Outsourced Service Provider Audit Report (OSPAR) Of [Name of Outsourced Service Provider] Audit Report Date: xx Month yyyy Notes From Association of Banks In Singapore (ABS): This ABS Outsourced Service Provide Audit Report (OSPAR) Template version 1.0 is documented with reference to the ABS Guidelines on Control Objectives & Procedures for Outsourced Service Providers version 1.0. The auditors engaged by the Outsourced Service Providers (OSPs) to perform the control audits against the ABS Guidelines on Control Objectives and Procedure for Outsourced Service Provider must use this OSPAR template to document the OSPs’ control audit results. This OSPAR template documents the minimum contents to be included in the control audit reports of the OSPs. This template also aims to provide the report structure to document the control audit results of the OSPs in a consistent manner, enabling the Financial Institution (FI) Clients of the OSPs to interpret the control audit results accurately. The auditors engaged have the choice to use the audit framework/standards such as ISAE3402 or SSAE3402 in performing and signing-off on the audits of the OSPs. Audit firms that wish to perform these control audits need to submit the CVs of their auditors to ABS by emailing to outsourcing@abs.org.sg. <<ABS Comment for Auditors: Please remove all the ABS comment clauses in this template when delivery the audit reports to the OSPs.>> OSPAR v1.0 – July 2015 Page 2 of 46 Contents Section 1 Management of [Name of OSP] Assertion Regarding Its Services Throughout The Period [dd Month yyyy] to [dd Month yyyy] Section 2 Independent Auditor’s Summary Report Description of OSP’s Services Throughout The Period [dd Month yyyy] to [dd Month yyyy] Overview and Background Financial Institution (FI) Clients’ Responsibilities Components of the Services Provided Components of the Technology Related Services I. ENTITY LEVEL CONTROLS II. GENERAL INFORMATION TECHNOLOGY (IT) CONTROLS a. Logical Security b. Physical Security c. Change Management d. Incident Management e. Backup and Disaster Recovery f. Network & System Security and Monitoring g. Security Incident Response h. System Vulnerability Assessment i. Technology Refresh Management III. SERVICE CONTROLS a. Setting up of New Clients/Processes b. Authorising and Processing Transactions c. Maintaining Records d. Safeguarding Assets e. Service Reporting and Monitoring Section 3 Functions/Services Outsourced To Sub-Contractors Section 4 Applicable ABS Controls Criteria, Tests of Controls and Test Results OSPAR v1.0 – July 2015 Page 3 of 46 Section 1 – Management of [Name of OSP] Assertion Regarding Its Services Throughout the Period [dd Month yyyy] to [dd Month yyyy] <<ABS Comment: The Management of the OSP must provide the engaged auditor(s) with a written assertion that is attached in this section as the management’s description of its organisation’s services. If the Management of the OSP refuses to provide a written assertion, this represents a scope limitation and consequently, the auditor(s) should withdraw from the engagement. [OSP’s Letterhead] [Name of OSP]'s Assertion << ABS Comment: The Management of OSP to provide users of this control audit report with information about the [type or name of] services the OSP provides, particularly service controls intended to meet the criteria set forth in the ABS Guidelines on Control Objectives & Procedures for Outsourced Service Providers. Confirm, to the best of the OSP’s knowledge and belief.>> A. We have prepared the attached description titled “Description of [name of OSP]'s [type or name of] Services Throughout the Period [dd Month yyyy] to [dd Month yyyy]” (the “description”). The description is intended to provide users of this control audit report with information about the [type or name of] services, particularly service controls intended to meet the criteria set forth in the ABS Guidelines on Control Objectives & Procedures for Outsourced Service Providers. We confirm, to the best of our knowledge and belief, that the description fairly presents the [type or name of] services throughout the period [dd Month yyyy] to [dd Month yyyy], based on the following description criteria: a. The description contains the following information: i. The types of services provided ii. The components of the system used to provide the services, which are the following: (1) Infrastructure: The physical and hardware components of a system (facilities, equipment, and networks) (2) Software: The programs and operating software of a system (systems, applications, and utilities) (3) People: The personnel involved in the operation and use of a system (developers, operators, users, and managers) (4) Procedures: The automated and manual procedures involved in the operation of a system (5) Data: The information used and supported by a system (transaction streams, files, databases, and tables) b. The boundaries or aspects of the services covered by the description c. How the services/systems capture and address significant events and conditions d. The processes used to prepare and deliver