IT Examiner School, Seaside, CA

This is the student handbook for the October 29-November 2, 2018 IT Examiner School held in Seaside, CA.

IT Examiner School Seaside, California October 29 ‐ November 2, 2018

ATTENDEES California Department of Business Oversight Delfino Aguilar

delfino.aguilar@dbo.ca.gov aileen.barlan‐gaspar@dbo.ca.gov marilyn.davis@dbo.ca.gov wilton.edwards@dbo.ca.gov john.fernandez@dbo.ca.gov linda.karim@dbo.ca.gov decarlton.kincy@dbo.ca.gov kevin.kwak@dbo.ca.gov curtis.leviton@dbo.ca.gov kyle.kim@dbo.ca.gov

415‐589‐0522 213‐576‐7510 916‐322‐4191 916‐903‐9122 916‐212‐6756 916‐767‐7883 213‐435‐4619 213‐435‐0467 213‐817‐2755 213‐435‐3829 415‐542‐6270 213‐247‐2647 213‐576‐7684 213‐760‐4252 916‐327‐8348 916‐324‐0279 619‐540‐6820 415‐263‐8518 213‐219‐7369 213‐797‐2635

Aileen Barlan‐Gaspar

Marilyn Davis Wilton Edwards John Fernandez

Linda Karim

Kyle Kim

Decarlton Kincy Kevin Kwak Curtis Leviton

Kerou Li Kevin Lin

kerou.li@dbo.ca.gov kevin.lin@dbo.ca.gov

Mehran Malekaghakhan Stephanie McClements

mehran.malekaghakhan@dbo.ca.gov stephanie.mcclements@dbo.ca.gov matthew.newman@dbo.ca.gov

Matt Newman Aman Pahwa Fernando Rico

aman.pahwa@dbo.ca.gov fernando.rico@dbo.ca.gov sean.sisser@dbo.ca.gov stacy.tang@dbo.ca.gov

Sean Sisser Stacy Tang

Daniel Yi

daniel.yi@dbo.ca.gov

Ohio Division of Financial Institutions JB Brooks

jb.brooks@com.state.oh.us

614‐728‐8400

Wyoming Division of Banking Jackie Kinstler

jackie.kinstler@wyo.gov

307‐777‐6481

INSTRUCTORS North Carolina Office of the Commissioner of Banks Henry Hallman Pennsylvania Department of Banking and Securities Chuck Martier cmartier@pa.gov ghallman@nccob.gov

919‐733‐3016

717‐783‐2251

Utah Department of Financial Institutions Bill Andrus CSBS EDUCATION FOUNDATION STAFF Kim Chancy

wandrus@utah.gov

801‐538‐8830

kchancy@csbs.org

202‐802‐9554

IT Examiner School Monterey, California October 29 – November 2, 2018

Monday, October 29 1:00 PM

Introduction and Welcome Bill Andrus, Henry Hallman, Chuck Martier

Technology/Network Overview Chuck Martier

2:00 PM

During this session, there will be a review of core IT infrastructure, key terms and IT systems risks. This session will provide an overview of networks and how information is protected. Additionally, key concepts will be learned for reviewing an entity’s network topology.

Break

3:15 PM 3:30 PM 4:30 PM

Technology/Network Overview Continued

Adjourn

Tuesday, October 30 8:30 AM

Technology/Network Overview Continued

Break

9:30 AM 9:40 AM

Disaster Recovery and Business Continuity Henry Hallman

Break

10:40 AM 10:50 AM

Audit Bill Andrus This module will cover key topics related to audits including risk assessment, schedule, scope, engagement and findings and resolution tracking.

Lunch

11:45 PM 1:00 PM 2:00 PM 2:15 PM

Audit Continued

Break

Support and Delivery Chuck Martier During this session, key concepts will be introduced regarding disaster recovery and business continuity planning and how to evaluate the adequacy of the program. In addition, a review of controls used to mitigate threats and vulnerabilities to a company’s operation security will be conducted.

Adjourn

4:30 PM

Wednesday, October 31 8:30 AM

Payment Systems and E-Banking (Wires) Henry Hallman

This module will provide an overview of the electronic funds transfers, ACH transactions and wires and potential risks and controls used to mitigate risks.

Break

9:30 AM 9:40 AM

Payment Systems and E-Banking continued (ACH) Henry Hallman

Break

10:50 AM 11:00 AM

Cybersecurity Incident Exercise Bill Andrus, Henry Hallman, Chuck Martier

Lunch

12:00 PM 1:00 PM

Management Chuck Martier

This session will provide key concepts with respect to laws and regulations including the Cybersecurity Assessment Tool, corporate account takeover, and identifying red flags. It also will focus on business decisions and their impact to IT

Break

2:30 PM 2:45 PM

IT Regulations and Guidance Bill Andrus, Henry Hallman, Chuck Martier

Adjourn

4:30 PM

Thursday, November 1 8:30 AM

Development and Acquisition Chuck Martier

Break

9:50 AM 10:00 AM

Outsourcing Technology Services (Vendor Management) Bill Andrus This session will review vendor management for outsourced IT activity and expected risk governance and due diligence. Developing Comments and Conclusions /Case Study Bill Andrus, Henry Hallman, Chuck Martier During this session, examiners will learn to develop comments and conclusions to be used in the Examination of Report. Break

11:00 AM 11:10 AM

Lunch

12:00 PM

Developing Comments and Conclusions /Case Study Continued During this session, examiners will learn to develop comments and conclusions to be used in the Examination of Report.

