MAS Technology Risk Management Guidelines
MAS Technology Risk Management Guidelines
1. Introduction
1. IT is important to financial institutions (FI) business strategies.
2. IT systems of FIs become more complex.
3. FIs are offering more variety of IT services, therefore FIs should fully understand and manage the technology risks.
4. TRMG consists of management principles and best practice to guide FIs in:
• Establish a sound and robust technology risk management (TRM) framework.
• Strengthening system security, reliability, resiliency, and recoverability.
• Protect customer data, transactions and systems.
5. TRMG is not legally binding, but MAS strongly encourage FIs to consider.
2
6. Acquisition and Development of Information Systems
1. Many systems fail due to poor design, implementation and testing. FIs should identify defects and deficiencies in initial project phase.
2. FIs should establish steering committee (business owners, developers, stakeholders) to oversee the project.
3. IT Project Management
1. Project management framework should include
• Roles and responsibilities.
• risk assessment and classification
• critical success factors
• milestones and deliverables
2. FIs should document project plans that set out clear deliverables at each milestones.
3. FIs should ensure that the following are approved by IT and Business:
• functional requirements, system design, technical specs
• business cases and CBA
• test plans
• service performance expectation
4. FIs should establish management oversight to ensure timely completion. Issues cannot be solved by project committee should be escalated to SM.
4. Security Requirements and Testing
1. FIs should perform compliance checks on security standards against statutory requirements. Also, FIs should specify security requirements in early phase
related to:
• system access control, authentication
• transaction authorisation
• data integrity
• system activity logging, audit trail, security event tracking
• exception handling
2. System testing methodology should be established to cover the following in various stress-load and recovery conditions:
• business logic
• security controls
• system performance
3. FIs should ensure full regression testing before system changes are made. Affected users should sign-off test results (refer to Appendix A).
4. FIs should conduct penetration testing (pen-test) for new systems with internet accessibility and open network interface. Also perform vulnerability
scanning of external and internal network components connected to the system.
5. FIs should maintain separate environment for unit, integration, and UAT, and closely monitor vendor and developers access to these.
5. Source Code Review
1. Program code may conceal threats and loopholes which cannot be effectively identified through testing.
2. Source code review is a methodical examination to find:
• coding errors, poor coding practices, malicious codes
• security vulnerabilities and deficiencies
• mistakes in system design or functionality
3. FIs should ensure high degree of system and data integrity for all systems. Ensure appropriate security control that considers complexity of applications.
4. FIs should perform a combination of testing, source code reviews, and compliance reviews according to risk analysis.
6. End User Development
1. There are simple self-service applications for end users to do their own developments.
2. FIs should assess the importance of such applications.
3. Minimum recovery measures, user access and data protection controls should be implemented.
4. FIs should test end user developed programs to ensure integrity and reliability.
7. IT Service Management
1. IT service management framework supports:
• IT systems, services, operations
• change and incident management
• stability of production environment
2. Framework should include governance structure and processes and procedures for:
• change management
• software release management
• incident management
• capacity management
3. Change Management
1. Establish process to ensure production systems changes are assessed > approved > implemented > reveiwed.
2. Process should apply to:
• system and security configuration changes
• patches for hardware devices
• software updates
3. Risk and impact analysis should be performed before deploying changes. Consider affected:
• infrastructure, network
• upstream and downstream systems
• security implications
• software compatibility
4. Changes should be tested before deploying to production. Test plans should be documented. Tests results should be sign-off by users.
5. Changes to production environment should only be approved by personnel with delegated authority.
3
6. FIs should backup the systems and have a rollback plan prior to change. Should also have alternative recovery options if rollback is not possible after
change.
7. FIs should ensure logs are recorded for changes made.
4. Program Migration
0. Migration involves moving codes and scripts from development to test or production environment. Risks of malicious code injections.
1. Each environment should be physically or logically separated.
2. If controls in non-production environment is less stringent than production, FIs should perform risk assessment to ensure sufficient preventive and detective
controls before migrating.
3. Segregation of duties should be enforced to ensure no single individual can alone develop, compile and move objects across environments.
4. Successful changes in production should also be replicated in DR system for consistency.
5. Incident Management
0. IT incident should be managed to avoid mishandling or aggravating of situation that prolong service disruption.
1. FIs should establish incident management framework to restore IT services as quickly as possible following an incident, with minimal impact to business.
Should include:
• Roles and responsibilities
• Recording of incidents
• Analysing of incidents
• Remediating of incidents
• Monitoring of incidents
2. FIs may delegate to a centralised technical helpdesk for assessing and assigning severity levels to incidents. Criteria of severity levels should be established
and documented.
