Pub. 3 2014 Issue 1

January 2014 29 l e a d i n g a d v o c a t e f o r t h e b a n k i n g i n d u s t r y i n k a n s a s B RING YOUR OWN DEVICE (BYOD) is a hot topic in businesses today. I think every security and technology conference I have attended over the past few months has had a session over BYOD. One of the recent ones I went to labeled their session “BYOD, Bring Your own Device or Disaster?” In the session, like many others, the presenter discussed some of the issues related to introducing personal devic- es into a business. I think the issue escalates even more within the financial sector as confidentiality and security are more important. By allowing employees to use their personal devices for bank-related ac- tivities (e.g. email, access to the network, bank applications, etc.), the bank must deal with security issues, which can conflict with employ - ees’ personal expectations. In many cases we tend to treat mobile devices, like iPhones and An- droids, differently than other bank systems, like laptops, workstations or servers. However, if we allow mobile devices to use bank resources or applications, then the device must be managed accordingly. Below are some considerations and questions to ask as you go through your risk management process of considering how personal mobile devices fit into your institution. Security Considerations Security of potential customer confidential information on the device or possible access to the bank network is of high concern. Below are some common security settings many institutions have chosen to implement: • Require a password to access the device • Set password expirations • Set the device to automatically wipe after a certain number of consecutive incorrect password attempts (e.g. 10 failed attempts) • Require a password after a specified period of inactivity (e.g. 5 minutes) • Require device encryption • Install anti-malware software on the device (particularly for Android devices – at the time of this article, there is not a good known anti-malware app for the iOS) Policy Considerations Additional control considerations may be included in either an ac- ceptable use agreement or a BYOD policy. Below are some common policy controls many institutions have chosen to implement: • Prohibit modifying the device in such a way as to circumvent security controls (e.g. “jailbreaking,” “rooting,” etc.) • Install security patches as they become available or are approved • Reserve the right and ability to wipe the device as necessary (e.g. if lost, stolen, employment is terminated, malware is suspected, etc.) • Disclaim any liability for loss of personal information on the mobile device Other Considerations Other questions and concerns you will probably want to consider during your risk assessment and policy creation phase include, but are not limited to: • What kinds of mobile devices will be supported? • Who will be allowed to use their device for company data? • Who will support personally owned mobile devices? Will your internal IT department support them? • What kind of Mobile Device Management (MDM) solution will you use? • Will you limit use of applications, browsing, camera, etc. on the device? • Will you have a policy regarding access or use of a device by non-company individuals? (i.e. letting a family member or friend borrow the device) • Should you audit the devices and if so, how? • What is your plan for decommissioning a device? • What should happen if a user violates a policy or circumvents security controls? As with defining other new processes, agreements or policies, it is wise to include multiple areas, such as HR, IT, Legal, Compliance and Operations, in the risk assessment and policy creation phase. Also, ensure your legal counsel reviews and approves the final user agree - ments or bank policies regarding mobile devices. Russ Horn is the president for CoNetrix. CoNetrix is a provider of information security consulting, IT/GLBA audits and security testing, Aspire cloud hosting, and the developer of tandem, a security and compliance software suite designed to help financial institutions create and maintain their Information Security Program. Visit CoNetrix at www.conetrix.com . USING TABLETS IN THE CLOUD By Nathan Dahlstromof CoNetrix BRING YOUR OWN DEVICE PERSONAL OR BUSINESS? By Russ Horn, CISA, CISSP, CRISC

RkJQdWJsaXNoZXIy OTM0Njg2