Guideline
on ICT Security for Scheduled Banks and Financial Institutions, Version-2 (April, 2010) published by the Central Bank of Bangladesh
[ From chapter-19 of the book "Information Technology in Banking" written by Abul Kashem Md. Shirin and Nusrat Tamanna Prianka and published by Institute of Bankers, Bangladesh (IBB) ]
1. Introduction:
The
banking industry has changed the way they provide services to their customers
and process information in recent years. Information and Communication
Technology (ICT) has brought about this momentous transformation. Security of
Information for a financial institution has therefore gained much importance,
and it is vital for us to ensure that the risks are properly identified and
managed.
Moreover,
information and information technology systems are essential assets for the
banks as well as for their customers and stakeholders. Information assets are
critical to the services provided by the banks to their customers. Protection
and maintenance of these assets are critical to the organizations’
sustainability. Banks must take the responsibility of protecting the
information from unauthorized access, modification, disclosure and destruction.
Bangladesh
Bank has prepared a Guideline for ICT Security for banks & FIs to be used
as a minimum requirement and as appropriate to the level of computerization of
their operations.
1.1 Scope
This
ICT Security Guideline is a systematic approach to policies required to be
formulated for ensuring security of information and information systems. This
Guideline covers all information that are electronically generated, received,
stored, printed, scanned, and typed. The provisions of this Guideline are
applicable for:
• Scheduled banks & FIs for all of their
Information Systems.
• All activities and operations required to ensure
data security including facility design, physical security, network security, disaster
recovery and business continuity planning, use of hardware and software, data
disposal, and protection of copyrights and other intellectual property rights.
1.2 Objectives
This
Guideline defines the minimum requirements to which each bank must adhere. The
primary objectives of the Guideline are:
• To establish a standard ICT Security Policy &
ICT Security Management
• To help the banks and FIs for secured and stable
setup of its ICT platform
• To establish a secured environment for the
processing of data
• To identify information security risks and their management
• To communicate the responsibilities for the
protection of information
• To prioritize information and information systems
those need to be protected
• To aware and train the users associated with
managing the ICT infrastructure
• To explain procedure for periodic review of the
policy and security measures
• To ensure the best practices (industry standard) of
the usage of ICT that is not limited to this guideline.
1.3 Categorization of
banks/branches/units depending on ICT Operation
The
locations for which the ICT Security Guideline is applicable i.e., the Head
Office, Zonal Office, Branch and/or Booth/Unit of a bank or FI may be
categorized into three tiers depending on their ICT setup and operational
environment/procedures as:
Tier‐1: Centralized
ICT Operation through Data Center (DC) including Disaster Recovery Site (DRS)
to which all other offices, branches and booths are connected through WAN with
24x7 hours attended operation.
Tier‐2: Head
Office, Zonal Office, Branch or booth having Server to which all or a part of
the computers of that locations are connected through LAN.
Tier‐3: Head
Office, Zonal Office, Branch or booth having standalone computer(s).
The ICT Security Guideline will be applicable for all
the three tiers if not mentioned otherwise.
2. ICT Security Management
ICT
Security Management must ensure that the ICT functions and operations are
efficiently and effectively managed. They should be aware of the capabilities
of ICT and be able to appreciate and recognize opportunities and risks of
possible abuses. They have to ensure maintenance
of appropriate systems documentations, particularly for systems, which support
financial reporting. They have to participate in ICT security planning
to ensure that resources are allocated consistent with business objectives.
They have to ensure that sufficient and qualified technical staffs are employed
so that continuance of the ICT operation area is unlikely to be seriously at
risk all times.
ICT
Security Management deals with ICT Security Policy Documentation, Internal
Information System Audit, Training and Insurance. ICT security planner and/or
steering committee shall be responsible for overall ICT security management.
2.1 ICT Security Policy
2.1.1
Every bank having
Information systems must have an ‘ICT Security Policy’ which must be fully
complied with this ICT Security Guideline and be approved by the board of the
bank. For foreign banks, the documents must also be in conformity with their
global policy documents. This document provides the guideline for Information
System and its secured usage for the banks. It establishes general requirements
and responsibilities for protecting Information and Information System. The policy
covers common technologies such as computers & peripherals, data and
network, web system, and other specialized ICT resources. The bank’s delivery
of services depends on availability, reliability and integrity of its
information technology system. Therefore, each bank must adopt appropriate
methods to protect its information system. The senior management of the bank
must express a commitment to ICT security by continuously increasing awareness
and ensuring training of the bank's staff. The policy will require regular
update to cope with the evolving changes in the ICT environment both within the
bank and overall industry.