1:15 PM

Break

3:00 PM 3:15 PM 4:30 PM

Depository/Non-Depository Breakout

Adjourn

Friday, November 2 8:00 AM

Emerging Issues Bill Andrus, Henry Hallman, Chuck Martier This module will review emerging technologies that have been introduced and potential risks.

Course Summary and Key Takeaways Bill Andrus, Henry Hallman, Chuck Martier

10:00 AM

Adjourn

10:30 AM

CSBS Information Technology Examiner Course

Agenda

• Introduction • Course Objectives • Course Overview

• Importance of IT Examinations • Pre-Course Materials/Activities • Course Expectations • Course Materials • Course Ground Rules

Course Objectives

• Understand basic IT concepts and terminology

• Analyze an entity’s information security program

• Determine what risks may impact the entity

• Provide recommendations for improvement

• Develop conclusion

Course Overview

• Technology/Network Overview

• Develop Comments & Conclusions

• Conducting IT Examinations

• Emerging Technologies

IT Examination Importance

Pre-Course Activity

Course Expectations

Course “Rules”

• Some “ground rules”: – Please be prompt each morning – Please be prompt returning to class after breaks and lunch – Please silence your mobile devices – If you need to take a call, please step outside – If you need to text, please do so silently – Please be considerate of others while they are talking or asking a question

QUESTIONS?

Technology/Network Review

Objectives-Technology Review

• Discuss basic IT Infrastructure • Explore core systems

• Identify the risks associated with technology • Understand how data flows through a network • Review network topologies • Discuss network devices - what they do/how they function

Basic IT Infrastructure

• Core banking • Electronic funds transfer systems (EFTs) • E-banking • Imaging Systems • Wireless Systems/Devices

Core Systems

• Core (banking) systems - the critical systems that provide the basic account management features and information about customers and account holdings • Core systems are either in-house, serviced, or a combination of the two. • For depository institutions and trust companies: The term core processing generally refers to the general ledger, deposits, loans, and trust accounting systems.

Risks Associated with Core Systems

• Loss of support • Improper implementation of updates/releases • Password compromise • Successful social engineering to obtain access • Unauthorized physical access

Electronic Funds Transfer Systems (EFT)

• Automated Teller Machines (ATMs) • Automated Clearinghouse (ACH) Activities • Wire Transfer Systems • Person to Person; Business to Business • Messaging Systems

E-banking

Mobile Banking

Telephone Banking

Internet Banking

What is This????

Tech Bank Network Topology- MPLS

Remote dial- up connections

Connection to ATM Switch

Connection to Federal Reserve

Laptop

RAS Server

Laptop

Fedline Router

Hotspot

IDS

Fedline Advantage

Hotspot

Imaging ImageCapture

Server

MainOfficeLAN

Audit

LAN Server

IDS

Adm.

Internet

Core

PhoneBanking

IDS Hub

System

Tape UPS

Router

Router

BranchOfficeLAN

IPS

IDS

LeasedPhoneLine

Firewall

Switch Firewall

Hub

Web E-Mail E-banking Server Server Server

LAN Server

Hub

Hub

LoanApplicationServer

Backup

Laserprinter

Laserprinter

BranchWorkstations

Backup

LoanDept Workstations

Back Office Dept Workstations

Common Network Terminology • Packet – “frame” for containing all network traffic • Hub - echoes packets to all network segments (unintelligent) • Switch - forwards packets only to intended network segment (intelligent) • Router - routes packets between networks • Servers - computers providing network services – Applications, data, communications, etc.

Common Terminology (continued) • Firewall - filters and restricts packets

• Intrusion Detection/Prevention System (IDS/IPS) - Identifies unauthorized packets, may/may not stop packet • Multi-Protocol Label Switching (MPLS) - Allows various protocols to interoperate seamlessly within and between networks • Virtual Private Networks (VPNs)- creates a secure portal for remote user log-ins

Access Methods • PCs, laptops, mobile devices, etc.

• Remote log-in (e.g., IT Staff, Vendors, MSSP, etc.) • WAN connection - frame relay, leased/dedicated line, MPLS, etc. (across multiple FI sites) • Internet - from most anywhere by most anyone • World Wide Web- system of interlinked hypertext documents accessed via the Internet • Wireless - radio, infrared, WiFi, NFC, mobile, etc. • VPN - creates a secure portal

Time for a Video!!!

https://youtu.be/aeGN2WldqY4

Virtual Environment(s) aka VMs • Creating a virtual machine(s) aka “guests” that functions like a real computer • Run(s) on a “host” machine that manages the virtual environment(s) • Hypervisor (Virtual Machine Manager) is computer software that creates and operates virtual machine(s) • One to several virtual operating systems can run simultaneous on the host machine • Each operating system can run different applications without interfering with each other

