IS-Checklist v2.1
IS-Checklist v2.1
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.1O
1.11
1.12
1.13
1.14
1.15
1.16
1.17
1.18
1.19
1.2O
1.21
1.22
2.1
2.2
2.3
2.4
2.5
2.6
3.1
3.2
3.3
3.4
4.1
4.2
5
5.1
6.1
6.2
6.3
6.4
7.1
7.2
7.3
7.4
7.5
7.6
Security Requirement
Is thorough input validation performed by application (both client and server side validations)
Are anti-XSS filters and regex used to mitigate Cross Site scripting (XSS) attacks?
Are all relevant application session controls enforced (session timeout, cookie security controls)?
What controls are implemented to prevent privilege escalation, CSRF and functionality abuse attacks?
What kind of file upload security checks are implemented for application? Example- extension validation, mime
type validation, magic number checks etc.
What kind of encryption algorithms/ hash functions are used across the application? (E.g..- SHA256 etc.)
What all types of business logic validation security validations are applied across the application?
What are the input validation checks across file and directory traversal attacks
What are the transport layer security and SSL features implemented (E.g.- TLS 1.3)
Are thorough input validations present to prevent injection attacks like command injection, server side template
injection etc.? If yes, how?
What all third party libraries are used for the application? Are those with latest version and no vulnerabilities as of
date?
What internal security tools are used for secure coding? SAST/DAST ex. Burp, Sonarqube/ Checkmarx, please
explain details of threshold for code compliance
What kind of anti-phishing controls are applied? (Example- sign in image, virtual keyboard etc.)
What kind of security controls are applied to login functions (IP based checks, account lockout) etc.
What evidences are available to support security by design approach including secure software development,
quality management and information security management processes.
What valid security certification in the relevant area or something equivalent (e.g. development, production), such
as ISO27001 or corresponding) is existing with the software vendor?
Integrity Checks
What kind of integrity checks are applied across application and database to check for unauthorized changes and
modifications?
If critical vulnerabilities (according to their CVE rating) get known, what process is ensured to resolve them in timely
manner and own expense?
What is the protocol of informing of the product is affected by the weakness and the actionable fix implemented?
Timely provisioning of security patches or other appropriate risk mitigation measures, When new vulnerabilities get
known. As a first remediation step the provider should at least respond with a remediation plan at the latest within
seven (7) working days. The plan shall indicate the timeframe for resolving the vulnerability.
Please mention all applicable countries’ laws that apply to Ajman bank using the product and services.
Project manager shall ensure that all Personnel with access to Ajman Bank Information sign the Non-Disclosure
Agreement (NDA).
The provider shall inform Ajman Bank about other laws that must be obeyed concerning data collection or
forwarding.
The provider and Ajman Bank shall agree on the use of the Traffic Light Protocol (TLP) when sharing security
relevant information between operator, provider, supplier(s), other operators, end users and the general public.
No
N.A
Sl.No User Management Application Requirements/Checklist
1 Application Base requirements
1.1 Cross -Browser & cross platform device support .
1.2 SMS/Email Communication integartion with auto email support.
1.3 Self Password /Activation Feature support.
1.4 Multifactor Authentication Support (Email/SMS/Key/Token)
2 User Management Module
2.1 Role based user access managemement.
2.2 4 -eye principle on user management module .
2.3 User Management basic fuctionalities Supported (Add/Modify/Delete/Disable/Enable).
2.4 Input validation and base testing are performed on basic fiunctions.
2.5 Change Logs and Audit are available.
3 Group Management Module
3.1 Role Based Group Assignment
3.2 4 - eye principal applied on Group -Assignment module
3.3 Group Management basic functionalities are supported and basic check Performed
3.4 Group Permission Details are readable
3.5 Change Logs and Audit are available.
4 Reports Module
User List Reports :
a) Basic Field Requirement -( ID,Name,Email,User status(Active/Disable),Role assigned,Branch
4.1
Assigned,Last Login Date,Created by ,Modified by,Approved by) and other necessary fileds are
included
6.2 Auto user session termination is applied after inactivity .(20 Minutes of session inactivity).
6.3 Session Termination on all other devices on successful login from a client device.
6.4 Auto User disablement after X days of user inactivity - (Days to be set by admin users)
Password Management policy Non AD Users - Bank password policy to be applied on non -ad
6.5
users
6.7 Password Management policy AD users - Bank password policy to be applied on Non -AD users
6.8 Last successful & Unsuccessful Logon info on user dashbord
7 Documentation
User Management Guides (Including definition of all the business/User input fileds
7.1 usage ,functionalities and workflow). -
7.2 Security Access Matrix - ( Onboarding Groups and group permission assigned to each groups)
Implement authentication
controls including two form and
two factor authentication with
user name and a secure one-
time token codes for access to
the management console, SFTP
service with username and
public/private key based
authentication with IP address
Access and Technical
Authentication Requirement filtering, where possible,
enforcement of strong
passwords (e.g. 60 days
password expiry, 8 character
minimum length and password
complexity requirements,
positive identification of users
prior to authorisation and
management of authorised user
listings.
Governance and
Data Security
Management
A continual cycle of monitoring,
review and assessment is
required to ensure that the
cloud service is running in the
manner expected and as the
contractual agreement
Governance and stipulates. The cloud customer
Data Security may need to take appropriate
Management
steps to inform the end users of
the cloud service about the
processing arrangements that
the controller has put in place.
As a matter of good practice,
cloud customers should be as
open as possible about this.
Establish a governance
framework for ongoing
oversight of the Cloud solution,
providers and overall risk
profile. Procedures for
Governance and Governance and
measuring and monitoring and
oversight Management
reporting of performance and
issues should be established
along with procedures for
managing and resolving
disputes.
Establish a program for ensuring
that sufficient skills and
resources are available to
Governance and Governance and
oversee and manage the
oversight Management
outsourced Cloud activities and
perform ongoing risks
management activities.
Patching Questions
>
Establish appropriate
arrangements for ensuring
operational continuity and
ongoing compliance with
regulatory obligations in the
event of unforeseen
Technical interruptions to the outsourced
Service Resilience
Requirement Cloud based services. The
contract with the service
provider should provide for the
timely notification of breaches
or events at the Cloud provider
and the appropriate
remediation thereof.
In assessing continuity, for each
Cloud deployment and in
aggregate, the Bank should
consider the likelihood and
impact of unexpected outages
to the continuity of its Banking
Technical
Service Resilience operations, document a
Requirement
strategy for maintaining
continuity and regularly test
and update these arrangements
as required and ensure that
regulators have access to the
firm's data.