0 ratings0% found this document useful (0 votes) 1K views89 pagesBSP Circular 808
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
BANGKO SENTRAL NG PILIPINAS
OFFICE OF THE GOVERNOR
CIRCULAR NO. 808°
Series of 2013
Subject: Guidelines on Information Technology Risk Management for All Banks and
Other BSP Supervised Institutions
The Monetary Board, in its Resolution No. 1286 dated 01 August 2013, approved the
amendments to Sections X176 and X705 of the Manual of Regulations for Banks (MORB) to
enhance the guidelines on information technology risk management.
Section 1. Technology Risk Management. §X176 and the related Appendix 75 of the Manual
of Regulations for Banks (MORB) are hereby amended to read as follows:
§X176. Information Technology Risk Management (ITRM). The enhanced guidelines on
ITRM keep abreast with the aggressive and widespread adoption of technology in the
financial service industry and consequently strengthen existing BSP framework for IT risk
supervision. ITRM should be considered a component and integrated with the institutions’
risk management program. The guidelines likewise provide practical plans to address risks
associated with emerging trends in technology and growing concerns on cyber security.
§X176.1 Declaration of Policy. A growing number of BSP supervised institutions (BSIs)
employ the advances in technology as leverage to offer innovative products, deliver fast
and efficient service at affordable prices, and venture to new markets. Moreover,
technology drives the efficiency of operations and financial accounting of these
institutions, and improves their decision-making process. As technology becomes an
integral part of the business and operations of BSis, such technology usage and
dependence, if not properly managed, may heighten technology risks. The BSP expects
BSis to have the knowledge and skills necessary to understand and effectively manage
technology risks. These institutions are required to have an integrated approach to risk
management to identify, measure, monitor and control risks.
§X176.2 Purpose and Scope. The enhanced guidelines aim to provide guidance in
managing risks associated with use of technology. The guidelines outlined in this
Circular are based on international standards and recognized principles of international
practice for ITRM and shall serve as BSP’s baseline requirement for all BSIs.
The guidelines shall apply to BSIs which include banks, non-banks with quasi-banking
function (NBQB), non-bank electronic money issuers and other non-bank institutions
which under existing BSP rules and regulations and special laws are subject to BSP
supervision and/or regulation. Moreover, subject guidelines shall also apply to BSIs with
offshore data processing as may be appropriate to their situation. The framework covers
different facets of ITRM, some of which are supplemented with detailed guidelines
the attached Appendices. The BSP shall keep the Appendices updated and, in the future,issue additional regulations on new and emerging products, services, d
and other significant applications of technology.
ry channels,
Subject guidelines (including the attached Appendices) are not “one-size-fits-all” and
implementation of these need to be risk-based and commensurate with size, nature and
types of products and services and complexity of IT operations of the individual BSIs.
BSIs shall exercise sound judgment in determining applicable provisions relevant to their
risk profile.
§X176.3 Complexity of IT Risk Profile. The BSP shall risk profile all BSis and classify
them as either “Complex” or “Simple”. The assessment of complexity of IT risk profile is
based largely on the degree of adoption of technology and considers size, nature and
types of products and services and complexity of IT operations among the risk factors. In
assessing IT operations, the nature of IT organization, degree of automation of core
processes and applications and extent and reach of online branch network are Ii
considered.
A.BSI with “Complex” IT risk profile is highly dependent on technology. IT components
are integral to the core business activities that major weaknesses on IT systems,
maintenance and support, if not properly addressed, may cause operational
inefficiencies, business disruptions and/or financial losses. On the other hand, a BSI with
“Simple” IT risk profile relies or depends less on technology in the operations of its
business, thus, is not affected or lowly impacted by IT-related risks.
However, to facilitate classification, a thrift, rural or cooperative bank shall be deemed
as a simple BSI, while universal and commercial banks, which generally have more
complex types of products and services, shall be deemed as complex BSis. Nonetheless,
a universal or commercial bank may apply with the BSP for a reclassification as simple
BSI in order to avail of reduced compliance with the provisions of subject Circular. The
BSP may likewise declare a thrift, rural or cooperative bank as complex based on the
assessment of the BSIs IT profile report (pursuant to Subsection X176.8) and other
internal supervisory tools. Said banks shall receive notification in writing from the BSP
informing them of the deviation from the default classification and the basis for
classifying them as complex BSIs.
Non-bank institutions which under existing BSP rules and regulations and special laws
are subject to BSP supervision/regulation shall likewise be notified in writing of their
classification immediately upon effectivity of this Circular.
§X176.4 IT Rating System. The BSP, in the course of its on-site examination activities,
shall evaluate BSIs’ ITRM system and measure the results based on BSP’s IT rating
system. A composite rating is assigned based on a “1” to “4” numerical scale, as follows:
4 | BSis with this rating exhibit strong performance in every respect. Noted
weaknesses in IT are minor in nature and can be easily corrected during the
normal course of business.
3 _ | BSis with this rating exhibit satisfactory performance but may demonstrate
modest weaknesses in operating performance, monitoring, management
_| processes or system development.
Page 2 of 152] B5is with this rating exhibit less than satisfactory performance and require |
considerable degree of supervision due to a combination of weaknesses that
may range from moderate to severe.
meanings:
1 | BSls with this rating exhibit deficient IT environment that may impair the
future viability of the entity, thereby requiring immediate remedial action.
The detailed guidelines covering the BSP’s IT Rating System shall be issued separately.
§X176.5 Definition of Terms. In these guidelines, terms are used with the following
Terminology
Definitions
Board of Directors
(Board)
The governing body elected by the stockholders that
exercises the corporate powers of a locally incorporated BSI.
In case of 4 BSI incorporated or established outside the
Philippines, this may refer to the functional oversight |
equivalent such as the Country Head (for foreign banks) or
management committee or body empowered with
oversight and supervision responsibilities.
Cyberfraud
Electronic Products
and Services
‘A deliberate act of omission or commission by any person
carried out using the Internet and/or other electronic
channels, in order to communicate false or fraudulent
representations to prospective victims, to conduct
fraudulent transactions, or to transmit the proceeds of
fraud to financial institutions connected with the
perpetrator. Examples of cyberfraud in the financial
industry may include, but are not limited to, theft of credit
card data, computer hacking, electronic identity theft,
phishing scams, ATM skimming and non-delivery of
merchandise purchased online, among others.
The delivery of banking and financial products and services
through electronic, interactive communication channels
which include automated teller machines (ATMs), point of
sale (POS) terminals, internet, mobile phones, touch tone
telephones and other similar electronic devices. These
encompass electronic banking, electronic payments,
electronic money and other electronic products and services
offered by BSIs.
EMV (stands for
Europay, MasterCard
and Visa)
It is a global standard for credit, debit and prepaid payment
cards based on chip card technology. EMV chip-based
payment cards, also known as smart cards, contain an
‘embedded microprocessor, a type of small computer. The
microprocessor chip contains the information needed to use
the card for payment, and is protected by various security
features. Chip cards are a more secure alternative to
traditional magnetic stripe payment cards.
Encryption
A data security technique used to protect information from
unauthorized inspection or alteration. Information _is
Page 3 of 15,Terminology
Definitions
encoded so that data appears as meaningless string of
letters and symbols during delivery or transmission. Upon
receipt, the information is decoded using an encryption key.
Enterprise-wide Level
Extending throughout or involving an entire institution
rather than a single business department or function. In this
document, the words “enterprise-wide” and “organization-
wide” are interchangeably used.
Information Assets/
Resources
| {including computing hardware, network infrastructure,
Encompass people and organization, IT processes, physical
infrastructure , equipment), IT infrastructure
middleware) and other enterprise architecture components
(including information, applications).
Information Security
The protection of information assets from unauthorized
access, use, disclosure, disruption modification or
destruction in order to provide confidentiality, integrity and
availability,
Information Security
Assingle or a series of unwanted or unexpected information
Incident security events that have a significant probability of
compromising business operations and threatening the
confidentiality, integrity or availability of BSI's information
or information systems _
Information ‘Automated means of originating, processing, storing and
Technology (IT)
communicating information and covers recording devices,
communications network, computer systems (including
hardware and software components and data) and other
electronic devices.
IT Group/Department
The unit of an organization within a BSI responsible for the
activities of IT operations control, monitoring of IT services,
infrastructure support and a combination of technology,
people and processes.
IT Operations
Encompasses all processes and services that are provisioned
by an IT Unit to internal and external clients.
IT Outsourcing
IT Risk
‘An arrangement under which another party (either an
affiliated entity within a corporate group or an entity
external to the corporate group) undertakes to provide to a
BSI all or part of an IT function or service. A BSI would use IT
outsourcing for functions ranging from infrastructure to
software development, maintenance and support. The
related IT service is integral to the provision by BSI of a
financial service and the BSI is dependent on the service on
an ongoing basis.
‘Any potential adverse outcome, damage, loss, violation,
jlure or disruption associated with the use of or reliance
on computer hardware, software, devices, systems,
applications and networks.
IT Strategic Plan
‘A long-term plan (i.e,, three- to five-year horizon) in which
Page 4 of 15Terminology Definitions
| business and IT management cooperatively describe how IT
resources will contribute to the institution’s strategic
objectives. J
TT Risk Management | Risk management system that enables a BSI to identify,
System (ITRMS)__| measure, monitor and control IT-related risks
Management ‘A general term for the computer systems in an institution
Information System | that provide information about its business operations.
(Mis) |
Network [Two or more computer systems that are grouped together
to share information, software and hardware.
| Offshore sis Have their critical system processing and data located
outside of the Philippines. These are usually maintained and
operated by organizations within the same business group
that the BSIs belong to, such as their head office, subsidiary
and/or affiliate. Locally-maintained systems, if any, are
limited to non-core supporting applications such as
_| collaboration systems and report processing tools.
Project Management _| Planning, monitoring and controlling an activity.
‘Senior Management/ | Officers of the institution given the authority by the Board
Management to implement the policies it has laid down in the conduct of
the business of the institution.
Service Level Establishes mutual expectations and provide a baseline to
Agreement | measure IT performance. An SLA should contain, among
others, the specified level of service, support options,
enforcement or penalty provisions for services not
provided, a guaranteed level of system performance as it |
relates to downtime or uptime, a specified level of customer
support and what software or hardware will be provided
and for what fee.
Triple Data Encryption | A mode of the DES encryption algorithm that encrypts data
Standard (3DES) _| three times. Three 64-bit keys are used, instead of one, for
an overall key length of 192 bits (the first encryption is
encrypted with second key, and the resulting cipher text is |
again encrypted with a third key). 7 |
§X176.6 Description of IT-Related Risks. As BSIs increase their reliance on IT to deliver,
products and services, inappropriate usage of IT resources may have significant risk
exposures. While IT does not trigger new types of risks, it brings in new dimensions to
traditional banking risks (i.e. strategic risk, credit risk, market risk, liquidity risk and
‘operational risk) that require new or enhanced control acti
risk measurement application is an IT failure and, therefore, a systems failure in the
sense of operational risk). Moreover, IT is an implied part of any system of internal
controls, regardless of the type of risk and, consequently, forms an important element
organization-wide risk management. Among the risks associated with the use of IT are
the following:
Page 5 of 15,1. Operational risk is the risk to earnings and capital arising from problems with service
or product delivery. This risk is a function of internal controls, IT systems, employee
integrity and operating processes. Operational risk exists in all products and services;
2. Strategic risk is the risk to earnings and capital arising from adverse business
decisions on IT-related investments or improper implementation of those decisions.
The risk is a function of the compatibility of an organization's strategic goals, the
business strategies developed to achieve those goals, the resources deployed against
these goals and the quality of implementation. The resources needed to carry out
business strategies are both tangible and intangible which include communication
channels, operating systems, delivery networks and managerial capacities and
capabilities;
3. Reputation risk is the risk to earnings and capital arising from negative public
opinion. This affects the institution's ability to establish new relationships or services
or continue servicing existing relationships. The risk can expose the institution to
litigation, financial loss or damage to its reputation; and
4. Compliance risk is the risk to earnings and capital arising from the violations of, or
non-conformance with laws, rules and regulations, prescribed practices or ethical
standards. Compliance risk also arises in situations where the laws and rules
governing certain products activities of the BSI’s clients may be ambiguous or
untested. Compliance risk exposes the institution to monetary penalties, non-
monetary sanctions and possibility of contracts being annulled or declared
unenforceable.
§X176.7 IT Risk Management System (ITRMS). As BSIs become more dependent on IT
systems and processes, technology risks and information security issues have become
progressively more complex and pressing in recent years. Information security is just as
portant as the new technologies being installed by BSIs. As progress in technology
shifts to higher gear, the trend in cyber-attacks, intrusions, and other form of incidents
‘on computer systems shows that it will not only persist but will continue to increase
frequency and spread in magnitude.
Management of IT risks and information security issues becomes a necessity and an
important part of BSIs’ risk management system. BSIs are therefore required to establish
a robust ITRM system covering four (4) key components: 1.) IT governance, 2.) risk
identification and assessment, 3.) IT controls implementation, and 4.) risk measurement
and monitoring.
1. IT Governance. This is an integral part of BSIs’ governance framework and consists
of the leadership and organizational structures and processes that ensure the
alignment of IT strategic plan with BSIs’ business strategy, optimization of resources
management, IT value delivery, performance measurement and the effective and
efficient use of IT to achieve business objectives and effective IT risk management
implementation. BSIs must establish an effective IT governance framework covering
the following:
Page 6 of 15‘a. Oversight and Organization of IT Functions. Accountability is a key concern of IT
governance and this can be obtained with an organizational structure that has
well-defined roles for the responsibility of information, business processes,
applications, IT infrastructure, etc.
The Board of Directors is ultimately responsible for understanding the IT risks
confronted by a BSI and ensuring that they are properly managed, whereas the
Senior Management is accountable for designing and implementing the ITRMS
approved by the Board. For Complex BSIs, the Board may delegate to an IT
Steering Committee (ITSC) or its equivalent IT oversight function to cohesively
monitor IT performance and institute appropriate actions to ensure achievement
of desired results. The ITSC, at a minimum, should have as members a non-
executive Board director who oversees the institution’s IT function, the head of
IT group/department, and the highest rank officer who oversees the business
user groups. The head of control groups should participate in ITSC meetings in
advisory capacity only.
‘A charter should be ratified by the Board to clearly define the roles and
responsibilities of the ITSC. Formal minutes of meeting should be m: ed to
document its discussions and decisions. The ITSC should regularly provide
adequate information to the Board regarding IT performance, status of major IT
projects or other significant issues to enable the Board to make well-informed
decisions about the BSIs’ IT operations.
BSis should develop an IT strategic plan that is aligned with the institution’s
business strategy. This should be undertaken to manage and direct all IT
resources in line with the business strategy and priorities. IT strategic plan
should focus on long term goals covering three to five year horizon and should be
sufficiently supplemented by tactical IT plans which specify concise objectives,
action plans and tasks that are understood and accepted by both business and IT.
The IT strategic plan should be formally documented, endorsed by the Board and
communicated to all stakeholders. It should be reviewed and updated regularly
for new risks or opportunities to maximize the value of IT to the institution.
BSIs should also create an organization of IT functions that will effectively deliver
IT services to business units. For “Complex” BSIs, a full-time IT Head or equivalent
rank should be designated to take the lead in key IT initiatives and oversee the
effectiveness of the IT organization. In addition to managing the delivery of day-
to-day IT services, the IT Head should also oversee the IT budget and maint:
responsibility for performance management, IT acquisition oversight,
professional development and training. The IT Head should be a member of
executive management with direct involvement in key decisions for the BSI and
usually reports directly to the President or Chief Executive Officer.
A clear description of roles and responsibilities for individual IT functions should
be documented and approved by the Board. Proper segregation of duties within
and among the various IT functions should be implemented to reduce the
possibility for an individual to compromise a critical process. A mechanism
should be in place to ensure that personnel are performing only the functions
Page 7 of 15relevant to their respective jobs and positions. In the event that an institution
finds it difficult to segregate certain IT control responsibilities, it should put in
place adequate compensating controls (e.g. peer reviews) to mitigate the
associated risks.
|. IT Policies, Procedures and Standards. IT controls, policies, and procedures are
the foundation of IT governance structure. It helps articulate the rules and
procedures for making IT decisions, and helps to set, attain, and monitor IT
objectives.
BSIs should adopt and enforce IT-related policies and procedures that are well-
defined and frequently communicated to establish and delineate duties and
responsibilities of personnel for better coordination, effective and consistent
performance of tasks, and quicker training of new employees. Management
should ensure that policies, procedures, and systems are current and well-
documented. The ITSC should review IT policies, procedures, and standards at
least on an annual basis. Any updates and changes should be clearly
documented and properly approved. IT policies and procedures should include at
least the following areas:
* IT Governance/Management;
Development and Acquisition;
© IT Operations;
‘© Communication networks;
‘© Information security;
Electronic Banking/Electronic Products and Services; and
IT Outsourcing / Vendor Management,
For simple BSis, some of the above areas (i.e. development, electronic banking,
etc.) may not be applicable, thus sound judgment should be employed to ensure
that the BS!'s IT policies and procedures have adequately covered all applicable
areas.
IT Audit. Audit plays a key role in assisting the Board in the discharge of its
corporate governance responsibilities by performing an independent assessment
of technology risk management process and IT controls.
Auditors provide an assurance that important control mechanisms are in place
for detecting deficiencies and managing risks in the implementation of IT. They
should be qualified to assess the specific risks that arise from specific uses of IT.
BSis should establish effective audit programs that cover IT risk exposures
throughout the organization, risk-focused, promote sound IT controls, ensure the
timely resolution of audit deficiencies and periodic reporting to the Board on the
effectiveness of institution’s IT risk management, internal controls, and IT
governance. Regardless of size and complexity, the IT audit program should
cover the following:
* Independence of the IT audit function and its reporting relationship to the
Board or its Audit Committee;
Page 8 of 15a.
Expertise and size of the audit staff relative to the IT environment;
Identification of the IT audit universe, risk assessment, scope, and frequency
of IT audits;
Processes in place to ensure timely tracking and resolution of reported
weaknesses; and
© Documentation of IT audits, including work papers, audit reports, and follow-
up.
In case in-house IT audit expertise is not available, such as for a simple BSI, the IT
audit support may be performed by external specialists and auditors of other
institutions consistent with existing BSP rules and regulations on outsourcing.
{Detailed guidelines/standards on IT Audit are shown in Appendix 75a)
Staff Competence and Training. The rapid development in technology demands
appropriate, skilled personnel to remain competent and meet the required level
of expertise on an ongoing basis.
BSIs should have an effective IT human resources management plan that meets
the requirements for IT and the business lines it supports. Management should
allocate sufficient resources to hire and train employees to ensure that they have
the expertise necessary to perform their job and achieve organizational goals and
objectives.
Management needs to ensure that staffing levels are sufficient to handle present
and expected work demands, and to cater reasonably for staff turnover.
Appropriate succession and transition strategies for key officers and personnel
should be in place to provide for a smooth transition in the event of turnover in
vital IT management or operations functions.
Management Information Systems (MIS). The BSls’ IT organization often
provides an important support role for their MIS. Accurate and timely MIS
reports are an essential component of prudent and reasonable business
decisions. At the most senior levels, MIS provides the data and information to
help the Board and management make strategic decisions. At other levels, MIS
allows management to monitor the institution's activities and distribute
information to other employees, customers, and members of management.
