Bb Ict Policy v4 2023
Bb Ict Policy v4 2023
Bangladesh Bank
Guideline on ICT Security, version 4.0 Draft 2023
Preface
The technology landscape of the financial sector is changing at a rapid pace and the
underlying information technology (IT) infrastructure supporting financial services grown
in size and complexity in recent years. Digital transformation in the financial sector can be
characterized by the introduction of new technologies and the use of existing ones in
innovative ways to achieve greater automation and enrich financial service delivery.
While digital transformation offers significant benefits to the financial ecosystem, it also
increases the exposure to a variety of technological risks, including cyber risks. The
techniques used by cyber threat actors are becoming increasingly sophisticated, and weak
links in the interconnected financial ecosystem can be compromised to conduct fraudulent
financial transactions, exfiltrate sensitive financial data or disrupt the IT systems that
support financial services. The increasing complexity of information and communication
technology (ICT) and security risks, the increasing frequency of IT and security-related
incidents as well as their potentially significant adverse impact on the operations of
financial organizations. Moreover, due to the interconnectedness of the organizations, IT
and security-related incidents risk causing systemic impacts. The introduction of emerging
sustainable technology, formulation of proper security policies and practices, development
of technology management skills and engagement of right human resources in the right
place can overcome these challenges mostly.
This guideline set out how Bank and other Financial Organizations (FOs) should manage
the IT and security risks that they are exposed to. In addition, this guideline is intended to
provide the Bank/FO to which the guidelines apply a better understanding of supervisory
expectations regarding the management of IT and security related risks.
Technical Committee
Chairman
Members
Md. Kaderuzzaman
Joint Director (Ex-Cadre Law)
Law Department
Bangladesh Bank
Sohel Ahmed
Senior Information Security Officer
Cyber Security Unit (CSU)
Bangladesh Bank
Abdullah Al Maruf
Assistant Maintenance Engineer
ICT Infrastructure Maintenance and Management Department
Bangladesh Bank
Tuhin Talukder
Assistant Programmer
Information Systems Development and Support Department
Bangladesh Bank
Naima Akhter
Deputy General Manager
Sonali Bank Limited
S. M. Mizanur Rahman
SVP & CISO
Islami Bank Bangladesh Limited
A B M Rezaul Hasan
Head Risk & Controls and Country Lead Information & Cyber Security
Standard Chartered Bank Limited
Rahat Azim
AGM & Head of Technology Infrastructure
IDLC Finance Limited
In addition, the following officials are also made contribution to prepare this guideline:
Khandakar Rafiqual Islam, Head of Information Security, The City Bank Ltd.
Md. Faisal Hossain , AVP & Head of ICT Security Unit, Mercantile Bank Ltd.
Table of Contents
Chapter 1 Introduction Page [1-2]
1.1 Objectives ..................................................................................................................................................... 1
1.2 Applicability of the Guideline ....................................................................................................................... 2
1.3 Non-Compliance of the Guideline ................................................................................................................ 2
Chapter 1: Introduction
1.1 Objectives
1.1 This Guideline defines minimum control requirements to which each the organization
must adhere. The primary objectives of the Guideline are to:
a) Establish ICT Governance in the Financial Sector;
b) Help Organization developing their own ICT Security Policy;
c) Establish standard ICT Security Management approach;
d) Help Organization developing secure & reliable ICT infrastructure;
e) Establish secure environment for the processing of data;
f) Establish a holistic approach to ICT Risk management;
g) Establish a procedure for Business Impact Analysis in conjunction with ICT
Risk Management;
h) Develop awareness of stakeholders‘ roles and responsibilities for the
protection of information;
i) Prioritize information and ICT systems and associated risks those need to be
mitigated;
j) Establish appropriate project management approach for ICT projects;
k) Ensure best practices (industry standard) of the usage of technology;
l) Develop a framework for timely and effective handling of operation and
information security incidents;
ICT Security Governance must ensure that the ICT functions and operations are
efficiently and effectively managed. The top management needs to ensure that appropriate
IT security controls are in place. They have to contribute to ICT security planning to
ensure that resources i.e. process and technology is allocated consistently with business
objectives and to ensure that sufficient and qualified technical staffs are employed. ICT
Security Management is responsible for the ICT Governance of the Organization that
includes but not limited to Roles and Responsibilities, ICT Security Policy,
Documentation, Internal and External Information System Audit, Training and
Awareness, Insurance and Risk coverage fund.
2.1.2 Roles and responsibilities of the ICT Steering Committee are (but not limited to)
as follows:
ICT Steering Committee needs to be formed with representatives from ICT, Risk,
HR, Cyber Security Unit, ICC/Audit, Legal and other related Business units.
a) Monitor the progress of achieving IT related strategic goals;
b) Aware of exposure towards ICT risks and controls;
c) Provide guidance related to risk, funding, or sourcing;
d) Ensure project priorities and assess feasibility for ICT proposals;
e) Consult and advise on the selection of technology maintaining standards;
f) Ensure compliance with regulatory and statutory requirements;
g) Ensure ICT architecture reflects the need for legislative and regulatory
compliance.
2.1.3 Roles and responsibilities of the ICT Security Committee are (but not limited to) as
follows:
ICT Security Committee needs to be formed with representatives from ICT,
ICT/Cyber Security, Risk, ICC and Business units.
a) Ensure development and implementation of ICT security objectives, ICT
security and risk related policies and procedures;
b) Provide ongoing management support to the Information Security processes;
c) Ensure continued compliance with the business objectives, regulatory and
legal requirements related to ICT security;
d) Support to formulate an ICT risk management framework/process and
establish acceptable ICT risk thresholds/ICT risk appetite and assurance
requirements;
e) Periodic review and provide approval for modification in ICT Security
processes.
2.4.1 Internal Information System (IS) audit shall be carried out by the Internal
Audit/Compliance Department of the organization.
2.4.2 Internal IS audit shall be conducted by personnel with sufficient IS Audit
experience, skills and professional certification.
2.4.3 The Organization shall use Computer-Assisted-Auditing Tools (CAATs) or
similar automated tool to perform IS audit planning, monitoring/auditing, control
assessment, data extraction/analysis, fraud detection/prevention and management.
