM Data Security Infrastructure Security Asset classification and protection Identify important data Implement appropriate controls Protect sensitive information Encrypt sensitive information At end points, in transmission, stored on corporate systems Social media, cloud-based storage, and webmail Don t use to store or communicate sensitive information Prevent and detect the use of such services Review your communications with customers.

21 TRM Technology Infrastructure Security System Inventories Hardware, software, and support agreements Production and DR Comprehensive and current Security Configuration Define & document security settings; regularly review & verify Unsupported (Unsupportable) Systems Replace them! Have refresh and life-cycle plans and planning process Start planning now to create or update detailed system inventories, configuration standards, and refresh plans.

22 TRM Network Security Infrastructure Security Configuration Standards Regularly monitor for compliance Anti-Virus Comprehensive malware detection, prevention, & removal is better! Firewalls and IDS At perimeter and to segregate internal trusted networks Secure WLANs Vulnerability and Penetration Testing Don t rely on automated tools Demonstrate remediation planning Patch Change management! Security Monitoring real-time monitoring of security events for critical systems Document your own internal standards supported by risk assessments.

23 TRM Data Centre Security A digest of current data centre security standards: ISO 27001 TIA-942 SAS 70 COBIT 5 Threat Vulnerability Risk Assessment (TVRA) is central Monitor Service Providers ETSI European Telecommunication Standardization Institute Physical, Logical, and Environmental Controls Ensure your data centres and service provider data centres meet current international standards

24 TRM Online Services Manage higher risks associated with on-line services. Repeated emphasis on: Security Strategy Data Security Security Requirements Customer Education Security Monitoring Physical and logical access security Two factor authentication Transaction signing Equivalent controls for mobile services Implementation of Cryptography (App C) DDoS countermeasures (App D) Minimise exposure to cyber attacks (App E) Online services are a key focus and priority for MAS Make it your focus, too.

25 TRM Payment Cards Applies to card issuers and kiosk operators Banks, American Express, SAM, AXS, etc. Cards and Transactions Chip cards are mandatory Activation controls OTP for CNP Fraud monitoring Deviant transactions ATMs and Kiosks a. Anti-skimming controls b. Detection and notification systems c. Tamper-resistant keypads d. Prevent shoulder surfing e. Video surveillance. Complying with PCI-DSS will address many other MAS TRM areas of concern.

26 TRM Internal Audit Independent and Objective IT Audit Function Or other governance and oversight structures Comprehensive Audit Scope Scope should encompass TRM areas of coverage Annual IT Audit Plan Priority on high risk areas Track and Monitor IT Audit Issues Fund and support remediation programs Integrate internal audit with other GRC activities to demonstrate that you can and will meet supervisory objectives.

27 TRM Appendices A: SYSTEMS SECURITY TESTING AND SOURCE CODE REVIEW B: STORAGE SYSTEM RESILIENCY C: CRYPTOGRAPHY D: DISTRIBUTED DENIAL-OF-SERVICE PROTECTION E: SECURITY MEASURES FOR ONLINE SYSTEMS F: CUSTOMER PROTECTION AND EDUCATION The devil is in the detail: These specify key details of MAS supervisory objectives.

28 COBIT 5 and TRM Evaluate, Direct, & Monitor Governance Framework Deliver Benefits Manage Risk Optimise Resources Stakeholder Transparency Align, Plan, & Organise Framework Service Risk Security Monitor Performance Build, Acquire, & Implement Project Requirements Definition Build Change Asset Monitor & Assess Controls Deliver, Service, & Support Operations Service Incident Continuity Manage Security Services Monitor External Compliance Enterprise IT Processes Adapted from COBIT 5, figure 16. 2012 ISACA.

29 COBIT 5 and Risk Framework MAS Technology Risk Guidelines MAS Supervisory Objectives

30 COBIT 5 and Risk Framework MAS Technology Risk Guidelines MAS Supervisory Objectives

31 THANK YOU Mark Ames, CISA, CISM, CRISC Director Seminar Program ISACA Singapore program.seminar@isaca.org.sg Singapore Chapter