Security Assingment
Security Assingment
Mr. Ravindu
Assessor Ishara Internal Verifier
Unit 05: Security
Unit(s)
Providing a suitable security solution for METROPOLIS CAPITAL
Assignment title Bank
Y. Karan Hasintharan
Student’s name
• Constructive?
Y/
• Linked to relevant assessment N
Page 1 of 125
Karan Hasintharan | Security | Assignment
criteria? Y/
N
• Identifying opportunities
for improved performance?
Y/
• Agreeing actions? N
Y/
N
Give details:
Assessor
Internal signature Date
Verifier Date
signature
Programme Leader
signature (if Date
required)
Page 2 of 125
Karan Hasintharan | Security | Assignment
Higher Nationals - Summative Assignment Feedback Form
Page 3 of 125
Karan Hasintharan | Security | Assignment
Pearson
Higher Nationals in Computing
Unit 05: Security
Page 4 of 125
Karan Hasintharan | Security | Assignment
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject,
Assignment No, and Page Number on each page. This is useful if individual sheets
become detached for any reason.
5. Use word processing application spell check and grammar check function to help
editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in
the body except for the before mentioned compulsory information will result in
rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
Page 5 of 125
Karan Hasintharan | Security | Assignment
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL.
You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly
using HARVARD referencing system to avoid plagiarism. You have to provide both
in-text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
Page 6 of 125
Karan Hasintharan | Security | Assignment
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work
and to present it as my own without attributing the sources in the correct way. I
further understand what it means to copy another’s work.
[email protected] 2024/07/14
Student’s Signature: Date:
(Provide E-mail ID) (Provide
Submission Date)
Page 7 of 125
Karan Hasintharan | Security | Assignment
Student Name /ID Number
Unit Tutor
Issue Date
Submission Date
Submission Format:
The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced using the
Harvard referencing system. Please also provide an end list of references using the Harvard referencing
system.
Assignment Brief
Page 8 of 125
Karan Hasintharan | Security | Assignment
Assignment Brief and Guidance:
Page 9 of 125
Karan Hasintharan | Security | Assignment
METROPOLIS CAPITAL Bank is one of the leading private banking service providers in Sri
Lanka. It operates over 100 branches and 500 ATM machines across the island as well as 8
Branches overseas. In order to provide their services, METROPOLIS CAPITAL Bank has
a primary datacenter located in Colombo and a Secondary datacenter located in Galle.
Each branch and ATM must have connectivity to the core banking system to be able to
operate normally. In order to establish the connectivity between datacenters, branches and
ATM machines, each location has a single ISP link. This link provides VPN services
between branches, ATMs and datacenters as well as MPLS services for the bank and it
establishes connectivity between datacenters, ATMs, and branches.
METROPOLIS CAPITAL Banks Head Office is a 5 Story Building in Kollupitiya with the
Ground Floor allocated for Customer Services, the First Floor allocated for HR, the
Second Floor allocated for Meeting Rooms and Senior Executive Staff, the Third Floor is
allocated for the Technical Support Team and the Fourth Floor hosts High Performance
Servers running core banking systems. Fifth Floor is for some other outside companies that
are not related with the METROPOLIS CAPITAL Bank. Other than this, METROPOLIS
CAPITAL bank provides a lot of services to customers including online and mobile
banking facilities. Therefore, their core banking system must communicate with several
outside systems and all communication between outside systems, Data centers and the
Head Office is protected by a single firewall. In Addition, METROPOLIS CAPITAL Bank
has recently implemented a bring your own device (BYOD) concept for Senior Executive
Staff and HR Departments and to facilitate this, they are providing employee WiFi as well
as a guest WiFi Hotspot.
The bank has signed agreements, AMCs, contracts and NDAs with several Local and foreign
IT service vendors. Some local vendors provide services and supports to foreign
companies. METROPOLIS CAPITAL Banks Technical Support Team is a local third-
party vendor, contracted by METROPOLIS CAPITAL Bank and managed by their Supply
chain management officer. The Technical Support Team provides onsite and remote
support for their customers.
Page 10 of 125
Karan Hasintharan | Security | Assignment
METROPOLIS CAPITAL bank strictly follows the rules and regulations enforced by the
government and the Central Bank. Therefore, they have obtained the ISO 31000:2009
certification. In addition to this, the areas of datacenters, branches, ATM and HQ is
covered by CCTV and 24x7 monitoring is happening. Other security functions like VA
scanning, internal auditing, and security operation done by the bank employees. They have
purchased a VA scanning tool, Privilege access management (PAM) system, Endpoint
detection and respond (EDR) system, Data loss prevention (DLP) tool, Web application
firewall (WAF) and Secure mail gateway which are managed by the Technical Support
Team.
It has been reported that an emergency is likely to occur where a work from home situation
may be initiated. Therefore, you have been employed by METROPOLIS CAPITAL Bank
as a Network Security Analyst to recommend and implement a suitable Security solution
to facilitate this situation.
Activity 01
Discuss and assess the security procedures and types of security risks METROPOLIS CAPITAL
Bank may face under its current status and evaluate a range of physical and virtual security measures
that can be employed to ensure the integrity of organizational IT security. You also need to analyze
the benefits of implementing network monitoring systems for METROPOLIS CAPITAL Bank with
valid reasons in order to minimize security risks identified and enhance the organizational security.
Activity 02
2.1 Discuss how an incorrect/improper configuration for network infrastructure such as firewall and VPN
could impact METROPOLIS CAPITAL Bank. Assess IT security risks that may face by the employees of
METROPOLIS CAPITAL Bank and propose how the organization can facilitate their employees with a
“Secure remote working environment”.
2.2. Discuss how following technologies would benefit METROPOLIS CAPITAL Bank and its Clients to
increase network performance. (Support your answer with suitable illustrations).
i) Static IP,
Page 11 of 125
Karan Hasintharan | Security | Assignment
ii) NAT
iii)DMZ
Activity 03
Review risk assessment procedures for METROPOLIS CAPITAL Bank to protect itself and its
clients. Explain the mandatory data protection laws and procedures which will be applied to
data storage solutions provided by METROPOLIS CAPITAL Bank. Explain the topic "ISO
31000 risk management methodology" and summarize the ISO 31000 risk management
methodology and its application in IT security. Analyze possible impacts to organizational
security resulting from an IT security audit. Recommend how IT security can be aligned
with organizational Policy, detailing the security impact of any misalignment.
Activity 04
4.1 Design and Implement suitable security policy to prevent misuse and exploitations in line
with METROPOLIS CAPITAL Bank using the Organizational policy tools for the given
scenario,
While evaluating and justifying the suitability of the tools used in an organizational policy to
meet business needs. Identify the stakeholders who are subject to the METROPOLIS
CAPITAL Bank and describe the role of these stakeholders to build security audit
recommendations for the organization.
4.2 Discuss and present a disaster recovery plan for METROPOLIS CAPITAL Bank for all
their sites to guarantee maximum reliability to their clients. (Student must develop a
PowerPoint-based presentation which illustrates the recovery plan within 15 minutes of
time including justifications and reasons for decisions and options used).
Page 12 of 125
Karan Hasintharan | Security | Assignment
Grading Rubric
Grading Criteria Achieved Feedback
Page 13 of 125
Karan Hasintharan | Security | Assignment
M4 Analyze possible impacts to organizational security resulting
from an IT security audit.
D2 Recommend how IT security can be aligned with organizational
Policy, detailing the security impact of any misalignment.
