Lifecycle IntroSecurityManual
Lifecycle IntroSecurityManual
Table of Contents
Foreword
CHAPTER 1 : INTRODUCTION TO ATM LIFECYCLE SECURITY 1.1 CLARIFICATION OF ATM LIFECYCLE 1.2 PROTECTING THE ATM LIFECYCLE CHAPTER 2 : CARDHOLDER SECURITY 2.1 THE ROLE OF THE CARDHOLDER IN ATM SECURITY 2.2 THE WORLDS TOP TWENTY TIPS FOR ATM USE 2.3 ADDITIONAL TIPS FOR DIFFERENT TYPES OF ATMS 2.4 GENERAL TIPS 2.5 SUMMARY OF ATM SECURITY FOR CUSTOMERS CHAPTER 3 : ATM PHYSICAL SECURITY 3.1 ROLE OF PHYSICAL SECURITY 3.2 SCOPE OF PHYSICAL SECURITY REQUIREMENTS 3.3 RISK-ASSESSMENTS 3.4 COMMON ATM SECURITY CONSIDERATIONS 3.5 PHYSICAL SECURITY CONSIDERATIONS FOR STAND ALONE ATMS 3.6 PHYSICAL SECURITY CONSIDERATIONS FOR THRU-THE-WALL ATMS CHAPTER 4 : PIN & ENCRYPTION SECURITY 4.1 INTRODUCTION 4.2 PIN SECURITY RECOMMENDATIONS 4.3 KEY MANAGEMENT RECOMMENDATIONS 4.4 KEY MANAGEMENT REGIMES 4.5 CRYPTOGRAPHY BEST PRACTICE RECOMMENDATIONS CHAPTER 5 : DATA & TRANSACTIONAL SECURITY 5.1 INTRODUCTION 5.2 PRINCIPLES UNDERLYING INFORMATION SECURITY 5.3 INFORMATION SECURITY POLICY 5.4 SECURITY MANAGEMENT 5.5 MESSAGE SECURITY FOR ATM NETWORKS 5.6 DEFINITIONS OF SECURITY CLASSIFICATIONS OF DATA 5.7 ALLOCATION OF RESPONSIBILITIES FOR MESSAGE SECURITY 5.8 DATA CONFIDENTIALITY & INTEGRITY FOR ATM NETWORKS 5.9 PROCEDURE & REVIEW RECOMMENDATIONS CHAPTER 6 : ATM CYBER SECURITY 6.1 OUTLINING THE DRIVERS FOR ATM CYBER SECURITY 6.2 OPERATING SYSTEM SECURITY 6.3 ACCOUNT SECURITY 6.4 NETWORK SECURITY 6.5 DETECTION AND PREVENTION CHAPTER 7 : ATM CASH SECURITY 7.1 DEFINING THE SCOPE OF ATM CASH SECURITY 7.2 BASIC RECOMMENDATIONS 7.3 HOW CASH REPLENISHMENT FITS INTO THE CASH CYCLE 7.4 DEFINITION OF THE CHAIN OF RESPONSIBILITY IN THE ATM CASH CYCLE.
4
5-7 5 6 8-11 8 8 10 11 11 12-20 12 12 12 13 17 19 21-40 21 22 27 40 40 41-46 41 41 42 42 43 43 45 45 46 47-51 47 47 49 50 51 52-65 52 53 53 55
SAFE OPERATING PROCEDURES AUDIT TRAILS FOR THE ATM CASH CYCLE SECURING THE ATM ZONES BEST PRACTICES FOR ATM CASH REPLENISHMENT BEST PRACTICES FOR SECURING ATM SERVICING / MAINTENANCE
57 57 59 62 63
Acknowledgements Disclaimer
66 66
Foreword
This Best Practice Manual for ATM Lifecycle Security sets out to provide a high-level overview of the key elements of each phase of the ATM business lifecycle from cardholder security to cash security, and every kind of security in-between. The Global ATM Security Alliance has published International Cardholder Security Tips and Best Practices for Physical ATM Security, PIN and Key Management Security, Transactional Security, Cyber Security and Cash Security. This overview collects in one manual the key guidelines 1 from all of this published material. The objective is to encourage security practitioners in the industry to adopt a more integrated lifecycle security approach as part of a holistic security strategy. It is a well-known fact that crime migrates along the path of least resistance to attack the weakest link or softest target. Consequently, unless each link in the lifecycle chain of the ATM is strong, crime will continue to find security vulnerabilities to exploit. We recommend that specialists focusing on particular kinds of ATM security, whether physical security, cash security or cardholder security, continue to consult GASAs comprehensive best practices for detailed guidelines for their specialised area of security, whilst using this manual in a complementary fashion to inspire lifecycle security thinking and awareness. We further recommend that security managers who are specialised, have systematic and highly co-ordinated contact with specialists focusing on other phases in the security lifecycle. This manual completes the Global ATM Security Alliances series of security best practices for the whole ATM lifecycle. Please visit www.globalasa.com for more details about GASA. We trust the manual will play a part in crime reduction and that it will enhance your security strategies to make them even more effective. Global ATM Security Alliance October 2005
1 Each organization is encouraged to use these guidelines as a framework to build its own security policies, procedures and standards. A guideline in this manual is understood as a suggestion for best practice which is strongly recommended, rather than a requirement to be met.
Chapter 1
Introduction to ATM Lifecycle Security
1.1 Clarification of ATM Lifecycle
The term ATM lifecycle refers to all the interlinked stages involved within the business processes required for the functioning and operating of the ATM. In biology, life-cycle refers to the complete series of stages through which an organism passes 2 from conception, through maturation to eventual death. The idea is that these stages are linked as the organism passes from one to the next in a natural sequence. In the ATM business lifecycle, certain processes, actions and operations happen in a sequence of steps resulting in ATMs dispensing cash and other services to customers. For example, ATMs need regular cash replenishment to continue functioning. For the ATM to dispense cash, the cardholder needs to insert his card, key in his PIN for identification, whereupon the transaction needs to be authorised by his bank through a process which links the ATM via a network and switch to the banks authorising system. The ATM business lifecycle covers all these stages and the many processes, systems, procedures and operations required to deliver ATM services to bank customers. When applied to ATM security, this business lifecycle is seen as a series of phases where different kinds of protection are needed at different points along the lifecycle to prevent crime and reduce risk of attack. Lifecycle security is the strategy of looking in a high-level, co-ordinated way, at all the phases along the lifecycle, constantly assessing crime migration patterns and changing vulnerabilities. Lifecycle security looks at all kinds of ATM security within a single strategic security management programme. When there are specialised areas of security within all these lifecycle phases, they need to be systematically co-ordinated in order to achieve lifecycle security.
13/10/2005
1.2
CASH SECURITY
CARD SECURITY
CARDHOLDER SECURITY
Card Security 3 encompasses the security measures to ensure that a card, whether a debit, credit or Stored Value card, can be validated at a payments terminal and cannot be readily copied or cloned for counterfeit purposes. Cardholder Security refers to the ways in which cardholders can be educated to manage their card and ATM usage in a sensible and security-conscious way. ATM Physical Security covers the security measures undertaken to ensure that the ATM machine is properly located, installed and protected in a way that addresses and manages risks of attacks against it. PIN and Encryption Security has to do with protection of PIN numbers, secure encryption key management and encryption guidelines. Cryptography, along with strong encryption key management, is used to protect PINs and PIN keys to reduce the risk of financial loss by fraud. Thereby maintaining the integrity and confidentiality of the network and instilling cardholder confidence in the use of both the ATM network and the ATM. ATM Transactional Security is about initiating, implementing and maintaining information security within ATM networks. As messages and transactions in ATM networks contain both sensitive cardholder data and related financial information, it is important that ATM networks safeguard this information. The transactional security controls should be applied throughout an ATM network, from the ATM to the authorisation process, including all transaction processing and the generation and storage of PINs.
3
GASA has not produced best practices for card security and refers readers to relevant Payment Card Industry (PCI) standards for card issuing.
13/10/2005
Cyber Security refers to general cyber security for computer, network and information security as well as guidelines for operating ATMs on a Windows XP platform. ATM Connectivity Security involves line encryption and protection of data over the communications lines between ATMs and their host systems to prevent interceptions of data through devices like wire-tapping. ATM Cash Security focuses on securing the cash replenishment phase for three self-fill models: bank-branch-fill, merchant-fill and CiT-fill. This includes securing the approach to the ATM, securely loading the cash and then securing the exit away from the ATM. Cash security is critical to any ATM business, since ATMs are essentially cash dispensers and the highest cost for deployers is typically the cost of cash. It is recommended that banks and businesses in the ATM industry encompass lifecycle security covering all of these phases within an integrated and holistic security strategy, coordinating the areas of specialisation within a single security framework in order to produce seamless security across this lifecycle. The objective of all ATM security is to protect the ATMs whole Trusted Environment.