2.4.4 An annual Information System audit plan shall be developed covering
critical/major technology-based services/processes and ICT infrastructure
including operational branches.
2.4.5 Internal Information System audit shall be done periodically at least once a year.
The audit shall follow risk based approach based on criticality of the services. The
report must be preserved for regulators as and when required.
2.4.6 The Organization shall ensure that audit issues are properly tracked and
completely recorded, adequately followed up and satisfactorily rectified.
2.4.7 The Organization shall take appropriate measures to address the recommendations
made in the last Audit Report.
2.5.1 The Organization shall engage qualified external auditor(s) for their information
systems auditing in-line with their regular audit. The external audit shall be carried
out at least annually.
2.5.2 The External Auditor shall have sufficient IS audit experience and professional
certification for conducting audit activities.
2.5.3 The audit report shall be preserved for regulators as and when required. The
2.7.1 Adequate insurance coverage or risk coverage fund shall be maintained so that
costs of loss and/or damage of the ICT assets can be mitigated.
2.7.2 The risk coverage fund shall be maintained properly in the accounting system of
the Organization, if applicable.
2.7.3 There shall have a clear policy to use risk coverage fund as a necessity if it is
maintained.
ICT risk is a component of the overall risk universe of an enterprise. The risks usually
organization faces include strategic risk, environmental risk, market risk, credit risk,
operational risk, compliance risk, etc. In many enterprises, ICT-related risk is considered
to be a component of operational risk. However, even strategic risk can have an ICT
component itself, especially where ICT is the key enabler of new business initiatives.
The same applies to credit risk, where poor ICT security can lead to lower credit ratings.
It is better not to depict ICT risk with a hierarchic dependency on one of the other risk
categories.
ICT risk is a business risk - specifically, the business risk associated with the use,
ownership, operation, involvement, influence and adoption of ICT within the
organization. It consists of ICT-related events and conditions that could potentially
impact the business.
3.2.2.5 The Organization shall practice the development and use of Risk Scenarios
technique to identify the important and relevant risks amongst all. The developed
risk scenarios can be used during risk analysis where frequency and impact of the
scenario are assessed.
3.4.2 The Organization shall have formal risk escalation process which must identify
who has the authority to accept the risk. Different types of risks such as strategic
risk and operational risk may have different risk escalation matrix.
3.4.3 The Organization shall establish a central repository to record all such ICT risk
events that caused significant impact on the business or franchise of the
organization.
ICT Service Management covers the dynamics of technology operation management that
includes capacity management, request management, change management, incident and
problem management etc. The objective is to set controls to achieve the highest level of
ICT service quality by minimum operational risk.
4.1.1 All requests for ICT services must be approved by an authorized entity defined by
the Organization.
4.1.2 The Organization shall maintain a service catalog with complete list of services.
The service catalog must be kept up to date.
4.1.3 The Organization may have an internal web portal where all users can go to
initiate service requests.
4.1.4 There shall be approved workflow for common service request types which
describes the approval process, service delivery process responsibility and other
aspects of the service.
An incident occurs when there is an unexpected disruption to the standard delivery of ICT
services. The Organization shall appropriately manage such incidents to avoid a situation
of mishandling that results in a prolonged disruption of ICT services.
4.3.1 The Organization shall establish an incident management framework with the
Bangladesh Bank Page | 12
Guideline on ICT Security Draft 2023
shall be documented.
4.4.4 As incidents may trail from numerous factors, the organization shall perform a
root cause and impact analysis for major incidents which result in severe
disruption of ICT services. The Organization shall take remediation actions to
prevent the recurrence of similar incidents.
4.4.5 The root-cause and impact analysis report shall cover following areas:
a) Root Cause Analysis
i. When did it happen?
ii. Where did it happen?
iii. Why and how did the incident happen?
iv. How often had a similar incident occurred over last 2 years?
v. Did detection occur promptly?
vi. What lessons were learnt from this incident?
b) Impact Analysis
i. Extent of the incident including information on the systems, resources,
customers that were affected;
ii. Magnitude of the incident including foregone revenue, losses, costs,
investments, number of customers affected, implications, consequences to
reputation and confidence;
iii. Breach of regulatory requirements and conditions as a result of the
incident.
The goal of capacity management is to ensure that ICT capacity meets current and future
business requirements in a cost-effective manner.
4.5.1 To ensure that ICT systems and infrastructure are able to support business
functions, the organization shall ensure that indicators such as performance,
capacity and utilization are monitored and reviewed.
4.5.2 The Organization shall establish monitoring processes and implement appropriate
thresholds to plan and determine additional resources to meet operational and
business requirements effectively.
4.5.3 The Organization shall prevent resources from being unavailable by implementing
Bangladesh Bank Page | 14
Guideline on ICT Security Draft 2023
4.6.1 The Organization shall have a Migration Policy indicating the requirement of
roadmap/ migration plan / methodology for data migration.
4.6.2 The Organization shall ensure the data confidentiality, integrity, completeness and
consistency of data during the migration process as follows:
a) Data shall be backed up before migration for future reference or any
emergency that might arise out of the data migration process.
b) Data shall not be altered manually or electronically by a person, programmer,
substitution or overwriting in the new system.
c) The total number of records from the source database is transferred to the new
database.
d) New application shall be consistent/ compatible with that of the original
application.
4.6.3 The Organization shall maintain the last copy of the data before conversion from
the old platform and the first copy of the data after conversion to the new platform
separately in the archive for any future reference.
4.6.4 The error logs pertaining to the pre-migration/ migration/ post migration period
along with root cause analysis and action taken need to be available for review.
The ICT landscape is vulnerable to various forms of attacks. The frequency and
malignancy of such attacks are increasing. It is imperative that the organization
implements security solutions at the data, application, database, operating systems and
networks to adequately address related threats. Appropriate measures shall be
implemented to protect sensitive or confidential information such as customer personal
information, account and transaction data which are stored and processed in systems.
Customers shall be properly authenticated before access to online transactions, sensitive
personal or account information.
5.1.3.3 The Organization shall approve list of Software which will only be used in any
computer.
5.1.3.4 Use of unauthorized or pirated software must strictly be prohibited throughout the
organization.