LO4 Manage organizational security
Page 14 of 125
Karan Hasintharan | Security | Assignment
1 Table of Contents
1 Activity 01 ........................................................................................................... 20
1.5 Evaluating a range of Virtual and Physical Security Measures to Protect the Integrity of
the Metropolis Capital Bank .......................................................................................... 28
2 Activity 02 ........................................................................................................... 38
2.1 The Impact of Incorrect Configuration of Firewalls and VPNs on METROPOLIS CAPITAL
Bank................................................................................................................................ 38
2.3 Assessing IT Security Risks for Employees of METROPOLIS CAPITAL Bank ................... 43
2.4 Discussing how implementing a static IP, NAT, and DMZ in a network can improve
network security for Metropolis Capital Bank and benefit both the bank and Clients. 46
Page 15 of 125
Karan Hasintharan | Security | Assignment
3 Activity 03 ........................................................................................................... 51
3.1 Review Risk Assessment Procedures for METROPOLIS CAPITAL Bank .......................... 51
3.4 Recommending how IT security can be aligned with organizational Policy .................. 65
4 Activity 04 .......................................................................................................... 69
4.1 Designing a Suitable Security Policy to Prevent Misuse and Exploitations in line with
METROPOLIS CAPITAL Bank. .......................................................................................... 69
4.2 Evaluating and justifying the suitability of the tools used in an organizational policy to
meet business needs...................................................................................................... 77
4.3 Identifying the stakeholders who are subject to the METROPOLIS CAPITAL Bank. ...... 81
4.4.3 Justifications and reasons for decisions and options used. ................................ 89
Page 16 of 125
Karan Hasintharan | Security | Assignment
4.5.2 Policy Statement ................................................................................................. 91
94
4.5.23 Disaster Recovery Plan for Local Area Network (LAN) .................................. 108
4.5.24 Disaster Recovery Plan for Wide Area Network (WAN) ................................ 109
Page 17 of 125
Karan Hasintharan | Security | Assignment
4.5.25 Disaster Recovery Plan for Data Center (Example) ....................................... 110
Page 18 of 125
Karan Hasintharan | Security | Assignment
Acknowledgment
While finishing this assignment, and making it successful, I had to get help and guidelines
from some respected people. I am quite happy that the report is completed. I thank our
Lecturer, Mr. Ravindu Ishara, for guiding me for this assignment. He helped me in
challenging situations and gave us great guidance. His dedication and assistance were
very helpful in getting the task done successfully. I could not have finished such difficult
work without his help. I'm grateful.
Page 19 of 125
Karan Hasintharan | Security | Assignment
1 Activity 01
Cybersecurity, another name for IT security, guards against theft, damage, interruption,
and illegal access to information systems. It involves several procedures and tools
designed to protect information on networks, devices, applications, and data.
Information availability, confidentiality, and integrity protect organizational assets from
various forms of risk.
• Data Protection: ensures the privacy, availability, and integrity of sensitive data
while guarding against breaches and illegal access.
• Customer Trust: builds loyalty and reputation, protects financial and personal
information, and promotes consumer confidence.
• Business Continuity: protection against cyberattack interruptions, guaranteeing
that services and systems continue to function.
• Cost Savings: reduces the possible financial losses brought by cyberattacks,
including recovery expenses, penalties, and lost revenue.
• Regulatory Compliance: assists in complying with industry and legal
requirements, preventing fines and legal proceedings related to data breaches.
• Risk Management: reduces the impact of security events and increases overall
resilience by identifying and mitigating threats.
• Intellectual Property Protection: protects trade secrets and confidential
information, avoiding financial loss and competitive disadvantage.
• Employee Productivity: protects trade secrets and confidential information,
avoiding financial loss and competitive disadvantage.
• Enabling Innovation: assures the security of new technologies, facilitating their
acceptance and promoting the expansion and development of businesses.
Page 20 of 125
Karan Hasintharan | Security | Assignment
1.1.2 Why IT Security for Banking Systems Is Important
Page 21 of 125
Karan Hasintharan | Security | Assignment
and the secondary data center in Galle. The main office, which is housed in a five-
story facility in Kollupitiya, is home to vital divisions including technical
support, HR, and customer services in addition to high-performance servers that
handle essential banking systems.
Based on its adherence to strict government and Central Bank requirements, the
bank takes great satisfaction in its ISO 31000:2009 approval. METROPOLIS
CAPITAL Bank offers cutting-edge online and mobile banking services with a
focus on security and innovation. These services are supported by cutting-edge
security measures, such as a full suite of security tools and 24/7 surveillance.
1.2.1 Security
Page 22 of 125
Karan Hasintharan | Security | Assignment
• Availability: Ensuring that, when needed, authorized individuals may access and
use information and services.
• Monitoring and Response: Keeping an eye out for security problems and acting
quickly to lessen any potential effects.
• Compliance: Respecting the security and privacy obligations set out by law,
regulation, and organization.
Metropolis Bank is a financial organization, hence it has particular and increased security
threats. The following discusses distinct security threats that are particularly significant to
Metropolis Bank.
1. Financial Fraud: For banks, financial fraud is a serious risk. This can involve
loan fraud, identity theft, and fraudulent transactions. Attackers may access bank
accounts and carry out illegal activities using credentials that they have stolen or
created, causing the bank and its clients to suffer large financial losses.
4. ATM and Point of Sale (POS) Skimming: The unauthorized collection of card
details at POS or ATM terminals is known as "skimming." Attackers install
devices known as "skimming devices," which read card magnetic stripe data and
Page 23 of 125
Karan Hasintharan | Security | Assignment
record PINs. Following the creation of fake cards or fraudulent transactions using
this information, the bank and its clients suffer financial losses.
5. Phishing and Social Engineering Attacks: Attacks using social engineering and
phishing are directed against both Metropolis Bank staff members and clients. The
purpose of these assaults is to deceive people into exposing private information or
doing actions that threaten security. Phishing emails, for instance, might pose as
correspondence from the bank to fool clients into divulging their login
information.
8. Distributed Denial of Service (DDoS) Attacks: DDoS attacks have the potential
to overload Metropolis Bank's online services by flooding them with excessive
traffic, including mobile applications and Internet banking. Customers may
experience service interruptions as a result, making it difficult for them to access
their accounts and complete transactions. Extended periods of inactivity may harm
the bank's image and cause losses.
Page 24 of 125
Karan Hasintharan | Security | Assignment
institutions like Metropolis Bank. There may be severe fines, legal repercussions,
and reputational harm for non-compliance.
To handle these dangers, Metropolis Bank needs to have strong security measures in
place. This entails using modern security technology, carrying out regular security audits,
educating employees on security best practices, and making sure that legal requirements
are met. Metropolis Bank may protect its resources, maintain trust among customers, and
guarantee the honesty of its business dealings by taking proactive measures to manage
these risks.
Strong security policies are required by METROPOLIS CAPITAL Bank to guarantee the
integrity of organizational IT security. An assessment of the bank's internal security is
provided below.
Page 25 of 125
Karan Hasintharan | Security | Assignment
2. Datacenters and Branch Connectivity
• The major and secondary data centers for METROPOLIS CAPITAL Bank
are in Colombo and Galle, respectively.
• ISP links that offer VPN services for secure communication between
branches, ATMs, and data centers guarantee connectivity to these data
centers.
• The bank's activities depend on effective and dependable connections,
which are provided via MPLS services.
Cybersecurity Measures:
1. Security Operations
• The bank's specialized security staff carries out internal audits, monitoring,
and VA (Vulnerability Assessment) scanning as security activities.
• The Technical Support Team deploys and maintains products including
Web Application Firewalls (WAF), Secure Mail Gateways, Data Loss
Prevention (DLP) systems, Privilege Access Management (PAM), and
Endpoint Detection and Response (EDR) systems to defend against a
variety of cyber-attacks.
Page 26 of 125
Karan Hasintharan | Security | Assignment
3. Vendor Management and Support
1. Emergency Preparedness
Recommendations:
• Enhanced Remote Access Security: For every remote access,
utilize multi-factor authentication (MFA) to bolster access controls
and safely confirm user identities.
• Endpoint Protection: Boost endpoint security by utilizing cutting-
edge EDR technologies to quickly identify, look into, and address
possible security problems.
• Incident Response Planning: Develop and keep up an incident
response strategy that is specific to remote work environments and
outlines specific procedures for identifying, handling, and
recovering from cybersecurity issues.
• Network Segmentation and Access Controls: To separate
sensitive data and important systems, use network segmentation.
Page 27 of 125
Karan Hasintharan | Security | Assignment
Strict access rules based on the least privilege principle should be
put in place.
• Continuous Monitoring and Auditing: Maintain 24/7
surveillance of network operations and carry out periodic internal
audits to guarantee adherence to security protocols, legal mandates,
and industry benchmarks.
• Security Awareness Training: Provide staff with frequent
security awareness training sessions and programs that highlight
safe remote work procedures, phishing prevention, and data
protection policies.
1.5 Evaluating a range of Virtual and Physical Security Measures to Protect the
Integrity of the Metropolis Capital Bank
Virtual Security
Measures
Incoming and outgoing An essential virtual security measure is
network traffic is the bank's usage of a single firewall to
monitored and protect communication between data
controlled by a firewall centers, branches, ATMs, and external
Firewall Protection using pre-established systems. It helps to efficiently
security rules. implement access controls and
centralizes security administration.
Page 28 of 125
Karan Hasintharan | Security | Assignment
Endpoint Devices are equipped By offering real-time visibility into
Protection (EDR) with Endpoint endpoint activity, EDR improves
Detection and Response endpoint security by facilitating quick
(EDR) systems, which identification, investigation, and
are used to keep an eye mitigation of security problems.
out for questionable
activity and any
security risks.
