Cyber Security Policy
Cyber Security Policy
/*.
•'^ f7T¿l /
0 2 AUG ?Olÿ
Confidential
S^.1-.• •
Confidential Document
'J
Cyber Security Policy & Standards vl.O - Glossary
Glossary
; V .-i . -, ¿>Te7 t '
Abbreviation Full Form ___________ _________ •
ASLC Application Security Life Cycle ‘
BCP Business Continuity Planning
CCMP Cyber Crisis Management Plan
CERT In Computer Emergency Response Team - India
CERT SBI Computer Emergency Response Team - State Bank of India
CISO Chief Information Security Officer
C-SOC Cyber - Security Operations Centre
D-Dos Distributed Denial of Service
DHCP Dynamic Host Configuration Protocol
DR Disaster Recovery
HRMS Human Resource Management System
HTTPS Hyper Text Transfer Protocol Secure
IDRBT Institute for Development and Research in Banking Technology
IDS Intrusion Detection System
INR Indian Rupees
IPS Intrusion Prevention System
ISC Information Security Committee
ISD Information Security Department
LAN Local Area Network
LHO Local Head Office
MDM Mobile Device Management
NCIIPC National Critical Information Infrastructure Protection Centre
NIC Network Interface Card
OEM Original Equipment Manufacturer
RBI Reserve Bank of India
RMD Risk Management Department
SIEM Security Incident and Event Management
SMS Short Message Service
SOC Security Operations Centre
SOP Standard Operating Procedure
TCP Transmission Control Protocol
UDP User Datagram Protocol
VPN Virtual Private Network
Confidential Document
Cyber Security Policy & Standards vl.O -Table of Contents ». w A. A. X * -V VV "*
-7 T -7 Ü Î
S z - *
>X A
Confidential Document
Cyber Security Policy & Standards vl.O - Chapter A: Introduction i p-w ? «T, j
\ 9-^ it '
Chapter A: Introduction : • AUG »’P
This document shall be read along with the Bank’s Information Security Policy &
Standards.
A. Document Distribution
This document is owned by the Bank’s General Manager & Group Chief
Information Security Officer (GM & Group CISO). He is responsible for
maintaining versions, ensuring dissemination and issuing certifications
whenever required.
B. Primary recipients
All employees of the Bank.
C. Document Confidentiality
This document is confidential and hence would be made available through Bank’s
Intranet Portals similar channels - after authentication.
D. Authority
The policy document is issued under the authority of Board of Directors.
Confidential Document
Cyber Security Policy & Standards vl.O - Chapter A: Introduction
This cyber security policy is in line with the leading cyber security standards,
guidelines and RBI’s mandate on cyber security framework.
H. Policy Standards
Standards are detailed requirements that need to be met for complying with the
Information Security policies. Separate set of standards have been developed
for each policy statement. Standards include measures that need to be taken
for mitigating all risks associated with the respective domain covered by the
policy statements.
J. Scope
These policies and standards are applicable to all locations of the Bank within
India including all assets hosted by or on behalf of the Bank, all business
processes and operations all employees and suppliers of the Bank.
For other offices linked with Bank also this policy and standards shall be the
baseline.
K. Compliance
Bank expects all employees and authorized external personnel including
suppliers to comply with these policies and standards. Failure by any
employees of the Bank to conform to applicable policies and standards may
result in disciplinary action. Supplier users shall be dealt with according to the
contracted covenant.
Confidential Document
* A1
-y : ? *s ¥**17
, ) '-f #Î
Cyber Security Policy & Standards vl.O - Chapter A: Introduction ' ,<j fit a, I '
Approving Authority:
The approving authority for any exceptions from this policy & standards is
Chairman of the Bank.
Exception Criteria:
The following criteria will be used -
a) Existence of a genuine need for exception.
b) Adequacy of compensating controls.
Work flow:
CM (IT-Risk Management) will assess and submit all requests with his
recommendations to Chairman through GM Admin.