13/10/2005
Chapter 2
Cardholder Security
2.1 The role of the cardholder in ATM security
This chapter is designed to ensure optimal levels of customer safety and convenience at ATMs. It is true that law enforcement agencies around the world need the communities they police to play a part in the upholding of law and order. By being more security-conscious and taking precautions whenever possible, citizens can help prevent crimes from taking place. This is equally true when it comes to ATM usage.
2.2
Tip 1 Where possible, use ATMs with which you are most familiar. Alternatively, choose well-lit, well-placed ATMs where you feel comfortable. Tip 2 Scan the whole ATM area before you approach it. Avoid using the ATM altogether if there are any suspicious-looking individuals around or if it looks too isolated or unsafe. Tip 3 Avoid opening your purse, bag or wallet while in the queue for the ATM. Have your card ready in your hand before you approach the ATM. Tip 4 Notice if anything looks unusual or suspicious about the ATM indicating it might have been altered. If the ATM appears to have any attachments to the card slot or key pad, do not use it. Check for unusual instructions on the display screen and for suspicious blank screens. If you suspect that the ATM has been interfered with, proceed to another ATM and inform the bank.
4 The Worlds Top Twenty Tips for ATM Use were collected from Australia, New Zealand, United States of America, United Kingdom, Europe, Canada, India and South Africa. Banks are free to distribute these security tips under their own branding and in their own format.
-8-
13/10/2005
Tip 5 Avoid ATMs which have messages or signs fixed to them indicating that the screen directions have been changed, especially if the message is posted over the card reader. Banks and other ATM owners will not put up messages directing you to specific ATMs, nor would they direct you to use an ATM which has been altered. Tips for Using an ATM Tip 6 Be especially cautious when strangers offer to help you at an ATM, even if your card is stuck or you are experiencing difficulty with the transaction. You should not allow anyone to distract you while you are at the ATM. Tip 7 Check that other individuals in the queue keep an acceptable distance from you. Be on the look-out for individuals who might be watching you enter your PIN. Tip 8 Stand close to the ATM and shield the keypad with your hand when entering your PIN (you may wish to use the knuckle of your middle finger to key in the PIN). Tip 9 Follow the instructions on the display screen, e.g. do not key in your PIN until the ATM requests you to do so. Tip 10 If you feel the ATM is not working normally, press the Cancel key, withdraw your card and proceed to another ATM. Report the matter to your financial institution. Tip 11 Never force your card into the card slot. Tip 12 Keep your printed transaction record so that you can compare your ATM receipts to your monthly statement. Tip 13 If your card gets jammed, retained or lost, or if you are interfered with at an ATM, report this immediately to the bank and/or police using the help line provided or nearest phone. Tip 14 Do not be in a hurry during the transaction, and carefully secure your card & cash in your wallet, handbag or pocket before leaving the ATM.
-9-
13/10/2005
Tips for Managing your ATM use Tip 15 Memorise your PIN (If you must write it down, do so in a disguised manner and never carry it with your card). Tip 16 NEVER disclose your PIN to anyone, whether to family member, bank staff or police. Tip 17 Do not use obvious and guessable numbers for your PIN like your date of birth. Tip 18 Change your PIN periodically, and, if you think it may have been compromised, change it immediately. Tip 19 Set your daily ATM withdrawal limit at your branch at levels you consider reasonable. Tip 20 Regularly check your account balance and bank statements and report any discrepancies to your bank immediately. Please note that you should show the same precautionary care when using your card(s) at a POS (point of sale) pinpad terminal in a retail environment or at a restaurant, or when conducting transactions online or telephonically, or when writing cheques (checks) speak to your bank branch about security when using these other service delivery channels
2.3
Tip for Use of Lobby ATMs If you are using an indoor ATM that requires your card to open the door, avoid letting anyone that you do not know come in with you. Check for modifications to the card reading device affixed to the lobby door. Tip for Use of Drive-up ATMs Lock the car doors and roll up the other windows when you use a drive-through ATM.
- 10 -
13/10/2005
2.4
General Tips
General Tip 1 Ensure that you sign your card on the signature panel as soon as you receive it.
General Tip 2 Protect your cards as if they were cash. Do not leave them unattended anywhere. Keep your cards in a safe place and never leave them or personal identity documents lying around at home, at work, in a vehicle, or in public places. General Tip 3 If at all possible, do not let your bag or wallet containing the cards out of your sight in public places. General Tip 4 Be alert to what is happening with your card when performing a transaction. For example, do not let a restaurant waiter take your card away to settle the account, and watch your card when you hand it to a cashier. Watch while cashiers process your card - make sure they do not swipe it through two different devices: if that happens, contact your bank immediately. General Tip 5 Make a list of your card account numbers and telephone numbers for reporting lost or stolen cards. Keep the list in a safe place. Check your cards periodically to make sure none are missing. General Tip 6 Never give your credit card number over the phone or internet, unless you are dealing with a reputable company, or you have initiated the call yourself, or you are 100% certain of the callers identity and that of the company they work for. General Tip 7 Read and understand the Terms & Conditions for card usage issued by your financial institution(s). Contact customer services if you are unclear about any of the terms.
2.5
YOU, your PIN and your CARD looked after together are the keys to ATM security: Approach an ATM only under the right conditions in order to protect YOURSELF. Ensure only you know, see, and use your PIN. Follow the ATM screens instructions when using your CARD, and ensure the card is kept secure during and after use.
- 11 -
13/10/2005
Chapter 3
ATM Physical Security
3.1 Role of Physical Security
The physical ATM provides the interface between the self-service banking industry and millions of cardholders around the world who use ATMs to withdraw cash, check balance enquiries, top-up their mobile phones, purchase tickets and pay bills.
ATMs are becoming the face of many financial institutions. For many consumers, ATMs are becoming the only interaction they have with their banks. In addition, ATMs are becoming a competitive mark for many banks. Therefore, it is imperative to ensure that the customers experience with the ATM is safe and secure, as well as pleasant. ATM Security and Fraud (July 2004) by Celent Communications 3.2 Scope of Physical Security Requirements
The physical security recommendations in this chapter refer to the ATM itself and its host premises. The security of cash is covered in Chapter 9 ATM Cash Security. The security guidelines listed are recommended as crime reduction "good practice". Additional security measures and practices may well be required and will depend on existing local premises security and the assessed risk carried out prior to site selection and installation. Our guidelines are intended to complement the advice of local police and government, insurers and security advisers, as well as the manufacturers guidelines.
3.3
Risk-Assessments
Site selection and installation of all ATMs should always be preceded by risk assessments. During initial site validation, or at subsequent site risk assessment visits, an ATM should be classified by the deployer as Low, Medium or High risk. Risk assessment criteria can depend on organisational, insurance and law enforcement recommendations and requirements. Industry advice may also be sought from industry approved consultants. It is recommended that details of site risk assessments be recorded in defined reports and stored in an organisational database.
- 12 -
13/10/2005
It is also recommended that each ATM deploying organisation conducts a detailed and thorough ATM risk analysis based on their own country, and geographical areas of operation, and that based on this, a detailed ATM security strategy is prepared or up-dated.
3.4
The security considerations laid down in this section are considered common to both Stand Alone and Thru-the-Wall ATMs. The security considerations particular to each type are discussed separately later.
- 13 -
13/10/2005
3.4.6 CCTV
Should the site risk assessment require it, the premises may be protected by a closed circuit television system, with or without detection facility, viewing the ATM, but not viewing the ATM keypad.
- 15 -
13/10/2005
Authorisation
Prior to dispatching a Technician to the ATM site, the Installation Contractor 6 should check with the ATM Deployer that all the Pre-Conditions have been met.
Test Certificate
On completion he should sign a Test Certificate to confirm that everything is correct and that the ATM is ready to go live. A copy of this Certificate should subsequently be sent to the ATM Deployer.
Telephone Line
If the telephone line is not working, he may proceed to hand over the ATM, but may not switch it live or on-line7 .
- 16 -
13/10/2005
Secure Area
ATMs should be stored in a secure area with reasonable restrictions on physical access, and with an access control procedure in place for all persons entering the area. Access control records should be kept for a minimum of two years, for external audit purposes.
Alarm System
The secure area should be protected by a monitored alarm system with sensors covering the external access points and all movement within the general area. This system should be switched on and monitored, outside of normal working hours, and at any time when the storage area is left unattended.
Encryption Keys
It is recommended that Encryption keys are deleted from an ATM while it is in storage. This stops the Encryptor being brought back on-line if the ATM is plugged back into the network.
