R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

August 15, 2021

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
FYI - August 11, 2021 - The OCC, FDIC, and NCUA issues new guidance for risk management principles and practices that support a financial institution's authentication of (1) users accessing financial institution information systems, including employees, board members, third parties, and other systems, and (2) consumer and business customers accessing digital banking services.
https://www.occ.gov/news-issuances/bulletins/2021/bulletin-2021-36.html 
https://www.fdic.gov/news/news/financial/2011/fil11050.html
https://www.ncua.gov/Resources/Documents/LCU2011-09.pdf

‘Do something!’ Action bias causes risky, knee-jerk reactions to breaches - When a data security incident happens, never say “Never again!” according to Josiah Dykstra, technical fellow at the National Security Agency’s Cybersecurity Collaboration Center. https://www.scmagazine.com/analysis/black-hat/do-something-action-bias-causes-risky-knee-jerk-reactions-to-breaches

Will feds start to assess company risk of ransomware attacks? They’re at least asking questions - The federal government appears to be exploring options for assessing individual organizations or entire vertical sectors for vulnerability to potential ransomware attacks. https://www.scmagazine.com/analysis/black-hat/will-feds-start-to-assess-company-risk-of-ransomware-attacks-theyre-at-least-asking-questions

As Attackers Circle, Federal Agencies Fail to Improve Cybersecurity - Despite being the frequent target of nation-state and criminal actors, nearly every US government agency gets a "C" or "D" for data security, according to a new Senate report. https://www.darkreading.com/security-monitoring/as-attackers-circle-federal-agencies-fail-to-improve-cybersecurity

Protecting Water Infrastructure Against Cyberattacks - Like many critical infrastructure verticals, the water industry faces increased cybersecurity risks. Water is managed locally or privately depending on where you live, making it incredibly difficult to regulate and manage. https://www.threatlocker.com/blog/protecting-water-infrastructure-against-cyberattacks

Hackers netting average of nearly $10,000 for stolen network access - The single most expensive offering seen by researchers was being offered for about $95,000. A new report from a cybersecurity company has spotlighted the thriving market on the dark web for network access that nets cybercriminals thousands of dollars. https://www.zdnet.com/article/hackers-netting-average-of-nearly-10000-for-stolen-network-access/

ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Audit finds some former WA government staff still have systems access after termination - An audit of three state government entities found none were consistently meeting all the criteria of an effective and efficient staff exit management process, with access to premises and IT systems not cancelled within 24 hours of staff leaving or, in some cases, at all. https://www.zdnet.com/article/audit-finds-some-former-wa-government-staff-still-have-systems-access-after-termination/

Every company in new survey had at least one security incident in a public cloud environment - The expansion of AWS services has led to increased complexity, leading to 100% of companies surveyed for a report released Wednesday by Vectra having experienced at least one security incident in their public cloud environment. https://www.scmagazine.com/news/cloud-security/every-company-in-new-survey-had-at-least-one-security-incident-in-a-public-cloud-environment

Misconfigured Salesforce Communities expose sensitive data in the cloud - Researchers on Tuesday said they have discovered publicly accessible Salesforce Communities that are misconfigured and potentially expose sensitive information about companies, their operations, clients, and partners. https://www.scmagazine.com/news/cloud-security/misconfigured-salesforce-communities-expose-sensitive-data-in-the-cloud

Joplin: City Computer Shutdown Was Ransomware Attack - The insurer for Joplin paid $320,00 to an unknown person after a ransomware attack shut down the city’s government’s computer system last month, Joplin City Manager Nick Edwards said Thursday. https://www.securityweek.com/joplin-city-computer-shutdown-was-ransomware-attack

Saudi Aramco confirms data leak after $50 million cyber ransom demand - Saudi Aramco, the world’s largest oil producer, confirmed on Wednesday that some of its company files had been leaked via a contractor, after a cyber extortionist claimed to have seized troves of its data last month and demanded a $50 million ransom from the company. https://arstechnica.com/information-technology/2021/07/saudi-aramco-confirms-data-leak-after-50-million-cyber-ransom-demand/