M. Implementation of Policy
The Board of Directors at MGB has overall responsibility for the effective
operation of this policy but has delegated day-to-day responsibility for
overseeing its implementation to Information Security Department (ISD) at
MGB. All employees have a specific responsibility to operate within the
boundaries of this policy take effective steps so that all employees understand
the standards of behavior expected of them and to take action when behavior
falls below its requirements. Employees will be given training in order that they
may do so.
Confidential Document
Cyber Security Policy & Standards vl.O - Chapter A: Introduction • }'y : a *$
' » r\na II
.ci {'(ftii ;
4
N. Definitions
;
1. Introduction to Cyber Security
2. Cyber risks
Cyber risks represent the possibility that technologies, processes and practices at
MGB can be circumvented, allowing unauthorized users to (including but not limited
to):
• Modify and/or delete key applications and information, which will affect the
accuracy or integrity of processing
• Access or extract protected or sensitive information (e.g., IP, proprietary
information, credit card information, Pll)
• Disrupt computer-controlled operations or access to online systems
Confidential Document
Cyber Security Policy & Standards vl.O - Chapter B: Cyber Security Governance ...............
; ? ''i*
; */Vtc? /
* i1
Chapter B: Cyber Security Governance
1. Management Strategy
# Stage Description
1. Training programs on cyber security awareness and evolving best practices shall
be conducted.
2. Top management/senior officers of the Bank will be deputed or will be exposed
to seminars/training on Information and cyber security.
3. The bank will design suitable training programs and workshops, if necessary in
collaboration with external experts to disseminate knowledge to all appropriate
levels.
4. The Bank should form and be a part of various communities and forums for
knowledge sharing and combating cyber-threat cyber-attacks.
Confidential Document
1 QW5 &> I G)
T -a -—
Cyber Security Policy & Standards vl.O - Chapter B: Cyber Security Governance
I Hi
I*L* « ♦J. «
.. __ - {.
3.6. Security Operations Centre (SOC) > -.4 Hfi.1? f *
Confidential Document 12
Cyber Security Policy & Standards vl.O - Chapter B: Cyber Security Governance
•*t fast* n $*
4. Cyber Attack Prevention Strategies & Plans
Cyber resilience
Cyber resilience is defined as the ability of the Bank to anticipate withstand
cyber- attacks and the capability to contain, recover rapidly and evolve to
improved capabilities from any disruptive impact caused due to cyber-attacks.
Below are the practices to be followed to with stand Cyber-attacks:
5. Risks
Failure to adhere to this policy and the procedures may put the Bank at cyber risk from
cyber security incidents.
Cyber security incidents can result in a broad range of negative consequences,
including reputational loss, financial loss, non-compliance with standards and
legislation and liability to third parties. A cyber security Incident could occur at any
point of the life cycle of the affected information (i.e., at its creation, collection, use,
processing, storage, disclosure, deletion or destruction).
The Bank will therefore regularly under take risk assessments to identify, quantify
and prioritize risks associated with its cyber security and subsequently develop
controls to mitigate such risks. The Bank will undertake risk assessments using a
consistent and systematic approach.
Confidential Document 13
Cyber Security Policy & Standards vl.O -
Chapter C: Policy Categories - ' r& *£ I
Policy Statement
Policy Statement
Confidential Document
Cyber Security Policy & Standards vl.O - Chapter C: Policy Categories - %/v 1
Category 6. Application Security Life Cycle (ASLC) * .7 vf. j 5
ù ri t
6. Application Security Life Cycle (ASLC)
3 2 AUb 2018
Policy Statement
Bank's systems shall be configured for security, reliability and stability and all such
configurations should be documented. Systems should follow standard naming
conventions for efficient identification in configuring and in problem solution.
Please refer to IS Policy & Standards v1.0-
Applications should have controls to secure input, output and securing of storage.
Please refer to IS Policy & Standards v1.0-
Standards
aseline Controls
Specify security requirements relating to system
access control, authentication, transaction
authorization, data integrity, system activity
ISD
6.1 logging, audit trail, session management, security
event tracking and exception handling at the initial
and ongoing stages of system
development/acquisition
/ Implementation.
