The FDIC and OCC put out a joint statement on heightened cybersecurity risk concerns. This ‘heightened’ concern has bubbled up from the concerns in the Middle East and specifically, Iran. In our nation’s history, oceans have been one of our primary defenses, but in today’s interconnected world, barriers for state-sponsored cyberattacks have been removed. I spent some time discussing the 6 Questions to Answer in Part 1, and today I wanted to dive into Authentication.
Part 2 – Authentication
Here are three key points to understand on the joint statement specific to Authentication.
Two Factor Authentication
The regulators are aware of hackers getting around our password processes, and two-factor authentication (SMS or Application) makes getting around password risks more difficult. Credential stuffing is a real risk https://owasp.org/www-community/attacks/Credential_stuffing. Think about how many times have you reused a password or a similar password. How many times has your account password been compromised? (Remember this started years ago with your myspace account and yahoo account and continues to happen). Check out this website to see if your email address has been linked to passwords being compromised: https://haveibeenpwned.com/.
Regular User Reviews
A subtle change but a big impact – The regulators recommend to regularly review user access in the statement, but in previous guidance in the FFIEC Information Security Booklet and the Cybersecurity Assessment Toolkit, they have referenced periodic reviews. Focusing on more frequent user access reviews is the biggest change we found in our review.
Privileged Accounts
Limiting the number, restricting usage, and monitoring of privileged accounts is a critical step. “When” the bank is compromised, (I still like to say “if”, but it isn’t realistic today) hackers will target these privileged accounts.
Key Questions to Ask Your Team:
- When was the last time we performed our user review? How many systems do we have where we add employee access? What’s the process we have to go through to increase the frequency?
- How many administrator accounts do we have?
- Does each internal administrator have a regular user account and an administrator account?
- How do we manage and track our vendor accounts? Make sure to focus on vendors that have access (core, integration, managed services)
- Are there any systems that have the ability to implement two-factor authentication that we haven’t integrated?
- Does our managed services vendor leverage two-factor authentication for their access and support to the network and systems?
If you have six minutes more, I recorded a video summary on the statement as well: