NCUA IT Exam Focus
By Tom Schauer, Principal CliftonLarsonAllen
NCUA IT Exam Focus By Tom Schauer, Principal CliftonLarsonAllen My - - PowerPoint PPT Presentation
NCUA IT Exam Focus By Tom Schauer, Principal CliftonLarsonAllen My Background and Experience Computer Science Degree - Puget Sound Information Security Professional for 30 years Consultant: Ernst & Young, Deloitte, Guardent
By Tom Schauer, Principal CliftonLarsonAllen
2
3
Example:
11
13
CORE Banking System
4PM FedLine
ACH
4:05 to 5:00PM
HACKER
4:01PM
Windows File Share
ACH
The FED Upload File to The FED
In-house ACH Originations are most susceptible to this attack vector. Outsourced ACH could also be susceptible.
1 6
17
a) Completed b) Not Completed
management analysis and decisions.
assessment as a management tool.
– Topic – Characterization of Inherent Risk – Risk Mitigation and Controls – Characterization of Residual Risks – Conclusion and Plans for Action
a) Use Documented Form/Process b) Do Not Used Documented Form/Process
– The creation or modification of an administrator account – Any activity which seems to disable antivirus, logging or firewall controls – Outbound data transfers – Unknown Hosts attached to the network – Unauthorized or Unknown Software installed on a known host – Consecutive invalid password attempts on multiple user IDs from the same IP – Consecutive access denied events on a single account on multiple hosts from the same IP – Attempts to access disabled accounts
a) All, and our testing proves it! b) All, but we’ve not validated/tested. c) Some, testing shows gaps. d) Some, but testing needed. e) Oh boy, we are in trouble.
– Who is covered, when are they covered, how?
– Covert Pen Testing (True Breach Simulation) – Table Top Scenario Testing
a) Skilled b) Over Achiever c) Under Achiever
– SANS / CIS Twenty Critical Security Controls – ISO 27001/27001 – NIST 800-53A and others – COBIT
a) No b) Yes, SANS/CIS Twenty Critical c) Yes, NIST d) Yes, ISO e) Yes, Other or Several of the Above
– Length increasing… 14 – Stronger requirements for Admins – Distinct Admin/User accounts w unique PWs – Password Wallets?
– Information Security Program and status – - IT and InfoSec Policies – - Security Breaches or attempted breaches – - IT Strategic Plan – - Information Security Risk Assessment – - Business Continuity Plan and Testing Results – - Incident Response Plan – - Results from Vendor Management Reviews – - Insurance coverage for IT risks
Judiciary Committee, May 8, 2013
43
44
Time Motivation Funding