Encryption (VPN Multi-Protocol Label This protects client data and sensitive
and MPLS): Switching (MPLS) and financial transactions between
Virtual Private branches, ATMs, and datacenters by
Networks (VPNs) are guaranteeing data security and integrity
used to encrypt data that throughout transmission.
is sent between sites
across network
connections.
Data Loss DLP tools keep an eye By locating and protecting private data
Prevention (DLP) on and manage private across endpoints, networks, and
information to stop datacenters, DLP helps METROPOLIS
illegal access, usage, or CAPITAL Bank abide by data
transfer. protection laws and avoid data
breaches.
Page 29 of 125
Karan Hasintharan | Security | Assignment
Web Application Web application By filtering and monitoring HTTP
Firewall (WAF) firewalls (WAF) defend traffic between web applications and
against typical online clients, WAF deployments protect
threats including SQL online financial services against attacks
injection and cross-site that target weaknesses in web
scripting (XSS). applications.
Physical Security
Measures
Surveillance Cameras on closed- Constant CCTV surveillance improves
(CCTV) circuit television total security monitoring capabilities
(CCTV) keep an eye on throughout branches, ATMs, and data
and document activity centers, and the Head
within and around bank Office discourages illegal activity, and
buildings. supplies evidence for investigations.
Page 30 of 125
Karan Hasintharan | Security | Assignment
Intrusion IDS keeps an eye on By identifying unwanted attempts to
Detection Systems network traffic to spot access networks or facilities and
(IDS) any unusual activity or enabling prompt actions to security
possible security events and possible threats, the
breaches. deployment of systems for intrusion
detection (IDS) improves physical
security.
Page 31 of 125
Karan Hasintharan | Security | Assignment
In conclusion, METROPOLIS CAPITAL Bank may successfully preserve the integrity of
its business operations and maintain the confidence of customers by assessing and
improving these physical and virtual security measures, which will also secure sensitive
financial data and guarantee continuous banking services.
Page 32 of 125
Karan Hasintharan | Security | Assignment
1.6.1 Analyzing the benefits of implementing Network Monitoring Systems for
METROPOLIS CAPITAL Bank
Regulatory Compliance
Page 33 of 125
Karan Hasintharan | Security | Assignment
monitoring and securing reliability while securing
data flow to stop illegal sensitive client data.
access and data breaches.
Cost Savings
The bank may save Maintains client
money on network happiness, stops revenue
failures and downtime by loss, and guarantees
detecting and fixing continued operations.
Reduced Downtime problems before they
become serious problems.
Improved Reliability
and Performance of the
Network
Page 34 of 125
Karan Hasintharan | Security | Assignment
the efficiency and operating costs and
distribution of network improves user experience
devices and apps. in general.
Scalability and
Flexibility
Integration with Other provides an integrated builds a unified and
Systems strategy for network compatible system that
administration and improves the bank's IT
security by integrating infrastructure's overall
easily with existing efficacy.
security tools and IT
management systems.
Efficient Incident
Response
Page 35 of 125
Karan Hasintharan | Security | Assignment
Forensic Analysis stores network data to increases the bank's
provide post-event capacity to draw lessons
assessment and from mistakes and
improvement through reinforce defenses against
forensic analysis used to potential threats.
investigate and
comprehend security
issues.
Enhanced Customer
Experience
Faster Issue Resolution Customer service makes certain that
interruptions are reduced financial services are
when network problems always available and
are promptly identified operating at peak
and fixed. efficiency, which
improves the client
experience.
Page 36 of 125
Karan Hasintharan | Security | Assignment
In conclusion, by implementing network monitoring tools, METROPOLIS CAPITAL
Bank may improve security, performance, compliance, and overall operational efficiency
in a variety of ways. These solutions enhance the bank's objectives of maintaining strict
service and security standards by facilitating proactive management, prompt incident
response, cost savings, scalability, and an improved client experience.
The many advantages and benefits that these network monitoring systems provide can
assist METROPOLIS CAPITAL Bank in preserving the functionality, security, and well-
being of its network infrastructure. The requirements, financial constraints, and current IT
infrastructure of the bank all influence the tool selection.
Page 37 of 125
Karan Hasintharan | Security | Assignment
2 Activity 02
A firewall is a hardware or software for network security that monitors and regulates
incoming and outgoing network traffic by pre-established security rules. To stop
unwanted access and cyber risks, its main goal is to provide a barrier between a trusted
internal network and untrusted external networks, such as the Internet. Deploying
firewalls using software, hardware, or a mix of the two is possible.
A crucial component of network security for METROPOLIS CAPITAL Bank and all
other financial institutions is firewall setup. A strong firewall setup is necessary for the
bank's several branches, ATMs, and data centers to protect critical data and ensure
smooth operations. On the other hand, misconfigured or inaccurate firewall setups can
result in serious security flaws, interruptions to business operations, disobedience of
regulations, and harm to one's reputation. The possible effects of such misconfigurations
are described in this document, highlighting how crucial it is to have careful firewall
settings to safeguard the bank's data, infrastructure, and customers.
Page 38 of 125
Karan Hasintharan | Security | Assignment
Security Vulnerabilities:
Regulatory Non-Compliance:
Operational Disruptions:
Page 39 of 125
Karan Hasintharan | Security | Assignment
Reputational Damage:
Page 40 of 125
Karan Hasintharan | Security | Assignment
2.2.3 Incorrect Configuration of VPN and Using third-party VPNs on
METROPOLIS CAPITAL Bank
• Increased Risk of Data Breaches: Data breaches can result from insecure
VPN setups, which allow hackers to intercept or alter sent data. This puts
sensitive information's security and integrity at risk, which might cost
METROPOLIS CAPITAL Bank money and harm the bank's image.
• Compliance Issues: There may be penalties and legal consequences for
violating VPN security best practices and regulatory obligations (such as
GDPR and PCI DSS). Strong VPN settings are required by regulatory
organizations for financial institutions such as METROPOLIS CAPITAL
Bank to guarantee the safe processing and transfer of sensitive data.
• Security Vulnerabilities: The bank may be vulnerable to security flaws
including inadequate encryption technologies or inappropriate authentication
techniques due to misconfigured VPN settings. This makes private company
information, sensitive financial data, and consumer information vulnerable to
illegal access or interception by bad parties.
• Operational Disruptions: VPNs that are improperly configured may cause
frequent disconnections, slow connection speeds, or trouble accessing
important services and apps. Because they depend on VPN connections to do
their work efficiently, remote workers' productivity is impacted, which
influences overall corporate operations.
• Operational Costs: For the bank, fixing VPN misconfigurations and dealing
with the subsequent security problems may be quite expensive. These costs,
which affect the bank's overall financial stability and operational
effectiveness, include those associated with IT troubleshooting, security
remediation initiatives, regulatory fines, and even lawsuit fees.
• Customer Trust and Reputation: Data breaches and other VPN-related
security problems, along with service outages, may reduce customers' trust in
the bank's capacity to protect their financial information. Consumers expect
that their financial institutions will adhere to strict guidelines for data security
Page 41 of 125
Karan Hasintharan | Security | Assignment
and dependability. Any compromise in these areas runs the risk of alienating
customers and even costing your business.
Page 42 of 125
Karan Hasintharan | Security | Assignment
• Trust and Control Issues: The bank's ability to manage its data
security decreases when it licenses out VPN services to outside parties.
The third-party provider must be trusted by the bank to put strong
security measures in place and keep them up to date. The operational
integrity and security posture of the bank may be immediately
impacted by any supplier failure or breach.
Page 43 of 125
Karan Hasintharan | Security | Assignment
• Unsecured Wi-Fi Networks: Making a connection to a poorly protected
public or home network exposes private data to the risk of being captured by
hostile parties.
• Lack of Security Awareness: Workers may be ignorant of security best
practices or the unique dangers connected to working remotely.
• Inadequate Endpoint Security: Because they may not have firewalls,
antivirus software, or encryption, remote devices are more vulnerable to
assaults.
• Insider Threats: Workers with access to sensitive information may
purposefully or unintentionally abuse their powers, which might result in
security issues.
METROPOLIS CAPITAL Bank may put these precautions into practice to mitigate these
dangers and provide a secure environment for working remotely:
Technical Measures
Page 44 of 125
Karan Hasintharan | Security | Assignment
• Access Controls: Make sure workers only have access to the information and
systems they require for their jobs by enforcing strict access restrictions based
on the principle of least privilege.