Confidential Document
ï I
Cyber Security Policy & Standards vl.O - Chapter C: Policy Categories -
Category 7. Patch/Vulnerability & Change Management ? hr ’ ?'? 7 if Î
All changes to Information assets must be recorded, classified, assessed for risk,
impact and business benefit, approved and implemented in a controlled manner.
Information assets and systems of the bank shall be updated in a timely manner
with security patches for known vulnerabilities.
Standards
3 Owner/
um .......................... Responsibil
Changes to business applications, supporting
technology service components and facilities will
7.1 be managed using robust configuration Application Owner
management processes, configuration baseline
that ensure integrity of any changes.
Conduct application security testing of web/mobile
applications throughout their lifecycle in an
7.2 ISD
environment which is closely resembling or replica
of production web/mobile application environment.
Follow a documented risk-based strategy for
inventorying IT components that need to be
patched, identification of patches and applying
7.3 Application Owner
patches so as to minimize the number of
vulnerable systems and the time window of
vulnerability/exposure.
Confidential Document
J wsTi &
Cyber Security Policy & Standards vl.O - Chapter C: Policy Categories - w
Category 8. User Access Control/Management if »
8. User Access Control/Management • •J ■ z '
Lv-Jl 2 AUb 20 lb
Policy Statement
Standards
Owner/
Responsibility
Use of VBA/macros in office documents shall be
monitored using appropriate tools (Refer Annexure
8.1 - 3). Files received/sent via email attachments will Application Owner
be scanned to detect malware, VBA/macro,
executable, etc. before use.
. -if
Confidential Document
1
' if.
Cyber Security Policy & Standards vl.O - Chapter C: Policy Categories -
Category 9. Authentication Framework for Customers
Policy Statement
The access to customer information and critical customer data will be controlled
and managed to prevent against leakage/ attacks.
Standards
Policy Statement
■)
Confidential Document
Cyber Security Policy & Standards vl.O - Chapter C: Policy Categories - > *•'*'*'*
Category 12. Removable Media *
, V
'■ Í * 7 '.7 /
12. Removable Media
? D 2 AU6 211« i
Policy Statement
Confidential Document
Cyber Security Policy & Standards vl.O - Chapter C: Policy Categories -
Category 13. Advanced Real-time Threat Defence and Management
"?? ? *
'îA7 /
2 AU6 ,?Wg:
13. Advanced Real-time Threat Defense and Management
Policy Statement
To ensure the protection of information through real time monitoring of threat
landscape for Bank's network across India.
Standards
■ Owner/
No. Baseline Controls
_________________________ Responsibility
Network team/Anti-
The Bank will build a robust defense against the
13.1
Virus
installation, spread and execution of malicious
team/Application
code at multiple points in the enterprise.
Owner
The Bank will Implement Anti-malware, Antivirus
protection including behavioral detection systems
for all categories of devices - (Endpoints such as
PCs/laptops/ mobile devices etc.), servers Network team/Anti-
13.2 (operating systems, databases, applications, etc.), Virus team I
Web/lnternet gateways, email-gateways, Wireless Application Owner
networks, SMS servers etc. including tools and
processes for centralized management and
Monitoring.________________________________
A white list of authorized websites required for
13.3 business operations shall be defined and Network Team
maintained.
Implement secure web gateways with capability to
deep scan network packets including secure
13.4 Network Team
(HTTPS, etc.) traffic passing through the web/inter
net gateway
I 17^ ÖJ IH j
Confidential Document
Cyber Security Policy & Standards vl.O - Chapter C: Policy Categories -
Category 14. Anti-Phishing
f; " Î
\
c
f ,y
t ¿i.4
I
r
**
14. Anti- lì.-
. 0V*ù-2 . . *- "» 20»
AUb v*
Policy Statement
To ensure the protection of Bank’s information assets and end users from phishing
attacks.
