Information Security Manual For Safe Usage of IT
Information Security Manual For Safe Usage of IT
Published by -
Corporate Centre,
Information Technology has become integral part of the Operations in the Bank and
as such use of IT for bringing in operational efficiency is bound to increase. All
employees are end users of IT.
Reserve Bank of India in its circular issued in April’2011 has categorically defined the
Roles and Responsibilities of end user. The responsibilities include –
Bank also has regulatory obligation to provide adequate capital towards Operational
Risk. IT Risk is one form of Operational Risk associated with the use of IT in the
Bank. IT related events like fraud, downtime, hacking, data leakage etc. can
potentially impact the business.
We being the end users of the IT should be aware how to safeguard ourselves and
in turn the Bank from untoward IT related incidents.
Therefore to bring basic awareness about information security in day to day usage of
IT, our Information Security Department (ISD), Corporate Centre has brought out
handy booklet on IS prescriptions.
I hope you will find the document simple to understand. I expect that all employees
of the Bank follow the prescriptions therein, in day to day operations, which should
bring down IT risk in the Bank.
Visit ISD website at State Bank Times > Departments 1 > Information Security
*** Policy Section 1.3 “Acceptable Usage Policy” & Policy Section 1.4 “Social
Media Usage Policy” are most important for End Users and mandate to follow
security standards on below areas –
Integrity &
CIA Triad
Availability
of Data & Services
Compromise of any or all of the above would have negative impact on Confidence,
Interest and trust of our Customers, Share Holders, and Regulators (like RBI) in the
Bank.
Any laxity in ensuring CIA would result into negative feedback, negative publicity in
media, by word of mouth, litigation, penalty, dent in Brand Equity etc.
Bank also has internal mechanism to monitor, correlate, analyze and investigate the
users’ activities to catch hold the culprits and take punitive action, as the case may
be.
The Bank has put in place Robust and Agile Information Security (IS) framework in
line with the Business strategy and emerging Risks.
The Information Security Dept. headed by General Manager and Group Chief
Information Security Officer (GM & Group CISO) reports to the Head of the
Risk (i.e. DMD & CRO) through CGM (Risk Management) and not to the Head
of the IT.
The GM & Group CISO also reports to the Information Security Committee of
the Bank, which is headed by Managing Director & Group Executive (National
Banking).
The “IS Policy, IT Policy and related Procedures and Guidelines” is approved
by the Board. The same is reviewed periodically.
c. Technology –
The layered security technologies are deployed to secure Bank’s setup from
attacks from Perimeter and from within the Bank.
Technology enabled the Bank to provide access to users on “Need to Know”
and “Need to Have” basis.
Various Security Tools / Technologies like Firewalls, Intrusion Detection /
Prevention Systems, Web Application Firewalls, Anti-virus, Active Directory
Setup, Biometric Authentication System, Internet Proxy Gateway, Patch
Management system, Privileged Identity Management, Anti-Phishing etc.
have been deployed.
The SBSOC has been setup for Real-time Monitoring, Analysis, Correlation
and Incident Management based on the logs generated by IT Assets.
The SBSOC has capabilities to monitor users’ activities like Internet usage
(how much time spent on internet, which websites visited etc.), virus
infection on PCs / Servers, which programs installed on desktops /
servers, wrong login attempts (password guessing) and other unauthorized
activities. The SBSOC thus has forensic capabilities.
e. Global Accreditations –
Bank has achieved various Global Accreditation like ISO 27001 for
Information Security Management Systems (ISMS), ISO 22301 for our
Business Continuity Management System (BCMS), Payment Card Industry
Data Security Standards (PCI DSS) and SSAE 16 for critical applications / IT
Setup & related operations
f. IS Awareness –
Office desktops / PCs contain critical and confidential data and files. Depending on
the role, it could contain customer information like their contacts, loan / deposit
account details, inspection reports, office Notes, Policies, Circulars, Board /
Committee Notes, Disciplinary Actions etc.