2.1.2
For noncompliance
issues, compliance plan shall be submitted to Bangladesh Bank for dispensation
as per format given in Annexure 1.
2.2
Documentation
2.2.1
The following
shall be documented:
a) Organogram
chart for ICT department/division (centralized/decentralized)
b) Branch
organogram with the ICT support unit/section/personnel (Business/ICT)
c) Job
description (JD) for each individual within ICT department/division
d) A
scheduled roster for personnel doing shifting duties
e) Segregation
of duties for IT tasks
f) Fallback
plans for various levels of system support personnel
2.3
Internal
Information System Audit
2.3.1
Internal
Information System Audit shall be carried out by Internal Audit or relevant Department
(other than ICT Department).
2.3.2
Internal Audit
Team should have sufficient ICT expertise/resources capable of conducting
Information System Audit.
2.3.3
Internal
Information System audit shall be done periodically at least once a year. The
report must be preserved for Bangladesh Bank officials as and when required. An
annual system audit plan shall be developed. Banks shall also ensure that audit
issues are properly tracked and, in particular, completely recorded, adequately
followed up and satisfactorily rectified.
2.3.4
The bank/branch
shall take appropriate measures to address the recommendations made in the last
Audit Report. This must be documented and kept along with the Audit Report
mentioned in 2.3.3.
2.4
Training
and Awareness
2.4.1
Bank shall ensure
that all relevant personnel are getting proper training, education, updates and
awareness of the ICT security activities as relevant with their job function.
2.4.2
Bank shall also
ensure the minimum level of Business Foundation Training for ICT personnel.
2.5
Insurance
or Risk Coverage Fund
2.5.1
Adequate
insurance coverage or risk coverage fund shall be maintained so that costs of
loss and/or damage of the hardware assets related to ICT can be mitigated.
2.6
Problem
Management
2.6.1
Bank shall
establish a process to log the information system related problems and
incidents.
2.6.2
Process shall
have the workflow to assign the issue to a concerned person to get a quick,
effective and orderly response.
2.6.3
Process shall be
established to perform necessary corrective action within the time frame according
to the problem’s severity.
2.6.4
Problem findings
and action steps taken during the problem resolution process shall be
documented.
2.6.5
Process shall be
established to review and monitor the incidents.
2.7
Risk
Management
2.7.1
Effective risk
management system shall be in place for any new processes and systems as well
as a post‐launch review.
2.7.2
The risk
management function shall ensure awareness of, and compliance with, the ICT
security control policies, and to provide support for investigation of any ICT
related frauds and incidents.
2.7.3
The risk
management process shall include:
a) A
description and assessment of the risk being considered and accepted for
acknowledgement by the owner of the risk;
b) Identification
of mitigation controls;
c) Formulation
of a remedial plan to reduce the risk;
d) Approval
of the risk acknowledgement from the owner of the risk and senior management.
3. ICT Operation Management
ICT Operation Management covers the dynamics of
technology operation management including change management, asset management,
operating procedures and request management. The objective is to achieve the
highest levels of technology service quality by minimum operational risk.
3.1
Change
Management
3.1.1
Changes to
information processing facilities and systems shall be controlled.
3.1.2
All changes of
business application implemented in the production environment must be governed
by a formal documented process with necessary change details. A sample form has
been provided in Annexure 2.
3.1.3
Audit logs of
changes shall be maintained.
3.1.4
User Acceptance
Test (UAT) for changes and upgrades in application shall be carried out before
deployment. A sample form for UAT has been given in Annexure 3.
3.2
Asset
Management
3.2.1
Assets shall be
clearly identified and an inventory with significant details must be
maintained.
3.2.2
All assets
associated with the information facilities must be labeled with tag and name.
3.2.3
Asset inventory
must be reviewed at least once a year.
3.2.4
All data on
equipment and associated storage media must be destroyed or overwritten before
sale, disposal or reissue.
3.2.5
Bank must comply
with the terms of all software licenses and must not use any software that has
not been legally purchased or otherwise legitimately obtained.
3.2.6
Software used in
production environment must be subjected to a support agreement.
3.2.7
Software used in
any computer must be approved by the authority. Use of unauthorized or pirated
software must strictly be prohibited throughout the bank. Random checks shall
be carried out to ensure compliance.
3.3
Operating
Procedures
3.3.1
Operating procedures
shall be documented, maintained and available for the users related to their
job function.
3.3.2
Changes to
operating procedures must be approved by management and documented.
3.3.3
Operating
procedures shall cover the followings where appropriate:
a) Documentation
on handling of different processes;
b) Documentation
on scheduling processes, system start‐up, closedown, restart and recovery
(centralized/decentralized);
c) Documentation
on handling of exception conditions;
d) Schedule
system maintenance.