Standards
Policy Statement
Confidential Document
Cyber Security Policy & Standards vl.O - Chapter C: Policy Categories -
Category 16. Maintenance, Monitoring and Analysis of Audit Logs
Confidential Document
! JZ5 * J '
' z 7? J
L A — *
Cyber Security Policy & Standards vl.O-Chapter C: Policy Categories- f li?l >
Category 18. Vulnerability assessment, Penetration Testing and Red Team Exercises Q.p
Z.AUG.?0.!8.
18.Vulnerability assessment,Penetration Testing and Red Team Exercises
Policy Statement
*
Z j. - ‘1
V '■)
Confidential Document 25 ’«LX
* V ***
■■■ y? '^1 Ü >
Cyber Security Policy & Standards vl.O - Chapter C: Policy Categories - r
Category 19: Incident Response and Management
•M 2
19. Incident Response & Management
Policy Statement
Owner/
Ì B? I4C
Confidential Document 26
t : 4
Cyber Security Policy & Standards vl.O - Chapter C: Policy Categories -
Category 20: Risk based transaction monitoring r ¿'i / :
Policy Statement
asSvn
Confidential Document 27
Cyber Security Policy & Standards vl.O - Chapter C: Policy Categories -
Category 21: Metrics ;
~ a? /
21. Metrics * />-
?? 2 AU6 7018
Policy Statement
Owner/
Prospective Measures
Policy Statement
To ensure that the all systems of Bank have forensic capabilities. Electronic data
shall be gathered and preserved in a systematic, standardized and legal manner
to ensure the admissibility of the evidence for the purpose of any legal
proceedings or investigations.
Standards
IQ9
...
Baseline Controls
Owner/
Responsibility
The Bank shall empanel appropriate and qualified
22.1 team of forensics investigators and carry out ISD
investigations of cyber-attacks.
1
Confidential Document
Cyber Security Policy & Standards vl.O - Annexure 1: Types of Threats and Attacks ...
2 Abb ZUlfi
To ensure protection of Bank's information assets against misuse and / or
compromise, define and communicate to users I employees, vendors & partners
the Bank’s security policies, educating them about cyber security risks and
protection measures at their level
Vl.O
Policy Statement
Create a safe and secure environment for customer records within and outside the
Bank and make the customers aware about prevention of fraudulent activities.
Please refer to IS Policy & Standards vl.O
Confidential Document
Cyber Security Policy & Standards vl.O - Annexure 1: Types of Threats and Attacks
r :7 Î
Annexures
Annexure 1: Types of Threats ' o 2 kug
Types of Attacks
Malicious users or Hackers can carry out cyber-attacks using a variety of methods.
The following are the common types of attacks:
• Malware-Software or code snip designed to cause harm to your computer
and/or network security.
• Social Engineering - Utilizing manipulative methods to obtain (confidential)
information through unauthorized methods.
• Vulnerability/Exploit Attacks- Attacks executed by sophisticated hackers that
utilize a combination of knowledge, tools and exploitation of technology
weaknesses.
• Other Attacks
Malware
Malware based attacks include the following:
Confidential Document
Cyber Security Policy & Standards vl.O - Annexure 1: Types of Threats and Attacks '-
1 ft.
Ransom ware - Software that limits or restricts users from accessing their '
system or certain files until a ransom is paid. Often hackers will employ
encryption methods to prevent access to the files until the ransom ispaid.
Social Engineering
Social Engineering Attacks include the following:
• Spoofing - Altering the return address on an email to deceive the receiver of
that email message that the email came from someone other than the actual
sender.
• Identity Spoofing (IP Address Spoofing) - A method of deception by using
another IP address (that is not your own) to access the network that is usually
used as on-line camouflage to mask their activities and/or gain unauthorized
entry.
• Phishing (emails) - Deception that often uses legitimate-style emails with the
objective to fraudulently obtain sensitive/confidential information (i.e. asking
you to enter your username, password, debit card number, ATM Pin etc.)
• Spear Phishing - Similar to Phishing, but is targeted to a specific organization
or group. It is a realistic email with a link to a malicious website used to
download malware or gather private information.
• Vishing -Like Phishing, except that this method uses telecommunication
(phone calls) to solicit personal information.