Advances in technology have increased the volume of information available to
management and directors for planning and decision-making. However, if
technology is not properly managed, the potential for inaccurate reporting and
flawed decision making increases. Because report generation systems can rely on
manual data entry or extract data from many different financial and transaction
systems, management should establish appropriate control procedures to ensure
information is correct, relevant, and adequately protected. Since MIS can
originate from multiple equipment platforms and systems, the controls should
ensure all information systems have sufficient and appropriate controls to
maintain the integrity of the information and the processing environment. Sound
fundamental principles for MIS review include proper internal controls, operating
procedures, safeguards, and audit coverage.
Page 9 of 15IT Risk Management Function. Management of risk is a cornerstone of IT
Governance. BSis should have a policy requiring the conduct of identification,
measurement, monitoring and controlling of IT risks for each business
function/service on a periodic basis. BSIs should define and assign these critical
roles to a risk management unit or to 2 group of persons from different units
collectively performing the tasks defined for this function.
The function should have a formal technology risk acknowledgement and
acceptance process by the owner of risk to help facilitate the process of
reviewing, evaluating and approving any major incidents of non-compliance with
IT control policies. The process can be supported by the following
© a description of risk being considered for acknowledgement by owner of risk
and an assessment of the risk that is being accepted;
© identification of mitigating controls;
formulation of a remedial plan to reduce risk; and
* approval of risk acknowledgement from the owner of the risk and senior
management.
ITRM processes should be integrated into the enterprise-wide risk management
processes to allow BSIs to make well-informed decisions involving business plans
and strategies, risk responses, risk tolerance levels and capital management,
among others.
2. Risk Identification and Assessment. BSIs should maintain a risk assessment process
that drives response selection and controls implementation. An effective IT
assessment process begins with the identification of the current and prospective IT
risk exposures arising from the institution's IT environment and related processes.
The assessments should identify all information assets, any foreseeable internal and
external threats to these assets, the likelihood of the threats, and the adequacy of
existing controls to mitigate the identified risks. Management should continually
compare its risk exposure to the value of its business activities to determine
acceptable risk levels.
Once management understands the institution’s IT environment and analyzes the
risk, it should rank the risks and prioritize its response. The probability of occurrence
and the magnitude of impact provide the foundation for reducing risk exposures or
establishing mitigating controls for safe, sound, and efficient IT operations
appropriate to the complexity of the organization. Periodic risk assessment process
should be done at the enterprise-wide level and an effective monitoring program for
the risk mitigation activities should be manifested through mitigation or corrective
action plans, assignment of responsibilities and accountability and management
reporting.
3. IT Controls Implementation. Controls comprise of policies, procedures, practices and
organizational structures designed to provide reasonable assurance that business
objectives will be achieved and undesired events will be mitigated. Management
should establish an adequate and effective system of internal controls based on the
Page 10 of 15,degree of exposure and the potential risk of loss arising from the use of IT. Controls
for iT environment generally should address the overall integrity of the environment
and should include clear and measurable performance goals, the allocation of
specific responsibilities for key project implementation, and independent
mechanisms that will both measure risks and minimize excessive risk-taking. BSI
Management should implement satisfactory control practices that address the
following as part of its overall IT risk mitigation strategy: 1) Information security; 2)
Project management/development and acquisition and change management; 3) IT
operations; 4) IT outsourcing/Vendor management; and 5) Electronic banking,
Electronic payments, Electronic money and other Electronic products and services.
a. Information security. Information is a vital asset that must be managed to
support BSI management in making decisions. BSIs should have a comprehensive
information security program, approved by the Board, to maintain the
confidentiality, integrity, and availability of computer systems for reliable and
timely information. Unauthorized access, destruction, or disclosure of
confidential information can adversely affect earnings and capital. The program
should monitor information security function throughout the organization's
business processes and establish clear accountability for carrying out security
responsibilities.
The Board or Senior Management should appoint an independent information
security officer (ISO) who will be responsible and accountable for the
organization-wide IS program. The duly appointed ISO should have sufficient
knowledge, background, and training, as well as organizational position, to
enable him to perform assigned tasks. To ensure appropriate segregation of
duties, the ISO should report directly to the Board or senior management and
have sufficient independence to perform his mandate. The ISO should perform
the tasks of a risk manager and not a production resource assigned to the IT
department. In the case of simple BSIs, hiring a personnel to specifically perform
the function of an ISO may not be necessary. The ISO function may be assigned
to an existing independent officer who meets the requirements mentioned in
this subsection. (Detailed guidelines/standards on Information Security are
shown in Appendix 75b)
b. Project Management/Development and Acquisition and Change Management.
BSIs should establish a framework for management of IT-related projects. The
framework should clearly specify the appropriate project management
methodology that will govern the process of developing, implementing and
maintaining major IT systems. The methodology, on the other hand, should cover
allocation of responsibilities, activity breakdown, budgeting of time and
resources, milestones, checkpoints, key dependencies, quality assurance, risk
assessment and approvals, among others. In the acquisition and/or development
of IT solutions, BSIs should ensure that business and regulatory requirements are
satisfied, (Detailed guidelines/standards on Project Management/Development
and Acquisition and Change Management are shown in Appendix 75c)
Page 11 of 15,c. IT Operations. IT has become an integral part of the day-to-day business
operation, automating and providing support to nearly all of the business
processes and functions within the institution. Therefore, the IT systems should
be reliable, secure and available when needed which translates to high levels of
service and dependency on IT to operate.
One of the primary responsibilities of IT operations management is to ensure the
institution’s current and planned infrastructure is sufficient to accomplish its
strategic plans. BSI management should ensure that IT operates in a safe, sound,
and efficient manner throughout the institution. Given that most IT systems are
interconnected and interdependent, failure to adequately supervise any part of
the IT environment can heighten potential risks for all elements of IT operations
and the performance of the critical business lines of the BSIs. Such scenario
necessitates the coordination of IT controls throughout the institution's
operating environment. (Detailed guidelines/standards on IT Operations are
shown in Appendix 75d)
d. IT Qutsourcing/Vendor Management Program. IT outsourcing refers to any
contractual agreement between a BSI and a service provider or vendor for the
latter to create, maintain, or reengineer the institution’s IT architecture, systems
and related processes on a continuing basis. A BSI may outsource IT systems and
processes except those functions expressly prohibited by existing regulations.
The decision to outsource should fit into the institution’s overall strategic plan
and corporate objectives and said arrangement should comply with the
provisions of existing BSP rules and regulations on Outsourcing. Although the
technology needed to support business objectives is often a critical factor in
deciding to outsource, managing such relationships should be viewed as an
enterprise-wide corporate management issue, rather than a mere IT issue.
While IT outsourcing transfers operational responsibility to the service provider,
the BSis retain ultimate responsibility for the outsourced activity. Moreover, the
risks associated with the outsourced activity may be realized in a different
manner than if the functions were inside the institution resulting in the need for
controls designed to monitor such risks. BS| management should implement an
effective outsourcing oversight program that provides the framework for
management to understand, monitor, measure, and control the risks associated
with outsourcing. BSIs outsourcing IT services should have a comprehensive
outsourcing risk management process which provide guidance on the following
areas: 1) risk assessment; 2) selection of service providers; 3) contract review;
and 4) monitoring of service providers. Detailed guidelines/standards on IT
Outsourcing/Vendor Management are shown in Appendix 75e. Guidelines on the
adoption of outsourced cloud computing model are also included therein.
e. Electronic Products and Services. The evolution in technology revolutionized the
way banking and financial products and services are delivered. Physical barriers
were brought down enabling clients to access their accounts, make transactions
or gather information on financial products and services anywhere they are, at
any time of the day and at their own convenience. As development in
technology continues to accelerate, innovative electronic products and services
Page 12 of 15are foreseen to bring more accessibility and efficiency. However, BSIs may be
confronted with challenges relating to capacity, availability and reliability of the
electronic services. Likewise, fraudulent activities via electronic channels are also
rising in number.
BSis should protect customers from fraudulent schemes done electronically.
Otherwise, consumer confidence to use electronic channels as safe and reliable
method of making transactions will be eroded. To mitigate the impact of cyber
fraud, BSls should adopt aggressive security posture such as the following:
‘* The entire ATM system shall be upgraded/converted to allow adoption of
end-to-end Triple DES (3DES) encryption standards by 01 January 2015. The
3DES encryption standards shall cover the whole ATM network which
consists of the host processors, switches, host security module (HSM),
automated teller machines (ATMs), point-of-sale (POS) terminals and all
communication links connected to the network;
ATMs to be installed after date of issuance of this Circular should be 3DES
compliant; and
'* ATMs, POS terminals and payment cards are also vulnerable to skimming
attacks due to the lack of deployment of globally recognized EMV enabled
technology by BSIs. Magnetic stripe only ATMs, POS Terminals and cards are
largely defenseless against modern fraud techniques. Therefore, all
concerned BSIs should shift from magnetic stripe technology to EMV chip-
enabled cards, POS Terminals and ATMs. The entire payment card network
should be migrated to EMV by 01 January 2017. This requirement shall cover
both issuing and acquiring programs of concerned BSIs. A written and Board-
approved EMV migration plan should be submitted to BSP within six (6)
months from date of this Circular. Likewise, the detailed guidelines covering
subject EMV requirement shall be issued separately.
Detailed guidelines/standards on Electronic Products and Services are shown in
Appendix 75f.
Risk Measurement and Monitoring. BSI Management should monitor IT risks and
the effectiveness of established controls through periodic measurement of IT
activities based on internally established standards and industry benchmarks to
assess the effectiveness and efficiency of existing operations. Timely, accurate, and
complete risk monitoring and assessment reports should be submitted to
management to provide assurance that established controls are functioning
effectively, resources are operating properly and used efficiently and IT operations
are performing within established parameters. Any deviation noted in the process
should be evaluated and management should initiate remedial action to address
underlying causes. The scope and frequency of these performance measurement
activities will depend on the complexity of the BSI’s IT risk profile and should cover,
among others, the following:
a. Performance vis-a-vis Approved IT Strategic Plan. As part of both planning and
monitoring mechanisms, BSI management should periodically assess its uses of IT
as part of overall business planning. Such an enterprise-wide and ongoing
Page 13 of 15approach helps to ensure that all major IT projects are consistent with the BSI’s
overall strategic goals. Periodic monitoring of IT performance against established
plans shall confirm whether IT strategic plans remain in alignment with the
business strategy and the IT performance supports the planned strategy.
b. Performance Benchmarks/Service Levels. BSIs should establish performance
benchmarks or standards for IT functions and monitor them on a regular basis.
Such monitoring can identify potential problem areas and provide assurance that
IT functions are meeting the objectives. Areas to consider include system and
network availability, data center availability, system reruns, out of balance
conditions, response time, error rates, data entry volumes, special requests, and
problem reports.
Management should properly define services and service level agreements (SLA)
that must be monitored and measured in terms understandable to the business
units, SLA with business units and IT department should be established to
provide a baseline to measure IT performance.
c. Quality Assurance/Quality Control. BSI should establish quality assurance (QA)
and quality control (QC) procedures for all significant activities, both internal and
external, to ensure that IT is delivering value to business in a cost effective
manner and promotes continuous improvement through ongoing monitoring. QA
activities ensure that product conforms to specification and is fit for use while QC
procedures identify weaknesses in work products and to avoid the resource drain
and expense of redoing a task. The personnel performing QA and QC reviews
should be independent of the product/process being reviewed and use
quantifiable indicators to ensure objective assessment of the effectiveness of IT
activities in delivering IT capabilities and services.
d. Policy compliance. BSIs should develop, implement, and monitor processes to
measure IT compliance with their established policies and standards as well as
regulatory requirements. In addition to the traditional reliance on internal and
third party audit functions, BSis should perform self-assessments on a periodic
basis to gauge performance which often lead to early identification of emerging
or changing risks requiring policy changes and updates.
e. External Assessment Program. Complex BSIs may also seek regular assurance
that IT assets are appropriately secured and that their IT security risk
management framework is effective. This may be executed through a formal
external assessment program that facilitates a systematic assessment of the IT
security risk and control environment over time.
§X176.8 Reports. To enable the BSP to regularly monitor IT risk profile and electronic
products, services, delivery channels, processes and other relevant information
regarding the use of technology, BSIs are required to submit the following:
1. Annual IT Profile, electronically to the BSP Supervisory Data Center (SDC) within 25
days from the end of reference year (Guidelines to be observed in the preparation
and submission of this report was issued under BSP Memorandum to All Banks No.
M-2012-011 dated 17 February 2012);
Page 14 of 15,2. Report on breach in information security, especially incidents involving the use of
electronic channels, pursuant to the provisions of items “a” or “b” of Subsection
192.4 of the MORB following the guidelines provided in item “d” of the same
Subsection. Depending on the nature and seriousness of the incident, BSP may
require the BSI to provide further information or updates on the reported incident
until the matter is finally resolved; and
3. Notification letter to the Core Information Technology Specialist Group (CITSG) of
the BSP of disruption of IT services/operations that resulted to the activation of,
disaster recovery and business continuity plan immediately upon activation of the
plan.
§X176.9 Sanctions and Penalties. BSIs should make available IT policies and procedures
on the foregoing and other related documents during the on-site examination as well as
provide a copy thereof when written request was made to determine their compliance
with this Circular.
Any violation of the provisions of this Section, its appendices and annexes, shall be
subject to the monetary and non-monetary sanctions provided under Section 37 of R.A.
No. 7653. Enforcement actions shall be imposed on the basis of the overall assessment
of BSIs’ ITRMS. Whenever a BSI's ITRMS is rated “1” pursuant Subsection X176.4, the
following additional sanctions may be imposed:
1. Suspension/revocation of authority to provide electronic products and services; and
2. Prohibition against offering/provision of new electronic products and services.
Section 2. Repealing Clause. The provisions of Section X176 of the MORB are hereby
repealed, amended and/or modified and are also made applicable to non-bank financial
institutions under the supervision of Bangko Sentral ng Pilipinas and incorporated as
Sections 4176Q, 4196N, 41965 and 4193P of the Manual of Regulations for Non-Bank
Financial Institutions (MORNBFI).
The guidelines on consumer protection for electronic banking under Section X705 and
Appendices 70a - 70d of the Manual of Regulations for Banks (MORB) are hereby amended
and transferred to the IT Risk Management Standards and Guidelines under Subsection
X176.7 (3)(e) and Appendix 75f of this Circular.
Section 3. Effectivity. This Circular shall take effect fifteen (15) days following its publication
in the official gazette or in any newspaper of general circulation in the Philippines.
FOR THE MONETARY BOARD:
STOR A. ESPENILLIA,
Officer-in-Charge
ZL august 2013
Page 15 of 15Appendix 75a
IT RISK MANAGEMENT STANDARDS AND GUIDELINES
Area: IT Audit
1, INTRODUCTION
1.1. BSIs must plan, manage and monitor rapidly changing technologies to enable them
to deliver and support new products, services, and delivery channels. The rate of
these changes and the increasing reliance on IT make the inclusion of IT audit
coverage essential to an effective overall audit program. The audit program should
address IT risk exposures throughout the organization, including the areas of IT
management and strategic planning, IT operations, client/server architecture, local
and wide-area networks, telecommunications, physical and information security,
electronic products and services, systems development and acquisition, and business
continuity planning, IT audit should also focus on how management determines the
risk exposure from its operations and controls or mitigates identified risks.
1.2. A well-planned, properly structured audit program’ is essential to evaluate risk
management practices, internal control systems and compliance with policies
concerning [IT-related risks at BSIs of every size and complexity. Effective audit
programs are risk-focused, promote sound IT controls, ensure the timely resolution
of audit deficiencies and inform the Board of Directors of the effectiveness of risk
management practices, An effective IT audit function may also allow regulators to
place substantial reliance on and reduce the time spent reviewing areas of the BSIs
during examinations. Ideally, the audit program should consist of a full-time,
continuous program of internal audit which may be further supported by a well-
planned external audit program.
2. ROLES AND RESPONSIBILITIES
2.1, Board of Directors (Board) and Senior Management. The BSI's Board or its Audit
Committee has the overall responsibility for establishing and maintaining an
independent, competent and effective IT audit function commensurate with the
complexity of its IT risk profile. In order to properly oversee the IT audit function, the
Board or its Audit Committee should:
© Assign responsibility for IT audit function to an internal audit department or
individual with sufficient audit expertise, knowledge base and skill level;
‘© Ensure that IT audit maintains its professional and organizational independence’;
and
© Approve and review an audit program that would guide IT audit engagements.
Senior management is responsible for supporting IT audit by providing sufficient
resources, establishing programs defining and requiring compliance with IT planning
practices, operating policies and internal controls. Likewise, senior management
* Audit program encompasses audit policies, procedures, and strategies that govern the audit function,
Including IT audit.
? Independence means self-governance, freedom from conflict of interest and undue influence. The IT auditor
should be free to make his or her own decisions, not influenced by the organization being audited, or by its
managers and employees.
Tr Audit Page 1 of 8Appendix 75a
should not, in any manner, diminish or interfere with the candor of the audit findings
and recommendations.
2.2, Audit Management and Audit Staff. The internal audit manager is responsible for
implementing the Board-approved audit directives. The manager oversees the audit
function and provides leadership and direction in communicating and monitoring
audit policies, practices, programs, and processes. He should establish clear lines of
authority and reporting responsibility for all levels of audit personnel and activities.
The internal audit manager should also ensure that members of the audit staff
possess the necessary independence, experience, education, training, and skills to
properly conduct assigned activities. This can be undertaken by providing auditors
with an effective program of continuing education and development. As the
information systems of a BSI become more sophisticated or as more complex
technologies evolve, the auditor may need additional training,
The primary role of the internal IT audit staff, on the other hand, is to assess
independently and objectively the controls, reliability, and integrity of the BSI’s IT
environment. Internal auditors should evaluate IT plans, strategies, policies, and
procedures to ensure adequate management oversight. They should assess the day-
to-day IT controls to ensure that transactions are recorded and processed in
compliance with acceptable accounting methods and standards and are in
compliance with policies set forth by the Board and senior management. Auditors
also perform operational audits, including system development audits, to ensure
that internal controls are in place, policies and procedures are effective, and
employees operate in compliance with approved policies. Auditors should identify
weaknesses, provide meaningful recommendations and review management's plans
for addressing those weaknesses, monitor their resolution, and report to the Board
material weaknesses, as necessary.
2.3, Operating Management. Operating management should formally and effectively
respond to IT audit or examination findings and recommendations. The audit
procedures should clearly identify the methods for following up on noted audit or
control exceptions or weaknesses. Operating management is responsible for
correcting the root causes of the audit or control exceptions, not just treating the
exceptions themselves. Response times for correcting noted d iencies should be
reasonable and may vary depending on the complexity of the corrective action and
the risk of inaction.
INDEPENDENCE OF THE IT AUDIT FUNCTION
3.1. The ability of the internal audit function to achieve desired objectives depends
largely on the independence of audit personnel. Hence, the placement of the
internal audit function in relation to the BSI’s management structure should be
carefully assessed. The degree of auditors’ independence, objectivity and
impartiality entails the following key elements:
‘© Direct reporting of audit results to the Board or its Audit Committee;
© Full authority vested by the Board to the IT Audit Department/IT auditor to access
all records and staff necessary to conduct the audit and require management to
address significant findings in a timely manner. Said authority must be clearly
TT Audit Page 2 0f 8Appendix 75a
specified in an Internal Audit Charter or Audit Program duly approved by the
Board or Audit Committee;
‘© Non-involvement of IT audit personnel in management/operational activities that
may compromise or appear to compromise their independence; and
‘© The Board or Audit Committee should decide on audit personnel performance
evaluation and compensation matters.