3.5
- 17 -
13/10/2005
To reduce the risk of vandalism to the ATM and to increase user safety, the ATM should be positioned in a highly visible and well-lit area that allows maximum surveillance by counter staff and other customers.
Anchorage
The ATM should be securely fixed to the floor through its security container by a minimum of four resin anchor bolts (minimum 12mm diameter to a minimum depth of 150mm) into a substantial concrete base. Where a timber floor is involved the ATM should be bolted to a steel base plate by a minimum of four bolts, which is bolted through the floor joists by a minimum of four bolts.
Enhanced Anchorage
Instead of the anchoring system recommended in item 3.5.2 the ATM should be anchored by an enhanced anchoring system specifically designed to provide superior fixing for ATM's.
Tracking System
The ATM may be fitted with a tracking system to enable its position to be determined in the event of theft of the ATM from the premises.
- 18 -
13/10/2005
3.6
Base Composition
During the Site Validation an assessment should be made of the base to ensure that it is of sufficient strength and depth to anchor the ATM. If it is deemed possible to use the existing base, the existing concrete should be reinforced and of a minimum depth to meet the requirements of the anchor bolt manufacturers. The ATM can then be anchored directly into it (provided that the base height is not required to be raised see section entitled Base Height below). If it is not possible to use the existing base without modification, then a plan should be made to strengthen the base. When making this plan a minimum depth of 10cm reinforced concrete should be retained with the existing base, in order to anchor the new base to it.
Base Height
In order to anchor the ATM properly it is important that accurate measurements are taken during the Site Validation Visit. For the ATM to be properly anchored it should be able to sit on a plinth that will enable it to exactly reach the required height.
Anchorage
Secure anchorage can be made under the following scenarios (for full details, including recommendations for base preparation, see Best Practice Manual for ATM Physical Security). For all anchorages the Installation & Maintenance Contractor should complete a Certificate stating that the anchoring has been done in accordance with these requirements. All exact measurements relating to the anchorage should be recorded. A copy of this Certificate should be passed to the ATM deployer for audit purposes:
- 19 -
13/10/2005
Anchoring Plinth To Base - No Cellar - Sufficient Concrete This assumes that the ATM will be anchored into solid ground with sufficient concrete. Sufficient Concrete is reinforced concrete to a minimum depth required for the length of bolt used. For details of required depths it is recommended to consult the handbooks of the major anchor bolt manufacturers e.g. Hilti. The installation contractor should anchor the ATM in accordance with the relevant CEN (or other) standard relating to the grade of safe used.. Anchoring Plinth To Base - No Cellar - Insufficient Concrete This assumes that the ATM will be anchored into solid ground with insufficient concrete. Insufficient concrete is concrete that is not reinforced and does not meet the minimum requirements of the anchor bolt manufacturers. When this is the case a concrete base should be constructed and properly attached to the existing floor. The installation contractor should anchor the ATM in accordance with the relevant CEN (or other) standard relating to the grade of safe used.. Anchoring Plinth To Base Over A Cellar This assumes that the ATM will be anchored over a cellar/basement/garage to which the public may or may not have access, and for which entry/egress control may or may not be under the direct control of the Bank, or other TTW ATM deployer. After the Site Validation visit, the ATM Deployer Security Representative should approve the proposed anchoring plan. The installation contractor should anchor the ATM in accordance with the relevant CEN (or other) standard relating to the grade of safe used.
ATM Plinth
When deciding on an ATM plinth, ATM deployers should assess its construction from a security perspective. Plinths specially constructed to withstand ram raids and other brute force attacks may be considered for higher risk locations. For installers using CEN approved plinths, the anchoring arrangements should be those that are approved in the CEN documentation for that product. The correct implementation of those arrangements will guarantee good anchoring. Chapter 3: ATM Physical Security - 20 13/10/2005
Chapter 4
PIN & Encryption Security
4.1 Introduction
4.1.2 Objectives of PIN Security & Key Management
The principle behind PIN Security and encryption Key Management is to protect the PIN against unauthorized disclosure, compromise and misuse throughout the life of a transaction. This goal can be broken down into the 7 separate objectives listed below, and the requirements and best practices laid down in this chapter are aimed at meeting these objectives.
OBJECTIVE 1
PINs used in transactions governed by these requirements are processed using equipment and methodologies that ensure they are kept secure. Cryptographic keys used for PIN encryption/decryption and related key management are created using processes that ensure that it is not possible to predict any key or determine that certain keys are more probable than other keys. Keys are conveyed or transmitted in a secure manner. Key loading to hosts and PIN entry devices is handled in a secure manner. Keys are used in a manner that prevents or detects their unauthorized usage. Keys are administered in a secure manner. Equipment used to process PINs and keys is managed in a secure manner.
OBJECTIVE 2
OBJECTIVE 3 OBJECTIVE 4
OBJECTIVE 5
OBJECTIVE 6 OBJECTIVE 7
To help establish a secure environment for PIN based transactions, this chapter sets out the minimum acceptable recommendations for securing PINs and encryption keys. Its purpose is to aid all electronic payment system participants in providing the fundamental assurance that cardholder PINs will not be compromised. For a complete set of recommendations please see GASAs Best Practice PIN Security & Key Management Recommendations. It should be understood that the recommendations given in this chapter are supplementary to the security requirements laid down by the networks. Network requirements should always take precedence over these guidelines.
4.2
- 22 -
13/10/2005
- 23 -
13/10/2005
c) The issuer should limit the successive attempted validations by a cardholder with the incorrect PIN. Indication that the PIN is invalid should be included in the response from the issuer to the acquirer.
- 24 -
13/10/2005
- 25 -
13/10/2005
c) Online PINs should be encrypted using the TDEA Electronic Code Book (TECB) mode of operation as described in ANSI X9.52. For purposes of these recommendations, all references to TECB are using key options 1 or 2, as defined in ANSI X9.52. Schemes may allow alternative methods if validated as at least as secure as TDES. d) All cardholder PINs processed offline using IC Card technology should be protected in accordance with the requirements in Book 2 of the EMV2000 IC Card Specifications for Payment Systems. 8 e) For online transactions, PINs should only be encrypted using ISO 95641 PIN block formats 0, 1 or 3. Format 2 should be used for PINs that are submitted from the IC reader to the IC. f) For secure transmission of the PIN from the point of PIN entry to the card issuer, the encrypted PIN block format should comply with ISO 95641 format 0, ISO 9564-1 format 1, or ISO 95641. Schemes may allow for alternative methods on a case-by-case basis. g) For ISO format 0 and 3, the cleartext PIN block and the Primary Account Number block should be XOR'ed together and then Triple-DES encrypted in Electronic Code Book (ECB) mode to form the 64-bit output cipherblock (the reversibly encrypted PIN block). Note that as stated in recommendation (f) above, a scheme approved alternative encryption method may be used. h) ISO format 3 should be used for encryption zones where the PIN encryption key is static for the productive life of the device in which it resides. i) PINs enciphered only for transmission between the PIN entry device and the IC reader should use ISO format 0, 1 or 3. j) PINs should not be stored except as part of a store-and-forward transaction as noted in ISO 9564-1, and then only for the minimum time necessary. Any store-and-forward transaction PIN should be stored in encrypted form using a unique key not used for any other purpose. k) Host Security Module (HSM) Master File Keys, including those generated internal to the HSM and never exported, should be at least double-length keys and use the TDEA.
8See
sections 7 and 11.1.2 of Book 2 of the EMV2000 IC Card Specifications for Payment Systems.
- 26 -
13/10/2005
4.3
In order to protect the secrecy of a PIN that has been encrypted using DES or Triple DES it is vital that the key used for encrypting and decrypting is also kept secret. It is particularly important that great care be exercised in order to protect the clear-text components of a key as they pass through the various life-cycles. The practices and recommendations laid down in this chapter, while not necessarily exhaustive, are considered effective in protecting the secrecy of encryption keys and their components 9 .
For more guidance on Key Management the reader is referred to the White Paper produced by K3DES LLC, Effective Encryption Key Management Practices, available at ATMIAs Best Practice Online Resource Center at http://www.atmianortham.com/ResourceCenter/atmresourcecenter.asp and on the GASA website at www.globalasa.com .
9
- 27 -
13/10/2005
b) PIN encryption keys should be held in only the PIN Entry Device and in security modules at the minimum number of locations consistent with effective operation. Disclosure of the key in one such device should not provide information that could feasibly be used to determine the key in any other such device. c) Keys may exist at more than one pair of locations for load balancing purposes, for example in dual processing sites. d) Encryption keys should only be used for the purpose they were intended, so as to minimize exposure should a key be compromised. This is to say for example, a Key Encryption Key should never be used as a PIN Encryption Key. e) Keys should never be shared or substituted on a processors production and test system. f) No key or key component should ever exist outside a TRSM expect when encrypted, or securely stored and managed using the principles of dual control and split knowledge.