• Smashing - Like Phishing, except that this method utilizes cell phone text
messages to solicit your personal information.
• Pharming - Redirection to a fraudulent websites without your consent or
knowledge.
• Baiting - Baiting is in many ways similar to phishing attacks. However, what
distinguishes them from other types of social engineering is the promise of an
item or good that hackers use to entice victims. Baiters may offer users free
music or movie downloads, if they surrender their login credentials to a certain
site.
• Pretexting - Pretexting is another form of social engineering where attackers
focus on creating a good pretext, or a fabricated scenario, that they can use to
try and steal their victims’ personal information. These types of attacks
commonly take the form of as cammer who pretends that they need certain
bits of information from their target in order to confirm their identity.
I
Confidential Document
J f 1 35’
f ; ' - -5 7 '
Cyber Security Policy & Standards vl.O - Annexure 1: Types of Threats and Attacks . J - •< f 1
• Man in the Middle (MITM) - An attack used to monitor and potentially modify
communications between two users. For example, the attacker could intercept
thepublickeymessageexchangewithaprivatekeyandcontinuetoretransmit the
message while actively eavesdropping without the users ’knowledge.
• Man in the Browser-Similar to a MITM attack, how evera Trojan horse issued
to intercept and manipulate the communications.
• Injection Attacks-A type of attack where by malicious commands are sent to a
system/application through unauthorized channels. The commands can allow
attackers to create, read, update, or delete data that is available on the
system.
• Cache Poisoning - This type of attack introduces false or malicious data into
cache memory and then enables the attacker to use exploit tactics.
• Logic Bomb- The attacker exploits a logical error in the code of the application
to perform malicious activities
Other Attacks
Point where
: Polenfial detection i most targets
i point with robust are notified of
threat intelligence | detection the attack
(generally by
third parties)
E»e««te
r<sfearefe affaek
CnC communications are generally stealthy and can’t raise any suspicion on
the network. Such traffic is usually obfuscated or hidden through techniques
that include thé following:
Once a target endpoint has been infiltrated, the attacker needs to ensure
persistence (resilience or survivability).Various types of advanced malware
are used for this purpose, including the following:
o Rootkits are malware that provides privileged (root-level) access to a
computer.
o Boot kits are kernel-mode variants of rootkits, commonly used to attack
computers that are protected by full-disk encryption.
o Backdoors enable an attacker to bypass normal authentication procedures
in order to gain access to a compromised system and are often installed
as a fail over, in case of the malware is detected and removed from the
system.
o Anti-AV software may also be installed to disable any legitimately installed
antivirus software on the compromised endpoint, thereby preventing
automatic detection and removal of malware that is subsequently installed
by the attacker. Many anti-AV programs work by infecting the master boot
record (MBR) of a target end point.
Attackers have many different motives for an attack and data exfiltration
including data theft, destruction of critical infrastructure, hacktivism, or cyber
terrorism. This final phase of the attack often lasts months or even years,
particularly when the objective is data theft, as the attacker uses a low-and-
slow attack strategy to avoid detection.
Confidential Document
___ , ♦
' .. -ft 'f *
Cyber Security Policy & Standards vl.O-Annexure 3: Solutions *
T '
’ >
' ' '
1 ri*?1 ’
*
V <*
-.1 . V.Ï • C
Description
The following solutions will be integrated for monitoring by third party
SOC
1. Firewalls & UTMs
2. Anti-Virus/Total Protection
3. Network IPS/IDS
4. DLP-End points &Gateway
5 Threat & Vulnerability management
List of Security
6. NAC
solutions to be
7. Web Application firewall
implemented in
8. Privileged Identity Management
SOC
9. Database Activity Monitoring
10. Governance Risk & Compliance (GRC)solution
11. PKI, SSL & SSO Infrastructure
12. MDM Platform/solution
13 Cloud Security & Virtualization environment
14. Any other security solution as deemed required by the Bank to
ensure confidentiality , integrity and availability of data
Confidential Document
J » I &91 »,