reports and other information to the Financial Institution (FI) Clients or other parties OSPAR v1.0 – July 2015 Page 4 of 46 e. If information is provided to, or received from, [sub-contractors or]1 other parties, how such information is provided or received; the role of the [sub-contractors or]1 other parties; and the procedures performed to determine that such information and its processing, maintenance, and storage are subjected to appropriate controls. f. For each applicable ABS controls criteria and the related controls designed to meet those criteria [,including controls at the subcontractors2]. g. [For sub-contractors presented using the carve-out method, the nature of the services provided by the sub-contractors; each of the applicable ABS controls criteria that are intended to be met by controls at the sub-contractors, alone or in combination with controls at the OSP, and the types of controls expected to be implemented at carved-out sub-contractors to meet those criteria]1 h. Any applicable ABS controls criteria that are not addressed by a control at the OSP [or a sub-contractor]1 and the reasons therefore i. Other aspects of the OSP's control environment, risk assessment process, information and communication systems, and monitoring of controls that are relevant to the services provided and the applicable ABS controls criteria j. Relevant details of changes to the OSP's services/system during the period covered by the description B. The description does not omit or distort information relevant to the OSP’s services while acknowledging that the description is prepared to meet the common needs of a broad range of users and may not, therefore, include every aspect of the services that each individual user may consider important to his or her own particular needs C. The controls stated in description were suitably designed and implemented throughout the period [dd Month yyyy] to [dd Month yyyy] to meet the applicable ABS controls criteria D. The controls stated in the description operated effectively throughout the period [dd Month yyyy] to [dd Month yyyy] to meet the applicable ABS controls criteria. 1 If sub-contractors are included within the report as being needed in the design of the OSP’s controls to meet one or more criteria, the assertion should be modified to include the language highlighted. 2 The sub-contractors are included within the report and the inclusive method is being used. Include “and controls at the sub-contractors”. OSPAR v1.0 – July 2015 Page 5 of 46 Section 2 – Independent Auditor’s Summary Report << ABS Comment to Auditors: The following section is for the engaged auditor to document the auditor's summary report. This should be used in conjunction with the ABS Guidelines on Control Objectives & Procedures for Outsourced Service Providers, in reporting on controls at the OSP relevant to ABS controls criteria. [Auditor’s Letterhead] Report of Independent Service Auditors To the Management of [Name of OSP] Scope <<ABS Comment to Auditors: The engaged auditors to use the respective clauses below based on the following method use for the control audit of the OSP: Method 1 – the OSP does not use any sub-contractor. Method 2 (Inclusive) – the OSP uses sub-contractor(s) and this control audit report includes the audit of OSP’s sub-contractor(s). Method 3 (Carve-out) - the OSP uses sub-contractor(s) and this control audit report excludes the audit of OSP’s sub-contractor(s) relevant control objectives and controls from the description and from the scope of the auditor’s engagement>> <<ABS Comment to Auditors: Method 1 Clauses - when the OSP does not use any sub-contractor>> [We have examined the attached description titled "Description of [Name of OSP]'s [name or type of] Services Throughout the Period [dd Month yyyy] to [dd Month yyyy]"3 (the “description”) and the suitability of the design and operating effectiveness of controls to meet the controls criteria set forth in the ABS Guidelines on Control Objectives & Procedures for Outsourced Service Providers, throughout the period [dd Month yyyy] to [dd Month yyyy].] << ABS Comment to Auditors: Method 2 (Inclusive) Clauses>> [We have examined the attached description titled "Description of [Name of OSP]'s [and Name of Sub-contractor]'s [name or type of] Services Throughout the Period [dd Month yyyy] to [dd Month yyyy]"1 (the “description”) and the suitability of the design and operating effectiveness of controls to meet the controls criteria set forth in the ABS Guidelines on Control Objectives & Procedure for Outsourced Service Providers, throughout the period [dd Month yyyy] to [dd Month yyyy]. [Sub-contractor Name] is an independent Outsourced Service Provider that provides [type of services] to [Name of OSP]. [Name of OSP]'s description includes a description of those elements of its service provided by [Name of Sub-contractor], the controls of which help meet certain applicable ABS controls criteria. << ABS Comment to Auditors: Method 3 (Carve-out) Clauses>> [We have examined the attached description titled "Description of [Name of OSP]'s [name or type of] Services Throughout the Period [dd Month yyyy] to [dd Month yyyy]"3 (the “description”) and the suitability of the design and operating effectiveness of controls to meet the controls criteria set forth in the ABS Guidelines on Control Objectives & Procedures for Outsourced Service Providers, throughout the period [dd Month yyyy] to [dd Month yyyy]. 