IT Examiner School eBook

o Enhanced authentication for higher risk activities, such as external transfer of funds

o Re-authentication after period of inactivity

o Procedures to adjust authentication controls based on risk assessments

• Transaction risk

o Ability to detect, prevent, and respond to fraudulent or anomalous activity

o Ability to leverage location features for fraud detection

• Customer education

o Social engineering

o Phishing

o Anti-virus/malware

o Public Internet access

• Compliance and Legal risks

o BSA/AML compliance (recordkeeping, screening, and reporting requirements)

o Consumer and privacy disclosures

• Reputation risk

o Cyber threats

o Lack of availability

Control Test

Review the electronic banking risk assessment for compliance with the FFIEC Guidance on Authentication in an Internet Banking Environment (2005 and 2011).

Procedure 26

In addition to the electronic banking controls listed above, evaluate the adequacy of the following controls specific to mobile banking:

• On-device data security

o Customer education regarding the use of PINs or passwords on devices

o Controls to avoid retaining unnecessary sensitive information on devices

o Encryption of any sensitive information stored on devices

o Secure wiping of sensitive information from memory upon exiting the application

o Authentication when re-entering the application

InTREx Mapping

31

Tandem, LLC | Copyright © 2024

Confidential - Internal Use Only

Made with FlippingBook - Online magazine maker