3.4
Request
Management
3.4.1
To avail any
service related to ICT, a formal request process must be established. A sample
form has been provided in Annexure‐4.
4. Physical
Security
Bank requires that sound business and management
practices be implemented in the workplace to ensure that information and technology
resources are properly protected. It is the responsibility of each department
to protect technology resources from unauthorized access in terms of both
physical hardware and data perspectives. In fact, the effective security
measure for assets in the workplace is a responsibility held jointly by both
management and employees. Physical security involves providing environmental
safeguards as well as controlling physical access to equipment and data. The
following safeguard methods are believed to be practical, reasonable and reflective
of sound business practices.
4.1
Physical
Security for Tier‐1
4.1.1
Data Center Access
4.1.1.1
Physical security
shall be applied to the information processing area or Data Center.
4.1.1.2
Data Center must
be a restricted area and unauthorized access shall be prohibited.
4.1.1.3
Entrance into the
Data Center shall be restricted.
4.1.1.4
Access
authorization procedures shall exist and be applied to all persons (e.g.
employees and vendors). Unauthorized individuals and cleaning crews must be
escorted during their stay in the Data Center.
4.1.1.5
Access
authorization list shall be maintained and reviewed periodically for the
authorized person to access the Data Center.
4.1.1.6
Access log with
date, time and purpose shall be maintained for the vendors, service providers
and visitors entered into the Data Center.
4.1.1.7
Security guard
shall be available for 24 hours.
4.1.1.8
Emergency exit
door shall be available.
4.1.2
Environmental Security
4.1.2.1
Protection of
Data Center from the risk of damage due to fire, flood, explosion and other
forms of disaster shall be designed and applied. To build Data Center and
Disaster Recovery Site in multi‐tenant facilitated building is discouraged.
4.1.2.2
Physical layout
of Data Center including power supply and network connectivity shall be
documented.
4.1.2.3
Development and
test environment shall be separated from production.
4.1.2.4
Raised floor with
removable blocks or channels alongside the wall shall be prepared to protect
data and power cables from interception and any sort of damages.
4.1.2.5
Water detection
devices shall be placed below the raised floor, if it is raised.
4.1.2.6
Any accessories
not related/associated to Data Center shall not be allowed to store in the Data
Center.
4.1.2.7
Closed Circuit
Television (CCTV) camera shall
be installed for monitoring.
4.1.2.8
The sign of "No eating, drinking or smoking" shall
be in display.
4.1.2.9
Dedicated office
vehicles for any of the emergencies shall always be available on site. Availing
of public transport must be avoided while carrying critical equipments outside
the bank’s premises to avoid the risk of any causality.
4.1.2.10
Data Center shall
have dedicated full‐time supported telephone communication.
4.1.2.11
Address and
telephone or mobile numbers of all contact persons (e.g. fire service, police
station, service providers, vendors and all ICT personnel) must be available to
cope with any emergency situation.
4.1.2.12
Power supply
system and other support units must be separated from production site and
placed in secure area to reduce the risks from environmental threats.
4.1.2.13
Power supply from
source (Main Distribution Board or Generator) to Data Center must be dedicated.
Electrical outlets from these power sources for any other devices must be
restricted and monitored to avoid the risk of overloading.
4.1.2.14
The following
environmental controls shall be installed:
a) Uninterrupted
Power Supply (UPS) with backup units
b) Backup
Power Supply
c) Temperature
and humidity measuring devices
d) Water
leakage precautions and water drainage system from Air Conditioner
e) Air
conditioners with backup units. Industry standard cooling system may be
introduced to avoid the water leakage and faults in the water drainage system
with the conventional air conditioning system.
f) Emergency
power cut‐off switches where applicable
g) Emergency
lighting arrangement
h) Dehumidifier
for humidity control
The above shall be regularly tested and maintenance
service contract shall be for 24x7 basis.
4.1.3
Fire Prevention
4.1.3.1
Wall, ceiling and
door of Data Center shall be fire‐resistant.
4.1.3.2
Fire suppression
equipments shall be installed.
4.1.3.3
Automatic fire
alarming system shall be installed and tested periodically.
4.1.3.4
There shall be
fire detector below the raised floor, if it is raised.
4.1.3.5
Electric and data
cables in the Data Center must maintain a quality and be concealed.
4.1.3.6
Any flammable
items shall not be kept in the Data Center.
4.2
Physical
Security for Tier‐2
4.2.1
Server Room Access
4.2.1.1
Server room must
have a glass enclosure with lock and key with a responsible person of the
Branch.