5.1.3.5 The Organization shall take appropriate measures to find out non-compliance /
under-licensed software.
5.1.4 Asset Transfer and Distribution
5.1.4.1 The Organization shall formulate guidelines for the use of portable devices,
especially for the usage at outside premises.
5.1.4.2 The Organization shall define a policy regarding organizational assets return back
from employees/external parties upon termination of their employment, contract
or agreement.
criteria:
a) Zero single points of failure;
b) 99.995 % uptime per annum;
c) 2N+1 infrastructure (two times the amount required for operation plus
a backup);
d) No more than 26.3 minutes of downtime per annum as a maximum
figure;
e) 96-hour power outage protection.
5.2.1.6 Based on the criticality of applications and data, the organization shall determine
the best suited Disaster recovery site for their respective operations. They can
select - Hot site, Warm site, and Cold site, based on their respective requirements.
5.2.1.7 The Organization with Hot site shall meet the following criteria:
a) Hot site is a backup site, which shall up and running continuously. It
shall allow the organization to continue normal business operations,
within a very short period of time after a disaster. Hot site shall be
online and must be available immediately;
b) Hot site shall be equipped with all the necessary hardware, software,
network, and Internet connectivity;
c) Data shall regularly back up or replicated to the hot site so that it can
be made fully operational in a minimal amount of time in the event of a
disaster at the original site;
d) Hot site shall be located far away from the original site, in order to
prevent the disaster affecting the hot site also;
e) Hot site shall be used for business-critical apps;
f) Hot site may be of two type-
i) Active-Active = Both sides are alive;
ii) Active-Passive = Data is replicated in passive site.
5.2.1.8 The Organization with Warm site shall meet the following criteria:
a) Warm site is another backup site, which is not as equipped as a Hot
site. Warm Site shall configure with power, phone, network etc;
b) Warm site may have servers and other resources;
c) In Warm site data is replicated but servers may not be ready.
5.2.1.9 The Organization with Cold site shall meet the following criteria:
a) Cold site contains even fewer facilities than a Warm site;
b) Space and associated infrastructure (e.g., power, telecoms and
environmental controls to support IT systems) shall only be installed
when disaster recovery (DR) services are activated.
5.2.1.10 The Organization shall take permission from Bangladesh Bank prior to establish
of new DC/DR or migration of their existing DC or DR to different location or
different entity.
each year.
5.2.2.15 Server/network room/rack must have protected with lock and key under a
responsible person for both front and back door.
5.2.2.16 Physical access shall be restricted, visitors log must exist and to be maintained
for the server room.
5.2.2.17 Access authorization list must be maintained and reviewed on regular basis.
5.2.2.18 There shall be a provision to replace the server and network devices within
shortest possible time in case of any disaster.
5.2.2.19 Server/network room/rack shall be provisioned with appropriate cooling system.
Water leakage precautions and water drainage system from Air Conditioner shall
be installed.
5.2.2.20 Rack in the Data Center must be protected to meet Earthquake Safety guidelines.
5.2.2.21 Power generator shall be in place to continue operations in case of power failure.
5.2.2.22 Fuel of power generator shall be kept sufficient to meet the demand in case of
national blackout or other similar incidents.
5.2.2.23 UPS shall be in place to provide uninterrupted power supply to the server and
required devices.
5.2.2.24 Immediate measure must be taken on overloading electrical outlets with too many
devices.
5.2.2.25 Address and phone numbers of all contact persons (e.g. fire service, police
station, service providers, vendors and all ICT/ responsible personnel) must be
available to cope with any emergency situation.
5.2.3.9 Power supply from source (Main Distribution Board or Generator) to Data
Center must be dedicated. Electrical outlets from these power sources for any
other devices must be restricted and monitored to avoid the risk of overloading.
5.2.3.10 The following environmental controls shall be installed:
a) Uninterrupted Power Supply (UPS) with backup units;
b) Backup Power Supply;
c) Temperature and humidity measuring devices;
d) Water leakage precautions and water drainage system from Air
Conditioner;
e) Cooling System with backup units. Industry standard cooling system
shall be in place to avoid water leakage from the conventional air
conditioning system;
f) Emergency power cut-off switches where applicable;
g) Emergency lighting arrangement;
h) Dehumidifier for humidity control.
5.2.3.11 The above-mentioned environmental controls shall be regularly tested and
maintenance service contract shall be for 24x7 basis.
bottom (the cables will most likely run under a raised floor), eliminate any
obstructions in the base that can interfere with the cable entry path.
5.2.5.3 After determining the cable entry path, the organization shall separate power and
data cables to prevent erratic or error-prone data transfers. To minimize the effects
of EMI, power cables shall be segregated from data cables as much as practical.
5.2.5.4 The Organization shall ensure that copper data cables and fiber optic cable runs
are separated, because the weight of copper cables can damage the fiber.
5.2.5.5 The Organization shall maintain a consistent cable jacket color coding standard for
each type of cable in the tray, copper, fiber, telecommunication, Power over
Ethernet (PoE), and high voltage power lines for easy identification, expansion,
and repairs.
5.2.5.6 The Organization shall label cables securely on each end.
5.2.5.7 The Organization shall secure cables and connectors to prevent excessive
movement and to provide strain relief of critical points.
5.2.5.8 After cables are installed and labeled, the organization shall ensure that the airflow
path is clear of obstructions.
5.2.5.9 After installing the cable, the organization shall document the complete
infrastructure including diagrams, cable types, patching information, and cable
counts and keep this information easily accessible to data center personnel and
assign updates to one or more staff members and maintain organization.
parts of the process, help to make things faster and more efficient, eliminate
inaccuracies and cut down on the time IT staff spends troubleshooting and
maintaining the data center.
5.3.3.3 Data Custodian will maintain disaster recovery plans and facilities appropriate to
business needs.
The Organization shall establish baseline standards to ensure security for Operating
Systems, Databases, Network equipment and portable devices which shall meet
organization‘s policy. They shall conduct regular enforcement checks to ensure that the
baseline standards are applied uniformly and non-compliances are detected and raised for
investigation.
5.5.1 Internet Access Management
5.5.1.1 Internet access shall be provided to employees according to the approved Internet
Access Management Policy.
