GSMA SAS SM Self Assessment CSPs v1.4
GSMA SAS SM Self Assessment CSPs v1.4
Auditees are expected to review this workbook, together with the following:
- FS.08 SAS-SM Standard,
- FS.09 SAS-SM Methodology,
- FS.18 SAS Consolidated Security Requirements and Guidelines
And for remote audits:
- FS.09C19 SAS-SM Covid-19 Methodology Variations v1_3
Supporting documents:
- SAS-SM audit analysis
- Cloud Deployment of Subscription Management Solutions - Guidance for SAS-SM Auditees
This workbook does not replace the need for the auditee to have a full understanding of the SAS documents.
For remote audits, as this phase will be undertaken offline, the auditors need to understand how you have addressed each
that you have to ensure compliance with the FS.18 Consolidated Security Requirements and Guidelines).
To be completed:
Auditee Preparation Worksheet columns F and G.
Document List columns F and G (for those documents marked with a 'Yes' in column D)
To be completed:
Auditee Preparation Worksheet columns H-K, and M
Document List columns F and G (for those evidences marked with a 'Yes' in column F of the Auditee Preparation Workshee
GSMA FS.18 SAS Consolidated Security Requirements and Guidelines (CSRG) version 8.0
Sub-Sect
Section Sub-Sec Req.
Desc
3.2.2
Description
Employees shall understand and have access to the policy and its
application should be checked periodically.
(i) Responsibilities that fall within the scope of the auditee’s SAS
certification shall be clearly documented and agreed.
Employees shall read the security policy and record their understanding
of the contents and the conditions they impose.
Clear exit procedures shall be in place and observed with the departure
of each Employee.
Clear entry procedures and policies shall exist which cater for the rights
of Employees, visitors and deliveries to enter the SP. These
considerations shall include the use of identity cards, procedures
governing the movement of visitors within the SP, delivery/dispatch
checking procedures and record maintenance.
Access to each secure area shall be controlled on a ‘need to be there’
basis. Appropriate procedures shall be in place to control, authorise,
and monitor access to each secure area and within secure areas.
PKI certificate private keys shall only ever be installed and used for
signing at sites:
(i) That are agreed with the GSMA.
(ii) That are SAS certified with the appropriate scope.
(iii) In accordance with the certificate policy.
PKI certificate key pairs shall only ever be transferred and installed to a
different operational site:
(i) With the prior agreement of the GSMA.
(ii) Where the new operational site is SAS certified with the
appropriate scope.
(iii) In accordance with the certificate policy.
(iv) By a mechanism that ensures an appropriate level of security for
the transfer of the sensitive assets.
Where auditees make use of the same PKI certificate private key at
multiple sites, in addition to the requirements of 6.6.2 and 6.6.3:
(i) A single, nominated, site within the auditee organization shall be
responsible for control and issue of the certificate key pair.
(ii) All transfer of certificate private keys shall originate from the
nominated site.
(iii) Controls shall be in place to prevent certificate private keys being
transferred except under the control of the nominated site.
(iv) All transfer of certificate private keys shall be recorded and
auditable.
The auditee shall only use an HSM that is managed by an SAS certified
data centre or cloud region.
In addition to the requirements of 2.4.2, the specific responsibilities
assignment shall be documented and agreed between the auditee and
the CSP managing the HSM.
Remote access controls secure the connection from the remote user to
the target environment. All operations carried out across the remote
access connection shall enforce an equivalent security level to
corresponding activities conducted locally on-site.
Remote access carried out other than according to 10.4.3, 10.4.4 and
10.4.5 shall not normally be accepted at SAS certified sites.
Where auditees wish to utilise other solutions as exceptions to those
normally accepted they shall provide evidence that either:
• The remote access does not allow access to networks, systems or
information within the scope of SAS certification.
Or, for SAS-SM only:
• A full and appropriate risk assessment, accepted by the audit team
prior to implementation, has been conducted
that considers both the access to systems and the visibility of sensitive
information.
And
• The site containing the endpoint systems is owned by the auditee or
its contracted supplier(s).
And
• The remote access is temporary, monitored and controlled in real-
time from a SAS-SM certified environment, with no ability to export
data.
In all cases, controls described in 10.4.7 shall apply.
Endpoint security
The security of the endpoint from which remote access originates shall
enforce appropriate logical and physical security controls to ensure a
level of protection equivalent to those applied to direct access to the
target system. Specifically, endpoints shall be:
• Positively identified, with access strictly limited to pre-authorised
devices that are:
o Owned and controlled by the auditee organisation;
o Subject to appropriate hardening controls;
o Configured according to a defined security policy;
o Up-to-date with the latest security patches at the time of the
connection.
• Only located in clearly designated physically secure environments to
which access is controlled on strict-need-to-be-there principles.
• Connected to a local network dedicated to the purpose of remote
access to sensitive network systems that can only be accessed from
within the designated physically secure environments.
Authentication
Remote user access mechanisms must employ enhanced authentication
mechanisms (e.g. multi-factor authentication), whenever remote access
is granted:
• across networks of lower security level than that being connected to
• from off-site locations.
Systems and data networks used for the processing and storage of
sensitive data shall be housed in an appropriate environment and
logically or physically separated from insecure networks.
Data transfer between secure and insecure networks must be strictly
controlled according to a documented policy defined on a principle of
minimum access.
Each customer running their own applications must use a unique ID for
that customer for the running of these application processes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
Yes
Yes
Yes
No
No
No
No
No
No
No
Yes
No
No
No
No
No
No
No
No
No
No
No
No
No
No
Yes
Yes
Yes
No
No
No
No
No
No
No
No
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
No
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
No
Yes
Yes
Yes
Yes
Yes
How the Auditors Will Assess Compliance
Expected Control
There is an Information Security Policy in place, which is the primary document for
governance across all aspects of the SAS-SM environment.
Policies are accessible by all employees involved in SAS-SM and there is a mechanism to
review documents in the policy framework on a regular basis (at least annually) and
notify employees of updates/new releases.
Regular risk assessments are performed for SAS-SM. Risks are recorded in a risk register,
allocated ownership and actions taken to mitigate the risks. Risk management is
reported to the cross-functional security forum (CFSF; section 2.2.2)
A security strategy is in place, either as a stand-alone document or through the actions
recorded in the risk register.
There is a business continuity plan in place that reflects the specific availability
requirements of the SP and customer SLAs.
The BCP is based on risks and/or business impact assessments, which are performed on a
regular basis (e.g. annually). The BCP must address specific issues, including:
- definition of critical incidents?
- processes for the management of scenarios?
- processes for ensuring continuity of operations?
- management of customer contact and customer data?
- maintenance of security system integrity?
- maintenance of production processes integrity?
The BCP is subject to periodic testing (e.g. annual). Testing should include scenario-based
testing covering:
- scenario is defined that would lead to an incident?
- key personnel presented with scenario?
- desktop exercise is performed?
- evaluation of BCP effectiveness to handle scenario?
- identification of improvements/lessons learnt?
- mechanism to update plan based on improvements?
There is an established programme for internal checks and audits, which list all of the
checks/audits to be performed, together with the frequency (e.g. daily, weekly,
fortnightly, monthly, quarterly, semi-annual, annual, bi-annual (two years)). If using a 3
lines of defence model, the line performing the check is listed in the programme.
The group meets on a regular basis to provide governance over the security posture of
the environment.
You have defined an individual with overall responsibility for the SM environment.
All roles and responsibilities relating to the SAS-SM environment are defined and clearly
documented, either in job descriptions (where security is a significant aspect of the role)
or listed in a document (where security is not a significant aspect).
Roles should be communicated and accepted by the individuals (if the responsibilities are
additional to their normal job role).
There is an asset management policy for the management of all assets within the SAS-SM
environment.
Security rules are clearly defined and documented, either within policies or as a stand-a-
lone document.
There is a 3rd party management policy that includes the need for external service
provider contracts to include a liability clause that defines responsibility and insurances
to cover that liability.
There are standard SLAs/template contracts for customers, which may include liability
clause defining responsibility.
Agreements should be established between vendor and third parties covering the
specific responsibilities falling within the scope of the third party services being provided
and should include the "right-to-audit" or similar mechanism to ensure SAS-SM
compliance.
There is an information classification and handling policy in place.
There is an access management policy in place that is applicable to both logical and
physical access.
There are handling rules in place for the lifecycle of information, proportionate to each
level of classification.
There is an asset classification policy, either as part of the data classification policy or a
document in its own right.
All roles and responsibilities relating to the SAS-SM environment are defined and clearly
documented, either in job descriptions (where security is a significant aspect of the role)
or listed in a document (where security is not a significant aspect).
There is a recruitment policy in place that define pre-employment screening checks to be
undertaken, including (subject to local laws - details of laws preventing checks should be
referenced):
- application form/CV
- formal interview
- validation of education and certifications
- validation of employment history and any gaps
- criminal background checks
- credit checks
There is a procedure in place to ensure that re-validation checks are performed (subject
to local laws) on a regular basis (e.g. annually or Bi-Annually (every two years)) for:
- criminal background
- credit checks
All new employees are subjected to induction training that includes coverage of the
security principles.