4.2.1.2
Physical access
shall be restricted, visitors log must exist and to be maintained for server
room.
4.2.1.3
Access
authorization list must be maintained and reviewed on regular basis.
4.2.2
Environmental Security
4.2.2.1
Server must have
password protected screen saver that shall be activated after a period as per
bank's policy.
4.2.2.2
There shall be a
provision to replace the server within shortest possible time in case of any
disaster.
4.2.2.3
Server room shall
be air‐conditioned.
4.2.2.4
Water leakage
precautions and water drainage system from Air Conditioner shall be installed.
4.2.2.5
Power generator
shall be in place to continue operations in case of power failure.
4.2.2.6
UPS shall be in
place to provide uninterrupted power supply to the server.
4.2.2.7
Proper attention
must be given on overloading electrical outlets with too many devices.
4.2.2.8
Channel alongside
the wall shall be prepared to allow all the cabling to be in neat and safe
position with the layout of power supply and data cables.
4.2.2.9
Proper earthing
of electricity shall be ensured.
4.2.2.10
Address and
telephone or mobile numbers of all contact persons (e.g. fire service, police
station, service providers, vendors and all ICT/responsible personnel) must be
available to cope with any emergency situation.
4.2.3
Fire Protection
4.2.3.1
Power supply must
be switched off before leaving the server room.
4.2.3.2
Fire extinguisher
shall be placed outdoor of the server room. This must be maintained and checked
on an annual basis.
4.3
Physical
Security for Tier‐3
4.3.1
Computer Room Access
4.3.1.1
The PC running
the branch banking software must be placed in a secured area and held by a
responsible person in the Branch.
4.3.1.2
Access
authorization list must be maintained and reviewed on a regular basis.
4.3.2
Environmental Security
4.3.2.1
PC must have
password‐protected screensaver which shall be activated after a period as per
bank's policy.
4.3.3
Fire Protection
4.3.3.1
Preventive
measures shall be taken to protect computer room from short circuits.
4.3.3.2
Power and other
connecting cables for PCs must be kept secured from physical damage.
4.3.3.3
Power supply of
the PC shall be switched off before leaving the branch.
4.3.3.4
Fire
extinguishers with expiry date shall be placed beside the power distribution
board. This must be maintained and checked on an annual basis.
4.3.3.5
Proper earthing
of electricity shall be ensured.
4.4
Physical Security for Desktop and Laptop Computers
4.4.1
Desktop computer
shall be connected to UPS to prevent damage of data and hardware.
4.4.2
Before leaving a
desktop or laptop computer unattended, users shall apply the "Lock
Workstation" feature.
4.4.3
Password
protected screen saver shall be used to protect desktop and laptop from
unauthorized access.
4.4.4
Laptop computers
that store confidential or sensitive information must have encryption
technology.
4.4.5
Desktop and
laptop computers and monitors shall be turned off at the end of each workday.
4.4.6
Laptop computers,
computer media and any other forms of removable storage (e.g. diskettes, CD
ROMs, zip disks, PDAs, flash drives) shall be stored in a secured location or
locked cabinet when not in use.
4.4.7
Other information
storage media containing confidential data such as paper, files, tapes, etc.
shall be stored in a secured location or locked cabinet when not in use.
4.4.8
Individual users
must not install or download software applications and/or executable files to
any desktop or laptop computer without prior authorization.
4.4.9
Desktop and
laptop computer users shall not write, compile, copy, knowingly propagate,
execute, or attempt to introduce any computer code designed to self‐replicate,
damage, or otherwise hinder the performance of any computer system (e.g. virus,
worm, Trojan etc).
4.4.10
Any kind of
viruses shall be reported immediately.
4.4.11
Viruses shall not
be deleted without expert assistance unless otherwise instructed.
4.4.12
User
identification (ID) and authentication (password) shall be required to access
all desktops and laptops whenever turned on or restarted.
4.4.13
Standard virus
detection software must be installed on all desktop and laptop computers and
shall be configured to check files when read and routinely scan the system for
viruses.
4.4.14
Desktop and
laptop computers shall be configured to log all significant computer security
relevant events. (e.g. password guessing, unauthorized access attempts or
modifications to applications or systems software.)
4.4.15
All computers
shall be placed above the floor level and away from windows.
5. Information Security Standard
The objective of this chapter is to specify
Information Security Policies and Standards to be adopted by all scheduled
banks in Bangladesh using Information and Communication Technology for service
delivery and data processing. This chapter covers the basic and general information
security controls applicable to all functional groups of a business to ensure
that information assets are protected against risk.