5.5.1.2 Access to and use of the internet from bank premises must be secure and must not
compromise information security of the organization.
5.5.1.3 Access to the Internet from bank premises and systems must be routed through
secure gateways.
5.5.1.4 Any local connection directly to the Internet from the organization premises or
systems, including standalone PCs and laptops, is prohibited unless approved by
appropriate authority.
5.5.1.5 Employees shall be prohibited from establishing their own connection to the
Internet using organizations‘ systems or premises.
5.5.1.6 Use of locally attached modems with banks‘ systems in order to establish a
connection with the Internet or any third-party or public network via broadband,
ISDN or PSTN services is prohibited unless specifically approved.
5.5.1.7 Internet access provided by the organization must not be used to transact any
commercial business activity that is not done by the organization. Personal
business interests of staff or other personnel must not be conducted.
5.5.1.8 Internet access provided by the organization must not be used to engage in any
activity that knowingly contravenes any criminal or civil law or act. Any such
activity will result in disciplinary action of the personnel involved.
5.5.1.9 All applications and systems that require connections to the Internet or third-
party and public networks must undergo a formal risk analysis during
development and before production use and all required security mechanisms must
be implemented.
5.5.1.10 The Organization shall install network security devices, such as firewalls as well
as intrusion detection and prevention systems, at critical stages of its ICT
infrastructure to protect the network perimeters.
5.5.2.1 The Organization shall develop a remote access security policy that defines remote
access and BYOD requirements.
5.5.2.2 The Organization shall ensure that remote access servers are secured effectively
and configured to enforce remote access security policies. The Organization also
ensure that remote access servers are kept with up-to-date patches and that they
can only be managed from trusted hosts by authorized administrators.
5.5.2.3 The Organization shall consider the network placement of remote access servers.
5.5.2.4 The Organization shall make risk-based decisions about what levels of remote
access should be permitted from which types of client devices.
5.5.2.5 If external device use (e.g., BYOD, third-party controlled) is permitted within the
organization‘s facilities, the organization shall strongly consider establishing a
separate, external, dedicated network for this use with remote access policies.
Allowing BYOD and third party controlled client devices to be directly connected
to internal enterprise networks adds risk as these devices do not have the same
security safeguards as the organization‘s own devices.
5.8.1 The Organization shall evaluate all new applications to determine their risk and
suitability for installation in the production environment.
5.8.2 Applications that require authentication must be configured with password policy
having appropriate complexity. The Organization may enhance security of the
application by setting up multi-factor authentication where possible.
5.8.3 All changes to the existing application shall be made in compliance with Change
Control Procedures.
5.8.4 The Organization shall ensure security patches are deployed on timely manner and
known vulnerabilities are remediated as quickly as possible.
5.9.1 User accounts & user rights shall be defined. Password and profile policies shall
be set up, strong passwords policy shall be enforced and roles shall be used to
limit user access to data.
5.9.2 Access Control systems shall include File permissions, Program permissions &
Data rights.
5.9.3 All access to any database containing cardholder data (including access by
applications, administrators, and all other users) shall be restricted.
5.9.4 Privilege review shall be conducted to identify privileges that are being used, track
the source of the privileges and identify privileges that are not being used.
5.9.5 Access to cardholder database shall be driven through two factor authentication.
5.9.6 Database shall not be accessible through the Internet.
5.9.7 Database that stores cardholder data shall be placed in an internal network zone,
Bangladesh Bank Page | 29
Guideline on ICT Security Draft 2023
5.11.1 The Organization shall establish and ensure that the patch management procedures
include identification, categorization and prioritization of security patches. To
implement security patches in a timely manner, the organization shall establish the
implementation time frame for each category of security patches.
5.11.2 The Organization shall perform testing of security patches before deployment into
the production.
5.11.3 The Organization shall document patch management procedure. The document
must include scope, roles and responsibilities, timeline, functional guidelines, and
procedures. The scope should outline what systems are addressed with patching.
5.11.4 The Organization shall establish procedures for handling exceptions to the patch
management process. For instance, situations where some critical systems cannot
be taken offline for patching or patching may cause conflicts with other
application.
5.14.7 Corporate email address must not be used for any social networking, blogs,
groups, forums etc. unless having management approval.
5.14.8 Employees must avoid opening attachments and links for content that is not well
understood or looks suspicious. Employees must cross-check the sender
information and subject to ascertain their legitimacy
5.14.9 The organization must arrange email security awareness session for all new joiners
within 60 days of their enrollment covering the importance of detecting phishing
emails, email etiquette and reporting of incidents to appropriate authority within
the organization. Organization shall also ensure regular staff communication also
covers email security related topic on a regular basis. A yearly refresher of such
awareness session is also recommended for all staff for ensuring continuous
awareness in this regard.
5.14.10 Email transmissions from The Organization must have a disclaimer stating about
confidentiality of the email content and asking intended recipient.
5.14.11 Concerned department shall perform regular review and monitoring of email
services.
5.14.12 The Organization shall use end to end encryption (such as PGP) in case of
sensitive data transmission.
6.3 Cryptography
The primary application of cryptography is to protect the integrity and privacy of sensitive
or confidential information. Cryptography is commonly used in Banks and NBFIs to
protect sensitive customer information such as PINs relating to critical applications (e.g.
ATMs, payment cards and online financial systems).
All encryption algorithms used in a cryptographic solution shall depend only on the
secrecy of the key and not on the secrecy of the algorithm. As such, the most important
aspect of data encryption is the protection and secrecy of cryptographic keys used,
whether they are master keys, key encrypting keys or data encrypting keys.
6.3.1 The Organization shall encrypt all non-console administrative access using strong
cryptography. Use technologies such as SSH, VPN or TLS etc. for web-based
management and other non-console administrative access.
6.3.2 The Organization shall ensure encryption in ‗data at rest‘ & ‗data in transit‘ for
critical data.
6.3.3 The Organization shall establish a procedure on the use, protection, and lifetime of
cryptographic keys through their whole lifecycle.
6.3.4 Cryptographic keys must be generated and stored in a secured manner that
prevents loss, theft, or compromise. Key generation must be seeded from an
industry standard Random Number Generator (RNG). For examples: Approved
Random Number Generators for FIPS PUB 140-2.