- 28 -
13/10/2005
The Key Custodians should have no connection or reporting relationship to other Key Custodians.
b) An Encryption Key Log should be maintained for all actions related to key components. At a minimum this log should contain: i. ii. iii. iv. v. vi. The name and signature of the authorized Key Custodian. The type of key. The number of the component. The date and time of the action. The serial number of the tamper-evident envelope. The action undertaken.
- 29 -
13/10/2005
The log should be periodically audited by an independent group, such as Information Security, for completeness and accuracy. The Encryption Key Log should be kept in a tamper-evident envelope in a secure place such as the safe. Its removal from the safe and its tamper-evident envelope should be recorded. c) In addition to the log mentioned above certain other forms should be used to record activities undertaken with regard to keys and key components. At a minimum these forms should include: i. A form to record encryption key component values and corresponding check sum values. ii. A form for recording encryption key components that are being transported. iii. A log for recording key loading activities. iv. A form for recording PINs used to access smart cards that contain key components. v. A form for recording any passwords needed to activate any equipment used. vi. Affidavits for the generation or destruction of keys and key components. These forms along with the Encryption Key Log form the basis for auditing key management processes. They should be complete and contain as much information as possible. They should be securely stored and made available to those individuals conducting an audit.
Backups
In principle, unique keys, once loaded, should not be retained even for the purposes of back-up. Please note, it is not a requirement to have backup copies of key components or keys. However, for other keys: a) Back-ups of secret keys should exist only for the purpose of reinstating keys that are accidentally destroyed. The back-ups should exist only in one of the allowed storage forms for that key. b) Creation and management of back-up copies should be under dual control, they should be securely stored with proper access controls and subject to at least the same level of security as keys in use. c) Backups (including cloning) should require a minimum of two authorized individuals to enable the process.
- 30 -
13/10/2005
10
- 31 -
13/10/2005
d) The output of the key generation process should be monitored to ensure there is no unauthorized tap or other mechanism that might disclose a cleartext key or key component as it is transferred between the key generation TRSM and the device or medium receiving the key or key component. e) Printed key components should be printed within blind mailers, or sealed immediately after printing, so that only the party entrusted with it can observe each component and so that tampering can be detected. f) Any residue from the printing or recording process that might disclose a component should be destroyed before an unauthorized person can obtain it.
4.3.4 Specific Recommendations for the Transfer, Conveyance and Distribution of Cleartext Components
The following is a list of the specific recommendations related to the transfer, conveyance and distribution of clear-text key components. Please bear in mind that these are in addition to those recommendations already given in section 4.3.1, particularly those related to dual control and split knowledge, and documentation and logging. a) Where a private or secret key is being physically forwarded it should be sent as a minimum of two separate components. Where: i. Each component should be transferred in a tamper-evident package or within a TRSM. ii. Each component should be sent via different communication channels, such as different courier services. It is not sufficient to send the key components for a specific key by the same courier on different days. b) Private and secret keys may also be transferred by transmitting the key in ciphertext form, provided that this does not compromise the principle of split knowledge or the level of security in general. c) All key encryption keys used to transmit or convey other cryptographic keys should be (at least) as strong as any key transmitted or conveyed. d) Public keys should be conveyed in a manner that protects their integrity and authenticity and should use a mechanism independent of the actual conveyance to provide the ability to validate receipt of the correct key. e) No person should have access to any cleartext key during the transport process. f) Mechanisms should exist to ensure that only authorized custodians place key components into tamper-evident packaging for transmittal and that only authorized custodians open tamper-evident packaging containing key components upon receipt.
- 32 -
13/10/2005
g) Any single unencrypted key component should be at all times during its transfer, conveyance, or movement between any two organizational entities: i) Under the continuous supervision of a person with authorized access to this component, or, ii) Locked in a security container (including tamper evident packaging) in such a way that it can be obtained only by a person with authorized access to it, or iii) In a physically secure TRSM managed under the strict principles of dual control and split knowledge.
k) Key establishment protocols using public key cryptography may also be used to distribute PED symmetric keys. These key establishment protocols may use either key transport or key agreement. In a key transport protocol, the key is created by one entity and securely transmitted to the receiving entity. For a key agreement protocol, both entities contribute information, which is then used by the parties to derive a shared secret key. l) A public key technique for the distribution of symmetric secret keys should: i) Use public and private key lengths that are deemed acceptable for the algorithm in question (e.g., 1024-bits minimum for RSA); ii) Use key-generation techniques that meet the current ANSI and ISO standards for the algorithm in question; iii) Provide for mutual device authentication for both the host and the PED, including assurance to the host that the PED actually has (or actually can) compute the session key and that no other entity other than the PED specifically identified can possibly compute the session key
4.3.5 Specific Recommendations for Key Component Storage and Physical Access
Please note that this section refers to keys and key components prior to their being loaded. Unique keys and their component parts should not be kept once they have been loaded. For details on storage of backup copies etc, the reader is referred to section 4.3.1 (Backups). Also note that these recommendations are in addition to those given in this chapter regarding dual control and split knowledge, and documentation and logging. a) Printed or magnetically recorded key components should reside only within tamperevident sealed envelopes, so that the component cannot be ascertained without opening the envelope.
- 33 -
13/10/2005
b) The media upon which a component resides should always be physically safeguarded. c) Components for a specific key that are stored in separate envelopes, but within the same secure container, place reliance upon procedural controls and do not meet the requirement for physical barriers. d) Furniture-based locks, or containers with a limited set of unique keys, are not sufficient to meet the requirement for physical barriers. e) No one but the authorized key custodian (and designated backup) should have physical access to a key component. f) Key components may be stored on tokens (e.g., PC cards, smart cards, and so forth). These tokens should be stored in such a manner as to prevent unauthorized individuals from accessing the key components. For example, if key components are stored on tokens that are secured in safes, more than one person might have access to these tokens. Therefore, additional protection is needed for each token (possibly by using tamper-evident envelopes) to enable the tokens owner to determine if a token was used by another person. Key components for each specific custodian should be stored in separate secure containers. g) If a key is stored on a token, and a PIN or similar mechanism is used to access the token, only that tokens owner (or designated backup) should have possession of both the token and its corresponding PIN.
- 34 -
13/10/2005
f) Plaintext keys and key components should be transferred into a TRSM only when it can be ensured that there is no tap at the interface between the conveyance medium and the cryptographic device that might disclose the transferred keys, and that the device has not been subject to any prior tampering which could lead to the disclosure of keys or sensitive data. g) A TRSM should transfer a plaintext key only when at least two authorized individuals are identified by the device (e.g., by means of passwords or other unique means of identification). h) The injection of key components from electronic medium to a cryptographic device (and verification of the correct receipt of the component is confirmed, if applicable) should result in either of the following: the medium is placed into secure storage, if there is a possibility it will be required for future re-insertion of the component into the cryptographic device, or all traces of the component are erased or otherwise destroyed from the electronic medium. i) For keys transferred from the cryptographic hardware that generated the key to an electronic key-loading device: i) The key-loading device should be a physically secure TRSM, designed and implemented in such a way that any unauthorized disclosure of the key is prevented or detected; The key-loading device should be under the supervision of a person authorized by management, or stored in a secure container such that no unauthorized person can have access to it; The key-loading device should be designed, or controlled, so that only authorized personnel under dual control can use and enable it to output a key into another TRSM. Such personnel should ensure that a key-recording device is not inserted between the TRSMs; The key-loading device should not retain any information that might disclose the key, or a key that it has successfully transferred.
ii)
iii)
iv)
j) Any tokens, EPROMs, or other key component holders used in loading encryption keys should be maintained using the same controls used in maintaining the security of hard copy key components. These devices should be in the physical possession of only the designated component holder and only for the minimum practical time. k) If the component is not in human comprehensible form (e.g., in a PROM module, in a smart card, on a magnetic stripe card, and so forth), it should be in the physical possession of only one entity for the minimum practical time until the component is entered into a TRSM.
- 35 -
13/10/2005
l) If the component is in human readable form (e.g., printed within a PIN-mailer type document), it should only be visible at one point in time to only one person (the designated key custodian), and only for the duration of time required for this person to privately enter the key component into a TRSM. m) Printed key component documents should not be opened until just prior to entry. n) All hardware and passwords used for key loading should be managed under dual control. o) Any hardware used in the key-loading function should be controlled and maintained in a secure environment under dual control. Use of the equipment should be monitored and a log of all key-loading activities maintained for audit purposes. All cable attachments should be examined before each application to ensure they have not been tampered with or compromised. p) Any physical (e.g., brass) key(s) used to enable key loading should not be in the control or possession of any one individual who could use those keys to load cryptographic keys under single control. q) The loading of keys or key components should incorporate a validation mechanism such that the authenticity of the keys is ensured, and it can be ascertained that they have not been tampered with, substituted, or compromised.
- 36 -
13/10/2005
d) Specific events should be identified that would indicate a compromise may have occurred. Such events may include, but are not limited to: Missing cryptographic devices. Tamper-evident seals or envelope numbers or dates and times not agreeing with log entries. Tamper-evident seals or envelopes that have been opened without authorization or show signs of attempts to open or penetrate. Indications of physical or logical access attempts to the processing system by unauthorized individuals or entities. Procedures should require that plain text key components stored in tamperevident envelopes that show signs of tampering should result in the destruction and replacement of the set of components, as well as any keys encrypted under this key. e) If attempts to load a key or key component into a cryptographic device fail, the same key or component should not be loaded into a replacement device unless it can be ensured that all residue of the key or component has been erased or otherwise destroyed in the original device. f) Instances of keys or key components that are no longer used or that have been replaced by a new key should be securely destroyed. Keys maintained on paper should be burned, pulped or shredded in a cross-cut shredder. If the key is stored in EEPROM, the key should be overwritten with binary 0s (zeros) a minimum of three times. If the key is stored on EPROM or PROM, the chip should be physically destroyed in such a way as to leave it unusable and unrepairable. Where possible it should be broken into pieces and the pieces disposed of separately. Other permissible forms of a key instance (physically secured, enciphered or components) should be destroyed following the procedures outlined in ISO95641 or ISO115683. In all cases, a third partyother than the custodianshould observe the destruction and sign an affidavit of destruction. g) Key encipherment key components used for the conveyance of working keys should be destroyed after successful loading and validation of the working key. h) Documented procedures should exist, be known by all affected parties, and be demonstrably in use for: i) Replacement of compromised keys, including subsidiary keys (ie: those keys enciphered using the compromised key) to a value not feasibly related to the original key. ii) Escalation process including notification to organizations that currently share or have previously shared a suspect key. The procedures should also include damage assessment and details of specific actions to be taken with system software and hardware, keys, encrypted data, etc.
- 37 -
13/10/2005
i) Controls and procedures should also exist to prevent or detect the unauthorized substitution of one key for another, thereby reducing the risk of an adversary substituting a key known only to them. These procedures should include investigating multiple synchronization errors. j) To prevent substitution of a compromised key for a legitimate key, key component documents that show signs of tampering should result in the discarding and invalidation of the component and the associated key at all locations where they exist.
- 38 -
13/10/2005
d) Notwithstanding how the device is inspected and tested, the device serial number should be verified against the purchase order, invoice, waybill or similar document to ensure that device substitution has not occurred. e) Devices incorporate self-tests to ensure their correct operation. Devices should not be re-installed unless there is assurance they have not been tampered with or compromised. f) Key and data storage should be zeroized when a device is decommissioned. g) If necessary to comply with the above, the device should be physically destroyed so that it cannot be placed into service again, or allow the disclosure of any secret data or keys. h) Any TRSM capable of encrypting a key, and producing cryptograms of that key, should be protected against unauthorized use. This protection takes the form of either or both of the following: i) Dual access controls are required to enable the key encryption function. ii) Physical protection of the equipment with access under dual control. i) Cryptographic equipment should be managed in a secure manner in order to minimize the opportunity for key compromise or key substitution. That is to say, physical keys, authorization codes, passwords, or other enablers should be managed under dual control and split knowledge. j) Controls should exist and be in use to ensure that all physical and logical controls and anti-tamper mechanisms used are not modified or removed. k) Documented procedures should exist, be known by all affected parties, and be demonstrably in use for the following: i) Inventory control and monitoring allowing equipment to be tracked by both physical and logical identifiers, so as to protect equipment against unauthorized substitution or modification, or to detect lost or stolen equipment. ii) Destruction of all keys and PINs, or related data within a cryptographic device when that device is removed from service. iii) The security and integrity of PIN processing equipment as it is placed into service, initialized, deployed, used, and decommissioned. These should include the principles for dual control and split knowledge. iv) Physical security and access to HOST Tamper Resistant Security Modules.
- 39 -
13/10/2005
4.4
4.5
4.5.1 Objective
The cryptographic algorithms and key lengths shall be such that the likelihood of finding the key, or the data it is protecting, is low within the life of the Key. The objective of key management is to provide the users with the keys that they need to perform the required cryptographic operations and to control the use of those keys. It ensures that the keys are protected during their lifecycle, minimizing the opportunity for a breach of security, and the consequences of a security breach, and maximizing the probability that any illicit access or change to keys is detected.
- 40 -
13/10/2005
Chapter 5
Data & Transactional Security
5.1 Introduction
The purpose of these recommendations is to protect ATM networks, their members and their cardholders, and ATM owners, from attacks designed to compromise sensitive data or defraud financial institutions and their cardholders. This protection takes into account not just the direct financial losses that may be incurred, but also the potential reputational damage and its impact on customer confidence in the ATM network and ATMs in general.
5.2
When developing and devising a Security Policy the following points should be taken into consideration: The level of security to be achieved should be commensurate with: the sensitivity of the data; the risk of the data being compromised; the impact of any compromise; the practicality and cost of providing the security measure.
The prevailing legal & regulatory framework should be adhered to. Information security controls should be compatible with relevant industry standards. All parties to a transaction on an ATM network should have implemented a formal Information Security management structure. And every member of an ATM network should establish responsibilities and procedures for managing security. All parties to a transaction on an ATM network should manage Information Security within their own organisations, and should be responsible for the protection of all sensitive information that they transmit.
13/10/2005
In addition, all network members should have implemented a Security Policy covering common areas such as: the network configuration required to protect the method by which the issuer authenticates the cardholder; protection of confidential data from unauthorised access; maintenance of data integrity.
Operating practice should be subject to regular internal reviews to ensure ongoing compliance with security policies and procedures. No individual should have the capability to access or ascertain the PIN or any plain text secret key. In any hierarchical cryptographic scheme, the hierarchy of the keys should be such that the encryption of the higher level key is always of at least the same strength as the key it is protecting. Where the same encryption algorithm is used, the length of the higher key should be at least as long as that of the lower key. Where different encryption algorithms are used, the principle that should be adopted is that the time taken for an attack shall be at least the same for the higher key as for the lower key
5.3
Each ATM network should provide an Information Security Policy for the network as a complete entity. Each ATM network should publish its own internal Information Security Policy covering its own responsibilities. Each member of the ATM network should publish a Security Statement describing the discharge of its responsibilities in the network.
5.4
Security Management
An information security infrastructure should be established to manage information security both within the organisation and at its interfaces. There should be a management framework to initiate and control information security within the organisation. Senior management should approve the Information Security Policy, assign clearly defined security roles, and co-ordinate the implementation of security across the organisation.
13/10/2005
In addition an ATM network should establish a Network Security Group to: review and recommend an Information Security Policy and overall responsibilities; monitor the networks exposure to major threats to information assets; review and monitor security developments; recommend initiatives to enhance information security; annually ratify an Information Security Standard; conduct periodic reviews, no more than 5 years apart, of the Information Security Standard and recommend enhancements when appropriate; be notified of any security or fraud incidents involving the network.
5.5
The objective of message security is to minimise the risk of fraud occurring within the ATM network, or other EFT systems, from the unauthorised disclosure of message data as it is transmitted through the network. Security classifications and associated protective measures should take account of the business needs for sharing or restricting data, and the business impact associated with unauthorised access or damage to the data. When considering security the following business needs should be taken into account: Availability: Integrity: the business need to have data available when required by the business, and the controls required to achieve this. the business need to control modifications to data, and the controls required to protect accuracy and completeness of data.
Confidentiality: the business need to share or restrict access to data, and the controls required to restrict access to the information.
5.6
Within each of the business needs discussed previously, that is Availability, Integrity, and Confidentiality, there are a range of classifications that can be applied to the different types of data involved. Additionally each piece, or type of data, will normally have a classification related to each of the business needs. For example: the Availability of transaction records may be classed as inconvenient, while their Integrity may be classed as strong (high), and their Confidentiality as restricted.
13/10/2005
Enhanced (Med Integrity): Data within the network that if corrupted, inaccurate, duplicated or deleted, either deliberately or accidentally, might lead the network to suffer from limited loss. Basic (Low Integrity): Data within the network that if corrupted, inaccurate, duplicated or deleted, either deliberately or accidentally, might lead the network to suffer from little or no loss.
Private:
Public: Restricted:
Data that is in the public domain or is intended to be accessible to all. Data that, if disclosed to parties not authorised to view it: Could result in legal action against the network. Could enable fraudulent acts to occur with the potential for financial loss to the network. Has strategic value and would severely disadvantage the network if disclosed in public or to rival organisations. Is sensitive within the network. Is operational information that should be viewed only by authorised staff on a need-to-know basis, e.g. code.
Secret:
Data not known to any individual, e.g. cryptographic keys, decrypted secure handshakes, sign-on control messages.
5.7
The responsibility for the confidentiality, integrity and transmission of the messages and the transaction data, should, in general terms, be with the originator of the message. A table outlining the recommended responsibilities in the various zones can be read in GASAs Best Practice for ATM Transactional Security, section 2.4, p.10.
5.8
In order to protect the confidentiality of transaction data the following is recommended: Cardholder specific transaction data should not be disclosed to third parties without the express agreement of the card issuer, unless requested by an approved regulatory body. The full Primary Account Number (PAN) should not be printed on transaction receipts at the ATM . No discretionary data from Track 2 should be printed on transaction receipts at the ATM. Line encryption is used between the acquirer or issuer host and the Network Switch.
13/10/2005
In order to safeguard the accuracy and completeness of the transaction data the following is recommended: Each transaction should be uniquely identified. ATMs and systems should be protected against replay attack. The ATM should be protected against unauthorised modification of the software or transaction data. The following is recommended to prevent unauthorised access to the network, and to audit data and other transaction-related data. Acquirers should take precautions to identify and prevent unauthorised connection of remote terminals to their networks. The recommendations for additional authentication should be reviewed periodically.
5.9
For details of how to ensure the correct operation of the security regime, please see section 3.4, p1.2 of GASAs Best Practice for ATM Transactional Security.
13/10/2005
Chapter 6
ATM Cyber Security
6.1 Outlining the Drivers for ATM Cyber Security
Financial institutions and ATM operators are replacing and upgrading aging Automatic Teller Machine fleets across the globe in order to satisfy regulatory and business imperatives. Regulatory requirements include the use of the Triple DES encryption algorithm, whilst business drivers include demands for increased functionality, enhanced customer experience and system integration to streamline management and monitoring. In order to satisfy these business and regulatory drivers, new platforms utilising mainstream technologies are being introduced which is busy altering the vulnerability landscape associated with this traditionally proprietary system. Basing the ATM channel on the Windows XP, and other common use, operating systems, as well as the TCP/IP network protocol suite, has created a new and different threat and risk profile for the industry. The use of proprietary technologies afforded ATMs a degree of defence against malware, hacking toolkits and utilities, denial of service attacks and other threats that have been used to exploit vulnerabilities in more prevalent operating systems and networks. Most modern ATMs are now running on operating systems and network communication protocols known by, and familiar to, the majority of computer users. As a result, they exist within the identical vulnerability landscape that the majority of computing systems and networks in use today experience, and are consequently exposed to many of the associated threats. The risk mitigation recommendations in this chapter are designed to address these new kinds of cyber threat.
6.2
The default installation of modern operating systems includes many components, packages or clusters. The selection of system components ultimately installed as part of an operational build can usually be made either during installation, post-installation, or both. However, as the majority of ATMs are delivered with a standard operating system build, the only opportunity to remove unnecessary packages is at post-installation. Only the components necessary for the normal operation of the ATM should be installed. The decision to remove a particular package needs to be analysed against the ATM vendors application requirements, and the acquirers management, monitoring and other operational considerations. Chapter 6: ATM Cyber Security - 47 13/10/2005
It is sound security practice to ensure that the operating system patch level meets the latest requirements prior to the ATM being deployed. This will require consultation with the ATM vendor and operating system software support staff and/or knowledge databases to determine applicability, operational impact and depth of regression testing. Any additional patches applied should be included as part of a standard build for multiple ATM deployments. It is possible that any patches or hot fixes applied to a customised, or hardened operating system may undo the system modifications. Pre-deployment patching should be undertaken prior to the introduction of these changes. Ongoing system patching is critical to risk management and security assurance throughout the lifetime of the ATM. A communication channel should be established between the vendor and the ATM owner/service provider to ensure timely notification of the existence of vulnerabilities and operating system or application patches. All system patches should be applied in a test environment prior to their implementation into the production fleet. Most commercial operating systems are designed to enable, and automatically start, a large number of various services that would not normally be required by an ATM. Only operating services necessary for normal operation of the device should be enabled and set to start automatically. The decision to disable a particular service needs to be analysed against the ATM vendors application requirements, and the acquirers management, monitoring and other operational considerations. Services should be run with the least privilege necessary. For details on recommended Operating System Security Policies for Windows XP, including security settings, please see GASA manual Best Practice for ATM Cyber Security, Section 1.4, pages 3-6. Certain events that relate to account access or operating system status should be configured to be captured in the system event logs. As a minimum, the following items should be audited. However, the ability to configure specific system auditing will be dependant on the ATM operating system: Account Modification track changes to the account database on the operating system. Specifically, capture account creation, deletion or modification (e.g. changes to group membership). Account Use track successful and unsuccessful attempts to logon onto the operating system. Privilege Use/Elevation track unsuccessful attempts to access privileged programs or gain elevated privilege level access (e.g. the use of the su command in Linux). Major System Events track system restarts, shutdowns or runtime mode changes.
System event logs should be protected from unauthorised modification or deletion by suitable access control lists or file permissions.
- 48 -
13/10/2005
6.3
Account Security
A typical operating system installation will include various system and user accounts (e.g. Guest) that are usually not necessary for the normal operation of the ATM. These accounts need to be locked, disabled or deleted depending on the operating system and the function of the account. The ATM operating system will also have a super user or administrator account, and if permissible, this account should be renamed to a unique account for each ATM. The account name and password should be released to authorised individuals as required for support purposes. If the introduction of unique administrator accounts for each ATM is determined to be operationally untenable, the passwords should consist of 14 characters, with complexity enforced. Accounts should be set to lockout after 3 failed logon attempts if the unsuccessful attempts occur within a 15 minute period. In environments where the password length is 14 characters with complexity enforced, it is reasonable to increase this lockout threshold to 5. The accounts should be locked out for a specific period of time, and it is recommended that this be set to 15 minutes. ATM application design should ensure that elevated account privilege levels are not required for normal operation. Any additional software installed to provide business or support enhancements should also abide by this principle. If the operating system permits, access to the desktop or command line shell should be denied to the runtime account. Depending on the operating system and application design, there may be one or more privileged accounts configured at the operating system level. The passwords assigned to these accounts should adhere to standard privileged account password security principles. Namely: Password Uniqueness each privileged account on each ATM should have a unique password. Password Complexity each privileged account on each ATM should have passwords that are a minimum of 8 characters consisting of letters, numbers, mixed-case and meta-characters. Additionally, the password should not match the account name.
- 49 -
13/10/2005
Password Ageing whilst it is recognised that all passwords should be subject to ageing, the frequency of password changes cannot be determined in isolation. When considering the lifecycle of a password, the following should be taken into consideration: Privilege level of account Frequency of use/access Administrative overhead/cost of actually implementing the password change Operational impact of implementing the password change
Password History configuring password history requirements will preclude a previously used password from being re-applied to a particular account. It is recommended that password history for privileged accounts be set to 12, which essentially prevents any of the previous 12 passwords from being chosen as the new account password. Password Storage All privilege level passwords should be stored securely and provided to administrative and support staff as required. Passwords should only be released to authorised personnel and the release recorded for audit purposes. Some ATM applications (e.g. Maintenance/Administrative Mode access, firewall software) may require passwords to be entered in order to gain access to the functions or configuration menus they provide. Access to these application menus should be treated as a privileged event, and the passwords that control access treated accordingly. The passwords should be changed from any default setting prior to deployment, and they should abide by the principles above.
6.4
Network Security
ATMs should be separated either physically or virtually from networks that provide general business connectivity. With physical separation, ATMs should connect to Host systems via dedicated network segments that are not shared by general purpose servers and workstations. There are several points along the communication path connecting the ATM with the host system that would permit the introduction of firewall enforcement points depending on the network topology. Access from within the general network to the ATM network should be controlled by the use of an enterprise statefull firewall. In situations where network architecture does not permit the use or introduction of a single (or several) firewall enforcement points on the internal network due to technical or business limitations, packet filters should be configured on the next hop perimeter router that provides TCP/IP connectivity to the ATM. Where ATMs share network infrastructure (e.g. remote ATMs on Branch networks), border router access control lists should be used to restrict access to the ATM from within the branch network if the traffic is passed through a suitable router.