Types of Virtual Environment(s) • Full Virtualization - almost complete simulation of the actual hardware to allow software to run unmodified • Partial Virtualization - some but not all of the target environment attributes are simulated. Some “guest” programs may require modifications to run in such environments • Storage Area Networks (SANs) - collection of computers and storage devices dedicated to store and protect data from across local and wide area networks How do businesses use VM? • Network Virtualization - combining available resources in a network by splitting the available bandwidth and channels • Storage Virtualization - pooling of physical storage from multiple network storage devices into what appears to be a single storage device, e.g. SAN(s) • Server Virtualization - using software to divide a physical server into multiple isolated virtual environments • Desktops Virtualization - essentially the same as server virtualization

10

The OSI Model Animation

https://www.youtube.com/watch?v=-6Uoku-M6oY

Common Types of Protocols • Transmission Control Protocol (TCP)

• Internet Protocol (IP) • Combination - TCP/IP • Hypertext Transfer Protocol (HTTP) • File Transfer Protocol (FTP) • Hypertext Transfer Protocol Secure (HTTPS)

Types of Firewalls

• What does a firewall do? – Restricts packets based on user defined rules – First line of defense, located at perimeter

• Types of Firewalls – Packet Filter – Stateful Inspection

– Application (Web application) – Next Generation (Next Gen)

What is a DMZ? • A DMZ is a computer network that sits between a trusted internal network, such as a corporate private LAN, and an untrusted external network, such as the public Internet. • Also know as a – Data Management Zone

– Demarcation Zone – Perimeter Network

What is a DMZ? https://www.youtube.com/watch?v=MEs4RRUrX_0

DMZ Considerations • DMZ – “De-Militarized Zone” – Necessary for any Internet Services Provided – Firewalls (at each end) – Hardened Servers

– Back Ups – Monitoring – Incident Response

Intrusion Detection/Prevention Systems (IDS/IPS) • Functions include: – Monitoring/analyzing users and system activity – Analyzing system configurations/vulnerabilities

– Assessing system and file integrity – Ability to recognize patterns of attack – Analysis of abnormal activity patterns – Tracking user policy violations

IDS/IPS (Cont.) • Host-based - Resides on “host” computers and only detects activity on that host • Network-based - Monitors network traffic on segments of the LAN • Must be maintained, monitored, and updated to be effective • IT Survey has this information

Network Security Assessments • Crucial to determining if networks are safe or have potential for compromise • Two key methods (discussed in Audit): – Network Vulnerability Assessment – Penetration Test • Network scanning (active): – Identify active “hosts” on a network (authorized) – Alerts when unauthorized device is detected

Malware/Virus • Malware:

– Program of file considered harmful – Gathers information w/out permission – Includes - viruses, worms, Trojan horses, etc. • Virus:

– Code that replicates by being copied – Active immediately or lay dormant – Could be harmless and/or destructive – If it replicates itself as email attachment - it is referred to as a Worm

Malware/Virus (cont.) • Trojan Horse: – Program in which malicious code is contained within apparently harmless data – Gains control of a device or system – Can cause a chosen form of damage – Redistributed as part of a computer virus • Bot: – Short for “robot” – Program that operates as an agent for someone else – Turns infected computers into “Zombies” – Allows a remote user to use “Zombies” to attack other computers

Malware/Virus (cont.) • Financial entities can use: – Single or multiple vendor solutions – All FI devices should have anti-malware software, which should be run on a “regular” basis – Workstation and server files should be backed up for

restoration, if current files get infected – Written policies and procedures for malware protection, scanning, and updating activities – Incident response in case of “infection”

VPN (example)

Technology State Bank Network Topology

Connection to ATMSwitch

Connection to Federal Reserve

Remote dial-up connections

Laptop

RAS Server

3rd Party Network Support

Laptop

Modem

ATM

Modem

IDS

FedLine

Laptop

Modem

Proof / Capture Imaging Server

Main Office LAN

Audit

VPN

LAN Server

IDS

Adm.

Internet

Phone Banking

Mainframe

IDS

Hub

VPN

UPS

Tape

VPN

VPN

Router

Router

Branch Office LAN

IDS

IDS

Leased Phone Line

Firewall

Switch

Firewall

Hub

LAN Server

Web Server

E-Mail Server

E-banking Server

Hub

Hub

Loan Application Server

Modem

Laser printer

Laser printer

Modem

Branch Workstations

Deposit Department Workstations

Loan Department Workstations

29

VPN • Provides security by use of “tunnel protocols” via encryption • Confidentiality if an attacker “sniffs” network traffic at packet level • Authentication to prevent unauthorized users from accessing the VPN

• Message integrity to detect any instances of tampering

• Process for scrambling a message or data – In transit – At rest • Prevents ability to view messages or data except by authorized users • Uses a defined set of “keys” to encrypt info • Some states require confidential information to be encrypted • FFIEC IT Security Handbook has section on encryption Encryption

Wireless • Current protocols (least to most secure)

– Wireless Equivalent Privacy (WEP) – Wireless Application Protocol (WAP) – Wi-Fi Protected Access (WPA) – Wi-Fi Protected Access 2 (WPA2)