All employees are subjected to regular security awareness training (e.g. annually).
Employees involved in the SAS-SM environment are also be subject to enhanced security
training, specific to the environment and controls.
There is a whistleblowing policy in place.
There is a termination of employment policy in place that defines the actions to be taken
in the event of a termination, including:
- revoking access rights
- recovery of equipment and devices
The procedure includes the need to remind employees of their obligations towards
confidentiality and/or required to re-sign a confidentiality agreement (e.g. as part of an
exit interview).
Risks are recorded and tracked in a risk register (there is a link to section 1.2 regarding
risk methodology) and used to drive a security plan. Risk management is reported to the
cross-functional security forum (section 2.2.2)
There is a documented Security Plan that details zones of security from public through to
high security areas (H.S.A.) and the controls required for each zone.
The security plan also includes procedures for response times and escalation that
demonstrate that the security controls are sufficient to slowdown an attacker for longer
than it would take to raise an alarm and gain a response.
Physical controls should be in place, these typically include:
- the racks for the SM solution are physically segregated from other racks by use of a
cage (H.S.A.).
- entrance to the H.S.A. enforces one-by-one access and controls ensure that at least
two people must be present in the H.S.A.
- doors held open for longer than a specified period of time (e.g. 30 seconds) will
generate an alarm.
- access control (badge access system) should enforce anti-pass-back.
- the motion detection / ACS system should be configured to enforce dual presence.
- all alarms should be locally audible and register in the security control room.
- all access in/out of the H.S.A. is auditable through use of a badge access control.
Visitor access can be logged in a manual logbook that records the in and out times and
sufficient details of the individual.
- the HSA has sufficient CCTV coverage and motion detection.
- the racks are sufficiently secured with locks. The racks containing the HSMs should be
managed under dual control (e.g. two padlocks).
There is a documented evacuation procedure that includes the clearing of the H.S.A. in a
secure manner. This should be subject to testing on a regular basis.
Badge access system logs all access and logs are retained for a sufficient period of time to
support investigation in the event of an incident. Typically, this is considered to be 1
year.
CCTV image recordings meet the guidelines of 6fps and retention of recordings for 90
days (where permitted by local laws - if this is not permitted then you will need to
provide details of the law).
Screenshots of expected CCTV images are taken and used as a baseline, which is checked
periodically to confirm the actual CCTV image and quality is as per the baseline.
CCTV and badge access system date and time are synchronised.
CCTV and badge access systems are restricted to only security staff.
There is documented floor plan, which is maintained up-to-date that details the controls
in place protected the H.S.A.
There are regular checks to confirm that the floor plan controls are a true reflection of
the actual controls.
There is an access management policy (should already have been provided as part of
requirement 3.2.1) that defines access and approvals to secure areas by:
- employees,
- visitors,
- contractors, and
- security personnel.
The policy should also define how goods are brought into/out of the HSA (e.g. by use of a
good tool trap or by disabling door controls. If doors are disabled then this should be
approved and additional temporary controls applied).
The policy is enforced by an access control system (e.g. badge access system), employees
are required to wear id cards at all times.
The ability to amend access rights within the system is restricted to limited number of
staff (e.g. physical security manager).
All changes made to access rights within the badge access system is auditable.
There is a procedure for managing physical keys (e.g. keys for racks, safes, etc.) that
ensures that they are securely held under dual control and only issued to an individual
upon approval. When issued, there should be a logbook maintained detailing when the
key was taken and returned.
The badge access system generates logs of permissions and activity that are reviewed on
a regular basis for any suspicious activity, which is supported by reviews of corresponding
CCTV recordings to confirm the BAS log activity.
All security personnel are subject to vetting (as per requirement 4.2.1) on a regular basis.
All security personnel are trained on a regular basis (e.g. annually) with regard to their
duties (e.g. the content of the operational security manual).
There is an established programme for internal checks and audits, which list all of the
checks/audits to be performed, together with the frequency (e.g. daily, weekly,
fortnightly, monthly, quarterly, semi-annual, annual, bi-annual (two years)). If using a 3
lines of defence model, the line performing the check is listed in the programme.
The classification levels are aligned/mapped to those of the GSMA FS.08 Annex A (e.g.
the class 1 and class 2 GSMA classifications to the classification levels in use).
A encryption key lifecycle is defined for each key type, which includes the classification
level.
Certificate lifecycle is defined for each certificate type, which includes the classification
level.
Any auditee offering hardware security modules (HSM) managed as a service (see section
6.7) must ensure that the HSMs are configured, managed and operated in-line with the
following requirements:
• managed consistent with the requirements in section 10
• operated in an environment consistent with the requirements of section 5
• operated by personnel subject to the controls described in section 4
• operated by personnel subject to the controls described in section 4
A Key Manager and Key Manager Backup have been formally appointed by an
appropriate officer (e.g. CISO).
The Key Manager and Key Manager Backup have formally accepted their responsibilities.
There is a Key Management Organisational Chart is defined that shows the role, name,
job title, reporting manger. Each group of custodians should not report to the same line
manager.
All key management personnel roles and responsibilities have been defined and
documented. This can be as a part of key management policy or a standalone document.
Each individual is formally appointed and has signed a declaration confirming their
acceptance of the additional responsivities. This declaration should be retained either in
the employee's personnel file or by the key manager. The appointment of key
management personnel (excluding key manager and backup) should be repeated
annually following their re-vetting.
Each Individual has been vetted by the key manager, in association with HR and CISO, as
to their suitability. For example, they have a good employment record with no
disciplinary records, financial or criminal record check anomalies. This vetting should be
repeated on an annual basis.
In the case of an HSM managed as a service (see section 6.7), HSM infrastructure
management activities should be conducted using fully authorised and trained CSP
personnel.
There is a key management policy and procedure in place that describes how dual
control is applied throughout all key management activities. This includes the receiving,
handling distributing key components; physical access to the room, racks and safes; and
logical access to the KMS and HSMs.
Physical keys used for safes, racks, etc. not assigned to individuals should be held
centrally (unusually within a key safe).
Physical access in the H.S.A. requires a minimum of two persons present (dual presence).
If a single person is present for longer than 1 minute, an alarm is triggered.
Physical access to the racks requires two individuals (e.g. the racks are managed under
dual control).
Physical access to the safes requires two individuals to open them. One individual is the
key custodian (or backups) to whom the safe belongs and the other individual is the key
manager (or backup).
Logical access to systems used for key management require two individuals, i.e. the
password is managed under split knowledge (both parts of the password should be
managed in line with the password policy (10.3.3))
A encryption key lifecycle is defined for each key type, which includes the classification
level.
Certificate lifecycle is defined for each certificate type, which includes the classification
level.
A key and certificate inventory is maintained that lists all of the keys and certificates in
use for the SAS-SM environment.
A encryption key lifecycle is defined for each key type, which includes the classification
level.
Key management is governed by following the principles of split knowledge and dual
control (as described in previous requirements above). These principles are expected to
be demonstrated throughout all key management activities.
Key Management procedures are documented for all key management activities
including:
- Roles and Responsibilities
- Succession Planning
- HSM commissioning
- HSM initialisation
- HSM decommissioning
- Key Lifecycle - Generation
- Key Lifecycle - Exchange and Storage
- Key Lifecycle - Backup (if applicable)
- Key Lifecycle - Destruction
- Private Keys
- Key Compromise
There is a hardware inventory in place (10.5.1) that includes details of all HSMs in use.
For each HSM, evidence is available to confirm it is FIPS 140-2 level 3 certified.
For HSM managed as a service (see section 6.7), the auditee should provide a copy of the
FIPS certification proving the identification of the hardware board of the cryptographic
device used.
For HSM managed as a service (see section 6.7) equipment should be subject to a
documented commissioning, decommissioning, allocation and/or de-allocation process.
All key management activities have a manual record completed, which provides sufficient
detail to record the activities under, by whom and when.
Either as a separate document or as part of the ceremony record, a pre and post
ceremony checklist should be completed that details the inspection performed to ensure
there is no evidence of tampering, powering up, powering down, and returning the KMS
to its original state (e.g. removing monitors, etc.), closing the rack, etc.
Key Management safe access logs and safe inventories are maintained that detail every
time a key management safe is opened, the purpose, and the content of the safe. Both
should be managed under dual control and subject to regular inspection (e.g. quarterly).
The GSMA PKI certificates in use are signed by the authorised CA.
Certificate management procedures are documented and include the restrictions over
PKI certificate private keys used for signing and in accordance with the certificate policy
(SGP.14).
Certificate management procedures are documented and include the restrictions over
PKI certificate key pairs and notification to the GSMA's email address.
Certificate management procedures are documented and include the restrictions over
PKI certificate key pairs and notification to the GSMA's email address.
Documented procedures should be defined for cloud HSM service and how HSMs are
maintained within a certified data centre / cloud region and how this compliance is
regularly reviewed.
Responsibilities of both the CSP managing the HSM and SAS-SM vendor(s) utilising the
solution should be fully defined and agreed between all parties.
Key management procedures should clearly describe how access to keys and certificates
is managed and can only be accessible by the SM service provider.
The responsibilities matrix should clearly define that only the SM service provider can
access and manange cryptographic keys and certificates defined within FS.09 Annex A.
Keys and certificates held outside of the HSM may be wrapped under a storage key that
is stored in the HSM and under the sole control of the SM service provider.
Key management procedures should clearly describe how remote connections are made
from a secure certified environment to the HSM in accordance with 6.4.1 and 10.4.
Remote connections to the HSM should only be allowed from certified physical locations
in accordance with 6.4.1 and 10.4 and must not support any other connectivity.
HSMs used by SM service providers must have all partitions (if supported) allocated to a
single SM service provider and not shared.
There is a documented solution architecture, which includes functionality. Within this
document, all of the data and assets are listed together with the various ES channels.
For each ES, there is a description of how the data is secured. In addition, the document
includes how the data is secured at rest (e.g. field encryption and database encryption).
This should be aligned to the data classification and handling policy and procedures
(section 3).
All connections between secure networks (SM solutions) and unknown networks
(everything else) is via a system within the DMZ. There are controls to prevent
unauthorised access to the SM solution network. Where virtualisation is implemented,
there is a physical host for each zone (i.e. the virtualisation does not span multiple
zones).
There is a roles and responsibilities matrix defined (requirement 2.2.2) that ensures that
access to sensitive data is only where absolutely necessary.
There is a segregation in administrator duties (e.g. network, system, and database). If the
same individuals have administration access to all levels then you are expected to
demonstrate that there are compensating controls such as logging and monitoring of all
activities.
There is an information classification and handling policy that defines the levels of
classification (requirement 3.1.1).
There is a documented solution architecture, which includes how the data is secured at
rest (e.g. field encryption and database encryption). Covered as part of requirement
7.1.1.
There is a data retention policy in place, which defines the retention periods for all types
of data, which is in accordance with contractual and legislative requirements.
The policy also describes how data should be removed/deleted securely, in accordance
with the classification and handling policy.
There is an event management policy and procedure in place, which defines the audit
and monitoring for the network devices and systems and applications.
The integrity of the audit trail is maintained. This can include ensuring that
administrators are unable to access logs and/or utilisation of log repositories that receive
logs in real-time. Administrators do not have access to the repositories.
There is a roles and responsibilities matrix in place, which demonstrates that operational
administrators are unable to have write access to the logs.
Logs are subjected to regular monitoring (covered in section 10.6.1) with automated
alerting of malicious events (this should feed into incident management (section 2.3.1).
Logs exist that cover the entire lifecycle of the asset and user access. This should be
aligned to data retention and deletion procedures (requirement 7.2.3) whereby data is
retained for a sufficient period to identify and investigate incidents and deleted securely.
Comment: There is overlap here between audit trail integrity (section 7.4.1) and
retention (section 7.2.3).
The integrity of the audit trail is maintained. This can include ensuring that
administrators are unable to access logs and/or utilisation of log repositories that receive
logs in real-time. Administrators do not have access to the repositories.
There is a roles and responsibilities matrix in place, which demonstrates that operational
administrators are unable to have write access to the logs.
Log data does not include details of the sensitive data and only sufficient details to
enable further investigation.
Where sensitive data includes authorised and/or duplicate production (e.g. manual
generation or manipulation of production data or changes to the status of production
data), this is fully auditable with sufficient evidences retained and there are adequate
controls in place such as '4-eyes' whereby all actions are validated by a second person.
For each ES, there is a description of how the data is secured. In addition, the document
includes how the data is secured at rest (e.g. field encryption and database encryption).
This should be aligned to the data classification and handling policy and procedures
(section 3).
There is a use case specification document that explains how the interfaces work and the
testing to demonstrate this for ordering a profile and its lifecycle.
There is an established programme for internal checks and audits, which list all of the
checks/audits to be performed, together with the frequency (e.g. daily, weekly,
fortnightly, monthly, quarterly, semi-annual, annual, bi-annual (two years)). If using a 3
lines of defence model, the line performing the check is listed in the programme.
For each ES, there is a description of how the data is secured. In addition, the document
includes how the data is secured at rest (e.g. field encryption and database encryption).
This should be aligned to the data classification and handling policy and procedures
(section 3).
There is an information classification and handling policy that defines the levels of
classification. There are handling rules in place for the lifecycle of information,
proportionate to each level of classification.
There is a use case specification document that explains how customer data is protected
and cannot be accessed by other customers.
The solution architecture and functionality documentation includes details how multi-
tenancy is achieved. This should be supported by the network architecture (10.4.1) and
asset inventory (10.5.1 (i)).
There is a use case specification document that explains how customer data is protected
and cannot be accessed by other customers.
All network configurations are clearly documented (e.g. there is a network diagram).
There should also be a diagram that shows the secure interfaces over the network to
demonstrate the assets used at each stage of the SM solution. This should also be
reflected in the solution architecture.
The network architecture diagram should include details of the communication channels
and secure interfaces. Solutions for ensuring that authentication is appropriate is
through the use of certificate, VPN with HTTPS, encryption keys. You will be expected to
have included the mechanisms as part of the documentation.
There is a use case specification document that explains how entities authentication is
verified.
There is an event management policy and procedure in place, which defines the audit
and monitoring for the network devices and systems and applications.
The integrity of the audit trail is maintained. This can include ensuring that
administrators are unable to access logs and/or utilisation of log repositories that receive
logs in real-time. Administrators do not have access to the repositories.
There is a roles and responsibilities matrix in place, which demonstrates that operational
administrators are unable to have write access to the logs.
Logs are subjected to regular monitoring (covered in section 10.6.1) with automated
alerting of malicious events (this should feed into incident management (section 2.3.1).
Logs exist that cover the entire lifecycle of the asset and user access. This should be
aligned to data retention and deletion procedures (requirement 7.2.3) whereby data is
retained for a sufficient period to identify and investigate incidents and deleted securely.
There is an up-to-date IT security policy that supports the overall information security
policy (defined within section 1) and forms part of the policy framework.
All roles and responsibilities relating to the SAS-SM environment are defined and clearly
documented, either in job descriptions (where security is a significant aspect of the role)
or listed in a document (where security is not a significant aspect).
The roles and responsibilities matrix demonstrates there is a segregation in administrator
duties (e.g. network, system, and database). If the same individuals have administration
access to all levels then there are appropriate controls in place such as logging and
monitoring of all activities.
There is an access management policy (should already have been provided as part of
requirement 3.2.1) that defines access and approvals to secure areas by:
- employees,
- visitors,
- contractors, and
- security personnel.
The policy is enforced by an access control system (e.g. badge access system), employees
are required to wear id cards at all times.
There is an access management policy in place that is applicable to both logical and
physical access (these can be two separate policies), which includes the principles of
'least privilege' and 'need to know'.
The policy is supported by procedures that define the process for creating, modifying,
and deleting access rights. All processes should include an approval mechanism (e.g.
tracked through a ticketing system with the approval).
The policy and procedures are applicable to all types of accounts: administrator, user (if
applicable), machine/service, local and domain accounts.
There is a list of approved users (independent of the systems themselves). This list should
be maintained up to date and used to review the list of actual accounts to confirm all
accounts on the network and system have been authorised. Any anomalies identified
should generate an incident that are tracked through the incident management process.
There is a password policy that is defined either as part of the IT Security policy or as a
standalone policy. The policy clearly states that it is applicable to all: users,
machine/service accounts, network devices, systems, and applications. If there are any
accounts that do not meet the policy requirements (see below) then these should be
listed as exceptions.
The policy includes the need for additional controls for systems that cannot enforce the
password policy through configuration settings.
The policy states that all generic accounts (e.g. 'admin') that are not identifiable to an
individual should be managed under dual control with the password split between two
individuals. Both parts of the password must meet the above requirements (e.g. both
parts of the password meet the minimum length specified).
Remote access may be permissible under highly controlled circumstances where the risk
of such access has been fully evaluated. The risk methodology must take into account the
classification of the data on the systems being remotely accessed and whether the
remote access is:
• Read-only, providing access only to view information about the status of systems at the
certified site with no access to modify information, configuration or system operation, or
to view sensitive data.
• Connecting to a pre-defined service, designed to allow remote triggering of an activity
or function with little or no ability to affect the operation of that activity.
• Interactive or administrative access, enabling the user to modify system configuration
or operation, access or manipulate data being stored or processed, or affect the
processing of data in a way equivalent to a user on-site using a command line or
graphical environment.
The remote access mechanism will typically combine a secure channel with appropriate
user authentication and logging. Once the channel is established, the remote user will
connect to systems at the target site to perform operational activities. These activities
should always be carried out using equivalent security to activities carried out on-site.
Where an equivalent security level cannot be assured through the remote channel then
activities should not be carried out remotely.
Activities reliant on a trusted path (e.g. key ceremonies) are not currently (as of March
2020) considered to provide an equivalent level of security when carried out across a
remote connection.
Remote access to sensitive systems and networks may be carried out from a non-SAS-
certified environment only in exceptional circumstances.
Remote access may be permitted where auditees demonstrate that clear, auditable
controls are in place that prevent any access to networks, systems or information within
the scope of SAS certification, e.g. remote monitoring or logging not involving any
systems within the scope of SAS certification.
Given the distributed nature of some SAS-SM installations there may be a need for
remote access sessions to occur from physical areas of a lower security level. Such access
may be accepted provided that all of the applicable requirements in 10.4.6 are satisfied.
The work-stations utilized for remote access shall be pre-approved and subjected to a
filtering mechanism (IP filtering, MAC address…) to limit potential connections.
The devices should be hardened, up to date with the latest security patches, and running
appropriate and up-to-date anti-malware controls.
The location where the remote end point workstation is hosted should be placed either
in a HSA for the SAS–UP standard or in a secure area subject to a risk assessment in the
case of the SAS–SM standard.
Channels for remote access will often be established between different sites across
public, shared, or lower-security networks.
Channels should be established using appropriate technologies to ensure mutual
authentication and confidentiality (typically through encryption).
Appropriately configured IPsec or SSL VPNs are generally considered acceptable solutions
to provide manageable and controlled connection using pre-specified security
mechanisms.
Jump hosts provide a mechanism of authenticating a user connecting from a lower
security zone to a higher security zone when this type of connectivity would normally be
prohibited by network security policies.
Logs for all remote access should be generated and stored according to a defined and
documented policy. Logs should typically include:
• Authentication of the remote-user to the relevant jump host.
• Authentication of the remote-user within the target environment (e.g. Active
Directory/LDAP).
• Establishment of the VPN.
• Access to network devices, systems and applications by the remote user.
Additionally, where remote access is permitted under the exceptions described in 10.4.6,
logs should also include:
• The authentication of the user fulfilling the role of the virtual escort.
• Each action performed on the target systems.
All network configurations are clearly documented (e.g. there is a network diagram).
There should also be a diagram that shows the secure interfaces over the network to
demonstrate the assets used at each stage of the SM solution.
There is a firewall policy, which is supported by a build (hardening standard) for each
model of firewall. Any configurations above this are subject to change control. You have
all firewall configurations documented.
There is an approved firewall ruleset, which is configured to only provide the minimum
access required, restricting IP addresses, services, and ports and include a deny all rule
(catch all rule).
There is a change management policy and procedure in place. All firewall changes follow
the change management process.
There is an intrusion detection system in place that monitors network traffic within the
trusted zone and generates immediate alerts.
There is a programme of penetration testing, which specifies the frequency of
penetration testing (e.g. twice a year and after a major change) and the scope, including:
external and internal networks.
The results of testing is recorded and actions taken tracked. Expected resolution times
per severity level should be specified.
The network architecture has been designed to account for expected availability (linking
to the recovery point objective within the business continuity plan). This may include
clusters (active | active; active | passive) with redundancy.
There are appropriate controls to detect and prevent attacks that would impact on the
availability (such as denial of service). This should be linked to risk registers, intrusion
detection, and business continuity. It will only need to be demonstrated that the risk has
been considered and appropriate measures have been taken.
There is a procurement procedure, which includes the need for security requirements
from the outset and these are factored into the procurement of assets.
You have an asset inventory that includes all hardware and software.
The inventory should be maintained up to date and subject to regular checks to actual
assets.
There is a patch management policy, either as part of the IT security policy or as a
standalone document. It is supported by patch management procedures for:
- network devices
- operating systems
- applications/components utilised within the SM environment
The policy should ensure that all systems are maintained with the latest vendor-supplied
security patches once they pass testing.
The policy should specify how to handle out of support (end of life) systems that cannot
be replaced and require additional controls.
The actual configuration of systems is checked against the baseline standard on a regular
basis. This can either be through event log alerts or manual inspection. Any anomalies
generate an incident.
There is a change management policy and procedure that is applicable for all systems
and requires that there is a formal process to only permit authorised changes and detect
unauthorised changes (these would generate an incident).
There is a vulnerability management policy in place, which is either part of the IT Security
policy or a document in its own right. This can also be included as part of the patch
management policy.
The results of testing is recorded and actions taken tracked. Expected resolution times
per severity level should be specified.
There is a malware prevention strategy that:
- defines a malware perimeter for the site
- emphasise prevention as the primary control
- emphasise that detection controls are also important
Anti-virus software is installed on all systems that can support it and is configured to look
for signatures daily, actively scan, and log events.
There is a defined procedure for handling viruses, which include raising an incident.
There is a policy for session timeouts of unattended terminals (this can be covered in the
password policy) that includes: network devices, systems, end user pcs, and remote
access.
There is a backup and retention policy defined. The backup policy should be part of the
business continuity planning and aligned to customer expectations and the retention
policy should be part of the data classification and handling policy.
Backup and retention should include configurations, data and audit logs.
There is an event management policy and procedure in place, which defines the audit
and monitoring for the network devices and systems. Logging must be enabled for
applications (linked to section 7.4).
There are regular checks to confirm that all network devices and systems are generating
and forwarding logs for interrogation.
Logs are subjected to regular review and any abnormal events generate an incident and
are investigated.
There is a 3rd party management policy that includes the need for external service
provider to be monitored through SLAs and be subject to monitoring.
External providers should sign NDAs and the contract should ensure that they will adhere
to your policies and procedures.
There is am established programme for internal checks and audits, which list all of the
checks/audits to be performed, together with the frequency (e.g. daily, weekly,
fortnightly, monthly, quarterly, semi-annual, annual, bi-annual (two years)). If using a 3
lines of defence model, the line performing the check is listed in the programme.
For each check/audit activity, the following is documented:
- purpose,
- scope (including period covered and population)
- objective,
- methodology for testing
- details of testing undertaken
- findings / observations
- observations
- conclusion
- recommendations for improvement
The SSLDC includes security is defined at the earliest point (requirements) and tracked
through all phases. In addition, the solution is subject to application penetration testing.
Industry best practices should be followed for all development activities and include peer
code review and approval prior to release.
The SSLDC includes security is defined at the earliest point (requirements) and tracked
through all phases. Industry best practices should be followed for all development
activities and include peer code review and approval prior to release.
There is a defined document detailing the controls established to segregate customer
environments and prevention of cross-contamination or access by unauthorised
individuals.
Customers should be provided with access rights to their own environments only, with
no possibility of customers to access another customer’s environment
If customers are authorised to run their own applications, verify these application
processes run using the unique ID for each customer.
Procedures should be clearly defined for the protection controls preventing customer's
from monopolising system resources.
A formal process should be in-place to review and ensure customer availability SLAs are
being met.
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
Preparation for Offline Documentation Review
(A.6 of Annex A to GSMA SAS Remote Audit Policy)
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
aration for Offline Documentation Review
Annex A to GSMA SAS Remote Audit Policy)
Auditee Documentation
(reference to the document list)
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
Evidences Available
(Globally [Centrally] / Region / Country / Building)
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
How the Auditors Will Test Compliance
Detailed Testing
Review the Information Security Policy and confirm that it is endorsed by senior
management and includes a clear statement on the overall security principles and
management intent.
Review sample of policies to confirm that they have been reviewed on a regular
basis and updated when required.
Interview a sample of staff and confirm they have access to the policies.
Review the risk management policy and methodology and confirm it includes a
clear structure for risk identification, assessment/evaluation, treatment, and
management.
Trace a sample of risks from the assessments into the risk register to confirm and
a sample of risks from the risk register back to the risk assessments.
For a sample of risks confirm that the scoring is in line with methodology.
For a sample of risks that require action, confirm they have an owner, and actions
are being tracked.
Review a sample of CFSF minutes, and confirm that the risk management is a
standing agenda item and risk actions are being monitored.
If a stand-alone document, trace a sample of actions from the strategy to the risk
register and a sample of strategic risks (long-term actions) from the risk register to
the security strategy.
Review a sample of CFSF minutes, and confirm that the strategy is a standing
agenda item, which is subject to monitoring.
Review a sample of customer contracts/SLAs for availability requirements and
confirm they are reflected in the BCP.
Review a sample of business impact assessments and confirm they are undertaken
regularly.
Review the BCP and confirm it reflects the outcome of the most recent Business
Impact Assessment.
Review a sample of tests and confirm that they have been successfully completed.
Where tests were not completed as per the plan, confirm that the lessons learnt
have been captured and the plans updated to reflect corrective actions.
For a sample of checks, confirm that they have been undertaken in accordance
with the intended frequency.
Review a sample of checks for all areas of control and confirm that they have been
fully documented and undertaken in line with the testing methodology.
Performed at the end of the audit: for any NCs and C- findings, ascertain if they
were covered in the scope of an internal check/audit and identified.
Review a sample of CFSF minutes, and confirm that internal checks and audits is a
standing agenda item and progress on actions are monitored.
Interview personnel / review HR records and confirm individuals are appropriately
trained and competent to perform their role.
Review the Organisational structure and confirm it includes all areas of the
business involved with the solution and environment, including a high-level (e.g.
company name) of external providers.
Confirm that the organisational structure includes the names and positions of
employees involved in the SAS-SM environment.
Review the appointment letter and job description for the individual with overall
responsibility for the SAS-SM security controls.
Review the asset management policy and confirm it covers the whole of the asset
lifecycle ng assets in an inventory and assigning responsibilities and accountability
for each asset.
Review the incident management policy and procedure and confirm that it is
applicable to both logical and physical incidents.
The policy should also define the steps to be taken to: identify, log, evaluate,
triage, investigate, resolve and report incidents and improve control weaknesses.
The policy/procedure should also define how evidences are to be handled meeting
any forensic readiness and chain of custody requirements by law enforcement
agencies.
Confirm that the policy includes notification to internal and external stakeholders
(e.g. customers, external providers, law enforcement agencies) and the point at
which they are contacted.
Review all of the incidents relating to the SAS-SM environment. For a sample,
review the steps taken and reporting.
Ascertain the number of customers where contracts have been signed. Review a
sample of contracts and ascertain if liability has been defined.
Ascertain whether the vendor has calculated the total value of liability that would
be payable to customers, and has appropriate insurance in place to mitigate this
and/or appropriate levels of control. This should also be listed in the risk register
(1.2.1).
Review vendor agreements established with third party service providers and
ensure these are signed by both parties and includes details of the specific
responsibilities of the third party that they must comply with and a right to audit
as part of the SAS-SM compliance process or similar mechanism.
The vendor should ensure a process to monitor the third party's compliance for
the relevant requirements or include within their own certification assessment.
Review the information classification policy and confirm that defines the levels of
classification in place for all types of data across the organisation.
The classification levels are aligned/mapped to those of the GSMA FS.08 Annex A
(e.g. the class 1 and class 2 GSMA classifications to the classification levels in use).
Review the access management policy and confirm it covers both logical and
physical access (these can be two separate policies).
Confirm that the policy includes the principles of 'least privilege' and 'need to
know'.
Review the classification and handling policy and confirm that, for each
classification level, the handling controls have been defined for all aspects of the
information lifecycle, including (but not limited to):
- creation/first point of receipt;
- communicated:
- written
- verbally spoken
- electronically communicated (internally and externally)
- removable media (e.g. USB stick, memory card, etc.)
- stored (physically and electronically)
- destroyed
Review the asset classification policy and confirm it defines the controls (both
logical and physical) in place for the lifecycle of the assets.
Ascertain is there is also a site classification policy, which specifies the physical
controls required for hosting assets (this is covered in detail within section 5 for
layers of physical security).
Review the clear desk policy and confirm that it is aligned to the classification and
handling policy, whereby confidential documents and material should be stored
securely and not left at workstations.
Review the clear screen policy and confirm that it is aligned to the session timeout
requirements (requirement 10.5.1 (vii)) and addresses issues such as shoulder-
surfing in public places and restricting CCTV recording of screens that are used for
sensitive processes (e.g. key management).
For a sample of individuals, confirm that they have accepted their responsibilities.
For a sample of employees involved in the SAS-SM environment (cross-reference
to 2.1.1 and 2.2.2), confirm that a personnel record exists covering the
recruitment screening checks
For a sample of new starters, confirm that they have received instruction training
that includes security awareness / the security principles.
Review the security awareness training and enhanced security training course
material and confirm it reflects the security policies, rules, and standards.
For a sample of employees, confirm that they have received the security
awareness training on a regular basis (e.g. annually).
For a sample of employees involved in the SAS-SM environment, confirm that they
have received the enhanced security training.
Review the whistleblowing policy and confirm that there is a process that enables
employees to make confidential reports of security policy breaches and should
include escalation in the event that the employee is not satisfied with the
outcome (e.g. an ombudsman).
Review the disciplinary policy and procedure and confirm that they define the
levels of disciplinary action based on levels of severity, including dismissal.
Review the risk management policy and methodology and confirm it includes a
clear structure for risk identification, assessment/evaluation, treatment, and
management.
Review change management records for changes to the layout of the H.S.A. Select
a sample of changes and confirm a risk assessment was undertaken.
Trace a sample of risks from the assessments into the risk register to confirm and
a sample of risks from the risk register back to the risk assessments.
For a sample of risks confirm that the scoring is in line with methodology.
For a sample of risks that require action, confirm they have an owner, and actions
are being tracked.
Review a sample of CFSF minutes, and confirm that the risk management is a
standing agenda item and risk actions are being monitored.
Review the security plan and confirm that layers of security (zones) have been
defined together with the controls required to access each zone and within the
zone.
Review the security plan and confirm it includes attack and response times for
each layer being breached.
Verify the physical layout of the site and the controls in place to confirm that
threats would be detected and the responses are reasonable.
Physically verify the controls that are expected to be in place are actually in place
and appropriate.
Review the security plan (or security policy) to confirm that BAS logs are to be
retained for a minimum of 1 year. (NB the period of retention should be reflected
within the incident response policy and procedure, whereby alerts are generated
and investigated within the timeframe logs and other evidence is available).
Review the BAS system and confirm logs are retained for the required period.
Physically verify the baseline screenshots to live images to confirm they are
aligned.
Review the control to synchronise the CCTV and BAS systems. Physically inspect
the two systems to confirm that they are synchronised.
Review the user accounts for the two systems and confirm that they are restricted
to a limited number of employees. Cross-reference the employees to the roles and
responsibilities defined in requirement 2.2.2.
Verify the floor plan controls against the actual controls in place to confirm that
the plan is up-to-date and a true reflection of the actual controls.
Review evidences (such as internal checks and audit test results) to confirm that
the floor plan is checked periodically to actual controls.
Review the policy and confirm that it includes details of how requests are made
and approved.
Obtain a list of individuals with permanent physical access. For a sample, confirm
that there is a ticketed request, which has been appropriately approved.
Obtain an activity report from the BAS system. Identify individuals whom do not
have permanent access, and for a sample, confirm that there is a ticket request,
which has been appropriately approved. Review the account for these individuals
within the BAS and confirm that access is no longer valid.
Obtain a list of contractors and security personnel with physical access, if handled
differently to permanent/temporary access. For a sample, confirm that there is a
ticketed request, which has been appropriately approved.
Review the policy for details of how goods are brought into/out of the H.S.A.
Review the ticketing systems for such requests. If they are within the period of
CCTV recordings, review the corresponding CCTV recordings to confirm the
process was followed.
During the audit, confirm that employees are wearing their ID badges at all times.
Inspect the BAS system and confirm the access rights for each user account to
verify that only a limited number of staff can amend the access rights.
Ask two individuals (one with permission and one without) to demonstrate that
the permissions are accurate. Typically, those without permission will have a
different layout.
Review the logbook to confirm that the issue and return of keys is in accordance
with the procedure.
Confirm that reviews of BAS are included in the internal checks and audit
programme, to review:
- individuals with access (e.g. quarterly)
- activity for each badge reader (e.g. weekly or monthly)
For a sample of activity, review the corresponding CCTV footage to confirm that
badge activity recorded is a true representation of actual events.
Review the security procedures manual and confirm it includes all expected
aspects, such as those listed.
Confirm that the manual is subjected to regular review (e.g. annually) and updated
when required.
Obtain a list of security personnel. For a sample, confirm that individuals have
been subjected to similar levels of vetting as operational employees.
Review the security guard training course material and confirm it reflects the
security policies of the vendor and the operational security procedures manual.
For a sample of checks, confirm that they have been undertaken in accordance
with the intended frequency.
Review a sample of checks for all areas of control and confirm that they have been
fully documented and undertaken in line with the testing methodology.
Performed at the end of the audit: for any NCs and C- findings, ascertain if they
were covered in the scope of an internal check/audit and identified.
Review a sample of CFSF minutes, and confirm that internal checks and audits is a
standing agenda item and progress on actions are monitored.
Interview personnel / review HR records and confirm individuals are appropriately
trained and competent to perform their role.
Review the classification level assigned to encryption key and certificate types and
confirm they are aligned to the GSMA FS.08 Annex A class 1 and class 2 types.
Cross-reference the handling guide for the classification level and confirm it is
appropriate.
Review logical security controls of the managed HSMs to ensure that they are
meeting all relevant requirements within section 10.
Review physical security controls of the location where the managed HSMs are
deployed and operated to ensure that the requirements in section 5 are being
met.
Review all personnel requirements detailed in section 4 for individuals configuring,
managing and operating HSMs as a managed service.
