World Bank Techchecklist
World Bank Techchecklist
World Bank Techchecklist
Dec. 2003
Version 6.0
Introduction
Digital technology enables the world to become increasingly interconnected as an entire economy becomes reliant upon a single,
network infrastructure. While this offers tremendous opportunities to many industries, including financial, telecommunications, health,
and transportation, it can also be a cause for concern if security issues are improperly addressed, or even neglected altogether. Heinous
crimes such as theft, fraud and extortion can occur in great magnitude within a matter of seconds. The new network- mediated economy
paradoxically presents unparalleled opportunities for the creation of good outcomes or the perpetuation of bad ones.
Trends in cyber crime reveal significant growth. Between 1999-2002 in the United States, attacks on computer servers increased by over
400% to 83,000 incidents. 1 This is partly attributable to vulnerabilities in software code, which have grown from a total of 500 in 1995
to over 9000 in 2002 (CERT). These growing numbers bear particular important on the financial sector. The International Data
Corporation (www.idc.com) reported that more than 57% of all hack attacks last year were initiated in the financial sector (source and
year. The FBI has corroborated this statistic. Equally troubling, FINCEN’s Suspicious Activity Reports for Computer Intrusions have
shot up more than 500% over the past year. 2 With the growing amount of financial data stored and transmitted online, the ease of
computer intrusions add to the severity of traditional crimes such as identity theft; to put this in perspective for the digital age, over
USD$222 billion in losses were sustained to the global economy as a result of identity theft. 3
In an effort to mitigate these types of threat, the World Bank publication “Electronic Security: Risk Mitigation in the Financial
Transactions” describes e-security processes and procedures. This is not just confined to the financial industry. As the network
infrastructure spans across industry borders, so too, does the critical need for electronic security. As far back as 1995, the ISO/IEC
13335, better known as the Guidelines for the Management of IT Security (GMITS), recognized that the Internet was a hostile
environment that would require the use of proper e-security. ISO 17799 is the most widely utilized security standard for information
systems. ISO 17799 was written with the 90’s cyber-space environment in mind, it has become outdated and deficient given the growth
in outsourcing, wireless usage, applications, blended threats and the organized and dynamic approach to hacking tha t various criminal
syndicates have taken in recent years. This checklist aims to ask those questions that all to often have been ignored.
1
http://www.cert.org/stats/cert_stats.html#incidents for 2002.
2
Suspicious Activity Reports (SAR) for computer intrusions have grown from 419 in 2001 to over 1,293 in 2002. Over 3,600 incidents have been reported as of
May 2003. http://www.fincen.gov/sarreviewis sue5.pdf
3
Aberdeen Group June 2003 Report on the Economic Impact of ID Theft
The World Bank Technology Risk Checklist 6.0 2
The rising trends in cyber crime are a direct result of three phenomena. First, organized crime has made a business model out of
hacking. Second, criminal laws tend to overemphasize the risks in funds transfers rather than to address the current cyber-criminal
modus operandi of identity theft, including salami slicing and extortion. Finally, there has been an overemphasis on protecting data in
transit rather than in storage. Hackers attack data where it sits for 99.9% of the time, in “clients” e.g. desktops/PDAs and servers.
Hackers target servers, remote users, and hosting companies, all of which assume they are secure because of their usage of robust end-
to-end encryption. Over-reliance on silver-bullet solutions has created a panacea for online fraud. Business continuity is a key goal of e-
security, and both this and business credibility depend upon data integrity and authentication. Thus, defense in depth, specifically
through an implementation of Layered Security, is essential to achieving these goals.
The thirteen layers of e-security described in The World Bank publication covers both the hardware and software pertaining to network
infrastructures. These 13 layers comprise a matrix, which manages the externalities associated with open architecture environments.
1. Risk Management—A broad based framework for managing assets and relevant risks to those assets.
2. Policy Management- A program should control Bank policy and procedural guidelines vis-à-vis employee computer usage.
3. Cyber-Intelligence- Experienced threat and technical intelligence analysis regarding threats, vulnerabilities, incidents, and countermeasure
should provide timely and customized reporting to prevent a security incident before it occurs.
4. Access Controls/Authentication—Establish the legitimacy of a node or user before allowing access to requested information. The first line
of defense is access controls; these can be divided into passwords, tokens, biometrics, and public key infrastructure (PKI).
5. Firewalls—Create a system or combination of systems that enforces a boundary between two or more networks.
6. Active content filtering—At the browser level, it is prudent to filter all material that is not appropriate for the workplace or that is contrary
to established workplace policies.