• If a financial entity is using wireless, they should be using the most secure protocol

Benefits/Risks of Wireless Technology • Benefits: – Low cost – Ease of use – Widespread use • Risks:

– Unauthorized access to the network – Improper wireless configurations

System Monitoring • System monitoring should include:

– System usage, capacity, and performance – Data traffic - peak usage and type of traffic – Auditing tools, e.g. employee access and from where, and access denials

System Monitoring (cont.) • System monitoring should include:

– Security Information and Event Management (SIEM) - logging and event tool – File Integrity Monitoring – Vulnerability Management – Security Configuration Management - automates hardening of devices, etc. – IDS/IPS

Risks Associated with Technology

Unauthorized access is the #1 Risk

Key Examination Points • Determine the following: – Adequacy of network assessments – Administration of network security devices – Remote user access - employees and vendors – Where sensitive data is stored and how transported within the network – Protection of data when it moves or is stored in the network

Module Key Points • Institutions use IT to:

– Perform core processing – Conduct payment systems activities – Offer E-banking services – Provide support for internal users • IT examinations – consist of reviews of both technology & bank operations. • Networks require appropriate security – Virus/Malware/Spyware protection – Segregation of key segments, e.g. DMZ; Remote access, e.g. VPN, etc. – Data encryption as per risk assessment & data classification(s)

Module Key Points (cont.) • Vulnerability Assessments and Penetration Tests should be performed annually • Networks handle key functions within an FI – Used for daily IT activities, e.g., email, etc. – Store Customer/FI data, e.g. databases, etc. – Link FI with Core Processor – Provide access to various applications, e.g., word, excel, etc. • Topologies take many forms & some are more complex than others • If you need assistance, contact an IT Specialist

Business Continuity Planning, Disaster Recovery, and Pandemic Planning

Objectives

• Evaluate the adequacy of an institution’s Disaster Recovery and Business Continuity Planning (DR/BCP) processes.

• Discuss typical steps taken by management to develop an institution’s DR/BCP program

• Identify and discuss various testing methodologies.

• Discuss interconnectivity and interdependencies between involved parties.

• Discuss Pandemic and Incident Response Planning

Key Terms • Disaster Recovery Planning – (DRP)

• Business Continuity Planning – (BCP)

• Emergency Preparedness Planning

• Business Impact Analysis – (BIA)

• Recovery Time Objectives – (RTO)

• Recovery Point Objectives – (RPO)

DR and BC Program Functions Lifecycle

Executive Management Support

Compliance and Audit Oversight

Risk Assessment and BIA

Testing and Maintenance of the plan

Alignment of Objectives with RTOs and RPOs

Plan Customization and Implementations

Employee Training and Awareness

Business Continuity and Disaster Recovery Planning Steps

Create a framework for the plan

Conduct a Business Impact Analysis (BIA) and Risk Assessment

Identify risk management strategies

Conduct risk monitoring and testing

Administer the plan

Create a Framework

General Information

Detailed/Specific Information

• Details for declaring a disaster, including delegating authority • Business impact analysis, and risk assessment • Risk management strategies and plan administration

• Goals and objectives • Plan scope and assumptions • Disaster recovery team organization chart

• A BIA identifies the potential impact of business disruptions. It should: Conduct a Business Impact Analysis (BIA) and Risk Assessment

o Prioritize all business functions and operations, not just IT.

o Determine maximum downtime for each function (recovery time objectives), minimum levels of service, and maximum tolerable financial losses.

o Establish minimum frequency in which backups must be made (recovery point objectives).

• A BIA should be developed based on goals for recovery based on customer expectations and operational needs, not on how rapidly or slowly recovery would actually take place.

Risk Assessment Considerations

• Location in a flood plain, hurricane/tornado/earthquake- prone area.

• Proximity to critical infrastructure, including power and telecommunication sources, transportation hubs.

• Services provided by the institution.

Identify Risk Management Strategies

• Develop processes to minimize disruptions of service to the institution’s customers and operations.

• Provide employee training.

• Ensure plans and agreements are in place with vendors.

Risk Management Strategies to Minimize Service Disruptions

• Identify an alternative or back-up site and/or subscribe to a disaster recovery service

• Detail backup and off-site storage procedures

• List applications to be brought up in given timeframes

• Ensure that sufficient resources are available to meet the timeframes

• Identify procedures for how the institution will exchange information with service providers and third parties from the backup location

• Ensure that sufficient resources are available to meet the timeframes

Provide Employee Training

• Conduct employee training at enterprise-wide level and business unit level

• Teach all employees about responsibilities and procedures to follow during and after recovery

• Include periodic simulation exercises for key employees

• Ensure that training is regularly scheduled and updated to address operational changes

Vendor Agreements

• Review the vendor’s plan to ensure that critical services can be restored within acceptable timeframes

• Establish provisions that address the vendor’s responsibility for maintaining and testing plans

• Ensure that the institution has identified how to adjust internal procedures if the vendor invokes its plan

Conduct Risk Monitoring

Test the plans to ensure they are viable. Tests should:

• Be commensurate with system complexity and criticality

• Involve audit/independent review personnel

• Include appropriate institution personnel to ensure they are familiar with the disaster recovery procedures

• Be conducted at least annually or more often if significant changes occur

• Be reported to the Board and Senior Management

• Be sufficiently documented

Testing Strategies

• Staffing – Demonstrate staff’s ability to support business processes, communication, and reconciliation of transactions.