3 The title of the description of the OSP’s services in our report is the same as the title used by the Management of the OSP in its description of the OSP’s services. OSPAR v1.0 – July 2015 Page 6 of 46 [Name of OSP] uses [a] [type(s) of] sub-contractor organisation[s] for its [activities performed by the sub-contractor[s]]4. The description indicates that certain applicable ABS controls criteria can only be met if controls at the sub-contractor organisation[s] are suitably designed and operating effectively. The description presents [Name of OSP]'s services; its controls relevant to the applicable ABS controls criteria; and the types of controls that the OSP expects to be suitably designed, implemented and operating effectively at the sub-contractor organisation[s] to meet certain applicable ABS controls criteria. The description does not include any of the controls implemented at the sub-contractor [s]. Our examination did not extend to the services provided by the sub-contractor[s].] Outsourced Service Provider's Responsibilities [Name of OSP] [and name of sub-contractor]5 has [have] provided the attached assertion[s] titled "Management of [Name of OSP]'s Assertion Regarding Its [name or type of] Services Throughout the Period [dd Month yyyy] to [dd Month yyyy],"6 [and "Management of [name of subcontractor]'s Assertion Regarding Its [name or type of] Services Throughout the Period [dd Month yyyy] to [dd Month yyyy],"]3 which is [are] based on the criteria identified in the [those] management assertion[s]. [Name of OSP] [and Name of Sub-contractor]3 is [are] responsible for (1) preparing the description and assertion[s]; (2) the completeness, accuracy, and method of presentation of both the description and assertion[s]; (3) providing the services covered by the description; (4) specifying the controls that meet the applicable ABS controls criteria and stating them in the description; (5) identifying any applicable ABS controls criteria being reported on that have been omitted from the description and explaining the reason for the omission, and (6) designing, implementing, and documenting the controls to meet the applicable ABS controls criteria. Service Auditor's Responsibilities Our responsibility is to express an opinion on the fairness of the presentation of the description based on the description criteria set forth in [Name of OSP]'s [and Name of Sub-contractor]'s3 assertion[s] and on the suitability of the design and operating effectiveness of the controls to meet the applicable ABS controls criteria, based on our examination. We conducted our examination in accordance with attestation standards established by the [Name of the audit standards such as ISAE3402 or SSAE3402 selected by the engaged auditors]. Those standards require that we plan and perform our examination to obtain reasonable assurance about whether, in all material respects, (1) the description is fairly presented based on the description criteria, and (2) the controls were suitably designed and operating effectively to meet the applicable ABS controls criteria throughout the period [dd Month yyyy] to [dd Month yyyy]. Our examination involved performing procedures to obtain evidence about the fairness of the presentation of the description based on the description criteria and the suitability of the design and operating effectiveness of those controls to meet the applicable ABS controls criteria. Our procedures included assessing the risks that the description is not fairly presented and that the controls were not suitably designed or operating effectively to meet the applicable ABS controls criteria. 4 5 6 Insert the functions performed by the sub-contractor, for example computer processing, custodial services, and data center hosting. Inclusive Method: If a sub-contractor is used and the sub-contractor’s relevant controls are included in the description and in the scope of the engagement, this language should be included. The title of the assertion in our report is the same as the title used by the Management of the OSP in its assertion. OSPAR v1.0 – July 2015 Page 7 of 46 Our procedures also included testing the operating effectiveness of those controls that we consider necessary to provide reasonable assurance that the applicable ABS controls criteria were met. Our examination also included evaluating the overall presentation of the description. We believe that the evidence we obtained is sufficient and appropriate to provide a reasonable basis for our opinion. Inherent limitations Because of their nature and inherent limitations, controls at an Outsourced Service Provider [or a sub-contractor’s organisation]3 may not always operate effectively to meet the applicable ABS controls