HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION ITC-002 CHECKLIST FOR BASIC SECURITY CONTROL REQUIREMENTS - PROJECT AND APPLICATION LEVEL Version 2.9 Project : _____Project Management Tracker ITR SR92184_____Date : ____Nov 2020_ Machine/Server : ___________________________________ (fill in one for each machine) Server Location : PJC / WHL / Vendor premise (delete where not applicable) Team Leader : __________________ Signature : ___________________ SSO In-Charge : __________________ Signature : ___________________ Note #1 : This is a checklist which guides through the project team to act on standard security requirements that need to be complied with before implementation. This list should not be treated as a detailed security requirement specification. Note #2 : Please take note that controls listed below are the standard and basic controls. There could be other control areas which should be considered and applied where applicable. Vendors and project team members should highlight other relevant security requirements for review and compliance if they know of any. These additional controls can be added into this checklist for follow-up purposes. No. Control Requirement Can be Complied? (Y/N) To be filled in by vendor at Project initial stage. Pls justify in details for each of your response. Controlled Fulfilled? To be filled in by SSO prior to UAT and Production Implementation. Pls justify if cannot comply. Other remarks GITS: Is it that in the cloud you have the three environment there? Physical Separation of Environment 1. The development, testing and production environment should be kept separated via physically separate environments. Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 No Since, the Atlassian Jira software is been used as a SaaS, the DEV, TEST and PROD environments will be maintained in the Cloud. They are not physically separate. Yes, 3 instances can be created. Building security into our network architecture Atlassian practices a layered approach to security for our networks. We implement controls at each layer of our cloud environments, dividing our infrastructure by zones, environments, and services. We have zone restrictions in place that Page 1 HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION No. Control Requirement Controlled Fulfilled? To be filled in by SSO prior to UAT and Production Implementation. Pls justify if cannot comply. Standard Account and Password Policy Settings include limiting office/staff, customer data, CI/CD and DMZ network traffic. We also have environment separation to limit connectivity between production and nonproduction environments, and production data is not replicated outside of production environments. Access into production networks and services is only possible from within those same networks – e.g. only a production service can access another production service. GITS: This apps will be using SSO? Confirm? Application should provide screen to maintain the following settings. Ensure settings/values can be changed anytime. Yes SSO can be configured Account/Password Policy : a) Min Length = 8 alphanumeric Note : - To force combination of alphabet and digit. - To also allow acceptance of symbols, upper- and lower-case alphabet characters - Whenever permissible, to enforce min length = 12 2. Can be Complied? (Y/N) To be filled in by vendor at Project initial stage. Pls justify in details for each of your response. b) Min Password Age = 0 day c) Max Password Age = 90 days d) Password Expiration Warning Message = x days Note : The message should appear x day before the actual expiration date and inform the expiration date. e) Password History =max or 24 f) Unsuccessful Log-on Attempts Allowed = 3 g) All passwords must be force- Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 Yes As the existing HLB SSO will be extended to Atlassian Jira, HLB prevailing account and password policy settings will be continued as they are used in the bank systems today. ITC-002 Other remarks Connect your identity provider to your Atlassian organization Atlassian Access includes two features for connecting your identity provider: SAML single sign-on and user provisioning. SAML single sign-on If you’d like your users to authenticate through your company’s identity provider when they log in to your Atlassian cloud products, you can set up SAML for single sign-on (SSO). SSO Page 2 HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION No. Control Requirement Can be Complied? (Y/N) To be filled in by vendor at Project initial stage. Pls justify in details for each of your response. changed after each reset by ID administrator Controlled Fulfilled? To be filled in by SSO prior to UAT and Production Implementation. Pls justify if cannot comply. ITC-002 Other remarks allows a user to authenticate with one set of login credentials and access multiple products during their session. h) Set dormancy of IDs to x days i.e. if ID is inactive for x days, ID will be disabled automatically. To provide feature to delete disabled IDs manually. Please explain how the application checks for dormant IDs. (Refer ITSOP,6.2.5.6(x) states as suspend dormant id at 30 days and removed after 90 days, wherever permissible) Note : It is mandatory for application to integrate to Active Directory (AD) for password authentication. Control on Application Super ID Password for super ID should be changed prior to production and controlled by IT Security. 