5.1
Access
Control for Information Systems
5.1.1
User ID
Maintenance
5.1.1.1
Each user must
have a unique User ID and a valid password.
5.1.1.2
User ID shall be
locked up after 3 unsuccessful login attempts.
5.1.1.3
User ID and
password shall not be same.
5.1.1.4
User ID
Maintenance form with access privileges shall be duly approved by the
appropriate authority.
5.1.1.5
Access privileges
shall be changed/ locked within 24 hours or as per bank's policy when users'
status changed or user left the bank.
5.1.2
Password Control
5.1.2.1
The password
definition parameters ensure that minimum password length is specified
according to the Bank's ICT Security Policy (at least 6 characters, combination
of uppercase, lowercase, numbers & may include special characters).
5.1.2.2
Administrative password
of Operating System, Database and Banking Application shall be kept in sealed
envelope and kept in a safe custody (centralized/decentralized).
5.1.2.3
The maximum
validity period of password shall not be beyond the number of days permitted in
the Bank's ICT Security Policy (within 30 to 90 days cycle).
5.1.2.4
The parameters to
control the maximum number of invalid logon attempts shall be specified
properly in the system according to the ICT Security Policy of the Bank
(maximum 3 consecutive times).
5.1.2.5
Password history
maintenance shall be enabled in the system to allow same passwords to be used
again after at least 4 times.
5.1.2.6
Session time‐out
period for users shall be set in accordance with the bank's Policy.
5.1.2.7
Operating time
schedule for the users shall be defined where necessary.
5.1.2.8
Audit trail shall
be available to review the user profile in the application.
5.1.3
Input
Control
5.1.3.1
Software shall
not allow the same user to be both maker and checker of the same transaction.
Management approval must be in place for delegation of authority.
5.1.3.2
Audit trail must
be clearly marked with User Id and date‐time stamp.
5.1.3.3
The system shall
be restricted from being accessed especially in sensitive data/fields.
5.2
Network
Security
5.2.1
The Network
Design and its security shall be implemented under a documented plan.
5.2.2
Physical security
for the network equipments shall be ensured. Specifically:
a) Access
shall be restricted and controlled.
b) Network
equipments shall be housed in a secure environment.
5.2.3
Groups of
information services, users, and information systems shall be segregated in
networks, e.g. VLAN.
5.2.4
Unauthorized
access and electronic tampering shall be controlled strictly.
5.2.5
Firewall shall be
in place on the network for any external connectivity.
5.2.6
Redundant
communication links shall be used for WAN.
5.2.7
There shall be a
system to detect unauthorized intruder in the network.
5.2.8
Connection of
personal laptop to office LAN or any personal wireless modem with the office
laptop/desktop must be secured.
5.3
Data
Encryption
5.3.1
Mechanism shall
be in place to encrypt and decrypt sensitive data travelling through WAN or
public network.
5.4
Virus
Protection
5.4.1
Anti‐virus
software shall be installed in each server and computer whether it is connected
to network or not.
5.4.2
Virus auto
protection mode shall be enabled.
5.4.3
Anti‐virus
software shall always be updated with the latest virus definition file.
5.4.4
All computers in
the network shall get updated signature of anti‐virus software automatically
from the server.
5.4.5
Bank may arrange
awareness program for the users about computer viruses and their prevention
mechanism.
5.5
Internet
and e‐mail
5.5.1
All Internet
connections shall be routed through a firewall for computers connected to
network and Anti‐Virus Gateway like Web‐Shield, Trend Micro etc. to get
protection from spam, worm, Trojan etc. that is accessing in bank's network
while browsing, downloading, or an attachment of any incoming mail to the PCs
connected to bank's network.
5.5.2
Access to e‐mail
system and internet shall only be obtained through official request.
5.5.3
E‐mail system and
internet shall be used according to the bank's policy.
5.5.4
Concerned
department shall perform regular review and monitoring of e‐mail service.
5.5.5
Users shall not
use profanities, obscenities, or derogatory remarks in email messages regarding
employees, customers, competitors, or others.
5.5.6
All attachments
with the incoming e‐mail messages shall be monitored especially for viruses.
5.5.7
Mail server must
have latest anti‐virus signature.
5.6
Transactions through Alternative Channels
5.6.1
Services through Mobile
Controls over mobile transaction are required to
manage the risks of working in an unprotected environment. Therefore, banks
shall establish following control procedures to ensure confidentiality, integrity,
authenticity and non‐reputability:
5.6.1.1
Security
standards shall be followed appropriate to the complexity of services offered.
5.6.1.2
Appropriate risk
mitigation measures shall be implemented like transaction limit, transaction
frequency limit, fraud checks, AML checks etc. depending on the risk
perception, unless otherwise mandated by the regulatory body.