6.3.5 All cryptographic keys should be protected against modification and loss. In
addition, secret and private keys need protection against unauthorized use as well
as disclosure. Equipment used to generate, store and archive keys should be
physically protected.
6.3.6 Keys that are no longer used or needed, or keys that have expired, or keys that are
known or suspected to be compromised, should be revoked and/or destroyed to
ensure that the keys can no longer be used. If such keys need to be kept (for
example, to support archived, encrypted data) they should be strongly protected.
6.3.7 The Organization shall maintain a backup of cryptographic keys.
6.5.1 The Organization shall form Computer Incident Response Team (CIRT) in order
to response immediately on any Cyber Incident Detected in the organization.
6.5.2 CIRT shall follow the following Incident response steps:
i. Preparation
ii. Detection and Analysis
iii. Containment, Eradication and Recovery
iv. Post-Incident Activity
6.5.3 CIRT shall cooperate and report to Bangladesh Bank CIRT and National CIRT.
6.5.4 CIRT shall consist of system administrator, network administrator, database
administrator, Middleware application administrator, Application Development
manager, Swift Manager and SOC team member, Security experts and Legal
Advisor.
6.5.5 The Organization shall arrange necessary training for the CIRT to understand and
perform their tasks properly.
6.5.6 CIRT may participate national and international level cyber drill to develop their
capacity.
6.7.1 The Organization shall arrange for digital forensic setup in order to perform post
incident forensic.
6.7.2 The Organization shall train a team to aid professional forensic investigator.
6.7.3 The Organization shall maintain isolation for the affected system during forensic.
6.7.4 The Organization shall ensure the forensic team is not biased.
Bangladesh Bank Page | 40
Guideline on ICT Security Draft 2023
6.7.5 The Forensic Team shall be aware of the Laws and regulation of the country and
perform forensic accordingly.
6.7.6 The Organization shall have proper and adequate setup/tools for forensic
operation.
6.7.7 The Forensic Team shall report the investigation to the management and if needed
submit report and face the jury in the court.
6.8.1 The Organization shall arrange security awareness training for its entire staff in
the earliest possible time after the start of employment and annually thereafter.
End users should be trained to do the following:
a) Training personnel about identifying social engineering attacks and how to
recognize common signs of attack.
b) Defend against phishing attacks
i) Be suspicious of unexpected email messages or email messages from
unknown senders.
ii) Never open unexpected email attachments.
iii) Never share sensitive information via email.
iv) Avoid clicking any link received via email, instant messaging or a social
network message.
6.8.2 The staff of the organization shall not share sensitive information with an
unauthorized individual.
6.8.3 The Organization shall verify user identity before modifying any authentication
credential—for example, performing password resets, provisioning new tokens or
generating new keys.
6.8.4 The Organization shall ensure that the staff does not provide personal information
or information about their organization, including its structure or networks, unless
they are certain of a person's authority to have the information.
6.8.5 The Organization shall enforce Multi-Factor Authentication (MFA) for critical
systems.
6.8.6 The Organization shall follow all the controls of ‗Cyber Security Framework‘
formulated by Bangladesh Bank.
Definition: The National Institute of Standards and Technology (NIST) define cloud
computing as follows:
―Cloud computing is a model for enabling ubiquitous, convenient, on-demand network
access to a shared pool of configurable computing resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly provisioned and released with
minimal management effort or service provider interaction. This cloud model is
composed of five essential characteristics, three service models and four deployment
models.‖
Deployment Models:
Deployment models are defined to distinguish between different models of ownership and
distribution of the resources used to deliver cloud services. Cloud environments may be
deployed over a private infrastructure, public infrastructure or a combination of both. The
most common deployment models as per NIST include:
Private Cloud: The cloud infrastructure is provisioned for exclusive use by a single
Organization comprising multiple consumers (e.g., business units). It may be owned,
managed, and operated by the organization, a third party, or some combination of them,
and it may exist on or off premises.
Public Cloud: The cloud infrastructure is provisioned for open use by the general public.
It may be owned, managed, and operated by a business, academic, or government
organization, or some combination of them. It exists on the premises of the cloud
provider.
Hybrid Cloud: The cloud infrastructure is a composition of two or more distinct cloud
infrastructures (private, community, or public) that remain unique entities, but are bound
together by standardized or proprietary technology that enables data and application
portability (e.g., cloud bursting for load balancing between clouds).
Service Models: The National Institute of Standards and Technology (NIST) define three
types of cloud service model which is as follows:
Software as a Service (SaaS): The capability provided to the consumer is to use the
provider‘s applications running on a cloud infrastructure. The applications are accessible
from various client devices through either a thin client interface, such as a web browser
(e.g., web-based email), or a program interface. The consumer does not manage or control
the underlying cloud infrastructure including network, servers, operating systems, storage,
or even individual application capabilities, with the possible exception of limited user
specific application configuration settings.
Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto
the cloud infrastructure consumer-created or acquired applications created using
programming languages, libraries, services, and tools supported by the provider. The
consumer does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storage, but has control over the deployed
applications and possibly configuration settings for the application-hosting environment.
The objective of Identity and Access Management (IAM) is to ensure who gets access to
what assets at which locations, for how long and for what purpose. The Organization shall
only grant access rights and system privileges based on least privileges principle in
consistent with job responsibility.
8.2.8 Maximum validity period of password shall not be beyond the number of days
permitted in the organization's Policy (maximum 90 days cycle).
8.2.9 The Organization may use CAPTCHA or similar method to prevent repeated login
attempts by intruder.
8.2.10 Administrative passwords of Operating System, Database and Business
Applications shall be kept in a safe custody with sealed envelope if Privileges
Access Management (PAM) Solution not used.
Business Resilience is required for planning of business resiliency for critical incidents;
operational risks take into account for wide area disasters, Data Center disasters and the
recovery plan. The primary objective of Business Resilience is to incorporate effective
Business Continuity Plan (BCP) that reflects how quickly & effectively restore normal
business operations in case of any disaster or other disruptions. In order to survive with
minimum financial and reputational loss, the organization shall assure that critical
operations can resume normal processing within a reasonable time frame. The
contingency plan shall cover the business resumption planning and disaster recovery
planning. Contingency plan shall also address the backup, recovery and restore process.