• Regular Software Updates and Patching: To guard against known
vulnerabilities, make sure that all remote devices and apps are frequently
updated and patched.
• Mobile Device Management (MDM): Manage, keep an eye on, and
safeguard employee mobile devices used for remote work by utilizing MDM
solutions.
Administrative Measures
• Remote Work Policies: Create and implement thorough policies for remote
work that include permitted usage, security specifications, and worker
obligations.
• Secure Backup Solutions: To make sure that important data is often backed
up and can be restored in the event of data loss or ransomware attacks, use
secure backup solutions.
• Security Awareness Training: Employees should get frequent training on
security best practices, phishing awareness, and the unique dangers of working
remotely.
• Regular Security Audits: Perform routine security audits and evaluations of
remote work settings to find and fix any vulnerabilities.
• Incident Response Plan: Provide a clear incident response strategy that
remote workers may go to in the case of a security breach or other suspicious
activities.
Page 45 of 125
Karan Hasintharan | Security | Assignment
Physical Measures
METROPOLIS CAPITAL Bank may greatly improve the security of its remote working
environment by putting in place a mix of administrative, technical, and physical
precautions. This comprehensive approach will support the preservation of regulatory
compliance, protect sensitive data, and ensure the continued confidence and contentment
of the bank's stakeholders and clients.
2.4 Discussing how implementing a static IP, NAT, and DMZ in a network can
improve network security for Metropolis Capital Bank and benefit both the
bank and Clients.
I. Static IP
An IP address that is fixed and doesn't change over time is known as a static
IP address. For financial organizations like METROPOLIS CAPITAL Bank to
provide uninterrupted services and secure remote access, this guarantees
continuous and dependable network connections.
Page 46 of 125
Karan Hasintharan | Security | Assignment
• Enhanced Network Performance and Reliability: Reliable
connections may be maintained with the use of static IPs. For instance,
static IP addresses might be allocated to the bank's servers that host
online banking apps. This increases the operational stability of the
bank by ensuring the continuous availability of services like online
banking and transaction processing.
• Improved Security: Improved security measures are made possible by
static IPs. Static IPs allow firewalls to be set more efficiently by
limiting traffic to known IP addresses. To mitigate the danger of illegal
access, the bank's internal systems can be configured to only accept
connections from the static IP addresses allocated to the branch offices.
Example: Customers and staff will continue to get uninterrupted service since
the bank's core servers, which handle financial operations, will always be
available via the use of static IPs.
Page 47 of 125
Karan Hasintharan | Security | Assignment
addresses from outside parties, NAT improves IP address use and provides an
extra degree of protection.
Example: By using NAT, the bank can assign private IP addresses to internal
devices and use a single public IP for its internet gateway. By keeping the
underlying network structure hidden from the public, this configuration
improves security and preserves IP addresses.
• Stable and Secure Services: Clients that have NAT installed see fewer IP
address conflicts, which guarantees a more reliable and consistent service
while using online banking functions.
• Protected Transactions: NAT helps clients by adding an extra layer of
protection that makes it more difficult for attackers to link the client's
Page 48 of 125
Karan Hasintharan | Security | Assignment
connections to internal bank systems. This ensures safer data exchanges and
online transactions.
Example: The bank can use the DMZ for its online banking interface.
Customers can access their accounts and conduct transactions safely
thanks to this configuration, which also protects the internal banking
systems from any online threats.
Page 49 of 125
Karan Hasintharan | Security | Assignment
Benefits for the Bank and Clients:
• Improved Trust: It increases customer trust that the bank uses cutting-
edge security measures like a DMZ. Customers may rest easy knowing
that the bank takes the security of their data seriously, which is essential to
maintaining business.
• Secure Access to Services: The DMZ offers improved protection for
customers using services like online banking and customer care portals.
This guarantees safe and dependable interactions between them and the
bank's services for the public.
Page 50 of 125
Karan Hasintharan | Security | Assignment
3 Activity 03
A successful risk management plan must include risk assessment. A comprehensive risk
evaluation procedure has several significant benefits for METROPOLIS CAPITAL Bank,
which runs a huge network of branches and ATMs and offers a wide range of financial
services:
Prioritization of Risks
Risk assessment helps prioritize the biggest dangers to the bank by analyzing the
possibility and effect of various risks. By addressing the highest-risk areas first, this
prioritizing guarantees that resources are spent efficiently, maximizing the usage of staff,
money, and time.
Identification of Vulnerabilities
The risk assessment process assists in locating weak points in the bank's IT infrastructure,
including core banking platforms, ATM systems, branch networks, and data centers. By
anticipating possible voids, the bank may take appropriate measures to minimize them
before fraudulent actors take advantage of them.
Page 51 of 125
Karan Hasintharan | Security | Assignment
assessments help with the maintenance of the bank's reputation and assist prevent legal
fines by ensuring compliance with these rules.
Improved Decision Making
A comprehensive risk assessment procedure gives management important insights into
the security environment. Leaders may make well-informed decisions by using this
information to select the most effective plans of action and investments to strengthen the
bank's security posture.
Stakeholder Confidence
The bank's dedication to security appears in the regular risk assessments and the
application of efficient risk management techniques. Customers, staff members,
regulators, and investors will all feel more confident in the bank's capacity to protect their
interests as a result of this commitment.
Business Continuity
The continuation of banking operations is helped by the identification and mitigation of
risks. Even in the case of adverse events, the bank can preserve service availability and
dependability by anticipating such disruptions and having backup measures ready.
Assets:
• Data Centers:
o Primary Data Center: Located in Colombo.
o Secondary Data Center: Located in Galle.
o High-Performance Servers: Hosted on the fourth floor of the Head
Office in Kollupitiya.
• ATM Network:
o There are 500 ATMs on the island.
Page 52 of 125
Karan Hasintharan | Security | Assignment
• Customer Data:
o Customers' financial and personal information
o Extremely sensitive and in need of strong security measures.
• Branch Infrastructure:
o More than 100 locations across Sri Lanka.
o Branch connectivity is dependent on MPLS and VPN services being
provided via ISP lines.
Threats:
• Natural Disasters:
o Data centers and branch offices are among the physical infrastructure
that might be harmed by earthquakes and floods.
• Cyber-Attacks:
o Malware and Ransomware: Can disrupt banking operations and
compromise data integrity.
o Distributed Denial-of-Service (DDoS) Attacks: Can overwhelm
systems, causing downtime.
o Phishing and social engineering: Aim to get illegal access by targeting
workers.
• Equipment Failure:
o Power Outages: If backup power systems are not used appropriately,
they can result in downtime and data loss.
Page 53 of 125
Karan Hasintharan | Security | Assignment
o Hardware problems: ATMs, servers, and network equipment can all
malfunction and cause operations to be disrupted.
• Insider Threats:
o Accidental Breaches: Employees may unintentionally jeopardize
security by being careless or unaware.
o Malicious Insiders: Employees or contractors who have access to
private information or systems may deliberately harm.
2. Vulnerability Assessment
Regular Scanning:
• Automated Tools:
Weekly or monthly scan schedules are necessary to ensure the most recent
vulnerability finding. Maintaining an updated security posture is made easier by
routinely scanning the network, servers, and endpoints with a vulnerability
assessment (VA) scanning tool. To enable effective and efficient mitigation
efforts, the vulnerabilities found by these scans should be ranked in order of
impact, severity, and exploitability.
• Patch Management:
It is essential to update and patch all installed software regularly to minimize
known vulnerabilities. In addition, maintaining track of each program version and
patch level guarantees that the whole software inventory is regularly secured from
threats and kept up to date.
Penetration Testing:
• Internal Testing:
Internal penetration testing can be used to detect organizational vulnerabilities and
imitate hacks. Crucial systems including ATM networks, data centers, and core
banking should all be included in this testing to ensure a thorough evaluation of
any possible security flaws.
Page 54 of 125
Karan Hasintharan | Security | Assignment
• External Testing:
Annual testing should occur after significant changes to the IT system. Employing
independent security experts to carry out penetration testing and offer unbiased
insights into the organization's security defenses will ensure an objective
assessment of security posture.
3. Risk Analysis
Qualitative and Quantitative Analysis:
• Qualitative Analysis:
Rely on the knowledge and experience of IT security professionals to
assess the nature and potential consequences of the discovered dangers. To
fully analyze and prepare for prospective threats, develop risk scenarios
for different risks to comprehend the potential effects on operations.