criteria. Also, the projection to the future of any evaluation of the fairness of the presentation of the description or conclusions about the suitability of the design or operating effectiveness of the controls to meet the applicable ABS controls criteria is subjected to the risks that the system may change or that controls at an Outsourced Service Provider [or a sub-contractor’s organisation]3 may become inadequate or fail. Opinion << ABS Comment to Auditors: Any adverse opinion should be summarised in the respective sections below (i.e. A, B and/or C) and the full details be reported in Section 4 of this report>> In our opinion, in all material respects, based on the description criteria identified in [Name of OSP]'s [and Name of Sub-contractor] assertion[s] and the applicable ABS controls criteria: A. The description fairly presents [name or type of] services [and the elements of the services provided by [Name of Sub-contractor]]3 that was [were] designed and implemented throughout the period [dd Month yyyy] to [dd Month yyyy]. B. The controls of [Name of OSP] [and [Name of Sub-contractor]]3 stated in the description were suitably designed to provide reasonable assurance that the applicable ABS controls criteria would be met if the controls operated effectively throughout the period [dd Month yyyy] to [dd Month yyyy]. C. The controls [of [OSP Name] and [Name of Sub-contractor]]3 tested, were those necessary to provide reasonable assurance that the applicable ABS controls criteria were met, operated effectively throughout the period [dd Month yyyy] to [dd Month yyyy]. Description of Tests of Controls The specific controls we tested and the nature, timing, and results of our tests are presented in the section of our report titled “[insert the title of the description from the scope paragraph]”. Restricted Use This report and the description of tests of controls and results thereof are intended solely for the information and use of [Name of OSP]; the FI client(s) of the [Name of OSP]'s [name or type of] services during some or all of the period [dd Month yyyy] to [dd Month yyyy]; and prospective FI Client(s) , OSPAR v1.0 – July 2015 Page 8 of 46 independent auditors and practitioners providing services to the FI Clients, and regulators (collectively referred to as "specified parties") who have sufficient knowledge and understanding of the following: A. B. C. D. E. The nature of the services provided by the OSP How the OSP's services/systems interact with FI Clients, sub-contractor organisations, or other parties Internal control and its limitations The applicable ABS controls criteria The risks that may threaten the achievement of the applicable ABS controls criteria and how controls address those risks This report is not intended to be and should not be used by anyone other than these specified parties. If a report recipient is not a specified party as defined above and has obtained this report, or has access to it, use of this report is the non-specified user's sole responsibility and at the non-specified user's sole and exclusive risk. Non-specified users may not rely on this report and do not acquire any rights against the [Name of Audit Firm] as a result of such access. Further, the auditor does not assume any duties or obligations to any non-specified user who obtains this report and/or has access to it. [Lead Auditor’s (signature)] [City, State]7 [Date] 7 The location of the office may be included in the office letterhead. It is unnecessary to repeat the "City, State" at the bottom of the report if it already appears in the letterhead. However, if letterhead stationery is not used, the "City, State" (or city and country) of the office should be indicated at the bottom of the report beneath the signature and before the report date. OSPAR v1.0 – July 2015 Page 9 of 46 Section 3 – Description of OSP’s Services Throughout the Period [dd Month yyyy] to [dd Month yyyy] <<ABS Comment: This section is for the OSP to provide a detailed description of its services and service controls covered under this report.>> Overview and Background <<Description>> Financial Institution (FI) Clients’ Responsibilities <<Description>> Components of the Services Provided: a. Process <<Description>> b. People <<Description>> c. Technology <<Description>> Components of the Technology Related Services: a. Infrastructure <<Description>> b. Software <<Description>> c. People <<Description>> d. Procedures <<Description>> e. Data <<Description>> OSPAR v1.0 – July 2015 Page 10 of 46 I. ENTITY LEVEL CONTROLS a. Control Environment <<Description>> b. Risk Assessment <<Description>> c. Information and Communication <<Description>> d. Monitoring <<Description>> e. Information Security Policies <<Description>> f. Other HR & Sub-contracting Specific Controls <<Description>> II. GENERAL INFORMATION TECHNOLOGY (IT) CONTROLS a. Logical Security <<Description>> b. Physical Security <<Description>> c. Change Management <<Description>> d. Incident Management <<Description>> e. Backup and Disaster Recovery <<Description>> f. Network & System Security and Monitoring <<Description>> g. Security Incident Response <<Description>> OSPAR v1.0 – July 2015 Page 11 of 46 h. System Vulnerability Assessment <<Description>> i. Technology Refresh Management <<Description>> III. SERVICE CONTROLS a. Setting up of New Clients/Process <<Description>> b. Authorising and Processing Transactions <<Description>> c. Maintaining Records <<Description>> d. Safeguarding Assets <<Description>> e. Service Reporting and Monitoring <<Description>> Functions/Services Outsourced To Sub-Contractors The following table summarized functions/services that are outsourced to sub-contractor(s): No 1. 