Every new Desktop / PC / Windows Server deployed in the Bank must be brought
under Active Directory and Anti-virus be installed immediately.
For security of your desktop, following minimum basic but important practices should
be followed –
Many times icon may not be displayed in the task bar due to settings
made in Windows to display icons .You may then check the same by
following steps:
Click on Start icon in the left side of the task bar – Select all
programs option – search for Trend Micro Office Scan Client option. If
the same is present click on it, you will find following options:
Latest
pattern file
Active Directory disables USB & CD / DVD drive on PCs, Users should also not
connect pen drive, dongle, data cards, cable internet, modem etc. to PC. Use of
CD-ROM, DVD is prohibited.
Users should not access or download personal music, video files etc.
Users should get their desktops formatted/repaired by designated AMC service
providers under supervision of State Bank personnel. Users should not attempt
to fix the hardware or software related problems on their own. It might make
warranty / guarantee VOID.
Users on whose PC / Server such software runs shall be solely responsible for
Copyrights / IPR violation, Legal and Penal actions as per IT Act etc.
and inland letter / postcard, Banking platform and will not be exaggeration if we say it
is incidentally used for making calls.
With so many activities being done by a mobile device, security of mobile and
portable devices is all the more necessary, because of following reasons –
These are used on the move – like when travelling, in public places, home,
office etc. and also prone to misplaced / loss.
- Portable device users should be responsible for the security of their device
and the information it contains.
- Users should not connect their personal laptops or mobile devices to State
Bank's Network.
Personnel, to whom State bank owned laptops or any other Portable devices are
issued, are responsible for its safe custody.
Employees shall not loan their laptop or allow it to be used by others such as
family and friends.
Laptops, if required to be left in the office at the end of the workday, shall be
locked in a secure manner.
All mobile computing devices should be tagged with the contact details of the
associated user. Where possible the asset tagging should not identify the device
c. Password security
Users are responsible for all activities originating from their User credentials.
Own name, short form of own name, own initials, names of family, friends, co-
workers, company or popular characters, own date of birth / telephone number /
own vehicle number are easily guessable by others and therefore should be
avoided in password.
Strong Password
There would be similar settings in other browsers which can be used to disable
the feature of remember password.
Various websites also offer to remember password. It is recommended to not opt
for it.
Users owning the email account are fully responsible for the content of email
originated, replied or forwarded from their account to other users within or outside
the Bank.
Email sent from Bank provided email ID is as good as letter on Bank’s
letter head.
Bank may intercept or disclose or assist in intercepting or disclosing Email
communications to ensure that email usage is as per Bank’s IS Policy.
User communications should not be considered private as also not send
inappropriate contents.
Please note that digitally signed doesn’t means that scanned copy of signature is
pasted in the mail body.
Digital Signature is a mechanism
by which the sender encrypts the
message by using “Public” key of
intended recipient. The recipient
applies own “Private” key to
decrypt the message.
In this process “Non Repudiation”
is ensured.
Users should not access State Bank's email account from insecure internet
connection like open Wi-Fi, public hotspots, insecure cybercafé etc.
Users should promptly report all suspected security vulnerabilities that they notice
with the Email account to authorized personnel.
Archive emails file stored locally on the user’s machine should be protected by
password. In the Microsoft Outlook it can be done by following the options in the
menu “Tools->Options->Mail Setup Tab->Data Files Tab”. Select the file to be
protected by password and click on “Settings” button. Click on “Change
Password’. Change the password.
When the email id, contact information is given on various websites, surveys,
conferences, hotels, magazines etc. they might share the same with their
partners, their sister concerns and likewise the chain gets extended without any
limit. These email IDs and contact information might land in unscrupulous
elements (domestic and foreign) and thus get added in emailing / SMS list. Thus
people whose contact information gets into their hand, would start receiving
various offers via emails / SMS and even social engineering emails like Phishing
etc.