9.1.2.3 The Organization shall identify and prioritize the activities (i.e., products, services,
business functions and processes) by performing BIA to determine the following
but not limited to:
a) The potential impact of business disruptions for each prioritized business
function and processes, including but not restricted to financial, operational,
customer, legal and regulatory impacts
b) The Recovery Time Objectives (RTOs), Recovery Point Objectives (RPOs)
and Maximum Tolerable Downtime (MTD)
9.1.2.4 The BIA shall be reviewed and updated annually and when major changes occur
in the organization (e.g., people, process, technology, suppliers and locations).
9.2.2.9 The Organization shall carry out periodic testing and validation of the recovery
capability of backup media and assess whether it is adequate and sufficiently
effective to support the bank‘s recovery process.
9.3.1 The Organization shall have an approved crisis management plan which may be
incorporated in BCP.
9.3.2 The effectiveness of the crisis management plan shall be measured and
periodically evaluated.
9.3.3 The Organization shall document a crisis management plan that defines how crisis
resulting from major incidents will be addressed and managed, and should include
at least:
a) Criteria for declaring a crisis;
b) The Organization should establish a command center for centralized
management and an emergency command center;
c) Crisis-management team members: Considering representatives of the critical
products, services, functions and processes of the organization (including
Communications Department);
d) Contact details of those who are part of the crisis management team (including
third parties);
e) Definition of the steps to be taken during and after a crisis or disaster
(including the mandates required);
f) Communication plan including the media response plan, to address the
communication with the internal and external stakeholders during crisis. The
frequency of crisis management tests.
This chapter covers security discipline of the new software whether it is in development
or acquisition with variety of concerns. These concerns are the security of the
development environment, software and component security, application security and the
secure development lifecycle.
For any new application of business function for The Organization requires rigorous
analysis before acquisition or development to ensure that business requirements are met in
an effective and efficient manner. This process covers the definition of needs,
consideration of alternative sources, review of technological and economic feasibility,
execution of risk analysis and cost-benefit analysis and conclusion of a final decision to
'make' or 'buy'.
10.3.1 Rules for the development of software and systems shall be established and
applied to developments within the organization.
10.3.2 The Organization shall ensure secure software development processes based on
Bangladesh Bank Page | 50
Guideline on ICT Security Draft 2023
10.4.1 Agreements shall address the information security practices are maintained in
vendor institution during development. Following an international standard (e.g.
CMMI) is highly recommended.
10.4.2 Agreements shall address the secure transfer of business information between the
organization and vendors.
Digital Payment is a paradigm shift in the finance and banking sector. Especially the
advent of Fintech is an evolution of financial industry. The technology facilitates the
customers to avail banking services regardless of physical branch, any specific location or
specific time. Customers can perform banking transactions through their ATM, POS,
Fintech based apps, access the digital Interactive Voice Response (IVR), Internet Banking
etc. Digital Payment ensures higher customer satisfaction at lower operational expenses
and transaction costs. However, Security of digital payment is essential to safeguard the
customer data and financial activities.
11.1.1 The Organization shall install anti-skimming solutions on ATM devices to detect
the presence of unknown devices placed over or near a card entry slot.
11.1.2 The Organization shall install fraud detection mechanisms and send alerts to
appropriate staff for follow-up response and action.
11.1.3 The Organization shall implement tamper-resistant keypads to ensure that
customers‘ PINs are encrypted during transmission.
11.1.4 The Organization shall implement appropriate measures to prevent shoulder
surfing of customers‘ PINs.
11.1.5 The Organization may implement biometric finger vein sensing technology to
resist PIN compromise.
11.1.6 The Organization shall conduct video surveillance of activities for 24 hours at
these machines (preferably in a centralized system) and maintain the quality of
CCTV footage and preserve for at least one year.
11.1.7 The Organization shall confirm transparent or semi-transparent front side of the
ATM Booth to make the ATM visible from outside to monitor.
11.1.8 The Organization shall introduce a centralized online monitoring system for Cash
Balance, Loading-Unloading functions, Disorders of machine, etc. Cash loading in
ATM terminal should ensure dual control.
11.1.9 The Organization shall verify that adequate physical security measures are
implemented in ATM devices.
11.1.10The Organization shall inspect all ATM devices frequently to ensure standard
practice (i.e., environmental security for ATM, anti-skimming devices for ATM
device surface tempering, etc.) is in place with necessary compliance. Inspection
log sheet shall be maintained on ATM booth premises and centrally.
11.1.11The Organization shall monitor third party cash replenishment vendors‘ activities
constantly and visit third party cash sorting houses regularly. If remote access of
vendor is required for support purposes or maintain system components, then safe
and secured connectivity must be ensured.
11.1.12 The Organization shall confirm that ATM Terminal OS is updated and hardened
as per best practice. BIOS or UEFI should be Password protected.
11.1.13 The Organization shall educate its customers on security measures that are put in
place by The Organization and are to maintain by the customers for ATM
transactions.
11.4.1 The Organization shall provide assurance to its customers and users so that online
access and transactions performed over the internet are adequately protected and
authenticated.
11.4.2 The Organization shall implement a strong password policy including password
complexity assessment, periodic enforcement for change of password, blocking
account for multiple wrong PIN attempts etc. for Internet Banking customers.
Bangladesh Bank Page | 54
Guideline on ICT Security Draft 2023
11.4.3 The Organization shall properly evaluate security requirements associated with its
internet banking system and adopt mechanisms which are well-established
international standards.
11.4.4 The Organization shall formulate Internet Banking Security policy considering
technology security aspects as well as operational issues.
11.4.5 The Organization shall ensure that information processed, stored or transmitted
between the bank and its customers is accurate, reliable and complete. The
Organization shall also implement appropriate processing and transmission
controls to protect the integrity of systems and data, e.g. TLS.
11.4.6 The Organization shall implement Multi-Factor Authentication (MFA) for all
types of online financial transactions.
11.4.7 An online session needs to be automatically terminated after a fixed period unless
the customer is re-authenticated for the existing session to be maintained.
