R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

December 11, 2016

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance
 
NIST Handbook
 
Penetration Testing
 
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration study complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.


FYI
- Is your web site compliant with the American Disability Act?  For the past 20 years, our bank web site audits have covered the ADA guidelines.  Help reduce any liability, please contact me for more information at examiner@yennik.com

FYI - The FDIC and the OCC do not have a requirement that financial institutions change third-party vendors on a periodic basis.  Any such decision is a management decision not a regulatory decision.  Refer to http://www.yennik.com/occ_10-12-16_rotation_letter.pdf and at http://www.yennik.com/fdic_10-18-16_rotation_letter.pdf.

OCC To Consider Fintech Charter Applications, Seeks Comment - Comptroller of the Currency Thomas J. Curry today announced that the Office of the Comptroller of the Currency would move forward with considering applications from financial technology companies to become special purpose national banks. https://occ.gov/news-issuances/news-releases/2016/nr-occ-2016-152.html

Banking malware allows bad guys to lock, reset phone passwords - Cybercriminals have updated a two-year old banking app scam that grabs control of a victim's smartphone, locks them out and then drains their bank account while the person struggles to regain control of their device. https://www.scmagazine.com/banking-malware-allows-bad-guys-to-lock-reset-phone-passwords/article/576470/

Back to basics.....Why cybersecurity must start over before it can move forward - Cybersecurity as a field is only 20 years old. With that, it's not surprising that the current state of maturity is not where we, as professionals, expect it to be. https://www.scmagazine.com/back-to-basicswhy-cybersecurity-must-start-over-before-it-can-move-forward/article/576459/

Mastercard and Visa push EMV liability deadline to 2020 for automated fuel pumps - Citing technological and regulatory challenges, Mastercard and Visa have postponed their liability deadlines for merchants to employ EMV chip card technology at automated fuel pumps, from October 2017 to October 2020. https://www.scmagazine.com/mastercard-and-visa-push-emv-liability-deadline-to-2020-for-automated-fuel-pumps/article/576439/

'Fatal' flaws found in medical implant software - Security flaws found in 10 different types of medical implants could have "fatal" consequences, warn researchers. http://www.bbc.com/news/technology-38169102

Russia accuses hostile foreign powers of plot to undermine its banks - Russia has accused unnamed foreign spies of launching a concerted effort to undermine its domestic banking system. http://www.theregister.co.uk/2016/12/02/russia_bank_cyberattack_plot/

Insurers grapple with cyber-attacks that spill over into physical damage - AS HACKERS wreak havoc with depressing regularity, the insurance industry finds itself forced to contemplate a whole new set of risks. http://www.economist.com/news/finance-and-economics/21711086-only-cyber-calamity-will-reveal-how-ready-industry-insurers-grapple

White House Plans to Retire Outdated Cyber Regulations - White House cyber officials have identified 63 different policy directives, regulations or other requirements they plan to retire, the government’s chief information security officer said Wednesday. http://www.nextgov.com/security/2016/12/white-house-plans-retire-outdated-cyber-regs/133542/


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Erasmus University breach wider than first announced - Rotterdam, Netherlands-based Erasmus University announced a breach a few weeks ago, but at that time it was believed not much more than student names, addresses and logins were stolen. However, yesterday further details were announced. https://www.scmagazine.com/erasmus-university-breach-wider-than-first-announced/article/576445/

Misconfigured drive exposes locations of explosives used by oil industry - Oil company Allied-Horizontal Wireline Services (AHWS) are reported to have misconfigured a storage device, which has resulted in the leak of the locations where it stores the explosives it uses. https://www.scmagazine.com/misconfigured-drive-exposes-locations-of-explosives-used-by-oil-industry/article/576906/

Japan's Shiheido cosmetics firm hit with breach - A Japanese press agency reported that stolen data includes customers' names and addresses, as well as financial data – including credit card information – of as many as 56,000 customers. https://www.scmagazine.com/japans-shiheido-cosmetics-firm-hit-with-breach/article/576900/

Ransomware blamed for cyber attack which forced hospitals to cancel operations and shut down systems - An NHS hospital trust which was forced to shut down systems and cancel operations as a result of a cyberattack has revealed that a ransomware infection was the source of the problem. http://www.zdnet.com/article/ransomware-blamed-for-cyber-attack-which-forced-hospitals-to-cancel-operations-and-shut-down-systems/

Russian central bank, private banks lose $31 mln in cyber attacks - Hackers stole more than 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank and from accounts in commercial banks, the bank said on Friday, the latest example of an escalation of cyber attacks on financial institutions around the globe. http://www.reuters.com/article/us-russia-cenbank-cyberattack-idUSKBN13R1TO

DailyMotion breached, 85 million accounts made off with - One of the internet's foremost video hosting platforms has been breached and hackers have made off with tens of millions of account details. https://www.scmagazine.com/dailymotion-breached-85-million-accounts-made-off-with/article/577203/

Ohio's Henry County hit with ransomware, 17,000 residents affected - Ohio's Henry County was hit with a ransomware attack on Oct. 31 with more than 17,000 voting records might have been compromised. https://www.scmagazine.com/ohios-henry-county-hit-with-ransomware-17000-residents-affected/article/577546/


Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
 
 
Board and Management Oversight - Principle 1: The Board of Directors and senior management should establish effective management oversight over the risks associated with e-banking activities, including the establishment of specific accountability, policies and controls to manage these risks. (Part 1 of 2)
 
 Vigilant management oversight is essential for the provision of effective internal controls over e-banking activities. In addition to the specific characteristics of the Internet distribution channel discussed in the Introduction, the following aspects of e-banking may pose considerable challenge to traditional risk management processes:
 
 1) Major elements of the delivery channel (the Internet and related technologies) are outside of the bank's direct control.
 
