Virtual/remote IT audits
- I am performing
virtual/remote FFIEC IT/AIO
audits for banks and credit unions.
I am a former
bank examiner with years of IT auditing experience.
Please contact R. Kinney Williams at
examiner@yennik.com from your bank's email and I will send you
information and fees. All correspondence is
confidential.
FYI - Japan draws a LINE: web giants
must reveal where they store user data - Looks a lot like a response
to messaging services passing data through China - Social media and
search engine operators in Japan will be required to specify the
countries in which users' data is physically stored, under a planned
tweak to local laws.
https://www.theregister.com/2021/12/16/japan_data_location_requirement/
Industrial cybersecurity requires unique skills. A new
apprenticeship program aims to hone them. - For all the effort
that’s been put into developing new generations of IT security
experts to help fill the cyber skills gap, there is still much work
to done when it comes to exposing up-and-coming infosec pros to the
kind of hybrid IT, OT and IoT environments that one would find in an
industrial or critical infrastructure setting.
https://www.scmagazine.com/analysis/careers/industrial-cybersecurity-requires-unique-skills-a-new-apprenticeship-program-aims-to-hone-them
CISA warns critical infrastructure to stay vigilant for ongoing
threats - The Cybersecurity and Infrastructure Security Agency
(CISA) warned critical infrastructure organizations today to
strengthen their cybersecurity defenses against potential and
ongoing threats.
https://www.bleepingcomputer.com/news/security/cisa-warns-critical-infrastructure-to-stay-vigilant-for-ongoing-threats/
How to address the risks of removable devices for remote workers - A
removable media policy dictates the acceptable use of USB flash
drives and other portable storage devices. When used in tandem with
USB restriction tools, these policies serve as a critical
administrative safeguard for mitigating the data security risks of
portable storage.
https://www.scmagazine.com/perspective/hardware-security/how-to-address-the-risks-of-removable-devices-for-remote-workers
Amid a digital banking boom, banks struggle to identify compliance
risks - Financial services institutions are beholden to a wide array
of regulatory rules. But in recent months, with an unprecedented
number of customers embracing digital access in the face of closed
limited-access branches, there are new threats and risks to consider
for customers.
https://www.scmagazine.com/analysis/compliance/amid-a-digital-banking-boom-banks-struggle-to-identify-compliance-risks
10 biggest healthcare data breaches of 2021 impact over 22.6M
patients - The biggest healthcare data breaches reported in 2021
each impacted more than 1 million patients, with more than 22.64
million patients affected overall.
https://www.scmagazine.com/feature/breach/10-biggest-healthcare-data-breaches-of-2021-impact-over-22-6m-patients
ATTACKS, INTRUSIONS, DATA THEFT & LOSS
FYI - Regional Cancer Care to pay $425K
to New Jersey over 2019 data breach, HIPAA violations - The New
Jersey Division of Consumer Affairs reached a settlement with
Regional Cancer Care Associates over a 2019 data breach that
impacted 105,200 patients.
https://www.scmagazine.com/analysis/breach/regional-cancer-care-to-pay-425k-to-new-jersey-over-2019-data-breach-hipaa-violations
Billion-dollar natural gas supplier Superior Plus hit with
ransomware - Superior Plus becomes the latest oil & gas company to
suffer from a ransomware attack after Colonial Pipeline - Major
natural gas supplier Superior Plus announced on Tuesday that it is
suffering from a ransomware attack.
https://www.zdnet.com/article/billion-dollar-natural-gas-supplier-superior-plus-hit-with-ransomware/
Western Digital tells its customers to update their My Cloud OS 5
NAS devices - Storage manufacturer Western Digital last week
notified its customers that they needed to upgrade to My Cloud OS 5
to access their network-attached storage (NAS) devices remotely.
https://www.scmagazine.com/news/cloud-security/western-digital-tells-its-customer-to-update-their-my-cloud-os-5-nas-devices
Belgian Defense Ministry confirms cyberattack through Log4j
exploitation - The Defense Ministry said it first discovered the
attack on Thursday. The Belgian Ministry of Defense has confirmed a
cyberattack on its networks that involved the Log4j vulnerability.
https://www.zdnet.com/article/belgian-defense-ministry-confirms-cyberattack-through-log4j-exploitation/
Cybersecurity company identifies months-long attack on US federal
commission - Both CISA and USCIRF refused to engage with the company
after being notified repeatedly of the attack.
https://www.zdnet.com/article/cybersecurity-company-identifies-months-long-attack-on-us-federal-commission/
Capital Region Medical Center reports system-wide network outage -
Although the cause has yet to be disclosed, Capital Region Medical
Center is currently experiencing a network telephone outage across
its systems affecting its telephone and computers, according to a
Friday social media post.
https://www.scmagazine.com/analysis/breach/capital-region-medical-center-reports-system-wide-network-outage
Return to the top
of the newsletter
WEB SITE COMPLIANCE -
We continue covering
some of the issues discussed in the "Risk Management Principles for
Electronic Banking" published by the Basel Committee on Bank
Supervision.