• Quantitative Analysis:
To deliver data-driven insights, and support quantitative analysis using
historical data and trends. To ascertain the probability and financial impact
of risks, employ statistical and financial models. This will provide an
extensive and precise evaluation of possible hazards and their effects.
Risk Matrix:
• Development:
Group threats into four categories: low, medium, high, and critical. Sort
each risk according to its likelihood and potential impact. The risk matrix's
designated axes, "Likelihood" and "Impact," offer a methodical way to
rank and classify hazards.
Page 55 of 125
Karan Hasintharan | Security | Assignment
• Usage:
With excellent visualization, provide stakeholders with a clear visual image of
the risk environment that the organization is experiencing. Using the risk
matrix, prioritize the risks and concentrate mitigation efforts on the most
urgent ones to ensure that resources are deployed effectively to address the
biggest concerns.
4. Risk Treatment
Mitigation:
• Physical Security:
Install physical access controls, such as biometric scanners and key card
systems. Maintain constant CCTV surveillance in high-risk areas like data
centers, ATMs, and branch offices to improve security oversight and prevent
unwanted entry.
• Security Controls:
To closely monitor and regulate the use of privileged accounts, implement a
strong Privileged Access Management (PAM) system. To identify and respond
to endpoint threats proactively, introduce Endpoint Detection and Response
(EDR) systems. Set up and implement firewalls to stop unwanted users from
accessing the network. To improve overall cybersecurity posture and defend
against typical online assaults like SQL injection and cross-site scripting,
make use of Web Application Firewalls (WAF).
Transfer:
• Insurance
Physical assets like buildings and machinery are protected against hazards like
natural catastrophes by property insurance. Purchasing cyber insurance
policies provides complete risk coverage for both digital and physical assets,
guarding against monetary damages resulting from cyber events.
Page 56 of 125
Karan Hasintharan | Security | Assignment
• Contractual Agreements:
Create service level agreements (SLAs) to guarantee that vendors meet
security and performance requirements. Incorporate risk-sharing provisions
into vendor agreements with IT service providers to efficiently balance
obligations and reduce risks.
• Avoidance
Put an end to risks that surpass the risk tolerance of the company. Investigate
safer substitutes or different approaches to successfully reduce hazards.
• Acceptance
Assess risks within reasonable bank boundaries and record authorized risks
along with a justification. Monitoring these guarantees openness and well-
informed choices in risk management procedures.
• Continuous Monitoring:
o Network Monitoring Systems:
METROPOLIS CAPITAL Bank uses cutting-edge technology for network
monitoring and continuous surveillance. Anomaly detection technologies
help to quickly identify security events. Alerts ensure quick reaction and
mitigation by quickly informing IT security of any irregularities.
Page 57 of 125
Karan Hasintharan | Security | Assignment
• Regular Audits:
o Internal Audits:
METROPOLIS CAPITAL Bank should regularly carry out internal security
audits to assess put-in-place measures to guarantee ongoing security efficacy.
Complete compliance to regulatory regulations, industry standards, and
company rules is necessary. In-depth audit reports that emphasize conclusions
and offer suggestions for continued growth have to be produced.
Page 58 of 125
Karan Hasintharan | Security | Assignment
According to these regulations, METROPOLIS CAPITAL Bank must have policies in
place that support people's rights over their data, minimize data gathering, provide strong
data security procedures, and quickly identify data breaches. Maintaining confidence,
avoiding fines, and safeguarding consumer data all depend on compliance.
To preserve client data and maintain legal compliance, METROPOLIS CAPITAL Bank
must successfully implement regulatory standards into its daily operations. These statutes
are applied as follows:
Page 59 of 125
Karan Hasintharan | Security | Assignment
Payment Card Industry Data Security Standard (PCI DSS):
The Payment Card Industry Data Security Standard (PCI DSS), which specifies strict
security criteria for companies that conduct card transactions, must be followed while
handling payment card information. METROPOLIS CAPITAL Bank is required to have
strong security measures in place and keep them up to date, such as network monitoring,
regular vulnerability assessments, strict access limits, and encryption of cardholder data.
Following PCI DSS guidelines is crucial to safeguarding cardholder data against fraud,
theft, and unauthorized access, guaranteeing safe financial transactions, and maintaining
consumer and payment card provider confidence.
Page 60 of 125
Karan Hasintharan | Security | Assignment
Data Breach Response:
METROPOLIS CAPITAL Bank keeps an extensive data breach response method up to
date to quickly identify, evaluate, and address breaches. It involves ensuring compliance,
reducing the effect of events on data security, and promptly informing impacted parties
and regulatory agencies.
By putting these data protection laws into practice and following them, METROPOLIS
CAPITAL Bank can improve its overall data protection posture in addition to complying
with legal requirements. By putting a high priority on data security and privacy, the bank
builds stronger relationships with its customers, reduces the danger of data breaches, and
supports a safe and stable financial environment.
Explanation:
Risk is the impact of uncertainty on goals, according to ISO 31000. The approach
to risk management that is emphasized is comprehensive and methodical, and it
integrates easily into the organization's broader governance and management
structure. The approach may be used for any kind of risk, including those about IT,
operations, finance, and strategy.
Page 61 of 125
Karan Hasintharan | Security | Assignment
o Integration: Including risk management into all levels of the
organization's decision-making, procedures, and culture.
The following are the main steps of the ISO 31000 risk management methodology:
• Risk assessment: Assessing the risks that have been discovered according to their
probability and possible influence on data and IT systems. Prioritizing risks in this
manner requires qualitative as well as quantitative evaluation.
Within the framework of IT security, ISO 31000 offers a methodical way to efficiently
handle cybersecurity risks:
Page 62 of 125
Karan Hasintharan | Security | Assignment
• Risk Treatment Strategies: Creating IT security guidelines, protocols, and
protections to reduce threats that have been discovered. This could include
putting in place operational (like incident response plans and access
restrictions), technological (like firewalls and encryption), and managerial
(like risk awareness training and governance frameworks) controls.
Using the ISO 31000 risk management approach, businesses may improve their capacity
to detect, evaluate, and handle IT security threats efficiently. It promotes a proactive
approach to cybersecurity by making sure that risks are controlled in an organized,
methodical way to safeguard vital resources and preserve business continuity.
While an IT security audit is essential for evaluating how well security measures are
working, it may also have a variety of negative and good effects on corporate security.
This is an examination of potential effects:
Positive Impacts:
1 Compliance Verification
Audits ensure adherence to internal data protection policies and legal obligations
such as GDPR and PCI DSS. By doing this verification, fines are avoided,
reputations are protected, and stakeholder faith in strong security measures is
increased.
Page 63 of 125
Karan Hasintharan | Security | Assignment
2 Improvement in Security Awareness
Training programs that improve staff knowledge of IT security guidelines and best
practices are part of audits. This lowers insider risks, increases adherence to
security procedures, and promotes a watchful corporate security culture.
3 Identification of Vulnerabilities
System, network, and application vulnerabilities are found through IT security
audits, allowing for proactive remediation before exploitation. Organizations can
strengthen their security posture against possible cyberattacks by rapidly fixing
flaws.
Challenging Impacts:
5 Discovery of Systemic Issues
IT audits often reveal structural problems with the governance structure or IT
infrastructure that call for significant corrective action. To effectively address
these problems, it may be necessary to make intricate and expensive adjustments
to IT systems and procedures. This will call for careful planning and budget
allocation.
Page 64 of 125
Karan Hasintharan | Security | Assignment
Completing thorough IT security audits requires significant time, manpower, and
financial commitment. This allocation may take focus away from strategic
objectives and day-to-day operations, which might have an impact on the
organization's overall productivity and operational efficiency.
8 Potential Disruption
Comprehensive audits have the potential to temporarily interrupt regular IT
operations, especially if they involve invasive evaluations or penetration testing.
Business continuity and service delivery are put at risk by these interruptions,
which emphasizes the necessity of careful planning and proactive mitigation
techniques to reduce downtime and operational damage.
Page 65 of 125
Karan Hasintharan | Security | Assignment
understand the importance of following company standards and aid develop a culture
of security awareness.
Provide specific guidelines for governance for IT security projects and get support
from the senior leadership. Make certain that top management takes an active part in
establishing the organization's security goals, assigning resources, and promoting a
security-conscious culture.
Page 66 of 125
Karan Hasintharan | Security | Assignment
3.5 How Misalignment of IT organizational policies impact security
A mismatch between organizational policies and IT security can have a major effect on an
organization's security. Important security consequences of misalignment include the
following:
Higher Risk Exposure: When security priorities and risk management techniques are not
clearly defined, it is frequently the result of misalignment. Sensitive information, systems,
and infrastructure may not be sufficiently protected due to possible dangers such as
malware attacks, data breaches, and insider threats.
