FFIEC Customer Authentication Guidance: Authentication in an Internet Banking Environment.

Slides:



Advertisements
Similar presentations
FFIEC Agency Supplement to Authentication in an Internet Banking Environment
Advertisements

The Mobile Channel, TCPA and Privacy NCHELP New Orleans January 19, 2012 Mercedes Kelley Tunstall Of Counsel ballardspahr.com Jerod.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Technology Supervision Branch New FFIEC Guidance on Strong Authentication ABA Webcast January 11, 2006.
George Tubin Senior Analyst Consumer Banking © 2005 The Tower Group, Inc. May not be reproduced by any means without express permission. All rights reserved.
Online and Mobile Banking Fraud Issues and Hot Topics Treasury Management Association of Chicago 2012 Windy City Summit (Chicago, Illinois) Erin F. Fonté,
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Practical Flowcharting for Auditors
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Consumer Authentication in e-Banking & Part 748 – Appendix B Response Program Catherine Yao Information Systems Officer NCUA.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security Controls – What Works
Information Security Policies and Standards
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Risk Management. Risk Categories Strategic Credit Market Liquidity Operational Compliance/legal/regulatory Reputation.
Step 1: A.User enters id/pw for FI: encrypted in Quicken PIN vault B.Id/pw transmitted to Intuit CustomerCentral Servers at NCR using 128 bit SSL Step.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Top 10 Things a New BSA Officer Must Know. What is Associated Risk Group? Premier provider of BSA/AML regulatory best practices to financial institutions.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Information Systems
Section 12-2-Regulatory Agencies and Laws.   These agencies make or enforce rules and regulations  Agencies provide oversight or supervision of activities.
1 CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group 2010 Alaska Credit Union League Annual Meeting.
CFPB NCUA High Cost Mortgages Escrow Requirements Ability to Repay Servicing Small Credit Union Rule Low Income Designation CU Troubled Condition.
2015 ANNUAL TRAINING By: Denise Goff
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
September 14, David A. Reed Attorney at Law Reed & Jolly, PLLC (703)
AUTHENTICATION IN AN INTERNET ENVIRONMENT Dominick E. Nigro NCUA Information Systems Officer.
© 2009 National Automated Clearing House Association. All rights reserved. Industry Perspectives on Emerging Risks and Public/Private Engagement: Network.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
For broker-dealer use only. Not for use with the public. PROCU 2012 ANNUAL MEETING REGULATORY UPDATE Michael D. Burns Chief Compliance Officer October.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
New A.M. Best Cyber Questionnaire
FFIEC Cyber Security Assessment Tool
Chapter 8 Auditing in an E-commerce Environment
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Fall  Comply with PCI compliance policies set forth by industry  Create internal policies and procedures to protect cardholder data  Inform and.
The NIST Special Publications for Security Management By: Waylon Coulter.
FFIEC Cybersecurity Assessment Tool Maine Credit Union League September 23, 2015 Patrick Truett, Information Systems Officer National Credit Union Administration.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Wire Fraud Prevention Training: Setting Your Organizational Structure to Mitigate Fraud Risk and Comply with Regulatory Expectations Presented by: Terri.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Consumer Authentication in e-Banking & Part 748 – Appendix B Response Program Catherine Yao Information Systems Officer NCUA.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
New A.M. Best Cyber Questionnaire
Red Flags Rule An Introduction County College of Morris
Federal Reserve Retail Payments Risk Forum
Neopay Practical Guides #2 PSD2 (Should I be worried?)
University of Maryland Robert H. Smith School of Business
Presentation transcript:

FFIEC Customer Authentication Guidance: Authentication in an Internet Banking Environment

About the Speaker Matthew Clohessy, CPA, CIA, has six and a half years of experience as an internal auditor at mid- sized commercial banking institutions where he specializes in evaluating internal controls over electronic banking delivery channels, retail and commercial banking operations, loss prevention and consumer banking regulatory compliance. Prior to his career in internal auditing, Mr. Clohessy was a network administrator for a small company in the office design industry for four years, where he was responsible for the operation, security and maintenance of the company’s IT infrastructure.

Discussion Topics Overview of the FFIEC Evolution of the guidance Evolving cybercrime fraud landscape Objectives of the guidance Layered security approach Risk assessments Recent court cases New FFIEC working group

Overview of the FFIEC The Federal Financial Institutions Examination Council (FFIEC) is an interagency body which promotes uniformity and consistency in the supervision of financial institutions through establishing uniform principles, standards and report forms for financial institution regulatory agencies. Regulatory Agencies: Board of Governors of the Federal Reserve System (FRB); Federal Deposit Insurance Corporation (FDIC); National Credit Union Administration (NCUA); Office of the Comptroller of the Currency (OCC); and Consumer Financial Protection Bureau (CFPB) (Joined July 2011)

Evolution of the Guidance The “Authentication Guidance” issued by the FFIEC continues to evolve as new technologies emerge and as changes occur in the fraud environment that financial institutions are faced with: August 2001: Authentication in an Electronic Banking Environment October 2005: Authentication in an Internet Banking Environment (Replaced 2001 Guidance) June 2011: Supplement to Authentication in an Internet Banking Environment The “2001 Guidance” focused on risk management controls necessary to authenticate the identity of retail and commercial customers accessing Internet-based financial services The “2005 Guidance” replaced the 2001 Guidance and provided a risk management framework for financial institutions offering Internet based products and services to their customers. The “2011 Supplement” reinforced the 2005 Guidance’s risk management framework and updated the Agencies’ expectations regarding customer authentication, layered security, or other controls.