SPAM emails are unsolicited bulk email and sent to numerous recipients
informing potential victim about having won lottery, receipt of Goods, recruitment,
custom clearance, business partnership, update Bank account information due to
security reasons etc.
e. Internet Usage
Authorised Users should access Bank’s Internet for business purposes and
restrict non-business activities over Internet.
Bank has Corporate Internet Proxy setup. This setup is protected by firewall
which prevents any connection from outside the Bank to inside system. This
setup also secures our systems from viruses and malicious contents from
entering into our systems.
Users should adopt a clean desk policy for papers, disks and other
documentation.
Obsolete documents/papers should be destroyed/shredded using secure
measures. Expired and bad storage media should be destroyed before
disposal.
Paper Shredder
Users who have been authorized to use the Smart Cards or Private Keys
should safeguard them.
No User should transfer customer information classified as confidential such
as (Name, account details, balance etc.) to any person/place internal or
external to State Bank.
No confidential information and mails related to staff/ Suppliers/ customer
/State Bank should be put on office notice boards or posted onto Internet.
Information classified as confidential shall only be accessed when authorized
by Competent Authority as also be disclosed to named individuals. Proper
measures should be taken avoid unauthorized or accidental disclosure.
Confidential or secret information should be disclosed to other State Bank
Group Company only after the written permission of the Competent Authority
owning the information.
Secret or confidential information could get revealed unintentionally due to
unsafe practices. Care should be exercised in the following scenarios to
protect sensitive information -
Reading confidential documents in public places
Discussing confidential information in public places
Working on laptops in public places
Social media has made inroad into our daily routine life. Facebook, LinkedIn,
WhatsApp, Instagram, Twitter, YouTube, Blogs, Chats, Discussion Forums,
Gmail, Yahoo mails etc. are used to communicate with masses / groups like
friends, relatives, colleagues in one go.
Employees should adhere to all of State Bank's policies/instructions at all times,
whether blogging and social networking for business or personal reasons, via
State Bank's computer system and accounts or user's own private accounts and
personal devices.
Even in case of personal profiles on Facebook, Twitter, LinkedIn, YouTube etc., if
privacy filters are not set properly, the contents can be seen, downloaded, and
shared by public in general.
Bank has social media presence in the form of its own Corporate Website, has
presence on Facebook, Twitter and YouTube.
Bank also has in-house Social Media facility called “SBI Aspirations” which can
be used for sharing Views, Ideas, Discussion Forums, Chats, Blogs and much
more. Our Top Executes extensively use this media for communicating and
connecting with employees. Most of the features as available in Facebook,
LinkedIn are also available in SBI Aspirations.
Employees should ensure the following in Internet sites or Social Media or Social
Networking Sites –
Not to directly or indirectly disclose / refer State Bank’s Name, Logo, URL, Email
Address, Contacts, Own Official Capacity.
Not to directly or indirectly disclose / refer / criticise Bank or Bank’s Officials or
Customers.
Not to Disclose / Refer Bank’s Circulars, Business information, Official Papers,
Contents of Bank’s internal or internet facing websites.
Not to post/express their views / opinion in the official capacity of the Bank.
Not to engage in collusive behaviour with State Bank’s competitors or employees.
Not to canvass for any donation, lottery or supplier marketing/business
promotional activities/affairs.
If under the circumstances, employee’s connection to the State Bank is apparent,
then users should write in the first person (I, me, my, mine, myself) i.e. on writing
on own behalf not speaking / writing as an authorized Bank’s spokesperson.
It was observed that Bank’s officials shared confidential information like circulars,
business decisions, meeting agenda, scanned copies, recorded messages etc.
through WhatsApp, published on internet based websites, posted on Facebook,
Twitter and groups. This is fraught with the Risk and against Bank’s confidentiality
norms.