4, INTERNAL IT AUDIT PROGRAM
4.1. A formal audit program or manual consisting of policies and procedures governing
the IT audit function should be adopted commensurate with the BSI’s size,
complexity, scope of activities and risk profile. The audit program should, at a
minimum, encompass the following component:
© A mission statement or audit charter? outlining the purpose, objectives,
organization, authorities, and responsibilities of the internal auditor, audit staff,
audit management, and the audit committee;
‘© Arisk assessment process to describe and analyze the risks inherent in a given line
of business and drive the scope and frequency of audits. Auditors should update
‘the risk assessment at least annually, or more frequently if necessary, to reflect
changes to internal control or work processes;
© An annual audit plan detailing IT audit’s budgeting and plani
include audit goals, schedules, staffing needs and reporting;
© An audit cycle that identifies the frequency of audits which should be based on a
sound risk assessment process;
© Well-planned and properly structured audit work programs’ that set out the
required scope and resources, including the selection of audit procedures, extent
of testing and the basis for conclusions for each audit area;
© Audit report preparation standards that require the use of an approved audit
rating system;
© Requirements for audit work paper documentation to ensure clear support for all
audit findings and work performed, including work paper retention policies;
© Follow-up processes that require internal auditors to determine the disposition of
management actions to correct significant deficiencies;
© Policies on outsourcing of some or all of IT audit function, including
technical/highly specialized reviews, to external third parties; and
© Professional development programs for audit staff/personnel to maintain the
necessary technical expertise.
1B processes to
Additionally, the BSI should consider conducting its internal audit activities in
accordance with professional standards, such as the Standards for the Professional
Practice of Internal Auditing issued by the Institute of Internal Auditors (IIA), and
those issued by the Standards Board of the Information Systems Audit and Control
Association (ISACA), whenever possible.
* quait charter is a document approved by the Board of Directors that defines the IT audit function’s
responsibility, authority and accountability
* Work program is a series of specific, detalled steps to achieve an audit objective.
TrAudit Page 3 of 8Appendix 75a
5. IT AUDIT PHASES,
5.1.
5.2.
Audit Planning. The BSI should develop an overall audit plan® for all the audit
assignments/engagements covering at least 12 months to ensure adequate coverage
of IT risks, The plan should be defined by combining the results of the risk
assessments and the resources required to yield the timing and frequency of planned
internal audits. The audit plan must be realistic and should cover a time budget for
other assignments and activities such as specific examination, consulting/advisory
services, training and provision for audit personnel leave of absences.
The audit plan must be formally approved and regularly reviewed by the Board or
Audit Committee. The internal auditors should report the status of the planned
versus actual audits and any revisions to the annual audit plan on a periodic basis.
For each audit assignment, an audit work program detailing the objectives, scope,
nature and extent of audit procedures and outline of audit work should be prepared.
This is to ensure that appropriate attention is devoted to important areas of the
audit, potential problems are identified and resolved on a timely basis, and the audit
‘engagement is properly organized and managed to be performed in an effective and
efficient manner.
Risk Assessment. The use of an appropriate risk assessment technique or approach
is critical in developing the overall IT audit plan and in planning specific audits. An
effective risk assessment methodology should be defined to provide the Board or its
Audit Committee with objective information in determining audit priorities for the
effective allocation of IT audit resources. The risk assessment for IT audit planning
should:
© Identify the BSI’s data, application® and operating systems’, technology, facilities,
and personnel;
© Identify the business activities and processes within each of those categories;
‘© Include profiles of significant business units, departments, and product lines, or
systems, and their associated business risks and control features, resulting in a
document describing the structure of risk and controls throughout the BSI; and
© Use a measurement or scoring system that ranks and evaluates business and
control risks for significant business units, departments, and products.
The results of the risk assessments, in support of the audit plan, must be presented
to the Board or Audit Committee for review and approval. A process must be in
place to ensure regular monitoring of the results of the risk assessment and updating
it at least annually for all significant business units, departments, and products or
systems,
5 audit plan is a description and schedule of audits to be performed in a certain period of time (ordinarily 2
year), It includes the areas to be audited, the type of work planned, the high-level objectives and scope of the
‘work and includes other ites such as budget, resource allocation, schedule dates, and type of report issued.
® pplication system is an integrated set of computer programs designed to serve a well-defined function and
having specific input, processing, and output activities (e.g, CASA, general ledger, loans and treasury systems).
” Operating system is the program that manages all the basic functions and programs in a computer.
TT Audit
Page 4 of 8Appendix 75a
A risk scoring model or system may be adopted to provide a sound basis for the risk
assessment. Among the major risk factors that may be used in scoring systems
include the following: a) Adequacy of internal controls; b) Nature of transactions and.
operating environment; c) Age of the system or application; d) Physical and logical
security of information, equipment, and premises; e) Adequacy of operating
management oversight and monitoring; f) Previous regulatory examination and audit
results and management's responsiveness in addressing issues; g) Human resources,
including the experience of management and staff, turnover, technical competence,
management's succession plan, and the degree of delegation; and h) Senior
management oversight.
Written guidelines on the use of risk assessment tools and risk factors should be
approved and reviewed by the Board or its Audit Committee. IT auditors should use
the guidelines to grade or assess major risk areas and to define the range of scores
or assessments (e.g. groupings such as high, medium or low risk or numeric risk
ratings). At a minimum, the written assessment guidelines should specify the
following elements: a) Maximum length for audit cycles based on the risk scores; b)
Timing of risk assessments for each department or activity; c) Documentation
requirements to support scoring decisions; and d) Guidelines for overriding risk
assessments in special cases and the circumstances under which they can be
overridden.
5.3, Performance of Audit Work. Depending on the complexity of IT risk profile, IT
auditors may perform all or a combination of any of the following IT audit
procedures:
© IT General Controls Review - This entails the review of the adequacy of general
controls® in place to ensure proper management and monitoring of IT
risks/environment and the effective functioning of the BSI’s IT systems and
infrastructure. The following areas should be covered, among others: a) IT
management and strategic planning; b) IT operations; c) Client/server
architecture; d) Local and wide-area networks; e) Telecommunications; and f)
Physical and information security.
IT general controls review may be carried out through the audit of each IT unit or
department in the institution (e.g. IT Operations, Network and Communications,
etc.)
‘© Application Systems Review - The purpose of this review is to identify, document,
test and evaluate the application controls” that are implemented to ensure the
General controls are controls, other than application controls, that relate to the environment within which
application systems are developed, maintained, and operated, and that are therefore applicable to all the
applications at an institution. Uke application controls, general controls may be either manual or automated.
Examples of general controls include the development and implementation of an IT strategy and an IT security
policy, the organization of IT staff to separate conflicting duties and planning for disaster prevention and
recovery.
° Application controls are controls related to transactions and data within application systems. Application
controls ensure the completeness and accuracy of the records and the validity of the entries made resulting
from both programmed processing and manual data entry. Examples of application controls include data input
validation, agreement of batch totals and encryption of data transmitted.
Taudit Page 5 of 8Appendix 75a
confidentiality, integrity and accuracy of the system processing and the related
data. The application-level risks to the system and data addressed by this review
are the following, among others: a) System availability risks relating to the lack of
system operational capability; b) System security risks relating to unauthorized
access to systems and/or data; c) System integrity risks relating to incomplete,
inaccurate, untimely or unauthorized processing of data; d) System
maintainability risks relating to inability to update the system when required in a
manner that continues to provide for system availability, security and integrity;
and e) Data risks relating to its completeness, integrity, confidentiality, privacy
and accuracy.
© Technical Reviews - BSIs with complex IT risk profile such as those providing
electronic products and services and web-enabled facilities, also require IT
auditors to perform highly technical/specialized reviews such as the conduct of
periodic internal vulnerability assessment and penetration testing, computer
forensics and review of emerging technologies, e.g. cloud computing,
virtualization, mobile computing.
IT auditors frequently use computer-assisted audit techniques (CATS) to improve
audit coverage by reducing the cost of testing and sampling procedures that
otherwise would be performed manually. CATs include many types of tools and
techniques, such as generalized audit software, utility software, test data,
application software tracing and mapping, and audit expert systems. These tools and
techniques can also be used effectively to check data integrity by testing the logical
processing of data "through" the system, rather than by relying only on validations of
input and output controls.
Audit software programs should remain under the strict control of the audit
department. For this reason, all documentation, test material, source listings, source
and object program modules, and all changes to such programs, should be strictly
controlled. Computer programs intended for audit use should be carefully
documented to define their purpose and to ensure their continued usefulness and
reliability.
All audit procedures forming part of the assignment should be documented in
working papers. These must reflect the examinations that have been made and
emphasize the evaluations formulated in the report. The working papers must be
drawn up according to a well-determined method. Such method must provide
sufficient information to verify whether the assignment was duly performed and to
enable others to check the manner in which it was performed.
5.4, Reporting, A written audit report of each assignment is to be issued to the auditee
and Audit Committee within a reasonable timeline. The audit report should state the
scope, objectives, period of coverage and the nature, timing and extent of the audit
work performed. It should state the findings, conclusions and recommendations and
any reservations, qualifications or limitations in scope that the IT auditor has with
respect to the audit, The IT audit should discuss the draft report contents with
management in the subject area prior to finalization and release of the final report.
This should be signed, dated and distributed according to the terms of the audit
charter/audit program or engagement letter.
TWAudit Page 6 of 8Appendix 75a
5.5. Post-closing/Monitoring Activities. Senior management should ensure that the
internal audit department's concerns are appropriately addressed. Therefore, they
should approve a procedure established by the internal audit department to ensure
the consideration and, if appropriate, timely implementation of audit
recommendations.
The IT audit department should monitor the implementation of management's
corrective actions for proper disposition of its findings/recommendation. The status
of the recommendations is communicated at least on a quarterly basis to the Board
or Audit Committee.
6. OTHER IT AUDIT ACTIVITIES/PARTICIPATION
6.1. Development, Acquisition, Conversions and Testing. The BSI’s Board-approved audit
policy should include guidelines detailing what involvement internal audit will have
in the development, acquisition, conversion, and testing of major applications. This
includes describing the monitoring, reporting, and escalation processes (when
internal controls are found to be insufficient or when testing is found to be
inadequate). For acquisitions with significant IT impacts, participation of IT audit may
be necessary early in the due diligence stage.
It is necessary that audit's participation in the development process be independent
and objective. Auditors can determine and should recommend appropriate controls
to project management. However, such recommendations do not necessarily “pre-
approve” the controls, but instead guide the developers in considering appropriate
control standards and structures throughout their project.
6.2. Review of Technology Service Providers (TSP). The BSI should effectively manage its
relationships with key TSPs through review and assessment of adequacy of IT
controls employed by such TSPs. When circumstances warrant, the BSI’s internal
audit function may be utilized to directly audit TSP's operations and controls. in some
instances, the services of external auditors may be employed. A BSI using external
audit to complement its own coverage should ensure that the independent auditor is
qualified to perform the review, that the scope satisfies its own audit objectives and
that any significant reported deficiencies are corrected.
7. OUTSOURCING OF IT AUDIT FUNCTIONS
7.1, The Board and senior management of a BSI that outsources its internal IT audit
function should ensure that the structure, scope and management of the
outsourcing arrangement provides for an adequate evaluation of the system of
intemal controls. Management should ensure that there are no conflicts of interest
and that the use of these services does not compromise independence.
7.2, When negotiating the outsourcing arrangement with a service provider, the BSI
should carefully consider its current and anticipated business risks in setting each
party's internal audit responsibilities. To clearly define the BSI’s duties and those of
Tr Audit Page 7 of 8Appendix 75a
the audit provider, it should have a written contract, often referred to as an
engagement letter",
8. COMPLIANCE WITH EXISTING BSP RULES AND REGULATIONS
8.1.
The provisions of the IT audit guidelines prescribe in detail the essentials and
elements of an effective IT audit which complement and are consistent with
Subsection X185.9 Independence of the Internal Auditor of the Manual of Regulations
for Banks (MORB). Likewise, the IT audit-related tasks of the Audit Committee are in
addition to the tasks prescribed under X141.3 Powers/responsibilities and duties of
directors, item 9.a. of the MORB, as amended by Circular No. 749, Series of 2012.
37 in general, the contract between the institution and the audit provider may or may not be the same as the
engagement letter.
Audit
Page 8 of 8Appendix 756
IT RISK MANAGEMENT STANDARDS AND GUIDELINES
Area: Information Security
1, INTRODUCTION
1.1, Information is one of the most important assets of all BSIs. Timely and reliable
information is necessary to process their transactions and support critical decisions.
Protection of information assets is also necessary to establish and maintain trust
between the BSis and their customers, maintain compliance with laws and
regulations and protect reputation. Likewise, effective management of information
risks and exposures—as well as opportunities—can directly affect the BSIs’
profitability and overall value.
1.2. Information security (IS) has become a critical business function and an essential
component of governance and management affecting all aspects of the business
environment. Effective IS controls are necessary to ensure the confidentiality,
integrity and availability of IT resources and their associated data. These assets
should be adequately protected from unauthorized access, deliberate misuse or
fraudulent modification, insertion, deletion, substitution, suppression or disclosure.
To achieve these objectives, BSIs should establish an IS program to manage the risks
identified through their assessment, commensurate with the sensitivity of the
information and the complexity of their IT risk profile. Management may consider a
variety of policies, procedures, and technical controls and adopt measures that
appropriately address identified
2. ROLES AND RESPONSIBILITIES
2.1. Board of Directors (Board) and Senior Management. The Board, or an appropriate
Board committee, is responsible for overseeing the development, implementation,
and maintenance of the BSI’s IS program, and making senior management
accountable for its actions. The Board should approve written IS policies and receive
periodic report on the effectiveness of the IS program. The IS policy should be
communicated to all employees and relevant external parties and be reviewed at
planned intervals to ensure its continuing suitability, adequacy and effectiveness.
The policy should include a formal disciplinary process and the corresponding actions
for those who have committed security violations.
Senior management should appoint an information security officer (ISO) who will be
responsible and accountable for the organization-wide IS program. The duly
appointed ISO should have sufficient knowledge, background, and training, as well as
organizational position, to enable him to perform assigned tasks. To ensure
appropriate segregation of duties, the ISO should report directly to the Board or to
senior management and have sufficient independence to perform his mandate. The
ISO should perform the tasks of a risk manager and not a production resource
assigned to the IT department. In the case of BSIs with simple IT risk profile, The ISO
function may be assigned to an existing independent officer who meets the above
Information Security Page 1 of 9Appendix 75b
3, INFORMATION SECURITY STANDARDS.
3a.
3.2.
IS Risk Assessment. The BSI should conduct periodic security risk assessment to
identify and understand risks on confidentiality, integrity and availability of
information and IT systems based on a current and detailed knowledge of the BSI's
operating and business environments. The risk assessment should include an
identification of information and IT resources to be protected and their potential
threats and vulnerabilities. An effective risk assessment process involves three
phases, namely: information gathering, analysis, and prioritizing responses. Vendor
concerns add additional elements to the process.
Once the risks associated with threats and vulnerabilities have been assessed,
probabilities assigned, and risks rated, the BSI should segregate the risks into those
the BSI is willing to accept and those that should be mitigated. Once the BSI
identifies the risks to mitigate, it can begin to develop its risk mitigation strategy
which should be an integral component of the IS program.
Security Controls Implementation
3.2.1. Asset Classification and Control. The BSI should maintain an inventory of all
information assets and identify the information owner who shall be
responsible in ensuring confidentiality, integrity and protection of these
assets, Management should implement an information classification strategy
in accordance with the degree of sensitivity and criticality of information
assets to the BSI. To ensure consistent protection of formation and other
critical data throughout the system, the BSI should develop guidelines and
definitions for each classification and define an appropriate set of controls and
procedures for information protection in accordance with the classification
scheme.
Protection of information confidentiality should be in place regardless of the
media™ (including paper and electronic media) in which the information is
maintained. The BSI should ensure that all media are adequately protected,
and establish secure processes for disposal and destruction of sensitive
information in both paper and electronic media.
3.2.2. Physical and Environmental Protection. Physical security measures should be
in place to protect computer facilities and equipment from damage or
unauthorized access. Critical information processing facilities should be
housed in secure areas such as data centers and network equipment rooms
with appropriate security barriers and entry controls. Access to these areas
should be restricted to authorized personnel only and the access rights should
be reviewed and updated regularly. Buildings should give minimum indication
of their purpose, with no obvious signs identifying the presence of information
processing facilities.
The BSI should fully consider the environmental threats (e.g. proximity to
dangerous factories) when selecting the locations of its data centers.
® Media are physical objects that store data, such as paper, hard disk drives and compact disks.
Information Security Page 2 0f 9Appendix 75b
Moreover, physical and environmental controls should be implemented to
monitor environmental conditions which could adversely affect the operation
of information processing facilities (e.g. fire, explosives, smoke, temperature,
water and dust). Equipment and facilities should be protected from power
failures and electrical supply interference by, for example, installing
uninterruptible power supply (UPS) and a backup generator.
3.2.3. Security Administration and Monitoring. A security administration function
and a set of formal procedures should be established for administering the
allocation of access rights to system resources” and application systems, and
monitoring the use of system resources to detect any unusual or unauthorized
activities.
Proper segregation of duties within the security administration function or
other compensating controls (e.g. peer reviews) should be in place to mitigate
the risk of unauthorized activities being performed by the security
administration function. In those cases where complete segregation of duties
is impractical, management should use mitigating controls, such as ensuring a
knowledgeable third-party conducts appropriate independent reviews of
security administration activities. In smaller institutions, a manager or senior
officer who is not involved in the security administration function may
conduct this independent review.
Management should employ the “least privilege” principle throughout IT
operations. The principle provides that individuals should only have privileges
‘on systems and access to functions that are required to perform their job
function and assigned tasks. Individuals with systems and security
administrator roles and privileges should have minimal transactional
authority. Independent employees should monitor the system and security
administrator activity logs for unauthorized activity. Management at smaller
institutions should establish compensating controls in these circumstances.
3.2.4, Authentication”? and Access Control. Access rights and system privileges must
be based on job responsibility and the necessity to have them to fulfill one's
duties. No person by virtue of rank or position should have any intrinsic right
to access confidential data, applications, system resources or facilities. Only
employees with proper authorization should be allowed to access
confidential information and use system resources solely for legitimate
purposes.
The BSI should have an effective process to manage user authentication and
access control. Appropriate user authentication mechanism commensurate
with the classification of information to be accessed should be selected. The
® system resources are capabilities that can be accessed by a user or program either on the user’s machine or
across the network. Capabilities can be services, such as file or print services, or devices, such as routers.
® authentication involves verification of identity by a system based on the presentation of unique credentials.
to that system
* authorization is the process of giving access to parts of a system, typically based on the business needs and.
the role of the individual within the system
Information Security Page 3 of 9Appendix 75b
grant, modification and removal of user access rights should be approved by
the information owner prior to implementation. A user access re-certification
process should be conducted periodically to ensure that user access rights
remain appropriate and obsolete user accounts have been removed from the
systems.
Users who can access internal systems should be required to sign an
acceptable-use policy (AUP) before using a system. An AUP isa key control for
user awareness and administrative policing of system activities which details
the permitted system uses and user activities and the consequences of non-
compliance.
The BSI should implement effective password rules to ensure that easy-to-
guess passwords are avoided and passwords are changed on a periodic basis.
Stronger authentication methods should be adopted for transactions/activities
of higher risk (e.g. payment transactions, financial messages and mobile
computing).
Default user accounts to new software and hardware should either be
disabled, or the authentication to the account should be changed.