Review the appointment letters for the Key Manager and Key Manager Backup
Confirm that the responsibilities for the Key Manager and Key Manager Backup
are documented and both have formally accepted these responsibilities.
Review the organisational chart for key management personnel. Review each
custodian group to confirm that there is a segregation of reporting lines.
Confirm that roles and responsibilities for all personnel involved in key
management activities are documented. Cross reference the roles to the
organisational chart.
Review evidences to confirm that each individual has been formally appointed and
has accepted their responsibilities.
Review the key management training course material and confirm it reflects the
key management policies and procedures (requirement 6.4.1). Review evidence of
attendance by those participating in the training and cross-reference to the key
management organisational chart.
Observe a mock key ceremony to confirm that individuals involved are competent
to perform their duties.
Review evidences of specific training for the secure management and operations
of HSM devices for individuals involved in this process.
Review the key management policy and procedures and confirm that it details
how dual control is applied throughout all aspects of key management (as detailed
below)
The physical location of the key store is covered as part of requirement 5.3.1. In
addition, review the list of authorised personnel to have physical keys and confirm
only key management personnel (cross-reference to the key management
organisational chart) are authorised to access the keys.
Review the physical key logbook for instances where rack keys have been taken
and confirm that the dates and times correspond to key ceremonies.
Physically verify the controls that are expected to be in place are actually in place
and appropriate.
Physically inspect the racks and confirm that the racks are not accessible under
single control, this includes inspecting:
- the racks adjacent to the HSM rack to confirm access cannot be gained from
there; and
- the side panels of the racks
- the keys used to secure the racks against all other rack keys in the key store
(looking for duplicates that would result in single access)
Physically confirm that each safe requires two individuals to open it, such as:
- two keys
- one key and pin code
- two parts of a pin code
Observe the login process during the mock key ceremony to confirm that
passwords are managed under split knowledge and both parts of the password
meet the password policy.
Review the lifecycles for keys and certificates and confirm the technical
specifications are appropriate for the purpose of each key/certificate.
For a sample of keys and certificates held in the HSMs, confirm that the technical
specifications are correct per lifecycles and cross-reference to the inventories and
ceremony forms.
Review the lifecycle of keys and certificates to confirm that the expiry length is
appropriate.
Review the process for destroying keys when they expire and replacing them.
For a sample of keys and certificates held in the HSMs, confirm that the expiry
dates are correct per lifecycles and cross-reference to the inventories and
ceremony forms.
Review the lifecycles for keys and certificates and confirm the technical
specifications are appropriate for the purpose of each key/certificate.
Observe a mock key ceremony to confirm that the principles of split knowledge
and dual control are applied throughout.
Review the key management procedures and confirm they cover all aspects of key
management.
For a sample of key ceremonies performed (6.5.1), confirm that the ceremonies
are in accordance with procedures.
Review the certificate management procedures and confirm they cover all aspects
of certificate management.
For a sample of certificates in use, confirm that there is an audit trail (6.5.1) and
procedures were followed.
Physically inspect each HSM and confirm the serial number agrees to the
inventory record.
Physically inspect each HSM to confirm that they are configured to be running in
FIPS/secure mode in accordance with the FIPS certification.
Physically inspect each HSM to confirm that they are configured to be running in
FIPS/secure mode in accordance with the FIPS certification.
Review the key inventory and, for a sample of keys, check that the details
recorded agree to the corresponding ceremony form and HSM audit log. For a
sample of keys in the HSM, trace through to the key ceremony form and
inventory.
For a sample of key ceremonies, confirm that pre- and post-ceremony checks are
recorded.
Observe a mock key ceremony to confirm that pre- and post-checks are
performed.
For each safe in use, confirm that logbooks are maintained and physically verify
the content of each safe to the inventory record.
Review the certificate management procedures and confirm they cover all aspects
of certificate management.
For a sample of certificates in use, confirm that there is an audit trail (6.5.1) and
procedures were followed.
Confirm the GSMA PKI certificates in use and confirm they are signed by the
authorised CA.
Review the certificate management procedures and confirm they include clear
rules for certificates used for signing.
For a sample of private keys used for signing, confirm that they are in accordance
with the procedures and certificate policy.
Review the certificate management procedures and confirm they include clear
rules for transfer and installation, which includes notification to the GSMA
compliance email address.
For a sample of certificates, confirm that they are transferred and installed in
accordance with procedures and the GSMA has been informed of the certificates.
Review the certificate management procedures and confirm they include clear
rules for transfer and installation, which includes notification to the GSMA
compliance email address.
For a sample of certificates, confirm that they are transferred and installed in
accordance with procedures and the GSMA has been informed of the certificates.
Review documented procedures for the cloud HSM service and ensure it describes
a clear mandate for HSMs in use to be housed within a secure certified data centre
/ cloud region.
Review defined split of responsibilities and ensure that this has been agreed
between both (or all) parties.
Review the key and certificate management procedures and confirm they describe
the access controls to keys and certificates and how this is restricted only to be
accessible by the SM service provider.
Review defined of split of responsibilities and ensure that it defines that only the
SM service provider can access and manage cryptographic keys.
Review key storage locations and confirm that keys are only accessible by the SM
service provider. Confirm that any keys and certificates held outside of the HSM
are wrapped under a storage key accessible only to the SM service provider and
secured within the HSM.
Review the key and certificate management procedures and confirm they describe
the secure remote access connectivity to the HSMs which can only be from a
certified environment in accodance with 6.4.1 and 10.4.
Review HSM and remote access configurations to confirm that connectivity to the
HSM for key management activities is from a secure and certified environment in
accordance with 6.4.1 and 10.4.
Review HSMs in use and confirm that all partitions, if supported, are allocated to a
single SM service provider.
Review the solution architect and confirm that it fully describes all of the data and
assets to be used within the solution, together with the security to be applied for
each ES channel and for the data when transferred with an external body (outside
of the ES channels) and for the data at rest.
Confirm that the information classification has been defined for each type of data
and that the handling of the data in transit and at rest is aligned to the
classification and handling scheme.
Review the network diagram and confirm that there is no direct access to the
secure network (requirement 10.4.2). Review the firewall rules to verify that
connections follow the principle of minimum access.
Review the roles and responsibilities matrix to confirm that there is a segregation
of administrator access (covered as part of 10.2.1).
Where individuals have multiple levels of administrator access, confirm that a risk
has been raised in the risk register (requirement 1.2.1) and additional controls are
in place. Review the internal checks and audit programme (1.4.1 and 10.8.1) to
confirm that these controls are subject to checks.
Review the solution architecture and confirm that it fully describes all of the data
and assets to be used within the solution, together with the security to be applied
for the data when transferred and at rest (requirement 7.1.1), including backups
(requirement 10.5.2).
Review the database servers and confirm that there are appropriate controls in
place to safeguard the data while at rest that is aligned to the classification and
handling policy.
Review the policy and confirm that all types of data have been identified (cross-
reference to the solution architecture document) and retention periods have been
defined.
For a sample of data types, review evidences to confirm that data is not held
beyond the retention period (specifically examine any data held by the internal
audit team whom may have copies of raw data).
Confirm that the internal checks and audit programme includes reviews of
systems to ensure data is not being held beyond the retention period.
Review the event management policy and procedures to confirm that the network
devices and systems are required to generate audit logs and prevent
tampering/deletion of logs and/or log entries.
Verify the controls in place to prevent tampering (e.g. real-time forwarding and
access management).
Confirm that the internal checks and audit programme (requirements 1.4.1 and
10.8.1) includes a review of network devices and systems on a regular basis to
confirm that they are generating logs and forwarding logs to a repository server.
For a sample of network devices and systems, review the log entries and trace
through to the log repository.
Review the roles and responsibilities matrix and confirm that administrators are
unable to manipulate the logs.
Confirm the events that have been identified that would trigger an alert and
confirm the action that has been configured.
Review evidences of alerts (e.g. emails / SMS) and cross-reference to the incident
management system (requirement 2.3.1) to confirm that a ticket is raised and the
incident has been investigated.
Review the policy and confirm that all types of data have been identified (cross-
reference to the solution architecture document) and retention periods have been
defined.
For a sample of data types, review evidences to confirm that data is not held
beyond the retention period (specifically examine any data held by the internal
audit team whom may have copies of raw data).
Confirm that the internal checks and audit programme includes reviews of
systems to ensure data is not being held beyond the retention period.
For a sample of network devices and systems, review the log entries and trace
through to the log repository.
Review the roles and responsibilities matrix and confirm that administrators are
unable to manipulate the logs.
Verify the controls in place to prevent tampering (e.g. real-time forwarding and
access management).
For a sample of logs, confirm that there are no sensitive data present in clear text.
Review the solution architecture and network topology to determine the stages
where data processing takes place.
Review the controls in place to ensure that dual control is applied (such as key
management).
Review the solution architecture and confirm that controls are in place to prevent
duplicate production.
Confirm that the information classification has been defined for each type of data
and that the handling of the data in transit and at rest is aligned to the
classification and handling scheme.
