SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Complying with FFIEC Guidance
Proven Security Solutions for Financial Institutions
First issued in 2005, the Federal Financial Institutions Examination Council’s (FFIEC)      Who is Affected?
guidance for financial institutions took a strong stance in support of the deployment       •	Banks
of stronger authentication methods, as well as fraud detection techniques, to protect
                                                                                            •	Thrifts
customer identities and information during online banking transactions.
                                                                                            •	 Mortgage lenders
Updated in 2011, the “FFIEC: Authentication in an Internet Banking Environment”             •	 Credit unions (and their non-functionally
guidance recognizes the significant advances in criminal threats — both in sophistication      regulated operating subsidiaries)
and sheer frequency. The supplement provides additional comprehensive guidelines
                                                                                            •	 U.S. branches and agencies of foreign banks
to help stop advanced attacks that target the identities and transactions of consumers
and business-banking customers.                                                             •	 U.S. commercial-lending companies
                                                                                               of foreign banks
Like the original, the updated guidance is supported by all five members of the             •	Creditors
FFIEC, which is an interagency body in the United States that sets the principles
                                                                                            •	 Any person or business* who arranges
and standards used for reporting and examining financial institutions.                         for the extension, renewal or continuation
                                                                                               of credit
Entrust provides the guidance, expertise and proven solutions to help banks and
financial institutions comply with the FFIEC’s latest requirements and recommendations.
                                                                                            * In addition to banking institutions, retailers,
To help organizations protect against a broad range of online and mobile threats,             utilities, car dealers and many other businesses
Entrust offers the broadest range of solutions to ensure that an effective balance            are subject to this regulation.
of security, user experience and total project cost is achieved.

A New Focus
The original 2005 FFIEC guidance was a major impetus to the adoption of stronger
authentication beyond standard username and password schemes.

But the growth of online threats, such as the ZeuS Trojan and man-in-the-browser
attacks, coupled with the growing losses among business, served as the catalyst for
the FFIEC to revisit those guidelines.

With a focus on the ongoing threats to customer- and business-banking transactions
and respective identities, the FFIEC’s updated guidance addresses the following areas
of focus.
Guidance & Recommendation                                                                             Entrust Enables FFIEC Compliance
Drive Better Risk Assessment                                                                          Much like with the 2005 FFIEC guidelines, Entrust offers
Financial institutions require a better understanding of the                                          proven solutions to help organizations and financial
sophisticated threats and their appropriate, timely response.                                         institutions comply with the new mandates. Entrust’s
This includes guidance for regular reviews by the banks of                                            comprehensive security framework — comprised of several
internal systems and the ability of these systems to detect                                           proven security solutions — is cost-effective, simple to deploy
and deal with fraud threats.                                                                          and easy for end-users.

Adopt Stronger Authentication Standards                                                               Entrust IdentityGuard:
While the 2005 guidance stated that usernames and passwords                                           Software Authentication Platform
weren’t enough, today’s threats require even stronger means of                                        Much of the FFIEC guidance focuses on the adoption of strong
authentication, particularly for high-risk transactions (e.g., ACH                                    authentication — for consumers and commercial banking use
and wire transfers for commercial transactions).                                                      alike. Banks are directed to provide commercial customers
                                                                                                      with strong multifactor authentication. It also requires
Push toward Layered Security                                                                          financial institutions to adopt the use of stronger transparent
Multiple layers of process or controls have been proven to help                                       authentication — such as session-based device authentication
defend against identity attacks, including advanced malware.                                          (e.g., one-time cookie or dynamic device authentication) —
If one security layer fails, subsequent barriers are in place to thwart                               that is stronger than simple device identification.
an attack. Step-up security options can include out‑of‑band
authentication and advanced transaction verification.                                                 Entrust IdentityGuard is a software authentication platform
                                                                                                      that enables banks to deploy a single authentication
Explore Advanced Authentication Techniques                                                            infrastructure capable of providing different types of
As online fraud attacks increase in sophistication, so does the                                       multifactor authentication, depending upon the type
innovation in authentication technology required to stop the                                          of user, transaction or risk.
attacks in the consumer space. Financial institutions should explore,
                                                                                                      Just one of the many authenticators supported by
for example, advanced techniques like device authentication
                                                                                                      Entrust IdentityGuard, digital certificates can be deployed easily
via one-time session cookies or stronger challenge questions.
                                                                                                      by Entrust Managed Services PKI — a simple, cost‑effective
                                                                                                      hosted PKI offering. While providing a convenient authentication
Provide Technology Guidance for Compliance
                                                                                                      mechanism for users and devices, digital certificates also enable
The FFEIC now provides instruction on technology and
                                                                                                      banks to tighten security processes within the institution and
solutions, particularly fraud detection platforms, which will
                                                                                                      enhance security of internal systems.
be effective in meeting the new guidelines. This includes fraud
transaction monitoring and/or anomaly detection software.