Staff Conduct and Awareness: Employees may not fully understand their roles and
duties in ensuring security when policies are unclear or poorly expressed. This may lead
to inadvertent security events brought on by mistakes made by people or by ignorance of
security best practices.
Effect on Incident Response: If policies aren't in line, incident response activities might
be disorganized or run beyond schedule. Insufficient protocols may make it more difficult
Page 67 of 125
Karan Hasintharan | Security | Assignment
to identify, control, and resolve security events promptly, which might worsen their
effects on company operations.
Organizations should make sure that IT security policies are routinely evaluated and
modified to comply with changing industry standards, legal requirements, and business
objectives to reduce these risks. Establishing a strong security culture throughout the firm
requires clear policy communication, comprehensive training programs, and persistent
enforcement. Through better alignment of IT policies with organizational objectives,
firms may strengthen their defenses against cyber-attacks and better safeguard their vital
resources.
Page 68 of 125
Karan Hasintharan | Security | Assignment
4 Activity 04
Purpose:
• Ensure the accessibility, privacy, and accuracy of information resources.
• Lower risks and reduce the effect of security breaches.
Scope:
• Addresses data security, network infrastructure, access restrictions, staff
duties, and physical security.
• Concerns all workers, independent contractors, and outside suppliers.
Objective:
• Addresses data security, network infrastructure, access restrictions, employee
duties, and physical security.
• Concerns all workers, independent contractors, and outside suppliers.
Key Components:
• Access Controls: establish and manage user privileges and data and system
access.
• Incident Response: Define processes for recognizing, handling, and getting
past security-related incidents.
• Data Protection: Establish policies in place to protect confidential information.
• Employee Responsibilities: Train employees about security risks and their
contributions to security maintenance.
Commitment:
• Regularly assess potential risks and enhance security procedures.
• Exhibit commitment to security, legal compliance, and customer confidence.
Page 69 of 125
Karan Hasintharan | Security | Assignment
4.1.2 Policy Statement
We must align the security policy with the operational and legal criteria of
METROPOLIS CAPITAL Bank to create and execute an appropriate security program.
The objective of this policy is to stop the bank's IT systems and data from being abused or
exploited. The organizational policy tools used in the thorough security policy design
below were specially created to meet the unique requirements of METROPOLIS
CAPITAL Bank.
Policy:
To accomplish this goal, METROPOLIS CAPITAL Bank uses critical procedures.
First, all users accessing the bank's systems must comply with multi-factor
authentication (MFA), which requires two or more verifications to improve
security beyond passwords.
Page 70 of 125
Karan Hasintharan | Security | Assignment
Secondly, Role-Based Access Control (RBAC) is used to assign access rights
based on job roles and responsibilities, ensuring that users have access to only the
resources required for their tasks.
Thirdly, access controls are regularly reviewed and revised to stay in line with
changing job roles and security requirements.
Lastly, Privileged Access Management (PAM) tools are used to manage and
monitor privileged accounts, utilizing the principle of least privilege to limit
access rights to the minimum required for performing jobs.
Justification:
The ability of these restrictions to avoid unwanted access to sensitive information
serves as justification. An additional degree of protection against credential theft
and illegal access attempts is provided by the MFA. By ensuring that users have
the proper access rights, RBAC lowers the possibility of illegal access leading to
data breaches. PAM technologies reduce the possibility of insider threats and
illegal system modifications by monitoring and managing privileged accounts. All
things considered, these steps improve the bank's security posture by protecting
critical systems and data and upholding regulatory compliance and consumer
trust.
Objective:
The objective of METROPOLIS CAPITAL Bank's data protection policy is to
protect the bank's data from unauthorized access, alteration, or destruction while
maintaining the assets' confidentiality, integrity, and availability.
Page 71 of 125
Karan Hasintharan | Security | Assignment
Policy:
The bank takes strong action to accomplish this goal. First, robust encryption
standards are used to secure sensitive data while it is in transit and at rest. This
procedure makes sure that data is protected and unreadable even if it is intercepted
or accessed maliciously.
The bank lowers the risk of data breaches and ensures compliance with legal
requirements by setting clear standards on how long data should be maintained
and how it should be securely disposed of when no longer needed.
Justification:
These policies' comprehensive approach to data protection serves as justification.
While the classification of data ensures that the proper security measures are taken
based on the sensitivity of the information, encryption protects data from
unauthorized access and maintains its secrecy. In addition to protecting data
throughout its lifecycle, defined retention periods and safe disposal techniques
ensure compliance with legal and regulatory requirements for data privacy and
protection. By putting these measures in place, METROPOLIS CAPITAL Bank
improves its capacity to protect confidential information, maintain client
confidence, and reduce the danger of data breaches.
Page 72 of 125
Karan Hasintharan | Security | Assignment
Policy:
To accomplish this objective, the bank set up an Incident Response Team
(IRT) with defined roles and responsibilities for handling security
incidents. This specialized team is essential for quickly containing
incidents, minimizing damage, and returning to regular operations.
Moreover, the bank put in place strong protocols for incident reporting,
documentation, and management, which ensure that all incidents are
reported on time, fully documented, and managed following established
protocols.
In addition, post-incident reviews are carried out to look for areas for
improvement and analyze the root causes of the incident. This proactive
approach enables the bank to quickly implement corrective measures,
improving its overall incident response capability.
Justification:
Because it helps METROPOLIS CAPITAL Bank to efficiently control and
minimize the impact of security events, this policy framework is crucial. The
bank may minimize service disruption, secure sensitive data, and maintain
customer trust by setting up a dedicated incident response team (IRT) and
putting up established incident response protocols. By the identification of
vulnerabilities and enhancement of incident handling procedures, the post-
event analysis reinforces the bank's security posture and ensures ongoing
progress in its reaction to new and emerging cyber threats.
Page 73 of 125
Karan Hasintharan | Security | Assignment
Policy:
The policy requires strict device security measures to accomplish this goal.
Antivirus software, device encryption, and secure setups are required for any
personal devices used for work. By doing this, it is made sure that devices that
connect to the bank's systems are safe from malware and unwanted access.
Furthermore, the usage of Multi-Factor Authentication (MFA) for remote
access and Virtual Private Networks (VPNs) is required to ensure safe
communication. By securing data transfer and verifying user identities, these
security measures reduce the possibility of unwanted access.
Justification:
Implementing this policy is critical as it enables METROPOLIS CAPITAL Bank
to maintain robust security measures while accommodating remote work and
BYOD practices. By mandating device security, secure connectivity, and data
access restrictions, the bank mitigates potential risks associated with remote
access and personal devices. This proactive approach enhances overall security
posture, safeguarding sensitive data against cyber threats and ensuring compliance
with regulatory requirements in a BYOD environment.
5. Network Security Policy
Objective:
METROPOLIS CAPITAL Bank's Network Security Policy aims to protect the
network infrastructure of the bank from online threats and unauthorized
access, ensuring the availability and integrity of vital systems and data.
Policy:
To accomplish that objective, the policy lists some crucial actions. It first
requires strict VPN and firewall management procedures. Strict access control
restrictions are enforced by firewalls, obstructing unwanted attempts to
penetrate the network perimeter. VPNs, or virtual private networks, are used to
create safe, encrypted connections for remote access, ensuring that
information sent over public networks is protected from interception.
Second, the policy requires the installation of systems for intrusion detection
Page 74 of 125
Karan Hasintharan | Security | Assignment
and prevention (IDPS). These systems maintain an eye on network traffic all
the time to detect unwanted access attempts and suspicious activity. IDPS
contributes to the preservation of the network infrastructure's integrity and the
prevention of security breaches by quickly recognizing and addressing
possible threats.
The policy also highlights network segmentation as an essential strategy.
Splitting the network into separate parts allows for the isolation of critical
systems and data from less secure locations. By limiting the effect of security
incidents and unauthorized access attempts, this segmentation reduces the
possibility that cyber attackers may move laterally within the network.
Justification:
The bank's network defensive systems are reinforced, and potential attack
routes are reduced by putting these measures into action, improving the overall
security stance. Only authorized users can access the network thanks to the
proactive administration of firewalls and VPNs, and IDPS offers real-time
threat detection and response capabilities. By isolating essential resources and
restricting possible breaches, network segmentation further reduces risk. When
combined, these strategies reduce the possibility of cyberattacks and illegal
access, protecting the bank's network infrastructure and ensuring business
continuity.