Additionally, access to these default accounts should be monitored more
closely than other accounts. In the same manner, authorization for privileged
access should be tightly controlled as it gives the user the ability to override
system or application controls. Extra care should be exercised when
controlling the use of and access to privileged and emergency IDs. The
necessary control procedures include:
© Granting of authorities that are strictly necessary to privileged and
emergency IDs;
© Formal approval by appropriate personnel prior to being released for
usage;
© Monitoring of activities performed by privileged and emergency IDs (e.g.
peer reviews of activity logs);
© Proper safeguard of privileged and emergency IDs and passwords (e.
in a sealed envelope and locked up inside the data center); and
© Change of privileged and emergency IDs’ passwords immediately upon
return by the requesters.
kept
3.2.5. System Security. The following control procedures and baseline security
requirements should be developed to safeguard operating systems, system
software and databases"*, among others:
© Clear definition of a set of access privilege for different groups of users and
access to data and programs is controlled by appropriate methods of
identification and authentication of users together with proper
authorization;
‘© Secure configuration of operating systems, system software, databases and
servers to meet the intended uses with all unnecessary services and
2 Database is an organized collection of information stored on one or more electronic files.
Information Security Page 4 of 9Appendix 75b
programs disabled or removed. Use of security tools should be considered
to strengthen the security of critical systems and servers;
© Periodic checking of the integrity of static data (e.g. system parameters) to
detect unauthorized changes;
© Clear establishment of responsibilities to ensure that the necessary patches
and security updates developed from time to time by relevant vendors are
identified, assessed, tested and applied to the systems in a timely manner;
© Adequate documentation of all configurations and settings of operating
systems, system software, databases and servers; and
(© Adequate logging and monitoring of system and user activities to detect
irregularities and logs are securely protected from manipulation.
3.2.6. Network Security. Networks provide system access and connectivity between
business units, affiliates, service providers, business partners, customers, and
the public. This increased connectivity requires additional controls to
segregate and restrict access between various groups and information users.
The BSI must evaluate and implement appropriate controls relative to the
complexity of its network. An effective approach to adequately secure system
and data within the network involves the following, among others:
© Grouping of network servers, applications, data, and users into security
domains (e.g., untrusted external networks, external service providers, or
various internal user systems);
© Establishment of appropriate access requirements within and between
each security domain;
© Implementation of appropriate technological controls to meet access
requirements consistently; and
© Monitoring of cross-dom:
anomalous activity.
access for security policy violations and
The BSI should consider the following factors in determining the network
security controls appropriate to the institution and each of the security
domain, among others:
© Criticality of the application and the user group within the domain;
Access points to the domain through various communication channels;
Network protocols and ports used by the applications and network
equipment deployed within the domain;
Performance requirement or benchmark;
Nature of domain (i.e, production or testing, internal or external);
Connectivity between/among various domains; and
Trustworthiness of the domain.
°
°
e000
3.2.7. Remote Access. Controls over remote access are required to manage risk
brought about by external connections to the BSI’s network and computing
resources. In protecting information, the BSI should establish control
procedures covering:
© Approval process on user requests;
Information Security Page 5 of 9Appendix 75b
© Authentication controls for remote access to networks, host data and/or
systems;
© Protection (e.g. against theft and malicious software) of equipment and
devices;
© Logging and monitoring all remote access communications; and
© Provision of more stringent security controls (i.e. data encryption, two-
factor authentication process).
. Encryption, The BSI should adopt industry-accepted cryptographic solutions
and implement sound key management practices to safeguard the associated
cryptographic keys. Sound practices of key management generally include the
following, among others:
© Provision of a secure control environment for generation, distribution,
storage, entry, use and archiving of cryptographic keys to safeguard against
modification and unauthorized disclosure. In particular, the use of tamper-
resistant storage is recommended to prevent the disclosure of the
cryptographic keys; and
© Adequate off-site back-up and contingency arrangements for cryptographic
keys which are subject to the same security controls as the production
cryptographic keys.
3.2.9, Malicious Code’® Prevention. The BSI should provide protection against the
risk of malicious code by implementing appropriate controls at the host and
network level to prevent and detect malicious code, as well as engage in
appropriate user education. Procedures and responsi should be
established to detect, prevent, and recover from attacks. The BSI should put in
place adequate controls, such as:
© Prohibiting the download and use of unauthorized files and software, and
access to doubtful web sites;
© Installation and timely update of ant
reputable vendors; and
© Disallowing the download of executable files and mobile codes, especially
‘those with known vulnerabilities (e.g. through the use of corporate
firewalls“ and proper configuration of the browser software); and
‘© Prompt and regular virus scanning of all computing devices and mobile
Users’ computers, and procedures for recovering from virus infections.
rus software” provided by
3.2.10. Personnel Security. The BSI should have a process to verify job application
information on all new employees. Screening procedures, including
verification and background checks, should be developed for recruitment of
+8 malicious code refers to any code In any part of a software or script that is intended to cause undesired
effects, security breaches or damage to a system. It describes a broad category of system security terms that
includes attack scripts, viruses, worms, Trojan horses, backdoors and malicious active content.
antivirus software is a computer program that offers protection from viruses by making additional checks of
the integrity of the operating system and electronic files. Also known as virus protection software.
2 Firewall is a hardware and/or software that prevents unauthorized data from entering or leaving a secure
network. Firewalls can also be used to isolate or protect a particular segment of a network.
Information Security Page 6 of 9Appendix 75b
permanent and temporary IT staff, and contractors, particularly for sensitive
IT-related jobs or access level.
Management should obtain signed confidentiality, non-disclosure and
authorized use agreements before granting new employees and contractors
access to IT systems. Such agreements put all parties on notice that the BSI
owns its information, expects strict confidentiality, and prohibits information
sharing outside legitimate business needs.
All employees of the organization and, where relevant, contractors and third-
party users, shall receive appropriate IS awareness training and regular
updates in organizational policies and procedures relevant to their job
function. Security training and awareness promotes a security conscious
environment and strengthens compliance with BSI's security policies,
standards, and procedures.
3.2.11. Systems Development, Acquisition and Maintenance. A framework should
be in place describing the tasks and processes for development or acquisition
of new systems, assignment and delineation of responsibilities and
accountabilities for system deliverables and project milestones. User
functional requirements, systems design and technical specifications and
service performance expectations should be adequately documented and
approved at appropriate management levels.
The BSI's development, acquisition, and audit policies should include
guidelines describing the involvement of internal audit and information
security personnel in the development or acquisition activities as a means of
independently verifying the adequacy of the control and security
requirements as they are developed and implemented.
Besides business functionalities, security requirements relating to system
access control, authentication, transaction authorization, data integrit
system activity logging, audit trail, security event tracking and exception
handling should be clearly specified. The information and/or process owners
should conform to the security requirements for each new system or system
acquisition, accept tests against the requirements, and approve
implementation of systems in the production environment.
The BSI should have an effective process to introduce application and system
changes into its respective environments. The process should encompass
development, implementation, and testing of changes to both internally
developed software and acquired software. Weak procedures can corrupt
applications and introduce new security vulnerabilities.
3.2.12. Insurance. While insurance coverage is an effective method to transfer risks
from the BSI to insurance carriers, the same is not a substitute for an
effective IS program. When considering supplemental insurance coverage for
security incidents, the BSI should assess the specific threats in light of the
impact these incidents will have on its financial, operational, and reputation
risk profiles. The BSI should carefully evaluate the extent and availability of
Information Security Page 7 of 9Appendix 75b
coverage in relation to the specific risks they are seeking to mitigate. In case
the BSI contracts for additional coverage, it should ensure that it is aware of
and prepared to comply with any required security controls both at inception
of the coverage and over the term of the policy.
3.3. Security Process Monitoring and Updating
3.3.1, Activity Monitoring. The BSI should gain assurance of the adequacy of its risk
mitigation strategy and implementation by monitoring network and host
activity to identify policy violations and anomalous behavior. The BSI’s
security monitoring should, commensurate with the risk, be able to identify
control failures before a security incident occurs, detect an intrusion or other
security incident in sufficient time to enable an effective and timely response,
and support post-event forensics activities.
The analysis and response to activity and condition monitoring is performed
differently at BSIs of different IT risk profile. A simple BSI may assign
operational personnel to the analysis and response function while a complex
BSI may maintain a security response center that receives and analyzes the
data flows as activity occurs. Additionally, BSIs, regardless of IT risk profile,
may outsource various aspects of the analysis and response function, such as
activity monitoring. Outsourcing does not relieve the BSI of the responsibility
for ensuring that control failures are identified before a security incident
occurs, an intrusion or other security incident is detected in sufficient time to
enable an effective and timely response, and post event forensics activities are
supported.
3.3.2. IS Incident Management. The BSI should establish incident response and
reporting procedures to handle |S-related incidents. All employees,
contractors and third party users shall be required to note and report any
observed or suspected security weaknesses in systems. An effective incident
response program includes the following components, among others:
© A mechanism to log, monitor and quantify the nature, criticality and
estimated cost of IS incidents.
© Assessment of the nature and scope of the incident and identification of
what information has been accessed or misused;
© Measures to contain and control the incident to prevent further
unauthorized access to or misuse of information, while preserving records
and other evidence;
© Prompt notification to BSP of any confirmed IT-related fraud cases or major
security breaches, consistent with existing regulations;
© Notification to appropriate law enforcement authorities in situations
involving criminal violations requiring immediate attention; and
‘© Notification to customers when warranted.
Log files are critical to the successful investigation and prosecution of security
incidents and can potentially contain sensitive information. Therefore, the BS!
should strictly control and monitor access to log files whether on the host or in
a centralized logging facility.
Information Security Page 8 of 9Appendix 75b
Where a follow-up action against a person or organization after an IS incident
involves legal action, evidence shall be collected, retained, and presented to
conform to the rules for evidence laid down in the relevant jurisdiction.
3.3.3. Ongoing risk assessment. The BSI should continuously gather and analyze
information regarding new threats and vulnerabilities, actual attacks on the
institution or others, and the effectiveness of the existing security controls. It
should evaluate the information gathered to determine the extent of any
required adjustments to the various components of the IS program.
Depending on the nature of changing environment, the BSI needs to reassess
the risk and make changes to its security process (e.g. security strategy,
controls implementation or security monitoring requirements).
The BSI should adjust its IS program to reflect the results of ongoing risk
assessment and the key controls necessary to safeguard customer informati
and ensure the proper disposal of customer information. It should adjust the
program to take into account changes in IT, sensitivity of its customer
information, internal or external threats, and the BSI's own changing business
arrangements such as mergers, acquisitions, alliances and joint ventures,
‘outsourcing arrangements, and changes in customer information systems.
4, ROLES OF IT AUDIT AND SECURITY SPECIALISTS
4.1. Audit and Compliance Reviews. IT auditors are usually charged to assess, on a
regular basis, the effectiveness of a BSI’s IS security program. To fulfill this task, they
must have an understanding of the protection schemes, the security framework and
the related issues, including compliance with applicable laws and regulations.
The BSI should engage independent security specialists to assess the strengths and
weaknesses of critical applications, systems and networks prior to initial
implementation.
For BSIs providing electronic and similar services, annual vulnerability assessment”
and penetration testing” should be performed by an external party to provide early
identification of threats and vulnerabilities so that appropriate security measures
can immediately be implemented.
Vulnerability assessment (also known as vulnerability analysis) is a process that defines, identifies, and
classifies the security flaws (vulnerabilities) in a computer, network, or communications infrastructure. In
addition, vulnerability assessment can forecast the effectiveness of proposed countermeasures and evaluate
their actual effectiveness after they are put into use.
® penetration test is the process of using approved, qualified personnel to conduct real-world attacks against
_a system so_as to identify and correct security weaknesses before they are discovered and exploited by others.
Information Security Page 9 of 9Appendix 75¢
IT RISK MANAGEMENT STANDARDS AND GUIDELINES
Area: Project Management/Development, Acquisition and Change Management
1. INTRODUCTION
1.1. Because technology is constantly evolving, Management of BSIs should periodically
assess their uses of IT as part of overall business planning. Such an enterprise-wide
and ongoing approach should be formalized in the IT strategic plan to help ensure
that all major IT projects are consistent with its overall strategic goals.
1.2. As part of their strategic goals, BSIs may need to constantly introduce new or
enhanced products and services, improve systems and processes and implement
updates and innovations in IT to secure and manage voluminous information and
maintain their competitive position. This necessity may oftentimes result to
initiating IT projects; which may be in the form of internal or external development
of software applications or systems, acquisition and/or implementation of new or
enhanced hardware, software, infrastructure or services with or without the help of
third party providers. .
1.3. IT projects, when managed improperly, often result in late deliveries, cost overruns,
or poor quality applications. Inferior applications can result in underused, unsecure,
or unreliable systems, Retrofitting functional, security, or automated-control”™
features into applications is expensive, time consuming, and often results in less
effective features. Therefore, BSIs should carefully manage IT-related projects to
ensure they meet organizational needs on time and within budget.
2. ROLES AND RESPONSIBILITIES
2.1. The size and complexity of a project dictates the required number and qualifications
of project personnel. Duties may overlap in smaller organizations or lower-risk
projects; however, all projects should include appropriate segregation of duties or
compensating controls.
2.2. Board of Directors (Board) and Senior Management. The BSI’s Board and senior
management should review, approve, and monitor IT projects that may have
significant impact on its operations, earnings or capital. They are responsible to
ensure that IT projects support business objectives and adequate resources are
available to complete these projects. Consequently, they should establish adequate
policies and strategies to achieve these and ensure that risks related to IT projects
are managed appropriately.
Senior management is expected to have more knowledge and involvement in the
day-to-day operations of these IT projects to critically evaluate the design and
‘oversee the related operation and activities. They should ensure that IT projects are
coordinated and undertaken in adherence to appropriate policies, standards, and
risk management controls. They should periodically inform the Board and/or IT
2 an IT project is a task involving the acquisition, development or maintenance of a technology product.
% qutomated controls are software routines designed into programs to ensure the validity, accuracy,
completeness and avallability of input, processed and stored data.
Project Management/Development, Acquisition and Change Management Page 1 of 9Appendix 75¢
Steering Committee of the IT initiatives and the related risks that these may pose to
the BSI. They should also review, approve, document and report deviations from
established policies and standards.
2.3. Quality Assurance. An independent party (e.g. the quality assurance function, the
TRM function or the technology audit team), who is not involved in the project
development, should conduct a quality assurance review of major IT-related
projects, with the assistance of the legal and compliance functions, if necessary. This
review is to ensure compliance with the project life cycle” methodology, other
internal policies, control requirements, regulations and applicable laws.
3. PROJECT MANAGEMENT STANDARDS AND METHODOLOGY
3.1, Project Management. The BSI should establish a general framework for
management of major technology-related projects. This framework should, among
other things, specify the project management methodology to be adopted and
applied to these projects. The methodology should cover, at a minimum, allocation
of responsibilities, activity breakdown, budgeting of time and resources, milestones,
check points, key dependencies, quality assurance, risk assessment and approvals.
A BSI that needs to coordinate multiple IT projects should establish standards for
coordinating and managing the projects from an enterprise-wide perspective. The
standards should, at a minimum, include guidelines for project prioritization,
resource coordination and progress reporting,
3.2. Project Methodology. The BSI should adopt and implement a full project life cycle
methodology governing the process of developing, implementing and maintaining
major computer systems. In general, this should involve phases of project initiation,
feasibility study, requirement definition, system design, program development,
system and acceptance testing, training, implementation, operation and
maintenance.
The project life cycle methodology should define clearly the roles and responsibilities
for the project team and the deliverables” from each phase. It also needs to contain
@ process to ensure that appropriate security req ments are identified when
formulating business requirements, built during program development, tested and
implemented.
4, PROJECT PLANNING AND INITIATION
4.1. A formal project committee, to ensure the development of well-structured
applications, should be established with clear details of its terms and reference. The
committee should at least consist of the following representatives:
© Senior management, to provide strategic direction and ensure full commitment;
© User departments, to ensure that the application design meets their
requirements;
project fe cycle refers toa logical sequence of activities to accomplish a project's goals or objectives
® Deliverables are project goals and expectations. They include broadly-defined, project or phase
requirements and specfically-defined tasks within project phases.
Project Management/Development, Acquisition and Change Management Page 2019Appendix 75¢
© Internal audit department, to act as in independent party to ensure adequate
controls are diligently applied at all times. However, internal audit participation
should only be on an advisory capacity; and
© IT department, to provide technical knowledge and skills.
4.2. A feasibility study should be performed to identify the expected costs and benefits of
developing a system, and also to decide either to utilize internal resources or to
outsource to a vendor. In case of outsourcing, the responsibility of the senior
management does not diminish in ensuring that a well-designed application is
developed. The senior management maintains the responsibility for ensuring that
minimum controls are in place and are in accordance with the BSI’s standards.
4.3. When management proposes a new hardware, software or IT solution and/or
changes to existing ones, it should ensure that functional, operational and regulatory
requirements are accurately identified and clearly detailed in request for proposals
(RFP”5) or invitations-to-tender (ITT) that it distributes to vendors or third-party
service providers (TSP) in the bid solicitation process. Moreover, relevant security
requirements should be clearly specified before a new system is developed or
acquired. A review should also be conducted to ensure an appropriate balance
between security and other objectives (ease-of-use, operational simplicity, abi
upgrade, acceptable cost, etc.) is achieved.
4.4, During the development and acquisition of new systems or other major IT projects,
project plans should address issues such as — a) business requirements for
resumption and recovery alternatives; b) information on back-up and storage; c)
hardware and software requirements at recovery locations; d) BCP and
documentation maintenance; e) disaster recovery testing; and f) staffing and
facilities. Likewise, during maintenance, where there are changes to the operating
environment, business continuity considerations should be included in the change
control process and implementation phase.
4.5. Proper planning should be employed to ensure IT projects meet their objectives.
Project control systems should be employed to monitor specific target completion
dates for each task of systems development against original targets. Periodic reports
to senior management such as, project priorities and status, resource allocations,
target deviations and budgets, should be in place to measure project effectiveness.
5, SYSTEMS DEVELOPMENT
5.1, Development projects involve the creation of applications, integrated application
systems and other critical softwares. Software development projects are completed
in-house, through outsourcing, or by a combined approach. To manage this type of
projects, the BSI should establish development standards that, at a minimum,
address project management, system control, and quality assurance issues. Project
management standards should address issues such as project management
methodologies, risk management procedures, and project approval authorities.
RFP is a document that a BSI sends to a vendor inviting the vendor to submit a bid for hardware, software,
services, or any combination of the three. An institution typically issues the RFP in order to assess competing
bids.
Project Management/Development, Acquisition and Change Management Page 3 of9Appendix 75¢
System control standards should address items such as an application's functional,
security, and automated control features. Quality assurance standards should
address issues such as the validation of project assumptions, adherence to project
standards, and testing of a product's performance.
5.2. Development standards should also include procedures for managing internally
developed spreadsheets and database reports. BSIs often rely on the spreadsheets
and reports to make important budgeting and asset/liability decisions, but fail to
implement adequate testing, documentation, and change-control procedures.
Management's reliance on the spreadsheets and reports should dictate the formality
of their development procedures, change controls, and backup techniques.
5.3. Programming standards should be designed to address issues such as the selection
of programming languages and tools, the layout or format of scripted code,
interoperability between systems, and the naming conventions of code routines and
program libraries. These will enhance the BSI’s ability to decrease coding defects
and increase the security, reliability, and maintainability of application programs.