- 50 -
13/10/2005
In environments where an ATM shares a VLAN with other branch traffic, the use of layer two (in TCP/IP terminology) controls, such as switch port security and static ARP mapping, should be employed to restrict intra-LAN access violations. Unused switch ports should be disabled until required for the addition of devices onto the network. Network HUBS should not be used due to the ability to capture network traffic and the lack of security features they provide. Some ATMs are being shipped with firewall capability either bundled with a 3rd party product, or as part of the actual operating system, and this should be enabled and configured irrespective of the extent of additional network enforcement points present or intended on the network. The design of any firewall ruleset or router access control list must be based on the principle what is not expressly permitted, is denied. The opposite position to this principle (what is not expressly denied, is permitted) if employed will render the protection afforded by the ruleset virtually null. Determine exactly what network addresses, protocols and ports are required to support the ATM in terms of transactions, management and monitoring; then deny everything else.
6.5
- 51 -
13/10/2005
Chapter 7
ATM Cash Security
7.1 Defining the scope of ATM cash security
This chapter focuses on ATM cash replenishment for CIT-Fill, Merchant-Fill and Bank Branch-Fill ATMs. It is acknowledged that security best practices need to be applied throughout the whole cash cycle from a Central Bank vault, through a cash processing centre (CPC), until the time the replenished cash cassettes are safely stored within the ATM, and any part-filled cassettes and sealed bags containing purged notes are safely removed from the ATM location and returned to a CPC or other secure location. However, for the purposes of this chapter the ATM cash replenishment which forms the basis of these best practices is defined as follows:
ATM cash replenishment is the process of loading an ATM with the required cash, from the point of entering the ATM zone to the securing of any replaced cash during its return to a secured area.
Using this definition this chapter covers the following four phases: securing the cash during the approach to the ATM securing the cash loading process securing the ATM after loading securing any replaced cash during its return to a secured area
The ATM Cash Security guidelines do NOT cover security at vaults or cash centres, and only touch on certain best practices relating to the commercial cash carriers. They cover the cash cycle from cross the pavement security to completion of the replenishment tasks at the ATM, and include delivery of cash, and cash counting best practices. They also discuss ATM security during 1st line and 2nd line maintenance 11 .
11 It should be borne in mind that the cash inside an ATM can also be at risk outside of normal cash replenishment and during first and second-line maintenance, when the service staff can have access to the ATM safe.
- 52 -
13/10/2005
7.2
Basic Recommendations
proper insurance is in place at all times covering public liability, personal accident and life insurance for staff members, and the insurance of the cash. any security measures put in place do not negate any procedures associated with fire and emergency, particularly in means of escape in case of fire. as a minimum, the manufacturers instructions should be followed with regard to the filling and operation of cassettes, and with regard to the usage and operation of safes. any local banking rules with regard to the issue and storage of cash are followed. any local laws and regulations regarding safety and security requirements are adhered to.
7.3
The ATM cash cycle extends through the following phases: Bulk cash collection and delivery phase; during which the cash is collected from a bank, or a secure non-bank vault, and transported to a CIT branch, to a CPC or to a bank branch. Cash packing phase; when the cash is counted, balanced, packed and secured into cassettes or sealed bags (if to be transported and depending on the service requirement). Cash-in-transit (Distribution) phase; where the cash is collected from a CIT branch or CPC and transported to the ATM zone. Securing the approach to the ATM zone; during which the approach to the ATM and the cash is secured. Cash loading phase; when the cash is loaded into the ATM. Post-loading securing of ATM; during which the ATM is secured after loading and the cash balanced. Securing any replaced cash; during its return to a secured area Some of these phases are discussed in the following sections.
- 53 -
13/10/2005
12 It should be noted that the cash exchange and add cash methods are generally only conducted in developing markets or where a short-term shortage of cassettes necessitates the cash exchange or add cash method be used as a temporary emergency measure, normally with extra security in place. The cash exchange and add cash methods are NOT considered to represent best practice and are considered high risk by CIT companies as they require staff in the field to directly handle cash, generally without adequate CCTV coverage and management.
- 54 -
13/10/2005
If the service is add cash 13 , the cassettes are removed from the ATM and topped up with replenishment notes according to the agreed value. On no account should any cash be placed in the ATM outside of the cassettes (commonly known as side cash or excess cash for the purpose of future cash addition). For all the above services a statement is subsequently issued to the customer.
7.4
At no point along the cash cycle, including at transition points from one phase to another (for example, in the transition from the CPC to the transit route on the way to the ATM) should there be any doubt as to whom is responsible for the security of the cash. It is imperative for cash suppliers, cash carriers and ATM owners to sign contractual agreements that clearly define the liability switch between the different parties, as well as cash management service level agreements (SLAs), which cover the attribution of responsibility for cash security along the whole cash cycle. Proper insurance cover should be in place throughout the ATM cash cycle.
13
- 55 -
13/10/2005
7.4.1 CIT-Fill
In general, the following responsibilities for cash security should be allocated and stipulated in contractual agreements: The cash suppliers are responsible for counting, allocating, packing and securing the cash drawn from the cash centre, bank vault or secure non-bank vault. A signing-off process should take place between the cash suppliers and cash carriers. The cash carriers are responsible for the cash from the moment the signing-off procedure has been completed, even before they leave the cash centre, bank vault or secure non-bank vault. The cash carriers are responsible for securing the approach to the ATM zone. The cash loaders are responsible for (a) the secure loading of the ATM (b) the securing of the ATM after loading and (c) cash balancing. Any difference in cassette balancing will be subject to a dispute resolution process. The responsibilities for cash management and dispute resolution during this cycle should be included in the contractual agreements but fall outside the scope of these best practices. It should be noted that the procedure for determining how notes are recognised and dispensed vary by ATM Type. Some ATMs must be set based on cassette position in the Dispenser Rack (eg $50 notes will always be in Slot 1 and 2, $100 notes must be in Slot 3 and 4), whilst other ATMs may use a system that identifies the denomination in the cassette based on settings within the cassette, meaning that the cassettes can be positioned on any slot in the dispenser. Where the latter applies, contracts should specify who is responsible for setting and checking the cassette denomination setting - either the CIT company, Bank or ATM vendor providing second line maintenance.
7.4.2 Merchant-Fill
The following responsibilities for cash security are normally in place, working on the assumption that the merchant or retailer owns the cash inside the ATM: The merchant is responsible for counting, allocating, packing and securing the cash drawn from his till or safe. The merchant is responsible for securing the approach to the ATM zone. The merchant is responsible for (a) the secure loading of the ATM (b) the securing of the ATM after loading and (c) cash balancing. It is recommended that the merchant empties the ATM of all cash at the close of each business day and leaves the safe door visibly open. The merchant is responsible for meeting any requirements for note quality and counterfeit detection of loaded cash. Chapter 7: ATM Cash Security - 56 13/10/2005
7.5
Throughout the ATM cash replenishment process it is recommended that the following safe operating procedures are in place: Clearly defined and communicated roles and duties of each employee. Checklists in place to be followed by staff before each phase. Appropriate and regular testing of all safety features such as duress alarms and communication devices. Regular inspection of all equipment used, particularly personal protective equipment. Variations in timings (and routes where applicable). Clearly documented procedures to cover all aspects ATM cash replenishment, and staff to be adequately trained to follow them.
7.6
Although cash management as such falls outside of the scope of this manual, cash security covers both physical security during the cash cycle as well as financial security. An audit trail provides information that allows for random inspections to take place to check that no fraud or inaccuracies have occurred during the cash cycle. Losses due to internal fraud and insider collusion pose a significant threat to the industry.
- 57 -
13/10/2005
To make the cash cycle susceptible to a financial inspection of this nature, financial records, statements, reports and all paper work should be completed at defined points in the cash cycle. In addition it should be borne in mind that the cash may also be exposed during ATM servicing and maintenance. Ideally electronic locks should be used to enable all user access to the ATM to be traced, to allow one-time access codes to be issued and for dual control purposes. In addition track and trace technology can be used to quickly and effectively scan sealed bags and ATM cassettes through the cash cycle. As a minimum, the following paper work should be completed in order to provide adequate information for audit trails: Bulk cash collection and delivery phase The cash suppliers should provide the cash carriers with a signed and dated statement of the amount of cash that was collected, with the figures checked by the cash carriers against the statement. The cash in transit branch or CPC should issue a dated and stamped receipt to the cash carriers after the cash has been received and counted. Cash packing phase The CPC or CIT branch should issue the cash carriers responsible for the distribution phase with a statement of the amount of cash paced into the cassettes or sealed bags, and the number of cassettes or sealed bags, which the cash carriers should verify before the cassettes or sealed bags are closed, secured and packed. Cash-in-transit (Distribution) phase If using track and trace technology the sealed bags and/or ATM cassettes should be scanned into and out of the vehicle. Cash loading phase The ATM owner should receive and date stamp a copy of the statement from the cash packing phase. An electronic audit trail will also be in place if electronic locks are used on the ATM safe. Post-loading securing of ATM The cash loaders should produce a signed and dated statement after the loading has been complete and the cash balanced Reconciliation phase - The cash loaders statement of: total cash amount inserted into the machine during the previous replenishment and physical cash remaining in the cassettes and purge bin at the time of replenishment.