2. Functions/Services Xx Xx OSPAR v1.0 – July 2015 Name of Sub-Contractors Xxx Xxx Page 12 of 46 Section 4 – Applicable ABS Controls Criteria, Tests of Controls and Test Results Scope of ABS Controls Applicability The following table summaries the applicability of the ABS controls criteria for [Name of OSP] [and Name of Sub-contractor if inclusive method is used] on description of its services3: Sections of the ABS Guidelines I (a) (b) (c) (d) (e) (f) II (a) (b) (c) (d) (e) (f) (g) (h) (i) III (a) (b) (c) (d) (e) ABS Control Criteria Applicability (Applicable / Non-Applicable/ Partial-Applicable) Test Result Summary (Exceptions Noted/ No Exceptions Noted) Entity Level Controls Control Environment Risk Assessment Information and Communication Monitoring Information Security Policies Other HR and Sub-contracting Specific Controls General Information Technology (IT) Controls Logical Security Physical Security Change Management Incident Management Backup and Disaster Recovery Network & System Security and Monitoring Security Incident Response System Vulnerability Assessment Technology Refresh Management Service Controls Setting up of New Clients/Process Authorising and Processing Transactions Maintaining Records Safeguarding Assets Service Reporting and Monitoring OSPAR v1.0 – July 2015 Page 13 of 46 Management of [Name of OSP]’s Comment/Response <<ABS Comment to Auditors: The Management of the OSP may provide a summary of their comment in response to the audit results tabled by the auditors. In the event of any findings or non-compliance it is highly recommended for the Management of the OSP to pen down their response and action plan.> <<ABS Comment to Auditors: Additional specific control objectives should also be outlined below. These do not represent the inclusive list but give guidance for the OSPs. Each OSP should specifically agree the detailed requirements with their individual FI clients and incorporate within service level agreements I. ENTITY LEVEL CONTROLS CRITERIA (a) Control Environment The control environment sets the priority and culture for the OSP, influencing the control consciousness of its people. It is the foundation for all the other components of internal control, providing discipline and structure. Aspects of the OSP’s control environment may affect the services provided to the FIs. For example, the OSP’s hiring and training practices may affect the quality and ability of the OSP’s personnel to provide services to the FIs. ABS Control Criteria Description of OSP’s Control Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan The control environment includes the following elements: i. Communication and enforcement of integrity and ethical values ii. Commitment to competence iii. Management's philosophy and operating style iv. Organisational structure v. Assignment of authority and responsibility vi. Human resource policies and practices i. Communication and enforcement of integrity and ethical values The entity has established workplace conduct standards, implemented workplace candidate background screening procedures, and conducts enforcement procedures to enable it to meet its commitments and requirements as they relate to the ABS controls criteria. ii. Commitment to competence Personnel responsible for designing, developing, implementing, operating, OSPAR v1.0 – July 2015 Page 14 of 46 maintaining, and monitoring of the system affecting the ABS controls criteria have the qualifications and resources to fulfil their responsibilities. iii. Management's philosophy and operating style The entity has defined organizational structures, reporting lines, authorities, and responsibilities for the design, development, implementation, operation, maintenance, and monitoring of the system enabling it to meet its commitments and requirements as they relate to the ABS controls criteria. The entity has established workplace conduct standards, implemented workplace candidate background screening procedures, and conducts enforcement procedures to enable it to meet its commitments and requirements as they relate to the ABS controls criteria. iv. Organisational structure Personnel responsible for designing, developing, implementing, operating, maintaining, and monitoring of the system affecting the ABS controls criteria have the qualifications and resources to fulfil their responsibilities. Responsibility and accountability for designing, developing, implementing, operating, maintaining, monitoring, and approving the