5.6.1.3
Services provided
by banks through mobile shall comply with security principles and practices for
the authentication of transactions mandated by the regulatory body.
5.6.1.4
Proper level of
encryption and security shall be implemented at all stages of the transaction
processing. The following measures with respect to network and system security
shall be adhered to:
a) Implement
application level encryption over network and transport layer encryption
wherever possible.
b) Establish
proper firewalls, intrusion detection system (IDS), intrusion prevention system
(IPS), data file and system integrity checking, surveillance and incident
response procedures.
c) Conduct
periodic risk management analysis, security vulnerability assessment of the
application and network at least once a year.
5.6.1.5
Bank shall comply
with 'Regulatory Compliance' requirements of the country.
5.6.1.6
Proper
documentation of security practices, guidelines, methods and procedures used in
such mobile services shall be maintained and updated.
5.6.2
Internet
Banking
Information involved in internet banking passing over
public networks shall be protected from fraudulent activity, contract dispute,
and unauthorized disclosure and modification. Therefore, bank shall establish
following control procedures:
5.6.2.1
I‐banking
standards shall be included in the Bank's ICT Security Policy.
5.6.2.2
Network and
Database administrator shall ensure the security issues of I‐banking.
5.6.2.3
Bank shall
introduce logical access controls to data, systems, application software,
utilities, telecommunication lines, libraries, system software, etc. Logical
access control techniques may include user‐ids, passwords, smart cards,
biometric technologies or other industry standards.
5.6.2.4
Bank shall ensure
real time security log for unauthorized access.
5.6.2.5
Bank shall define
technology security protocols for I‐banking solutions like PKI (Public Key
Infrastructure), SSL (Secured Socket Layer), 2‐FA (Two Factor Authentication),
RSA, VASCO etc.
5.6.2.6
All computer
accesses, including messages received shall be logged. Security violations
(suspected or attempted) shall be reported and followed up. Bank shall acquire
tools for monitoring systems and the networks against intrusions and attacks.
5.6.2.7
The information
security officer, system auditor or any other concerned shall undertake
periodic penetration tests of the system, which may include:
a) Attempting
to guess passwords using password‐cracking tools.
b) Searching
for back door traps in the programs.
c) Attempting
to overload the system using DDoS (Distributed Denial of Service) & DoS
(Denial of Service) attacks.
d) Checking
of commonly known holes in the software, especially the browser and the e‐mail
software exist.
e) Checking
the weaknesses of the infrastructure.
f) Taking
control of ports.
g) Cause
application crash.
h) Injecting
malicious codes to application and database servers.
5.6.2.8
All applications
of bank shall have proper record keeping facilities for legal purposes. Bank
may keep all received and sent messages in restricted form.
5.6.2.9
Security
infrastructure shall properly be tested before using the systems and
applications for normal operations. Banks might upgrade the systems by
installing patches released by developers to remove bugs and loopholes, and
upgrade to newer versions which give better security and control.
5.6.3
Payment
Cards
Bank providing the payment card services must comply
with the industry security standards, e.g.‐ Payment Card Industry Data Security
Standard (PCI DSS) to ensure the security of cardholder's data. The PCI DSS
includes following requirements for security management, policies, procedures,
network architecture, software design and other protective measures:
5.6.3.1
PINs used in
transactions shall be processed using equipment and methodologies to ensure
that they are kept secured.
5.6.3.2
Cryptographic
keys used for PIN encryption/decryption and related key management shall be
created using processes to ensure that it is not possible to predict any key or
determine that certain keys are more probable than other keys.
5.6.3.3
Secret or private
Keys shall be conveyed or transmitted in a secured manner.
5.6.3.4
Unencrypted Key
loading to hosts and PIN entry devices shall be handled in a secured manner.
5.6.3.5
Randomized Keys
shall be used in a manner that prevents or detects their unauthorized usage.
5.6.3.6
Keys shall be
administered in a secured manner.
5.6.3.7
Equipment used to
process PINs and keys shall be managed in a secured manner.
6. Software Development and Acquisition
For any new application or function for the bank
requires analysis before acquisition or creation to ensure that business
requirements are met in an effective and efficient manner. This process covers
the definition of needs, consideration of alternative sources, review of technological
and economic feasibility, execution of risk analysis and cost‐benefit analysis
and conclusion of a final decision to 'make' or 'buy'.
6.1
In‐house
Software
6.1.1
Detailed design
and technical application requirements shall be prepared.
6.1.2
Criteria for
acceptance of the requirement shall be defined and approved by the concerned
business unit.
