0% found this document useful (0 votes)
4 views16 pages

Project ABC - Required Security Artifacts

The document outlines security requirements and necessary artifacts for various systems including S3, EC2, RDS, and SFTP servers, emphasizing the implementation of security controls, access management, and data encryption. It specifies the need for compliance with PCI-DSS standards, logging requirements, and the use of MFA for management access. Additionally, it includes a checklist for required artifacts and their status, ensuring that security measures are in place before going live.

Uploaded by

Renz Ramos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views16 pages

Project ABC - Required Security Artifacts

The document outlines security requirements and necessary artifacts for various systems including S3, EC2, RDS, and SFTP servers, emphasizing the implementation of security controls, access management, and data encryption. It specifies the need for compliance with PCI-DSS standards, logging requirements, and the use of MFA for management access. Additionally, it includes a checklist for required artifacts and their status, ensuring that security measures are in place before going live.

Uploaded by

Renz Ramos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Required Artifacts

Security Requirements Status Responsible


Security Artifacts
Need Data Clean Room for testing and Migration?
API's VAPT Result - (No medium Findings and above)

Security Attestation/Report - both for Application and


Platform (for SaaS)
Access Integrated with Bank's AD
User and Admin Access to Systems
System Local/Native Access - Break Glass
System Access via VPN (Admin and user access)
Approved User Access Matrix
Secure System Integration
Reviewed Firewall Policies
Private Link Artifacts
Site-to-Site VPN Artifacts
Data Security and Protection
Data in transit encryption
Data at rest encryption
PCI-DSS Requirements - Data Masking
Logging Requirements (Access log etc.)

Access Logs
Application Logs
Audit Logs
SIEM Integration
All resources provisioned are installed with the
standard golden images and required security tools
(i.e. EC2, S3, RDS, etc)
Security Incident Management Procedure
Requirements Before Go-live? Remarks

Yes If yes, need separate DCR vetting


Yes

Yes
Yes

Yes
Yes
Yes

Yes

Yes

Yes Please see the worksheets for the


requirements for different resources

Yes
SECURITY REQUIREMENT

S3 should be managed from Unionbank’s network and AWS control tower, not exposed to the Internet

Implement least privilege access. Access Management will be based on our IAM and Bucket Policy
standard
Ensure proper permissions reflected in policy, without wildcard (*)
User/Service accounts or IAM user/roles used by Partner can only access specific directory/ folder
assigned to them.
User/Service accounts IAM user/roles used used by specific UBP user/admin can only access specific
directory assigned to them

Service accounts used by any non-human S3 account can only access specific directory assigned to them

Only allow/enable specific actions to specific user/account to specific resources/folder


Implement access control list (ACL) to each bucket and each object
Management Access to S3 bucket should be protected by MFA

Data and files in S3 should be encrypted at-rest and in-transit

If handling cardholder information The 16-digit credit or debit card number should not be readable
anywhere. Ensure PCIDSS compliant
AES256 for data transmission and storage
SHA512 for hashing

S3 shall allow only encrypted connections over HTTPS (TLS 1.2 or higher) using the aws:SecureTransport condition on Amazon S3 bucket policies. Disable l

Implement encryption using Banks AWS KMS; Partner account will only be allowed to point to the banks
AWS KMS and decrypt
Ensure access keys used by systems renews regularly, 90 days.
Logging and alert via Cloud Trail and CloudWatch are enabled
Implement IP address whitelisting between:
UB AWS S3 and destination1
REQUIRED ARTIFACTS

screenshots users with management privileges on the S3 or AWS account

Screenshots of users, roles, permissions and policies


Screenshots permissions and policies

Screenshots permissions and policies

Screenshots permissions and policies

Screenshots permissions and policies


Screenshots permissions and policies
Screenshots permissions/ACL and policies
screenshot of user settings with MFA enabled
Screenshots settings of bucket-level encryption (data at rest) and encrypted protocol used e.g. TLS 1.2 (in
transit)