3. Its password should be split into two and held by independent custodians. Functions performed by this ID should be split by creating less powerful IDs. System Supplied ID or Default IDs not to be used 4. System Supplied ID or Default IDs in software components (e.g. sa, root, etc.) should not be used in application. Yes, if the same be used with the HLB SSO/IAM systems. As the existing HLB SSO will be extended to Atlassian Jira, HLB prevailing account and password policy settings will be continued as they are used in the bank systems today. Yes. As the existing HLB SSO will be extended to Atlassian Jira, HLB prevailing account and password policy settings will be continued as they are used in the bank systems today. GITS: The user ID is using email ID to login or staff domain ID? Yes, if the same be used with the HLB SSO/IAM systems. Any super ID or administrator ID here? As the existing HLB SSO will be extended to Atlassian Jira, HLB prevailing account and password policy settings will be continued as they are used in the bank systems today. GITS: What are the supplied or default ID used? Please specify and what are their access rights? Default are those already prevalent in Bank, whereas the supplied would be the ones created specifically The access rights as previously configured. Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 Page 3 HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION No. Control Requirement Passwords for Application /Vendor Supplied ID or Default IDs to be changed 5. Should allow passwords for such IDs be changed at any time. Can be Complied? (Y/N) To be filled in by vendor at Project initial stage. Pls justify in details for each of your response. Yes. If this exists with current HLB system, same will be followed as HLB SSO will be extended to Atlassian Jira too. Controlled Fulfilled? To be filled in by SSO prior to UAT and Production Implementation. Pls justify if cannot comply. ITC-002 Other remarks GITS: What are the supplied or default ID used? Please specify and what are their access rights? If this exists with current HLB system, same will be followed as HLB SSO will be extended to Atlassian Jira too. The default Ids if configured will have same access rights as decided for the Atlassian Jira Site Grant Access on Need-to Basis For segregation of duties, different IDs should be created and granted accesses based on job functions as defined in the user access matrix. There should be segregation of duties between ID administrator and operations. 6. Main Deliverables : - User Access Matrix be developed before UAT - User access matrix report must be able to be generated from the application. - User Access Matrix must be signed off prior to cutover - Different IDs be created and tested during UAT Yes If this exists with current HLB system, same will be followed as HLB SSO will be extended to Atlassian Jira too. GITS: Please provide the draft UAM As in the attached document given below Refer to item 4 in Appendix A for further details All parties must be trained and are ready to perform the following job functions : - Security /ID administrator - Application support - Operator No Sharing of ID 7. ID cannot be shared for accountability reasons. Every ID must have an owner, Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 Yes. This requirement will be followed in similar lines with the existing HLB SSO Page 4 HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION No. Control Requirement common ID is to be removed / disabled, e.g. Guest account on Windows platform. Audit Logging on Sensitive IDs To create audit logs which can capture the activities of each sensitive IDs and all users. Should provide flexibility in selecting IDs to be logged. 8. Example of Sensitive IDs include : - ID Administrator - Super ID - Parameter setter/Configuration setter - IT Support ID More information will be provided when project starts. Can be Complied? (Y/N) To be filled in by vendor at Project initial stage. Pls justify in details for each of your response. system. Note: The understanding and discussion on the existing system with the HLB need to be done. Controlled Fulfilled? To be filled in by SSO prior to UAT and Production Implementation. Pls justify if cannot comply. ITC-002 Other remarks Yes The audit log tracks key activities that occur from your Atlassian organization and across your organization’s sites. The audit log includes activities for up to 180 days. These logs can be exported periodically. Find below sample audit log: GITS: Please provide the sample log. Does it have all the items in Appendix A item 3 As given in attachment below: Further details can be found on the following URL: https://support.atlass ian.com/securityand-accesspolicies/docs/trackorganizationactivities-from-theaudit-log/ Refer to item 3 in Appendix A for further details GITS: Please provide the sample log. Does it have all the items in Appendix A item 1 9. Report required for housekeeping of IDs To create report to list out IDs not used for X months. Should provide flexibility in defining value X. More information will be provided when project starts. Refer to item 1 in Appendix A for further details Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 Yes One can go to the User Management section under Settings to see a list of all users. One can change the filter at the top from All Users to Has site access to see active persons. To see their activity, you can create a Dashboard with the Activity Stream gadget to see the activity being generated. Page 5 HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION No. Control Requirement Can be Complied? (Y/N) To be filled in by vendor at Project initial stage. Pls justify in details for each of your response. Controlled Fulfilled? To be filled in by SSO prior to UAT and Production Implementation. Pls justify if cannot comply. ITC-002 Other remarks One could use a filter for a group of users, or individuals to see what they have been doing recently. The attachment too small cannot see. Yes You can view the information from the user sessions under the Security on the JIRA Administration page and download. 10. Logging of Unsuccessful Log-in Attempts Unsuccessful login attempts should be logged and can be retrieved by ID administrator at any time. Refer to item 2 in Appendix A for further details GITS: Please provide the sample log. Does it have all the items in Appendix A item 1 To help protect your Atlassian account, we have have a security measure in place that will lock your account after multiple, consecutive failed login attempts. I’ve been locked out of my account after I failed to log in multiple times. What can I do? When your account was locked, we sent an email with instructions on how to unlock it. Follow the instructions in that email to regain access to your account. I haven’t received an email to unlock my account. Please contact Atlassian Support and we’ll send another recovery email to the address associated with your Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 Page 6 HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION No. Control Requirement Can be Complied? (Y/N) To be filled in by vendor at Project initial stage. Pls justify in details for each of your response. Controlled Fulfilled? To be filled in by SSO prior to UAT and Production Implementation. Pls justify if cannot comply. ITC-002 Other remarks Atlassian account. I received an email telling me that my Atlassian account has been locked after multiple failed logins. This wasn't me. Why did I get this and what does it mean? Do not unlock your account. The email that you received is a security measure to let you know that someone has attempted to log in to your Atlassian account, and we protected it. The IP address associated with the login attempts has been locked out. You can continue to log in like normal from the devices that you normally use. However, if you are still concerned, we recommend that you reset your password. Need more information? If you still have concerns or need any further information, contact Atl assian Support. The attachment too small cannot see. Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 Page 7 HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION No. Control Requirement Can be Complied? (Y/N) To be filled in by vendor at Project initial stage. Pls justify in details for each of your response. Controlled Fulfilled? To be filled in by SSO prior to UAT and Production Implementation. Pls justify if cannot comply. ITC-002 Other remarks GITS: Please provide where you set the settings 11. Auto-Logout To auto-logout user when terminals are idle for x minutes. To provide flexibility in defining value x. To select an idle session duration from an authentication policy: 1. Navigate to Authenticatio n policies at admi n.atlassian.com. Yes NO 2. Select Edit for the policy you Jira Software: There is want to modify. a provision in Jira 3. On Software product to the Settings pag update the Idle e, select length session duration for of time for Idle managed accounts. session duration. When you save changes to the session duration, users don't get logged out of their accounts. The new idle session duration will apply the next time a user logs in. No Simultaneous Sign-on 12. 13. Do not allow any user to conduct multiple simultaneous online sessions, such as logging in to multiple terminals concurrently in order to effectively establish accountability. No Hard-Coding of Sensitive Information. Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 GITS: Please provide where you set the settings Yes NO Yes Hard coding sensitive information, such as GITS: Is there any password saved anywhere in the system or Page 8 HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION No. Control Requirement Hard-coding of sensitive information (e.g. ID, password, PIN, security key, passcode, passphrase etc) in source programs must be avoided. Sensitive Information to be Encrypted 14. Sensitive information (especially PIN, password, security key, etc) must be encrypted and protected by access controls during transmission and storage. Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 Can be Complied? (Y/N) To be filled in by vendor at Project initial stage. Pls justify in details for each of your response. passwords, server IP addresses, and encryption keys can expose the information to attackers. Anyone who has access to the class files can decompile them and discover the sensitive information. ... Consequently, programs must not hard code sensitive information. Yes The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. ... Controlled Fulfilled? To be filled in by SSO prior to UAT and Production Implementation. Pls justify if cannot comply. ITC-002 Other remarks application? Users are stored in the cwd_user table of Jira's database. Passwords are stored in the Credential col umn of the table and are hashed. Jira uses a password encoder called atlassiansecurity which is a wrapper around Bouncy Castle's implementation of PKCS #5 v2.0 (aka PBKDF2) utilizin g a random 16byte salt and 10,000 iterations, which results in a 256-bit hash. This salted PKCS5S2 implementation is provided by Embedded Crowd. You may read this community post on password security from one of our Crowd developers for more details. GITS: What items are encrypted and what algorithm is being used? Page 9 HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION No. Control Requirement The display and printing of such sensitive information (if required), should be suppressed or masked. Hardware encryption is to be deployed for highly sensitive/exposed systems, e.g. Internet based systems. Can be Complied? (Y/N) To be filled in by vendor at Project initial stage. Pls justify in details for each of your response. These algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and nonrepudiation. Controlled Fulfilled? To be filled in by SSO prior to UAT and Production Implementation. Pls justify if cannot comply. ITC-002 Other remarks Encryption system should be designed such that no single person has full knowledge of any single encryption key. 15. 16. Avoid Installation Using Super IDs Where possible, avoid installing software components and application by using super IDs. (e.g. root or administrator IDs) This is to avoid situation where resources are owned by super ID and super ID capability is required during support and operation of system. Avoid starting / running service or application using ID with super user rights (e.g. Windows based system used to run services using administrator ID). Yes Yes GITS: What ID being used for installation? Installation of JIRA cloud is not applicable in local machines or local servers managed by HLB through cloud or locally. Currently super user of JIRA is used to create the projects and administration activities. No HLB super user is used for any kind of installations. GITS: What ID being used for services? This is not applicable for JIRA cloud application, as the complete control of running any services are handled by Atlassian team only. Security Patches 17. Ensure that latest security patches for all components (e.g. database, web server, application server etc) in the whole application system are being applied and tested. Please state patch release version 18 Please print-screen the system setting for record. Identity Governance and Administration (IGA) Integration The application must be able to Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 10 Yes As the application is used as SaaS, all the security patches will be managed by Atlassian. They will update all the subscribers with the patch updates. GITS: What version is being deployed? Yes Please find attached SSO and IGA configuration guide. GITS: Have they discuss with brightnexus on this. The document cannot open Page HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION No. Control Requirement Can be Complied? (Y/N) To be filled in by vendor at Project initial stage. Pls justify in details for each of your response. integrate to the bank’s IGA for ID administration automation task. Jira SSO IGA guide.pdf Please refer to the attached IGA Integration Requirement document and fill up accordingly. Controlled Fulfilled? To be filled in by SSO prior to UAT and Production Implementation. Pls justify if cannot comply. ITC-002 Other remarks Please complete the IGA integration requirement HLB_IGA_Integratio n_Requirement_v1.0_App_Sec_Checklist1.docx Customer and / or other Sensitive / Confidential Data Downloading (To be replied by business owner) 19 This is to review and identify any customer and / or sensitive / confidential data download, reporting or data export feature within the application. If such feature is required, please fill up the attached template for review and signoff. Proper controls must be in placed if there is any customer and / or sensitive / confidential data download. No There will no Customer and /or sensitive / Confidential data download feature in the application. Downloading Customer Information.xlsx Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 11 Page HONG LEONG BANK BERHAD INFORMATION TECHNOLOGY DIVISION ITC-002 Appendix A: GITS Requirements On top of the requirements in the Application Security Checklist, we also have the below requirements. We may have more requirements after we review the application during the UAT. No 1 2 3 4 Requirements To provide a screen at front end to generate user ID listing report in Excel format. This screen should have the below filtering criteria for report generation: User Group Status (e.g. active, locked, dormant etc) This user ID listing report needs to have the below fields: User login ID User Name Status (e.g. active, locked, dormant etc) User Group Branch (if applicable) Last Login Date Creation date To provide a screen at front end for us to generate the unsuccessful login attempt report in Excel format. This screen should have the below filtering criteria for report generation: IP address Date User ID This unsuccessful login attempt report needs to have the below fields: Date & Time User ID User Name Reason for unsuccessful login IP address of the workstation To provide audit log screen (at front end) with audit log report generation in Excel format. The audit log should capture all the activities performed by the ID administrator .This audit log screen should have the below filtering criteria for online query and report generation: Date User ID Types of changes Status (Successful / Failed) The audit log report should capture all the activities performed by the ID administrator with the below fields:a. Date & Time b. User ID c. User Name d. Types of changes e. Status (Successful/Failed) f. Before image of the changes g. After image of the changes To provide a screen for us to generate the user access matrix report in Excel format. This report should list down all the menus tagged under a role/group in the system. This screen should allow us to generate the user access matrix report by allowing us to generate the report by selecting one role, multiple roles or all roles. ********************************* End Of Document ************************************ Version No. : v2.9 (FINAL) Effective Date: 15 Jun 2020 12 Page