3. Escalation and resolution procedures, and resolution timeframes should be appropriate to respective severity level.
4. Escalation and response plan should be tested on a regular basis.
5. FIs should have an emergency response team made up of internal staff, with the technical and operational skills to handle major incidents.
6. SM should be kept informed of incident developments in order to timely activate DR in case an incident aggravate into a crisis. Procedures to notify MAS
when critical systems failed over to DR should be established.
7. FIs should have predetermined action plan to address public relations issues, to maintain customer confidence throughout a crisis.
8. FIs should keep customers informed of any major incident and consider effectiveness of communication (includes informing the general public).
9. FIs should perform root-cause and impact analysis for major incidents and take remediation actions to prevent recurrence.
10. FIs should have incident report that includes:
• executive summary of incident
• root-cause analysis
• impact analysis
• measures to address consequences of incident and the root cause
11. Analysis should cover:
1. Root Cause Analysis
• when, where, why, and how the incident happened.
• How frequent the incident occurred over last 3 years.
• Lessons learnt from incident.
2. Impact Analysis
• Extent, duration, and scope of incident (include information of systems, resources, and customers affected).
• Magnitude of incident (include foregone revenue, losses, costs, investments, number of customers affected, implications, consequences to
reputation).
• Breach of regulatory requirements.
3. Corrective and Preventive Measures
• Immediate corrective action to address consequence of incident (priority on addressing customers).
• Measures to address root cause.
• Measures to prevent similar future occurrence.
12. FIs should address all incidents within corresponding resolution timeframes, and monitor all incidents to their resolution.
6. Problem Management
0. Problem management aim to determine and eliminate root cause to prevent occurrence of repeated problems.
1. FIs should establish roles and responsibilities, and identify > classify > priorities > address problems in a timely manner.
2. FIs should define criteria to categorise problems by severity level, and establish target resolution time and escalation processes for each severity levels.
3. Trend analysis of past incidents will help with problem identification.
7. Capacity Management
0. FIs should ensure indicators for systems and infrastructure such as performance, capacity, and utilisation are monitored and reviewed.
1. FIs should establish monitoring processes and appropriate threshold to be able to cater additional resources in a timely manner.
4
1. Recovery plan should include scenario analysis for contingency scenarios such as major system outages, hardware malfunction, operating errors, security
incidents, and failure of primary DC.
2. FIs should review and update recovery plan and incident response procedures at least annually or when there are operations, systems or network changes.
3. FIs should implement rapid backup and recovery capabilities at individual system or application cluster level, considering inter-dependencies when creating
recovery plan and contingency tests.
4. FIs should define recovery and business resumption priorities with specific RTO and RPO.
• RTO = time to restore a system disruption.
• RPO = acceptable amount of data loss.
5. FIs should establish a geographically separated recovery site to restore critical systems and resume business operations when primary site fails.
6. Recovery speed requirements depend on criticality and available alternatives. FIs may explore on-site redundancy and real-time data replication to enhance
recovery capability.
7. For critical systems outsourced to offshore service providers, FIs should consider cross-border network redundancy, engaging multiple network providers,
and alternate network path to enhance resiliency.
5. Disaster Recovery Testing
1. FIs should refrain from adopting impromptu and untested recovery measures during system outage, as they carry high operational risks without validating
effectiveness.
2. FIs should test the effectiveness of recovery requirements and ability of staff to execute the procedures at least annually.
3. DR tests should cover various scenarios like total shutdown, primary site failure, and individual component failure.
4. FIs should conduct bilateral or multilateral recovery testing for systems or networks linked to specific service providers.
5. FIs should involve business users in designing test cases to verify recovered systems. FIs should also participate in DR tests conducted by its service
providers.
6. Data Backup Management
1. FIs should develop data backup strategy for storage of critical information.
2. FIs may implement DAS, NAS, or SAN as part of the data backup and recovery strategy. Processes should be in place to review storage architecture,
connectivity, and technical support by service providers (refer to Appendix B).
3. FIs should carry out periodic testing of backup media and assess if media is adequate and effective in supporting recovery processes.
4. FIs should encrypt backup media (including USB disks) containing sensitive information before transporting to offsite storage.
1. FIs should recognise the risk of offering services via internet platform.
2. Varying degree of risks are associated with different types of services:
• information service
• interactive information exchange service
• transactional service (highest risk due to irrevocable execution)
3. FIs’ risk management process should clearly identify the risks and formulate security controls, system availability, and recovery capabilities which commensurate
with the level of risks.
4. Online Systems Security
1. FIs should devise security strategy to ensure confidentiality, integrity, and availability of data and systems.
2. FIs should assure customers that online services are adequately protected and authenticated.
3. MAS expects FIs to properly evaluate security requirements associated with internet systems and adopt well-established international encryption standards
(refer to Appendix C).