                                                                                                          Scratch Pad   Mobile
                                                                                                                                     Transaction
                                                                                          SMS                                        Verification

                                                                     Device                                                                             Digital
                                                                  Authentication                                                                      Certificates
                                                                                                           Knowledge    Grid
                                                                                                             Based
                                                                                         IP-Geolocation                           OTP Tokens
                                                       Password                                                                                                       USB and
                                                                                                                                                                     Smartcards
                                                                           Mutual
               SOFTWARE AUTHENTICATION PLATFORM                         Authentication                                                              Biometrics




Figure 1: A software authentication platform enables financial institutions to select the right authenticator for each user or device based on risk, cost and/or transaction type.
Entrust IdentityGuard Mobile:                                             Entrust TransactionGuard:
Transaction Verification                                                  Real-Time Fraud Detection
The updated FFIEC guidance requires banks to                              Banks are now required to maintain systems capable of
ensure systems are in place that thwart attacks                           preventing fraud attacks and have the ability to analyze
with a layered security approach. In addition                             incidents that have occurred. The guidance specifically
to providing a convenient, cost‑effective                                 addresses security solutions effective in combating online fraud,
approach for stronger authentication via soft                             including approaches that provide transaction monitoring and
tokens, Entrust IdentityGuard Mobile also                                 anomaly detection (i.e., software that detects transactions that
enables out‑of‑band transaction verification.                             may be inconsistent with established patterns of behavior).

This helps users verify whether transaction integrity is intact           Entrust TransactionGuard provides robust, real-time capabilities
or if it has been modified by some form of fraud attack.                  to protect against online fraud, and offers forensic capabilities
Transaction verification is a proven approach for banks to                to analyze ongoing and/or past transactions to identify
defeat many types of online and mobile malware threats.                   potential fraudulent activity.




  Solution
  Guidance                Entrust            Entrust              Entrust        Entrust EV         Details
                          IdentityGuard      IdentityGuard        Transaction    Multi-Domain
                                             Mobile               Guard          SSL Digital
                                                                                 Certificates

  Drive Better Risk             ✓                 ✓                   ✓                ✓            Understand how to detect and
  Assessment                                                                                        thwart threats, as well as analyze
                                                                                                    security breaches

  Adopt Stronger                ✓                 ✓                                                 Use stronger device authentication,
  Authentication                                                                                    including one-time cookies, to
  Standards                                                                                         create more complex digital PC
                                                                                                    fingerprints; increase strength
                                                                                                    of challenge questions

  Push Toward                   ✓                 ✓                   ✓                ✓            Enable use of different security
  Layered Security                                                                                  functions at different points in
                                                                                                    a transaction process; if one is
                                                                                                    compromised another control
                                                                                                    is in place

  Explore                       ✓                 ✓                   ✓                             Consider innovative security
  Advanced Fraud                                                                                    controls, including anti-malware
  & Authentication                                                                                  software for customers, transaction
  Techniques for                                                                                    monitoring, anomaly detection and
  Effective Controls                                                                                mobile transaction verification

  Provide                       ✓                 ✓                   ✓                ✓            Educate customers as to how and
  Technology                                                                                        where they are protected within
  Guidance for                                                                                      today’s current fraud landscape
  Compliance
Entrust EV Multi-Domain SSL Certificates:                                                                     Entrust & You
Website Security                                                                                              More than ever, Entrust understands your organization’s
Extended validation (EV) SSL digital                                                                          security pain points. Whether it’s the protection of information,
certificates are the first line of defense                                                                    securing online customers, regulatory compliance or large‑scale
in thwarting online fraud — particularly                                                                      government projects, Entrust provides identity-based security
phishing attacks — by providing users                                                                         solutions that are not only proven in real-world environments,
with a strong indication that they are                                                                        but cost-effective in today’s uncertain economic climate.
on a legitimate website.
                                                                                                              The smart choice for properly securing digital identities and
Under the new guidance, organizations are required to provide                                                 information, Entrust solutions represent the right balance
these types of simple measures (e.g., visual clues) to help users                                             between affordability, expertise and service. For more
easily understand easily if they are at risk during an online session.                                        information on how Entrust can help your organization comply
Banks and financial institutions are also required to implement                                               with FFIEC guidelines, contact the Entrust representative in
better education for their users. For example, visual clues, such                                             your area at 888-690-2424, email entrust@entrust.com or
as the green address bar provided by an EV SSL certificate, are                                               visit entrust.com/ffiec.
a simple and effective way for banks to make users aware of
                                                                                                              Company Facts
risky or legitimate sites.
                                                                                                              Website: www.entrust.com
                                                                                                              Employees: 359
                                                                                                              Customers: 5,000
                                                                                                              Offices: 10 globally