6. SYSTEM ACQUISITION
6.1. Software package acquisition is an alternative to in-house systems development and
should be subject to broadly similar controls as the project life cycle. A proper
software selection analysis should be conducted to ensure that user and business
requirements are met. In particular, the process should involve detailed evaluation
of the software package and its supplier (e.g. its financial condition, reputation and
technical capabi is in doubt, alternatives should be
developed to reduce the adverse impact from loss of a vendor's service.
6.2. The contract agreement between the BSI and vendor should be legally binding. The
BSI should ensure all contract agreements outline all expected service levels and are
properly executed to protect its interest. It is also important to ensure that vendor
technicians and third-party consultants are subjected to at least, or preferably more
stringent policies and controls compared to the in-house staff. In the case where
contract personnel are employed, written contracts should also be in effect.
7. CHANGE MANAGEMENT
7.4. Change management is the process of planning, scheduling, applying, distributing
and tracking changes to application systems, system software (e.g. operating
systems and utilities), hardware, network systems, and other IT facilities and
equipment. The change management procedures should be formalized, enforced
and adequately documented. Authorization and approval are required for all
changes and the personnel responsible for program migration should be identified.
For the purpose of accountability, proper sign-off should be adequately
implemented where formal acknowledgement is obtained from all related parties.
7.2. An effective change management process helps to ensure the integrity and reliability
of the production environment. To ensure IT-related modifications are appropriately
authorized, tested, documented, implemented and disseminated, the change
manage process should include the following:
Project Management/Development, Acquisition and Change Management Page 4 of 9Appendix 75c
© Classification and prioritization of changes and determination of the impact of
changes;
© Roles and responsibilities of each relevant party, including IT functions and end-
user departments, with adequate segregation of duties. This is to ensure that no
single person can effect changes to the production environment without the
review and approval of other authorized personnel;
© Program version controls and audit trails;
© Scheduling, tracking, monitoring and implementation of changes to minimize
business disruption;
‘© Process for rolling-back changes to re-instate the original programs, system
configuration or data in the event of production release problems; and
© Post implementation verification of the changes made (e.g. by checking the
versions of major amendments).
7.3, Requested changes should be screened before acceptance to determine alternate
methods of making the changes, the cost of changes and time requirements for
programming activity. System analysts should assess the impact and validity of the
proposed changes and all critical change requests should be set as priority.
7.4. The actual cause that led to the request for change should be identified and
adequately documented. Formal reports on analysis for problems raised and status
of change requests (including closed and outstanding) should be reported to senior
management on a periodic basis.
7.5. Audit trail of all change requests should be maintained. Programmers’ activities
should be controlled and monitored, and all jobs assigned should also be closely
monitored against target completion dates.
7.6. To enable unforeseen problems to be addressed in a timely and controlled manner,
the BSI should establish formal procedures to manage emergency changes.
Emergency changes should be approved by the information owner (for application
system or production data-related changes) and other relevant parties at the time of
change. If the change needs to be introduced as a matter of urgency and it is
impracticable to seek the approval of the information owner, endorsement should
be sought from the information owner after the implementation as soon as
practicable (e.g. on the following business day).
7.7. Emergency changes should be logged and backed up {including the previous and
changed program versions and data) so that recovery of previous program versions
and data files is possible, if necessary. Emergency changes need to be reviewed by
independent personnel to ensure that the changes are proper and do not have an
undesirable impact on the production environment. They should be subsequently
replaced by proper fixes through the normal acceptance testing and change
management procedures.
7.8. Management should ensure that vendors permitted remote access to network
resources are properly authorized. System logs showing activity on the system
should be reviewed to ensure that unauthorized remote access has not taken place
Management may institute time of day restrictions for remote access, to limit the
duration of time a user can access the network remotely (e.g. only during business
Project Management/Development, Acquisition and Change Management Page 5 of 9Appendix 75¢
hours). Vendors utilizing dial in access should be verified through call back
procedures and/or through the use of a modem that can be turned on when
authorization has been granted by the system administrator.
7.9. Data patching could severely compromise the integrity of the database in production
systems and should strictly be avoided. The BSI should adequately ensure the
accuracy and reliability of its database and the integrity of its data. Good project
management discipline requires validation of data input, data integrity testing, user
sign-off, impact analysis and escalation of decision to senior management should be
adopted to ensure accuracy and validity of data before live implementation.
8, SYSTEMS TESTING
8.1. A formal acceptance process should be established to ensure that only properly
tested and approved systems are promoted to the production environment. System
and user acceptance testing should be carried out in an environment separate from
the production environment. Production data should not be used in development or
acceptance testing unless the data has been desensitized (i.e. not disclosing personal
or sensitive information) and prior approval from the information owner has been
obtained. Performance testing should also be performed before newly developed
systems are migrated to the production environment.
8.2. Sufficient testing is important to ensure that design and overall reliability of the
application systems are in accordance with original specifications. Tests should be
conducted using documented test plans that should encompass all predetermined
data or processing problems and business scenarios.
8.3. User acceptance testing should be performed in a separate environment. All related
users are responsible to ensure that adequate test scenarios are formulated and
sufficiently tested. Successful test activities should be formally confirmed and
accepted by users, before the modified programs can be transferred to the
production environment.
9. SYSTEMS MIGRATION
9.1, A secured library for program pending migration to the production environment
should be established. The secured library or quarantine area for all amended
programs should only be accessible by the personnel who performed the migration
process and restricted from the application programmers. This is to mitigate the risk
of programmers changing the modified programs after user acceptance testing, but
prior to the program migration,
9.2, Source compare procedure should be in place to verify changes and to ensure no
unauthorized changes have been made. Modified programs should be compared to
the authorized change documents to determine that only approved specification
changes were implemented.
9.3. Updates or a version control for all applications should be maintained. Old versions
of source codes®* should be archived as contingency measure, with a clear indication
* Source codes are software program instructions written in format (language) readable by humans.
Project Management/Development, Acquisition and Change Management Page 6 of 9Appendix 75¢
of the precise date, time and all necessary information while the latest version of the
source codes and databases should be strictly protected. Version controls may also
be implemented to ensure only authorized programs are migrated to quarantine and
production environments.
10. SOURCE CODE CONVERSION AND MAINTENANCE
10.1. Conversion of source codes into object codes”” should be adequately controlled in
order to mitigate the risks of unauthorized changes and to ensure accurate and
complete results, The conversion process should only be performed by designated
personnel. In the case where the compiler programs or other systems
development tools are used, it should be placed under restricted control and the
access and execution rights are strictly monitored.
10.2. In cases where core applications are developed by vendors but the source codes
were not released to the BSI, the institution’ interest should be protected in the
form of a written agreement. The agreement, generally known as escrow
agreement, should allow the BSI to access the source programs under conditions,
such as, but not limited to, discontinued product support or financial insolvency by
the vendor. A third-party entity should be appointed to retain these programs and
documents in escrow. However, it is important for the BSI to periodically
determine that the source code maintained in escrow is up-to-date. If the BSI
decides not to go into a source code escrow agreement, appropriate controls or
contingency plans should be established as necessary, to continue adequate
operation of the business or process the acquired program case it
becomes problematic, obsolete, or ceases to function.
11. SYSTEMS DOCUMENTATION
11.1 All standards and procedures on systems development and documentation on user
manuals should be formally established and properly maintained to ensure
consistency of approach. Accessibility to these documents should be strictly
confined only to those who are authorized to receive such information in order for
them to effectively discharge their duties.
11.2 Management should identify the type and level of documentation personnel must
produce during each project phase. Project documentation of major IT projects,
especially development and acquisition, should include project requests, feasibility
studies, project plans, testing plans, etc. System documentation, which focuses on
system analysis and design, should include system concept narratives, data flow
charts, and database specifications. Application documentation should include
application descriptions, programming flowcharts, and operations and user
instructions. The documentation should be revised as needed throughout the
project life cycle.
11.3 Documentation standards should identify primary documentation custodians and
detail document authoring, approving, and formatting requirements. Personnel
should document all changes to system, application, and configuration
® object codes are software program instructions complied (translated) from source code into machine-
readable formats.
Project Management/Development, Acquisition and Change Management Page 7 of 9114
Appendix 75¢
documentation according to prescribed standards. Additionally, management
should control access to documentation libraries with appropriate library and
version controls.
All standards and documentation should be kept secured to prevent unauthorized
access. The BSI should maintain a central storage (of either hardcopy or softcopy)
of all standards and documentation onsite as well as in an offsite premise for
contingency purposes. In the case where the application is developed by a vendor,
management should ensure that adequate training and manuals are provided as
part of the package, stated in writing and clearly understood by all parties. The BS!
should also ensure complete and updated system documentation is provided.
12, POST-IMPLEMENTATION REVIEW
12.1.
12.2.
A post implementation review should be conducted at the end of a project to
validate the application’s operational performance, after it has begun to operate.
The relative success of the project should be gauged by comparing planned and
actual cost, benefits and completion time. If the planned objectives do not
materialize, reasons should be reviewed and documented in a post
implementation evaluation report that should be presented to senior management
highlighting any operational or project management deficiencies noted.
The responsibilities for conducting post-implementation review can be assigned to
the BSI’s IT audit function. In larger IT organizations, formal quality assurance or
change management groups may have primary responsibility for post-
implementation reviews. in such cases, the IT auditor may choose not to perform a
separate review but instead to participate in establishing the test criteria and
evaluating results of any other independent reviews.
13, DISPOSAL
13.1.
The BSI may sometimes need to remove surplus or obsolete hardware, software,
or data. Primary tasks include the transfer, archiving, or destruction of data
records. Management should transfer data from production systems in a planned
and controlled manner that includes appropriate backup and testing procedures.
The BSI should maintain archived repository of data in accordance
record retention requirements and system documentation
reinstallation of a system into production, when necessary. Management should
destroy data by overwriting old information or degaussing (demagnetizing) disks
and tapes.
14, ROLE OF AUDIT, INFORMATION SECURITY AND QUALITY ASSURANCE OFFICERS
14.4
14.2
‘Audit. The BSI's auditors assist user departments, project managers, and system
designers in identifying system control requirements and testing the controls
during development and after implementation. Please refer to Item 6.1 of
Appendix 75a for the detailed guidelines on audit’s participation in the
development, acquisition, and maintenance of major systems.
Information Security. The BSI should ensure that systems are developed, acquired
and maintained with appropriate security controls, To do this, management
Project Management/Development, Acquisition and Change Management Page 8 of 9Appendix 75¢
should ensure that ~ a) systems are developed and implemented with necessary
security features enabled and based on established security control requirements;
b) software is trustworthy by implementing appropriate controls in the different
project phases; and c) appropriate configuration management and change control
processes exist, including an effective patch management process. Management
should establish security control requirements based on their risk assessment
process evaluating the value of the information at risk and the potential impact of
unauthorized access, damage or other threats.
14.3. Quality Assurance. Independent quality assurance function is a critical part of well-
managed IT projects. Comprehensive quality assurance, risk management, and
testing standards provide the best means to manage project risks and ensure IT
projects, especially software, include expected functionality, security, and
operability, as applicable.
Project Management/Development, Acquisition and Change Management Page 9.0f9Appendix 75d
IT RISK MANAGEMENT STANDARDS AND GUIDELINES
Area: IT Operations
1. INTRODUCTION
1.1. The evolving role IT plays in supporting the business function has become
increasingly complex. IT operations — traditionally housed in a computer data center
with user connections through terminals ~ have become more dynamic and include
distributed environments, integrated applications, telecommunication options,
internet connectivity, and an array of IT operating platforms”. With the advent of
technology, even small BSIs have now become increasingly reliant on IT to achieve
operational efficiency and deliver innovative products and services. Although some
of these BsIs have developed their products and services in-house, many have relied
‘on vendors and service providers to develop and operate these products and
services.
1.2. The increasing dependency to IT of BSIs has consequently resulted to heightened
risk exposures arising from their reliance on a variety of IT solutions and services
and third-party relationships as well. itis also emphasized that risks involve more
than IT and that controls include sound processes and well-trained people. To many
BSls, effective support and delivery from IT operations has become vital to the
performance of most of their critical business lines. This necessitates the adoption
of risk management processes that promote sound and controlled operation of IT
environments to ensure that IT operations process and store information in a
timely, reliable, secure, and resilient manner.
2. ROLES AND RESPONSIBILITIES
2.1. Board of Directors (Board) and Senior Management. The BSI's Board and senior
management are responsible for overseeing a safe, sound, controlled and efficient IT
operating environment that supports the institution’s goals and objective. Although
they can delegate implementation and oversight of daily operations to IT
management, final responsibility for these activities remains with the Board and
senior management. Consequently, the Board and senior management are
responsible for understanding the risks associated with existing and planned IT
operations, determining the risk tolerance of the BSI, and establishing and
monitoring policies for risk management.
On the other hand, IT operations management is primarily responsible in ensuring
the BSI’s current and planned infrastructure is sufficient to accomplish the strategic
plans of senior management and the Board. To accomplish this objective, operations
management should ensure the BSI has sufficient personnel (in knowledge,
experience, and number), system capacity and availability, and storage capacity to
achieve strategic objectives. Operations management should select or recommend IT
28 IT operating platform includes the underiying computer system on which application programs cun. A
platform consists of an operating system, the computer system's coordinating program, which in turn is built
fon the instruction set for a processor or microprocessor, and the hardware that performs logic operations and
manages data movement in the computer. =
IT Operations Page 1 of 3Appendix 75d
solutions that can meet strategic requirements with reduced resources to control
capital expenditures and operating costs.
IT OPERATIONS STANDARDS:
3.1. Technology Inventory. To effectively identify, assess, monitor, and manage the risks
associated with IT operations, management should have a comprehensive
understanding of the BSI’s operations universe. Regardless of size, BSI management
should perform and maintain an inventory of all its IT resources, recognize
iterdependencies of these systems and understand how these systems support the
associated business lines. Management should ensure the inventory is updated on
an on-going basis to reflect the BSI’s IT environment at any point in time.
Appropriate documentation of infrastructure and data flow should be in place to
facilitate risk identification, application of controls, and ongoing maintenance of
information systems. At a minimum, said documentation should include among.
others, the following components:
© Hardware - Inventory should be comprehensive to include BSI's owned assets and
equipment owned by other parties but located within the environment. To the
extent possible, hardware items should be marked with a unique identifier, such
as a bar code, tamper-proof tag, or other label.
© Software - There are at least three major categories of software the BSI! should
include in the software inventory: operating systems, application software, and
back-office and environmental applications.
‘0. Network Components and Topology”® - Network management should develop and
maintain high-level topologies that depict local area networks (LANS™),
metropolitan area networks (MANs™) and wide area networks (WANs™). The
topologies should have sufficient detail to facilitate network maintenance and
‘troubleshooting, facilitate recovery in the event of a disruption and plan for
expansion, reconfiguration, or addition of new technology.
© Data Flow Diagram - Management should also develop data flow diagrams to
supplement its understanding of information flow within and between network
segments as well as across the BSI’s perimeter to external parties. Data flow
diagrams are also useful for identifying the volume and type of data stored on
various media. In addition, the diagrams should identify and differentiate
® a network is @ group of two or more computers that are linked together. For example, networks allow users
at different branches or different workstations to access the Internet, send and receive email, and share
printers, applications, and data, A network topology pictorally describes the arrangement or architecture of &
network, including its workstations and connecting communication lines.
® A LAN is a network that connects workstations in a relatively small geographic area, such as a building.
Computers connected in a LAN are usually connected by cables, but they can also be connected wirelessly.
31 A MAN is a network that usually spans a city or a large campus. A MAN usually interconnects a number
lof LANs using a high-capacity backbone technology, such as fiber-optical links, and provides up-link services
to WAN and the internet.
52 WAN is a network that connects other networks together. WANs are typically complicated networks
covering broad areas (ie,, any network that links across metropolitan, regional, or national boundaries) and
allowing many computers and other devices to communicate and share data.
IT Operations Page 2 of 13Appendix 75d
between data in electronic format, and in other media, such as hard copy or
optical images.
© Media - Descriptive information should identify the type, capacity, and location of
the media. It should also identify the location, type, and classification (public,
private, confidential, or other) of data stored on the media. Additionally,
management should document source systems, data ownership, back up
frequency and methodology (tape, remote disk, compact disc (CD), or other), and
the location of back-up media if other than at the primary off-site storage facility.
3.2, Risk Assessment. Once inventory is complete, management should employ a variety
of risk assessment techniques to identify threats and vulnerabilities to its IT
operations, covering among others, the following:
© Internal and external risks;
‘©. Risks associated with individual platforms, systems, or processes as well as those
of a systemic nature; and
© The quality and quantity of controls.
The risk assessment process should be appropriate to the BSI’s IT risk profile. To the
extent possible, the assessment process should quantify the probability of a threat
or vulnerability and the financial consequences of such an event.
After the BSI identifies and analyzes the universe of risks, management should
prioritize risk mitigation actions based on the probability of occurrence and the
ncial, reputational or legal impact to the institution. Management should
prioritize the risk assessment results based on the business importance of the
associated systems. The probability of occurrence and magnitude of impact provide
the foundation for establishing or expanding controls for safe, sound, and efficient
operations appropriate to the risk tolerance of the BSI.
3.3. Risk Mitigation & Control Implementation
3.3.1. Policies, Standards and Procedures. Board and management should enact
policies, standards and procedures sufficient to address and mitigate the risk
exposure of the BSI. The BSI should adopt minimum IT standards to establish
measurable controls and requirements to achieve policy objectives.
Procedures describe the processes used to meet the requirements of the BSI's
IT policies and standards. Management should develop written procedures for
critical operations which procedures should be updated and reviewed
regularly. The scope of required procedures depends on the size, complexity
and the variety of functions performed by the BSI’s IT operations.
TT Operations Page 3 of 13,‘Appendix 75d
3.3.2. Controls Implementation
3.3.2.1. Environmental Controls. IT equipment should have a continuous
uninterruptible power supply (UPS). Management should configure
the UPS to provide sufficient electricity within milliseconds to power
equipment until there is an orderly shutdown or transition to the
back-up generator. The back-up generator should generate sufficient
power to meet the requirements of mission critical IT and
environmental support systems. Similarly, IT operations centers
should have independent telecommunication feeds from different
vendors. Wiring configurations should support rapid switching from
‘one provider to another without burdensome rerouting or rewiring.
Even small IT operations centers with modest IT equipment can
contain a significant amount of computer cabling. Management
should physically secure these cables to avoid accidental or malicious
disconnection or severing. In addition, management should document
wiring strategies and organize cables with labels or color codes to
facilitate easy troubleshooting, repair, and upgrade
Every operations center should have adequate heating, ventilation,
and air conditioning (HVAC) systems in order for personnel and
equipment to function properly. Organizations should plan their HVAC
systems with the requirements of their IT systems in mind. Also,
operations personnel should be familiar with written emergency
procedures in the event of HVAC system disruption.
Water leaks can cause serious damage to computer equipment and
cabling under raised floors. For this reason, operations centers should
be equipped with water detectors under raised flooring to alert
management of leaks that may not be readily visible. Management
should also consider installing floor drains to prevent water from
collecting beneath raised floors or under valuable computer
equipment.
‘A variety of strategies are available for fire suppression. Ideally, the
fire suppression system should allow operators time to shut down
computer equipment and cover it with waterproof covers before
releasing the suppressant.
Lastly, Management should consider using video surveillance and
recording equipment in all or parts of the facility to monitor activity
and deter theft. Management should also use inventory labels, bar
codes, and logging procedures to control the inventory of critical and
valuable equipment.