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
   
   Legal and Reputational Risk Management 
   
   To protect banks against business, legal and reputation risk, e-banking services must be delivered on a consistent and timely basis in accordance with high customer expectations for constant and rapid availability and potentially high transaction demand. The bank must have the ability to deliver e-banking services to all end-users and be able to maintain such availability in all circumstances. Effective incident response mechanisms are also critical to minimize operational, legal and reputational risks arising from unexpected events, including internal and external attacks, that may affect the provision of e-banking systems and services. To meet customers' expectations, banks should therefore have effective capacity, business continuity and contingency planning. Banks should also develop appropriate incident response plans, including communication strategies, that ensure business continuity, control reputation risk and limit liability associated with disruptions in their e-banking services.


Return to the top of the newsletter

FFIEC IT SECURITY - e continue our series on the FFIEC interagency Information Security Booklet.  
 
 SECURITY CONTROLS - IMPLEMENTATION
 

 LOGICAL AND ADMINISTRATIVE ACCESS CONTROL 
 
 AUTHENTICATION
 

 Action Summary - Financial institutions should use effective authentication methods appropriate to the level of risk. Steps include

 
 1)  Selecting authentication mechanisms based on the risk associated with the particular application or services;
 2)  Considering whether multi - factor authentication is appropriate for each application, taking into account that multifactor authentication is increasingly necessary for many forms of electronic banking and electronic payment activities; and
 3)  Encrypting the transmission and storage of authenticators (e.g., passwords, PINs, digital certificates, and biometric templates).
 
 Authentication is the verification of identity by a system based on the presentation of unique credentials to that system. The unique credentials are in the form of something the user knows, something the user has, or something the user is. Those forms exist as shared secrets, tokens, or biometrics. More than one form can be used in any authentication process. Authentication that relies on more than one form is called multi - factor authentication and is generally stronger than any single authentication method. Authentication contributes to the confidentiality of data and the accountability of actions performed on the system by verifying the unique identity of the system user.
 
 Authentication is not identification as that term is used in the USA PATRIOT Act (31 U.S.C. 5318(l)). Authentication does not provide assurance that the initial identification of a system user is proper. Authentication only provides assurance that the user of the system is the same user that was initially identified. Procedures for the initial identification of a system user are beyond the scope of this booklet.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Chapter 16 - TECHNICAL CONTROLS - IDENTIFICATION AND AUTHENTICATION
  

  For most applications, trade-offs will have to be made among security, ease of use, and ease of administration, especially in modern networked environments.
  
  While it may appear that any of these means could provide strong authentication, there are problems associated with each. If people wanted to pretend to be someone else on a computer system, they can guess or learn that individual's password; they can also steal or fabricate tokens. Each method also has drawbacks for legitimate users and system administrators: users forget passwords and may lose tokens, and administrative overhead for keeping track of I&A data and tokens can be substantial. Biometric systems have significant technical, user acceptance, and cost problems as well.
  This section explains current I&A technologies and their benefits and drawbacks as they relate to the three means of authentication. Although some of the technologies make use of cryptography because it can significantly strengthen authentication, the explanations of cryptography appear in Chapter 19, rather than in this chapter.
  
  16.1 I&A Based on Something the User Knows
  
  The most common form of I&A is a user ID coupled with a password. This technique is based solely on something the user knows. There are other techniques besides conventional passwords that are based on knowledge, such as knowledge of a cryptographic key.
  
  16.1.1 Passwords
  

  In general, password systems work by requiring the user to enter a user ID and password (or pass phrase or personal identification number). The system compares the password to a previously stored password for that user ID. If there is a match, the user is authenticated and granted access.
  
  Benefits of Passwords. Passwords have been successfully providing security for computer systems for a long time. They are integrated into many operating systems, and users and system administrators are familiar with them. When properly managed in a controlled environment, they can provide effective security.

PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.