entity’s system controls are assigned to individuals within the entity with authority to ensure policies, and other system requirements are effectively promulgated and placed in operation. The entity has defined organizational structures, reporting lines, authorities, and responsibilities for the design, development, implementation, operation, maintenance, and monitoring of the system enabling it to meet its commitments and OSPAR v1.0 – July 2015 Page 15 of 46 requirements as they relate to the ABS controls criteria. v. Assignment of authority and responsibility Personnel responsible for designing, developing, implementing, operating, maintaining, and monitoring of the system affecting the ABS controls criteria have the qualifications and resources to fulfil their responsibilities . Responsibility and accountability for designing, developing, implementing, operating, maintaining, monitoring, and approving the entity’s system controls are assigned to individuals within the entity with authority to ensure policies, and other system requirements are effectively promulgated and placed in operation. The entity has defined organizational structures, reporting lines, authorities, and responsibilities for the design, development, implementation, operation, maintenance, and monitoring of the system enabling it to meet its commitments and requirements as they relate to the ABS controls criteria. vi. Human resource policies and practices The entity has established workplace conduct standards, implemented workplace candidate background screening procedures, and conducts enforcement procedures to enable it to meet its commitments and requirements as they relate to the ABS controls criteria. OSPAR v1.0 – July 2015 Page 16 of 46 (b) Risk Assessment Auditor’s Recommendation and OSP Management’s Response/Action Plan The OSP’s risk assessment process may affect the services provided to FIs. The following is a list of risk assessment factors and examples of how they might relate to the OSP: i. Changes in the operating environment - If the OSP provide services to FIs, a change in regulations may necessitate a revision to existing processes which may require additional or revised controls ii. New personnel - New personnel may increase the risk of controls not performed effectively iii. New or revamped information systems – the OSP may incorporate new functions into its systems that could affect the FIs iv. Rapid growth - If the OSP gain a substantial number of new customers, the operating effectiveness of certain controls could be affected v. New technology – the OSP may implement a new technology whereby its risks and impact to the FIs would need to be assessed vi. New business models, products, or activities - The diversion of resources to new activities from existing activities could affect certain controls at the OSP vii. Corporate restructurings - A change in ownership or internal reorganisation could affect reporting responsibilities or the resources available for services to the FIs viii. Expanded foreign operations – the OSP that use personnel in foreign locations may have difficulty responding to changes in user requirements ix. Environmental scan – the OSP scans for emerging threats that may impact its operations or services (e.g. cyber threats, etc). ABS Controls Criteria OSPAR v1.0 – July 2015 Description of OSP’s Control Test of Controls Results of Tests Page 17 of 46 (c) Information and Communication Auditor’s Recommendation and OSP Management’s Response/Action Plan Adequate information and effective communication are essential to the proper functioning of internal control. The OSP’s information and communication component of internal control include the following: i. The information system must be documented with procedures for initiating, authorising, recording, processing and reporting FIs’ transactions for proper accountability ii. Communication involves how the OSP communicates its roles and responsibilities, significant matters relating to the services provided to the FIs, including communication within its organisation, with the FIs and regulatory authorities. This may include the OSP’s communication to its staff on how its activities impact the FIs, escalation process for reporting exceptions within the OSP and to the FIs, and seeking FIs’ approval prior to any sub-contracting ABS Control Criteria (d) Description of OSP’s Control Test of Controls Results of Tests Description of OSP’s Control Test of Controls Results of Tests Monitoring ABS Control Criteria Auditor’s Recommendation and OSP Management’s Response/Action Plan Many aspects of monitoring may be relevant to the services provided to FIs. For example, the OSP may employ internal auditors or other personnel to evaluate the effectiveness of controls over time, either by ongoing activities, periodic evaluations, or combinations of the two. The OSP’s monitoring of its sub-contractors’ activities that affect the services provided to the FIs is another example of monitoring. This OSPAR v1.0 – July 2015 Page 18 of 46 form of monitoring may be accomplished through by visiting