During the solution demonstration, confirm that all ES channels are secure as per
the solution architecture and use case specifications.
For a sample of checks, confirm that they have been undertaken in accordance
with the intended frequency.
Review a sample of checks for all areas of control and confirm that they have been
fully documented and undertaken in line with the testing methodology.
Performed at the end of the audit: for any NCs and C- findings, ascertain if they
were covered in the scope of an internal check/audit and identified.
Review a sample of CFSF minutes, and confirm that internal checks and audits is a
standing agenda item and progress on actions are monitored.
Interview personnel / review HR records and confirm individuals are appropriately
trained and competent to perform their role.
Review the solution architect and confirm that it fully describes all of the data and
assets to be used within the solution, together with the security to be applied for
each ES channel and for the data when transferred with an external body (outside
of the ES channels) and for the data at rest.
Confirm that the information classification has been defined for each type of data
and that the handling of the data in transit and at rest is aligned to the
classification and handling scheme.
During the solution demonstration, confirm that all ES channels are secure as per
the solution architecture and use case specifications.
Review the classification level assigned to all aspects of data within the solution
and confirm they are aligned to the GSMA FS.08 Annex A class 1 and class 2 types.
Cross-reference the handling guide for the classification level and confirm it is
appropriate.
During the solution demonstration, confirm that all ES channels are in place in
accordance with data classification policy and as per their description in the
solution architecture and functionality documentation.
During the solution demonstration, confirm that customer data is protected. This
may also require a review of the database encryption.
During the solution demonstration, confirm that customer data is protected. This
may also require a review of the database encryption.
Review the network diagrams (physical, logical, data flow, and rack) and solution
architecture to confirm that all network devices and systems are defined and
connections are secured.
Review the event management policy and procedures to confirm that the network
devices and systems are required to generate audit logs and prevent
tampering/deletion of logs and/or log entries.
Verify the controls in place to prevent tampering (e.g. real-time forwarding and
access management).
Confirm that the internal checks and audit programme (requirements 1.4.1 and
10.8.1) includes a review of network devices and systems on a regular basis to
confirm that they are generating logs and forwarding logs to a repository server.
For a sample of network devices and systems, review the log entries and trace
through to the log repository.
Review the roles and responsibilities matrix and confirm that administrators are
unable to manipulate the logs.
Confirm the events that have been identified that would trigger an alert and
confirm the action that has been configured.
Review evidences of alerts (e.g. emails / SMS) and cross-reference to the incident
management system (requirement 2.3.1) to confirm that a ticket is raised and the
incident has been investigated.
Review the policy and confirm that all types of data have been identified (cross-
reference to the solution architecture document) and retention periods have been
defined.
For a sample of data types, review evidences to confirm that data is not held
beyond the retention period (specifically examine any data held by the internal
audit team whom may have copies of raw data).
Confirm that the internal checks and audit programme includes reviews of
systems to ensure data is not being held beyond the retention period.
Review the IT security policy and confirm it covers all aspects of network and
system security (defined within the requirements of section 10, below)
Where individuals have multiple levels of administrator access, confirm that a risk
has been raised in the risk register (requirement 1.2.1) and additional controls are
in place. Review the internal checks and audit programme (1.4.1 and 10.8.1) to
confirm that these controls are subject to checks.
Review the policy and confirm that it includes details of how requests are made
and approved.
Obtain a list of individuals with permanent physical access. For a sample, confirm
that there is a ticketed request, which has been appropriately approved.
Obtain an activity report from the BAS system. Identify individuals whom do not
have permanent access, and for a sample, confirm that there is a ticket request,
which has been appropriately approved. Review the account for these individuals
within the BAS and confirm that access is no longer valid.
Obtain a list of contractors and security personnel with physical access, if handled
differently to permanent/temporary access. For a sample, confirm that there is a
ticketed request, which has been appropriately approved.
During the audit, confirm that employees are wearing their ID badges at all times.
Review the access management policy and supporting procedures and confirm
that they sufficiently define the processes for creating, modifying and deleting
access rights and how these accounts are monitored.
For a sample of accounts, confirm that a ticket exists, which includes approval.
Obtain a list of current accounts and confirm that all individuals are listed in the
organisational structure (2.1.1). Where the accounts are machine/service, confirm
that purpose of the account is defined.
For a sample of network devices and systems, review the actual accounts, and
confirm they are as per the approved list.
Confirm that the internal checks and audit programme (requirements 1.4.1 and
10.8.1) includes a review of access rights on a regular basis (quarterly) and a
review of activity (monthly).
For a sample of the checks, review the evidence of testing performed and confirm
that all anomalies are identified, reported, and appropriate action taken.
Review the password policy and confirm that it is applicable to all account types
and specifies the password characteristics.
Review the password policy (or alternative policy, such as access control policy)
and confirm that the account lockout and screen lock parameters are also defined.
For a sample of network devices and systems, confirm that the password policy
has been applied.
Review the password policy and confirm that it states that additional controls
must be in place for network devices and systems that cannot support the
password policy.
Ascertain whether all network devices and systems that cannot support the
password policy have been identified and the risk has been raised (requirement
1.2.1).
For a sample of network devices and systems, confirm that the password policy
has been applied.
For a sample of accounts with generic IDs (such as 'Admin'), confirm that these
accounts are being managed under split knowledge.
Evaluation of the risk assessment by the audit team will consider the risks related
to the audit site and to the overall eUICC eco-system. Where an auditee has
assessed the risks of remote access as acceptable at an internal business level, this
may not always be accepted for certification if the auditors consider that the risks
to the overall eco-system are not adequately addressed.
Where remote access is provided, this should be limited to support from known
and trusted personnel within specialist or dedicated teams for remote support or
maintenance of key systems (e.g. dedicated firewall management or production
platform teams).
Where third party-remote access is required for support and involves remote
access to environments containing networks, systems or data within the scope of
SAS certification it is expected that this would be declared prior to the audit. The
third party will normally be subject to an SAS audit on the basis of being a
supporting site/organisation – see section 10.4.6 for more details.
Observe the remote access mechanism and connections to confirm that the
secure channel is from the remote user's device to the target environment.
Review the secure channel configuration for strong encryption and same level of
access control as local access to target devices.
Technical controls in place at the site to restrict the level of access for remote
users should be demonstrated at the audit. The auditors will expect to see
evidence that these controls are implemented at, and managed from a site whose
activities are SAS certified.
Technical controls in place at the site to restrict the level of access for remote
users should be demonstrated at the audit. The auditors will expect to see
evidence that these controls are implemented at, and managed from a site whose
activities are SAS certified.
Control of the pre-defined services exposed to remote users should be
demonstrated at the audit. The auditors will expect to see evidence that services
are designed, implemented and executed in a way that:
• Limits the scope to clearly defined roles.
• Restricts any visibility of sensitive information.
Examples of sensitive information include:
• Class 1 or class 2 data related to the SAS-certified activities.
• Information about system or security configuration that could be of use to a
potential attacker e.g. firewall rules.
This level of access carries the highest level of risk. By default, certified sites that
permit this level of inbound access are expected to demonstrate that these
activities are carried out from within an environment where the logical and
physical security controls and associated processes comply with the requirements
of SAS. In most cases this will require the site hosting the endpoint(s) to be subject
to an SAS audit from the relevant scheme (UP or SM) as part of the certification
process.
Where remote management is provided through an administration portal or tool
that permits administrative actions but no direct access to the system; the portal
or tool itself may also fall within the scope of the audit (e.g. portal/tool audit logs,
evidence of patch management, penetration testing against portal/tool).
SAS does allow for exceptions to the above to be considered in specific
circumstances, as described in 10.4.6.
If a system is presented as off-line / air-gapped for the purpose of the SAS certified
The risk assessment should be presented prior to implementation either:
activities then no level of remote access would be expected.
• At an SAS-SM audit.
Or
• Via a major change notification to the GSMA (in accordance with the SAS-SM
Methodology) for projects that do not align with the site’s audit schedule.
Remote access permitted under the exception should be temporary (during
authorised and controlled periods only), with each access monitored from a SAS-
SM site. The access should be restricted in scope and controlled from the SAS-SM
environment - typically via session monitoring - with no data exporting capabilities
and virtual escorting (ability for an operator in the SAS-SM environment to
monitor the remote session in real-time and terminate it if needed). The
procedure describing this type of remote access must be documented and
demonstrated during the audit.
Workstations used to remotely connect to secure environment should be
reviewed to ensure individuals are authenticated prior to accessing the device,
should be approved company devices, up-to-date with latest relevant patches and
should be hardened as per a defined policy.
Inbound connections should be review to ensure that only the secure channel can
be used for all connectivity.
The remote access process should be reviewed, along with defined policies and
configurations, to verify that MFA is implemented for all remote connections to
higher security networks and from offsite locations.
Audit trails should be reviewed to show all remote activity is being logged and is
linked to an individual.
