Commercial E-Banking Risk Assessment & Controls Evaluation

The following e-banking risk assessment and controls evaluation is provided to assist commercial Internet banking users in identifying threats and measure the strength of their controls.

Online Banking

Username:
Password:
 

Commercial E-Banking Risk Assessment and Controls Evaluation

Purpose

The following e-banking risk assessment and controls evaluation is provided to assist commercial Internet banking users in identifying threats and measure the strength of their controls.

Risk Assessment Questions

For each question, select the answer that best represents your environment. Following the assessment, use the "Control Evaluation - Tips" to evaluate your environment.

Personnel Security:

  1. Are employees required to sign an Acceptable Use Policy (AUP)?
  2. Does each employee using Internet banking go through security awareness training?
  3. Do you run background checks on employees prior to hire?

Computer System Security:

  1. Do computer systems have up-to-date antivirus software?
  2. Is there a process in place to ensure software updates and patches are applied (e.g. Microsoft, web browser, Adobe products, etc.)?
  3. Do users run as local Administrators on their computer systems?
  4. Is a firewall in place to protect the network?
  5. Do you have an Intrusion Detection/Prevention System (IDS/IPS) in place to monitor and protect the network?
  6. Is Internet content filtering being used?
  7. Is e-mail SPAM filtering being used?
  8. Are users of the Internet banking system trained to manually lock their workstations when they leave them?
  9. Is wireless technology used on the network with the Internet banking system?

Physical Security:

  1. Are critical systems (including systems used to access Internet banking) located in a secure area?
  2. How are passwords protected?

Risk Rating

LOW
MEDIUM
HIGH
EXTREME

Note: this risk rating is designed to give a general idea of your risk posture based only on the answers in this questionnaire. Additional factors could either increase or decrease the risk.

Control Evaluation – Tips

Your answers indicate you have implemented this assessments recommended controls.

  1. Create an Acceptable Use Policy (AUP), if you don't already have one, and require your employees sign it at least annually. An Acceptable Use Policy (AUP) details the permitted user activities and consequences of noncompliance. Examples of elements included in an AUP are: purpose and scope of network activity; devices that can be used to access the network, bans on attempting to break into accounts, crack passwords, circumvent controls or disrupt services; expected user behavior; and consequences of noncompliance.

  2. Require each employee who uses Internet banking to go through security awareness training at least annually. Security Awareness Training (SAT) for Internet banking users, at a minimum, should include a review of the acceptable use policy, desktop security, log-on requirements, password administration guidelines, social engineering tactics, etc.

  3. Run background checks on all employees prior to hire. Companies should have a process to verify job application information on all new employees. The sensitivity of a particular position or job junction may warrant additional background and credit checks. After employment, companies should remain alert to changes in employees’ circumstances that could increase incentives for abuse or fraud.

  4. Ensure all computer systems have up-to-date antivirus software. Companies should maintain active and up-to-date antivirus protection provided by a reputable vendor. Schedule regular scans of your computer in addition to real-time scanning.

  5. Implement a process to ensure software updates and patches are applied frequently. This includes a computer’s operating system and other installed software (e.g. web browsers, Adobe Flash Player, Adobe Reader, Java, Microsoft Office, etc.). In many cases, it is best to automate software updates when the software supports it.

  6. Limit local Administrator privilege on computer systems where possible.

  7. Use firewalls on your local network to add another layer of protection for all the devices that connect through the firewall (e.g. PCs, smart phones, and tablets).

  8. Implement an Intrusion Detection/Prevention System (IDS/IPS) to protect your network. An IDS/IPS is used to monitor network/Internet traffic and report or respond to potential attacks.

  9. Restrict Internet traffic on the systems used for Internet banking activities. Filter web traffic to restrict potentially harmful or unwanted Internet sites from being accessed by computer systems. For "high risk" systems, it is best to limit Internet sites to only those business sites that are required.

  10. Implement an e-mail SPAM filter to help eliminate potentially harmful or unwanted e-mail messages from making it to end users' inboxes.

  11. Configure workstations to auto-lock after a period of inactivity along with training users to manually lock their work stations when they leave them. Systems should be locked (requiring a password to reconnect) when users walk away from their desks to prevent unauthorized access to the system.

  12. Secure wireless traffic using industry-approved encryption (e.g. WPA). Wireless networks are considered public networks because they use radio waves to communicate. Radio waves are not confined to specific areas and are easily intercepted by unauthorized individuals. Therefore, if wireless is used, security controls such as encryption, authentication, and segregation are necessary to ensure confidentiality and integrity.

  13. Locate critical systems (including systems used to access Internet banking) in a secure area. Only allow approved employees access to the critical systems.

  14. Ensure passwords are securely stored and kept confidential. Passwords should never be left out for unauthorized individuals to gain access.

© CoNetrix