Policy:
It involves carrying out thorough risk assessments for every vendor with
access to the systems and information of the bank. To ensure that vendor
contracts adhere to the bank's security rules, the policy requires that vendor
Page 75 of 125
Karan Hasintharan | Security | Assignment
contracts contain particular security criteria. It also requires routine audits to
check vendor security procedures.
Justification:
This strategy reduces potential risks by imposing strict security requirements
when interacting with third-party vendors. By ensuring that suppliers follow
the bank's security guidelines, confidential data is protected, and operational
integrity is upheld.
Policy:
It involves educating all employees on cybersecurity procedures through
required security awareness training sessions. Regular phishing simulations
are also required by the policy to assist staff members in identifying and
successfully blocking phishing attacks. Employee acknowledgment of
awareness and adherence to security policies is also necessary.
Justification:
This strategy promotes employees to have a security-conscious mindset, which
reduces the possibility of insider attacks and human mistakes. Through
training and simulations, the bank decreases vulnerabilities to cyber-attacks
and increases its entire security posture through supplying them with the
necessary information and skills.
Page 76 of 125
Karan Hasintharan | Security | Assignment
4.2 Evaluating and justifying the suitability of the tools used in an organizational
policy to meet business needs.
The METROPOLIS CAPITAL Bank's organizational policies and tools are essential for
combating resource misuse and exploitation. These instruments assist in the efficient
implementation and enforcement of security rules. The following are the main
instruments and their justifications and explanations:
Page 77 of 125
Karan Hasintharan | Security | Assignment
techniques, which intercepted or
render it viewed without
unreadable both in permission.
transit and at rest
(during
transmission and
storage).
Page 78 of 125
Karan Hasintharan | Security | Assignment
Intrusion Detect and prevent IDPS technologies offers real-time
Detection and malicious can take cyber threat
Prevention activities. preventative protection and
Systems (IDPS) measures like monitoring, assisting
blocking or alerting in the early detection
in addition to and mitigation of
monitoring assaults before they
network and have a significant
system activity for negative impact.
malicious activity
and policy
breaches.
Page 79 of 125
Karan Hasintharan | Security | Assignment
Endpoint Monitor and Endpoints ensures the security
Detection and protect endpoints. including PCs, of any device linked
Response (EDR) laptops, and mobile to the network,
devices are guarding against
continuously endpoint-based
monitored and threats.
threats are
responded to with
the help of EDR
solutions.
Page 80 of 125
Karan Hasintharan | Security | Assignment
4.3 Identifying the stakeholders who are subject to the METROPOLIS CAPITAL
Bank.
The operations and security protocols of METROPOLIS CAPITAL Bank are subject to
the influence and impact of its stakeholders. Meeting their demands, guaranteeing
strategy alignment, and improving overall security all depend on their positions being
understood. Successful stakeholder management is essential to the bank's performance as
well as adherence to audit recommendations and security regulations.
Page 81 of 125
Karan Hasintharan | Security | Assignment
bank's IT systems, apps, data, put security measures
and infrastructure. in place, and handle IT
emergencies.
Page 82 of 125
Karan Hasintharan | Security | Assignment
don't jeopardize the
security of the institution.
i. Board of Directors
Role:
The bank's security policies and audit recommendations are approved by the
Board of Directors, which also conducts strategic control over them. They
ensure the security protocols comply with both the regulatory requirements
and the bank's overarching strategic goals. Major security initiatives and audit
results are reviewed and approved by the Board, which also makes sure that
sufficient resources are set aside for their execution.
Page 83 of 125
Karan Hasintharan | Security | Assignment
conclusions, and create strategies for corrective measures. To implement
security controls, the CISO coordinates with various departments and makes
sure that security measures are continuously monitored and improved.
iv. IT Department
Role:
During security audits, the IT Department offers support and technical
knowledge. Technical controls like firewalls, intrusion detection systems, and
encryption have been set into place and kept up to date by them. The IT
department is in charge of fixing any technological flaws found during audits
and making sure the bank's IT infrastructure runs securely.
v. Compliance Department
Role:
The Compliance Department makes ensuring that audit recommendations and
security procedures abide by legal standards. They support the bank's security
procedures by helping understand and incorporate regulatory standards. In
addition, they work in conjunction with auditors to guarantee that the bank's
procedures adhere to both internal and external compliance guidelines.
Page 84 of 125
Karan Hasintharan | Security | Assignment
programs, which contribute to the development of a culture that values
security. Additionally, HR oversees the onboarding and offboarding
procedures to ensure that access rules are correctly upheld.
viii. Employees
Role:
Employees must follow security guidelines and take part in security awareness
training. They are essential in identifying and reporting suspicious activity or
security problems. Workers are crucial in putting security procedures into
place and serve as the first line of defense against security risks.
x. Customers
Role:
Clients must be informed of and comply with the bank's security procedures,
which include creating strong passwords and reporting unusual activity. By
following secure banking procedures, they contribute to protecting their
account information and strengthening the bank's overall security posture.
Page 85 of 125
Karan Hasintharan | Security | Assignment
4.4 Disaster Recovery Plan for METROPOLIS CAPITAL Bank
For businesses like METROPOLIS CAPITAL Bank, having a strong disaster recovery
plan is essential to maintaining operations and reducing downtime from natural disasters,
cyberattacks, or equipment malfunctions. This kind of strategy seeks to minimize
downtime and financial losses by quickly restoring vital systems and operations.
Additionally, it strengthens data security protocols, protecting customer information in
times of emergency. Comprehensive emergency plans are also necessary for regulatory
compliance in the financial sector, as they show the bank's dedication to maintaining legal
requirements and preserving client confidence. At the end of the day, a well-thought-out
disaster recovery plan helps METROPOLIS CAPITAL Bank respond to delays, protect
its operations, and continue providing services to its customers.
Page 86 of 125
Karan Hasintharan | Security | Assignment
o Data Backup Procedures: To guarantee data availability and integrity,
regularly create backups of vital data from primary and secondary data
centers.
o Backup Storage: To protect against loss or physical damage to primary
sites, store backups in safe off-site locations.
• IT Infrastructure Recovery
o Restoration of Hardware and Software: Keep track of any essential
hardware and software, together with licensing information and
configuration parameters, that are required for restoration.
o Establish acceptable downtime and data loss thresholds for vital IT
systems and services through Recovery Time Objectives (RTO) and
Recovery Point Objectives (RPO).
o Alternative IT Infrastructure: Have backup plans in place in case the
main systems are breached. These plans should include cloud services
or activation of a parallel data center as a means of restoring IT
services.
• Communication and Coordination
o Internal Communication Plan: Set up procedures and lines of
communication to alert staff members in the event of an emergency.
o External Communication Plan: To preserve transparency and
confidence, specify communication tactics for clients, suppliers, and
authorities.
Page 87 of 125
Karan Hasintharan | Security | Assignment
o Coordination with External Partners: To guarantee an integrated and
prompt restoration of services, coordinate recovery activities with
outside vendors and service providers.
Page 88 of 125
Karan Hasintharan | Security | Assignment
4.4.3 Justifications and reasons for decisions and options used.
Page 89 of 125
Karan Hasintharan | Security | Assignment
Training and Testing Regular training sessions and exercises
boost staff readiness by confirming
reaction skills and refining DRP protocols
to increase resistance to possible attacks.
Page 90 of 125
Karan Hasintharan | Security | Assignment
4.5.2 Policy Statement
The creation of an extensive IT disaster recovery plan (DRP) that covers all crucial and
important infrastructure components, systems, and networks is emphasized in Metropolis
Capital Bank's policy statement. The precise DRP needs will be determined through a
comprehensive risk assessment. The efficacy of the approach will be checked regularly in
a simulated setting. All employees will also get training about the DRP and their
responsibilities within it. The DRP will be updated to reflect any changes in the market,
ensuring that the bank's requirements and industry best practices are consistently met.
Primary Objective:
Creating, testing, and documenting a well-organized disaster recovery plan is
the main objective. This strategy needs to be thorough and strong to ensure
that the business can recover from any crisis with the least amount of
downtime and loss of services or data.
Page 91 of 125
Karan Hasintharan | Security | Assignment
Adhering to operational policies within planned activities:
The company's current operating policies and its disaster recovery plan need to
align. This ensures that all operations during a disaster follow internal and
regulatory regulations and that recovery efforts do not clash with routine
processes.
