This document provides a risk measurement tool for information security operational risks. It includes a table with ISO security domains, potential threats, vulnerabilities, security controls, likelihood and impact scores, and residual risk scores.
This document provides a risk measurement tool for information security operational risks. It includes a table with ISO security domains, potential threats, vulnerabilities, security controls, likelihood and impact scores, and residual risk scores.
This document provides a risk measurement tool for information security operational risks. It includes a table with ISO security domains, potential threats, vulnerabilities, security controls, likelihood and impact scores, and residual risk scores.
This document provides a risk measurement tool for information security operational risks. It includes a table with ISO security domains, potential threats, vulnerabilities, security controls, likelihood and impact scores, and residual risk scores.
Download as XLS, PDF, TXT or read online from Scribd
Download as xls, pdf, or txt
You are on page 1of 67
Access Control
Asset Classification & Control
Business Continuity Management Communications & Operations Management Compliance Organizational Security Personnel Security Physical and Environmental Security Security Policy Systems Development BITS KEY RISK MEASUREMENT TOOL FOR INFORMATION SECURITY OPERATIONAL RISKS ISO Domain Reference Basel Loss Category for Operational Risk Threat Event Vulnerability Security Control Likelihood of Threat (Input) Degree to which Control is Implemented (Input) Impact if Control is not Implemented (Input) Control vs. Impact Score Residual Risk Score Access Control Business Disruption and System Failures Application software failure Security events are not logged at the application level. Security events are logged at the application level. 10% 0 0 5 0.50 Access Control Business Disruption and System Failures Application software failure Application testing is not performed. Application testing is performed. 5 0.00 Access Control External Fraud Computer crime System access logs are not created and reviewed to identify use or attempted use and modification or attempted modification of critical systems components (files, registry entries, configurations, security settings/parameters, audit logs). System access logs are created and reviewed to identify use or attempted use and modification or attempted modification of critical systems components (files, registry entries, configurations, security settings/parameters, audit logs). 5 0.00 Access Control External Fraud Computer crime System access logs are not stored in a secure fashion with limited access and are not protected from alteration or deletion. System access logs are stored in a secure fashion with limited access and protected from alteration or deletion. 5 0.00 Access Control Internal Fraud Computer crime Policies that define the removal of information from company facilities are not in place and are not communicated to all employees. Policies that define the removal of information from company facilities are in place and communicated to all employees. 5 0.00 Access Control External Fraud Computer crime Policies that define the removal of information from company facilities are not in place and are not communicated to all employees. Policies that define the removal of information from company facilities are in place and communicated to all employees. 5 0.00 Access Control Business Disruption and System Failures DDoS or DoS attacks Ingress/egress filtering is not enabled/supported on routers. Network routers do ingress and egress filtering. 5 0.00 Access Control Business Disruption and System Failures DDoS or DoS attacks Routing access control lists are inappropriately configured or improperly maintained to ensure security. Routing access control lists are maintained by designated personnel and used for security. 5 0.00 Access Control Business Disruption and System Failures DDoS or DoS attacks All external connections and/or external IP network access passes bypass firewalls. All external connections and external IP network access passes through a firewall. 5 0.00 Access Control External Fraud DDoS or DoS attacks SNMP best practices have not been implemented. SNMP best practice has been implemented. 5 0.00 Access Control Business Disruption and System Failures DDoS or DoS attacks Technology such as encryption, VPN client technology, etc. are not used during remote connectivity. Confidentiality of sensitive information is ensured during remote connectivity using appropriate technology such as encryption, VPN client technology, etc. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 2 Access Control Business Disruption and System Failures DDoS or DoS attacks The remote access client allows split tunneling. The remote access client prohibits split tunneling. 5 0.00 Access Control Business Disruption and System Failures DDoS or DoS attacks Routing access control lists are inappropriately configured or improperly maintained to ensure security. Routing access control lists are maintained by designated personnel and used for security. 5 0.00 Access Control Business Disruption and System Failures DDoS or DoS attacks Routing access control lists are inappropriately configured or improperly maintained to ensure security. Routing access control lists are maintained by designated personnel and used for security. 5 0.00 Access Control Business Disruption and System Failures DDoS or DoS attacks All external connections and/or external IP network access passes bypass firewalls. All external connections and external IP network access passes through a firewall. 5 0.00 Access Control Business Disruption and System Failures DDoS or DoS attacks All external connections and/or external IP network access passes bypass firewalls. All external connections and external IP network access passes through a firewall. 5 0.00 Access Control Execution , Delivery and Process Management Human error Host level system authorization mechanisms are not in place. Host level system authorization mechanisms are in place. 5 0.00 Access Control Execution , Delivery and Process Management Human error Operating system master and sub-master consoles are not located in a protected and controlled area. Operating system master and sub- master consoles are located in a protected and controlled area. 5 0.00 Access Control Execution , Delivery and Process Management Human error A comprehensive policy outlining remote user requirements is not in place and is not communicated to and/or is not understood or followed by the employee. A comprehensive policy outlining remote user requirements is in place and communicated via an agreement signed by the employee. 5 0.00 Access Control External Fraud Lawsuits/ litigation Procedures do not exist to verify the authenticity of the counter party providing electronic instructions or transactions through trusted exchange of passwords, tokens, or cryptographic keys. Procedures exist to verify the authenticity of the counter party providing electronic instructions or transactions through trusted exchange of passwords, tokens, or cryptographic keys. 5 0.00 Access Control Execution , Delivery and Process Management Lawsuits/ litigation Procedures do not exist to verify the authenticity of the counter party providing electronic instructions or transactions through trusted exchange of passwords, tokens, or cryptographic keys. Procedures exist to verify the authenticity of the counter party providing electronic instructions or transactions through trusted exchange of passwords, tokens, or cryptographic keys. 5 0.00 Access Control Clients, Products and Business Practices Lawsuits/ litigation Procedures do not exist to verify the authenticity of the counter party providing electronic instructions or transactions through trusted exchange of passwords, tokens, or cryptographic keys. Procedures exist to verify the authenticity of the counter party providing electronic instructions or transactions through trusted exchange of passwords, tokens, or cryptographic keys. 5 0.00 Access Control Execution , Delivery and Process Management Lawsuits/ litigation Ingress/egress filtering is not enabled/supported on routers. Network routers do ingress and egress filtering. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 3 Access Control Execution , Delivery and Process Management Lawsuits/ litigation Processes/procedures have not been implemented to ensure third party connections are appropriately authorized, documented, and managed. An authorization, documentation and management process is in place for all external connections. 5 0.00 Access Control Execution , Delivery and Process Management Lawsuits/ litigation Session encryption is not used for external IP access. External IP access, including system-to-system authentication, uses session encryption. 5 0.00 Access Control Internal Fraud Leaving computer screen exposed or unlocked Workstation screensaver/lockout features are not enabled/system enforced. Policies/guidelines do not exist. The desktop is configured to log off, lock or use a password protected screen saver whenever the computer is left unattended. 5 0.00 Access Control External Fraud Leaving computer screen exposed or unlocked Workstation screensaver/lockout features are not enabled/system enforced. Policies/guidelines do not exist. The desktop is configured to log off, lock or use a password protected screen saver whenever the computer is left unattended. 5 0.00 Access Control Internal Fraud Leaving computer screen exposed or unlocked No limitations or restrictions have been placed on connection times. Limitations and/or restrictions have been placed on connection times for activities such as batch processing (i.e., restricting connections, time-outs, and/or inactivity) 5 0.00 Access Control External Fraud Leaving sensitive documents exposed Policies that define the removal of information from company facilities are not in place and are not communicated to all employees. Policies that define the removal of information from company facilities are in place and communicated to all employees. 5 0.00 Access Control External Fraud Leaving sensitive documents exposed Security controls for equipment and information used in mobile computers have not been established. Security controls for equipment and information used in mobile computers have been established including: permissible equipment use and security of that equipment (e.g., double-wrapped envelopes, locked briefcases/cabinets, encrypted data, digital certificates, etc.), security and backup of information taken or held offsite, and use of virus protection tools. 5 0.00 Access Control External Fraud Lost or stolen laptops Security controls for equipment and information used in mobile computers have not been established. Security controls for equipment and information used in mobile computers have been established including: permissible equipment use and security of that equipment (e.g. double-wrapped envelopes, locked briefcases/cabinets, encrypted data, digital certificates, etc), security and back up of information taken or held offsite, and use of virus protection tools. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 4 Access Control Business Disruption and System Failures Malicious code Processes/procedures have not been implemented to ensure third party connections are appropriately authorized, documented, and managed. An authorization, documentation and management process is in place for all external connections. 5 0.00 Access Control Business Disruption and System Failures Malicious code Processes/procedures have not been implemented to ensure third party connections are appropriately authorized, documented, and managed. An authorization, documentation and management process is in place for all external connections. 5 0.00 Access Control Business Disruption and System Failures Malicious code All external connections and/or external IP network access passes bypass firewalls. All external connections and external IP network access passes through a firewall. 5 0.00 Access Control Business Disruption and System Failures Malicious code The internal address range is exposed or unprotected. The internal address range is protected (e.g., NAT). 5 0.00 Access Control Business Disruption and System Failures Malicious code Applications in use or considered for use do not conform to the security feature criteria in the BITS Product Certification Program or other recognized product certifications. Applications in use or considered for use conform to the security criteria in the BITS Product Certification Program or other recognized product certifications. 5 0.00 Access Control Internal Fraud Network spoofing Routing access control lists are inappropriately configured or improperly maintained to ensure security. Routing access control lists are maintained by designated personnel and used for security. 5 0.00 Access Control External Fraud Network spoofing Routing access control lists are inappropriately configured or improperly maintained to ensure security. Routing access control lists are maintained by designated personnel and used for security. 5 0.00 Access Control Business Disruption and System Failures Network spoofing Routing access control lists are inappropriately configured or improperly maintained to ensure security. Routing access control lists are maintained by designated personnel and used for security. 5 0.00 Access Control Internal Fraud Network spoofing All external connections and/or external IP network access passes bypass firewalls. All external connections and external IP network access passes through a firewall. 5 0.00 Access Control External Fraud Network spoofing All external connections and/or external IP network access passes bypass firewalls. All external connections and external IP network access passes through a firewall. 5 0.00 Access Control Business Disruption and System Failures Network spoofing All external connections and/or external IP network access passes bypass firewalls. All external connections and external IP network access passes through a firewall. 5 0.00 Access Control Business Disruption and System Failures Network spoofing The internal address range is exposed or unprotected. The internal address range is protected (e.g., NAT). 5 0.00 Access Control External Fraud Network spoofing The internal address range is exposed or unprotected. The internal address range is protected (e.g. NAT). 5 0.00 Access Control External Fraud Network spoofing Session encryption is not used for external IP access. External IP access, including system-to-system authentication, uses session encryption. 5 0.00 Access Control External Fraud Network spoofing Local and wide area networks are not fully switched. Local area and wide area networks are fully switched. 5 0.00 Access Control External Fraud Network spoofing Technology such as encryption, VPN client technology, etc. are not used during remote connectivity. Confidentiality of sensitive information is ensured during remote connectivity using appropriate technology such as encryption, VPN client technology, etc. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 5 Access Control External Fraud Network spoofing The remote access client allows split tunneling. The remote access client prohibits split tunneling. 5 0.00 Access Control Internal Fraud Network/application backdoor Time, day, or similar restrictions are not enabled. Access to resources is controlled by a combination of any of the following: (1) method or location of accessing user (2) time-of-day (3) day-of-week (4) calendar date (5) specific program used to access the resource. 5 0.00 Access Control External Fraud Network/application backdoor Time, day, or similar restrictions are not enabled. Access to resources is controlled by a combination of any of the following: (1) method or location of accessing user (2) time-of-day (3) day-of-week (4) calendar date (5) specific program used to access the resource. 5 0.00 Access Control Internal Fraud Network/application backdoor Authorization engine fails in an open state. If the authorization engine for the system fails, the access control rules default to no access. 5 0.00 Access Control External Fraud Network/application backdoor Authorization engine fails in an open state. If the authorization engine for the system fails, the access control rules default to "no access. 5 0.00 Access Control Internal Fraud Network/application backdoor Access administration processes do not ensure that user access is based on least privilege or consistent with job function. User access capabilities are configured with least privilege, and are consistent with the users assigned job responsibilities for performing a particular function or transaction. 5 0.00 Access Control External Fraud Network/application backdoor Access administration processes do not ensure that user access is based on least privilege or consistent with job function. User access capabilities are configured with least privilege, and are consistent with the users assigned job responsibilities for performing a particular function or transaction. 5 0.00 Access Control Internal Fraud Network/application backdoor Access administration change (employee status changes) processes are informal or inadequate. Procedures are in place to amend user access rights when a user changes roles in the organization and revoke rights when a user leaves the organization. 5 0.00 Access Control External Fraud Network/application backdoor Access administration change (employee status changes) processes are informal or inadequate. Procedures are in place to amend user access rights when a user changes roles in the organization and revoke rights when a user leaves the organization. 5 0.00 Access Control Internal Fraud Network/application backdoor No processes in place to ensure default user ids are renamed/disabled Default user IDs are renamed or disabled. 5 0.00 Access Control External Fraud Network/application backdoor No processes in place to ensure default user ids are renamed/disabled Default user IDs are renamed or disabled. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 6 Access Control Internal Fraud Network/application backdoor Temporary, generic, guest or anonymous user IDs are not tightly controlled/monitored. Temporary, generic, guest or anonymous user IDs are limited in use and tightly controlled. 5 0.00 Access Control External Fraud Network/application backdoor Temporary, generic, guest or anonymous user IDs are not tightly controlled/monitored. Temporary, generic, guest or anonymous user ids are limited in use and tightly controlled. 5 0.00 Access Control Internal Fraud Network/application backdoor Password policies/standards have not been established. Guidelines are provided to users for generating secure passwords including simple instruction such as passwords must not be shared, passwords must not be written down and stored in obvious places, etc. 5 0.00 Access Control External Fraud Network/application backdoor Password policies/standards have not been established. Guidelines are provided to users for generating secure passwords including simple instruction such as passwords must not be shared, passwords must not be written down and stored in obvious places, etc. 5 0.00 Access Control Internal Fraud Network/application backdoor Policies/procedures addressing security of stored passwords have not been established. Systems features to secure store passwords (e.g., encryption) have not been enabled. Appropriate controls are established for the secure storage and maintenance of password lists. 5 0.00 Access Control External Fraud Network/application backdoor Policies/procedures addressing security of stored passwords have not been established. Systems features to secure store passwords (e.g., encryption) have not been enabled. Appropriate controls are established for the secure storage and maintenance of password lists. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 7 Access Control Internal Fraud Network/application backdoor Systems features (forced password change) have not been enabled or do not exist. In absence of systems controls, manual processes/procedures have not been established to remind users to do this. The system is configured to require the user to change initial password during first logon. 5 0.00 Access Control External Fraud Network/application backdoor Systems features (forced password change) have not been enabled or do not exist. In absence of systems controls, manual processes/procedures have not been established to remind users to do this. The system is configured to require the user to change initial password during first logon. 5 0.00 Access Control Internal Fraud Network/application backdoor Systems features (strong passwords) are not enabled or do not exist. In absence of systems controls, policies/guidelines encouraging strong passwords have not been established. Restrictions are placed on user password creation and use including expiration after a certain time period, minimum length, reuse, and appropriate strength (i.e., user ID not equal to password, password not equal to password, limit repetitive characters, require alphanumeric and special characters). 5 0.00 Access Control External Fraud Network/application backdoor Systems features (strong passwords) are not enabled or do not exist. In absence of systems controls, policies/guidelines encouraging strong passwords have not been established. Restrictions are placed on user password creation and use including expiration after a certain time period, minimum length, reuse, and appropriate strength ((i.e. User Id not equal to password, password not equal to password, limit repetitive characters, require alphanumeric and special characters). 5 0.00 Access Control Internal Fraud Network/application backdoor System timeout features have not been enabled or do not exist. The system is configured to disconnect or force re- authentication of users after a specified period of inactivity. 5 0.00 Access Control External Fraud Network/application backdoor System timeout features have not been enabled or do not exist. The system is configured to disconnect or force re- authentication of users after a specified period of inactivity. 5 0.00 Access Control Internal Fraud Network/application backdoor System unsuccessful logon attempt features are not enabled or do not exist. The system is configured to disable or suspend user IDs after a fixed number of unsuccessful logon attempts. 5 0.00 Access Control External Fraud Network/application backdoor System unsuccessful logon attempt features are not enabled or do not exist. The system is configured to disable or suspend user IDs after a fixed number of unsuccessful logon attempts. 5 0.00 Access Control Internal Fraud Network/application backdoor Remote network access paths are not restricted to designated gateways and/or resources. Remote network access paths are restricted to designated gateways and/or resources. 5 0.00 Access Control External Fraud Network/application backdoor Remote network access paths are not restricted to designated gateways and/or resources. Remote network access paths are restricted to designated gateways and/or resources. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 8 Access Control External Fraud Network/application backdoor Strong authentication features are not enabled/supported. Additional forms of access control are used to safeguard against unauthorized access from external connections (e.g., dial back, two- part authentication, challenge- response, time of day or week restriction, read-only restrictions, etc.). 5 0.00 Access Control External Fraud Network/application backdoor Processes/procedures have not been implemented to ensure third party connections are appropriately authorized, documented, and managed. An authorization, documentation and management process is in place for all external connections. 5 0.00 Access Control Internal Fraud Network/application backdoor Internal network segments are not segregated and do not have controlled access through network level authorization. Internal network segments are segregated and have controlled access through network level authorization. 