Evolving Cybercrime Landscape Organized crime rings with significant financial backing Cyber criminals are utilizing malware designed specifically to collect user ids/passwords from infected devices (eg. Zeus/Zbot, Clampi/llomo, SpyEye) Increased sophistication of attacks Cross-channel fraud – Utilizing a combination of Web, Telephone and/or other electronic channels to execute fraudulent transactions. Layered assaults – Utilizing DDoS immediately after perpetrating fraud to prevent customers from accessing their accounts/identifying fraudulent transactions before they clear.

Objectives of the Guidance The FFIEC’s Authentication Guidance provides a set of guidelines for financial institutions on establishing a risk based control environment to prevent losses as a result of external fraud. The guidance focuses on implementing a layered security approach and executing periodic risk assessments to establish a commercially reasonable control environment for electronic financial services.

Layered Security Approach “Since virtually every authentication technique can be compromised, financial institutions should not rely solely on any single control for authorizing high risk transactions, but rather institute a system of layered security..” (2011 Supplemental guidance) A Layered Security approach relies upon different controls at different points of the transaction and consists a combination of the following elements to reduce the risks associated with high risk online activities: Multi-Factor Authentication Effective Layered Controls

Multi-Factor Authentication Multi-Factor Authentication consists of having more than one of the following “Factors”: Something the user knows (e.g., password, PIN); Something the user has(e.g., ATM card, smart card); and Something the user is (e.g., biometric characteristic, such as a fingerprint)

Multi-Factor Authentication Examples Authentication Requirements Considered Multi Factor Authentication Explanation User ID and passwordNo User ID and password are both "knowledge" factors Website login ID/password and user login ID/password No "Layers" of the same factor does not constitute multi-factor authentication User ID, password and hardware token generated verification code Yes Contains "knows" factors (User ID and Password) and "has" factors (hardware token generated code)

Effective Layered Controls Multi-Factor Authentication may not be considered a strong enough control by itself for high risk transactions (eg. high dollar wire transactions) or practical to implement (eg. retail web banking customers). As such, implementing additional controls is critical to establishing an effective layered control environment. Examples of layered controls: fraud detection and monitoring systems that include consideration of customer history and behavior and enable a timely and effective institution response; the use of dual customer authorization through different access devices; the use of out of band verification for transactions; the use of “positive pay,” debit blocks, and other techniques to appropriately limit the transactional use of the account enhanced controls over account activities; such as transaction value thresholds, payment recipients, number of transactions allowed per day, and allowable payment windows (e.g.,days and times); internet protocol (IP) reputation based tools to block connection to banking servers from IP addresses known or suspected to be associated with fraudulent activities; policies and practices for addressing customer devices identified as potentially compromised and customers who may be facilitating fraud; enhanced control over changes to account maintenance activities performed by customers either online or through customer service channels; and enhanced customer education to increase awareness of the fraud risk and effective techniques customers can use to mitigate the risk.

Establishing Effective Layered Controls A well designed control framework does not always mean that effective controls are in place: Effective authentication should have customer acceptance, reliable performance (with formally established policies and procedures), scalability to accommodate growth, interoperability with existing systems and future plan. Effective Layered controls must have quality substance, not just the form of a control. Challenge questions that are overused, or publically obtainable knowledge are not considered effective (eg. mother’s maiden name, high school the customer graduated from, year of graduation from college, etc). Utilization of sophisticated “out-of-wallet” questions along with “red herring” questions is considered effective. Simple device identification (cookie based) and geolocation can be circumvented through the use of copying cookie files and proxies. Use of “one time” cookies and more complex digital fingerprints are considered to be effective tools.

Risk Assessments Should be executed at least every twelve months and prior to implementing new electronic financial services. The risk should be evaluated in light of the type of customer (e.g., retail or commercial); the customer transactional capabilities (e.g., bill payment, wire transfer, loan origination); the sensitivity of customer information being communicated to both the institution and the customer; the ease of using the communication method; and the volume of transactions. Should incorporate elements such as: Changes to internal and external threat environment Changes to customer base Changes in customer functionality offered through electronic banking Volume of incidents (security breaches, compromised accounts, fraud events) experienced by the institution and the industry. Risk assessments should consider cross-channel fraud risks and highlight areas where a siloed assessment would define activity as “low risk”, but may provide additional information needed to authenticate or otherwise gain access through other channels and perform high risk activities.

Recent Court Cases FFIEC Guidance TestsUCC 4A Tests Case Commercially Reasonable Procedures (Layered Controls) Procedures found to be implemented in good faith Bank's acceptance of authorization performed in good faith Current ruling Experi-Metal Inc. vs. Comerica BankNot Challenged* NoAgainst the bank PATCO Construction Inc. vs. People's United BankYesNoNot ChallengedAgainst the bank Choice Escrow vs BancorpSouthYes Not Challenged**In favor of the bank *FFIEC Elements were not challenged in the Experi-Metal Inc. vs. Comerica Bank as the customer and bank had an agreement noting that the security procedures that were applied were commercially reasonable. **Evidence was raised indicating that Choice Escrow's computer systems were hacked into, but no arguments were made surrounding UCC 4A implications for customer authorization of the transaction / unauthorized access to customer transmission facilities.

New FFIEC Working Group June 6, 2013: FFIEC Forms Cybersecurity and Critical Infrastructure Working Group Objective of the working group is to further promote coordination across the federal and state banking regulatory agencies on critical infrastructure and cybersecurity issues such as the growing sophistication and volume of cyber attacks and the global importance of critical financial infrastructure. - Changes/updates to authentication guidance forthcoming from this committee?

Questions?