Review the network diagrams (physical, logical, data flow, and rack) to confirm
that all network devices and systems are defined and connections are secured.
Physical verify the physical rack diagram to the content of the racks and asset
register.
Review the network topology and asset register and confirm that a security in
depth model is adopted whereby there is no single point of failure (e.g. different
makes and model of firewall are deployed).
Review the network diagram and confirm that there is no direct access to the
secure network. Review the firewall rules to verify that connections follow the
principle of minimum access.
Review the network topology and asset register for firewalls. For each make and
model of firewall, confirm that there is a hardening standard in place, which is
based on the industry good practice and vendor recommendations.
Review the approved firewall ruleset against the network topology to confirm that
the minimum access is permitted.
For a sample of firewalls, confirm that the firewall rules implemented agree to the
approved firewall ruleset.
Review the change management policy and procedure and confirm that all firewall
changes are subject to the policy/procedure.
Review the firewall ruleset and for a sample of rules, confirm that there is a
change request, which has been approved.
Review the change requests for firewall rules. For a sample, confirm the approved
changes have been implemented and tested in accordance with the request.
Confirm that there is an IDS in place, either as part of the firewalls or as a separate
installation. Review the hardening standard against the actual configuration.
Review the network topology for deployment of IDS to confirm that all traffic is
subject to analysis and logging.
Confirm that the IDS is generating logs and events have been identified to trigger
alerts (requirement 10.6.1) and incidents are investigated (requirement 2.3.1).
Review the programme for penetration testing (or equivalent policy) to confirm
that penetration tests are performed on a regular basis and the scope of testing to
be applied and approach (e.g. a different pen testing company is used each time
to minimise complacency).
Review the last internal and external penetration test reports and confirm that all
findings have been logged (e.g. risk register (requirement 1.2.1), ticketing system,
and change management system, with all changes being approved and tracked.
Where possible, review re-testing reports to confirm that appropriate action has
been taken to address the findings.
Review the network topology and asset register to confirm that availability has
been considered throughout the design and there is no single point of failure.
Review the risk register (requirement 1.2.1) and business continuity plan
(requirement 1.3.1) and confirm that lack of availability due to threats such as DoS
and DDoS have been identified and appropriate controls are in place it mitigate
these threats, such as a scrubbing service on demand.
Review the network topology diagram and asset register to confirm that there are
no single points of failure.
Confirm that the internal checks and audit programme includes regular checks of
assets.
Review the patch management policy and confirm that all network devices and
systems are to be patched up-to-date with the latest patches, once tested and
approved for deployment.
For a sample of network devices and systems, confirm that the latest security and
critical patches have been installed in line with the patch management policy and
change management policy.
Review the network topology and asset register for systems. For each make and
model, confirm that there is a hardening standard in place, which is based on the
industry good practice and vendor recommendations.
For a sample of systems, confirm that the configuration is aligned to the hardening
standard.
Review the internal checks and audit programme and confirm that it includes
actual configuration setting of systems to the approved baseline. For any
variations identified, confirm that an incident was raised and investigated.
For a sample of systems, review the configuration settings to ensure that they are
hardened.
Review the change management policy and procedure and confirm that all system
changes are subject to the policy/procedure.
For a sample of systems, review the configurations and confirm that there is a
change request, which has been approved.
Review the change requests for system configurations. For a sample, confirm the
approved changes have been implemented and tested in accordance with the
request.
Review the asset inventory and ascertain if security feeds have been established
for each asset and incidents are raised, when vulnerabilities are reported, and
investigated.
For a sample of alerts from vendors, examine the corresponding incident ticket to
confirm that prompt actions were taken to assess the level of risk.
Confirm that expected actions are also defined, together with targets for
resolution.
Review the last two sets of internal and external vulnerability scan reports and
confirm that all network devices and systems were in scope for the scan (compare
to the network topology and asset inventory).
Confirm that all findings from the scans have been logged (e.g. risk register
(requirement 1.2.1), ticketing system, and change management system, with all
changes being approved and tracked.
Where possible, review evidences (e.g. the next scan) to confirm that actions have
resolved the issues raised in the findings.
Review the malware prevention strategy and confirm it defines that a malware
perimeter for the site has been established and appropriate controls defined (such
as anti-virus software and scanning).
Review the asset inventory and for a sample of assets, confirm that anti-virus is
installed and configured to look for and install signature updates at least once a
day and actively scan for viruses.
Confirm that there is a procedures for handling viruses, which includes quarantine
and incident management.
Review the policy for session timeouts and confirm that these include idle
terminals and connections (such as VPN).
Review the asset inventory and for a sample of assets, confirm that session
timeouts for idle terminals (e.g. screensavers) have been configured (remote
access session timeout should be reviewed as part of requirement 10.3.4).
Review the asset management policy (requirement 2.2.3) and ensure it covers the
replacement of systems that are no longer supported by updates (requirement
10.5.1 (ii)) and the decommissioning/decertification procedures for all assets that
are no longer required.
Confirm that the procedures include how the assets should be handled (e.g. data
removed) before the asset is removed from the H.S.A. If the asset is physically
destroyed, there is evidence such as a destruction record or certificate of
destruction (if undertaken by a 3rd party).
Review the asset inventory and change management system for evidences of
decommissioned assets, and review evidences to confirm that assets were
handled appropriately.
Review the backup and retention policy and confirm that all types of data have
been identified, together with their backup schedules and methods. Cross-
reference this to the BCP with regard to availability.
For a sample of backup methods, confirm that the process is performed securely,
including any offsite storage.
Review the event management policy and procedures to confirm that the network
devices and systems are required to generate audit logs and prevent
tampering/deletion of logs and/or log entries.
Verify the controls in place to prevent tampering (e.g. real-time forwarding and
access management).
Confirm that the internal checks and audit programme (requirements 1.4.1 and
10.8.1) includes a review of network devices and systems on a regular basis to
confirm that they are generating logs and forwarding logs to a repository server.
For a sample of network devices and systems, review the log entries and trace
through to the log repository.
Confirm the events that have been identified that would trigger an alert and
confirm the action that has been configured.
Review evidences of alerts (e.g. emails / SMS) and cross-reference to the incident
management system (requirement 2.3.1) to confirm that a ticket is raised and the
incident has been investigated.
For a sample of providers, ascertain what monitoring takes place (such as contract
liaison meetings) and the levels of assurance over the provider for security (e.g.
SOC Type II report, internal audits, etc.).
For a sample of checks, confirm that they have been undertaken in accordance
with the intended frequency.
Review a sample of checks for all areas of control and confirm that they have been
fully documented and undertaken in line with the testing methodology.
Performed at the end of the audit: for any NCs and C- findings, ascertain if they
were covered in the scope of an internal check/audit and identified.
Review a sample of CFSF minutes, and confirm that internal checks and audits is a
standing agenda item and progress on actions are monitored.
Interview personnel / review HR records and confirm individuals are appropriately
trained and competent to perform their role.
Review the SDLC methodology and confirm that security is defined at the
requirements stage.
For a sample of security requirements, confirm that they are tracked through the
lifecycle (e.g. such as a user story).
Confirm that the solution has been subjected to appropriate penetration testing.
For a sample of software developed and released into the environment confirm
that peer code review is performed and formal approval is recorded from relevant
management individuals prior to release.
Review the SDLC methodology and confirm that security is defined at the
requirements stage.
For a sample of security requirements, confirm that they are tracked through the
lifecycle (e.g. such as a user story).
For a sample of software developed and released into the environment confirm
that peer code review is performed and formal approval is recorded from relevant
management individuals prior to release.
Review documented procedures to confirm that it defines how customer
environments are segregated and how customers can only have access rights
within their designated environments.
Confirm that customers are provided with access rights to their own environments
only.
For example, on shared web server's shared IDs shall not be used.
Observe implemented controls and confirm customer SLAs are being met and
customer's cannot override and monopolise shared system resources.
Review procedures for data replication and backup to confirm that controls are
fully defined preventing the replication or backup of data from certified SAS-SM
locations to non-certified SAS-SM locations.
Controls should be reviewed to confirm that data is not being replicated to non-
certified locations as per defined methodology.
Preparation for Online Evidence Review
(A.7 of Annex A to GSMA SAS Remote Audit Policy)
Auditee Evidence Preparation to satisfy detailed test (ensure evidence is available to share via
remote sessions)
Please refer to detailed testing within this document and FS.18 for further clarity.
Document Requirement Refs.
Internal checks and audit methodology / procedures 1.4.1, 5.5.1, 7.7.1, 10.8.2
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Including site classification and controls Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Contract of employment; NDAs; declaration form (manual or
electronic)
Yes
Relating to SAS-SM
Yes
Yes
Yes
Detailing how each check/audit is performed, reporting
requirements, and action tracking
Yes
Security steering committee
List of duties
Yes
Yes
Yes
Yes
Grant / amend / remove access, Remote access, Passwords
Yes
eLearning reports, attendance registers, etc.
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Document Title
File Reference