5 0.00 Access Control Internal Fraud Network/application backdoor Security events are not logged at the application level. Security events are logged at the application level. 5 0.00 Access Control External Fraud Network/application backdoor Security events are not logged at the application level. Security events are logged at the application level. 5 0.00 Access Control External Fraud Network/application backdoor Technology such as encryption, VPN client technology, etc. are not used during remote connectivity. Confidentiality of sensitive information is ensured during remote connectivity using appropriate technology such as encryption, VPN client technology, etc. 5 0.00 Access Control Internal Fraud Network/application time bomb Time, day, or similar restrictions are not enabled. Access to resources is controlled by a combination of any of the following: (1) method or location of accessing user (2) time-of-day (3) day-of-week (4) calendar date (5) specific program used to access the resource. 5 0.00 Access Control External Fraud Network/application time bomb Time, day, or similar restrictions not enabled. Access to resources is controlled by a combination of any of the following: (1) method or location of accessing user (2) time-of-day (3) day-of-week (4) calendar date (5) specific program used to access the resource. 5 0.00 Access Control Internal Fraud Network/application time bomb Authorization engine fails in an open state. If the authorization engine for the system fails, the access control rules default to "no access. 5 0.00 Access Control External Fraud Network/application time bomb Authorization engine fails in an open state. If the authorization engine for the system fails, the access control rules default to no access. 5 0.00 Access Control Internal Fraud Network/application time bomb Access administration processes do not ensure that user access is based on least privilege or consistent with job function. User access capabilities are configured with least privilege, and are consistent with the users assigned job responsibilities for performing a particular function or transaction. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 9 Access Control External Fraud Network/application time bomb Access administration processes do not ensure that user access is based on least privilege or consistent with job function. User access capabilities are configured with least privilege, and are consistent with the users assigned job responsibilities for performing a particular function or transaction. 5 0.00 Access Control Internal Fraud Network/application time bomb Access administration change (employee status changes) processes are informal or inadequate. Procedures are in place to amend user access rights when a user changes roles in the organization and revoke rights when a user leaves the organization. 5 0.00 Access Control External Fraud Network/application time bomb Access administration change (employee status changes) processes are informal or inadequate. Procedures are in place to amend user access rights when a user changes roles in the organization and revoke rights when a user leaves the organization. 5 0.00 Access Control Internal Fraud Network/application time bomb No processes are in place to ensure default user IDs are renamed/disabled. Default user IDs are renamed or disabled. 5 0.00 Access Control External Fraud Network/application time bomb No processes are in place to ensure default user IDs are renamed/disabled. Default user IDs are renamed or disabled. 5 0.00 Access Control Internal Fraud Network/application time bomb Temporary, generic, guest or anonymous user IDs are not tightly controlled/monitored. Temporary, generic, guest or anonymous user IDs are limited in use and tightly controlled. 5 0.00 Access Control External Fraud Network/application time bomb Temporary, generic, guest or anonymous user IDs are not tightly controlled/monitored. Temporary, generic, guest or anonymous user IDs are limited in use and tightly controlled. 5 0.00 Access Control Internal Fraud Network/application time bomb Password policies/standards have not been established. Guidelines are provided to users for generating secure passwords including simple instruction such as passwords must not be shared, passwords must not be written down and stored in obvious places, etc. 5 0.00 Access Control External Fraud Network/application time bomb Password policies/standards have not been established. Guidelines are provided to users for generating secure passwords including simple instruction such as passwords must not be shared, passwords must not be written down and stored in obvious places, etc. 5 0.00 Access Control Internal Fraud Network/application time bomb Policies/procedures addressing security of stored passwords have not been established. Systems features to secure store passwords (e.g., encryption) have not been enabled. Appropriate controls are established for the secure storage and maintenance of password lists. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 10 Access Control External Fraud Network/application time bomb Policies/procedures addressing security of stored passwords have not been established. Systems features to secure store passwords (e.g., encryption) have not been enabled. Appropriate controls are established for the secure storage and maintenance of password lists. 5 0.00 Access Control Internal Fraud Network/application time bomb Systems features (forced password change) have not been enabled or do not exist. In absence of systems controls, manual processes/procedures have not been established to The system is configured to require the user to change initial password during first logon. 5 0.00 Access Control External Fraud Network/application time bomb Systems features (forced password change) have not been enabled or do not exist. In absence of systems controls, manual processes/procedures have not been established to remind users to do this. The system is configured to require the user to change their initial password during first logon. 5 0.00 Access Control Internal Fraud Network/application time bomb Systems features (strong passwords) are not enabled or do not exist. In absence of systems controls, policies/guidelines encouraging strong passwords have not been established. Restrictions are placed on user password creation and use including expiration after a certain time period, minimum length, reuse, and appropriate strength (e.g., user ID not equal to password, password not equal to password, limit repetitive characters, require alphanumeric and special characters). 5 0.00 Access Control External Fraud Network/application time bomb Systems features (strong passwords) are not enabled or do not exist. In absence of systems controls, policies/guidelines encouraging strong passwords have not been established. Restrictions are placed on user password creation and use including expiration after a certain time period, minimum length, reuse, and appropriate strength (e.g., user I not equal to password, password not equal to password, limit repetitive characters, require alphanumeric and special characters). 5 0.00 Access Control Internal Fraud Network/application time bomb System timeout features have not been enabled or do not exist. The system is configured to disconnect or force re- authentication of users after a specified period of inactivity. 5 0.00 Access Control External Fraud Network/application time bomb System timeout features have not been enabled or do not exist. The system is configured to disconnect or force re- authentication of users after a specified period of inactivity. 5 0.00 Access Control Internal Fraud Network/application time bomb System unsuccessful logon attempt features are not enabled or do not exist. The system is configured to disable or suspend user IDs after a fixed number of unsuccessful logon attempts. 5 0.00 Access Control External Fraud Network/application time bomb System unsuccessful logon attempt features are not enabled or do not exist The system is configured to disable or suspend user IDs after a fixed number of unsuccessful logon attempts. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 11 Access Control Internal Fraud Network/application time bomb Remote network access paths are not restricted to designated gateways and/or resources. Remote network access paths are restricted to designated gateways and/or resources. 5 0.00 Access Control External Fraud Network/application time bomb Remote network access paths are not restricted to designated gateways and/or resources. Remote network access paths are restricted to designated gateways and/or resources. 5 0.00 Access Control External Fraud Network/application time bomb Strong authentication features are not enabled/supported. Additional forms of access control are used to safeguard against unauthorized access from external connections (e.g., dial back, two- part authentication, challenge- response, time of day or week restriction, read-only restrictions, etc.) 5 0.00 Access Control External Fraud Network/application time bomb Processes/procedures have not been implemented to ensure third party connections are appropriately authorized, documented, and managed. An authorization, documentation and management process is in place for all external connections. 5 0.00 Access Control Business Disruption and System Failures Network/application time bomb Internal network segments are not segregated and do not have controlled access through network level authorization. Internal network segments are segregated and have controlled access through network level authorization. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 12 Access Control External Fraud Robbery Security controls for equipment and information used in mobile computers have not been established. Security controls for equipment and information used in mobile computers have been established including: permissible equipment use and security of that equipment (e.g., double-wrapped envelopes, locked briefcases/cabinets, encrypted data, digital certificates, etc.), security and backup of information taken or held offsite and use of virus protection tools. 5 0.00 Access Control External Fraud Sabotage Processes/procedures have not been implemented to ensure third party connections are appropriately authorized, documented, and managed. An authorization, documentation and management process is in place for all external connections. 5 0.00 Access Control External Fraud Social engineering Policies that define the removal of information from company facilities are not in place and are not communicated to all employees. Policies that define the removal of information from company facilities are in place and communicated to all employees. 5 0.00 Access Control Business Disruption and System Failures Software defects Applications in use or considered for use do not conform to the security feature criteria in the BITS Product Certification Program or other recognized product certifications. Applications in use or considered for use conform to security feature criteria in the BITS Product Certification Programor other recognized product certifications. 5 0.00 Access Control Business Disruption and System Failures System software failure System access logs are not created and reviewed to identify use or attempted use and modification or attempted modification of critical systems components (files, registry entries, configurations, security settings/parameters, audit logs). System access logs are created and reviewed to identify use or attempted use and modification or attempted modification of critical systems components (files, registry entries, configurations, security settings/parameters, audit logs). 5 0.00 Access Control Business Disruption and System Failures System software failure System access logs are not stored in a secure fashion with limited access and are not protected from alteration or deletion. System access logs are stored in a secure fashion with limited access and protected from alteration or deletion. 5 0.00 Access Control Business Disruption and System Failures System software failure System access logs are not maintained for an appropriate period of time. System access logs are maintained for an appropriate period of time (both online and archived). 5 0.00 Access Control External Fraud Unauthorized network access Informal or inadequate access monitoring processes User IDs are reviewed for appropriate access. 5 0.00 Access Control Internal Fraud Unauthorized network access Informal or inadequate access administration/monitoring processes over privileged accounts Privileged users are controlled and monitored by a formal approval process. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 13 Access Control Internal Fraud Unauthorized network access Systems features (strong passwords) are not enabled or do not exist. In absence of systems controls, policies/guidelines encouraging strong passwords have not been established. Restrictions are placed on user password creation and use including expiration after a certain time period, minimum length, reuse, and appropriate strength (e.g., user ID not equal to password, password not equal to password, limit repetitive characters, require alphanumeric and special characters). 5 0.00 Access Control External Fraud Unauthorized network access Systems features (strong passwords) are not enabled or do not exist. In absence of systems controls, policies/guidelines encouraging strong passwords have not been established. Restrictions are placed on user password creation and use including expiration after a certain time period, minimum length, reuse, and appropriate strength (e.g., user ID not equal to password, password not equal to password, limit repetitive characters, require alphanumeric and special characters). 5 0.00 Access Control Internal Fraud Unauthorized network access Workstation screensaver/lockout features are not enabled/system enforced. Policies/guidelines do not exist. The desktop is configured to log off, lock or use a password protected screen saver whenever the computer is left unattended. 5 0.00 Access Control External Fraud Unauthorized network access Workstation screensaver/lockout features are not enabled/system enforced. Policies/guidelines do not exist. The desktop is configured to log off, lock or use a password protected screen saver whenever the computer is left unattended. 5 0.00 Access Control Internal Fraud Unauthorized network access Ingress/egress filtering is not enabled/supported on routers. Network routers do ingress and egress filtering. 5 0.00 Access Control External Fraud Unauthorized network access Ingress/egress filtering is not enabled/supported on routers. Network routers do ingress and egress filtering. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Time, day, or similar restrictions are not enabled. Access to resources is controlled by a combination of any of the following: (1) method or location of accessing user (2) time-of-day (3) day-of-week (4) calendar date (5) specific program used to access the resource. 5 0.00 Access Control External Fraud Unauthorized network or system access Time, day, or similar restrictions not enabled Access to resources is controlled by a combination of any of the following: (1) method or location of accessing user (2) time-of-day (3) day-of-week (4) calendar date (5) specific program used to access the resource. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 14 Access Control Internal Fraud Unauthorized network or system access Authorization engine fails in an open state. If the authorization engine for the system fails, the access control rules default to "no access. 5 0.00 Access Control External Fraud Unauthorized network or system access Authorization engine fails in an open state. If the authorization engine for the system fails, the access control rules default to "no access. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Access administration processes do verify user identities or ensure that access is approved and authorized. The signature or identity of a person applying for access is verified/authenticated and authorized. 5 0.00 Access Control External Fraud Unauthorized network or system access access administration processes do verify user identities or ensure that access is approved and authorized The signature or identity of a person applying for access is verified/authenticated and authorized. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Access administration processes do not ensure that user access is based on least privilege or consistent with job function. User access capabilities are configured with least privilege, and are consistent with the users assigned job responsibilities for performing a particular function or transaction. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 15 Access Control External Fraud Unauthorized network or system access Access administration processes do not ensure that user access is based on least privilege or consistent with job function. User access capabilities are configured with least privilege, and are consistent with the users assigned job responsibilities for performing a particular function or transaction. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Informal or inadequate access monitoring processes. User IDs are reviewed for appropriate access. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Access administration change (employee status changes) processes are informal or inadequate. Procedures are in place to amend user access rights when a user changes roles in the organization and revoke rights when a user leaves the organization. 5 0.00 Access Control External Fraud Unauthorized network or system access Access administration change (employee status changes) processes are informal or inadequate. Procedures are in place to amend user access rights when a user changes roles in the organization and revoke rights when a user leaves the organization. 5 0.00 Access Control External Fraud Unauthorized network or system access Informal or inadequate access administration/monitoring processes over privileged accounts Privileged users are controlled and monitored by a formal approval process. 5 0.00 Access Control Internal Fraud Unauthorized network or system access No processes in place to ensure default user IDs are renamed/disabled Default user IDs are renamed or disabled. 5 0.00 Access Control External Fraud Unauthorized network or system access No processes in place to ensure default user IDs are renamed/disabled Default user IDs are renamed or disabled. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Temporary, generic, guest or anonymous user IDs are not tightly controlled/monitored. Temporary, generic, guest or anonymous user IDs are limited in use and tightly controlled. 5 0.00 Access Control External Fraud Unauthorized network or system access Temporary, generic, guest or anonymous user IDs are not tightly controlled/monitored. Temporary, generic, guest or anonymous user IDs are limited in use and tightly controlled. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Ongoing user security awareness programs have not been implemented. Users are made aware of their responsibilities for maintaining effective access controls, particularly regarding the security of passwords and user equipment. 5 0.00 Access Control External Fraud Unauthorized network or system access Ongoing user security awareness programs have not been implemented. Users are made aware of their responsibilities for maintaining effective access controls, particularly regarding the security of passwords and user equipment. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Password policies/standards have not been established. Guidelines are provided to users for generating secure passwords including simple instruction such as passwords must not be shared, passwords must not be written down and stored in obvious places, etc. 5 0.00 Access Control External Fraud Unauthorized network or system access Password policies/standards have not been established. Guidelines are provided to users for generating secure passwords including simple instruction such as passwords must not be shared, passwords must not be written down and stored in obvious places, etc. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 16 Access Control Internal Fraud Unauthorized network or system access Policies/procedures addressing security of stored passwords have not been established. Systems features to secure store passwords (e.g., encryption) have not been enabled. Appropriate controls are established for the secure storage and maintenance of password lists. 5 0.00 Access Control External Fraud Unauthorized network or system access Policies/procedures addressing security of stored passwords have not been established. Systems features to secure store passwords (e.g., encryption) have not been enabled. Appropriate controls are established for the secure storage and maintenance of password lists. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Systems features (forced password change) have not been enabled or do not exist. In absence of systems controls, manual processes/procedures have not been established to remind users to do this. The system is configured to require the user to change initial password during first logon. 5 0.00 Access Control External Fraud Unauthorized network or system access Systems features (forced password change) have not been enabled or do not exist. In absence of systems controls, manual processes/procedures have not been established to remind users to do this. The system is configured to require the user to change their initial password during first logon. 5 0.00 Access Control Internal Fraud Unauthorized network or system access System timeout features have not been enabled or do not exist. The system is configured to disconnect or force re- authentication of users after a specified period of inactivity. 5 0.00 Access Control External Fraud Unauthorized network or system access System timeout features have not been enabled or do not exist. The system is configured to disconnect or force re- authentication of users after a specified period of inactivity. 5 0.00 Access Control Internal Fraud Unauthorized network or system access System unsuccessful logon attempt features are not enabled or do not exist. The system is configured to disable or suspend user IDs after a fixed number of unsuccessful logon attempts. 5 0.00 Access Control External Fraud Unauthorized network or system access System unsuccessful logon attempt features are not enabled or do not exist. The system is configured to disable or suspend user IDs after a fixed number of unsuccessful logon attempts. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Remote network access paths are not restricted to designated gateways and/or resources. Remote network access paths are restricted to designated gateways and/or resources. 5 0.00 Access Control External Fraud Unauthorized network or system access Remote network access paths are not restricted to designated gateways and/or resources. Remote network access paths are restricted to designated gateways and/or resources. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Formal modem approval procedures are not in place. A process is in place for requesting and approving modem connections to servers or desktops. 5 0.00 Access Control External Fraud Unauthorized network or system access Formal modem approval procedures are not in place. A process is in place for requesting and approving modem connections to servers or desktops. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 17 Access Control Internal Fraud Unauthorized network or system access Routing access control lists are inappropriately configured or improperly maintained to ensure security. Routing access control lists are maintained by designated personnel and used for security. 5 0.00 Access Control External Fraud Unauthorized network or system access Routing access control lists are inappropriately configured or improperly maintained to ensure security. Routing access control lists are maintained by designated personnel and used for security. 5 0.00 Access Control External Fraud Unauthorized network or system access Strong authentication features are not enabled/supported. Additional forms of access control are used to safeguard against unauthorized access from external connections (e.g., dial back, two- part authentication, challenge- response, time of day or week restriction, read-only restrictions, etc.) 5 0.00 Access Control Internal Fraud Unauthorized network or system access Processes/procedures have not been implemented to ensure third party connections are appropriately authorized, documented, and managed. An authorization, documentation and management process is in place for all external connections 5 0.00 Access Control External Fraud Unauthorized network or system access Processes/procedures have not been implemented to ensure third party connections are appropriately authorized, documented, and managed An authorization, documentation and management process is in place for all external connections 5 0.00 Access Control Internal Fraud Unauthorized network or system access All external connections and/or external IP network access passes bypass firewalls. All external connections and external IP network access passes through a firewall. 5 0.00 Access Control External Fraud Unauthorized network or system access All external connections and/or external IP network access passes bypass firewalls. All external connections and external IP network access passes through a firewall. 5 0.00 Access Control External Fraud Unauthorized network or system access Session encryption is not used for external IP access. External IP access, including system-to-system authentication, uses session encryption. 5 0.00 Access Control External Fraud Unauthorized network or system access Local and wide area networks are not fully switched. Local area and wide area networks are fully switched. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Internal network segments are not segregated and do not have controlled access through network level authorization. Internal network segments are segregated and have controlled access through network level authorization. 5 0.00 Access Control Internal Fraud Unauthorized network or system access No limitations or restrictions have been placed on connection times. Limitations and/or restrictions have been placed on connection times for activities such as batch processing (i.e., restricting connections, time-outs, and/or inactivity) 5 0.00 Access Control Internal Fraud Unauthorized network or system access System access and use is not monitored based on current vulnerability and risk analysis, and is not integrated with an incident response capability. System access and use is monitored based on current vulnerability and risk analysis, and is integrated with an incident response capability. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 18 Access Control Internal Fraud Unauthorized network or system access System access logs are not created and reviewed to identify use or attempted use and modification or attempted modification of critical systems components (files, registry entries, configurations, security settings/parameters, audit logs). System access logs are created and reviewed to identify use or attempted use and modification or attempted modification of critical systems components (files, registry entries, configurations, security settings/parameters, audit logs). 5 0.00 Access Control Internal Fraud Unauthorized network or system access System access logs are not stored in a secure fashion with limited access and are not protected from alteration or deletion. System access logs are stored in a secure fashion with limited access and protected from alteration or deletion. 5 0.00 Access Control Internal Fraud Unauthorized network or system access System access logs are not maintained for an appropriate period of time. System access logs are maintained for an appropriate period of time (both online and archived). 5 0.00 Access Control Internal Fraud Unauthorized network or system access Alerting mechanisms are not used to notify appropriate individuals that security events related to system access have occurred. Alerting mechanisms are used to notify appropriate individuals that security events related to system access have occurred. 5 0.00 Access Control External Fraud Unauthorized network or system access Alerting mechanisms are not used to notify appropriate individuals that security events related to system access have occurred. Alerting mechanisms are used to notify appropriate individuals that security events related to system access have occurred. 5 0.00 Access Control Internal Fraud Unauthorized network or system access No process is in place to ensure accurate clock synchronization for system access and logging activity. A process is in place to ensure accurate clock synchronization for system access and logging activity. 5 0.00 Access Control External Fraud Unauthorized network or system access No process is in place to ensure accurate clock synchronization for system access and logging activity. A process is in place to ensure accurate clock synchronization for system access and logging activity. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Technology such as encryption, VPN client technology, etc. are not used during remote connectivity. Confidentiality of sensitive information is ensured during remote connectivity using appropriate technology such as encryption, VPN client technology, etc. 5 0.00 Access Control External Fraud Unauthorized network or system access Technology such as encryption, VPN client technology, etc. are not used during remote connectivity. Confidentiality of sensitive information is ensured during remote connectivity using appropriate technology such as encryption, VPN client technology, etc. 5 0.00 Access Control Internal Fraud Unauthorized network or system access Remote access is not controlled using appropriate authentication controls. Remote access is controlled using appropriate authentication controls. 5 0.00 Access Control External Fraud Unauthorized network or system access Remote access is not controlled using appropriate authentication controls. Remote access is controlled using appropriate authentication controls. 5 0.00 Access Control External Fraud Unauthorized network or system access A comprehensive policy outlining remote user requirements is not in place and is not communicated to and/or is not understood or followed by the employee. A comprehensive policy outlining remote user requirements is in place and communicated via an agreement signed by the employee. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 19 Access Control Internal Fraud Unauthorized network or system access Remote access user accounts are not reviewed on an appropriate schedule. Remote access user accounts are reviewed on an appropriate schedule. 5 0.00 Access Control Internal Fraud Unauthorized scans Routing access control lists are inappropriately configured or improperly maintained to ensure security Routing access control lists are maintained by designated personnel and used for security. 5 0.00 Access Control External Fraud Unauthorized scans Routing access control lists are inappropriately configured or improperly maintained to ensure security. Routing access control lists are maintained by designated personnel and used for security. 5 0.00 Access Control Internal Fraud Unauthorized scans All external connections and/or external IP network access passes bypass firewalls. All external connections and external IP network access pass through a firewall. 5 0.00 Access Control External Fraud Unauthorized scans All external connections and/or external IP network access passes bypass firewalls. All external connections and external IP network access passes through a firewall. 5 0.00 Access Control Internal Fraud Unauthorized scans The internal address range is exposed or unprotected. The internal address range is protected (e.g., NAT). 5 0.00 Access Control External Fraud Unauthorized scans The internal address range is exposed or unprotected. The internal address range is protected (e.g., NAT). 5 0.00 Access Control Internal Fraud Unauthorized scans Host level system authorization mechanisms are not in place. Host level system authorization mechanisms are in place. 5 0.00 Access Control Internal Fraud Unauthorized scans Operating system master and sub-master consoles are not located in a protected and controlled area. Operating system master and sub- master consoles are located in a protected and controlled area. 5 0.00 Access Control External Fraud Unauthorized scans Alerting mechanisms are not used to notify appropriate individuals that security events related to system access have Alerting mechanisms are used to notify appropriate individuals that security events related to system access have occurred. 5 0.00 Access Control External Fraud Unauthorized scans Remote access user accounts are not reviewed on an appropriate schedule. Remote access user accounts are reviewed on an appropriate schedule. 5 0.00 Access Control Business Disruption and System Failures Viruses Processes/procedures have not been implemented to ensure third party connections are appropriately authorized, documented, and managed. An authorization, documentation and management process is in place for all external connections. 5 0.00 Access Control External Fraud Viruses SNMP best practices have not been implemented. SNMP best practice has been implemented. 5 0.00 Access Control Business Disruption and System Failures Viruses Security controls for equipment and information used in mobile computers have not been established. Security controls for equipment and information used in mobile computers have been established including: permissible equipment use and security of that equipment (e.g., double-wrapped envelopes, locked briefcases/cabinets, encrypted data, digital certificates, etc.), security and backup of information taken or held offsite, and use of virus protection tools. 5 0.00 Access Control Internal Fraud War dialing Formal modem approval procedures are not in place. A process is in place for requesting and approving modem connections to servers or desktops. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 20 Access Control External Fraud War dialing Formal modem approval procedures are not in place. A process is in place for requesting and approving modem connections to servers or desktops. 5 0.00 Access Control External Fraud Web defacements No processes in place to ensure default user IDs are renamed/disabled. Default user IDs are renamed or disabled. 5 0.00 Access Control Execution , Delivery and Process Management Web defacements No processes in place to ensure default user ids are renamed/disabled. Default user ids are renamed or disabled. 5 0.00 Access Control Business Disruption and System Failures Web defacements No processes in place to ensure default user ids are renamed/disabled. Default user IDs are renamed or disabled. 5 0.00 Access Control Clients, Products and Business Practices Web defacements No processes in place to ensure default user ids are renamed/disabled. Default user ids are renamed or disabled. 5 0.00 Access Control External Fraud Web defacements Temporary, generic, guest or anonymous user IDs are not tightly controlled/monitored. Temporary, generic, guest or anonymous user IDs are limited in use and tightly controlled. 5 0.00 Access Control Execution , Delivery and Process Management Web defacements Temporary, generic, guest or anonymous user IDs are not tightly controlled/monitored. Temporary, generic, guest or anonymous user IDs are limited in use and tightly controlled. 5 0.00 Access Control Business Disruption and System Failures Web defacements Temporary, generic, guest or anonymous user IDs are not tightly controlled/monitored. Temporary, generic, guest or anonymous user IDs are limited in use and tightly controlled. 5 0.00 Access Control Clients, Products and Business Practices Web defacements Temporary, generic, guest or anonymous user IDs are not tightly controlled/monitored. Temporary, generic, guest or anonymous user IDs are limited in use and tightly controlled. 5 0.00 Access Control External Fraud Web defacements Policies/procedures addressing security of stored passwords have not been established. Systems features to secure stored passwords (e.g., encryption) have not been enabled. Appropriate controls are established for the secure storage and maintenance of password lists. 5 0.00 Access Control Execution , Delivery and Process Management Web defacements Policies/procedures addressing security of stored passwords have not been established. Systems features to secure store passwords (e.g., encryption) have not been enabled. Appropriate controls are established for the secure storage and maintenance of password lists. 5 0.00 Access Control Business Disruption and System Failures Web defacements Policies/procedures addressing security of stored passwords have not been established. Systems features to secure stored passwords (e.g., encryption) have not been enabled. Appropriate controls are established for the secure storage and maintenance of password lists. 5 0.00 Access Control Clients, Products and Business Practices Web defacements Policies/procedures addressing security of stored passwords have not been established. Systems features to secure stored passwords (e.g., encryption) have not been enabled. Appropriate controls are established for the secure storage and maintenance of password lists. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 21 Access Control External Fraud Web defacements Systems features (forced password change) have not been enabled or do not exist. In absence of systems controls, manual processes/procedures have not been established to remind users to do this. The system is configured to require the user to change initial password during first logon. 5 0.00 Access Control Execution , Delivery and Process Management Web defacements Systems features (forced password change) have not been enabled or do not exist. In absence of systems controls, manual processes/procedures have not been established to remind users to do this. The system is configured to require the user to change initial password during first logon. 5 0.00 Access Control Business Disruption and System Failures Web defacements Systems features (forced password change) have not been enabled or do not exist. In absence of systems controls, manual processes/procedures have not been established to remind users to do this. The system is configured to require the user to change initial password during first logon. 5 0.00 Access Control Clients, Products and Business Practices Web defacements Systems features (forced password change) have not been enabled or do not exist. In absence of systems controls, manual processes/procedures have not been established to remind users to do this. The system is configured to require the user to change initial password during first logon. 5 0.00 Access Control External Fraud Web defacements System timeout features have not been enabled or do not exist. The system is configured to disconnect or force re- authentication of users after a specified period of inactivity. 5 0.00 Access Control Execution , Delivery and Process Management Web defacements System timeout features have not been enabled or do not exist. The system is configured to disconnect or force re- authentication of users after a specified period of inactivity. 5 0.00 Access Control Business Disruption and System Failures Web defacements System timeout features have not been enabled or do not exist. The system is configured to disconnect or force re- authentication of users after a specified period of inactivity. 5 0.00 Access Control Clients, Products and Business Practices Web defacements System timeout features have not been enabled or do not exist. The system is configured to disconnect or force re- authentication of users after a specified period of inactivity. 5 0.00 Access Control External Fraud Web defacements System unsuccessful logon attempt features are not enabled or do not exist. The system is configured to disable or suspend user IDs after a fixed number of unsuccessful logon attempts. 5 0.00 Access Control Execution , Delivery and Process Management Web defacements System unsuccessful logon attempt features are not enabled or do not exist. The system is configured to disable or suspend user IDs after a fixed number of unsuccessful logon attempts. 5 0.00 Access Control Business Disruption and System Failures Web defacements System unsuccessful logon attempt features are not enabled or do not exist. The system is configured to disable or suspend user IDs after a fixed number of unsuccessful logon attempts. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 22 Access Control Clients, Products and Business Practices Web defacements System unsuccessful logon attempt features are not enabled or do not exist. The system is configured to disable or suspend user IDs after a fixed number of unsuccessful logon attempts. 5 0.00 Access Control Business Disruption and System Failures Worms Processes/procedures have not been implemented to ensure third party connections are appropriately authorized, documented, and managed. An authorization, documentation and management process is in place for all external connections. 5 0.00 Access Control External Fraud Worms SNMP best practices have not been implemented. SNMP best practice has been implemented. 5 0.00 Asset Classification and Control Internal Fraud Discussing sensitive matters in open Lack of appropriate level of security controls applied to sensitive information assets. Unauthorized disclosure of confidential information. Information handling procedures for copying, storage, packaging for internal and external mail, electronic and spoken transmission and destruction are established based upon information asset classification. 5 0.00 Asset Classification and Control External Fraud Discussing sensitive matters in open Lack of appropriate level of security controls applied to sensitive information assets. Unauthorized disclosure of confidential information. Information handling procedures for copying, storage, packaging for internal and external mail, electronic and spoken transmission and destruction are established based upon information asset classification. 5 0.00 Asset Classification and Control External Fraud Dumpster diving Lack of appropriate level of security controls applied to sensitive information assets. Unauthorized disclosure of confidential information. Information handling procedures for copying, storage, packaging for internal and external mail, electronic and spoken transmission and destruction are established based upon information asset classification. 5 0.00 Asset Classification and Control External Fraud Dumpster diving Confidential/sensitive data located on a disposed of or reassigned asset can be accessed by an unauthorized user. Data disposal procedures are defined for data on all types of media (e.g., paper, microfiche, and computer disks). 5 0.00 Asset Classification and Control External Fraud Embezzlement Unauthorized disclosure of sensitive information. Procedures for labeling printed reports, screen displays, magnetic media, electronic messages and file transfers are defined. 5 0.00 Asset Classification and Control External Fraud Embezzlement Confidential/sensitive data located on a disposed of or reassigned asset can be accessed by an unauthorized user. Data disposal procedures are defined for data on all types of media (e.g., paper, microfiche, and computer disks). 5 0.00 Asset Classification and Control Execution , Delivery and Process Management Human error Lack of appropriate level of security controls applied to sensitive information assets. Unlawful disclosure of sensitive information. Information assets that are processed, stored or transmitted are handled in accordance with asset classification (e.g., confidential, sensitive, and public) and are in compliance with applicable laws and regulations. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 23 Asset Classification and Control Execution , Delivery and Process Management Lawsuits/ litigation Lack of appropriate level of security controls applied to sensitive information assets. Unlawful disclosure of sensitive information. Information assets that are processed, stored or transmitted are handled in accordance with asset classification (e.g., confidential, sensitive, and public) and are in compliance with applicable laws and regulations. 5 0.00 Asset Classification and Control External Fraud Leaving sensitive documents exposed Confidential/sensitive data located on a disposed of or reassigned asset can be accessed by an unauthorized user. Licensing penalties can be incurred if not properly recorded. Procedures and controls for asset handling -- including the introduction or purchase, licensing, transfer, removal, disposal and reuse of assets -- are established. 5 0.00 Asset Classification and Control Internal Fraud Leaving sensitive documents exposed Unauthorized disclosure of sensitive information. Procedures for labeling printed reports, screen displays, magnetic media, electronic messages and file transfers are defined. 5 0.00 Asset Classification and Control External Fraud Leaving sensitive documents exposed Unauthorized disclosure of sensitive information. Procedures for labeling printed reports, screen displays, magnetic media, electronic messages and file transfers are defined. 5 0.00 Asset Classification and Control Internal Fraud Leaving sensitive documents exposed Lack of appropriate level of security controls applied to sensitive information assets. Unauthorized disclosure of confidential information. Information handling procedures for copying, storage, packaging for internal and external mail, electronic and spoken transmission and destruction are established based upon information asset classification. 5 0.00 Asset Classification and Control External Fraud Leaving sensitive documents exposed Lack of appropriate level of security controls applied to sensitive information assets. Unauthorized disclosure of confidential information. Information handling procedures for copying, storage, packaging for internal and external mail, electronic and spoken transmission and destruction are established based upon information asset classification. 5 0.00 Asset Classification and Control External Fraud Leaving sensitive documents exposed Confidential/sensitive data located on a disposed of or reassigned asset can be accessed by an unauthorized user. Data disposal procedures are defined for data on all types of media (e.g., paper, microfiche, and computer disks). 5 0.00 Asset Classification and Control External Fraud Network spoofing Lack of appropriate level of security controls applied to sensitive information assets. Unauthorized disclosure of confidential information. Data encryption and authentication requirements are established based on information asset classification. 5 0.00 Asset Classification and Control External Fraud Unauthorized network or system access Lack of appropriate level of security controls applied to sensitive information assets. Unauthorized disclosure of confidential information. Data encryption and authentication requirements are established based on information asset classification. 5 0.00 Asset Classification and Control Internal Fraud Unauthorized network or system access Lack of appropriate level of security controls applied to sensitive information assets. Unauthorized disclosure of confidential information. Data encryption and authentication requirements are established based on information asset classification. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 24 Asset Classification and Control External Fraud Unauthorized scans Lack of appropriate level of security controls applied to sensitive information assets. Unauthorized disclosure of confidential information. Data encryption and authentication requirements are established based on information asset classification. 5 0.00 Business Continuity Management Business Disruption and System Failures Biological agent attack Crisis event management procedures, roles and responsibilities, and communication plans have not been defined or tested. Crisis event management testing plans are in place including emergency response, escalation and communication plan documentation, and clearly 5 0.00 Business Continuity Management Damage to Physical Assets Bomb attacks Crisis event management procedures, roles and responsibilities, and communication plans have not been defined or tested. Crisis event management testing plans are in place including emergency response, escalation and communication plan documentation, and clearly 5 0.00 Business Continuity Management Damage to Physical Assets Chemical spill Crisis event management procedures, roles and responsibilities, and communication plans have not been defined or tested Crisis event management testing plans are in place including emergency response, escalation and communication plan documentation, and clearly defined individual and organizational responsibilities (including public sector involvement). 5 0.00 Business Continuity Management Business Disruption and System Failures Civil disorder Crisis event management procedures, roles and responsibilities, and communication plans have not been defined or tested. Crisis event management testing plans are in place including emergency response, escalation and communication plan documentation, and clearly defined individual and organizational responsibilities (including public sector involvement). 5 0.00 Business Continuity Management Business Disruption and System Failures Civil disorder There are no legal obligations, accountability or service level agreement for third party service providers engaged in the recovery of business functions and services. The contract(s) governing the products or services delivered by third parties include terms describing the recovery service levels to be delivered, continuity plans and notification provisions in the event of continuity plan activation. 5 0.00 Business Continuity Management Business Disruption and System Failures DDoS or DoS attacks Business recovery procedures, roles and responsibilities, and corresponding technology recovery plans have not been defined or tested. A comprehensive business continuity plan, including technology solutions is in place to address recovery of service during a time of business interruption. 5 0.00 Business Continuity Management Business Disruption and System Failures DDoS or DoS attacks Business continuity and disaster recovery plans will fail to meet the recovery time objectives for critical business functions and services. End-to-end business continuity and recovery plans are tested at appropriate intervals and results feed into a continuous recovery plan improvement cycle that is based on changes in business, technology, vulnerabilities and/or culture. 5 0.00 Business Continuity Management Business Disruption and System Failures DNS failure Business recovery procedures, roles and responsibilities, and corresponding technology recovery plans have not been defined or tested. A comprehensive business continuity plan, including technology solutions is in place to address recovery of service during a time of business interruption. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 25 Business Continuity Management Damage to Physical Assets Floods Unable to recover critical business capabilities within the required timeframes. A risk assessment and business impact analysis is conducted to determine the events and environmental surroundings that could adversely impact the continuation of critical services or products and the respective required recovery time and recovery point objectives for each service or product. 5 0.00 Business Continuity Management Damage to Physical Assets Floods Crisis event management procedures, roles and responsibilities, and communication plans have not been defined or tested. Crisis event management testing plans are in place including emergency response, escalation and communication plan documentation, and clearly defined individual and organizational responsibilities (including public sector involvement). 5 0.00 Business Continuity Management Execution , Delivery and Process Management Human error There is a lack of responsibility for supporting and enhancing the business continuity program. Accountability and compliance for the continuity planning program, tests, audits and results are clearly defined. 5 0.00 Business Continuity Management Damage to Physical Assets Hurricane Unable to recover critical business capabilities within the required timeframes. A risk assessment and business impact analysis is conducted to determine the events and environmental surroundings s that could adversely impact the continuation of critical services or products and the respective required recovery time and recovery point objectives for each service or product. 5 0.00 Business Continuity Management Clients, Products and Business Practices Lawsuits/ litigation There are no legal obligations, accountability or service level agreement for third party service providers engaged in the recovery of business functions and services The contract(s) governing the products or services delivered by third parties include terms describing the recovery service levels to be delivered, continuity plans and notification provisions in the event of continuity plan activation. 5 0.00 Business Continuity Management Business Disruption and System Failures Power failure Business recovery procedures, roles and responsibilities, and corresponding technology recovery plans have not been defined or tested. A comprehensive business continuity plan, including technology solutions is in place to address recovery of service during a time of business interruption. 5 0.00 Business Continuity Management Business Disruption and System Failures Power failure Unable to recover critical business capabilities within the required timeframes. A risk assessment and business impact analysis is conducted to determine the events and environmental surroundings s that could adversely impact the continuation of critical services or products and the respective required recovery time and recovery point objectives for each service or product. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 26 Business Continuity Management Business Disruption and System Failures Power failure Business recovery procedures, roles and responsibilities, and technology recovery plans have not been defined or tested for key service providers such as disaster recovery hot-sites, telecommunications providers, and technology vendors. Documented business continuity plans and supporting recovery strategies are in place including the consideration of recovery of activities supported by dependent service providers. 5 0.00 Business Continuity Management Business Disruption and System Failures Power failure Business continuity and disaster recovery plans will fail to meet the recovery time objectives for critical business functions and services. End-to-end business continuity and recovery plans are tested at appropriate intervals and results feed into a continuous recovery plan improvement cycle that is based on changes in business, technology, vulnerabilities and/or culture. 5 0.00 Business Continuity Management Business Disruption and System Failures Power failure There are no legal obligations, accountability or service level agreement for third party service providers engaged in the recovery of business functions and services The contract(s) governing the products or services delivered by third parties include terms describing the recovery service levels to be delivered, continuity plans and notification provisions in the event of continuity plan activation. 5 0.00 Business Continuity Management Business Disruption and System Failures Sabotage There is a lack of responsibility for supporting and enhancing the business continuity program. Accountability and compliance for the continuity planning program, tests, audits and results are clearly defined. 5 0.00 Business Continuity Management Business Disruption and System Failures System software failure Business recovery procedures, roles and responsibilities, and technology recovery plans have not been defined or tested for key service providers such as disaster recovery hot-sites, telecommunications providers, and technology vendors. Documented business continuity plans and supporting recovery strategies are in place including the consideration of recovery of activities supported by dependent service providers. 5 0.00 Business Continuity Management Business Disruption and System Failures Telecommunications failure Unable to recover critical business capabilities within the required timeframes. A risk assessment and business impact analysis is conducted to determine the events and environmental surroundings s that could adversely impact the continuation of critical services or products and the respective required recovery time and recovery point objectives for each service or product. 5 0.00 Business Continuity Management Business Disruption and System Failures Telecommunications failure Business recovery procedures, roles and responsibilities, and technology recovery plans have not been defined or tested for key service providers such as disaster recovery hot-sites, telecommunications providers, and technology vendors. Documented business continuity plans and supporting recovery strategies are in place including the consideration of recovery of activities supported by dependent service providers. 5 0.00 Business Continuity Management Business Disruption and System Failures Telecommunications failure Business continuity and disaster recovery plans will fail to meet the recovery time objectives for critical business functions and End-to-end business continuity and recovery plans are tested at appropriate intervals and results feed into a continuous recovery 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 27 Business Continuity Management Business Disruption and System Failures Telecommunications failure There are no legal obligations, accountability or service level agreement for third party service providers engaged in the The contract(s) governing the products or services delivered by third parties include terms describing the recovery service 5 0.00 Business Continuity Management Damage to Physical Assets Terrorist attack Business recovery procedures, roles and responsibilities, and corresponding technology recovery plans have not been A comprehensive business continuity plan, including technology solutions is in place to address recovery of service during 5 0.00 Business Continuity Management Damage to Physical Assets Terrorist attack Unable to recover critical business capabilities within the required timeframes. A risk assessment and business impact analysis is conducted to determine the events and environmental surroundings s that could adversely impact the continuation of critical services or products and the respective required recovery time and recovery point objectives for each service or product. 5 0.00 Business Continuity Management Damage to Physical Assets Terrorist attack Unable to recover critical business capabilities within the required timeframes. A risk assessment and business impact analysis is conducted to determine the events and environmental surroundings s that could adversely impact the continuation of critical services or products and the respective required recovery time and recovery point objectives for each service or product. 5 0.00 Business Continuity Management Damage to Physical Assets Terrorist attack Crisis event management procedures, roles and responsibilities, and communication plans have not been defined or tested Crisis event management testing plans are in place including emergency response, escalation and communication plan documentation and clearly defined individual and organizational responsibilities (including public sector involvement). 5 0.00 Business Continuity Management Damage to Physical Assets Terrorist attack There are no legal obligations, accountability or service level agreement for third party service providers engaged in the recovery of business functions and services. The contract(s) governing the products or services delivered by third parties include terms describing the recovery service levels to be delivered, continuity plans and notification provisions in the event of continuity plan activation. 5 0.00 Communications and Operations Management Damage to Physical Assets Airplane crash Lack of information and media protection while in transit. Procedures and standards to protect information and media in transit are established. 5 0.00 Communications and Operations Management Business Disruption and System Failures Application software failure Lack of release management processes. System and network operating release management processes and procedures are in place including analysis of new release functionality, testing and deployment schedules. 5 0.00 Communications and Operations Management Business Disruption and System Failures Application software failure Applications, systems and network architectures lack high availability. Application, system and network architectures are designed for high availability and operational redundancy. 5 0.00 Communications and Operations Management Business Disruption and System Failures Application software failure Acceptance criteria for new applications, systems and networks are not in place. Formal acceptance procedures and criteria (including security) for new applications, systems and networks are in place. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 28 Communications and Operations Management Business Disruption and System Failures Application software failure Design requirements for applications, systems and networks are not met. Implemented applications, systems and networks meet design requirements. 5 0.00 Communications and Operations Management Damage to Physical Assets Automobile crash Lack of information and media protection while in transit. Procedures and standards to protect information and media in transit are established. 5 0.00 Communications and Operations Management Business Disruption and System Failures Bomb threats Lack of procedures for handling external communications in the event of an incident. Procedures are in place to notify or handle inquiries from external stakeholders; customers or clients, news media, government offices, outside investigators, shareholders. 5 0.00 Communications and Operations Management Internal Fraud Computer crime System and data backups are able to be accessed freely. On and off-site system and data backups are protected from unauthorized access and tampering. 5 0.00 Communications and Operations Management External Fraud Computer crime System and data backups are able to be accessed freely. On and off-site system and data backups are protected from unauthorized access and tampering. 5 0.00 Communications and Operations Management Internal Fraud Computer crime Logs are aren't available for audits, forensics or prosecution. Operator use logs are retained for an appropriate period of time. 5 0.00 Communications and Operations Management External Fraud Computer crime Logs are aren't available for audits, forensics or prosecution. Operator use logs are retained for an appropriate period of time. 5 0.00 Communications and Operations Management External Fraud Computer crime Intrusion detection systems are not used or used ineffectively. Intrusion detection systems are used appropriately within the overall network architecture. 5 0.00 Communications and Operations Management Internal Fraud Computer crime Lack of accountability for network security logs. Sufficient accountability is assigned to logs of security related events to the network. 5 0.00 Communications and Operations Management External Fraud Computer crime Lack of accountability for network security logs. Sufficient accountability is assigned to logs of security related events to the network. 5 0.00 Communications and Operations Management External Fraud Computer crime Lack of strong authentication and authorization to e- commerce applications. Online registration, authentication and authorization are required before e-commerce information and data exchanges are made. 5 0.00 Communications and Operations Management Business Disruption and System Failures DDoS or DoS attacks Lack of documented incident management procedures. Incident management procedures are in place and well documented including: actions to take in the event of information system failures or loss of service, denial of service attacks, errors resulting from incomplete or inaccurate business data, errors resulting from system or device misconfiguration, breaches or loss of confidentiality, recovery from specific incidents, gathering of evidence, documentation and recovery process. 5 0.00 Communications and Operations Management Business Disruption and System Failures DDoS or DoS attacks Incident response teams are unqualified. Incident response teams have appropriate qualifications and necessary training. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 29 Communications and Operations Management Business Disruption and System Failures DDoS or DoS attacks No network penetration testing is performed. Regular, periodic vulnerability and penetration testing is performed on all networks in accordance with the risk of each security/control domain and perimeter. 5 0.00 Communications and Operations Management Business Disruption and System Failures DDoS or DoS attacks Lack of network redundancy Network redundancy or diverse network routing is maintained. 5 0.00 Communications and Operations Management Business Disruption and System Failures DDoS or DoS attacks Network activities are not monitored. Network activities are monitored (manually and/or using automated tools) through log reviews on a frequent, periodic basis. 5 0.00 Communications and Operations Management Business Disruption and System Failures DDoS or DoS attacks Logs are aren't available for audits, forensics or prosecution. Network activities are logged such as: access failures, logon patterns, allocation and use of privileged access accounts, selected transactions, sensitive resources, remote dial-up activity, firewall activity, failed operating system and application access attempts, security administration activity. 5 0.00 Communications and Operations Management Business Disruption and System Failures DDoS or DoS attacks Firewalls are not used or are used ineffectively. Firewalls are used appropriately within the overall network architecture. 5 0.00 Communications and Operations Management External Fraud DDoS or DoS attacks Intrusion detection systems are not used or used ineffectively. Intrusion detection systems are used appropriately within the overall network architecture. 5 0.00 Communications and Operations Management Business Disruption and System Failures DNS failure Lack of network redundancy Network redundancy or diverse network routing is maintained. 5 0.00 Communications and Operations Management External Fraud Dumpster diving Lack of record destruction and disposal policies Record destruction and disposal policies have been established for documents, computer media (tapes, disks, cassettes, etc.), input/output data and system documentation. 5 0.00 Communications and Operations Management Business Disruption and System Failures Fire Backup or recovery processes aren't working and no one is aware of it. Testing of backup systems and timely restoration of data is performed at regular intervals. 5 0.00 Communications and Operations Management Damage to Physical Assets Floods System and data backups aren't available for standard or disaster recovery purposes. Regular system and data backups are performed at appropriate intervals by specific or dedicated units. 5 0.00 Communications and Operations Management Damage to Physical Assets Floods System and data backups aren't available for standard or disaster recovery purposes. Regular system and data backups are performed at appropriate intervals by specific or dedicated units. 5 0.00 Communications and Operations Management Damage to Physical Assets Floods Recovery assets are destroyed in the original disaster. Copies of system and data backups are taken and stored offsite at locations with an adequate distance from the production site and for an adequate period of time. 5 0.00 Communications and Operations Management Business Disruption and System Failures Floods Backup or recovery processes aren't working and no one is aware of it. Testing of backup systems and timely restoration of data is performed at regular intervals. 5 0.00 Communications and Operations Management Business Disruption and System Failures Hardware failure No ability to project future system capacity requirements. Projection and planning for future system capacity requirements is performed. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 30 Communications and Operations Management Business Disruption and System Failures Hardware failure New system requirements are not documented or tested prior to use. Operational requirements for new systems is established, documented and tested prior to the systems acceptance and use. 5 0.00 Communications and Operations Management Business Disruption and System Failures Hardware failure Applications, systems and network architectures lack high availability. Application, system and network architectures are designed for high availability and operational redundancy. 5 0.00 Communications and Operations Management Business Disruption and System Failures Hardware failure Acceptance criteria for new applications, systems and networks are not in place. Formal acceptance procedures and criteria (including security) for new applications, systems and networks are in place. 5 0.00 Communications and Operations Management Business Disruption and System Failures Hardware failure Maintenance logs aren't available for problem management and forensics. Maintenance and upgrade logs are kept for hardware and/or software. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Human error Lack of instructions for incident response at processing facilities. Operating instructions for the management of processing facilities include incident response requirements such as escalation via a call tree, methods for handling errors, generating and handling special output and restarting and recovering systems. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Human error No formal change control process is in place. A formal change control process is in place detailing; testing (including regression and security testing as appropriate), assessment, formal approval, back out or contingency plans, separation of development and production software and systems, separation of development and production teams and provisions for emergency changes. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Human error System and network changes are not documented. All system and network operating changes are documented and incorporated back into system manuals. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Human error Lack of documented incident management procedures. Incident management procedures are in place and well documented including: actions to take in the event of information system failures or loss of service, denial of service attacks, errors resulting from incomplete or inaccurate business data, errors resulting from system or device misconfiguration, breaches or loss of confidentiality, recovery from specific incidents, gathering of evidence, documentation and recovery process. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Human error System monitoring does not have current signature files. The security event monitoring system has current signature files. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 31 Communications and Operations Management Execution , Delivery and Process Management Human error Incident response teams are unqualified. Incident response teams have appropriate qualifications and necessary training. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Human error Lack of accountability for network security logs. Sufficient accountability is assigned to logs of security related events to the network 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Human error Lack of record retention and storage policies. Record retention and storage policies have been established for documents, computer media (tapes, disks, cassettes, etc.), input/output data and system documentation. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Human error Sensitive information can be inadvertently made publicly available. A review and authorization process is in place to control information that is made publicly available. 5 0.00 Communications and Operations Management Damage to Physical Assets Hurricane Recovery assets are destroyed in the original disaster. Copies of system and data backups are taken and stored offsite at locations with an adequate distance from the production site and for an adequate period of time 5 0.00 Communications and Operations Management Clients, Products and Business Practices Lawsuits/ litigation Lack of procedures for handling external communications in the event of an incident. Procedures are in place to notify or handle inquiries from external stakeholders; customers or clients, news media, government offices, outside investigators, shareholders. 5 0.00 Communications and Operations Management Clients, Products and Business Practices Lawsuits/ litigation Lack of record retention and storage policies. Record retention and storage policies have been established for documents, computer media (tapes, disks, cassettes, etc.), input/output data and system documentation. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Leaving sensitive documents exposed Lack of record destruction and disposal policies. Record destruction and disposal policies have been established for documents, computer media (tapes, disks, cassettes, etc.), input/output data and system documentation. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Leaving sensitive documents exposed Lack of record retention and storage policies. Record retention and storage policies have been established for documents, computer media (tapes, disks, cassettes, etc.), input/output data and system documentation. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Leaving sensitive documents exposed Lack of ability to support information and software exchange agreements. Information and software exchange agreements (including software escrow) can be supported. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Leaving sensitive documents exposed Sensitive information can be inadvertently made publicly available. A review and authorization process is in place to control information that is made publicly available. 5 0.00 Communications and Operations Management Business Disruption and System Failures Malicious code Design requirements for applications, systems and networks are not met. Implemented applications, systems and networks meet design requirements. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 32 Communications and Operations Management Business Disruption and System Failures Malicious code Code scanning is performed, inconsistently performed or not adequately performed. A code scanning policy is in place and includes the types of security issues to be scanned for (e.g., malicious code, worms, Trojan horses, back doors, form input validation, SQL injection). 5 0.00 Communications and Operations Management Business Disruption and System Failures Malicious code Lack of filtering for malicious code. Filtering for malicious code at the network parameter is employed. 5 0.00 Communications and Operations Management External Fraud Network spoofing Intrusion detection systems are not used or used ineffectively. Intrusion detection systems are used appropriately within the overall network architecture. 5 0.00 Communications and Operations Management External Fraud Network spoofing Tools to detect rogue network devices are not used. Tools are used to detect rogue network devices and services. 5 0.00 Communications and Operations Management External Fraud Network spoofing Loss or compromise of data related to audits, forensics or prosecution Network security related event logs are secured against unauthorized access, change and deletion for an adequate period of time. 5 0.00 Communications and Operations Management External Fraud Network/application backdoor Design requirements for applications, systems and networks are not met. Implemented applications, systems and networks meet design requirements. 5 0.00 Communications and Operations Management Internal Fraud Network/application backdoor Design requirements for applications, systems and networks are not met. Implemented applications, systems and networks meet design requirements. 5 0.00 Communications and Operations Management External Fraud Network/application backdoor Code scanning is performed, inconsistently performed or not adequately performed. A code scanning policy is in place and includes the types of security issues to be scanned for (e.g., malicious code, worms, Trojan horses, back doors, form input validation, SQL injection). 5 0.00 Communications and Operations Management External Fraud Network/application backdoor Network management and security / control , domains aren't in place. Network management security/control domains (perimeter, DMZ, etc.) and perimeters have been designed, applied and implemented on all networks. 5 0.00 Communications and Operations Management External Fraud Network/application backdoor Non-secure configuration of network devices. Network devices are securely configured according to their function within security/control zones (i.e., public/untrusted networks, semi-private networks, DMZs) and perimeters. 5 0.00 Communications and Operations Management External Fraud Network/application backdoor Network activities are not monitored. Network activities are monitored (manually and/or using automated tools) through log reviews on a frequent, periodic basis. 5 0.00 Communications and Operations Management External Fraud Network/application backdoor Tools to detect rogue network devices are not used. Tools are used to detect rogue network devices and services. 5 0.00 Communications and Operations Management Business Disruption and System Failures Network/application time bomb Code scanning is performed, inconsistently performed or not adequately performed. A code scanning policy is in place and includes the types of security issues to be scanned for (e.g., malicious code, worms, Trojan horses, back doors, form input validation, SQL injection). 5 0.00 Communications and Operations Management External Fraud Network/application time bomb Tools to detect rogue network devices are not used. Tools are used to detect rogue network devices and services. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 33 Communications and Operations Management Business Disruption and System Failures Power failure Lack of instructions for incident response at processing facilities. Operating instructions for the management of processing facilities include incident response requirements such as escalation via a call tree, methods for handling errors, generating and handling special output and restarting and recovering systems. 5 0.00 Communications and Operations Management External Fraud Robbery Lack of information and media protection while in transit. Procedures and standards to protect information and media in transit are established. 5 0.00 Communications and Operations Management Business Disruption and System Failures Sabotage Lack of procedures for handling external communications in the event of an incident. Procedures are in place to notify or handle inquiries from external stakeholders, customers or clients, news media, government offices, outside investigators, shareholders. 5 0.00 Communications and Operations Management Damage to Physical Assets Seismic activity Recovery assets are destroyed in the original disaster. Copies of system and data backups are taken and stored offsite at locations with an adequate distance from the production site and for an adequate period of time. 5 0.00 Communications and Operations Management External Fraud Social engineering Sensitive information can be inadvertently made publicly available. A review and authorization process is in place to control information that is made publicly available. 5 0.00 Communications and Operations Management Execution , Delivery and Process Management Software defects No formal change control process is in place. A formal change control process is in place detailing: testing (including regression and security testing as appropriate), assessment, formal approval, back out or contingency plans, separation of development and production software and systems, separation of development and production teams and provisions for emergency changes. 5 0.00 Communications and Operations Management Business Disruption and System Failures Software defects Lack of release management processes. System and network operating release management processes and procedures are in place including analysis of new release functionality, testing and deployment schedules. 5 0.00 Communications and Operations Management Business Disruption and System Failures Software defects Acceptance criteria for new applications, systems and networks are not in place. Formal acceptance procedures and criteria (including security) for new applications, systems and networks are in place. 5 0.00 Communications and Operations Management Business Disruption and System Failures Software defects Design requirements for applications, systems and networks are not met. Implemented applications, systems and networks meet design requirements. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure Lack of instructions for incident response at processing facilities. Operating instructions for the management of processing facilities include incident response requirements such as escalation via a call tree, methods for handling errors, generating and handling special output and restarting and recovering systems. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 34 Communications and Operations Management Business Disruption and System Failures System software failure No formal change control process is in place. A formal change control process is in place detailing: testing (including regression and security testing as appropriate), assessment, formal approval, back out or contingency plans, separation of development and production software and systems, separation of development and production teams and provisions for emergency changes. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure System and network changes are not documented. All system and network operating changes are documented and incorporated back into system manuals. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure Lack of release management processes. System and network operating release management processes and procedures are in place including analysis of new release functionality, testing and deployment schedules. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure Lack of documented incident management procedures. Incident management procedures are in place and well documented including: actions to take in the event of information system failures or loss of service, denial of service attacks, errors resulting from incomplete or inaccurate business data, errors resulting from system or device misconfiguration, breaches or loss of confidentiality, recovery from specific incidents, gathering of evidence, documentation and recovery process. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure Incident response teams are unqualified. Incident response teams have appropriate qualifications and necessary training. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure Incident response teams are not accessible in the event of an incident. Incident response teams are accessible and available as needed. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure No ability to project future system capacity requirements. Projection and planning for future system capacity requirements is performed. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure New system requirements are not documented or tested prior to use. Operational requirements for new systems is established, documented and tested prior to the systems acceptance and use. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure Applications, systems and network architectures lack high availability. Application, system and network architectures are designed for high availability and operational redundancy. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure Acceptance criteria for new applications, systems and networks are not in place. Formal acceptance procedures and criteria (including security) for new applications, systems and networks are in place. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure Design requirements for applications, systems and networks are not met. Implemented applications, systems and networks meet design requirements. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 35 Communications and Operations Management Business Disruption and System Failures System software failure System and data backups aren't available for standard or disaster recovery purposes. Regular system and data backups are performed at appropriate intervals by specific or dedicated units. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure Backup or recovery processes aren't working and no one is aware of it. Testing of backup systems and timely restoration of data is performed at regular intervals. 5 0.00 Communications and Operations Management Business Disruption and System Failures System software failure Maintenance logs aren't available for problem management and forensics. Maintenance and upgrade logs are kept for hardware and/or software. 5 0.00 Communications and Operations Management Business Disruption and System Failures Telecommunications failure Lack of instructions for incident response at processing facilities. Operating instructions for the management of processing facilities include incident response requirements such as escalation via a call tree, methods for handling errors, generating and handling special output and restarting and recovering systems. 5 0.00 Communications and Operations Management Business Disruption and System Failures Telecommunications failure Backup or recovery processes aren't working and no one is aware of it. Testing of backup systems and timely restoration of data is performed at regular intervals. 5 0.00 Communications and Operations Management Business Disruption and System Failures Telecommunications failure Lack of network redundancy Network redundancy or diverse network routing is maintained. 5 0.00 Communications and Operations Management Damage to Physical Assets Terrorist attack Recovery assets are destroyed in the original disaster. Copies of system and data backups are taken and stored offsite at locations with an adequate distance from the production site and for an adequate period of time 5 0.00 Communications and Operations Management Damage to Physical Assets Tornados Recovery assets are destroyed in the original disaster. Copies of system and data backups are taken and stored offsite at locations with an adequate distance from the production site and for an adequate period of time 5 0.00 Communications and Operations Management Business Disruption and System Failures Trojans Security incidents and suspicious activities are not monitored. Security incidents are monitored including, security breaches, internal fraud, unauthorized/unacceptable employee activity and other suspicious activities. 5 0.00 Communications and Operations Management Business Disruption and System Failures Trojans Lack of a comprehensive virus protection policy. A virus protection policy including a virus protection process and response team is in place and communicated internally. 5 0.00 Communications and Operations Management Business Disruption and System Failures Trojans Anti-virus software is not used or is not effective. Antivirus software is deployed, updated and maintained. 5 0.00 Communications and Operations Management Business Disruption and System Failures Trojans Anti-virus software is able to be circumvented . Restrictions on end-user override capabilities are in place with antivirus software. 5 0.00 Communications and Operations Management Business Disruption and System Failures Trojans Remote and laptop users do not have virus protection. Virus protection applies to remote and laptop users. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 36 Communications and Operations Management Business Disruption and System Failures Trojans Code scanning is performed, inconsistently performed or not adequately performed. A code scanning policy is in place and includes the types of security issues to be scanned for (e.g., malicious code, worms, Trojan horses, back doors, form input validation, SQL injection). 5 0.00 Communications and Operations Management Business Disruption and System Failures Trojans Firewalls are not used or are used ineffectively. Firewalls are used appropriately within the overall network architecture. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access No formal change control process is in place. A formal change control process is in place detailing: testing (including regression and security testing as appropriate), assessment, formal approval, back out or contingency plans, separation of development and production software and systems, separation of development and production teams and provisions for emergency changes. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access No formal change control process is in place. A formal change control process is in place detailing: testing (including regression and security testing as appropriate), assessment, formal approval, back out or contingency plans, separation of development and production software and systems, separation of development and production teams and provisions for emergency changes. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access System and network changes are not documented. All system and network operating changes are documented and incorporated back into system manuals. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access System and network changes are not documented. All system and network operating changes are documented and incorporated back into system manuals. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Security incidents and suspicious activities are not monitored. Security incidents are monitored including security breaches, internal fraud, unauthorized/unacceptable employee activity and other suspicious activities. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access Security incidents and suspicious activities are not monitored. Security incidents are monitored including security breaches, internal fraud, unauthorized/unacceptable employee activity and other suspicious activities. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access Incident response teams are not accessible in the event of an incident. Incident response teams are accessible and available as needed. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Incident response teams are not accessible in the event of an incident. Incident response teams are accessible and available as needed. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access Logs are aren't available for audits, forensics or prosecution. Operator use logs are retained for an appropriate period of time. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 37 Communications and Operations Management External Fraud Unauthorized network or system access Logs are aren't available for audits, forensics or prosecution. Operator use logs are retained for an appropriate period of time. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Network management and security / control domains aren't in place. Network management security/control domains (perimeter, DMZ, etc.) and perimeters have been designed, applied and implemented on all networks. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access Network management and security / control domains aren't in place. Network management security/control domains (perimeter, DMZ, etc.) and perimeters have been designed, applied and implemented on all networks. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Non secure configuration of network devices. Network devices are securely configured according to their function within security/control zones (i.e., public/untrusted networks, semi-private networks, DMZs) and perimeters. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access Non-secure configuration of network devices. Network devices are securely configured according to their function within security/control zones (i.e., public/untrusted networks, semi-private networks, DMZs) and perimeters. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Remote access is uncontrolled and unmanaged. Remote access management utilities or tools are used for remote access to networks and servers (administrator as well as user dial-in/dial-out, maintenance dial-in) appropriate to each security/control domain. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access Remote access is uncontrolled and unmanaged. Remote access management utilities or tools are used for remote access to networks and servers (administrator as well as user dial-in/dial-out, maintenance dial-in) appropriate to each security/control domain. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access No network penetration testing is performed. Regular, periodic vulnerability and penetration testing is performed on all networks in accordance with the risk of each security/control domain and perimeter. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access No network penetration testing is performed. Regular, periodic vulnerability and penetration testing is performed on all networks in accordance with the risk of each security/control domain and perimeter 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Network activities are not monitored. Network activities are monitored (manually and/or using automated tools) through log reviews on a frequent, periodic basis. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 38 Communications and Operations Management Internal Fraud Unauthorized network or system access Network activities are not monitored. Network activities are monitored (manually and/or using automated tools) through log reviews on a frequent, periodic basis. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Logs are aren't available for audits, forensics or prosecution. Network activities are logged such as: access failures, logon patterns, allocation and use of privileged access accounts, selected transactions, sensitive resources, remote dial-up activity, firewall activity, failed operating system and application access attempts, security administration activity. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access Logs are aren't available for audits, forensics or prosecution. Network activities are logged such as: access failures, logon patterns, allocation and us of privileged access accounts, selected transactions, sensitive resources, remote dial-up activity, firewall activity, failed operating system and application access attempts, security administration activity. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Intrusion detection systems are not used or used ineffectively. Intrusion detection systems are used appropriately within the overall network architecture. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Tools to detect rogue network devices are not used. Tools are used to detect rogue network devices and services. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Loss or compromise of data related to audits, forensics or prosecution Network security related event logs are secured against unauthorized access, change and deletion for an adequate period of time. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access Loss or compromise of data related to audits, forensics or prosecution Network security related event logs are secured against unauthorized access, change and deletion for an adequate period of time 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Lack of strong authentication and authorization to e- commerce applications. Online registration, authentication and authorization are required before e-commerce information and data exchanges are made. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access Lack of strong authentication and authorization to e- commerce applications. Online registration, authentication and authorization are required before e-commerce information and data exchanges are made. 5 0.00 Communications and Operations Management External Fraud Unauthorized network or system access Access codes are able to be read in the clear while in storage or transmission. Access codes are encrypted in storage and transmission. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized network or system access Access codes are able to be read in the clear while in storage or transmission. Access codes are encrypted in storage and transmission. 5 0.00 Communications and Operations Management External Fraud Unauthorized scans Security incidents and suspicious activities are not monitored. Security incidents are monitored including security breaches, internal fraud, unauthorized/unacceptable employee activity and other suspicious activities. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 39 Communications and Operations Management Internal Fraud Unauthorized scans System monitoring does not have current signature files. The security event monitoring system has current signature files. 5 0.00 Communications and Operations Management External Fraud Unauthorized scans System and data backups are able to be accessed freely. On and off-site system and data backups are protected from unauthorized access and tampering. 5 0.00 Communications and Operations Management External Fraud Unauthorized scans Network management and security / control , domains aren't in place. Network management security/control domains (perimeter, DMZ, etc.) and perimeters have been designed, applied and implemented on all networks. 5 0.00 Communications and Operations Management External Fraud Unauthorized scans Non secure configuration of network devices. Network devices are securely configured according to their function within security/control zones (i.e., public/untrusted networks, semi-private networks, DMZs) and perimeters. 5 0.00 Communications and Operations Management External Fraud Unauthorized scans Remote access is uncontrolled and unmanaged. Remote access management utilities or tools are used for remote access to networks and servers (administrator as well as user dial-in/dial-out, maintenance dial-in) appropriate to each security/control domain. 5 0.00 Communications and Operations Management External Fraud Unauthorized scans Network activities are not monitored. Network activities are monitored (manually and/or using automated tools) through log reviews on a frequent, periodic basis. 5 0.00 Communications and Operations Management External Fraud Unauthorized scans Logs are aren't available for audits, forensics or prosecution. Network activities are logged such as: access failures, logon patterns, allocation and use of privileged access accounts, selected transactions, sensitive resources, remote dial-up activity, firewall activity, failed operating system and application access attempts, security administration activity. 5 0.00 Communications and Operations Management External Fraud Unauthorized scans Intrusion detection systems are not used or used ineffectively. Intrusion detection systems are used appropriately within the overall network architecture. 5 0.00 Communications and Operations Management External Fraud Unauthorized scans Tools to detect rogue network devices are not used. Tools are used to detect rogue network devices and services. 5 0.00 Communications and Operations Management Internal Fraud Unauthorized scans Loss or compromise of data related to audits, forensics or prosecution Network security related event logs are secured against unauthorized access, change and deletion for an adequate period of time. 5 0.00 Communications and Operations Management External Fraud Unauthorized scans Access codes are able to be read in the clear while in storage or transmission. Access codes are encrypted in storage and transmission. 5 0.00 Communications and Operations Management Business Disruption and System Failures Virus hoaxes Lack of procedures for handling external communications in the event of an incident. Procedures are in place to notify or handle inquiries from external stakeholders, customers or clients, news media, government offices, outside investigators, shareholders. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 40 Communications and Operations Management Business Disruption and System Failures Viruses Security incidents and suspicious activities are not monitored. Security incidents are monitored including, security breaches, internal fraud, unauthorized/unacceptable employee activity and other suspicious activities. 5 0.00 Communications and Operations Management Business Disruption and System Failures Viruses Lack of a comprehensive virus protection policy. A virus protection policy including a virus protection process and response team is in place and communicated internally. 5 0.00 Communications and Operations Management Business Disruption and System Failures Viruses Anti-virus software is not used or is not effective. Antivirus software is deployed, updated and maintained. 5 0.00 Communications and Operations Management Business Disruption and System Failures Viruses Anti-virus software is able to be circumvented . Restrictions on end-user override capabilities are in place with antivirus software. 5 0.00 Communications and Operations Management Business Disruption and System Failures Viruses Remote and laptop users do not have virus protection. Virus protection applies to remote and laptop users. 5 0.00 Communications and Operations Management Business Disruption and System Failures Viruses Backup or recovery processes aren't working and no one is aware of it. Testing of backup systems and timely restoration of data is performed at regular intervals. 5 0.00 Communications and Operations Management Business Disruption and System Failures Viruses Firewalls are not used or are used ineffectively. Firewalls are used appropriately within the overall network architecture. 5 0.00 Communications and Operations Management External Fraud War dialing Lack of strong authentication and authorization to e- commerce applications. Online registration, authentication and authorization are required before e-commerce information and data exchanges are made. 5 0.00 Communications and Operations Management Business Disruption and System Failures Worms Security incidents and suspicious activities are not monitored. Security incidents are monitored including security breaches, internal fraud, unauthorized/unacceptable employee activity and other suspicious activities. 5 0.00 Communications and Operations Management Business Disruption and System Failures Worms Lack of a comprehensive virus protection policy. A virus protection policy, including a virus protection process and response team, is in place and communicated internally. 5 0.00 Communications and Operations Management Business Disruption and System Failures Worms Anti-virus software is not used or is not effective. Antivirus software is deployed, updated and maintained. 5 0.00 Communications and Operations Management Business Disruption and System Failures Worms Anti-virus software is able to be circumvented . Restrictions on end-user override capabilities are in place with antivirus software. 5 0.00 Communications and Operations Management Business Disruption and System Failures Worms Remote and laptop users do not have virus protection. Virus protection applies to remote and laptop users. 5 0.00 Communications and Operations Management Business Disruption and System Failures Worms System and data backups aren't available for standard or disaster recovery purposes. Regular system and data backups are performed at appropriate intervals by specific or dedicated units. 5 0.00 Communications and Operations Management Business Disruption and System Failures Worms Backup or recovery processes aren't working and no one is aware of it. Testing of backup systems and timely restoration of data is performed at regular intervals. 5 0.00 Communications and Operations Management Business Disruption and System Failures Worms Firewalls are not used or are used ineffectively. Firewalls are used appropriately within the overall network architecture. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 41 Compliance Business Disruption and System Failures DDoS or DoS attacks Failure to review standard security configurations for networks, operating systems, applications, desktops and other system components. Standard security configurations for networks, operating systems, applications, desktops and other system components are implemented and regularly reviewed for compliance. Security configurations may include security patches, vulnerability management, default passwords, registry settings, version management and file directory rights and permissions. 5 0.00 Compliance Execution , Delivery and Process Management Human error Lack of clearly defined roles and responsibilities. Responsibility for legal and regulatory compliance has been clearly assigned. 5 0.00 Compliance Execution , Delivery and Process Management Human error Lack of procedures to avoid using material that would infringe on the copyright or intellectual property of others. Procedures have been implemented to avoid using material that would infringe on the copyright or intellectual property of others. 5 0.00 Compliance Execution , Delivery and Process Management Human error Lack of policy to protect the organization's intellectual property rights and ownership of information systems, source code that is developed (including escrowing issues with third parties) and business processes or concepts created. There is a policy in place to protect the organization's intellectual property rights and ownership of information systems, source code that is developed (including escrowing issues with third parties) and business processes or concepts created. 5 0.00 Compliance Execution , Delivery and Process Management Human error Failure to register software products with the proper authority to afford appropriate patent, trademark or copyright Software products developed internally or by others on behalf of the organization, are registered in a timely manner with the proper 5 0.00 Compliance Execution , Delivery and Process Human error Failure to register internet domain names with the proper authority. Internet domain names are registered with the proper authority. 5 0.00 Compliance Execution , Delivery and Process Management Human error Lack of procedures to protect against the use of information processing facilities for unauthorized purposes. Procedures are in place to protect against the use of information processing facilities for unauthorized purposes. 5 0.00 Compliance Execution , Delivery and Process Management Human error Lack of process to ensure interoperability, compliance with international law when transferring encrypted information or cryptographic controls to another country. When transferring encrypted information or cryptographic controls to another country, there is a process in place to ensure interoperability, compliance to international law and support. 5 0.00 Compliance Execution , Delivery and Process Management Human error Lack of procedures to aid in collecting adequate evidence in support of a legal action against a person (either internal or external) or organization such as information systems that are Procedures are in place to aid in collecting adequate evidence in support of a legal action against a person (either internal or external) or organization such as information systems that are 5 0.00 Compliance Execution , Delivery and Process Management Human error Lack of compliance of information systems with published standards or codes of practice for the production of admissible evidence in court. Information systems are compliant with published standards or codes of practice for the production of admissible evidence in court. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 42 Compliance Execution , Delivery and Process Management Human error Failure to review standard security configurations for networks, operating systems, applications, desktops and other system components. Standard security configurations for networks, operating systems, applications, desktops and other system components are implemented and regularly reviewed for compliance. Security configurations may include security patches, vulnerability management, default passwords, registry settings, version management and file directory rights and permissions. 5 0.00 Compliance Execution , Delivery and Process Management Human error Failure to conduct security policy compliance reviews that include a review of information systems, system providers, owners of information assets, users and management. Security policy compliance reviews are conducted and include a review of information systems, system providers, owners of information assets, users and management. 5 0.00 Compliance Execution , Delivery and Process Management Lawsuits/ litigation Lack of clearly defined roles and responsibilities. Responsibility for legal and regulatory compliance has been clearly assigned. 5 0.00 Compliance Clients, Products and Business Practices Lawsuits/ litigation Lack of clearly defined roles and responsibilities. Responsibility for legal and regulatory compliance has been clearly assigned. 5 0.00 Compliance Clients, Products and Business Practices Lawsuits/ litigation Lack of procedures to avoid using material that would infringe on the copyright or intellectual property of others. Procedures have been implemented to avoid using material that would infringe on the copyright or intellectual property of others. 5 0.00 Compliance Execution , Delivery and Process Management Lawsuits/ litigation Lack of procedures to avoid using material that would infringe on the copyright or intellectual property of others. Procedures have been implemented to avoid using material that would infringe on the copyright or intellectual property of others. 5 0.00 Compliance Execution , Delivery and Process Management Lawsuits/ litigation Legal and compliance obligations may effect the execution, delivery and processes to be provided. All third party relationships must identify all obligations from current, past and future litigation, lawsuits, breaches of contract, regulatory fines, and proceedings against the company, its officers and employees. 5 0.00 Compliance Execution , Delivery and Process Management Lawsuits/ litigation Lack of policy to protect the organization's intellectual property rights and ownership of information systems, source code that is developed (including escrowing issues with third parties) and business processes or concepts created. There is a policy in place to protect the organization's intellectual property rights and ownership of information systems, source code that is developed (including escrowing issues with third parties) and business processes or concepts created. 5 0.00 Compliance Execution , Delivery and Process Management Lawsuits/ litigation Failure to register software products with the proper authority to afford appropriate patent, trademark or copyright protection in a timely manner. Software products developed internally or by others on behalf of the organization are registered in a timely manner with the proper authority to afford appropriate patent, trademark or copyright protection. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 43 Compliance Execution , Delivery and Process Management Lawsuits/ litigation Failure to register internet domain names with the proper authority. Internet domain names are registered with the proper authority. 5 0.00 Compliance Execution , Delivery and Process Management Lawsuits/ litigation Lack of process to ensure interoperability, compliance with international law when transferring encrypted information or cryptographic controls to another country. When transferring encrypted information or cryptographic controls to another country, there is a process in place to ensure interoperability, compliance to international law and support. 5 0.00 Compliance Execution , Delivery and Process Management Lawsuits/ litigation Lack of procedures to aid in collecting adequate evidence in support of a legal action against a person (either internal or external) or organization such as information systems that are compliant with published standards or codes of practice and strong trail of documents and computer media. Procedures are in place to aid in collecting adequate evidence in support of a legal action against a person (either internal or external) or organization, such as information systems that are compliant with published standards or codes of practice and a strong trail of documents and computer media. 5 0.00 Compliance Execution , Delivery and Process Management Lawsuits/ litigation Lack of compliance of information systems with published standards or codes of practice for the production of admissible evidence in court. Information systems are compliant with published standards or codes of practice for the production of admissible evidence in court. 5 0.00 Compliance External Fraud Network spoofing Failure to review standard security configurations for networks, operating systems, applications, desktops and other system components. Standard security configurations for networks, operating systems, applications, desktops and other system components are implemented and regularly reviewed for compliance. Security configurations may include security patches, vulnerability management, default passwords, registry settings, version management and file directory rights and permissions. 5 0.00 Compliance Execution , Delivery and Process Management Sabotage Lack of procedures to protect against the use of information processing facilities for unauthorized purposes. Procedures are in place to protect against the use of information processing facilities for unauthorized purposes. 5 0.00 Compliance External Fraud Unauthorized network access Failure to review standard security configurations for networks, operating systems, applications, desktops and other system components. Standard security configurations for networks, operating systems, applications, desktops and other system components are implemented and regularly reviewed for compliance. Security configurations may include 5 0.00 Compliance External Fraud Unauthorized network access Failure to use security tools for vulnerability or penetration testing, monitoring, policy compliance, anti-virus, firewall, application gateways and guards. Security tools are used for vulnerability or penetration testing, monitoring, policy compliance, antivirus, firewall, application gateways and guards. 5 0.00 Compliance External Fraud Unauthorized network access Failure to correct deficiencies noted in third party audits/assessments. Deficiencies noted in third party audits/assessments are corrected. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 44 Compliance External Fraud Unauthorized network or system access Failure to perform annual third party audit/assessment to test controls and perform on-site validation. An annual third party audit/assessment is performed including testing of controls and on-site validation. 5 0.00 Compliance External Fraud Unauthorized scans Failure to use security tools for vulnerability or penetration testing, monitoring, policy compliance, anti-virus, firewall, application gateways and guards. Security tools are used for vulnerability or penetration testing, monitoring, policy compliance, antivirus, firewall, application gateways and guards. 5 0.00 Compliance Business Disruption and System Failures Viruses Failure to review standard security configurations for networks, operating systems, applications, desktops and other system components. Standard security configurations for networks, operating systems, applications, desktops and other system components are implemented and regularly reviewed for compliance. Security configurations may include security patches, vulnerability management, default passwords, registry settings, version management and file directory rights and permissions. 5 0.00 Compliance Business Disruption and System Failures Viruses Failure to use security tools for vulnerability or penetration testing, monitoring, policy compliance, anti-virus, firewall, application gateways and guards. Security tools are used for vulnerability or penetration testing, monitoring, policy compliance, antivirus, firewall, application gateways and guards. 5 0.00 Compliance Business Disruption and System Failures Viruses Failure to perform annual third party audit/assessment to test controls and perform on-site validation. An annual third party audit/assessment is performed including testing of controls and on-site validation. 5 0.00 Compliance Business Disruption and System Failures Viruses Failure to correct deficiencies noted in third party audits/assessments. Deficiencies noted in third party audits/assessments are corrected. 5 0.00 Compliance Business Disruption and System Failures Worms Failure to review standard security configurations for networks, operating systems, applications, desktops and other system components. Standard security configurations for networks, operating systems, applications, desktops and other system components are implemented and regularly reviewed for compliance. Security configurations may include security patches, vulnerability management, default passwords, registry settings, version management and file directory rights and permissions. 5 0.00 Compliance Business Disruption and System Failures Worms Failure to use security tools for vulnerability or penetration testing, monitoring, policy compliance, anti-virus, firewall, application gateways and guards. Security tools are used for vulnerability or penetration testing, monitoring, policy compliance, antivirus, firewall, application gateways and guards. 5 0.00 Compliance Business Disruption and System Failures Worms Failure to perform annual third party audit/assessment to test controls and perform on-site validation. An annual third party audit/assessment is performed including testing of controls and on-site validation. 5 0.00 Compliance Business Disruption and System Failures Worms Failure to correct deficiencies noted in third party audits/assessments. Deficiencies noted in third party audits/assessments are corrected. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 45 Organizational Security Business Disruption and System Failures Human error External actor exceeds level of authorized access to the system. External source implements change to the system with out going through proper change control. A written and comprehensive information security program that includes administrative and technical standards, procedures and policies is in place to protect information and information assets. 5 0.00 Organizational Security External Fraud Network/application backdoor External actor exceeds level of authorized access to the system. External source implements change to the system with out going through proper change control. Procedures and policies are in place to control and document third-party physical and logical access to information and information systems. 5 0.00 Organizational Security Business Disruption and System Failures Sabotage Weak security controls implemented at the third party, increasing the risk of compromise of information assets. All third party relationships and dependent service providers are identified -- including the services being performed and the clients affected by the services -- and appropriate due diligence for those service providers has been completed. 5 0.00 Organizational Security External Fraud Unauthorized network or system access External actor exceeds level of authorized access to the system. External source implements change to the system with out going through proper change control. Procedures and policies are in place to control and document third-party physical and logical access to information and information systems. 5 0.00 Organizational Security External Fraud Unauthorized network or system access Weak security controls implemented at the third party, increasing the risk of compromise of information assets. All third party relationships and dependent service providers are identified -- including the services being performed and the clients affected by the services -- and appropriate due diligence for those service providers has been completed. 