11.4.8 The Organization shall implement monitoring or surveillance systems to follow-up
and address subsequently any abnormal system activities, transmission errors or
unusual online transactions.
11.4.9 The Organization shall maintain high resiliency and availability of online systems
and supporting systems (such as interface systems, backend host systems and
network equipment). The Organization shall put in place measures to plan and
track capacity utilization as well as guard against online attacks. These online
attacks may include denial-of-service attacks (DoS attack) and distributed denial-
of-service attack (DDoS attack).
11.4.10 The Organization shall take appropriate measures to minimize exposure to other
forms of attacks such as man-in-the-middle attack (MITMA).
11.5.1 The Organization which provides payment card services shall implement adequate
safeguards to protect sensitive payment card data. The Organization shall further
ensure that sensitive card data is encrypted to ensure the confidentiality and
integrity of these data in storage and transmission.
11.5.2 The Organization shall ensure that the processing of sensitive or confidential
information is done in a secure environment.
11.5.3 The Organization shall perform (not a third-party payment processing service
provider) the authentication of customers' sensitive static information, such as
PINs or passwords. The Organization shall perform regular security reviews of the
infrastructure and processes being used by its service providers.
11.5.4 Equipment used to generate payment card PINs and keys shall be managed in a
secured manner. Payment cards and related PINs should send to the customer in a
secured manner so that no information can be compromised in transit.
11.5.5 Card personalization, PIN generation, Card distribution, PIN distribution, Card
activation groups shall be segregated from each other.
Bangladesh Bank Page | 55
Guideline on ICT Security Draft 2023
11.5.6 The Organization shall ensure that security controls are implemented at payment
card systems and networks. The Organization must comply with the industry
security standards, e.g., - Payment Card Industry Data Security Standard (PCI
DSS) to ensure the security of cardholder's data.
11.5.7 In case of card personalization by a third party, partner institutions should also be
PCI DSS certified with adequate control for communication channel that transmits
cardholder's data.
11.5.8 The Organization shall only activate new payment cards upon obtaining both the
customer‘s acknowledgment and call confirmation/OTP verification.
11.5.9 Card must be captured if wrong password will attempt more than three times.
11.5.10 The undelivered and inactivated card should be destroyed in a stipulated period
predefined by the organization.
11.5.11 To enhance card payment security, the organization shall promptly notify
cardholders via transaction alerts including source and amount for any transactions
made on the customers‘ payment cards.
11.5.12 The Organization shall set out risk management parameters according to risks
posed by cardholders, the nature of transactions or other risk factors to enhance
fraud detection capabilities.
11.5.13 The Organization shall implement solution to follow up on transactions exhibiting
behavior, which deviates significantly from a cardholder‘s usual card usage
patterns. The Organization shall investigate these transactions and obtain the
cardholder‘s authorization prior to completing the transaction.
11.6.1 Payment Gateway Provider shall be PCI-DSS or similar other security standards
compliant.
11.6.2 Payment Gateway Provider shall ensure the agreement between them and their
respective merchants covering all legal / data breach / cyber incident / regulatory
aspects in order to safeguard the interests of the customers.
11.6.3 The Organization shall implement appropriate processing and transmission
controls to protect the integrity of systems and data, e.g. TLS.
12.1 Outsourcing
Outsourcing to the different ICT services is a common phenomenon. Agreements of such
outsourcing arrangement usually include performance targets, service levels, availability,
reliability, scalability, compliance, audit, security, contingency planning, disaster
recovery capability and backup processing facility.
12.1.1 The Organization seeking to outsource activities shall develop a comprehensive
policy for outsourcing duly approved by its Board of Directors.
12.1.2 The Organization shall ensure that contractual terms and conditions governing the
roles, relationships, obligations and responsibilities of all contracting parties are
set out fully in written agreements.
12.1.3 Outsourcing activities shall be evaluated based on the following practices:
a) Objective behind outsourcing;
b) Economic viability;
c) Risks and security concerns;
d) Compliance status of the regulatory guideline(s);
e) Defining the outsourcing strategy.
12.1.4 ICT outsourcing shall not result in any weakening or degradation of the
organization‘s internal controls.
12.1.5 The Organization shall require the service provider to develop and establish a
disaster recovery contingency framework which defines its roles and
responsibilities for documenting, maintaining and testing its contingency plans
and recovery procedures.
12.1.6 The Organization shall develop a contingency plan for critical outsourced
technology services to protect them from unavailability of services due to
unexpected problems of the technology service provider. This may include
termination plan and identification of additional or alternate technology service
providers for such support and services.
12.1.7 The Organization shall have an acquisition plan with the purpose to define the
strategy to outsourcing organization selection.
12.1.8 The Organization shall evaluate the specialty of services, quality of support staff
and previous reputation of the outsourcing organization.
12.1.9 The Organization shall consider the efficiency, capacity and standard of an
12.2.1 There shall have Service Level Agreements between the organization and vendors.
12.2.2 The Annual Maintenance Contract (AMC) with the vendor shall be active.
12.2.3 The requirements and conditions covered in the agreements would usually include
performance targets, service levels, availability, reliability, scalability compliance,
audit, security, contingency planning, disaster recovery capability and backup
processing facility.
12.2.4 Service contracts with all service providers including third-party vendors shall
include:
a) Pricing;
b) Measurable service/deliverables;
c) Timing/schedules;
d) Confidentiality clause;
e) Contact person name (on daily operations and relationship levels);
f) Roles and responsibilities of contracting parties including an escalation matrix;
g) Renewal period;
h) Modification clause;
i) Frequency of service reporting;
j) Termination clause;
k) Penalty clause;
l) Warranties, including service suppliers‘ employee liabilities, 3rd party
liabilities and the related remedies;
m) Geographical locations covered;
n) Ownership of hardware and software;
o) Documentation (e.g., logs of changes, records of reviewing event logs);
p) Right to have information system audit conducted (internal or external);
q) Information of Sub-Contractor (If any).
12.4.1 There must be a core team comprising of personnel from Functional Departments,
ICT Departments and Internal Control & Compliance Department, legal
Department etc. for vendor selection.
12.4.2 Vendor selection process must have conformity with the Procurement Policy of
the organization.