» UPS is a device that allows computer to keep running for at least a short time when the primary power
source is lost. A UPS may also provide protection from power surges. A UPS contains a battery that "kicks in”
when the device senses a loss of power from the primary source allowing the user time to save any data they
are working on and to exit before the secondary power source (the battery) runs out. When power surges
‘occur, @ UPS intercepts the surge so that it doesn't damage the computer,
TF Operations Page 4 of 13Appendix 75d
fenance. All maintenance activities should follow a
predetermined schedule. A record of all maintenance activities should
be maintained to aid management in reviewing and monitoring
employee and vendor performance. Management should schedule
time and resources for preventive maintenance and coordinate such
schedule with production. During scheduled maintenance, the
computer operators should dismount all program and data files and
work packs, leaving only the minimum software required for the
specific maintenance task on the system. If this is impractical,
management should review system activity logs to monitor access to
programs or data during maintenance. Also, at least one computer
operator should be present at all times when the service
representative is in the computer room.
In case a vendor performs computer maintenance online, operators
should be aware of the online maintenance schedule so that it does
not interfere with normal operations and processing. Operators and
information security personnel should adhere to established security
procedures to ensure they grant remote access only to authorized
maintenance personnel at predetermined times to perform specific
tasks.
Operators should maintain a written log of all hardware problems and
downtime encountered between maintenance sessions. A periodic
report on the nature and frequency of those problems is a necessary
management tool, and can be valuable for vendor selection,
equipment benchmarking, replacement decisions, or planning
increased equipment capacity.
3.3.2.3, Change Management™ & Control. Complex BSis should have a
change management policy that defines what constitutes a "change"
and establishes minimum standards governing the change process.
Simple BSIs may successfully operate with less formality, but should
still have written change management policies and procedures.
All changes should flow through the oversight function, which may
include appropriate representation from business lines, support
areas, IT management, information security, and internal audit. In
establishing a framework for managing change, a policy should be
present describing minimum standards and including such factors as
notification, oversight, and control. Control standards should address
risk, testing, authorization and approval, timing of implementation,
post installation validation, and back-out or recovery.
© change management refers to the broad processes for managing organizational change. Change
management encompasses planning, oversight or governance, project management, testing and
implementation. a
T Operations. Page 5 of 13,Appendix 75d
3.3.2.4. Patch Management®®. Management should establish procedures to
stay abreast of patches, to test them in a segregated environment,
and to install them when appropriate. Change management
procedures should require documentation of any patch installations.
‘Management should develop a process for managing version control
of operating and application software to ensure implementation of
the latest releases. Management should also maintain a record of the
versions in place and should regularly monitor the internet and other
resources for bulletins about product enhancements, security issues,
patches or upgrades, or other problems with the current versions of
the software.
3.3.2.5. Conversions. Conversions involve major changes to existing systems
or applications, or the introduction of systems or data sets which may
span multiple platforms. Consequently, they have a higher level of risk
requiring additional, specialized controls. Conversions, if improperly
handled, may result to corrupt data; hence, strong conversion
policies, procedures, and controls are critical. Likewise, since the
ramifications of conversion span IT operations, it is important for
‘management to periodically re-evaluate all operations processes and
consider the appropriateness of process re-engineering.
3.3.2.6. Network Management Controls. Network standards, design,
diagrams and operating procedures should be formally documented,
kept updated, communicated to all relevant network staff and
reviewed periodically. Communications facilities that are critical to.
continuity of network services should be identified. Single points of
failure should be minimized by automatic re-routing of
‘communications through alternate routes should critical nodes or
links fail.
The network should be monitored on a continuous basis to reduce the
likelihood of network traffic overload and detect network intrusions.
Powerful network analysis and monitoring tools, such as protocol
analyzers, network scanning and sniffer tools, are normally used for
monitoring network performance and detecting potential or actual
intrusions. These powerful network tools should be protected from
unauthorized usage (e.g. viewing of unencrypted sensitive
information). The use of network tools should also be tightly
restricted to authorized staff only and be subject to stringent approval
and review procedures.
© a patch i a piece of software designed to fix problems with, or update a computer program or its supporting
data. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance,
‘Though meant to fix problems, poorly designed patches can sometimes introduce new problems. In some
special cases, updates may knowingly break the functionality, for instance, by removing components for that
the update provider is no longer licensed. Patch Management is the process of using a strategy and plan of
_what patches should be applied to which systems at a specified time.
TT Operations Page 6 of 13Appendix 75d
3.3.2.7. Disposal of Media. Management should have procedures for the
destruction and disposal of media containing sensitive information.
These procedures should be risk-based relative to the sensitivity of
the information and the type of media used to store the information.
Furthermore, disposal procedures should recognize that records
stored on electronic media, including tapes, and disk drives present
unique disposal problems in that residual data can remain on the
media after erasure. Since data can be recovered, additional disposal
techniques should be applied to remove sensitive information,
3.3.2.8. Imaging. Management should ensure there are adequate controls to
Protect imaging processes, as many of the traditional audit and
controls for paper-based systems may be reduced. Management
should also consider issues such as converting existing paper storage
files, integration of the imaging system into the organization
workflow, and business continuity planning needs to achieve and
maintain business objectives.
3.3.2.9. Event/Problem Management. Management should ensure
appropriate controls are in place to identify, log, track, analyze, and
resolve problems that occur during day-to-day IT operations. The
event/problem management process should be communicated and
readily available to all IT operations personnel. Management should
ensure it trains all operations personnel to act appropriately during
significant events. Employees should also receive training to
understand event response escalation procedures.
Operations personnel should be properly trained to recognize events
that could trigger implementation of the business continuity plan.
Although an event may not initially invoke the plan, it may become
necessary as conditions and circumstances change. Management
should train and test BSI personnel to implement and perform
appropriate business continuity procedures within the timeframes of
the BCP. Operations personnel should properly log and record any
events that trigger BCP response and document their ultimate
resolutions,
3.3.2.10. User Support/Help Desk. User support processes and activities
should ensure end users continuously have the resources and
services needed to perform their job functions in an efficient and
effective manner. In complex BSIs, the help desk function provides
user support, which typically consists of dedicated staff trained in
problem resolution, equipped with issue tracking software, and
supported with knowledge-based systems that serve as a reference
resource to common problems. In simple BSIs, user support may
consist of a single person, a very small group, or a contract with a
support vendor,
The help desk should record and track incoming problem reports,
_ whether handled by live operators or automated systems.
T Operations Page 7 of 13,TT Operations
33.211,
3.3.2.12.
Appendix 75d
Documentation in the tracking system should include such data as
user, problem description, affected system (platform, application, or
other), prioritization code, current status toward resolution, party
responsible for resolution, root cause (when identified), target
resolution time, and a comment field for recording user contacts and
other pertinent information. The help desk should evaluate and
prioritize issues to ensure the most critical problems receive prompt
attention.
Help desk functions may also be supported by knowledge based-
systems that provide support staff with action responses to common
problems. Strong support functions continually update the
knowledge based-systems with information obtained from vendors
and from the experiences of help desk staff. Because attrition rates
in the help desk function can be high, a knowledge based-system can
ensure the BSI retains knowledge and facilitates the training and
development of new employees.
Proper authentication of users is critical to risk management within
the user support function. If the help desk uses a single
authentication standard for all requests, it should be sufficiently
rigorous to cover the highest risk scenarios. However, the BSI may
choose to use different levels of authentication depending upon the
problem reported, the type of action requested, or the platform,
system, or data involved. If the help desk function is outsourced,
management should determine the service provider's information
access level, assign the functions it will perform, and ensure that
security and confidentiality remain in place.
Scheduling. The BSI should implement policies and procedures for
creating and changing job schedules and should supplement them
with automated tools when cost effective. Sound scheduling
practices and controls prevent degraded processing performance
that can affect response time, cause delays in completing tasks, and
skew capacity planning. Automated scheduling tools are necessary
for large, complex systems to support effective job processing.
Smaller and less complex IT systems generally have a standard job
stream with little need for change.
‘Systems and Data Back-up. The BS! should ensure that sufficient
number of backup copies of esser business information, software
and related hardcopy documentations are available for restoration or
critical operations. A copy of these information, documentation and
software should also be stored in an off-site premise or backup site
and any changes should be done periodically and reflected in all
copies.
The BSI should back-up and store its data and program files in a
secure off-site location to allow restoration of systems, applications,
and associated data in the event normal processing is disrupted by a
Page 8 of 133.3.2.13.
Appendix 75d
disaster or other significant event. A full system backup should be
periodically conducted and should at least consist of the updated
version of the operating software, production programs, system
utilities and all master and transaction files. The frequency of backup
should depend on its criticality, but should be performed after critical
modification or updates. Management should implement a storage
solution that is manageable from an administrative perspective and
usable and accessible from the customer and end-user perspectives
to enable them to receive current, complete and accurate data.
Storage solutions should be appropriately scalable to allow for future
growth.
Written standards should document back-up methodologies,
delineate responsibilities of appropriate personnel, and ensure
uniform performance throughout the institution. Management
should maintain inventories of back-up media stored off-site and
periodically perform physical inventories to ensure all required back-
up materials are available. Procedures should include verifying
adherence to the back-up schedule and reviewing actual back-up
copies for readability. Similarly, management should periodically test
back-up copies by actually using them to restore programs and data.
All backup media should be properly labeled using standard naming
conventions. Management should develop a rotation scheme that
addresses varying storage durations as well as transportation and
storage of multiple formats of media at the off-site storage location.
Transportation to the backup site should be done in controlled and
secured manner with proper authorization and record. Procedures
for disposal of backup media should also be in place.
Systems Reliability, Availability and Recoverability.
© System Availability
BSIs should achieve high systems availability (or near zero system
downtime) for critical systems which is associated with
maintaining adequate capacity, reliable performance, fast
response time, scalability and swift recovery capability. Built-in
redundancies for single points of failure should be developed and
contingency plans should be tested so that business and operating
disruptions can be minimized.
© Technology Recovery Plan
Business resumption very often relies on the recovery of IT
resources that include applications, hardware equipment and
network infrastructure as well as electronic records. The
technology requirements that are needed during recovery for
individual business and support functions should be specified
when the recovery strategies for the functions are determined.
T Operations
Page 9 of 13Appendix 75d
Appropriate personnel should be assigned with the responsibility
for technology recovery. Alternate personnel needs to be
identified for key technology recovery personnel in case of their
unavailability to perform the recovery process.
‘As unavailability of systems may result to disruptive impact on its
operations, the BS! should develop an IT disaster recovery plan to
ensure that critical application systems and technology services
can be resumed in accordance with the business recovery
requirements. In formulating an effective recovery plan, scenario
analysis should be included to identify and address various types
of contingency scenarios. Scenarios such as major system outages
which may be caused by system faults, hardware malfunction,
ir errors or security incidents as well as a total
lity of the primary data centre should be considered. To
strengthen recovery measures relating to large scale disruptions
and to achieve risk diversification, rapid operational and backup
capabilities at the individual system or application cluster level
should be implemented. Recovery and business resumption
priorities must be defined accordingly. Specific recovery objectives
including recovery time objective® (RTO) and recovery point
objective” (RPO) should be established for systems and
applications.
© Alternate sites for technology recovery
The BSI should make arrangements for alternate and recovery
sites* for their business functions and technology in the event the
business premises, key infrastructure and systems supporting
critical business functions become unavailable. A recovery site
‘geographically separate from the primary site must be established
to enable the restoration of critical systems and resumption of
business operations should a disruption occur at the primary site.
The required speed of recovery will depend on the criticality of
resuming business operations, the type of services and whether
there are alternative ways and processing means to maintain
adequate continuing service levels to satisfy customers. Recovery
strategies and technologies such as on-site redundancy and real-
time data replication could be explored to enhance the BSI’s
recovery capabi
The recovery site could either be an in-house backup premise that
has a redundant hardware system located away from the
computer center, or a third-party recovery facility provider that
requires formal subscription to its service, or a combination of
* RTO refers to the required time taken to recover an IT system from the point of disruption.
® RPO refers to the acceptable amount of data loss for an IT system should a disaster occur.
Recovery site is an alternate location for processing information (and possibly conducting business) in an
emergency.
IT Operations Page 10 of 13Appendix 75d
both solutions. The recovery facility should be at a distance that
would protect it from damage from any incident occurring at the
primary site, Ideally, it should be on different electrical power and
telecommunication switches, and free from the same disaster. The
BSI should ensure that the IT systems at the recovery sites are:
© Compatible with the BSI's primary systems (in terms of capacity
and capability) to adequately support the critical business
functions; and
© Continuously updated with current version of systems and
application software to reflect any changes to the BSI's system
configurations (eg. hardware or software upgrades or
modifications).
In case where a third-party recovery facility is used, there should
be a written contract agreement that is legally binding. The
agreement should specifically identify the conditions under which
the recovery facility may be used and specify how customers
would be accommodated if simultaneous disaster conditions
occur to several customers of the recovery facility provider. The
recovery facility should allow the BSI to use its services until it
achieves a full recovery from the disaster and resumption of
activity at the BSI’s own facility.
The BSI which outsources critical systems to offshore service
providers is heavily dependent on the stability and availability of
cross-border network links. To minimize impact to business
operations in the event of a disruption (e.g. due to earthquake),
cross-border network redundancy with strategies such as
‘engagement of different network service providers and alternate
network paths may be instituted.
Disaster Recovery Testing
The BSI should always adopt pre-determined recovery actions that
have been tested and endorsed by management. The
effectiveness of recovery requirements and the ability of BSI’s
personnel in executing or following the necessary emergency and
recovery procedures should be tested and validated at least
annually.
Various scenarios which include total shutdown or inaccessibility
of the primary data center, as well as component failure at the
individual system or application cluster level should be included in
disaster recovery tests. Inter-dependencies between and among
critical systems should be included in the tests. BSIs whose
networks and systems are linked to specific service providers and
vendors, should consider conducting bilateral or multilateral
recovery testing.
TT Operations
Page 11 of 13Appendix 75d
Business users should be involved in the design and execution of
comprehensive test cases so as to obtain assurance that
recovered systems function accordingly. The BSI should also
participate in disaster recovery tests of systems hosted overseas.
Periodic testing and validation of the recovery capability of backup
media should be carried out and assessed for adequacy and
effectiveness. Backup tapes and disks containing sensitive data
should be encrypted before they are transported offsite for
storage.
3.4. Risk Monitoring
3.4.1.
3.4.3.
Service Level Agreement (SLA). BSI Management of IT functions should
formulate an SLA with business units which will measure the effectiveness and
efficiency of delivering IT services. Measurable performance factors include
system availability and performance requirements, capacity for growth, and
the level of support provided to users, resource usage, operations problems,
capacity, response time, personnel activity, as well as business unit and
external customer satisfaction. Adequate procedures should be in place to
manage and monitor delivery of committed services.
. Control Self-Assessments” (CSAs). The BSI may consider the conduct of
periodic CSAs to validate the adequacy and effectiveness of the IT control
environment. They also facilitate early identification to allow management to
gauge performance, as well as the criticality of systems and emerging risks.
Depending on the complexity of the BSI’s IT risk profile, the content and
format of the CSAs may be standardized and comprehensive or highly
customized, focusing on a specific process, system, or functional area. IT
operations management may collaborate with the internal audit function in
creating the templates used. Typically, the CSA form combines narrative
responses with a checklist. The self-assessment form should identify the
system, process, or functional area reviewed, and the person(s) completing
and reviewing the form. CSA's however, are not a substitute for a sound
internal audit program. Management should base the frequency of CSA the
risk assessment process and coordinate the same with the internal audit plan.
Performance Monitoring. The BSI should implement a process to ensure that
the performance of IT systems is continuously monitored and exceptions are
reported in a timely and comprehensive manner. The performance monitoring
process should include forecasting capability to enable problems to be
identified and corrected before they affect system performance. Monitoring
and reporting also support proactive systems management that can help the
BSI position itself to meet its current needs and plan for periods of growth,
mergers, or expansion of products and services.
BSI Management should also conduct performance monitoring for outsourced
IT solutions as part of a comprehensive vendor management program. Reports
from service providers should include performance metrics, and identify the
® csnisa technique use to asses risk and conto strength and weaknesses agsns contol framework
Operations
Page 12 of 133.4.4,
Appendix 75d
root causes of problems. Where service providers are subject to SLAs,
management should ensure the provider complies with identified action
plans, remuneration, or performance penalties.
Capacity Planning. Management should monitor IT resources for capacity
planning including platform processing speed, core storage for each platform's
central processing unit, data storage, and voice and data communication
bandwidth. Capacity planning should be closely integrated with the
budgeting and strategic planning processes. It also should address personnel
issues including staff size, appropriate training, and staff succession plans.
This process should help the preparation of workload forecasts to identify
trends and to provide information needed for the capacity plan, taking into
account planned business initiatives. Capacity planning should be extended to
cover back-up systems and related facilities in addition to the production
environment.
4, ROLE OF IT AUDIT
4.1. The BSI's IT audit function should regularly assess the effectiveness of established
controls within the IT operations en
ynment through audits or other independent
verification. Audits provide independent assessments rendered by qualified
individuals regarding the effective funct
ing of operational controls.
“© Bandwidth is a terminology used to indicate the transmission or processing capacity of a system or of @
specific location in a system (usually a network system) for information (text, images, video, sound), itis
usually defined in bits per second (bps)
IT Operations
Page 13 of 13Appendix 75e
IT RISK MANAGEMENT STANDARDS AND GUIDELINES
Area: IT Outsourcing / Vendor Management
1, INTRODUCTION
1.1. With globalization and advancement in IT, BSIs increasingly rely on services provided
by other entities to support an array of IT-related functions. The ability to outsource
IT systems and process enables a BSI to manage costs, obtain necessary expertise,
expand customer product offerings, and improve services. While outsourcing offers a
cost-effective alternative to in-house capabilities, it does not reduce the
fundamental risks associated with IT or the business lines that use it. Risks such as
loss of funds, loss of competitive advantage, damaged reputation, improper
disclosure of information and regulatory action remain. Because the functions are
performed by an organization outside the BSI, the risks may be realized in a different
manner than if the functions were inside resulting in the need for well-structured
process to properly manage risks and ensure that the interest of customers will not
be compromised.
2. ROLES AND RESPONSIBILITIES
2.1, Board of Directors (Board) and Senior Management. The responsibility for the
oversight and management of outsourcing activities and accountability for all
outsourcing decisions continue to rest with the BSI’s Board and senior management.
They should establish and approve enterprise-wide policies, appropriate to the IT
risk profile of the institution. This framework should govern the end-to-end
perspective of outsourcing process and shall provide the basis for management to
identify, measure, monitor, and control the risks associated with IT-related
outsourcing arrangements.
3, IT OUTSOURCING / VENDOR RISK MANAGEMENT PROGRAM
3.1 Risk Assessment. Prior to entering into an outsourcing plan, the BSI should clearly
define the business requirements for the functions or activities to be outsourced,
assess the risk of outsourcing those functions or activities and establish appropriate
measures to manage and control the identified risks. Risk assessment should take
"to consideration the criticality of the services to be outsourced, the capability of
the technology service provider (TSP)‘ and the technology it will use in delivering
the outsourced service. Such assessment should be made periodically on existing
arrangements as part of the outsourcing program and review process of the BSI.
3.2 Service Provider Selection. Before selecting a service provider, the BSI should
perform appropriate due diligence of the provider’s financial soundness, reputation,
* 15ps include @ wide range of entities including but not limited to affliated entities, non-affiliated entities, and alliances
of companies providing technology products and services. These services may include but not limited to the following: a)
Information and transaction processing and settlement activities that support banking functions; b) electronic banking-
related services; c) Internet-related services; d) security monitoring; e) systems development and maintenance; f)
aggregation services; and g) digital certification services. Other terms used to describe TSPs include vendors and
external/outsourced service providers.
