Tag Archives: mas trm guidelines

CryptoAuditor – Don’t Let a Trusted Insider Become an Exploit

As the inventors of the SSH protocol, SSH Communications Security is focused on helping organizations of all types and sizes secure the path to their information assets. CryptoAuditor is a transparent and centralized real-time privileged access monitoring and auditing solution that … Continue reading

Crypto Auditor , , , , , ,

Encrypted Channel Monitoring – Crypto Auditor

Crypto Auditor is a centrally managed inline appliance or virtual appliance which has the ability to monitor, audit and control encrypted SSH, SFTP and RDP sessions without having to deploy agents or change end user experience. The centralized management architecture … Continue reading

Crypto Auditor , , , , , , ,

SCB – Shell Control Box – Managing

Fine tuned access control to the SCB configuration and audit trails The roles of each SCB administrator can be clearly defined using a set of privileges: manage SCB as a host; manage the connections to the servers; view the audit … Continue reading

Shell Control Box , , , ,

SCB – Shell Control Box – integration

Features and Benefits SCB is independent from the servers and clients, and difficult to compromise Easy integration into your existing infrastructure Supports High Availability Available as a VMware virtual appliance SCB is independent from the servers and clients, and difficult … Continue reading

Shell Control Box , , , , , ,

Customer protection and education

Overview Direct attacks on online financial systems have caused customer PINs to become increasingly vulnerable. Through targeted attacks, customer PINs are under constant threats from various types of systems vulnerabilities, security flaws, exploits and scams. The FI should ensure that … Continue reading

MAS Technology Risk Management Guidelines ,

Access control

Three of the most basic internal security principles for protecting systems are: Never alone principle – Certain systems functions and procedures are of such sensitive and critical nature that FIs should ensure that they are carried out by more than … Continue reading

MAS Technology Risk Management Guidelines , , , ,

Data centres protection and controls

As FIs’ critical systems and data are concentrated and maintained in the DC, it is important that the DC is resilient and physically secured from internal and external threats. Threat and Vulnerability Risk Assessment The purpose of a Threat and … Continue reading

MAS Technology Risk Management Guidelines ,

Operational infrastructure security management

The IT landscape is vulnerable to various forms of cyber attacks8, and the frequency and malignancy of attacks are increasing. It is imperative that FIs implement security solutions at the data, application, database, operating systems and network layers to adequately … Continue reading

MAS Technology Risk Management Guidelines ,

Systems reliability, availability and recoverability

The reliability, availability, and recoverability of IT systems, networks and infrastructures are crucial in maintaining confidence and trust in the operational and functional capabilities of an FI. When critical systems fail, the disruptive impact on the FI’s operations or customers … Continue reading

MAS Technology Risk Management Guidelines , , ,

IT service management

A robust IT service management framework is essential for supporting IT systems, services and operations, managing changes, incidents and problems as well as ensuring the stability of the production IT environment. The framework should comprise the governance structure, processes and … Continue reading

MAS Technology Risk Management Guidelines ,