                                                                                                              Headquarters
                                                                                                              One Lincoln Centre
                                                                                                              5400 LBJ Freeway, Suite 1340
                                                                                                              Dallas, Texas 75240 USA

                                                                                                              Sales
                                                                                                              North America: 1-888-690-2424
                                                                                                              EMEA: +44 (0) 118 953 3000
                                                                                                              Email: entrust@entrust.com




About Entrust
A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations
spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points
for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and
services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.




Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service
names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their
respective owners. © 2012 Entrust. All rights reserved.
                                                                                                                                                                                                      24352/5-12

Mais conteúdo relacionado

Mais de Entrust Datacard

Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesEntrust Datacard
 
Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionEntrust Datacard
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEntrust Datacard
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 

Mais de Entrust Datacard (8)

Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutes
 
Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure Protection
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate Management
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Último

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Último (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Complying with FFIEC Compliance

  • 1. Complying with FFIEC Guidance Proven Security Solutions for Financial Institutions First issued in 2005, the Federal Financial Institutions Examination Council’s (FFIEC) Who is Affected? guidance for financial institutions took a strong stance in support of the deployment • Banks of stronger authentication methods, as well as fraud detection techniques, to protect • Thrifts customer identities and information during online banking transactions. • Mortgage lenders Updated in 2011, the “FFIEC: Authentication in an Internet Banking Environment” • Credit unions (and their non-functionally guidance recognizes the significant advances in criminal threats — both in sophistication regulated operating subsidiaries) and sheer frequency. The supplement provides additional comprehensive guidelines • U.S. branches and agencies of foreign banks to help stop advanced attacks that target the identities and transactions of consumers and business-banking customers. • U.S. commercial-lending companies of foreign banks Like the original, the updated guidance is supported by all five members of the • Creditors FFIEC, which is an interagency body in the United States that sets the principles • Any person or business* who arranges and standards used for reporting and examining financial institutions. for the extension, renewal or continuation of credit Entrust provides the guidance, expertise and proven solutions to help banks and financial institutions comply with the FFIEC’s latest requirements and recommendations. * In addition to banking institutions, retailers, To help organizations protect against a broad range of online and mobile threats, utilities, car dealers and many other businesses Entrust offers the broadest range of solutions to ensure that an effective balance are subject to this regulation. of security, user experience and total project cost is achieved. A New Focus The original 2005 FFIEC guidance was a major impetus to the adoption of stronger authentication beyond standard username and password schemes. But the growth of online threats, such as the ZeuS Trojan and man-in-the-browser attacks, coupled with the growing losses among business, served as the catalyst for the FFIEC to revisit those guidelines. With a focus on the ongoing threats to customer- and business-banking transactions and respective identities, the FFIEC’s updated guidance addresses the following areas of focus.
  • 2. Guidance & Recommendation Entrust Enables FFIEC Compliance Drive Better Risk Assessment Much like with the 2005 FFIEC guidelines, Entrust offers Financial institutions require a better understanding of the proven solutions to help organizations and financial sophisticated threats and their appropriate, timely response. institutions comply with the new mandates. Entrust’s This includes guidance for regular reviews by the banks of comprehensive security framework — comprised of several internal systems and the ability of these systems to detect proven security solutions — is cost-effective, simple to deploy and deal with fraud threats. and easy for end-users. Adopt Stronger Authentication Standards Entrust IdentityGuard: While the 2005 guidance stated that usernames and passwords Software Authentication Platform weren’t enough, today’s threats require even stronger means of Much of the FFIEC guidance focuses on the adoption of strong authentication, particularly for high-risk transactions (e.g., ACH authentication — for consumers and commercial banking use and wire transfers for commercial transactions). alike. Banks are directed to provide commercial customers with strong multifactor authentication. It also requires Push toward Layered Security financial institutions to adopt the use of stronger transparent Multiple layers of process or controls have been proven to help authentication — such as session-based