 2) The Internet facilitates delivery of services across multiple national jurisdictions, including those not currently served by the institution through physical locations.
 
 3) The complexity of issues that are associated with e-banking and that involve highly technical language and concepts are in many cases outside the traditional experience of the Board and senior management.
 
 In light of the unique characteristics of e-banking, new e-banking projects that may have a significant impact on the bank's risk profile and strategy should be reviewed by the Board of Directors and senior management and undergo appropriate strategic and cost/reward analysis. Without adequate up-front strategic review and ongoing performance to plan assessments, banks are at risk of underestimating the cost and/or overestimating the payback of their e-banking initiatives.
 
 In addition, the Board and senior management should ensure that the bank does not enter into new e-banking businesses or adopt new technologies unless it has the necessary expertise to provide competent risk management oversight. Management and staff expertise should be commensurate with the technical nature and complexity of the bank's e-banking applications and underlying technologies. Adequate expertise is essential regardless of whether the bank's e-banking systems and services are managed in-house or outsourced to third parties. Senior management oversight processes should operate on a dynamic basis in order to effectively intervene and correct any material e-banking systems problems or security breaches that may occur. The increased reputational risk associated with e-banking necessitates vigilant monitoring of systems operability and customer satisfaction as well as appropriate incident reporting to the Board and senior management.

Return to the top of the newsletter

FFIEC IT SECURITY
-
We continue our series on the FFIEC interagency Information Security Booklet.  
 
 SECURITY CONTROLS - IMPLEMENTATION - APPLICATION ACCESS (Part 2 of 2)

 
 Institution management should consider a number of issues regarding application-access control. Many of these issues could also apply to oversight of operating system access:
 
 ! Implementing a robust authentication method consistent with the criticality and sensitivity of the application. Historically, the majority of applications have relied solely on user IDs and passwords, but increasingly applications are using other forms of authentication. Multi-factor authentication, such as token and PKI-based systems coupled with a robust enrollment process, can reduce the potential for unauthorized access.
 ! Maintaining consistent processes for assigning new user access, changing existing user access, and promptly removing access to departing employees.
 ! Communicating and enforcing the responsibilities of programmers (including TSPs and vendors), security administrators, and business line owners for maintaining effective application-access control. Business line managers are responsible for the security and privacy of the information within their units. They are in the best position to judge the legitimate access needs of their area and should be held accountable for doing so. However, they require support in the form of adequate security capabilities provided by the programmers or vendor and adequate direction and support from security administrators.
 ! Monitoring existing access rights to applications to help ensure that users have the minimum access required for the current business need. Typically, business application owners must assume responsibility for determining the access rights assigned to their staff within the bounds of the AUP. Regardless of the process for assigning access, business application owners should periodically review and approve the application access assigned to their staff.
 ! Setting time-of-day or terminal limitations for some applications or for the more sensitive functions within an application. The nature of some applications requires limiting the location and number of workstations with access. These restrictions can support the implementation of tighter physical access controls.
 ! Logging access and events.
 ! Easing the administrative burden of managing access rights by utilizing software that supports group profiles. Some financial institutions manage access rights individually and it often leads to inappropriate access levels. By grouping employees with similar access requirements under a common access profile (e.g., tellers, loan operations, etc.), business application owners and security administrators can better assign and oversee access rights. For example, a teller performing a two-week rotation as a proof operator does not need year-round access to perform both jobs. With group profiles, security administrators can quickly reassign the employee from a teller profile to a proof operator profile. Note that group profiles are used only to manage access rights; accountability for system use is maintained through individuals being assigned their own unique identifiers and authenticators.

Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY -

We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

Chapter 9 - Assurance


9.1.2 Selecting Assurance Methods

The accrediting official makes the final decision about how much and what types of assurance are needed for a system. For this decision to be informed, it is derived from a review of security, such as a risk assessment or other study (e.g., certification), as deemed appropriate by the accrediting official.  The accrediting official needs to be in a position to analyze the pros and cons of the cost of assurance, the cost of controls, and the risks to the organization. At the end of the accreditation process, the accrediting official will be the one to accept the remaining risk. Thus, the selection of assurance methods should be coordinated with the accrediting official.

In selecting assurance methods, the need for assurance should be weighed against its cost. Assurance can be quite expensive, especially if extensive testing is done. Each method has strengths and weaknesses in terms of cost and what kind of assurance is actually being delivered. A combination of methods can often provide greater assurance, since no method is foolproof, and can be less costly than extensive testing.
 
The accrediting official is not the only arbiter of assurance. Other officials who use the system should also be consulted. (For example, a Production Manager who relies on a Supply System should provide input to the Supply Manager.) In addition, there may be constraints outside the accrediting official's control that also affect the selection of methods. For instance, some of the methods may unduly restrict competition in acquisitions of federal information processing resources or may be contrary to the organization's privacy policies. Certain assurance methods may be required by organizational policy or directive.

9.2 Planning and Assurance

Assurance planning should begin during the planning phase of the system life cycle, either for new systems or a system upgrades. Planning for assurance when planning for other system requirements makes sense. If a system is going to need extensive testing, it should be built to facilitate such testing.
Planning for assurance helps a manager make decisions about what kind of assurance will be cost-effective. If a manager waits until a system is built or bought to consider assurance, the number of ways to obtain assurance may be much smaller than if the manager had planned for it earlier, and the remaining assurance options may be more expensive.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  



Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated