Risk Assessment for Regional BankTM

Performed by: Jeremy Rodriguez

Introduction

This report documents the Security Risk Assessment of a data center facility owned by Regional Bank. This data center supports the Online Banking System used by Regional Bank. As such it is critical to day to day operations.  

Data Center Facilities

        The data center facility being assessed in this report belongs to Regional Bank. Regional Bank’s organization is relatively new and consequently, relatively small. In order to provide a modern banking solution the organization has invested in a data center to support their Online Banking system. This new data center is relatively small and is briefly described here:.

Schematic


Risk Assessment

A. Identify:

Asset

Criticality

Vulnerability

CVE Site ID

Servers

High

Azure Arc-Enabled Servers Escalation of Privilege Vulnerability

CVE-2023-38176

Generator

High

No access control methods

UPS

Medium

No access control methods

Workstations

Medium

make-ca is a utility and prior to version 1.10, make-ca misinterprets Mozilla certdata.txt and treats explicitly untrusted certificates like trusted ones

CVE-2022-21672

Cameras

Low

Vulnerable to both power and network outages

B. Protect:           

2 ways to protect the physical assets.

2 ways to protect the cyber assets.

2 topics for an employee security training program for users with privileged access

C. Detect:

  1. How would you know if someone or something was attempting to access, disable, degrade, or destroy one or more of the devices and/or systems in the facility?

The current security methods include security cameras, and pin pad locks on select doors. Unique passcodes are given to each employee who requires access. These cameras are consistently monitored by two security guards during operations. The NOC would also be aware if any device were to go down.

  1. Which types of systems are implemented to identify occurrences of physical security breaches?

A generic physical security system is in place and the front entrance is locked overnight. An adjacent alarm is connected to the front door. All exterior windows are equipped with sensors that can detect if the glass is shattered.

  1. Which types of systems are implemented to identify occurrences of cyber security breaches?

A software Intrusion Detection System is in place running the default configurations.In addition a physical firewall device is placed between the inner network and ISP connection. The NOC is also always actively monitoring the network.


D. Respond:

  1. How would you  respond to the anomalies and events through the systems you would implement?

With the upgraded access control methods detection will be easier and faster. The security guard team will have more precise information on anomalies and can go in more prepared. The same goes for the NOC as the upgraded IDS will make the anomalies easier to find and respond to. During an event, upper management will be informed so that they can report the anomaly and secure further cybersecurity assistance if needed.

  1. Which type of response plan is necessary when  physical security is breached at the facility?

For a physical breach the response plan needs to involve law enforcement as soon as possible. Depending on the severity of the incident the security guards may be mobilized immediately or not at all. Upper management will also be informed so that information can be gathered for stakeholders and they can be briefed on the situation

  1. Which type of response plan is necessary when cyber security is breached at the facility?

For this type of breach the entirety of the NOC needs to be active in finding and responding to the breach. As soon as the breach is detected upper management needs to be notified so that more cybersecurity resources can be obtained if necessary. Upper management will also be informed so that information can be gathered for stakeholders and they can be briefed on the situation.


E. Recover:

  1. Which steps are in place to recover from actions intended to access, disable, degrade, or destroy the assets ?

During the recovery phase the anomalous activity has been quarantined or dealt with. The next steps are intended to assure critical business functions remain accessible. Repudiation methods may be used to recover any lost data. Any physical assets that have been damaged are assessed and repaired/replaced depending upon severity. All bypassed security methods are also assessed for effectiveness and strengthened or repaired if necessary. HR and PR departments managing public relations are informed and/or mobilized to prepare public statements if necessary. Security policies are also investigated and adjusted to prevent a similar breach going forward.

  1. Which type of recovery plan is needed for physical security breaches that occur at one of the critical areas in the facility?

The recovery plan for physical breaches needs to assess any bypassed access control methods for effectiveness. If they are found to be destroyed, or simply not effective enough, these methods should be upgraded or replaced.

  1. Which type of recovery plan is needed for cyber security breaches that occur at one of the critical areas in the facility?

Similar to physical recovery, access control methods need to be assessed. IDS systems need to be investigated including any firewall devices and the IDS software. Any faulty devices or software need to be investigated and/or reconfigured. Known vulnerabilities need to be addressed and if unknown need to be found. If data has been lost, backups need to be used to restore access to necessary resources immediately.


Conclusion

        

        The overall security posture of the Regional Bank’s Online Banking Datacenter is mostly adequate but can be improved. Most importantly the policies in place address communication in a way that will make the recovery and response stages easier to achieve. The organization follows a security policy lifecycle for continuous improvement, and maintains the functionality of the Online Banking System. There is also a recovery and response plan in place in case of a disaster or breach.

References

  1. NIST. (2021, March 5). Asset management - CSF tools. CSF Tools - The Cybersecurity Framework for Humans. https://csf.tools/reference/nist-cybersecurity-framework/v1-1/id/id-am/
  2. Johnson, R. (2022). Security policies and implementation issues (3rd.). Burlington, MA: Jones & Bartlett Publishers.
  3. NIST. (2022). CVE-2022-21672. CVE. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21672
  4. NIST. (2023). CVE-2023-38176. CVE. https://www.cve.org/CVERecord?id=CVE-2023-38176