4. FIs should ensure information processed, stored, or transmitted are accurate, reliable and complete, by implementing physical and logical access security,
processing and transmission controls.
5. FIs should implement monitoring or surveillance system to be alerted of abnormal system activities, transmission errors, or unusual transactions, and have
follow-up process to verify the issues are addressed.
6. FIs should maintain high resiliency and availability, put in place measures to plan and track capacity utilisation and guard against online attacks (refer
to Appendix D).
7. FIs should implement 2FA login and transaction-signing. These secure authentication process, protect data integrity, and enhance customer confidence.
8. For systems serving institutional investors, accredited investors or corporate entities, using alternate controls and processes to authorise transactions, FIs
should perform risk assessment to ensure security level is at least as adequate as token-based mechanisms.
9. FIs should take appropriate measures to minimise exposure to other cyber attacks such as MITM, MITBrowser, MITApplication (refer to Appendix E).
10. FIs should implement measures to protect customers, educate them on the measures put in place, and ensure they have access to continual education to raise
security awareness (refer to Appendix F).
5. Mobile Online Services and Payments Security
0. Mobile Online Services refers to provision of financial services via mobile devices, either through web browser or FI’s self-developed applications on
mobile platforms (Apple iOS, Google Android, Microsoft Windows OS).
1. Mobile Payment refers to use of mobile devices to make payments, which may use various technologies (e.g. NFC).
2. Both are extensions of online financial services. FIs should implement similar security measures as online financial services, conduct risk assessment and
implement appropriate measures to counteract payment card fraud on mobile devices.
3. FIs should ensure protection of sensitive or confidential information as mobile devices are susceptible to theft and loss. Implement encryption to secure data
in storage and transmission, and ensure processing are done in secure environment.
4. FIs should educate customers on security measures to protect their own mobile devices from malware.
13. Payment Card Security (Automated Teller Machines, Credit and Debit Cards)
1. Payment cards allows physical purchase, online purchase (and over mail-order or over telephone) and ATM cash withdrawals.
2. There are many forms of payment cards. Magnetic stripe cards are vulnerable to skimming attacks, which can take place during payment card processing (at
ATMs, payment kiosk, EFTPOS terminals).
3. Payment card frauds include:
• counterfeit
• lost or stolen
• card-not-received (CNR)
• card-not-present (CNP)
4. Payment Card Fraud
1. FIs offering payment card service should protect sensitive data. Implement encryption to secure data in storage and transmission, and ensure processing are
done in secure environment.
2. FIs should use secure chips to store sensitive data and implement strong authentication methods such as dynamic data authentication (DDA) or combined
data authentication (CDA). Should not use magnetic stripe to store sensitive data. If interoperability concerns require the use of magnetic stripe for
transactions, ensure adequate control measures are implemented.
3. For transactions using ATM cards, FIs should perform authentication of sensitive customer information (not third party service provider). FIs should
perform regular security reviews on infrastructure and processes used by service providers.
4. FIs should ensure security controls on payment card systems and network.
7
5. FIs should only activate new payment cards upon obtaining customer’s instruction.
6. FIs should implement dynamic OTP for CNP transactions via internet to reduce risk.
7. FIs should promptly notify cardholders when withdrawals or charges exceeding customer-defined threshold is made. Alert should include transaction
source and amount.
8. FIs should implement robust fraud detection systems with behavioural scoring or equivalent, and correlation capabilities. FIs should set out risk
management parameters according to risk posed by cardholders, nature of transactions or other risk factors.
9. FIs should investigate transactions that deviates significantly from cardholder’s usual usage patterns and obtain cardholder’s authorisation before
completing transactions.
5. ATMs and Payment Kiosk Security
0. ATMs and payment kiosks (e.g. SAM and AXS) are targets of card skimming attacks.
1. FIs should consider the following measure to secure consumer confidence in using these systems:
• anti-skimming solutions to detect foreign devices placed over or near card entry slot.
• detection mechanism that sends alerts to FI staff for follow-up responses and actions.
• tamper-resistant keypads to ensure customers’ PIN are encrypted during transmission.
• appropriate measures to prevent shoulder surfing of customers’ PINs.
• Video surveillance of activities at the machines and maintain quality CCTV footage.
2. Verify adequate physical security are implemented in third party payment kiosks which accept and process FI’s payment cards.
14. IT Audit
1. FIs need to develop effective internal control systems to manage technology risks.
2. IT audit provides Board and SM independent and objective assessment of the effectiveness of controls to manage technology risks.
3. FIs should establish organisational structure and reporting lines for IT audit in a way that preserves the independence and objectivity.
4. Audit Planning and Remediation Tracking
1. FIs should ensure IT audit scope is comprehensive and includes all critical systems.
2. IT audit plan comprising auditable IT areas for the coming year should be developed, and approved by the FI’s Audit Committee.
