Thompson advises banks take three steps to help secure their machine-to-machine processes:
- Firstly, banks need to make sure that they encrypt their automate processes as a first step in preventing data breaches.
- Secondly, banks should adopt the same security policies for machine-to-machine processes that they have for manual human-to-machine processes. That means putting in authentication, auditing and monitoring tools to ensure secure access and keep an eye out for attacks.
- Thirdly, centralizing SSH key management will be important going forward in auditing access to keys both for security and compliance. (Note that the newest version of PCI compliance requires controls be put in place for SSH kay management.) Unfortunately most organizations in the study (65%) shared responsibility for the management of those keys among many individuals. But centralizing that responsibility will help increase visibility and enable faster responses to potential intruders.
[To learn more about how financial firms are preparing for and responding to security incidents, attend the Acknowledge the Inevitable: How to Prepare For, Respond to, and Recover from a Security Incident session at Interop 2014 in Las Vegas, March 31-April 4.
You can also REGISTER FOR INTEROP HERE.]
Jonathan Camhi has been an associate editor with Bank Systems & Technology since 2012. He previously worked as a freelance journalist in New York City covering politics, health and immigration, and has a master's degree from the City University of New York's Graduate School ... View Full Bio