TT Outsourcing / Vendor Management Page 1 of 7Appendix 75e
managerial skills, technical capabilities, operational capability and capacity in
relation to the services to be outsourced. The depth and formality of the due
diligence performed may vary depending on the nature of the outsourcing
arrangement and the BSI’s familiarity with the prospective service providers.
Contract negotiation should be initiated with the service provider determined to
best meet the business requirements of the BSI.
Due diligence undertaken during the selection process should be documented and
reviewed periodically, using the most recent information, as part of the monitoring
and control processes of outsourcing.
3.3. Outsourcing Contracts. The contract is the legally binding document that defines all
aspects of the servicing relationship and one of the most important controls in
outsourcing process. It should be clearly written and sufficiently detailed to pro
assurances for performance, reliability, security, confidentiality and reporting. Before
signing a contract, management should:
© Ensure the contract clearly defines the rights and responsibilities of both parties
and contains or supported by adequate and measurable service level agreements;
© Ensure contracts with related entities clearly reflect an arms-length relationship
and costs and services are on terms that are substantially the same, or at least as
favorable to the BSI, as those prevailing at the time for comparable transactions
with non-related third parties;
© Choose the most appropriate pricing method for the BS1’s needs;
‘© Ensure service provider's physical and data security standards meet or exceed the
BSI's standards. Any breach in security should be reported by the service provider
to the BSI;
‘© Engage legal counsel to review the contract; and
‘© Ensure the contract contains the minimum provisions required under existing BSP
rules and regulations, like access by BSP to systems and databases outsourced,
and the same does not include any provisions or inducements that may adversely
affect the BSI (ie. extended terms, significant increases after the first few years,
substantial cancellation penalties)
Each agreement should allow for renegotiation and renewal to enable the BSI to
retain an appropriate level of control over the outsourcing and the right to intervene
with appropriate measures to meet its legal and regulatory obligations. The
agreement should also acknowledge BSP’s supervisory authority over the BSI and the
right of access to information on the BSI and the service provider.
‘Some service providers may contract with third-parties in providing IT services to the
BSI. The extent to which subcontractors perform additional services should be
limited to peripheral or support functions while the core services should rest with
the main service provider. The BSI should retain the ability to maintain similar
control over its outsourcing risks when a service provider uses subcontractors in the
course of rendering the IT-related services. Agreements should have clauses setting
out the rules and limitations on subcontracting. To provide accountability, it may be
beneficial for the BSI to include a provision specifying that the contracting service
provider shall remain fully responsible with respect to parts of the services which
TT Outsourcing / Vendor Management Page 2 of 7Appendix 75e
were further outsourced to subcontractors. It should also consider including
notification and approval requirements regarding changes to the service provider's,
significant subcontractors.
‘An annual review of the outsourcing agreements should be performed to assess
whether the agreements should be renegotiated and renewed to bring them in line
with current market standards and to cope with changes in their business strategies.
When renegotiating contracts, the BS! should ensure that the provider delivers a
level of service that meets the needs of the institution over the life of the contract.
3.4 Service Level Agreement (SLA). SLAs formalize the performance standards against
which the quantity and quality of service should be measured. Management should
include SLAs in its outsourcing contracts to specify and clarify performance
expectations, as well as establish accountability for the outsourced activity. The BSI
should link SLA to the provisions in the contract regarding incentives, penalties and
contract cancellation in order to protect themselves in the event the service provider
failed to meet the required level of performance.
Management should closely monitor the service provider's compliance with key SLA
provision on the following aspects, among others:
Availability and timeliness of services;
Confidentiality and integrity of data;
Change control;
Security standards compliance, including vulnerability and penetration
management;
Business continuity compliance; and
© Help desk support.
0000
°
SLAs addressing business continuity should measure the service provider's
contractual responsibility for backup, record retention, data protection, and
maintenance and testing of disaster recovery and contingency plans. Neither
contracts nor SLAs should contain any extraordinary provisions that would exempt
the service provider from implementing its contingency plans (outsourcing contracts
should include clauses that discuss unforeseen events for which the BSI would not be
able to adequately prepare)
3.5 Ong
1g Monitoring
3.5.1. Monitoring Program. As outsourcing relationships and interdependencies
increase in materiality and complexity, the BSI needs to be more proactive in
managing its outsourcing relationships. It should establish a monitoring
program to ensure service providers deliver the quantity and quality of
services required by the contract. The resources to support this program will
vary depending on the criticality and complexity of the system, process, or
service being outsourced.
The program should employ effective mechanisms to monitor key aspects of
the outsourcing relationship and the risk associated with the outsourced
activity, particularly the following:
TT Outsourcing / Vendor Management Page 3 0f7Appendix 75e
‘© contract/SLA performance;
© material problems encountered by the service provider which may impact
the BSI;
© financial condition and risk profile; and
© business continuity plan, the results of testing thereof and the scope for
improving it.
To increase the effectiveness of monitoring mechanisms, management should
periodically classify service provider relationships to determine which service
providers require closer monitoring. Relationships with higher risk
classification should receive more frequent and stringent monitoring for due
diligence, performance (financial and/or operational), and independent
control validation reviews.
Personnel responsible for monitoring activities should have the necessary
expertise to assess the risks and should maintain adequate documentation of
the process and results thereof. Management should use such documentation
when renegotiating contracts as well as developing business continuity
planning requirements.
Reports on the monitoring and control activities of the BSI should be prepared
or reviewed by its senior management and provided to its Board. The BS!
should also ensure that any adverse development arising from any outsourced
activity is brought to the attention of the senior management, or the Board,
when warranted, on a timely basis. Actions should be taken to review the
outsourcing relationship for modification or termination of the agreement.
3.5.2. Financial Condition of Service Providers. The BSI should have an on-going
monitoring of the financial condition of its service providers as financial
problems may jeopardize the quality of its service and possibly the integrity of
the data in its possession. In the event management recognizes that the
financial condition of the provider is declining or unstable, more frequent
financial reviews of said provider are warranted.
3.5.3. General Control Environment of the Service Provider. The BSI should also
implement adequate measures to ensure service providers are only given
access to the information and systems that they need in order to perform
their function. Management should restrict their access to BSI’s systems, and
appropriate access controls and monitoring should be in place between the
service provider’s systems and the BSI.
3.6 Business Continuity Planning Consideration. The BSI should integrate the provider's
BCP into its own plan, communicate functions to the appropriate personnel, and
maintain and periodically review the combined plan. It should ensure that service
provider tests its plan annually and notify the institution of any resulting
modifications.
3.7 Compliance with BSP Regulations. The BSI should ensure that appropriate up-to-
date records relevant to its outsourcing arrangements are maintained in its premises
TT Outsourcing / Vendor Management Page 4 of 7Appendix 75e
and kept available for inspection by the BSP Examiners. The outsourcing agreement
should explicitly provide a clause allowing BSP and BSIs’ internal and external
auditors to review the operations and controls of the service provider as they relate
to the outsourced activity
In addition to the general guidelines on outsourcing contracts stated in Item No. 3.3
of this Appendix, the BSIs intending to outsource must comply with existing BSP rules
and regulations on outsourcing.
4, EMERGING OUTSOURCING MODELS
4.1. With continued and fast growth of technology, outsourcing of IT-related systems and
processes has been a constant theme among BSIs. While outsourcing strategy allows
BSIs to achieve growth targets, operational efficiency and cost savings, this also
exposes them to various levels and kinds of risks. Potential risk exposures and other
significant supervisory concerns are further heightened by the emergence of flexible
and innovative outsourcing models (i.e. shared-services, offshoring and cloud
computing).
4.2. Due mainly to the perceived implications for greater flexibility and availability at
lower cost, cloud computing is a subject that has been receiving a good deal of
attention. Currently, the most widely accepted definition of cloud computing is as
follows —
‘A model for enabling ubiquitous, convenient, on-demand network access to a
shared poo! of configurable computing resources that can be rapidly
provisioned and released with minimal management effort or service
provider interaction.”
4.3. In general, cloud computing is a migration from owned resources to shared
resources in which client users receive IT services, on demand, from third-party
service providers a.k.a. Cloud Service Providers (CSP) via the Internet “cloud.” This
emerging model allows BSIs the option to move from a capital-intensive approach to
a more flexible business model that lowers operational costs. Cloud computing
technologies can be implemented in a wide variety of architectures, under different
service and deployment models, and can coexist with other technologies and
software design approaches. The four (4) cloud deployment models include the
following:
© Private Cloud — A private cloud is operated solely for an institution and is closely
related to the existing IT outsourcing models in the marketplace, but can be an
institution’s internal delivery model as well.
© Public Cloud - A public cloud is owned and operated by a CSP that delivers
services to the general public or a large industry group via the internet or other
computer network using a multi-tenant platform.
© Community Cloud ~ It is a private-public cloud with users having a common
connection or affiliation, such as a trade association, the same industry or a
® National Institute of Standards Technology, The NIST Definition of Cloud Computing: Special Publication 800-
145, 2011, www.nist.gov/iti/cloud/
T Outsourcing / Vendor Management Page 5 of 7Appendix 75¢
common locality. It allows a CSP to provide cloud tools and applications specific
to the needs of the community.
‘© Hybrid Cloud - This model composes two or more clouds (private, community or
public). A hybrid cloud leverages on the advantage of the other cloud models,
thus, providing a more optimal user experience.
4.4, Cloud computing is perceived to play an increasingly important role in a wide range
of development initiatives, including among others, offering small to medium-sized
BSIs critical access to infrastructure and computational resources that would
otherwise be out of their financial reach or are too complex to manage. While the
advantages of adopting an outsourced cloud-based component are undeniable, the
fact remains that cloud computing also creates disruptive possibilities and potential
risks. Many of the threats identified are not necessarily unique to the cloud
environment. In fact, risks such as potential data loss, poor management by a
service provider, service interruption and unauthorized access to sensitive data are
also applicable to traditional forms of outsourcing. Cloud computing, however, adds
new dimensions to the traditional outsourcing risks, thus, the vulnerabilities and the
probability of the risk event occurring is amplified. BSIs should be fully aware of the
unique attributes and risks associated with cloud computing, particularly in the
following areas: (Details are shown in the attached Annex “A”)
Legal and Regulatory Compliance;
Governance and Risk Management;
Due Diligence;
Vendor Management/Performance and Conformance;
Security and Privacy;
Data Ownership and Data Location and Retrieval;
Business Continuity Planning.
0000000
45. Among the four (4) cloud models, the private cloud deployment is most similar to
traditional outsourcing model, thus, offers the least amount of new risks and security
challenges. Implementation of this model is allowed subject to compliance with
existing BSP rules and regulations on outsourcing. Adoption of community and
hybrid cloud deployment models may also be allowed with prior BSP approval,
subject to the following:
© Compliance with existing BSP rules and regulations on outsourcing;
© Implementation of more robust risk management systems and controls required
for these types of arrangements;
‘© Issues set out in the attached Annex “A” are properly addressed prior to
executing the plans; and
© BSP may be allowed to perform onsite validation prior to implementing the cloud.
computing arrangement/s.
46, However, given the increased probability of risk & exposure to potential issues
related to business operations, confidentiality and compliance which are critical in
the financial service industry, the BSP, at present, would only allow the use of pul
cloud computing model for non-core operations and business processes (e.g. email,
office productivity, collaboration tools, claims and legal management, etc.) which
TT Outsourcing / Vendor Management Page 6 0f7Appendix 75e
do not directly involve sensitive BSI and customer data. BSP approval of public cloud
deployment model for non-core operations shall be subject to the same conditions
in item 4.5 above. Core operations and business processes whose importance is
fundamental in ensuring continuous and undisturbed operation of IT systems used
to directly perform banking and financial services (e.g. CA/SA, Loans, Trust and
Treasury systems, ATM switch operations, electronic delivery systems and systems
used to record banking operations) are not allowed to use public cloud computing
service. Distinguishing whether a particular actual operation or business is “core” or
“non-core” and classifying the data (e.g. confidential, critical, sensitive, public)
associated with the system or application are, therefore, significant considerations
in determining permissibility of public cloud model for this type of operation or
process.
4,7. BSIs should consult BSP before making any significant commitment on cloud
‘computing
5. ROLE OF IT AUDIT
5.1. The BSI should conduct a regular, comprehensive audit of its service provider
relationships. The audit scope should include a review of controls and operating
procedures that help protect the BSI from losses due to irregularities and willful
manipulations. Such responsibility can be assigned to the SI's IT audit function. In
case the BSI has no technical audit expertise, the non-technical audit methods can
provide minimum coverage and should be supplemented with comprehensive
external IT audits.
TT Outsourcing / Vendor Management Page 7 of7Annex “A”
Despite its many potential benefits, cloud computing also brings with it potential areas of
concern, when compared with computing environments found in traditional data centers.
Some of the more fundamental concerns include the following:
© Legal and Regulatory Compliance
Important considerations for any BSI before deploying a cloud computing model include
dlearly understanding the various types of laws and regulations that potentially impact
cloud computing initiatives, particularly those involving confidentiality, visibility, data
location, privacy and security controls and records management. The nature of cloud
computing may increase the complexity of compliance with applicable laws and
regulations because customer data may be stored or processed offshore. The BSI’s
ability to assess compliance may be more complex and difficult in an environment where
the Cloud Service Provider (CSP) processes and stores data overseas or comingles the
BSI's data with data from other customers that operate under diverse legal and
regulatory jurisdictions. The BSI should understand the applicability of local laws and
regulations and ensure its contract with a CSP specify its obligations with respect to the
BSIs’ responsibilities for compliance with relevant laws and regulations. CSP’s processes
should not compromise compliance with the following, among others:
Law on Secrecy of Deposits (RA. No. 1405);
Foreign Currency Deposit System (R.A. 6426)
Anti-Money Laundering Act, particularly on data/file retention;
Electronic Commerce Act (R.A. 8792);
Data Privacy Law;
Cybercrime Prevention Act;
General Banking Laws (R.A. No. 8791); and
Regulations concerning IT risk management, electronic banking, consumer
protection, reporting of security incidents and other applicable BSP issuances,
rules and regulations.
oo0o000000
Lastly, the CSP should grant BSP access to its cloud infrastructure to determine
compliance with applicable laws and regulations and assess soundness of risk
management processes and controls in place.
© Governance and Risk Management
The use of outsourced cloud services to achieve the BSI's strategic plan does not
diminish the responsibility of the Board of Directors and management to ensure that the
outsourced activity is conducted in a safe and sound manner and in compliance with
applicable laws and regulations. The BSI Management should consider overall business
and strategic objectives prior to outsourcing the specific IT operations to the cloud
computing platform. A Board-approved outsourcing policy and rationale for outsourcing
to the cloud environment should be in place to ensure that the Board is fully apprised of
all the risks identified
Outsourcing to a CSP can be advantageous to a BSI because of potential benefits such as
cost reduction, flexibility, scalability, improved load balancing, and speed. However,
assessing and managing systems that use cloud services can be a formidable
1T Outsourcing / Vendor Management Page 1 ofS‘Annex “A”
challenge due mainly to the unique attributes and risks associated with a cloud
environment especially in areas of data integrity, sovereignty, commingling, platform
multi-tenancy, recoverability and confidentiality as well as legal issues such as regulatory
compliance, auditing and data offshoring. Cloud computing may require more robust
controls due to the nature of the service. When evaluating the feasibility of outsourcing
to a CSP, it is important to look beyond potential benefits and to perform a thorough
due diligence and risk assessment of elements specific to the service. Vendor
management, information security, audits, legal and regulatory compliance, and
business continuity planning are key elements of sound risk management and risk
mitigation controls for cloud computing. As with other service provider offerings, cloud
computing may not be appropriate for all BSIs.
o Due
The due diligence in selecting a qualified CSP is of paramount importance to ensure that
it is capable of meeting the BSI’s requirements in terms of cost, quality of service,
compliance with regulatory requirements and risk management. Competence,
infrastructure, experience, track record, financial strength should all be factors to
consider. When contemplating transferring critical organizational data to the cloud
computing platform, it is critical to understand who and where all of the companies and
individuals that may touch the BSI’s data. This includes not only the CSP, but all vendors
or partners that are in the critical path of the CSP. Background checks on these
companies are important to ensure that data are not being hosted by an organization
that does not uphold confidentiality of information or that is engaging in malicious or
fraudulent activity, Business resiliency and capability to address the BSI's requirements
for security and internal controls, audit, reporting and monitoring should also be
carefully considered.
© Vendor Management/Performance and Conformance
It is always important to thoroughly review the potential CSP’s contract terms,
conditions and Service Level Agreement (SLA). This is to ensure that the CSP can legally
offer what it has verbally committed to and that the cloud risk from the CSP’s service
offerings is within the determined level of acceptable risk of the BSI. The SLA should
ensure adequate protection of information and have details on joint control
frameworks. It should also define expectations regarding handling, usage, storage and
availability of information, and specify each party's requirements for business continuity
and disaster recovery. At a minimum, the SLA should cover the provisions required
under existing rules and regulations on outsourcing.
‘A vendor management process should be in place that proactively monitors the
performance of the CSP on an ongoing basis. This is also to guarantee availability and
reliability of the services provided and ability to provide consistent quality of service to
support normal and peak business requirements. If a BSI is using its own data centre, it
can mitigate and prepare for outages. However, if itis using a cloud computing service, it
has to put all its trust in the cloud service provider delivering on its SLA. This requires
that SLA has sufficient means to allow transparency into the way a CSP operates,
including the provisioning of composite services which is a vital ingredient for effective
oversight of system security and privacy by the BSI.
T Outsourcing / Vendor Management _ Page 2ofAnnex “A”
Continuous monitoring of information security requires maintaining ongoing awareness
of security controls, vulnerabilities, and threats to support risk management decisions.
Collection and analysis of available data about the state of the system should be done
regularly and as often as needed by the BSI to manage security and privacy risks, as
appropriate for each level of the organization involved in decision making. Transition to
public cloud services entails a transfer of responsibility to the CSP for securing portions
of the system on which the BSI’s data and applications operate. To fulfill the obligations
of continuous monitoring, the organization is dependent on the CSP, whose cooperation
is essential, since critical aspects of the computing environment are under its complete
control.
Cloud services that allow CSP to further outsource or subcontract some of its services
may also heighten concerns, including the scope of control over the subcontractor, the
responsibilities involved (e.g., policy and licensing arrangements), and the remedies and
recourse available should problems occur. A CSP that hosts applications or services of
other parties may involve other domains of control, but through transparent
authentication mechanisms, appear to the BSI to be that of the CSP. Requiring advanced
disclosure of subcontracting arrangements, and maintaining the terms of these
arrangements throughout the agreement or until sufficient notification can be given of
any anticipated changes, should be properly enforced.
‘Additionally, the complexity of a cloud service can obscure recognition and analysis of
incidents. The CSP’s role is in performing incident response activities, including
incident verification, attack analysis, containment, data collection and preservation,
problem remediation, and service restoration. Each layer in a cloud application stack,
including the application, operating system, network, and database, generates event
logs, as do other cloud components, such as load balancers and intrusion detection
systems; many such event sources and the means of accessing them are under the
control of the cloud provider. It is important that the CSP has a transparent response
process and mechanisms to share information with ‘the BSI during and after the incident.
Understanding and negotiating the provisions and procedures for incident response
should be done before entering into a service contract, rather than as an afterthought.
The geographic location of data is a related issue that can impede an investigation, and
isa relevant subject for contract discussions. Revising the BSI's incident response plan to
address differences between the organizational computing environment and the cloud
computing environment is also a prerequisite to transitioning applications and data to
the cloud.