• Technology – Data, systems, applications, network, and telecommunications necessary for supporting business activities.

• Facilities – Environmental controls, workspace recovery, and physical security.

Testing Methods

• Tabletop Exercise/Structured Walk-Through Test

• Walk-Through Drill/Simulation Test

• Functional Drill/Parallel Test

• Full-Interruption/Full-Scale Test

Administer the Plan

As a result of risk monitoring, management should update their BIA, BCP, and DRP.

What other triggers would require the plan to be updated?

Pandemic Planning

• Two significant repercussions of a pandemic are:

– Greatly reduces the number of available personnel to perform tasks, and the potential that the personnel may not be sufficiently trained to maintain operations.

– Limitation of direct access to facilities due to quarantine or minimization of contact to prevent spread of illness.

• Guidance for bankers can be found in FIL-6-2008 Interagency Statement on Pandemic Planning Guidance for Minimizing a Pandemic’s Potential Adverse Effects .

Incident Response Plan - Procedures

At a minimum an incident response program should contain procedures for the following:

• Assess the nature and scope of an incident, identify what customer information systems and types of customer information have been accessed or misused.

• Notify primary Federal regulator.

• File Suspicious Activity Report ("SAR") as required.

• Take appropriate steps to contain and control the incident to prevent further unauthorized access.

• Notify customers when warranted.

Incident Response Plan - Components

Communication Paths – Employees and Customers

Senior Leadership Involvement

Responsibilities and Duties

Recovery Strategies: Critical Systems, Apps, and Data

Process to Classify, Log, and Track Incidents

Escalation Procedures

Response and Recovery

Address Incidents at Third-Parties

Periodic Testing

Tabletop Exercise!

1. What activities must be executed to resolve this incident? 2. Identify the roles/teams that will be involved during this incident? 3. Identify the plans and procedures that should be used during this incident? 4. What pieces of information are key to resolve this event? 5. Other concerns?

InTREx DR/BCP Procedures

InTREx DR/BCP Procedures (cont.)

InTREx DR/BCP Procedures (cont.)

InTREx DR/BCP Procedures (cont.)

Key Points

• The primary goals of disaster recovery and business continuity plans are to:

– Protect personnel and customers

– Minimize damage to resources

– Resume operations as quickly as possible in an orderly, preplanned manner

• Items identified as critical on the disaster recovery plan should be consistent with the BIA and risk assessment

Key Points (continued)

• To assess the adequacy and effectiveness of an institution's plan, assess:

Management Support

Risk Management Strategies

Business Impact Analysis

Risk Monitoring/Testing

Backup Location

Training

Update the Plan

Objectives

• Provide tools to assess the effectiveness of the IT Audit Program

• Types of IT Audits/Reviews

• IT Auditor Expertise

• IT Audit Component Rating

Audit/Independent Review

• Performed by independent personnel • Conducted by knowledgeable individuals • Based on risk assessment/complexity • Findings/recommendations are documented • Results are reported to the Board/Committee • Conducted separately or all at once • IT scope & frequency based on inherent or residual risk

FFIEC specifies that high risk areas should be audited/reviewed at least annually.

Assessment Areas for IT Audits

The following areas should be assessed for the IT Audit Program: • Audit risk assessment, plan and scope • Appropriate coverage of the entity’s IT environment and IT activities • Quality of written IT reports • Audit independence • IT auditor qualifications • IT findings and recommendations reporting and follow-up

Guidance for IT Audit

• FFIEC IT Examination Audit Handbook

• Federal Agency Rules and Regulations

– Interagency Policy Statement on the Internal Audit Function and its Outsourcing – Interagency Policy Statement on External Auditing Program of Banks and Savings Associations – Interagency Guidelines Establishing Standards for Safety and Soundness – Interagency Guidelines Establishing Information Security Standards (GLBA)

• Information Systems Audits and Control Association (ISACA)

IT Audit Engagement

• Should be engaged by and signed by an individual or committee that is not responsible for IT operations. – Preferably be signed by a member of the Board or Audit Committee.

• Expectations and responsibilities for both parties

• The scope, timeframes, and cost of work to be performed by the outside auditor

• Institution access to audit workpapers

Review the engagement letters for any current outsourced IT audits. Refer to the Interagency Policy Statement on the Internal Audit Function and its Outsourcing for provisions typically included in engagement letters.

IT Audit Risk Assessment and Scope

• Identifies the items/areas to be reviewed - consistent with risk assessment including risk level • Describes how the audit/review will be performed and tools to be used • Provides the timeframe for completing the audit/review

Firms may also provide an engagement letter specifying this information (including costs)

IT Audit Coverage

• IT General Controls • Information Security Program • Wire Transfers • ACH (controls and NACHA Compliance Audit) • Remote Deposit Capture

• Compliance with safeguarding customer information guidelines • Regulation GG/Unlawful Internet Gambling Enforcement Act * • Identity Theft Red Flags Program* • Penetration Testing and Vulnerability Assessment

*If applicable to the financial institution.