7. Intrusion detection system (IDS)—This is a system dedicated to the detection of break-ins or break-in attempts, either manually or via
software expert systems that operate on logs or other information available on the network. Approaches to monitoring vary widely,
depending on the types of attacks that the system is expected to defend against, the origins of the attacks, the types of assets, and the level of
concern for various types of threats.
8. Virus scanners —Worms, Trojans, and viruses are methods for deploying an attack. Virus scanners hunt malicious codes, but require
frequent updating and monitoring.
9. Encryption—Encryption algorithms are used to protect information while it is in transit or whenever it is exposed to theft of the storage
device (e.g. removable backup media or notebook computer).
4
http://www.cert.org/stats/cert_stats.html#incidents for 2002.
5
Suspicious Activity Reports (SAR) for computer intrusions have grown from 419 in 2001 to over 1,293 in 2002. Over 5,600 incidents have been reported as of
July, 2003. http://www.fincen.gov/sarreviewissue5.pdf
6
Aberdeen Group June 2003 Report on the Economic Impact of ID Theft
The World Bank Technology Risk Checklist 6.0 3
10. Vulnerability testing —Vulnerability testing entails obtaining knowledge of vulnerabilities that exist on a computer system or network and
using that knowledge to gain access to resources on the computer or network while bypassing normal authentication barriers.
11. Systems administration—This should be complete with a list of administrative failures that typically exist within financial
institutions and corporations and a list of best practices.
12. Incident response plan (IRP)—This is the primary document used by a corporation to define how it will identify, respond to, correct, and
recover from a computer security incident. The main necessity is to have an IRP and to test it periodically.
13. Wireless Security— This section covers the risks associated with GSM, GPS and the 802.11 standards.
The World Bank Technology Risk Checklist is designed to provide Chief Information Security Officers (CISO), Chief Technology
Officers (CTO), Chief Financial Officers (CFO), Directors, Risk Managers and Systems Administrators with a way of measuring and
validating the level of security within a particular organization. The CISO plays a key role in this initiative by overseeing the entire
gamut of processes, procedures, and technologies pertaining to an institution’s IT infrastructure.
Senior managers should pay special attention to sections 1 and 2 (indicated in red text), and note that technical data can be found in
the Appendix.
Cyber crime statistics rise annually, as do the monetary losses to financial institutions on account of these crimes. In order to reduce the
severity of these damages, it is absolutely critical to implement risk- management processes that can be monitored by bank examiners,
and that impose a minimum standard for dealing with electronic security. We trust that this checklist will establish a methodology to
assess the level of security within a particular organization, and create a benchmark by which to gauge the level of need for e-security.
1. The findings, interpretations, and conclusions expressed in this paper are entirely those of the authors and should not be attributed in any manner to the
World Bank, its affiliated organizations, members of its Board of Executive Directors, or the countries they represent.
We would like to thank the following people for their invaluable knowledge and input: Julia Allen,
Chris Bateman, Ken Brancik, Tony Chew, Chris Camacho, Charles Conn, Jerry Dixon, John
Frazzini, Ed Gilbride, Thomas Glaessner, Erik Johnson, Christopher Keegan, Tom Kellermann,
Hugh Kelly, Tom Lamm, Warren Lotzbire, Valerie McNevin, Shane Miller, Jim Nelms,Yumi
Nishiyama, Bryan Palma,Troy Schumaker, Dave Thomas, and Shrimant Tripathy.
II. Policy Management 1. Are the Board and Officers aware of their liabilities? Are
personnel?
2. Has senior management, including the corporate or organizational
Board of Directors, established a comprehensive information
policy and auditing process? If so, what areas are covered? How,
and how often are these policies reviewed, and how are they
created?
3. Does your information security organization report to the IT
organization, or is it a separate organization that maintains its
independence and freedom from conflicts of interest?
4. Has senior management established a security auditing process?
Do you use third party auditors?
5. Is someone responsible for each security policy and procedure?
How does each policy “owner” stay current? Do they attend
security conferences? What are the qualifications for being in this
position? What mechanisms, etc. are in place to keep policies up-
to-date?
6. Are new users trained on security policies and procedures
7. Do current employees/users receive periodic security awareness
training?
7
As defined by the DHS, CERT or Vendor.
The World Bank Technology Risk Checklist 6.0 13
8. Does your biometric system have a secure and reliable enrollment
process?
9. Once a user’s biometric information is recorded, is security in place
to protect that information against theft, alteration, or forgery?