Should be reconciled with the Electronic Journal or Journal Printout to confirm that the record of cash withdrawn and purged balances with the cash remaining in the machine. If the records match then that replenishment cycle can be closed. In general, each statement or report or receipt should be completed in triplicate so that each party to the replenishment process across the cash cycle cash supplier, cash carrier and cash loader can receive copies of each transaction between each party to the process. For more details of how to set up audit trails for the ATM cash cycle please see Chapter Two of GASAs ATM Cash Security Manual. Chapter 7: ATM Cash Security - 58 13/10/2005
7.7
The Threats to personnel operating in this zone (and to members of the public in the immediate vicinity) include the following: Attacks on the vehicle (if CIT-Fill), which could include holding a crew member on the pavement hostage to demand access. Attacks on staff crossing the pavement and/or on other approach routes to the ATM. The use of firearms and other offensive weapons against personnel.
- 59 -
13/10/2005
Adequate security cover for securing the outer ATM zone should include: The completion of advance risk assessments to establish a risk rating for the zone. Prior reconnaissance of the outer zone to search for signs of criminals or suspicious individuals in the vicinity. Taking due regard for staff and public safety. Parking the vehicle as close as possible to the ATM location (for CIT-fill) and having a suitable drive away policy in place.
Additional security measures and precautions during this phase could include: Use of an intelligent end-to-end ink staining system to seamlessly protect the cash inside cassettes from CPC to ATM (CIT-Fill). Use of a smoke box to protect bagged cash while in transit across the pavement (CIT-Fill). Use of a portable alarm (911 in the US). Minimising the visibility to the public of the cash boxes being moved as the cash replenishment team approaches the ATM zone. Separating the cash carrying function and the protection function. For CIT-Fill, discussions with the customer in order to provide, where possible, extended time/day delivery periods providing greater flexibility and security (random delivery). For Merchant-Fill and Bank Branch-Fill, the use of site security staff, if available, to escort the cash loaders to and from the ATM. Carrying of firearms, stun guns, batons or other weapons (depending on local legislation and requirements). Wearing of bullet proof jackets by the cash replenishment team (depending on local legislation and requirements).
It must be borne in mind that specific threats to personnel operating in the inner zone will depend on the type of ATM installation (lobby type or through-the wall, inside bunker/kiosk or free-standing etc). Threats to personnel operating in this zone include the following:
- 60 -
13/10/2005
Attacks on staff while accessing the safe (possibly using duress tactics). Attacks on staff while engaged in cash replenishment and associated operations. The use of firearms and other offensive weapons against personnel
Adequate security cover for securing the inner ATM zone should include: Prior reconnaissance of the inner zone to search for signs of criminals or suspicious individuals in the vicinity, including a check of the ATM fascia and surrounds for any signs of interference. Where possible sealing off the ATM area during replenishment to create a secure inner zone (it is recommended that doors to the ATM site area are kept locked throughout cash replenishment and ATM servicing operations). Awareness of the presence of legitimate parties such as ATM maintenance personnel. Separation of loading and protection functions. Sufficient lighting of the ATM and its immediate area. Keys to the premises must be closely controlled by all parties (in order to define responsibility the person having control or custody of those keys must sign for them upon taking possession). For CIT-Fill, staff identification procedures when staff are accessing a site where there is some form of perimeter security and where site security staff are present. For Merchant-Fill, ensuring that the ATM is not clearly visible from the street or other external area.
Additional security measures and precautions during this phase could include: CCTV coverage of the ATM and its immediate surroundings. Use of an intelligent end-to-end ink staining system to seamlessly protect the cash inside cassettes during transit and cash loading (CIT-Fill). Use of locking bars (or other cassette locking mechanisms) to fully expose only one cassette at a time during cash replenishment. Duress procedures to covertly alert authorities to a robbery/attack in progress that will not increase the risk to the replenishment staff. Personal attack alarm buttons to be installed within ATMs located in public areas. These devices to remain live when the alarm system is unset [to be used as a last resort]. Personal attack alarm buttons installed in non-public areas (if the ATM is sited in a kiosk or technical room) [to be used as a last resort]. Properly briefed site security staff in attendance. For Merchant-Fill, avoiding busy times of the day and conducting replenishment when the store is empty of all customers.
- 61 -
13/10/2005
7.8
Times at which replenishment takes place at any given ATM should never follow a predictable or repetitive pattern. Predictability is the enemy of security. It is recognised that replenishment windows can be limited, particularly for CIT-Fill ATMs, but it is recommended that timings are as widely varied as possible. In addition, it is recommended that, for CIT-Fill ATMs, the sequence of replenishment visits is also varied and that the crews are tasked to routinely change the order in which they visit ATM sites.
14
- 62 -
13/10/2005
Additional security measures and precautions during this phase could include: Use of a portable alarm (911 in US). Separation of cash balancing AND cash loading functions. Use of an end-to-end note degradation systems to protect the cash (CIT-Fill).
In addition unscheduled FLM visits may also be carried out at the customers request, normally when a fault has been reported. In this context FLM is defined as an intervention to bring an ATM back into service that requires no tools or parts. In the majority of occasions this unscheduled FLM does involve opening the ATM safe. When conducting such operations the ATM must either be free of cash, or the same security procedures as for a cash exchange should be followed. The security and integrity of the system is greatly enhanced in this case if the Cassette Swap method is used, as the uniquely numbered Tamper Evident Seals affixed to the cassette at the CPC can later be checked to confirm that the cassette was not opened during the FLM visit.
- 63 -
13/10/2005
If the staff conducting FLM are not professional security staff, then they should undergo security awareness training which should highlight the risks to themselves, to others, and to the cash whilst performing FLM.
For guidelines for effective partnering with cash security stakeholders, please see Chapter 6 of GASAs ATM Cash Security Manual. The essence of a partnership is not simply to produce, together, optimal business results, but, rather, to hold one another accountable at all times to the inseparable standards of integrity and professionalism.
- 65 -
13/10/2005
Acknowledgements
Lachlan Gunn, BenAlpin Ltd Janet Edwards, Technical Editor The Global ATM Security Alliance
Disclaimer
IMPORTANT: The ATM Industry Association ("ATMIA") is a nonprofit corporation, incorporated in the State of Delaware, which is exempt from federal taxation under Section 501(c)(6) of the Internal Revenue Code. This publication, the ATM Lifecycle Security Manual, has been developed in furtherance of ATMIA's nonprofit and tax exempt purposes to enhance the efficiency and effectiveness of modern corporate governance in light of perceived mores and best practices espoused by certain individuals and entities. ATMIA has taken reasonable measures to develop this publication in a fair, reasonable, open, unbiased, and objective manner for the purpose of providing information and guidance to those in the ATM industry with respect to corporate governance in the Twenty First Century. This publication has been developed in compliance with all applicable ATMIA policies, including but not limited to its anti-trust policy. The nature of appropriate practices or guidance is likely to change over time and with developments in business, technology, and the laws of the various countries where ATMIA members and others in the industry conduct their businesses. ATMIA cannot guarantee the accuracy, completeness, efficacy, timeliness, or other aspects of this publication. ATMIA cannot assure compliance with the laws or regulations of any particular country and does not represent that the information in this publication is consistent with any particular principles, standards, or guidance of any country or entity. Use of this publication and any information provided is voluntary, and reliance should be undertaken only after an independent review by the user. There is no effort or intention to create a standard for business activity. The principles described in this publication are aspirational and reflective of one or a few individual perspectives, but are not conclusive of any appropriate or legal business behavior. Inclusion of material in this publication does not constitute a guarantee, warranty, or endorsement by ATMIA regarding any guidance, methodologies, or preferences for conducting business, implementing any standards, or enhancing security, and does not constitute any guarantee, warranty, endorsement, or sponsorship of or by any person or company that may be referenced in the document. Further, neither ATMIA nor its officers, directors, members, employees, or agents shall be liable for any loss, damage, or claim with respect to any such documents, work, or services; all such liabilities, including direct, special, indirect, or consequential damages, are expressly disclaimed. Information provided in this publication is "as is" without warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or freedom from infringement. The name and marks ATM Industry Association, ATMIA, and related trademarks are the property of ATMIA. 2005 ATM Industry Association. All rights reserved.
- 66 -