IT Audit Coverage

• Information Security, including compliance with the Interagency Guidelines Establishing Information Security Standards • Incident Response • Cybersecurity • Network Architecture, including firewalls and intrusion detection/prevention systems (IDS/IPS) • Security Monitoring, including logging practices

• Change Management • Patch Management • Third-party Outsourcing • Social Engineering

• Funds Transfer • Online Banking • Business Continuity Planning

Written IT Audit Reports

• Describe the scope and objectives • Identifies the deficiencies/weaknesses – Should be by significant issues • Suggests corrective action(s) • Include management’s response/timing for corrective action(s) • Provides information on prior audit findings – Identifies any repeat findings • Complies with the audit plan and schedule – Was this audit performed as scheduled?

Types of IT Audits

• Internal Audits/ Certifications • IT General Controls • Penetration Tests

• Vulnerability Assessments • Statement on Standards for Attestation Engagements (SSAE-18)

IT General Controls (ITGC)

The most common ITGCs: • Logical access controls over infrastructure, applications, and data • System development life cycle controls • Program change management controls • Data center physical controls • System and data back-up and recovery controls • Computer operation controls

ITGCs should be performed annually

Wire Transfer/ACH Audits

• These services are critical to many financial entities

• Usually included in with ITGC audit – Particularly in small to medium community banks, CUs, and MTs

• Can be a separate audit – Could occur in financial entities with significant wire/ACH activity (all sizes) – Usually in large community financial entities

Vulnerability Assessment vs Penetration Tests

High-level comparison:

• Vulnerability Assessments- identify where facilities or networks are at risk

• Penetration Tests- subject a network(s) to “real life” cyber events internally and externally

Both should be performed, at least, annually.

Note: Some audit firms refer to the above as internal and external network. *Refer to the scope of the test.

Vulnerability Assessments Testing:

• Requires specific skills/knowledge • Audit team tries to find weak points • Tools used simulate a variety of attacks • Results are used in Penetration Testing for potential exploitation Basic Vulnerability Assessment description: • Checking building windows and doors to see if they are secured • Checking if building is susceptible to other events, e.g. natural catastrophes

Vulnerability Assessment vs. Risk Assessment

• Cataloging assets and capabilities (resources) in a system • Assigning quantifiable value and importance to a resource • Identifying the vulnerability or potential threat(s) to each resource • Assist in mitigating or eliminating vulnerabilities for key resources

Entity will sometimes use vulnerability assessment to aid in completing the risk assessment process

Penetration Test (Pen Test)

Pen Test “tests” a system to find and exploit known vulnerabilities that an attacker could exploit

• Determine if there are weaknesses and if able to access system functionality and data • Are intrusive as actual “attack” tools are used • Require a high degree of skill to perform • Require management’s knowledge & consent • Pen Test report will describe any weaknesses as “high”, “medium” or “low”

Pen Test Strategies

• Targeted Testing - performed by the entity’s IT team and external testing team

• External Testing - targets externally visible servers or devices (seen by anybody on Internet) to see if they can get into internal systems and how far

• Internal Testing - mimics an insider attack by an authorized user with standard access privileges (what can happen with a disgruntled employee)

Pen Test Value

• Ascertain the likelihood of gaining system access • Likelihood of exploiting a low risk vulnerability to gain higher level access • Detecting vulnerabilities not easily found using standard system protective means • Measure of risk for a cyber attack • List of vulnerabilities needing patching • Ability of current security methods to detect or repel an attack • Additional efforts needed to protect the network(s)/system(s)

Service Organization Control (SOC) Reports

There are two types of Service Organization Control (SOC) Reports: • Type I – Describes the servicer’s descriptions of controls at a specific point in time – Auditor performs no testing of servicer’s controls- attesting to controls based on servicer’s account of controls- no opinion • Type II (preferred) – Includes information from a Type I Report – Detailed testing of the servicer’s controls over a minimum consecutive six month period – Auditor expresses an opinion based on their testing

Service Organization Control (SOC) Reports

Report Contents

Type I

Type II

(Information from SSAE 16.com)

Independent service auditor’s report (e.g. opinion)

Included

Included

Servicer organization’s description of system (including controls)

Included

Included

Information provided by the independent service auditor; includes a description of the service auditor’s tests of operating effectiveness and the results of those tests

Optional

Included

Other information provided by the service organization (e.g. glossary of terms)

Optional

Included

Statement on Standards for Attestation Engagements SSAE 18 • Statement on Standards for Attestation Engagements Number 18 (SSAE 18) – Replaced an earlier standard (SAS 70) and (SSAE 16)

• Authoritative guidance for service organizations as of May 2017

• International & US standard for reporting a service organization’s controls

• Financial entities should request an SSAE 18 from IT servicers as part of vendor management (in Management Module)

Audit Reporting/Follow-up

Similar to Safety & Soundness:

• IT Audit reporting channels- what is being reported and to whom

• Senior Management Responses- are they reasonable and corrective timeframe is appropriate