device authentication defend against identity attacks, including advanced malware. (e.g., one-time cookie or dynamic device authentication) — If one security layer fails, subsequent barriers are in place to thwart that is stronger than simple device identification. an attack. Step-up security options can include out‑of‑band authentication and advanced transaction verification. Entrust IdentityGuard is a software authentication platform that enables banks to deploy a single authentication Explore Advanced Authentication Techniques infrastructure capable of providing different types of As online fraud attacks increase in sophistication, so does the multifactor authentication, depending upon the type innovation in authentication technology required to stop the of user, transaction or risk. attacks in the consumer space. Financial institutions should explore, Just one of the many authenticators supported by for example, advanced techniques like device authentication Entrust IdentityGuard, digital certificates can be deployed easily via one-time session cookies or stronger challenge questions. by Entrust Managed Services PKI — a simple, cost‑effective hosted PKI offering. While providing a convenient authentication Provide Technology Guidance for Compliance mechanism for users and devices, digital certificates also enable The FFEIC now provides instruction on technology and banks to tighten security processes within the institution and solutions, particularly fraud detection platforms, which will enhance security of internal systems. be effective in meeting the new guidelines. This includes fraud transaction monitoring and/or anomaly detection software. Scratch Pad Mobile Transaction SMS Verification Device Digital Authentication Certificates Knowledge Grid Based IP-Geolocation OTP Tokens Password USB and Smartcards Mutual SOFTWARE AUTHENTICATION PLATFORM Authentication Biometrics Figure 1: A software authentication platform enables financial institutions to select the right authenticator for each user or device based on risk, cost and/or transaction type.
  • 3. Entrust IdentityGuard Mobile: Entrust TransactionGuard: Transaction Verification Real-Time Fraud Detection The updated FFIEC guidance requires banks to Banks are now required to maintain systems capable of ensure systems are in place that thwart attacks preventing fraud attacks and have the ability to analyze with a layered security approach. In addition incidents that have occurred. The guidance specifically to providing a convenient, cost‑effective addresses security solutions effective in combating online fraud, approach for stronger authentication via soft including approaches that provide transaction monitoring and tokens, Entrust IdentityGuard Mobile also anomaly detection (i.e., software that detects transactions that enables out‑of‑band transaction verification. may be inconsistent with established patterns of behavior). This helps users verify whether transaction integrity is intact Entrust TransactionGuard provides robust, real-time capabilities or if it has been modified by some form of fraud attack. to protect against online fraud, and offers forensic capabilities Transaction verification is a proven approach for banks to to analyze ongoing and/or past transactions to identify defeat many types of online and mobile malware threats. potential fraudulent activity. Solution Guidance Entrust Entrust Entrust Entrust EV Details IdentityGuard IdentityGuard Transaction Multi-Domain Mobile Guard SSL Digital Certificates Drive Better Risk ✓ ✓ ✓ ✓ Understand how to detect and Assessment thwart threats, as well as analyze security breaches Adopt Stronger ✓ ✓ Use stronger device authentication, Authentication including one-time cookies, to Standards create more complex digital PC fingerprints; increase strength of challenge questions Push Toward ✓ ✓ ✓ ✓ Enable use of different security Layered Security functions at different points in a transaction process; if one is compromised another control is in place Explore ✓ ✓ ✓ Consider innovative security Advanced Fraud controls, including anti-malware & Authentication software for customers, transaction Techniques for monitoring, anomaly detection and Effective Controls mobile transaction verification Provide ✓ ✓ ✓ ✓ Educate customers as to how and Technology where they are protected within Guidance for today’s current fraud landscape Compliance
  • 4. Entrust EV Multi-Domain SSL Certificates: Entrust & You Website Security More than ever, Entrust understands your organization’s Extended validation (EV) SSL digital security pain points. Whether it’s the protection of information, certificates are the first line of defense securing online customers, regulatory compliance or large‑scale in thwarting online fraud — particularly government projects, Entrust provides identity-based security phishing attacks — by providing users solutions that are not only proven in real-world environments, with a strong indication that they are but cost-effective in today’s uncertain economic climate. on a legitimate website. The smart choice for properly securing digital identities and Under the new guidance, organizations are required to provide information, Entrust solutions represent the right balance these types of simple measures (e.g., visual clues) to help users between affordability, expertise and service. For more easily understand easily if they are at risk during an online session. information on how Entrust can help your organization comply Banks and financial institutions are also required to implement with FFIEC guidelines, contact the Entrust representative in better education for their users. For example, visual clues, such your area at 888-690-2424, email entrust@entrust.com or as the green address bar provided by an EV SSL certificate, are visit entrust.com/ffiec. a simple and effective way for banks to make users aware of Company Facts risky or legitimate sites. Website: www.entrust.com Employees: 359 Customers: 5,000 Offices: 10 globally Headquarters One Lincoln Centre 5400 LBJ Freeway, Suite 1340 Dallas, Texas 75240 USA Sales North America: 1-888-690-2424 EMEA: +44 (0) 118 953 3000 Email: entrust@entrust.com About Entrust A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © 2012 Entrust. All rights reserved. 24352/5-12