Lastly, to effectively monitor services including risk and risk mitigation associated with
the use of a CSP, the BSI and the CSP should agree in advance that former shall have
accessibility to the CSP to audit and verify the existence and effectiveness of internal and
security controls specified in the SLA. The BSI’s audit policies and practices may require
adjustments to provide acceptable IT audit coverage of outsourced cloud computing. It
may also be necessary to augment the internal audit staff with additional training and
personnel with sufficient expertise in evaluating shared environments and virtualized
technologies. In addition, the parties may also agree on the right to audit clause via
external party as a way to validate other control aspects that are not otherwise
Tr Outsourcing / Vendor Management Page 3 of 5‘Annex “A”
accessible or assessable by the BSI's own audit staff. Ideally, the BSI should have control
‘over aspects of the means of visibility to accommodate its needs, such as the threshold
for alerts and notifications, and the level of detail and schedule of reports.
© Security and Privacy
Security and privacy concerns continue to be a major issue within a cloud computing
model. Given the obvious sensitivity of data and the regulated environment within
which they operate, BSIs utilizing cloud systems, need to have an assurance that any
data exposed on the cloud is well protected. They may need to revise their information
security policies, standards, and practices to incorporate the activities related to a CSP.
‘They should also have an understanding of and detailed contracts with SLAs that provide
the desired level of security to ensure that the CSP is applying appropriate controls. In
certain situations, continuous monitoring of security infrastructure may be necessary for
BSls to have a sufficient level of assurance that the CSP is maintaining effective controls.
It is important that BSls maintain a comprehensive data inventory and a suitable data
classification process, and that access to customer data is restricted appropriately
through effective identity and access management. A multi-tenant cloud deployment, in
which multiple clients share network resources, increases the need for data protection
through encryption and additional controls such as virtualization mechanisms to address
the risk of collating organizational data with that of other organizations and
compromising confidential information through third-party access to sensitive
information. Verifying the data handling procedures, adequacy and availability of backup
data, and whether multiple service providers are sharing facilities are important
considerations. If the BSI is not sure that its data are satisfactorily protected and access
to them is appropriately controlled, entering into a cloud service arrangement may not
be suitable.
Storage of data in the cloud could increase the frequency and complexity of security
incidents. Therefore, management processes of the BSI should include appropriate
notification procedures; effective monitoring of security-related threats, incidents and
events on both BSI’s and CSP’s networks; comprehensive incident response
methodologies; and maintenance of appropriate forensic strategies for investigation and
evidence collection.
© Data Ownership and Data Location and Retrieval
The BSI's ownership rights over the data must be firmly established in the contract to
enable a basis for trust and privacy of data. Ideally, the contract should state clearly that
the organization retains exclusive ownership over all its data; that the CSP acquires no
rights or licenses through the agreement, to use the BSI’s data for its own purposes; and
that the CSP does not acquire and may not claim any interest in the data due to security.
For these provisions to work as intended, the terms of data ownership must not be
subject to unilateral amendment by the CSP.
‘One of the most common challenges in a cloud computing environment is data location.
Use of an in-house computing center allows the BSI to structure its computing
environment and to know in detail where data is stored and what safeguards are used to
Tr Outsourcing / Vendor Management Page 4 of 5Annex “A”
protect the data. In contrast, the dynamic nature of cloud computing may result in
confusion as to where information actually resides (or is transitioning through) at a given
point in time, since multiple physical locations may be involved in the process. This
situation makes it difficult to ascertain whether sufficient safeguards are in place and
whether legal and regulatory compliance requirements are being met. One of the main
compliance concerns is the possible transborder flows of data which may impinge upon
varying laws and regulations of different jurisdictions.
To address the above constraints, the BSI should pay attention to the CSP’s ability to
isolate and clearly identify its customer data and other information system assets for
protection. Technical, physical and administrative safeguards, such as access controls,
often apply. Likewise, such concerns can be alleviated if the CSP has some reliable
‘means to ensure that an organization's data is stored and processed only within specific
jurisdictions. Lastly, external audits and security certificates can mitigate the issues to
some extent.
© Business Continuity Planning
The BCP in a BSI involves the recovery, resumption, and maintenance of the critical
business functions, including outsourced activities. Due to the dynamic nature of the
cloud environment, information may not immediately be located in the event of a
disaster. Hence, it is critical to ensure the viability of the CSP’s business continuity and
disaster recovery plans to address broad-based disruptions to its capabilities and
infrastructure. The plans must be well documented and tested. Specific responsi ies
and procedures for availability, data backup, incident response and recovery should be
Clearly understood and stipulated. Recovery Time Objectives should also be clearly
stated in the contract. It is critical for the BSI to understand the existence and
comprehensiveness of the CSP’s capabilities as well as its level of maturity to ensure that
during an intermediate or prolonged disruption or a serious disaster, critical operations
can be immediately resumed, and that all operations can be eventually reinstated in a
timely and organized manner. Other BCP-related concerns which must be addressed by
the BSI and CSP include the following:
© Prioritization arrangements in case of multiple/simultaneous disasters;
© Retention of onsite and offsite back-up (Whether to maintain an up-to-date backup
copy of data at the BSI's premises or stored with a second vendor that has no
common points of failure with the CSP); and
© Ability to synchronize documents and process data while the client-BS1 is offline.
Tr Outsourcing / Vendor Management Page Sof 5Appendix 75f
IT RISK MANAGEMENT STANDARDS AND GUIDELINES
Area: Electronic Banking, Electronic Payment, Electronic Money and
Other Electronic Products and Services
1, INTRODUCTION
1.1. Continuing technological innovation and competition among existing financial
institutions and new entrants have contributed to a wide array of electronic
products and services (e-services) available to customers. These products and
services have been widely adopted by BSIs in recent years and are now a component
of most institutions’ business strategy. Electronic delivery of services can have many
benefits for BSis and their customers and can also have implications on financial
condition, risk profile, and operating performance. The emergence of e- services
may contribute to improving the efficiency of the banking and payment system,
reducing the cost of retail transactions nationally and internationally and expanding
the target customers beyond those in traditional markets. Consequently, BSIs are
therefore becoming more aggressive in adopting electronic capabilities that include
sophisticated marketing systems, remote-banking capabilities, and stored value
programs.
1.2. Notwithstanding the significant benefits of technological innovation, the rapid
development of electronic capabilities carries risks as well as benefits and it is
important that these risks are recognized and managed by BSIs in a prudent manner
to promote safe and secure e-services and operations. The basic types of risks
generated by e-services are not new, the specific ways in which some of the risks
arise, as well as the magnitude of their impact may be new for BSIs and supervisors.
While existing risk management guidelines remain applicable to e-services, such
guidelines must be tailored, adapted and, in some cases, expanded to address the
specific risk management challenges created by the characteristics of such activities.
As the industry continues to address technical issues associated with e-services,
including security challenges, a variety of innovative and cost efficient risk
management solutions are likely to emerge. These solutions are also likely to address
issues related to the fact that BSls differ in size, complexity and risk management
culture and that jurisdictions differ in their legal and regulatory frameworks.
2. ROLES AND RESPONSIBILITIES.
2.1. Board of Directors (Board) and Senior Management. The Board is expected to take
an explicit, informed and documented strategic decision as to whether and how the
BSI is to provide e-services to their customers. The Board and senior management
should establish effective management oversight of the risks asso‘
activities, including the establishment of specific accountability, policies and controls
to manage these risks. Senior management oversight processes should operate on a
dynamic basis in order to effectively intervene and correct any material systems
problems or security breaches that may occur.
The Board should ensure that plans to offer e-services are consistent and clearly
integrated within corporate strategic goals. The BSI should also ensure that it does
not offer new e-services or adopt new technologies unless it has the necessary
expertise to provide competent risk management oversight. Management and staff
Electronic Products and Services Page 1 of 13Appendix 75f
expertise should be commensurate with the technical nature and complexity of the
BSI’s applications and underlying technologies.
The Board and senior management should ensure that the operational and security
risk dimensions of the BSI’s business strategies on e-services are appropriately
considered and addressed. The provision of e-services may significantly modify
and/or even increase traditional business risks. As such management should take
appropriate actions to ensure that the BSI’s existing risk management, security
control, due diligence and oversight processes for outsourcing relationships are
appropriately evaluated and modified to accommodate e-services.
BSI management should assess the impact of the implementation and ongoing
maintenance of e-services. These areas should be monitored and analyzed on an
‘ongoing basis to ensure that any impact on the BSI’s financial condition and risk
profile resulting from e-services is appropriately managed and controlled.
Management should evaluate e-services acceptance vis-a-vis the performance to the
its goals and expectations through periodic review of reports tracking customer
usage, problems such as complaints and downtime, unreconciled accounts or
transactions initiated through the system, and system usage relative to capacity.
Insurance policies may also need to be updated or expanded to cover losses due to
system security breaches, system downtime, or other risks from e-services.
2.2. Compliance Officer. The compliance officer or its equivalent should be aware and
informed of all relevant laws and regulatory requirements relative to the offering of
e-services, including those of other countries where they also intend to deliver cross-
border e-services. BSI management should ensure that these requirements are
complied with to minimize legal and compliance risks and other negative
implications.
3. RISK MANAGEMENT SYSTEM
3.1. The BSI should carefully evaluate the offering a new e-service to customers to ensure
that Management fully understands the risk characteristics and that there are
adequate staffing, expertise, technology and financial resources to launch and
maintain the service. A formal business strategy for introducing new service should
be in place and form part of the BSI’s overall strategy. The BS! should also perform
regular assessments to ensure that its controls for managing identified risks remain
proper and adequate.
3.2. The underlying risk management processes for e-services should be integrated into
the BSI’s overall risk management framework and the existing risk management
policies and processes should be evaluated to ensure that they are robust enough to
cover the new risks posed by current or planned activities. Relevant internal controls
and audit as required in BSI’s risk management system should also be enforced and
carried out as appropriate for its e-services. Regular review of the relevant policies
and controls should be performed to ascertain that these remain appropriate to the
risks associated with such activities.
3.3. The BSI should adjust or update, as appropriate, its information security program in
the light of any relevant changes in technology, the sensitivity of its customer
Electronic Products and Services Page 2 of 13Appendix 75f
information and internal or external threats to information. The BSI should ensure
that the related information security measures and internal control are installed,
regularly updated, monitored and are appropriate with the risks associated with
th
products and services.
4, RISK MANAGEMENT CONTROLS
4.1. Security Controls. The BSI should recognize that e-services should be secured to
achieve a high level of confidence with both customers and business. It is the
responsibility of BSI management to provide adequate assurances that transactions
performed and information flowed through the electronic delivery channels are
properly protected. For this reason, the BSI should maintain a strong and
comprehensive security control system. As such, in addition to the informal
security standards in Appendix 75b, the BSI should also provide the following
controls specific for e-se
4.1.1. Account Origination and Customer Verification. The BSI should use reliable
4.1.2.
methods for originating new customer accounts. Potentially significant risks
may arise when it accepts new customers through the internet or other
electronic channels. Thus, the BSI should ensure that in originating new
accounts using electronic channels, the KYC requirement which involves a
face-to-face process is strictly adhered to.
‘Authentication. The BSI should use reliable and appropriate authentication
methods to validate and verify the identity and authorization of customers.
The determination of the appropriate and reasonable authentication methods
to be used in specific e-services application should be based on management's
assessment of the risk posed by the electronic delivery channels adopted,
types and amounts of transactions allowed, the sensitivity and value of
customer information and transaction and the ease of using the
authentication method.
The use of single factor authentication alone is generally considered not
adequate for sensitive communications, high value transactions, third party
transfers or privileged user access (i.e., network administrators”). Multi-factor
techniques are necessary in those cases unless there are adequate security
measures, risk mitigating controls (e.g. in some authorized institutions, third-
party transfers are restricted to accounts that have been pre-registered) and
effective monitoring mechanism to detect suspicious transactions and unusual
activities. As authentication methods continue to evolve, the BS! should
monitor, evaluate and adopt industry sound practice in this area to ensure
appropriate changes are implemented for each transaction type and level of
access based on the current and changing risk factors.
The authentication process should be consistent with and support the BSI’s
overall security and risk management programs. An effective authentication
process should have customer acceptance, reliable performance, scalability to
Network administrator is the individual responsible for the installation, management and control of @
network.
Electronic Products and Services Page 3 of 13,Appendix 75f
accommodate growth and interoperability with existing systems and future
plans as well as appropriate policies, procedures and control.
4.1.3, Non-Repudiation“’, As customers and merchants originate an increasing
number of transactions, authentication and encryption become increasingly
important to ensure non-repudiation of transactions. In such cases, the BSI
should consider implementing non-repudiation controls in the form of digital
signatures, collision-free hash value of the entire transaction or unique
authorization code that will provide conclusive proof of participation of both
the sender and receiver in an online transaction environment. Public key
infrastructure’, digital signature‘, digital certificate” and certification
authority arrangements can be used to impart an enhanced level of security,
authentication and authorization which can uniquely identify the person
initiating transaction, detect unauthorized modifications and prevent
subsequent disavowal.
4.1.4, Authorization Controls and Access Privileges. Specific authorization and
access privileges should be assigned to all individuals, agents or systems,
which conduct activities on e-services. No individual agent or system should
have the authority to change his or her own authority or access privileges in
the e-services authorization database. Any addition of an individual, agent or
system or changes to access privileges should be duly authorized by an
authenticated source empowered with adequate authority and subject to
suitable and timely oversight and audit trails.
All systems that support e-services should be designed to ensure that they
interact with a valid authorization database. Appropriate measures should be
in place in order to make authorization databases reasonably resistant to
tampering. Authenticated e-services sessions should remain secure
throughout the full duration of the session. In the event of a security lapse,
the session should require re-authentication. Controls should also be in place
to prevent changes to authorization levels during e-services sessions and any
attempts to alter authorization should be logged and brought to the attention
of management.
“ Won-repudiation is a means of ensuring that a transferred message has been sent and received by the
parties claiming to have sent and received the message. Non-repudiation is a way to guarantee that the sender
of a message cannot later deny having sent the message and that the recipient cannot deny having received
the message.
* public Key Infrastructure (PKI) refers to the use of public key cryptography in which each customer has a key
pair (Le. unique electronic value called a public key and a mathematically-related private key). The private key
is used to encrypt (sign) a message that can only be decrypted by the corresponding public key or to decrypt
message previously encrypted with the public key. The public key Is used to decrypt message previously
encrypted (signed) using an individual's private key or to encrypt a message so that it can only be decrypted
(read) using the intended recipient's private key.
* Digital certificate is a digital code that can be attached to an electronically transmitted message that
uniquely identifies the sender. Like a written signature, the purpose of a digital signature is to guarantee that
the individual sending the message really is who he or she claims to be.
©” Digital Certificate is the electronic equivalent of an 1D card that authenticates the originator of digital
signature.
Certification Authority (CA) is the organization that attests using a digital certificate that a particular
electronic message comes from a specific individual or system.
Electronic Products and Services Page 4 of 13Appendix 75f
No person by virtue of rank or position should have any intrinsic right to
‘access confidential data, applications, system resources or facilities. Only
employees with proper authorization and whose official duties necessitate
access to such data, applications, system resources or facilities should be
allowed to access confidential information and use system resources solely for
legitimate purposes.
4.1.5. Confidentiality and Integrity of Information, Transactions and Records. The
BSI should ensure that appropriate measures are in place to ascertain the
accuracy, completeness and reliability of e-services transactions, records and
information that are either transmitted over the internal and external
networks or stored in BSI’s internal systems. Common practices used to
maintain data integrity include the following:
© E-services transactions should be conducted in a manner that make them
ly resistant to tampering throughout the entire process;
© E-services records should be stored, accessed and modified in a manner
that make them highly resistant to tampering;
© E-services transaction and record-keeping processes should be designed in
a manner as to make it virtually impossible to circumvent detection of
unauthorized changes.
© Adequate change control policies, including monitoring and testing
procedures, should be in place to protect against any system changes that
may erroneously or unintentionally compromise controls or data reliability;
and
© Any tampering with e-services transactions or records should be detected
by transaction processing, monitoring and record keeping functions.
The BSI should take appropriate measures to preserve the confidentiality of
key e-services information commensurate with the sensitivity of the
information being transmitted and/or stored in databases. It should ensure
that all intelligent electronic devices that capture information do not
expose/store information such as the PIN number or other information
classified as confidential and must also ensure that a customer’s PIN number
cannot be printed for any reason whatsoever. In addition, the BSI must
provide safe-to-use intelligent electronic devices and ensure that customers
are able to make safe use of these devises at all times.
The BSI should implement appropriate technologies to maintain
confidentiality and integrity of sensitive information, in particular customer
information. Cryptographic technologies can be used to protect the
confidentiality and integrity of sensitive information. The BSI should choose
cryptographic technologies that are appropriate to the sensitivity and
importance of information and the extent of protection needed and, only
those that are making use of internationally recognized cryptographic
algorithms where the strengths of the algorithms have been subjected to
extensive tests, In cases when the information is transmitted over public
network, the BSI should consider the need to apply strong end-to-end
encryption to the transmission of sensitive information.
Electronic Products and Services Page 5 of 13,Appendix 75f
To ensure adequate protection and secrecy of cryptographic keys whether
they are master keys, key encrypting keys or data encrypting keys, no single
individual should know entirely what the keys are or have access to all the
constituents making up these keys. All keys should be created, stored,
distributed or changed under the most stringent conditions. Likewise, use of
these keys should be logged and provided with timely oversight.
4.1.6. Application Security. The BSI should ensure an appropriate level of application
security in its electronic delivery systems. In selecting system development
tools or programming languages for developing e-services application systems,
it should evaluate the security features that can be provided by different tools
‘or languages to ensure that effective application security can be implemented.
In selecting an e-services system developed by a third party, the BSI should
take into account the appropriateness of the application security of the
system. It should test new or enhanced applications thoroughly using a
general accepted test methodology in a test environment prior to
implementation.
The BSI should consider the need to have customers confirm sensitive
transactions like enrolment in a new on-line service, large funds transfers,
account maintenance changes, or suspicious account activity. Positive
confirmations for sensitive on-line transactions provide the customer with the
‘opportunity to help catch fraudulent activity. The BSI can encourage customer
participation in fraud detection and increase customer confidence by sending
confirmations of certain high-risk activities through additional communication
channels such as the telephone, e-mail, or traditional mail.
Comprehensive and effective validation of input parameters (including user-
supplied data and database queries that may be submitted by the users’
computers) should be performed on server side. This prevents intentional
invalid input parameters from being processed by the e-services system that
may result in unauthorized access to data, execution of commands embedded
in the parameters or a buffer overflow attack’, Moreover, e-services systems.
should operate with the least possible system privileges.
Error messages generated by the application system for e-services customers
should not reveal details of the system which are sensitive. Errors should be
. appropriately logged. Similarly, the HTML” source code on the production
web server should not contain sensitive information such as any references or
comments that relate to the design features of the web application code.
The mechanism for managing an active e-services session should be secure.
Web pages containing sensitive information should not be cached in the
temporary files of browsers. The application should ideally prohibit the
customers’ browsers from memorizing or displaying the user IDs and
puffer overflow attack is a method of overloading a predefined amount of space in a buffer, which can
potentially overwrite and corrupt memory in data.
® Hypertext Markup Language (HTML) Is a set of codes that can be inserted into text files to indicate special
Interfaces, inserted images, and links to the hypertext documents.
Electronic Products and Services Page 6 of 13