Pub. 8 2019 Issue 3
The CommunityBanker 16 Ben Hayden manages SHAZAM’s risk management services, helping member institutions mitigate their risks in information technology, cyber- security, physical security and BSA/ACH compliance. He holds master’s degrees in both computer engineering and information assurance, is a certified anti-money laundering specialist and member of the Associa- tion of Certified Anti-Money Laundering Specialists. He has additional certifications and extensive training in electronic investigations, digital forensics and active shooter response. Track findings. Once an audit is complete, it’s important that institutions track their findings, assign them to a specific person, or establish deadlines to correct the issues. While there are many tools available to help with audit tracking, a simple spreadsheet can be created listing the audit’s origin, responsible person, risk or priority level, and a deadline for remediation. This process is important to the security of your networks and systems. Manage Risk Many institutions fail to manage their overall exposure when they don’t adequately assess, track, mitigate or accept risks. While they may adequately assess the risk through a risk assessment, they fail to fully mitigate risks for those items deemed higher risk. More threatening, however, is improperly lowering a risk score of a specific product or business line. In - stitutions do this to “accept” risk, yet lower risk items are eas- ily forgotten. This simply isn’t proper risk acceptance. Institu- tions should assess the risk of the product in question only after careful scrutiny. If there is a business need for the risk, move forward with an acceptance process that encompasses both senior management as well as the board of directors. Security Vulnerabilities Security vulnerabilities are often found during network penetration tests or vulnerability analysis. The following items include text from the Common Vulnerabilities and Exposures (CVE) database, and from findings identified by Nessus, a vulnerability assessment solution used by SHAZAM Secure. Security protocol. Most findings we identify are related to institutions still running transport layer security (TLS) pro- tocol, version 1. This protocol uses cryptography to encrypt communication over a network using a symmetric key system. Originally, many governing bodies listed June 2016 as the deadline for depreciation of TLSv1, although it was eventu- ally extended to 2018. Resolve this issue now by upgrading to TLSv1.1 or TLSv1.2. SSL certificates. Many institutions have findings related to SSL certificates which can’t be trusted. An SSL certificate veri - fies that the data being shared is from a trusted source. When the certificate is correctly installed on the institution’s web server, a secure connection is established. A registered certifi - cate authority issues these certificates to ensure authenticity. Out-of-date certificates create vulnerability to man-in-the- middle attacks. These occur when an attacker secretly relays, and possibly alters, communication between two parties who believe they are directly communicating with each other. It’s important to take these steps to make sure your certificates work to keep information safe: 1. Confirm that the top of the certificate chain sent by the server is from a known public certificate authority. When the top of the chain is an unrecognized, self- signed certificate, or when intermediate certificates are missing, the certificate may fail. 2. Make sure the certificate chain contains a certificate that is valid at the time of the scan. If the scan occurs before one of the certificate’s “Not Before” dates, or af - ter one of the certificate’s “Not After” dates, it can fail. 3. Ensure that the certificate chain doesn’t contain a signature that doesn’t match the certificate’s informa - tion, or it doesn’t contain a signature that can’t be verified. Bad signatures can be resolved by getting the certificate re-signed by its issuer. Cipher strength. Medium strength ciphers are less than 112 bits (but more than 64) or using 3DES encryption. Using poor encryption makes your organization susceptible to attackers. The fix is to configure applications to use higher strength ciphers. Internet Key Exchange (IKE). Essentially, IKE version 1 supports aggressive mode with pre-shared key (PSK) authenti- cation. “Aggressive mode” refers to the nature of the encryp- tion between the two entities taking part in the key exchange. Using aggressive mode means the identity of the two entities in the key exchange isn’t encrypted. Using this type of authen- tication allows an attacker to crack the PSK of a virtual private network (VPN) gateway. The easiest fix is to upgrade to IKE v2 as IKE v2 doesn’t allow aggressive mode. If upgrading isn’t an option, IKE v1 allows for “main mode,” which encrypts the identity of the entities involved in the key sharing. If none of these are an option, use very strong keys. Protect Your Institution Cybersecurity and IT risks present some of the scariest challenges to financial institutions. To compound the problem, a recent IBM study conducted by the Ponemon Institute, an independent research firm, found the average amount of time from breach to discovery is 197 days. This means the attackers could be in your network for more than six months before you know it! For the security of your institution and your account- holders, don’t treat audits or security testing as a compliance “check the box.” These risks should be analyzed with the same priority and level of concern as credit or liquidity risks. F E A T U R E Continued from page 14
Made with FlippingBook
RkJQdWJsaXNoZXIy OTM0Njg2