R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

October 30, 2022

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Remote bank regulatory FFIEC IT audits - I am performing virtual/remote bank regality FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

OCC Announces Office of Financial Technology - The Office of the Comptroller of the Currency today announced it will establish an Office of Financial Technology early next year to bolster the agency’s expertise and ability to adapt to a rapidly changing banking landscape. www.occ.gov/news-issuances/news-releases/2022/nr-occ-2022-133.html

White House rallies industry support for Internet of Things labeling effort - White House officials convened industry leaders, policy experts and government leaders on Wednesday to discuss plans for security and privacy standards on connected devices. https://www.cyberscoop.com/white-house-iot-labeling-program/

CISA Encourages Orgs To Go Further Than MFA, Adopt FIDO Authentication - Enabling multi-factor authentication (MFA) is “the single most important thing Americans can do to stay safe online,” Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly wrote in a CISA blog post. https://healthitsecurity.com/news/cisa-encourages-orgs-to-go-further-than-mfa-adopt-fido-authentication

New TSA Directive Aims to Further Enhance Railway Cybersecurity - The Transportation Security Administration (TSA) has issued a new directive whose goal is to improve the cybersecurity of railroad operations in the United States. https://www.securityweek.com/new-tsa-directive-aims-further-enhance-railway-cybersecurity

IBM awards $5 million in grants to bolster cybersecurity in public schools - IBM on Monday announced the first eight recipients of the 2022 IBM Education Security Preparedness Grants, a package that totals $5 million to schools in six U.S. states, Ireland, and the United Arab Emirates. https://www.scmagazine.com/news/leadership/ibm-awards-5-million-in-grants-to-bolster-cybersecurity-in-public-schools

Commercial building owners fretting over cyber risk should check the fine print on their insurance - While many commercial building owners may believe their properties are covered from cybercrime through general commercial property insurance policies, security professionals are highlighting an urgent need to address that misconception and help owners qualify for cyber insurance. https://www.scmagazine.com/analysis/business-continuity/commercial-building-owners-fretting-over-cyber-risk-should-check-the-fine-print-on-their-insurance

CHIME urges FTC to hold health apps, data brokers accountable for illegal disclosures - The College of Healthcare Information Management Executives (CHIME) is urging the Federal Trade Commission to utilize its enforcement authority to hold third-party vendors responsible for the illegal disclosure of consumer health data, even if the act was unintentional. https://www.scmagazine.com/analysis/privacy/chime-urges-ftc-to-hold-health-apps-data-brokers-accountable-for-illegal-disclosures

CrowdStrike, Ernst & Young to offer cloud security and observability services - CrowdStrike and Ernst & Young on Tuesday announced that the companies have formed an alliance to deliver cloud security and observability services globally that will run on the CrowdStrike Falcon platform. https://www.scmagazine.com/news/cloud-security/crowdstrike-ernst-young-to-offer-cloud-security-and-observability-services

Experts on securing the public cloud - Cloud computing can have a transformative effect on the ability to deliver services at scale. But without the right safeguards in place, organizations can easily find themselves treading water when it comes to securing IT assets in the public cloud. https://www.scmagazine.com/resource/cloud-security/experts-on-securing-the-public-cloud

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Health insurer's infosec incident diagnosis goes from 'take a chill pill' to emergency ward - Australian health insurer Medibank has revealed it's been contacted by a group that claims to have its customers' data and is threatening to distribute it. https://www.theregister.com/2022/10/20/medibank_data_breach_worsens/

Cost of a health insurance security breach? NY watchdogs say it's $4.5m - Hundreds of thousands of people's sensitive info poorly protected - New York regulators continue turning the screws on organizations with slapdash computer security.
https://www.theregister.com/2022/10/19/eyemed_data_breach_settlement/
https://www.scmagazine.com/analysis/privacy/new-york-fines-eyemed-4-5-million-for-2020-email-hack-data-breach

Urgent alert warns Daixan ransomware group hit multiple healthcare providers - The Daixin ransomware group is actively, and successfully, targeting the healthcare sector in force, with multiple provider organizations facing extortion claims after falling victim to the actors’ tactics since June, according to an urgent joint alert from multiple federal agencies. https://www.scmagazine.com/analysis/ransomware/urgent-alert-warns-daixan-ransomware-group-hit-multiple-healthcare-providers

Hackers exploit critical VMware flaw to drop ransomware, miners - One Access to deliver various malware, including the RAR1Ransom tool that locks files in password-protected archives. https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-vmware-flaw-to-drop-ransomware-miners/

Outsourcer Interserve fined £4.4m for failing to stop cyber-attack - Britain’s data watchdog has fined the construction group Interserve £4.4m after a cyber-attack that enabled hackers to steal the personal and financial information of up to 113,000 employees. https://www.theguardian.com/business/2022/oct/24/outsourcer-interserve-fined-4-point-4m-cyber-attack-failings-data-breach-personal-information

Researchers uncover cryptojacking campaign targeting Docker, Kubernetes cloud servers - Researchers at CrowdStrike have discovered a new hacking campaign that targets cloud infrastructure around the world in service of a cryptojacking scheme. https://www.scmagazine.com/analysis/cloud-security/researchers-uncover-cryptojacking-campaign-targeting-docker-kubernetes-cloud-servers

Return to the top of the newsletter

WEB SITE COMPLIANCE - Risk Management of Outsourced Technology Services
    
    Due Diligence in Selecting a Service Provider - Contract Issues
    
    Dispute Resolution
    

    The institution should consider including in the contract a provision for a dispute resolution process that attempts to resolve problems in an expeditious manner as well as provide for continuation of services during the dispute resolution period.
    