12.4.3 Vendor selection criteria for application must address followings:
a) Market reputation, presence and position in industry;
b) Years in operation;
c) Technology alliances;
d) Extent of customization and work around solutions;
e) Financial strength;
f) Performance and Scalability;
g) Number of installations;
h) Existing customer reference;
i) Support arrangement;
j) Local support arrangement for foreign vendors;
k) Weight of financial and technical proposal;
l) Employee Capabilities;
m) Quality Assurance.
ensuring the data availability and continuation of services for any circumstances
e.g., diplomacy changes, natural disaster, relationship break down, discontinuity of
services or others.
12.5.2 The Disaster Recovery Site shall be multi-layered in terms of physical location
and redundancy in connectivity.
12.5.3 The Organization shall ensure that the remote access is given to the cross-border
service provider following the guidelines mentioned in Chapter 8 of this guideline.
12.5.4 The Organization shall ensure that the support model and relevant service
personnel responsibility along with contact details is mentioned within the Service
Level Agreement (SLA) with the service provider and only remote access is
granted to the relevant personnel as per the SLA. Any deviation must be approved
from the appropriate authority & register as an exception in risk register prior to
provide any access to the cross-border support.
12.5.5 Prior to any cross-border SLA establishment, the organization shall take necessary
approval from Bangladesh Bank considering the Guidelines of outsourcing
arrangement.
The security awareness and training program is a critical component of the information
security program. It is the vehicle for disseminating security information that the
workforce, including managers, need to do their jobs.
These programs will ensure that personnel at all levels of the organization understand
their information security responsibilities to properly use and protect the information and
resources entrusted to them. Agencies that continually train their workforce in
organizational security policy and role-based security responsibilities will have a higher
rate of success in protecting information.
13.1 Management
13.2 Employee
13.2.1 The Organization shall select the training delivery method depends on cost-
effectiveness in terms of achieving the training outcome. Training activity shall
mostly be delivered in a combination of the following forms (individual or
corporate):
a) Training provided by internal and/or external experts;
b) On the Job Training (OJT);
c) E-learning;
d) Conferences/Seminars participation;
e) Rotation assignments;
f) Pre-employment training;
g) Training apprentices;
h) Continuous education assistant;
i) Online training;
j) Counseling.
13.2.2 The Organization shall select the training modules based on:
a) Technical Skills: Specialized subjects to develop technical skills and
knowledge according to the job/function;
13.3.1 The Organization shall arrange Security Awareness and Education for the general
user of the organization.
13.3.2 The Organization shall ensure program aims to provide employees the real
scenario-based security incident related programs.
13.3.3 The Organization shall arrange Risk Management/Information Security Seminar
to increase the level of awareness of employees on risk management and
information security on a periodic basis covering all employees by means of
either physical or online methods.
13.3.4 The Organization shall ensure adequate training/awareness facilities for IS/ICT
Audit team considering any new banking services and technological changes.
13.5.1 The Organization shall provide special training for the internal trainer on a
specific topic. Besides, method shall be developed, how a trainer would efficiently
Bangladesh Bank Page | 65
Guideline on ICT Security Draft 2023
conduct training.
13.5.2 The Organization shall evaluate the qualification and relevant industry experience
of the trainer before the appointment for the training program.
The banking and financial industry in the world is geared up for a transformational space
and has gained a significant momentum through embracing futuristic technologies such as
applications of Artificial Intelligence (AI), Machine Learning (ML), Data Analytics,
Distributed Ledger Technology (e.g. blockchain), Robotics, Cloud computing, etc.
Every technology has a double-edged sword and banks need to carry out due diligence
with regard to new technologies since they can potentially introduce additional risk
exposures or unintended consequences.
AI is a relatively new force in business, thus, AI enablers, or the AI itself could create
new risks. As well as AI has significant challenges for the organizations, from
reputational damage and revenue losses to regulatory backlash, criminal investigation,
and diminished public trust.
AI system may have scripting errors, bad algorithm, data difficulties or lapses in data
management, technology and process troubles/issues, security snags, inadequate human–
machine interactions and may also deliver biased results and underrepresented data
population may be used to train the AI model.
Machine learning systems open new avenues for attacks that don‘t exist in conventional
procedural programs. One of these is the evasion or adversarial attack, in which a foe
attempts to inject inputs to ML models that are intentionally meant to trigger mistakes.
The data may look okay to humans, but subtle variances can cause ML algorithms to go
wildly off track.
Such attacks may occur at inference time by exploiting the model‘s internal information,
typically in one of two ways like white box attack and black box attack. The most
common machine learning attacks are Evasion attacks, Poisoning attacks, Model
Inversion attacks, Online System Manipulation, Transfer learning attack and Privacy
Attacks.
Following best practices can help fight back the attacks on machine learning systems:
14.6.1 It must be ensured that completely trusted third party or vendor has been involved
to train model or provide samples for preparing it.
14.6.2 A mechanism or plan shall be developed to inspect the training data for any
Data Tampering, Eavesdropping, Data Theft, Falsifying User Identities, Password related
Threats, Unauthorized Access to Tables and Columns or Data Rows and Lack of
Accountability are some loopholes of data analytics.
14.16.1 The Organization shall define and establish a business process and/or procedure
in relation of the Blockchain solution and its use cases.
14.16.2 The Organization shall perform the risk management strategy in relation with
Blockchain-based solution including but not limited to performing risk assessment
and treatment along with on-going monitoring and review.
14.16.3 The Organization shall establish and agree on a process to define the data type
that will be stored on the Blockchain along with the data‘s ownership
responsibilities.
14.16.4 The Organization shall define, design, plan, and implement an Identity Access
Management (IAM) solution for the granted Blockchain-based service in line with
the user on-boarding and off-boarding processes.
14.16.5 The Organization shall establish and agree on the architecture and procedure for
Hardware Security Module (HSM) implementation for securing Blockchain
identity keys.
14.16.6 The Organization shall protect and secure the internal and external
communications of the Blockchain-based solution using a highly secure
channel(s).
14.16.7 The Organization should define, develop, implement the security incident and
event management process and/or procedure about the Blockchain-based solution
including preparation, detection and analysis, containment, eradication, and
recovery.