Work 0714555555
Alternate 0718555555
Ruwan Fernando IT Director Mobile 0756965965
Home 0112456568
Email [email protected]
Alternate Email [email protected]
Work 0718555555
Alternate 0719555555
Sasanka Network Mobile 0756964964
Sandaruwan Manager Home 0112456562
Page 92 of 125
Karan Hasintharan | Security | Assignment
Email [email protected]
Alternate Email [email protected]
Work 0712555555
Alternate 0712555555
Thushara Mobile 0756744964
Jayawardana CISO (Chief Home 0117456562
Information Email [email protected]
Security Officer) Alternate Email [email protected]
Work 0712558855
Alternate 0712554755
Damitha Peris Database Admin Mobile 0756746564
Home 0117452362
Email [email protected]
Alternate Email [email protected]
Page 93 of 125
Karan Hasintharan | Security | Assignment
manager Alternate 0712444755
Mobile 0756744564
Home 0117444362
Email [email protected]
Alternate Email [email protected]
Page 94 of 125
Karan Hasintharan | Security | Assignment
4.5.6 External Contact
Page 95 of 125
Karan Hasintharan | Security | Assignment
4.5.7 External Contacts Calling Tree
Page 96 of 125
Karan Hasintharan | Security | Assignment
4.5.8.2 Plan Documentation Storage
The DRP will be safely maintained in physical copy and digital format. To
maintain silence, digital copies will be encrypted and kept on safe servers that
are only accessible by those with authorization. Hard copies shall be maintained
for senior management and members of the Disaster Recovery (DR) team in safe,
easily accessible areas. This ensures that in the event of a digital system failure,
the plan may still be accessed, enabling the DRP to be executed without any
problems.
4.5.8.3 Backup Strategy
METROPOLIS CAPITAL Bank has a strong backup plan with a recovery site that is
completely replicated. This configuration ensures minimum disruption during an incident
by enabling rapid switching between the backup site and the live site for critical business
functions. Real-time data synchronization is used to maintain the mirrored site, protecting
the bank's operations and clients by ensuring that vital business processes may continue
with the least amount of disruption and data loss.
The possible disruptive risks that might affect METROPOLIS CAPITAL Bank's regular
business operations are listed in the section that follows. Every possible environmental
catastrophe or disaster has been evaluated for likelihood and impact, with particular
attention to the probable degree of business interruption. A brief overview of possible
outcomes and corrective measures is provided in the table.
Page 97 of 125
Karan Hasintharan | Security | Assignment
floors include smoke and fire detectors.
There are routine maintenance
inspections and fire drills.
Tornado 5 3 There are storm shelters and structural
reinforcements. Every year, emergency
response strategies are evaluated.
Page 98 of 125
Karan Hasintharan | Security | Assignment
Probability: 1=Very High Impact: 1=Total destruction
5=Minor annoyance 5=Very Low
4.5.10 Emergency
The DRP is triggered to reduce the effect and restore operations when certain
triggers are detected. They are continually verified.
At the far end of the main parking lot is the designated major assembly site. This spot was
picked since it is close to the structure yet still far enough away to be secure from any
dangers.
The corporate parking lot across the street serves as an alternate assembly location if the
primary assembly place is dangerous or unavailable. This guarantees that workers will
have a place to congregate in case of an emergency that is both accessible and safe.
Page 99 of 125
Karan Hasintharan | Security | Assignment
4.5.10.3 Activation of Emergency Response Team (ERT)
When it comes to the immediate reaction to an emergency, the Emergency Response
Team (ERT) is essential. When a major disturbance is detected, the ERT:
• Notification and Allocation: The ERT makes certain that every worker is
informed of the emergency. They provide tasks for team members, making sure
that everyone is aware of their obligations and what to do in case of an
emergency.
• Immediate Response: The ERT members work quickly to analyze the impact of
the disaster by reacting to the situation as soon as possible.
• Assessment and Decision: Depending on the nature and severity of the disaster
they determine which DRP components need to be triggered after assessing the
amount of the damage.
The DRP's implementation and business operations restoration fall within the authority of
the Disaster Recovery Team (DRT). Among their duties are:
• Restoring vital Services: To reduce downtime, the team prioritizes the most
important tasks and attempts to restore vital business services within four hours.
The names and phone numbers of every employee in each department will be kept in hard
copy by the management team. Furthermore, if the company's headquarters facility is
destroyed, rendered inoperable, or rendered useless, the management team members will
have a hard copy of the company's disaster recovery and business continuity plans on file
in their homes.
To address the crisis or tragedy and the company's immediate plans, designated
workers will make calls to other employees, with managers acting as the focal point
for their respective divisions. Workers are recommended to contact the employee's
emergency contact to alert them of the disaster if they are unable to reach the staff
member on their call list.
The selected backup staff member will handle notification responsibilities if management
or an employee assigned to speak with other employees is unable or unavailable.
Staff members can contact a toll-free hotline included in the DRP wallet card to get the
most recent information on the crisis and the organization's response. Information on the
disaster's nature, assembly locations, and updates on the start of work will all be included
in the announcements.
If it becomes essential, SunGard's hot site will be initiated, and managers will be notified
either by recorded messages or direct conversations. For the first twenty-four hours, only
members of the disaster recovery team will staff the hot site; additional staff members
will join as needed.
It will be important to promptly tell the employee's immediate family members if the
event has led to a scenario that would worry the employee's family, such as the
hospitalization of wounded parties.
4.5.17 Media
Media Contact
Assigned Staff:
After a disaster, certain staff members are in charge of handling media
relations. To ensure accurate and consistent information transmission, they
will follow pre-approved rules in their operations. These recommendations
aim to effectively manage every aspect of communications following a
tragedy.
Media Strategies
• Avoiding Adverse Publicity:
The bank will work to minimize any harm to its image by managing the story
and giving the media accurate, brief, and clear information.
To improve its reputation, the bank will seek chances to emphasize its
strengths, which include the durability of its operations, community support,
and the efficiency of its disaster response.
4.5.18 Insurance
METROPOLIS CAPITAL Bank has created many crucial insurance policies as part of its
comprehensive disaster recovery and business continuity plans. The purpose of these
plans is to offer help and financial protection in the case of different disruptive situations.
The principal insurance policies in force consist of:
Financial Assessment
Immediately after a disaster, the Emergency Response Team (ERT) is required to do an
initial financial impact assessment. The purpose of this assessment is to put a number on
the incident's direct and indirect financial effects. Important components of the evaluation
must comprise:
Financial Requirements
METROPOLIS CAPITAL Bank's urgent financial demands must be met to maintain
operations during the recovery stage. Important things to think about are:
After a tragedy, the ERT and the legal department work together to assess any possible
legal repercussions. Important activities consist of:
• Regulatory Compliance: Make sure that all measures implemented both during
and following the disaster adhere to applicable legal requirements. This might
entail assisting with any investigations and reporting the occurrence to authorities
in charge of regulations.
• Claims Evaluation: Determine if the bank may be the target of legal claims made
by or against you because of the incident. This involves assessing liabilities
resulting from client complaints, legal penalties, or contractual duties.
• Situation Impact Review: Examine the situation in detail to find out whether
there are any legal ramifications, including any possible infractions of regulations.
Regular exercises and testing are necessary to make sure the Disaster Recovery Plan
(DRP) is working properly. Through these exercises, the functioning of the plan will be
confirmed, any flaws or gaps will be found, and everyone involved will be made aware of
their duties and responsibilities in the event of a crisis.
• Cisco, 2023. The risks of misconfigured firewalls and VPNs. [online] Available
at: https://www.cisco.com/c/en/us/products/security/firewalls/impact-of-
misconfiguration.html [Accessed 20 July 2024].
• Ernst & Young, 2021. Global Information Security Survey 2021. [pdf] Available
at: https://www.ey.com/en_gl/information-security/global-information-security-
survey-2021 [Accessed 20 July 2024].
• Cisco, 2022. Network Address Translation (NAT) for Security. [online] Available
at: https://www.cisco.com/c/en/us/products/security/nat-for-security.html
[Accessed 20 July 2024].
• ISO, 2018. ISO 31000:2018 – Risk management. [online] Available at:
https://www.iso.org/iso-31000-risk-management.html [Accessed 20 July 2024].
• International Organization for Standardization, 2018. ISO 31000:2018 – Risk
management – Guidelines. [pdf] Available at:
https://www.iso.org/standard/65694.html [Accessed 20 July 2024].
• Verizon, 2022. 2022 Data Breach Investigations Report. [pdf] Available at:
https://enterprise.verizon.com/resources/reports/dbir/ [Accessed 20 July 2024].