    Indemnification
    

    Indemnification provisions generally require the financial institution to hold the service provider harmless from liability for the negligence of the institution, and vice versa. These provisions should be reviewed to reduce the likelihood of potential situations in which the institution may be liable for claims arising as a result of the negligence of the service provider.
    
    Limitation of Liability
    
    Some service provider standard contracts may contain clauses limiting the amount of liability that can be incurred by the service provider. If the institution is considering such a contract, consideration should be given to whether the damage limitation bears an adequate relationship to the amount of loss the financial institution might reasonably experience as a result of the service provider’s failure to perform its obligations.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
    
    
INTRUSION DETECTION AND RESPONSE
    
    Automated Intrusion Detection Systems
(IDS) (Part 3 of 4)
    
    
Some network IDS units allow the IP addresses associated with certain signatures to be automatically blocked. Financial institutions that use that capability run the risk of an attacker sending attack packets that falsely report the sending IP addresses as that of service providers and others that the institution needs to continue offering service, thereby creating a denial - of - service situation. To avoid such a situation, the institution also may implement a list of IP addresses that should not be blocked by the IDS.
    
    Hosts also use a signature-based method. One such method creates a hash of key binaries, and periodically compares a newly generated hash against the original hash. Any mismatch signals a change to the binary, a change that could be the result of an intrusion. Successful operation of this method involves protection of the original binaries from change or deletion, and protection of the host that compares the hashes. If attackers can substitute a new hash for the original, an attack may not be identified. Similarly, if an attacker can alter the host performing the comparison so that it will report no change in the hash, an attack may not be identified.
    
    An additional host-based signature method monitors the application program interfaces for unexpected or unwanted behavior, such as a Web server calling a command line interface.
    
    Attackers can defeat host-based IDS systems using loadable kernel modules, or LKMs. A LKM is software that attaches itself to the operating system kernel. From there, it can redirect and alter communications and processing. With the proper LKM, an attacker can force a comparison of hashes to always report a match and provide the same cryptographic fingerprint of a file, even after the source file was altered. LKMs can also hide the use of the application program interfaces. Detection of LKMs is extremely difficult and is typically done through another LKM.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

Chapter 20 -
ASSESSING AND MITIGATING THE RISKS TO A HYPOTHETICAL COMPUTER SYSTEM (HGA)

20.4.3 Protection Against Interruption of Operations  (1 of 2)

HGA's policies regarding continuity of operations are derived from requirements stated in OMB Circular A-130. HGA requires various organizations within it to develop contingency plans, test them annually, and establish appropriate administrative and operational procedures for supporting them. The plans must identify the facilities, equipment, supplies, procedures, and personnel needed to ensure reasonable continuity of operations under a broad range of adverse circumstances.

COG Contingency Planning

COG (Computer Operations Group) is responsible for developing and maintaining a contingency plan that sets forth the procedures and facilities to be used when physical plant failures, natural disasters, or major equipment malfunctions occur sufficient to disrupt the normal use of HGA's PCs, LAN, server, router, printers, and other associated equipment.

The plan prioritizes applications that rely on these resources, indicating those that should be suspended if available automated functions or capacities are temporarily degraded. COG personnel have identified system software and hardware components that are compatible with those used by two nearby agencies. HGA has signed an agreement with those agencies, whereby they have committed to reserving spare computational and storage capacities sufficient to support HGA's system-based operations for a few days during an emergency.

No communication devices or network interfaces may be connected to HGA's systems without written approval of the COG Manager. The COG staff is responsible for installing all known security-related software patches in a timely manner and for maintaining spare or redundant PCs, servers, storage devices, and LAN interfaces to ensure that at least 100 people can simultaneously perform word processing tasks at all times.

To protect against accidental corruption or loss of data, COG personnel back up the LAN server's disks onto magnetic tape every night and transport the tapes weekly to a sister agency for storage. HGA's policies also stipulate that all PC users are responsible for backing up weekly any significant data stored on their PC's local hard disks. For the past several years, COG has issued a yearly memorandum reminding PC users of this responsibility. COG also strongly encourages them to store significant data on the LAN server instead of on their PC's hard disk so that such data will be backed up automatically during COG's LAN server backups.

To prevent more limited computer equipment malfunctions from interrupting routine business operations; COG maintains an inventory of approximately ten fully equipped spare PC's, a spare LAN server, and several spare disk drives for the server. COG also keeps thousands of feet of LAN cable on hand. If a segment of the LAN cable that runs through the ceilings and walls of HGA's buildings fails or is accidentally severed, COG technicians will run temporary LAN cabling along the floors of hallways and offices, typically restoring service within a few hours for as long as needed until the cable failure is located and repaired.

To protect against PC virus contamination, HGA authorizes only System Administrators approved by the COG Manager to install licensed, Copyright 2015ed PC software packages that appear on the COG-approved list. PC software applications are generally installed only on the server. (These stipulations are part of an HGA assurance strategy that relies on the quality of the engineering practices of vendors to provide software that is adequately robust and trustworthy.) Only the COG Manager is authorized to add packages to the approved list. COG procedures also stipulate that every month System Administrators should run virus-detection and other security-configuration validation utilities on the server and, on a spot-check basis, on a number of PCs. If they find a virus, they must immediately notify the agency team that handles computer security incidents.

COG is also responsible for reviewing audit logs generated by the server, identifying audit records indicative of security violations, and reporting such indications to the Incident-Handling Team. The COG Manager assigns these duties to specific members of the staff and ensures that they are implemented as intended.

The COG Manager is responsible for assessing adverse circumstances and for providing recommendations to HGA's Director. Based on these and other sources of input, the Director will determine whether the circumstances are dire enough to merit activating various sets of procedures called for in the contingency plan.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.