Users might get addictive to Social Networking Sites and Apps and thus valuable
time would be lost on these sites. Further, during the course, users might unwittingly
/ inadvertently share personal and official confidential information. Such users might
also become victim of Social Engineering attacks.
Various websites like Google provide free storage space on their Cloud. Cloud has
security concerns like privacy and integrity. Uploading private contents, photos,
documents on such free storage on the cloud is also fraught with risk.
Less you divulge and more you are secured in virtual world of Social Networking
Sites and Channel.
All employees and external party users should return all of the state bank's
assets in their possession upon termination of their employment, contract or
agreement.
End users provided with Electronic / Digital Certificates should carefully read and
comply with prescriptions in “Policy Category 4 – Cryptography” of IS Policy.
For premises that require access cards for access, it is mandatory for all
employees, trainees, and supplier personnel to use one’s own access card
issued by State Bank for entering and exiting the facility.
Tailgating (entering access controlled doors without swiping one’s card) is strictly
forbidden.
Employees visiting other offices shall carry and display their identity cards.
Every employee, trainee and supplier personnel, who has been issued an access
card by State Bank should immediately report loss or theft of card to the issuing
authority.
Visitors in State bank's premises (other than public areas / reception areas /
designated visitor areas) should be escorted at all times by a State Bank's
Employee.
Supplier support personnel should produce a letter on the company letterhead
stating that the person is an employee of the company and assigned to work with
the Bank. Supplier support person should produce their employee id card or any
acceptable identity proof for identification.
All personnel entering the premises should declare, if they are carrying any IT
equipment like mobile, pen drives/hard disk or any portable storage media, or
laptop. If anything needs to be taken out that should be informed in advance to
the guards by respective authority.
a. Internet Banking –
Avoid using Internet Banking in Public Places, Cyber Cafes or if you have
suspicion about the system.
There are malwares like Key loggers, Spywares, Trojans etc. which can
reside on the PC / Desktop / system which can capture / record the keys hits
on keyboard connected to it.
b. ATM –
ATM Card should be kept securely and should not be given to others.
ATM PIN should be kept confidential and even should not be written; instead
it should be memorised. Keep the card details confidential.
ATM PIN should not be vehicle number, digits in Date of Birth or easily
guessable numbers like 1111, 2222, 1234, 9876, 4567 etc.
Register your mobile number with the Bank. In case of Card Not Present
transactions i.e. for payment using Debit Cards on eCommerce websites,
OTP has been made mandatory. OTP is sent on registered mobile number.
Transaction alert is also sent on the registered mobile number.
Customer having Internet Banking can change “ATM Card
Limit/Channel/Usage Change”. After logging in click on eServices Menu-
>ATM Card services-> ATM Card Limit/Channel/Usage Change.
At Point of Sale (PoS), the debit card should be asked to swipe in your
presence and the PIN should be entered by you by hiding keypad.
Magnetic stripe based cards are vulnerable to Skimming i.e. copying card
information. Places like Petrol Pump, Restaurants etc. are vulnerable places
where this can happen. Frauds like mobile top up, lucky draw etc. if card is
swiped are examples of card skimming.
Skimming devices can be fitted at the card inserting slot on ATMs, like below.
These devices can be used for copying card data from magnetic stripe.
c. Mobile Banking –
State Bank Anywhere a secured and robust mobile application based for
Android, Apple and Blackberry mobile phones. The following measures are
put in place to protect our esteemed customers.
In this type of attacks, the fraudsters lure / appeal the potential victims to gain
confidence to reveal confidential information and use the same for fraud, system
access etc. Examples are like –
Phishing
Above websites looks like our Bank’s Internet Banking website. However,
please note following –
6. Facts
Nine out of ten employees would unwittingly open or execute a dangerous
virus-carrying email attachment
Two-thirds of security managers felt that the overall level of security
awareness is either inadequate or dangerously inadequate
Nine out of ten employees revealed their password on request
These things don’t happen as a result of malicious intent, but rather a lack
of awareness of Security Risks.