3. FIs should establish audit cycle and determine the frequency of IT audit that commensurate with criticality and risk of IT system or process.
4. Follow-up process to track and monitor IT audit issues, and escalation process to notify IT and business management of key issues should be established.
8
Appendix A: System Security Testing and Source Code Review
1. Security testing alone is ineffective in detecting all threats and weaknesses. FIs should also include system source code review in its System Development Life
Cycle (SDLC).
2. FIs should take note of the following during system testing and source code review:
• Information Leakage – scrutinise the potential sources of sensitive information leakages through verbose error messages, hard-coded data, files and
directories operations.
• Resiliency Against Input Manipulation – Lack of proper input validation can spawn major vulnerabilities such as script injection and buffer overflows.
Validation routines should be reviewed and tested to assess effectiveness. Validation should include:
• validate all inputs to an application.
• validate all forms of data input format.
• verify the handling of null or incorrect inputs.
• verify content formatting.
• validate maximum length of input.
• Unsafe Programming Practices – review the source code to identify unsafe practices:
• vulnerable function calls.
• poor memory management.
• unchecked argument passing.
• inadequate logging and comments.
• use of relative paths.
• logging of authentication credentials.
• assigning inappropriate access privilege.
• Deviation From Design Specifications – test critical modules (such as authentication functions and session management) to ensure no deviation. Include:
• verify security requirements (credential expiry, revocation, reuse) and protection of cryptographic keys for authentication.
• verify sensitive information stored in cookies are encrypted.
• verify session identifier is random and unique.
• verify session expires after a pre-defined length of time.
• Cryptographic Functions – strength of cryptography depends on algorithm, key size, and implementation. Consider:
• implement cryptographic modules based on authoritative standards and reputable protocol.
• review algorithms and key configurations for deficiencies and loopholes.
• assess the choice of ciphers, key sizes, key exchange protocols, hashing functions, RNG.
• testing all cryptographic operations and key management procedures.
• (refer to Appendix C).
• Exception Handling – ensure robust exception and error handling that facilitates fail-safe processing, assist problem diagnosis through logging, and prevent
leakage of sensitive information.
• Business Logic – ensure that business logic are tested and deny unauthorised function or transaction. Consider the use of negative testing.
• Authorisation – perform tests to ensure actual access rights granted conform to the approved security access matrix.
• Logging – ensure the following when implementing logging functions:
• sensitive information should not be logged.
• maximum data length for logging is pre-determined.
• logs both successful and unsuccessful authentication.
• logs both successful and unsuccessful authorisation.
Appendix C: Cryptography
1. Principles of Cryptography
1. Primary purpose is to protect integrity and privacy of sensitive information.
2. Secrecy of the key is important, not the secrecy of algorithm. Ensure protection and secrecy of all keys used (master keys, key encrypting keys, data
encrypting keys).
2. Cryptographic Algorithm and Protocol
9
1. Cipher algorithms may need to be enhanced or replaced in the face of ever improving computer hardware and techniques enabling the attacks on
cryptography.
2. FIs should review algorithms and key configurations for deficiencies and loopholes, and assess the choice of ciphers, key sizes, key exchange protocols,
hashing functions, RNG.
3. FIs should ensure RNG has sufficient size and randomness of seed number to preclude the possibility of optimised brute force attack.
3. Cryptographic Key Management
1. FIs should establish key management policy and procedures that covers generation > distribution > installation > renewal > revocation > expiry.
2. FIs should ensure the keys are securely generated, such that constituents are destroyed or no single person has access to the entire key or all constituents.
Ensure that keys are created > stored > distributed > changed under stringent conditions.
3. FIs should ensure unencrypted symmetric keys are entered into tamper-resistant devices (e.g. HSM) using principles of dual control. Keys should only be
used for single purpose to reduce exposure.
4. FIs should decide the appropriate effective timeframe (cryptoperiod) of keys, using sensitivity of data and operational criticality to determine frequency of
key changes.
5. FIs should ensure HSM and keying materials are physically and logically protected.
6. FIs should ensure keys are not exposed during usage or transmission.
7. FIs should use secure key destruction method on expired key to prevent recovery by any parties.
8. New keys should be generated independently from the previous keys.
9. FIs should maintain a backup of keys, with same level of protection accorded to the original keys.
10. FIs should immediately revoke > destroy > replace any compromised keys, as well as all derived keys or encrypted keys affected. Inform all parties
concerned of the revocation.
11
References
https://simpledu.wordpress.com/2017/03/30/mas-technology-risk-management-guidelines-trmg/
https://www.pwc.com/sg/en/financial-services/assets/techriskmanagement201307.pdf
12