6.1.3
Application
security and availability requirements shall be addressed.
6.1.4
Developed
functionality in the application shall be in accordance with design
specification and documentation.
6.1.5
Source code must
be available with the concerned department and kept secured.
6.1.6
Source code shall
contain title area, the author, date of creation, last date of modification and
other relevant information.
6.1.7
Software
Development Life Cycle (SDLC) with User Acceptance Test (UAT) shall be followed
and conducted in the development and implementation stage.
6.1.8
System
documentation and User Manual shall be prepared and handed over to the
concerned department.
6.1.9
Necessary ‘Regulatory
Compliance’ requirements must be taken into account by the Bank.
6.2
Outsourced
Software
All the software procured and installed by the bank
shall have legal licenses and record of the same shall be maintained by the
respective unit/department of the Bank.
6.2.1
Vendor
Selection
6.2.1.1 There must be a core team comprising of personnel from
Functional Departments, IT Department and Internal Audit Department for vendor selection.
6.2.1.2 Vendor selection criteria for application must address
the following:
a) Market
presence
b) Years
in operation
c) Technology
alliances
d) Extent
of customization and work around solutions
e) Performance
& Scalability
f) Number
of installations
g) Existing
customer reference
h) Support
arrangement
6.2.2
Software
Documentation
6.2.2.1 Documentation of the software shall be available and
safely stored.
6.2.2.2 Document shall contain the followings:
a) Functionality
b) Security
features
c) Interface
requirements with other systems
d) System
Documentation
e) Installation
Manual
f) User
Manual
6.2.3
Other
Requirements
6.2.3.1
There shall have
a test environment to ensure the software functionalities before
implementation.
6.2.3.2
User Acceptance
Test shall be carried out and signed‐off before going live.
6.2.3.3
Necessary
‘Regulatory Compliance’ requirements for banking procedures and practices in
the application must be taken into account by the Bank.
6.2.3.4
Any bugs and/or
errors found due to design flaws, must be escalated to higher levels in
Software Vendors’ organization and bank, and must be addressed in time.
6.2.3.5
Support agreement
must be maintained with the provider for the software used in production with
the confidentiality agreement.
7. Business Continuity and Disaster Recovery Plan
Business Continuity Plan (BCP) is required to cover
operational risks and takes into account the potential for wide area disasters,
Data Center disasters and the recovery plan. The primary objective of BCP is to
enable a bank to survive a disaster and to re‐establish normal business
operations. In order to survive, bank shall assure that critical operations can
resume normal processing within a reasonable time frame. The contingency plan
shall cover the business resumption planning and disaster recovery planning. BCP
shall also address the backup, recovery and restore process. Keeping this into
consideration, this chapter covers Business Continuity Plan (BCP), Disaster
Recovery Plan (DRP) for centralized operation and Backup and Restore Plan (BRP)
for distributed operation.
7.1
Business
Continuity Plan (BCP)
7.1.1
Bank must have a
Business Continuity Plan addressing the recovery of disaster to continue its
operation.
7.1.2
Documents related
to BCP must be kept in a secured off‐site location. One copy shall be stored in
the office for ready reference.
7.1.3
BCP shall address
the followings:
a) Action
plan to restore business operations within the required time frame:
i) during
office hour's disaster,
ii) outside
office hour's disaster, and
iii) immediate
and long term plan.
b) Emergency
contacts, addresses and phone numbers including venders
c) Grab
list of items such as backup tapes, laptops, flash drives etc.
d) Disaster
recovery site map
7.1.4
BCP must be
tested and reviewed regularly to ensure the effectiveness.
7.2
Disaster
Recovery Plan (DRP)
7.2.1
A Disaster
Recovery Site (DRS) must be in place replicating the Data Center (Production
Site).
7.2.2
DR site must be
at a minimum of 10 kilometers (radius) of distance from the ‘production’ site.
7.2.3
DR site shall be
equipped with compatible hardware and telecommunication equipments to support
the critical services of the business operation in the event of a disaster.
7.2.4
Physical and
environmental security of the DR site shall be maintained.
7.2.5
Information
security shall be maintained properly throughout the recovery process.
7.2.6
An up‐to‐date and
tested copy of the DR plan shall be securely held offsite. DR plan shall exist
for all the critical services where DR requirement is approved by the business.
7.2.7
DR test shall be
carried out successfully at least once a year.
7.2.8
DR test documentation
shall include at a minimum:
a) Scope
b) Plan, and
c) Test Result.
7.3
Backup and
Restore Plan (BRP)
7.3.1
There shall be a
documented backup procedure.
7.3.2
Bank shall ensure
the safety and security of the backup copies of information from not being
damaged by natural calamities and theft (if possible to be sent at off‐site
location).
