mojaloop / project

Repo to track product development issues for the Mojaloop project.
Other
23 stars 15 forks source link

Data Protection - Secure Logging Standard and Guidelines #1358

Closed godfreykutumela closed 3 years ago

godfreykutumela commented 4 years ago

Goal:

The objective is to look at compliance to best practice standards with regards to audit logging within a Mojaloop implementation. We shall investigate the following:

  1. Identify sources of audit logs
  2. Document PII data according to GDPR and investigate PII data in Mojaloop logs
  3. Document security logging standard
  4. Make recommendations for audit logging configurations

Tasks:

Acceptance Criteria:

Dependencies:

Accountability:

godfreykutumela commented 4 years ago

PI 11 Backlog

rasputtintin commented 4 years ago

Task 1 - Extract audit logs from Mojaloop services and analyze them for audit logging adequacy :

Findings:

Mojaloop Log Analysis.docx

rasputtintin commented 4 years ago

Task 2 - Explore Data Protection Standard for Data at Rest: Data at rest is static data stored on hard drives that is archived or not often accessed or modified.

Data protection standard will involve access controls for the specific areas where data is stored in Mojaloop applications and infrastructure.

Recommended standards for non log information

The following protective controls are recommended for Mojaloop data at rest:

  1. Conduct a data classification exercise to identify types of data at rest within Mojaloop, where they are stored and access controls for each data type.
  2. Access control restrictions - Enforce access control restrictions using any of the following:
    • Application brokering via privileged account control tools
    • File based permissions
    • Network segmentation
    • Logical role based access control
  3. Monitoring file access using a file integrity monitoring tool with alerts on suspicious activities
  4. Exploring encryption of PII data to render it unreadable and unusable outside Mojaloop environment
  5. Explore options for a vaulting solution to store sensitive authentication artifacts such as PKI keys, certificates e.t.c

OSS Data protection Standard - At Rest.docx

rasputtintin commented 4 years ago

Findings from Log Analysis of Mojaloop logs:

Recommendations for audit logging in Mojaloop

Audit logs create records that help you track access to the Mojaloop environment. Therefore, a complete audit log needs to include, at a minimum all or a combination of:

OSS Audit logging Standard.docx

godfreykutumela commented 4 years ago

Thanks @rasputtintin I moved the story to final review.

rasputtintin commented 4 years ago

Made minor updates to document to add details of importance of Audit logging to the Mojaloop switch implementation:

Importance of Audit Logs Audit logging provides a historical account of all activities done by actors within a Mojaloop ecosystem. It will help Mojaloop implementations in the following ways:

  1. Threat Detection Analytics – Through audit logs it is possible for Mojaloop switch operators to detect possible anomalies and identify malicious actions and trigger appropriate responses. This will go a long way in mitigating against possible fraud at DFSP and switch level.
  2. Customer Forensics – In cases of queries from DFSPs, audit logs can assist give a forensic breakdown of transaction details as well as actions by authorized switch actors.
  3. Compliance – Compliance standards such as GDPR have requirements to extract “all” customer data and also “delete” all customer data. For this to be possible, the audit data may also need to be extracted and preserved/deleted as appropriate. Audit logs are a critical requirement in most global best practice standards and regulatory frameworks such as PCI-DSS and GDPR.

OSS.Audit.logging.Standard v1.1.docx