Board and Management Oversight
- Principle 11: Banks
should ensure that adequate information is provided on their
websites to allow potential customers to make an informed conclusion
about the bank's identity and regulatory status of the bank prior to
entering into e-banking transactions.
To minimize legal and reputational risk associated with
e-banking activities conducted both domestically and cross-border,
banks should ensure that adequate information is provided on their
websites to allow customers to make informed conclusions about the
identity and regulatory status of the bank before they enter into
e-banking transactions.
Examples of such information that a bank could provide on its
own website include:
1) The name of the bank and the location of its head office
(and local offices if applicable).
2) The identity of the primary bank supervisory authority(ies)
responsible for the supervision of the bank's head office.
3) How customers can contact the bank's customer service center
regarding service problems, complaints, suspected misuse of
accounts, etc.
4) How customers can access and use applicable Ombudsman or
consumer complaint schemes.
5) How customers can obtain access to information on applicable
national compensation or deposit insurance coverage and the level of
protection that they afford (or links to websites that provide such
information).
6) Other information that may be appropriate or required by
specific jurisdictions.
Return to
the top of the newsletter
FFIEC IT SECURITY -
We continue our series on the FFIEC
interagency Information Security Booklet.
SECURITY CONTROLS -
IMPLEMENTATION -
NETWORK ACCESS
Routing (Part 1 of 2)
Packets are moved through networks using routers, switches, and
hubs. The unique IP address is commonly used in routing. Since users
typically use text names instead of IP addresses for their
addressing, the user's software must obtain the numeric IP address
before sending the message. The IP addresses are obtained from the
Domain Naming System (DNS), a distributed database of text names
(e.g., anybank.com) and their associated IP addresses. For example,
financial institution customers might enter the URL of the Web site
in their Web browser. The user's browser queries the domain name
server for the IP associated with anybank.com. Once the IP is
obtained, the message is sent. Although the example depicts an
external address, DNS can also function on internal addresses.
A router directs where data packets will go based on a table that
links the destination IP address with the IP address of the next
machine that should receive the packet. Packets are forwarded from
router to router in that manner until they arrive at their
destination. Since the router reads the packet header and uses a
table for routing, logic can be included that provides an initial
means of access control by filtering the IP address and port
information contained in the message header. Simply put, the router
can refuse to forward, or forward to a quarantine or other
restricted area, any packets that contain IP addresses or ports that
the institution deems undesirable. Security policies should define
the filtering required by the router, including the type of access
permitted between sensitive source and destination IP addresses.
Network administrators implement these policies by configuring an
access configuration table, which creates a filtering router or a
basic firewall.
A switch directs the path a message will take within the network.
Switching works faster than IP routing because the switch only looks
at the network address for each message and directs the message to
the appropriate computer. Unlike routers, switches do not support
packet filtering. Switches, however, are designed to send messages
only to the device for which they were intended. The security
benefits from that design can be defeated and traffic through a
switch can be sniffed.
Return to the top of the newsletter
NATIONAL INSTITUTE OF STANDARDS
AND TECHNOLOGY -
We continue
the series on the National Institute of Standards and Technology
(NIST) Handbook.
Chapter 17 - LOGICAL ACCESS CONTROL
17.3.1.5 Security Labels
A security label is a designation assigned to a resource (such as
a file). Labels can be used for a variety of purposes, including
controlling access, specifying protective measures, or indicating
additional handling instructions. In many implementations, once this
designator has been set, it cannot be changed (except perhaps under
carefully controlled conditions that are subject to auditing).
When used for access control, labels are also assigned to user
sessions. Users are permitted to initiate sessions with specific
labels only. For example, a file bearing the label "Organization
Proprietary Information" would not be accessible (readable) except
during user sessions with the corresponding label. Moreover, only a
restricted set of users would be able to initiate such sessions. The
labels of the session and those of the files accessed during the
session are used, in turn, to label output from the session. This
ensures that information is uniformly protected throughout its life
on the system.
Data Categorization - One tool that is used to increase the
ease of security labeling is categorizing data by similar protection
requirements. For example, a label could be developed for
"organization proprietary data." This label would mark information
that can be disclosed only to the organization's employees. Another
label, "public data" could be used to mark information that is
available to anyone.
Labels are a very strong form of acacias control; however, they
are often inflexible and can be expensive to administer. Unlike
permission bits or access control lists, labels cannot ordinarily be
changed. Since labels are permanently linked to specific
information, data cannot be disclosed by a user copying information
and changing the access to that file so that the information is more
accessible than the original owner intended. By removing users'
ability to arbitrarily designate the accessibility of files they
own, opportunities for certain kinds of human errors and malicious
software problems are eliminated. In the example above, it would not
be possible to copy Organization Proprietary Information into a file
with a different label. This prevents inappropriate disclosure, but
can interfere with legitimate extraction of some information.
Labels are well suited for consistently and uniformly enforcing
access restrictions, although their administration and inflexibility
can be a significant deterrent to their use.
For systems with stringent security requirements (such as those
processing national security information), labels may be useful in
access control. |