7.3.3
At least one copy
of backup shall be kept on‐site for the time critical delivery.
7.3.4
The backup shall
be done periodically considering the cycle of:
a) Weekly, b) Monthly, c) Yearly or as required by
regulatory authority.
7.3.5
The backup log
sheet shall be maintained, checked & signed by supervisor.
7.3.6
The backup
inventory shall be maintained, checked & signed by supervisor.
7.3.7
The ability to
restore from backup media shall be tested at least quarterly.
7.3.8
Backup media must
be labeled (soft/hard format) properly indicating contents, date etc.
8. Service Provider Management
8.1
Service
Level Agreement (SLA)
8.1.1
There shall be
Service Level Agreement between the vendor and bank.
8.1.2
The Annual
Maintenance Contract (AMC) with the vendor shall be active and currently
in‐force.
8.1.3
Bank shall ensure
that the equipment does not contain sensitive live data when hardware is taken
by the service provider for servicing/repairing.
8.1.4
Service contracts
with all service providers including third‐party vendors shall include:
a) Pricing
b) Measurable
service/deliverables
c) Timing/schedules
d) Confidentiality
clause
e) Contact
person names (on daily operations and relationship levels)
f) Roles
and responsibilities of contracting parties including an escalation matrix
g) Renewal
period
h) Modification
clause
i) Frequency
of service reporting
j) Termination
clause
k) Warranties,
including service suppliers’ employee liabilities, 3rd party
liabilities and the related remedies
l) Geographical
locations covered
m) Ownership
of hardware and software
n) Documentation
(e.g. logs of changes, records of reviewing event logs)
o) Right
to have information system audit conducted (internal or external).
8.2
Outsourcing
8.2.1
Outsourcing
activities shall be evaluated based on the following practices:
a) Objective
behind Outsourcing
b) Economic
viability
c) Risks
and security concerns.
8.2.2
Bank shall
develop a contingency plan for critical outsourced technology services to
protect them from unavailability of services due to unexpected problems of the
technology service provider. This may include termination plan and
identification of additional or alternate technology service providers for such
support and services.
8.3
Cross‐border
System Support
8.3.1
The bank shall
provide official authorization/assurance from the group ensuring the data
availability and continuation of services for any circumstances e.g. diplomacy
changes, natural disaster, relationship breakdown, discontinuity of services,
or others.
8.3.2
The Disaster
Recovery Site shall be multi‐layered in terms of physical location and
redundancy in connectivity.
Great post!!Thanks for sharing it with us....really needed.Ordering Checks from Printing Service Companies.There are plenty of personal printers and check printing suppliers online these days which can supply quick and secure customized checks. Personal or business checks don’t need to be created by your bank.Ordering Checks Online
উত্তরমুছুনThe "Guideline on ICT Security for Scheduled Banks and Financial Institutions, Version-2 (April, 2010)" from the Central Bank of Bangladesh is a vital resource for ensuring robust cybersecurity practices in the financial sector. This updated guideline offers comprehensive protocols to protect sensitive data and safeguard against emerging threats. By adhering to these standards, banks and financial institutions can enhance their security measures, build trust, and ensure compliance with best practices in ICT security.
উত্তরমুছুনSap Training In Dubai UAE
Elevate your career with our comprehensive SAP training in Dubai, UAE. Whether you're
a beginner or a seasoned professional, our courses are designed to provide you with
in-depth knowledge and practical skills in essential SAP modules. Led by experienced
industry experts, our training program ensures you receive hands-on experience and an
industry-recognized certification. Join us in Dubai to enhance your expertise, stay
ahead in your career, and become proficient in SAP.
https://softpro9.com/sap-training-in-dubai/
The "Guideline on ICT Security for Scheduled Banks and Financial Institutions, Version-2 (April, 2010)" by the Central Bank of Bangladesh is a crucial document for ensuring robust cybersecurity in the financial sector. It provides essential standards and practices for safeguarding sensitive information and maintaining system integrity. This guideline is a significant step in enhancing overall security and trust in banking operations. 🔒💼
উত্তরমুছুনSoftware Training Institutes in Bangalore
"Discover the top-notch software training institutes in Bangalore dedicated to honing your
expertise and empowering your career. Our institutes offer comprehensive courses and hands-on
training led by industry experts, ensuring you gain proficiency in the latest software
technologies. Elevate your skills in programming languages, software development, data
analytics, cybersecurity, and more. Join us to unlock a world of opportunities and propel
your career towards success. Enroll today and become a sought-after professional in the
dynamic realm of software technology."
https://myinstitutes.com/