Screenshot of encryption settings pointing/referring to Bank KMS


Screenshot of encryption settings pointing/referring to Bank KMS
screenshots of logs forwarded to S3 bucket for Centralized logging

screenshot of IP/URL filtering and whitelisting both for S3 and firewall


STATUS OF ARTIFACTS
(COMPLETED/NOT COMPLETED)
QUESTIONS
SECURITY REQUIREMENT

EC2 (UAT & PROD)


A. File Server Hardening
a. Ensure security controls must be in place
1. Use golden image and hardened OS
2. Install Crowd Strike, Splunk, McAfee DLP
3. Logging must be configured to push logs to SIEM (Splunk) for
auditing
4. Authentication – use keypair authentication
5. Ensure connectivity to Patch Management System

6. Server has no pending vulnerabilities

B. Secured Connection

C. IP and service whitelisting – nominate static IPs for whitelisting

D. Data and File Encryption – files/ data with PII will be encrypted
from source and decrypted on target
a. If handling cardholder information The 16-digit credit or debit card
number should not be readable anywhere , ENSURE PCI DSS
COMPLIANCE
A. AES256 for data transmission and storage
B. SHA512 for hashing
E. Full audit logging/visibility of the file transfers
F. Access Management

1. user and/ or service accounts used by Exus Servers-- it should


only access specific directory/ folder assigned to them.

2. service accounts used by other systems i.e. TSYS, Finacle

3. management account for infrastructure/servers must be coming


from UB network. Management of infra/servers should not be
available from anyone in the public internet

4. Management access should be protected by MFA

G. Logging – install splunk agent on server or forward syslog on splunk


log collector. There will also be logging on application/ file-level by RPA.

H. Server backup
STATUS OF ARTIFACTS
REQUIRED ARTIFACTS
(COMPLETED/NOT COMPLETED)

Screenshot of installed image


Screenshot of Crowdstrike, Splunk and DLP

Screenshot of syslog config or splunk agent


Screenshot

VA scan reports
Proof of remediation of vulnerabilities
screenshot of allowed policies via HTTPS
Screenshot of allowed policies in Firewall and Network
Security groups

walkthrough on how the files were encrypted/redacted


screenshot of encryption setting
screenshot of encryption setting
screenshots of logs

screenshot of directory access list/config

screenshot of directory access list/config

demo/walkthrough
screenshot of admin access SAML config

screenshot of installed splunk agent or syslog config


screenshots of backup config
QUESTIONS
RDS Security Artifacts
SECURITY REQUIREMENT

RDS should be managed from Unionbank’s network, not exposed to the Internet.

Access Management will be based on our IAM and DB policy standard


Ensure proper permissions reflected in policy, without wildcard (*)
Management Access to RDS should be protected by MFA
Service accounts used by UB/CITI/Vendor can only access specific directory/ folder assigned to
them.

Service accounts used by any RDS can only access specific directory assigned to them
DB/RDS Account Inventory
actively manage the life cycle of accounts - creation, use, dormancy, deletion - in order to
minimize opportunities for attackers to leverage them.
Identify admin and users via user access matrix. Include role-based access, access to be approved
by the product owner
Management access for RDS must be coming from UB network. Management of infra/servers
should not be available from anyone in the public internet

Secured Connection – allow only encrypted connections over HTTPS (TLS 1.2 or higher) with DB
instances
Encryption
Use/enable Amazon RDS encryption to secure your DB instances and snapshots at rest
Use network encryption and transparent data encryption with Oracle DB instances

Ensure access keys used by systems (e.g. EC2, RDS) utilizing DBs renews regularly

Implement IP and service address whitelisting:


Use security groups/firewall to control IP addresses or Amazon EC2 instances can connect to
databases on a DB instance.
Data and Files in RDS should be encrypted-enabled at-rest and in-transit
If handling cardholder information The 16-digit credit or debit card number should not be
readable anywhere. Ensure PCIDSS compliant
AES256 for data transmission and storage
SHA512 for hashing
Logging and alert via Cloud Trail and CloudWatch are enabled
Ensure RDS back-up is implemented
REQUIRED ARTIFACTS

screenshots users with management privileges on the RDS

Screenshots of users, roles, permissions and policies


Screenshots of policies/permissions of RDS
screenshot of user settings with MFA enabled

Screenshots of RDS users, roles, permissions and policies

Screenshots of RDS users, roles, permissions and policies

Screenshot of IAM settings per user

Copy of UAM
screenshots users with management privileges on the RDS should be integrated to
AD

Screenshot settings of secure connection

Screenshot of encryption settings


Screenshot of encryption settings
Screenshot of encryption settings pointing/referring to Bank KMS or secrets
manager

Copy of Network Security Groups and firewall policies


Screenshot of encryption settings

Screenshot of encryption settings


Screenshot of encryption settings
Screenshot of encryption settings
Screenshots of cloudtrail and cloudwatch settings
Screenshot of back-up settings
STATUS OF ARTIFACTS
(COMPLETED/NOT COMPLETED)
REMARKS
SECURITY REQUIREMENT

SFTP Server (UAT & PROD)


A. File Server Hardening
a. Ensure security controls must be in place
1. Use golden image and hardened OS
2. Install Crowd Strike, Splunk, McAfee DLP
3. Logging must be configured to push logs to SIEM (Splunk) for
auditing
4. Authentication – use keypair authentication
5. Ensure connectivity to Patch Management System

6. Server has no pending vulnerabilities

B. Secured Connection – file transfer will only use secure protocol,


HTTPS or SFTP

C. IP and service whitelisting – nominate static IPs for whitelisting

D. Data and File Encryption – files/ data with PII will be encrypted
from source and decrypted on target
a. If handling cardholder information The 16-digit credit or debit card
number should not be readable anywhere , ENSURE PCI DSS
COMPLIANCE
A. AES256 for data transmission and storage
B. SHA512 for hashing
E. Full audit logging/visibility of the file transfers
F. Access Management

1. user and/ or service accounts used by eXUS -- it should only


access specific directory/ folder assigned to them.

2. user and/ or service accounts used by UBP RPA can only access
specific directory assigned to them

3. service accounts used by other systems i.e. TSYS, Finacle

6. management account for infrastructure/servers must be coming


from UB network. Management of infra/servers should not be
available from anyone in the public internet

7. Management access should be protected by MFA


G. File Server Account Inventory
1. actively manage the life cycle of accounts - creation, use,
dormancy, deletion - in order to minimize opportunities for attackers
to leverage them.

2. Identify admin and users via user access matrix. Include role-
based access, access to be approved by the product owner

H. File Archive/ Purging – as indicated in the solution, the File Server


will only store files for a specific time (to also save hardware/ storage
space).

I. Logging – install splunk agent on server or forward syslog on splunk


log collector. There will also be logging on application/ file-level by RPA.

J. SFTP Server backup


STATUS OF ARTIFACTS
REQUIRED ARTIFACTS
(COMPLETED/NOT COMPLETED)

Screenshot of installed image


Screenshot of Crowdstrike, Splunk and DLP

Screenshot of syslog config or splunk agent


Screenshot

VA scan reports
Proof of remediation of vulnerabilities

screenshot of allowed policies via HTTPS or SFTP only)


Screenshot of allowed policies in Firewall and Network
Security groups

walkthrough on how the files were encrypted/redacted


screenshot of encryption setting
screenshot of encryption setting
screenshots of logs

screenshot of directory access list/config

screenshot of directory access list/config

screenshot of directory access list/config

demo/walkthrough
screenshot of admin access SAML config

screenshot of config that all users are integrated to AD/O365

Provide UAM

screenshot of purging config/policy

screenshot of installed splunk agent or syslog config


screenshots of backup config
REMARKS

You might also like