• Exception Tracking- show all IT audit findings, both Internal and External, and regulatory along with corrective action(s)

Auditor Independence & Qualifications Independence: • Whether or not there are conflicting duties, e.g. involved in auditing areas they have responsibilities or oversight • Auditor should be reporting to Board or Audit Committee • Whether or not the Auditor has a debt with the entity (may have some influence) Qualifications: • Type of IT experience and training – Some IT audits require specific skill sets • Current IT certifications the auditor maintains – Various known organizations, e.g. ISACA, Microsoft, Cisco, etc. provide specialized certificates and/or training • List of references from entities with similar IT activities

These qualifications provide some assurances, but don’t guarantee a quality audit

IT Audit Review

Audit Reports should have:

• Audit scope and objectives

• Pertinent areas for improvement based on results of testing

• Reasonable and appropriate recommendations

• Findings and observations consistent with your examination results

Audit Report Review

Signs of a questionable audit:

• Be wary of auditors who rely solely on checklists

• Using only regulatory workprograms is not an audit

• Absence or lack of workpapers could indicate a poorly performed audit – Especially if there are no workpapers showing how ITGCs were reviewed/tested

Audit Findings Tracking and Resolution

• A formal tracking system that assigns responsibility and target date for resolution • Timely and formal status reporting • Tracking and reporting of changes in target dates or proposed corrective actions to the Board or Audit Committee • Process to ensure findings are resolved • Independent validation to assess the effectiveness of corrective measures

Issues and corrective actions from internal audits and independent testing/assessments are formally tracked to ensure procedures and control lapses are resolved in a timely manner.

Auditor Interview

Areas to focus on with auditor interview (if still not satisfied with workpapers):

• Knowledge of the IT environment and risks • Understanding of systems they are reviewing

• Understanding of the basic controls (of these systems) • Verify training and/or certifications (as necessary)- certifications require specific training and number of hours/year (usually 40) • Why auditor used a checklist or FFIEC IT work-program and audit work didn’t fit entity’s activity

InTREx PROCEDURES

InTREx - Audit

InTREx – Audit

Compliance

What alternatives are available to management if compliance with audit schedule not achieved?

• Hire additional resources

• Contract for additional audit support

• Provide internal resources for the audit team – Knowledgeable individuals – Familiar with the area – Not involved in day-to-day activities Infrequent/poorly prepared/incomplete audit reports diminishes management’s ability for proper oversight of IT activities

Audit Component Rating

Areas to focus on when rating IT Audit component adequacy: • Independence and quality of oversight • Audit risk analysis methodology/resources applied to IT Audit • Scope, frequency, accuracy, and timeliness of audit reports • Extent of audit participation in SDLC to ensure effectiveness internal controls and audit trails • Audit plan in providing appropriate coverage of IT risks

Audit Component Rating

Areas to focus on when rating IT Audit component adequacy (cont.): • IT auditor’s adherence to code of ethics/professional standards • Qualifications of IT auditor and staff performing internal certifications • Timely and formal follow-up and reporting on management’s resolution of identified issues or weaknesses • Quality and effectiveness of internal and external audit activity related to IT controls

Conclusion

• Learned the basics for IT Audit and reviews • Minimum scope in risk focused examination process- must review the entity’s audit program • If audit program is deficient or lacking – Don’t need to dig deeper – Describe the deficiencies and record them in your WP – Notify the Safety & Soundness EIC • If audit program is satisfactory – Can risk focus areas recently audited

Support and Delivery

Information Security/Operations - Objective

Assess the effectiveness of an institution’s operations security and risk management practices

• Quality of processes and programs monitoring capacity and performance • Adequacy of data controls • Adequacy of controls and ability to monitor controls at service providers • Quality of physical and logical security • Adequacy of firewall and security connections

Information Security/IT Operations

IT Operations

Oversight and Support

 Adequacy of resources  Technology support  Employee Training  Problem Resolution

Information Security/IT Operations

IT Operations

Operational Risks and Controls  Monitoring tools o System problems/capacity o Error handling  Disposal of equipment/Media  Master file maintenance/changes  Supervisory reviews o Dual Controls o Separation of Duties

Information Security Security Monitoring

• Networks • Systems • Applications

Access

• Authorized and Unauthorized

Information Security

Detection/prevention • Removal of data/loss prevention • Unauthorized software/devices

Adequacy/frequency

• Vulnerability assessment • Penetration tests

Information Security Adequacy of managing

• Network security devices o Firewalls o IDS o VPN o Wireless – configuration/monitoring • Log monitoring programs o Automated tools – Security monitoring tools – Policy enforcement

– Reporting of exceptions (mgmt./committee/board)

Information Security Program Management

An effective information security program includes: • Risk identification • Risk measurement • Risk mitigation • Risk monitoring and reporting

Information Security - Risk Identification

• Threat - natural occurrence, technology or physical failure – Threat identification conducted in the risk assessment process • Vulnerabilities - a weakness in an information system, system security procedure, internal control, or implementation exploited by a threat source. • Supervision of Cybersecurity Risk and Resources for Cybersecurity Preparedness

Information Security - Risk Measurement

• Develop risk measurement processes that evaluate the inherent risks.