5 0.00 Organizational Security Business Disruption and System Failures Malicious code External actor exceeds level of authorized access to the system. External source implements change to the system with out going through proper change control. Procedures and policies are in place to control and document third-party physical and logical access to information and information systems. 5 0.00 Personnel Security External Fraud Computer crime Incomplete, nonexistent, or insufficient background checks performed on employees and externals. Background checks are not done or a periodic basis. Perform pre-employment and periodic background checks for all administrators and employees and contractors with access to critical information assets. Background checks encompass criminal checks at local, state, national and international level, credit check, drug screening, and reference verification. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 46 Personnel Security Internal Fraud Computer crime Incomplete, nonexistent, or insufficient background checks performed on employees and externals. Background checks are not done or a periodic basis. Perform pre-employment and periodic background checks for all administrators and employees and contractors with access to critical information assets. Background checks encompass criminal checks at local, state, national and international level, credit check, drug screening, and reference verification. 5 0.00 Personnel Security Internal Fraud Computer crime There is a lack of disciplinary action taken for policy violation. A clearly defined and understood disciplinary process is in place for employees who violate the information security policy. 5 0.00 Personnel Security External Fraud Computer crime There is a lack of awareness on how to report a security incident. Procedures for reporting security incidents and malfunctions are clearly defined and include detailed actions, reporting hierarchy, escalation triggers relative to the type of incident and potential impact and special provisions related to the time of day or non-business hour scenario, if any. 5 0.00 Personnel Security Business Disruption and System Failures DDoS or DoS attacks Procedures for reporting incidents are not current or complete. Procedures for reporting security incidents and malfunctions are communicated to all employees. 5 0.00 Personnel Security External Fraud Discussing sensitive matters in open Confidential discussions take place in open unsecured areas. Employment provisions include nondisclosure or agreement of confidentiality and a clear statement of information security responsibilities. 5 0.00 Personnel Security Internal Fraud Discussing sensitive matters in open Confidential discussions take place in open unsecured areas. Employment provisions include nondisclosure or agreement of confidentiality and a clear statement of information security responsibilities. 5 0.00 Personnel Security Business Disruption and System Failures Human error Lack of trained security staff. Comprehensive information security training commensurate with the position and access role is provided to all new employees and contractors and is conducted on a recurring basis. 5 0.00 Personnel Security Execution , Delivery and Process Management Human error Employees and externals are not aware of security probes. How to protect, detect, and report. Information security awareness resources (website, brochure-ware, training modules, etc.) are made available to all employees and contractors. 5 0.00 Personnel Security Execution , Delivery and Process Management Human error Lack of formal Security certification oversight can lead to deteriorated knowledge. Not Current. Oversight of employees security certifications (e.g., CISA, CISSP, TISCA) requirements and maintenance is established 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 47 Personnel Security Execution , Delivery and Process Management Human error Incident reports procedures are not tested regularly. "People not prepared to report". Execution of the procedures for reporting security incidents is tested. 5 0.00 Personnel Security Execution , Delivery and Process Management Lawsuits/ litigation Lack of trained security staff. Comprehensive information security training commensurate with the position and access role, is provided to all new employees and contractors and is conducted on a recurring basis. 5 0.00 Personnel Security Clients, Products and Business Practices Lawsuits/ litigation Lack of internal and vendor intrusion detection, logging, and security controls. Information security incidents from internal operations and with third parties are tracked, analyzed and reported for appropriate regulatory requirements and process improvement. 5 0.00 Personnel Security Internal Fraud Social engineering Confidential discussions take place in open unsecured areas. Employment provisions include nondisclosure or agreement of confidentiality and a clear statement of information security responsibilities. 5 0.00 Personnel Security External Fraud Social engineering Confidential discussions take place in open unsecured areas. Employment provisions include nondisclosure or agreement of confidentiality and a clear statement of information security 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 48 Personnel Security External Fraud Social engineering Lack of trained security staff. Comprehensive information security training commensurate with the position and access role is provided to all new employees and 5 0.00 Personnel Security External Fraud Social engineering Employees and externals are not aware of security probes. How to protect, detect, and report. Information security awareness resources (website, brochure-ware, training modules, etc.) are made available to all employees and contractors. 5 0.00 Personnel Security External Fraud Social engineering Employees may be manipulated into giving out sensitive system information. All employees are specifically made aware of social engineering risks. 5 0.00 Personnel Security External Fraud Social engineering Procedures for reporting incidents are not current or complete. Procedures for reporting security incidents and malfunctions are communicated to all employees. 5 0.00 Personnel Security External Fraud Tailgating to gain unauthorized access Proximity badges are the only physical access control in place. "Proximity badges lost or stolen." Employee and contractor access to physical location and information assets is controlled by biometric devices (fingerprint, retinal scans, other). 5 0.00 Personnel Security Internal Fraud Tailgating to gain unauthorized access Proximity badges are the only physical access control in place. "Proximity badges lost or stolen." Employee and contractor access to physical location and information assets is controlled by biometric devices (fingerprint, retinal scans, other). 5 0.00 Personnel Security Internal Fraud Unauthorized network access Lack of internal and vendor intrusion detection, logging, and security controls. Information security incidents from internal operations and with third parties are tracked, analyzed and reported for appropriate regulatory requirements and process improvement. 5 0.00 Personnel Security External Fraud Unauthorized network access Lack of internal and vendor intrusion detection, logging, and security controls. Information security incidents from internal operations and with third parties are tracked, analyzed and reported for appropriate regulatory requirements and process improvement. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 49 Personnel Security External Fraud Unauthorized scans Employees and externals are not aware of security probes. How to protect, detect, and report. Information security awareness resources (website, brochure-ware, training modules, etc.) are made available to all employees and contractors. 5 0.00 Personnel Security External Fraud Unauthorized scans There is a lack of awareness on how to report a security incident. Procedures for reporting security incidents and malfunctions are clearly defined and include detailed actions, reporting hierarchy, escalation triggers relative to the type of incident and potential impact, and special provisions related to the time of day or non-business hour scenario, if any. 5 0.00 Personnel Security External Fraud Unauthorized scans Procedures for reporting incidents are not current or complete. Procedures for reporting security incidents and malfunctions are communicated to all employees. 5 0.00 Personnel Security Business Disruption and System Failures Virus hoaxes Employees and externals are not aware of security probes. How to protect, detect, and report. Information security awareness resources (website, brochure-ware, training modules, etc.) are made available to all employees and contractors. 5 0.00 Personnel Security External Fraud Virus hoaxes There is a lack of awareness on how to report a security incident. Procedures for reporting security incidents and malfunctions are clearly defined and include detailed actions, reporting hierarchy, escalation triggers relative to the type of incident and potential impact, and special provisions related to the time of day or non-business hour scenario if any. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 50 Physical and Environmental Security Business Disruption and System Failures CPU malfunction/failure Environmental protection not being tested regularly Environmental protection equipment (fire suppression, water flooding, heat/air conditioning, power supply, etc.) is installed, tested and monitored at appropriate intervals. 5 0.00 Physical and Environmental Security Damage to Physical Assets Fire Environmental protection not being tested regularly Environmental protection equipment (fire suppression, water flooding, heat/air conditioning, power supply, etc.) is installed, tested and monitored at appropriate intervals. 5 0.00 Physical and Environmental Security Damage to Physical Assets Floods Environmental protection not being tested regularly Environmental protection equipment (fire suppression, water flooding, heat/air conditioning, power supply, etc.) is installed, tested and monitored at appropriate intervals. 5 0.00 Physical and Environmental Security Damage to Physical Assets Gas leaks Lack of disaster recovery and surveying of physical location. Premises where business information processing occurs is assessed for environmental hazards (e.g., exposure to hazardous facilities, natural gas, petroleum or other pipelines) and the likelihood of natural disasters (e.g., flooding, tornadoes or earthquakes). 5 0.00 Physical and Environmental Security Business Disruption and System Failures Hardware failure Remote maintenance is not done securely and too many administrators. Maintenance of equipment can be performed remotely through secure and controlled access. 5 0.00 Physical and Environmental Security Damage to Physical Assets Hazardous waste exposure Lack of disaster recovery and surveying of physical location. Premises where business information processing occurs is assessed for environmental hazards (e.g., exposure to hazardous facilities, natural gas, petroleum or other pipelines) and the likelihood of natural disasters (e.g., flooding, tornadoes or earthquakes). 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 51 Physical and Environmental Security Business Disruption and System Failures HVAC failure Environmental protection not being tested regularly. Environmental protection equipment (fire suppression, water flooding, heat/air conditioning, power supply, etc.) is installed, tested and monitored at appropriate intervals. 5 0.00 Physical and Environmental Security External Fraud Leaving computer screen exposed or unlocked Visitors are not being escorted at all times. Visitors to the physical premise are escorted as necessary. 5 0.00 Physical and Environmental Security Internal Fraud Leaving computer screen exposed or unlocked Assets are not properly classified nor are control procedures. Users not following procedures. Procedures to secure information (e.g., locked cabinets, document control, and clear screen/screen timeout policies) are established based on asset classification. 5 0.00 Physical and Environmental Security External Fraud Leaving computer screen exposed or unlocked Assets are not properly classified nor are control procedures. Users not following procedures. Procedures to secure information (e.g., locked cabinets, document control, and clear screen/screen timeout policies) are established based on asset classification. 5 0.00 Physical and Environmental Security External Fraud Leaving doors unlocked There is a lack of physical operating security policies company wide or they are not followed and enforced. Policies for operational security within the work space (e.g., utilization of shredding equipment, secure storage, and "clean desk" principles) are defined. 5 0.00 Physical and Environmental Security External Fraud Leaving doors unlocked Lack of monitoring and control at non-employee entrances. "No guards, video, access control". Non-employee physical premise access is controlled and monitored. 5 0.00 Physical and Environmental Security Internal Fraud Leaving sensitive documents exposed There is a lack of physical operating security policies company wide or they are not followed and enforced. Policies for operational security within the work space (e.g., utilization of shredding equipment, secure storage, and "clean desk" principles) are defined. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 52 Physical and Environmental Security External Fraud Leaving sensitive documents exposed There is a lack of physical operating security policies company wide or they are not followed and enforced. Policies for operational security within the work space (e.g., utilization of shredding equipment, secure storage, and "clean desk" principles) are defined. 5 0.00 Physical and Environmental Security Internal Fraud Leaving sensitive documents exposed Assets are not properly classified nor are control procedures. Users not following procedures. Procedures to secure information (e.g., locked cabinets, document control, and clear screen/screen timeout policies) are established based on asset classification. 5 0.00 Physical and Environmental Security External Fraud Leaving sensitive documents exposed Assets are not properly classified nor are control procedures. Users not following procedures. Procedures to secure information (e.g., locked cabinets, document control, and clear screen/screen timeout policies) are established based on asset classification. 5 0.00 Physical and Environmental Security External Fraud Lost or stolen laptops There is a lack of physical operating security policies company wide or they are not followed and enforced. Policies for operational security within the work space (e.g., utilization of shredding equipment, secure storage, and "clean desk" principles) are defined. 5 0.00 Physical and Environmental Security Business Disruption and System Failures Power failure Environmental protection not being tested regularly Environmental protection equipment (fire suppression, water flooding, heat/air conditioning, power supply, etc.) is installed, tested and monitored at appropriate intervals. 5 0.00 Physical and Environmental Security Business Disruption and System Failures Power failure Lack of fail over power. Hot swaps or hot fail over capabilities are employed for critical power supply equipment. 5 0.00 Physical and Environmental Security Business Disruption and System Failures Power failure Exposed wiring in ceilings, closets, floor not secure. Safeguards are in place to prevent unauthorized interception or damage to network, power, telecommunications cabling or other on and off-site equipment necessary for business or backup activities, (e.g., continuous power supply equipment is installed and maintained for critical systems, phone/cable closets are secured, etc.). 5 0.00 Physical and Environmental Security Business Disruption and System Failures Power fluctuation Environmental protection not being tested regularly. Environmental protection equipment (fire suppression, water flooding, heat/air conditioning, power supply, etc.) is installed, tested and monitored at appropriate intervals. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 53 Physical and Environmental Security Business Disruption and System Failures Power fluctuation Lack of fail over power. Hot swaps or hot fail over capabilities are employed for critical power supply equipment. 5 0.00 Physical and Environmental Security External Fraud Robbery Lack of monitoring control at loading and delivery points. "Blind spots with no video camera." Loading and delivery area access to key data centers or buildings where information processing or storage is performed is controlled and monitored. 5 0.00 Physical and Environmental Security External Fraud Robbery Access is not promptly removed or not scrutinized before being granted. Physical premise access authority (sites, buildings, rooms, etc.) is defined and limited to authorized personnel only using appropriate controls and/or dual controls (badge, reception desk, guards, escorts, locks, biometrics, etc.). 5 0.00 Physical and Environmental Security External Fraud Robbery Cameras or motion detectors not in place or contain blind spots. Physical premise access is monitored using logs, cameras, motion detectors, etc. at appropriate intervals. 5 0.00 Physical and Environmental Security External Fraud Robbery Lack of monitoring and control at non-employee entrances. "No guards, video, access control." Non-employee physical premise access is controlled and monitored. 5 0.00 Physical and Environmental Security External Fraud Robbery Visitors are not being escorted at all times. Visitors to the physical premise are escorted as necessary. 5 0.00 Physical and Environmental Security External Fraud Robbery Physical security of data center is not routinely tested. Penetration tests are performed to verify data center physical security. 5 0.00 Physical and Environmental Security External Fraud Robbery Property is removed without being challenged. Procedures are in place to prevent the authorized removal of property. 5 0.00 Physical and Environmental Security Internal Fraud Robbery Property is removed without being challenged. Procedures are in place to prevent the authorized removal of property. 5 0.00 Physical and Environmental Security External Fraud Sabotage Lack of monitoring and control at non-employee entrances. "No guards, video, access control." Non-employee physical premise access is controlled and monitored. 5 0.00 Physical and Environmental Security External Fraud Sabotage Physical security of data center is not routinely tested. Penetration tests are performed to verify data center physical security. 5 0.00 Physical and Environmental Security Damage to Physical Assets Seismic activity Lack of disaster recovery and surveying of physical location. Premises where business information processing occurs is assessed for environmental hazards (e.g., exposure to hazardous facilities, natural gas, petroleum or other pipelines) and the likelihood of natural disasters (e.g., flooding, tornadoes or earthquakes). 5 0.00 Physical and Environmental Security Internal Fraud Shoulder surfing There is a lack of physical operating security policies company wide or they are not followed and enforced. Policies for operational security within the work space (e.g., utilization of shredding equipment, secure storage, and "clean desk" principles) are defined. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 54 Physical and Environmental Security External Fraud Shoulder surfing Visitors are not being escorted at all times. Visitors to the physical premise are escorted as necessary. 5 0.00 Physical and Environmental Security External Fraud Tailgating to gain unauthorized access Lack of monitoring control at loading and delivery points. "Blind spots with no video camera." Loading and delivery area access to key data centers or buildings where information processing or storage is performed is controlled and monitored. 5 0.00 Physical and Environmental Security External Fraud Tailgating to gain unauthorized access Cameras or motion detectors not in place or contain blind spots. Physical premise access is monitored using logs, cameras, or motion detectors, etc. at appropriate intervals. 5 0.00 Physical and Environmental Security External Fraud Tailgating to gain unauthorized access Visitors are not being escorted at all times. Visitors to the physical premise are escorted as necessary. 5 0.00 Physical and Environmental Security Business Disruption and System Failures Telecommunications failure Exposed wiring in ceilings, closets, floor not secure. Safeguards are in place to prevent unauthorized interception or damage to network, power, telecommunications cabling or other on and off-site equipment necessary for business or backup activities, (e.g., continuous power supply equipment is installed and maintained for critical systems, phone/cable closets are secured, etc.). 5 0.00 Physical and Environmental Security Damage to Physical Assets Terrorist attack Lack of monitoring control at loading and delivery points. "Blind spots with no video camera." Loading and delivery area access to key data centers or buildings where information processing or storage is performed is controlled and monitored. 5 0.00 Physical and Environmental Security Damage to Physical Assets Terrorist attack Access is not promptly removed or not scrutinized before being granted. Physical premise access authority (sites, buildings, rooms, etc.) is defined and limited to authorized personnel only using appropriate controls and/or dual controls (badge, reception desk, guards, escorts, locks, biometrics, etc.). 5 0.00 Physical and Environmental Security Damage to Physical Assets Terrorist attack Cameras or motion detectors not in place or contain blind spots. Physical premise access is monitored using logs, cameras, or motion detectors, etc. at appropriate intervals. 5 0.00 Physical and Environmental Security External Fraud Terrorist attack Physical security of data center is not routinely tested. Penetration tests are performed to verify data center physical security. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 55 Physical and Environmental Security Damage to Physical Assets Tornados Lack of disaster recovery and surveying of physical location. Premises where business information processing occurs is assessed for environmental hazards (e.g., exposure to hazardous facilities, natural gas, petroleum or other pipelines) and the likelihood of natural disasters (e.g., flooding, tornadoes or earthquakes). 5 0.00 Physical and Environmental Security External Fraud Unauthorized network or system access Lack of Tempest or other measures to protect against electronic interception. Emissions (wire in conduit, monitors, wireless broadcasts) are shielded to prevent compromise of network security. 5 0.00 Physical and Environmental Security External Fraud Unauthorized scans Lack of Tempest or other measures to protect against electronic interception. Emissions (wire in conduit, monitors, wireless broadcasts) are shielded to prevent compromise of network security. 5 0.00 Physical and Environmental Security Damage to Physical Assets Vandalism Lack of monitoring control at loading and delivery points. "Blind spots with no video camera." Loading and delivery area access to key data centers or buildings where information processing or storage is performed is controlled and monitored. 5 0.00 Physical and Environmental Security Damage to Physical Assets Vandalism Access is not promptly removed or not scrutinized before being granted. Physical premise access authority (sites, buildings, rooms, etc.) is defined and limited to authorized personnel only using appropriate controls and/or dual controls (badge, reception desk, guards, escorts, locks, biometrics, etc.). 5 0.00 Physical and Environmental Security Damage to Physical Assets Vandalism Cameras or motion detectors are not in place or contain blind spots. Physical premise access is monitored using logs, cameras, motion detectors, etc. at appropriate intervals. 