10. Do decision processes and supporting procedures exist to permit
third party access (e.g. contract employees, customers, etc.)?
11. Do third parties retire or update accounts when partnerships
terminate?
12. How do users access the organization’s network and systems when
working from home or when traveling? Who authorizes generic
employee access?
13. Compared to what a user can do when physically working in the
office, is remote access restricted? If so, how is this achieved?
14. Is access restricted to the minimum amount of access necessary for
any particular job?
15. Are root-level, and other privileged access, given only on an as -
needed basis? Upon what criteria is this based?
16. Do you deactivate the access controls of an employee to both the
building and computer networks prior to the employee’s
termination? What other precautions are taken before or after an
employee’s termination?
17. Are all your access controls and authentication mechanisms
monitored to correct instances of false positive/negatives? Explain.
18. Do you check for modems attached to PCs, routers or
printers?
19. Do you periodically war-dial your telephone number range to
check for new devices?
20. Do you utilize a private branch exchange (PBX) firewall, PBX log
or other such control to keep track of any attempts to hack into
systems using war dialing techniques?
21. Do you have controls in place to detect modem scanning
attempts on your systems?
8
For more details refer to the Appendix.
The World Bank Technology Risk Checklist 6.0 16
13. Do you employ enterprise level desktop configuration
management?
14. Is your system configured to filter E-mail?
15. Do you filter all .exe attachments?
16. Do you filter all .doc attachments?
17. Have you considered filtering all arriving and departing e-mail by
a spam threshold (greater than 40 identical messages blocked and
source traced, if inside the network)?
VII. Intrusion 1. What types of IDS are used? How is their placement/location
Detection determined?
2. Is your IDS outsourced? If so, what is your criteria for choosing
an outsourced vehicle?
3. Do you use host-based and network-based intrusion detection
systems? How often is this updated?
4. Who maintains and configures rule sets and routing controls, and
what is their process for doing so?
5. Are IDS systems appropriately configured for system anomalies,
file and data problems, and aberrant usage?
6. Are your IDS programs updated on a regular and frequent
schedule? If so, how often? Upon what criteria is it updated?
7. Are all system logins and intrusions being tracked? If so how
often? If logs are kept, how frequently are they reviewed? Do
metrics exist where the intrusions are tracked?
8. Are log files kept in a secure location, and are they protected
against malicious access, including any alteration or deletion?
Who has access to them? Does management review these on a
regular basis?
9. Do you conduct frequent vulnerability testing against your IDS
systems?
10. Who conducts your vulnerability testing?
11. What is the criterion for choosing a vulnerability tester?
9
Refer to Appendix
The World Bank Technology Risk Checklist 6.0 19
12. Are the CRL (Certificate Revocation Lists) maintained on a
real-time basis?
13. Are certificates properly validated against the hostnames/users
for whom they are meant for?
14. Do you have a policy for cross-certification with external
parties?
15. Do you have a contingency plan that can recover data in the event
of an encrypted key being lost?
16. Do you archive private keys? Is there a policy in
place to retrieve archived keys if needed in future?
X. Vulnerability and 1. Is vulnerability testing conducted on a quarterly basis?
Penetration 2. Are the results acted upon?
Testing 3. Are penetration tests conducted on a bi-annual basis? If they are
conducted do they address the following:
a. Describing threats in terms of who, how and when
b. Establishing into which threat class a threat falls
c. Determining the consequences on the business
operations should a threat be successful
d. Assessing the impact of the consequences as less
serious, serious or exceptionally grave injury
e. Assigning an exposure rating to each threat, in terms
of the relative severity to the business prioritization
of the impacts according to the exposure rating
6. Can you determine the servers from which intruder data was sent?
GSM
15. Is a power-on password required?
16. Do PDAs have anti-virus and VPN software installed?
17. Is robust encryption utilized?
In addition to Sadmind and mountd, is your system configured to filter the following?
§ Wherever possible, do you turn off and/or remove sadmind and mountd on machines directly accessible
from the Internet?
§ Do you install the latest patches?
§ Do you use host/IP-based export lists?
§ Do you set up export file systems for read-only where possible?
§ Do you nfsbug to scan for vulnerabilities?
Do you employ MAC address filtering on a per-port basis?
Encryption Is an HSM(Hardware Security Module) being used to secure the Root CA Private Key?
802.11 Are AP Channels at least 5 channels different from other nearby wireless networks in order to prevent interference?
GPS Is your monitor carrier to noise density c/n (o) within the range of 48-50 bbhrtz?
Are your internal clock backups concurrent with real time?