• Determine the risk associated with different threats.

• Measure the risks to guide recommendations for and use of mitigating controls.

Information Security - Risk Mitigation

• Policies and Procedures • Control Types/implementation • Inventory and Classification of Assets • User Security Controls • Physical Security • Change Management Within IT Environment • End-of-Life Management

• Application Security • Database Security • Encryption • Log Management • Malware Mitigation

Information Security – Policies and Procedures

Board approved Written Policies (Required by GLBA) • Address key areas such as personnel, physical and logical security, change management, strategic planning, and business continuity. • Depth and coverage of IT operations policies will vary based on institution size and complexity. Procedures describe the processes used to meet the requirements of the institution's IT policies. • Do not need to be formally Board approved. • Written for consistency and continuity. • Regularly updated as processes, systems, and threats change.

Layered Security

• Layered security , also known as layered defense , describes the practice of combining multiple mitigating security controls (preventive, detective, and corrective) to protect resources and data.

• The more layers of controls that exist, the better the protection against threats.

Controls

What are three common types of controls?

Technical (or Logical) Controls

Physical Controls

Administrative Controls

Technical Controls

Technical (or logical) controls involve hardware and application or OS software.

• Access controls/logical access controls, • System configuration/hardening standards (minimize the probability of exploitation of known or unknown vulnerabilities) • Firewalls • Anti-spyware/malware • Encryption

Physical Controls Protect against environmental, human, and systemic threats. • inventory logs • restricting access to areas or data Additional physical controls includes: • Implementing dual controls • Adequate redundancy for systems • Adequate distance between primary processing facility and the backup data and alternate processing facility. • Physical controls for controlling removable media.

Physical Controls

• Computer room o Access o Alarms o HVAC

o Sufficient UPS/Generators o Fire Suppression o Security cameras o Environmental Sensors • Telecommunication closet • Facilities

Administrative Controls

Support the classic management responsibilities of planning, directing, and organizing.

Organizational structure controls include: • Having separation/segregation of duties. • Implementing independent monitoring. • Having qualified personnel.

Control Applications

Different stages of control include:

• Preventative

• Detective

• Corrective

User Access Rights

• Process – add, delete, change access rights • Remove/restrict access (AD – Active Directory) • Periodic reviews/ re-approval based on changes (promotion, demotion, job function) • Assignment of user rights (based on Job Function) • Time of day/ day of week restrictions • Prohibit shared privileged access by multiple users • Authentication based on user profile • Logging/review of privileged access (administrator access)

Authentication Controls Passwords • Complexity • Expiration period • Re-use/history

• Failed login settings • Automatic timeout • Screen saver passwords • Reset procedures • Use of tokens/Biometric solutions

Corruption of Data

Virus/Malware detection practices • Frequency/scope of scans • Updates to detection applications

Automated tools to filter • Email • Web traffic

Separation of Duties

Principal concept of separation of duties?

Potential control mechanisms includes: • Principle of least privilege

• Rotation of duties

• Independent review

• Dual review

Training

• Must include ALL employees of the institution. • Must be conducted annually. • The institution should collect signed acknowledgments of the employee acceptable use policy.

Operational Controls and Processes • Monitoring tools - detect and preempt system problems or capacity issues • Daily processing issue resolution and appropriate escalation procedures • Secure handling, distribution, and disposal of equipment, media, and output (electronic and physical) • Independent review of master file input and file maintenance changes (e.g., new loan and deposit accounts, address changes, due dates) • Independent review of global parameter changes (e.g., interest rate for loans and deposits, fee structure, service charges)

Patch Management • Policies/procedures – Current and updated • Responsible party – Management /committee • Tests patches prior to implementation • Review vendor-supplied patches • Validation of system security configuration

Encryption Standards

Evaluate the institution’s use of encryption for sensitive institution and customer data

• At rest and/or in transit • Current industry standards • Updates and reviews by IT management

Item Processing Check processing • Controls over teller/branch imaging • Security over the capture, storage, and transmission of images • Controls over the destruction of source documents after being scanned • Dual control or independent review over the processing of reject, re-entry, and unposted items • Physical controls over negotiable items • Controls over cash letters (e.g., reconcilements, segregation of duties)

Remote Access

Authenticate, Monitor, & Control

• Disable remote communications • Controlling access • Implement control over configurations at both ends • Logging and monitoring all remote access communications. • Secure remote access devices. • Restrict remote access during specific times. • Limit the applications available for remote access. • Use robust authentication methods for access and encryption to secure communications.

System Configuration/ Access

• Configuration based on standards o Industry/vendor • Configuration standards approvals o Senior mgmt., committee, board • Disable unnecessary ports/services • Change/disable default passwords/accounts • Automated tools used to enforce secure configuration

Privileged/Admin Access

• “Skeleton Key”- all access key • Access to key functions such as add, delete, and change. • Control over employee rights and permissible activities. • Access to key controls such as auditing, logging, etc. that would record a cyber event • Permit “root” access which allows them to change operating system controls.

VOIP

• Physical / Logical controls • Patch management/ operating system updates • Network segmentation • Security testing

Made with FlippingBook - Online catalogs