5 0.00 Security Policy Business Disruption and System Failures Human error Insiders/employees are unaware of proper security practices. Proper controls are not applied or if applied not done consistently for protection of information assets. A written and comprehensive information security program that includes administrative and technical standards, procedures and policies is in place to protect information and information assets. 5 0.00 Security Policy External Fraud Leaving sensitive documents exposed Insiders/employees are unaware of proper security practices. Proper controls are not applied or if applied not done consistently for protection of information assets. A written and comprehensive information security program that includes administrative and technical standards, procedures and policies is in place to protect information and information assets. 5 0.00 Security Policy Internal Fraud Leaving sensitive documents exposed Insiders/employees are unaware of proper security practices. Proper controls are not applied or if applied not done consistently for protection of information assets. A written and comprehensive information security program that includes administrative and technical standards, procedures and policies is in place to protect information and information assets. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 56 Security Policy External Fraud Sabotage Insiders/employees are unaware of proper security practices. Proper controls are not applied or if applied not done consistently for protection of information assets. A written and comprehensive information security program that includes administrative and technical standards, procedures and policies is in place to protect information and information assets. 5 0.00 Security Policy External Fraud Social engineering Insiders/employees are unaware of proper security practices. Proper controls are not applied or if applied not done consistently for protection of information assets. A written and comprehensive information security program that includes administrative and technical standards, procedures and policies is in place to protect information and information assets. 5 0.00 Systems Development Business Disruption and System Failures Unauthorized network or system access Inappropriate or weak access control procedures result in authorized modifications, and/or data integrity issues. Application access control procedures are in place to protect source code, the binaries or actual database or data. 5 0.00 Systems Development Business Disruption and System Failures Application software failure Lack of tools that provide documentation of data alterations during the application production process. Tools are available in production application environment to produce an audit trail of all data alterations. 5 0.00 Systems Development Business Disruption and System Failures Application software failure Loss or modification of audit trails and/or activity logs can impede investigation into inappropriate application or human activities. Audit trails and activity logs are handled and stored in a secure manner. 5 0.00 Systems Development Internal Fraud Computer crime A lack of host-based IDS control eliminates the possibility of collecting evidence of malicious or suspicious application activity in real time and decreases the ability to monitor key system files for evidence of tampering. Host-based intrusion detection system is employed. 5 0.00 Systems Development External Fraud Computer crime A lack of host-based IDS control eliminates the possibility of collecting evidence of malicious or suspicious application activity in real time and decreases the ability to monitor key system files for evidence of tampering. Host-based intrusion detection system is employed. 5 0.00 Systems Development Business Disruption and System Failures DDoS or DoS attacks Software patches not tested and applied in a timely manner can allow application vulnerability and render it susceptible to attack. A process is in place to allow for the prompt testing and application of up-to-date security patches from vendors. 5 0.00 Systems Development Business Disruption and System Failures Human error Lack of a consistently applied methodology can result in security exposures, potential loss of data integrity, and performance issues. A formal application development process/methodology is in place. 5 0.00 Systems Development Business Disruption and System Failures Application software failure Lack of independent risk assessment of applications can result in the oversight of security holes built into the application. Applications are independently evaluated or certified. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 57 Systems Development Execution , Delivery and Process Management Lawsuit/litigation Lack of strong non-repudiation controls can result in the tampering of message from origin to recipient; integrity issues and loss of potential legal evidence of crime. Appropriate non-repudiation methods are used, (e.g., time stamping, voice recording, digital signatures). 5 0.00 Systems Development Execution , Delivery and Process Management Unauthorized network or system access Unauthorized access to files and libraries can result in modifications, or inappropriate access to files and libraries. Authorized access to critical system files and source code libraries is established, controlled and maintained. 5 0.00 Systems Development Execution , Delivery and Process Management Application software failure Lack of backup policy and procedures prevents recovery during a system problem. System libraries are backed up on a regular basis so that they are available to be recovered in the event of a system problem. 5 0.00 Systems Development Business Disruption and System Failures Application software failure Lack of change control policy and procedures can result in security exposures during changes or modifications. There is a documented change control process including a review of code changes by information security. 5 0.00 Systems Development Execution , Delivery and Process Management Human error Non-system segregation may result in data integrity issues. The development/test system is segregated from the operational system. 5 0.00 Systems Development Business Disruption and System Failures Human error Developers are not directed on the techniques to program applications in a secure fashion. A programmers development manual guides the creation of safe and secure code. Developers have been trained in programming techniques that provide for more secure applications. 5 0.00 Systems Development Execution , Delivery and Process Management Lawsuits/ litigation Lack of encryption policy can result in data exposure of sensitive or other types of information and can have regulatory or legal ramifications. An encryption policy is in place that includes an end-to-end transaction (e.g., origination, storage, network path, backups, recovery and legally mandated provisions). 5 0.00 Systems Development Business Disruption and System Failures Malicious code Lack of independently risk assessment of applications can result in the oversight of security holes built into the application. Applications are independently evaluated or certified. 5 0.00 Systems Development Business Disruption and System Failures Malicious code Lack of quality assurance procedures to test third party provided code. For application code that is provided by a third party, procedures are in place for ensuring that the code is free from malicious code. 5 0.00 Systems Development Business Disruption and System Failures Network/Application backdoors Lack of code review and assurance procedures . Application code has been reviewed for security flaws, backdoors and malicious code. 5 0.00 Systems Development Business Disruption and System Failures Malicious code Lack of change control policy and procedures can result in security exposures during changes or modifications. There is a documented change control process including a review of code changes by information security. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 58 Systems Development Business Disruption and System Failures Malicious code Developers are not directed on the techniques to program applications in a secure fashion. A programmers development manual guides the creation of safe and secure code. Developers have been trained in programming techniques that provide for more secure applications. 5 0.00 Systems Development External Fraud Network spoofing Failure to protect the confidentially and integrity of sensitive information. Internationally or nationally accepted cryptographic methods and key management techniques are employed. 5 0.00 Systems Development External Fraud Network spoofing Lack of encryption policy can result in data exposure of sensitive or other types of information that has a regulatory or legal ramification. There is an encryption policy in place that includes an end-to-end transaction (e.g., origination, storage, network path, backups, recovery and legally mandated provisions). 5 0.00 Systems Development Business Disruption and System Failures Network/application backdoor Lack of independent risk assessment of applications can result in the oversight of security holes built into the application. Applications are independently evaluated or certified. 5 0.00 Systems Development Business Disruption and System Failures Network/application backdoor Lack of quality assurance procedures to test third party provided code. For application code that is provided by a third party, procedures are in place for ensuring that the code is free from malicious code. 5 0.00 Systems Development Business Disruption and System Failures Network/application backdoor A lack of host-based IDS control eliminates the possibility of collecting evidence of malicious or suspicious application activity in real time and decreases the ability to monitor key system files for evidence of tampering. Host-based intrusion detection system is employed. 5 0.00 Systems Development Internal Fraud Network/application backdoor Inappropriate or weak access control procedures result in authorized modifications, and/or data integrity issues. Application access control procedures are in place to protect source code, the binaries, or actual database or data. 5 0.00 Systems Development External Fraud Network/application backdoor Lack of tools that provide documentation of data alterations during the application production process. Tools are available in the production application environment to produce an audit trail of all data alterations. 5 0.00 Systems Development Internal Fraud Network/application backdoor Lack of application performance stability and integrity of data. Application access control procedures are in place to protect source code, the binaries or actual database or data. 5 0.00 Systems Development Internal Fraud Network/application backdoor Lack of proper review of application code for security flaws. Application code has been reviewed for security flaws, backdoors and malicious code. 5 0.00 Systems Development Internal Fraud Network/application backdoor Lack of documentation of data alterations during the application development process. Development tools used in the production application environment produce an audit trail of all data alterations. 5 0.00 Systems Development Business Disruption and System Failures Network/application time bomb Lack of independent risk assessment of applications can result in the oversight of security holes built into the application. Applications are independently evaluated or certified. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 59 Systems Development Business Disruption and System Failures Network/application time bomb Lack of quality assurance procedures to test third party provided code. For application code that is provided by a third party, procedures are in place for ensuring that the code is free from malicious code. 5 0.00 Systems Development Business Disruption and System Failures Network/application time bomb A lack of host-based IDS control eliminates the possibility of collecting evidence of malicious or suspicious application activity in real time and decreases the ability to monitor key system files for evidence of tampering. Host-based intrusion detection system is employed. 5 0.00 Systems Development Business Disruption and System Failures Software defects Lack of tools that provide documentation of data alterations during the application production process. Tools are available in production application environment to produce an audit trail of all data alterations. 5 0.00 Systems Development Business Disruption and System Failures Software defects Developers are not directed on the techniques to program applications in a secure fashion. A programmers development manual guides the creation of safe and secure code. Developers have been trained in programming techniques that provide for more secure applications. 5 0.00 Systems Development Business Disruption and System Failures System software failure Lack of interoperability testing may result in security exposures, performance issues, loss of productivity, and loss of availability. Interoperability testing of new and existing applications is a feature of the change control policy. 5 0.00 Systems Development Business Disruption and System Failures System software failure Lack of tested compatibility between solutions can result in security exposures, performance issues, loss of productivity, and loss of availability . The use of digital certificates or other public key technology has been tested for interoperability between solutions. 5 0.00 Systems Development Business Disruption and System Failures System software failure Lack of accountability of actions for systems developers. Appropriate non-repudiation methods are used, (e.g., time stamping, voice recording, digital signatures). 5 0.00 Systems Development Business Disruption and System Failures System software failure Lack of accessibility to critical system file and system source libraries. Critical system files and system source libraries are documented and maintained under controlled access. 5 0.00 Systems Development Business Disruption and System Failures System software failure System files are not controlled. Access to system files is controlled and maintained. 5 0.00 Systems Development Business Disruption and System Failures System software failure System libraries are not available for recovery. System libraries are backed-up on a regular basis so that they are available to be recovered in the event of a system problem. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 60 Systems Development Business Disruption and System Failures System software failure Lack of change control policy and procedure that includes review and testing of all changes can result in security exposures, performance issues, loss of productivity, and loss of availability. All proposed system changes are reviewed and tested to ensure that the security of either the system or the operating environment is not compromised. 5 0.00 Systems Development Business Disruption and System Failures System software failure System tests do not accurately reflect the impacts and results of changes. The development/test system is segregated from the operational system. 5 0.00 Systems Development Business Disruption and System Failures Trojans Software patches not tested and applied in a timely manner can allow application vulnerability and render the application susceptible to attack. A process is in place to allow for the prompt testing and application of up-to-date security patches from vendors. 5 0.00 Systems Development External Fraud Leaving sensitive documents exposed Weak or unauthorized encryption algorithms can result in the exposure of sensitive or confidential information. The strength and integrity of proprietary encryption algorithms have been certified by an authorized evaluation agency. 5 0.00 Systems Development Internal Fraud Unauthorized network or system access Lack of risk assessment for encryption methodology can result in the exposure of sensitive or confidential information. A risk assessment methodology is employed to determine the level of encryption necessary for environment. 5 0.00 Systems Development External Fraud Unauthorized network or system access Lack of risk assessment for encryption methodology can result in the exposure of sensitive or confidential information. A risk assessment methodology is employed to determine the level of encryption necessary for environment. 5 0.00 Systems Development Internal Fraud Unauthorized network or system access Failure to protect sensitive information confidentiality. Internationally or nationally accepted cryptographic methods and key management techniques are employed. 5 0.00 Systems Development External Fraud Unauthorized network or system access Failure to protect sensitive information confidentiality. Internationally or nationally accepted cryptographic methods and key management techniques are employed. 5 0.00 Systems Development External Fraud Unauthorized network or system access Lack of a policy to ensure end- to-end data transaction protection. There is an encryption policy in place that includes an end-to-end transaction (e.g., origination, storage, network path, backups, recovery and legally mandated provisions). 5 0.00 Systems Development Internal Fraud Unauthorized network or system access Lack of a policy to ensure end- to-end data transaction protection. There is an encryption policy in place that includes an end-to-end transaction (e.g., origination, storage, network path, backups, recovery and legally mandated provisions). 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 61 Systems Development External Fraud Unauthorized network or system access Lack of customization in the strength of protection for system and user defined sensitive information. Algorithms and the strength of encryption used for securing authentication credentials (e.g., passwords and PINs) and other data during transmission/storage have been determined based on a risk assessment methodology. 5 0.00 Systems Development Internal Fraud Unauthorized network or system access Lack of customization in the strength of protection for system and user defined sensitive information. Algorithms and the strength of encryption used for securing authentication credentials (e.g., passwords and PINs) and other data during transmission/storage have been determined based on a 5 0.00 Systems Development Internal Fraud Unauthorized network or system access Weak or unauthorized encryption algorithms can result in the exposure of sensitive or confidential information. The strength and integrity of proprietary encryption algorithms have been certified by an authorized evaluation agency. 5 0.00 Systems Development External Fraud Unauthorized network or system access Weak or unauthorized encryption algorithms can result in the exposure of sensitive or confidential information. The strength and integrity of proprietary encryption algorithms have been certified by an authorized evaluation agency. 5 0.00 Systems Development Internal Fraud Unauthorized network or system access Lack of strong non-repudiation controls can result in the tampering of message from origin to recipient; integrity issues and loss of potential legal evidence of crime. Appropriate non-repudiation methods are used, (e.g., time stamping, voice recording, digital signatures). 5 0.00 Systems Development External Fraud Unauthorized network or system access Lack of strong non-repudiation controls can result in the tampering of message from origin to recipient; integrity issues and loss of potential legal evidence of crime. Appropriate non-repudiation methods are used, (e.g., time stamping, voice recording, digital signatures). 5 0.00 Systems Development Internal Fraud Unauthorized network or system access System files are not controlled. Access to system files is controlled and maintained. 5 0.00 Systems Development External Fraud Unauthorized network or system access System files are not controlled. Access to system files is controlled and maintained. 5 0.00 Systems Development External Fraud Unauthorized scans Failure to protect sensitive information confidentiality. Internationally or nationally accepted cryptographic methods and key management techniques are employed. 5 0.00 Systems Development External Fraud Unauthorized scans Lack of strong non-repudiation controls can result in the tampering of message from origin to recipient; integrity issues and loss of potential legal evidence of crime. There is an encryption policy in place that includes an end-to-end transaction (e.g., origination, storage, network path, backups, recovery and legally mandated provisions). 5 0.00 Systems Development Business Disruption and System Failures Viruses Applications are not developed with the appropriate security features and functions. Applications are independently evaluated or certified. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 62 Systems Development Business Disruption and System Failures Viruses Software patches not tested and applied in a timely manner can allow application vulnerability and render the application susceptible to attack. A process is in place to allow for the prompt testing and application of up-to-date security patches from vendors. 5 0.00 Systems Development External Fraud War dialing Lack of customization in the strength of protection for system and user defined sensitive information. Algorithms and the strength of encryption used for securing authentication credentials (e.g., passwords and PINs) and other data during transmission/storage have been determined based on a risk assessment methodology. 5 0.00 Systems Development Business Disruption and System Failures Worms Applications are not developed with the appropriate security features and functions. Applications are independently evaluated or certified. 5 0.00 Systems Development Business Disruption and System Failures Worms Software patches not tested and applied in a timely manner can allow application vulnerability and render the application susceptible to attack. A process is in place to allow for the prompt testing and application of up-to-date security patches from vendors. 5 0.00 9/29/2014 C BITS 2003. All rights reserved. 63 ISO Domain Access Control Asset Classification & Control Business Continuity Management Communications & Operations Management Compliance Organizational Security Personnel Security Physical and Environmental Security Security Policy Systems Development Basel I Category Internal Fraud External Fraud Employee Practices and Workplace Safety Clients, Products and Business Practices Damage to Physical Assets Business Disruption and System Failures Execution , Delivery and Process Management 0 1 2 3 4 5 0 5 6 7 8 9 10 1 4 4 6 7 8 9 2 3 3 3 6 7 8 3 2 2 2 2 6 7 4 1 1 1 1 1 6 5 0 0 0 0 0 0 Unknown 0 1 2 3 4 5 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Impact if Not Implemented Control Implement ed Airplane crash Application software failure Automobile crash Biological agent attack Bomb attacks Bomb threats Chemical spill Civil disorder Computer crime CPU malfunction/failure DDoS or DoS attacks Discussing sensitive matters in open DNS failure Dumpster diving Dust/sand Embezzlement Epidemic Extortion Fire Floods Gas leaks Hardware failure Hazardous waste exposure Heat High winds Human error Hurricane HVAC failure Lawsuits/ litigation Leaving computer screen exposed or unlocked Leaving doors unlocked Leaving sensitive documents exposed Lightning Lost or stolen laptops Malicious code Network spoofing Network/application backdoor Network/application time bomb Power failure Power fluctuation Radiation contamination Robbery Sabotage Seismic activity Shoulder surfing Snow/ice storms Social engineering Software defects Solar flares System software failure Tailgating to gain unauthorized access Terrorist attack Telecommunications failure Tidal Wave Tornados Trojans Typhoon Unauthorized network or system access Unauthorized scans Unintentional DDoS Unintentionally bad legislation Vandalism Virus hoaxes Viruses Volcanic eruption War War dialing Web defacements Work stoppage/ strike Worms