the sub-contractors’ organisation, obtaining and reading a report containing detailed description of the subcontractors’ controls, or conducting an independent assessment of whether the controls are placed are suitably designed and operating effectively throughout the specified period. Monitoring external communications, such as customer complaints and communications from regulators, generally would be relevant to the services provided to FIs. Often, these monitoring activities are included as control activities for achieving a specific control objective. (e) Information Security Policies ABS Control Criteria Description of OSP’s Control Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan Information Security (IS) policies and procedures are established, documented and reviewed at least annually or as and when there are changes. IS policies and procedures should state the person(s) responsible for information security management. These documents are reviewed and approved by management. Specific security controls for systems and networks are defined to protect the confidentiality, integrity and availability of systems and data. Any identified deviations are documented, tracked and remediated. Deviations which impact the services rendered to the FIs should be communicated immediately. OSPAR v1.0 – July 2015 Page 19 of 46 (f) Other HR & Sub-contracting Specific Controls Auditor’s Recommendation and OSP Management’s Response/Action Plan These controls should provide reasonable assurance that the management of the OSP provides oversight, ensures segregation of duties, and guides consistent implementation of security practices. Staff and sub-contractors of the OSP understand their responsibilities and are suitable for the roles for which they are considered. (i) OSP’s staff and sub- contractors understand their responsibilities and are suitable for the roles for which they are considered ABS Control Criteria (ii) Description of OSP’s Control Test of Controls Results of Tests The OSP should ensure that individuals considered for employment are adequately screened for experience, professional capabilities, honesty and integrity. Screening should include background employment checks to assess character, integrity and track record. An information security awareness training program should be established. The training program should be conducted for OSP’s staff, sub-contractors and vendors who have access to IT resources and systems. Contracts with staff and subcontractors of the OSP should include non-disclosure clauses protecting confidentiality clauses which would apply staff and sub-contractors of the OSP working for its FI clients on and off premises. The OSP’s sub-contracting are properly managed and monitored Sub-contracting or use of subcontractors is at the approval of the FIs and is subjected to and due diligence as agreed with the FIs. OSPAR v1.0 – July 2015 Page 20 of 46 II. GENERAL INFORMATION TECHNOLOGY (IT) CONTROLS CRITERIA (a) Logical Security These controls should provide reasonable assurance that logical access to programs, data, and operating system software is restricted to authorised personnel within the OSP and these applies to new and existing systems. ABS Control Criteria 1. (i) Description of OSP’s Control Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan Logical access to programs, data, and operating system software is restricted to authorised personnel. Information Security (IS) policies and procedures are established, documented and reviewed at least annually or when there are changes. IS policies and procedures are reviewed and approved by management. Logical access requirements to programs, data and operating system software are defined, as agreed with FIs. (ii) Access to systems and network devices is only granted based upon a documented and approved request and on a need basis. (iii) Access to production & backup data and sensitive information is granted on a 'least privilege’ basis. Access to sensitive files (including system logs), commands and services are restricted and protected from manipulation on both production & non-production (consisting of FIs’ customer information) systems. (iv) Access to systems (i.e. applications, operating systems, databases) and network devices by end users and IT Staff are reviewed periodically, frequency as agreed with FIs. (v) OSP’s staff and sub-contractors offboarding process includes revoking access from systems and network devices upon termination or when no longer required. OSPAR v1.0 – July 2015 Page 21 of 46 (vi) Encryption, access privilege management, reconciliation and traceability IT security and control protocols are in place to protect the processing, transmission and storage of confidential information (including data at endpoint such as notebooks and mobile devices). (vii) Individual FI information is not merged with those of other OSP’s clients. Appropriate technological measures are established to isolate, control and clearly identify FIs’ data, information system assets, documents and records. Procedures are established to securely destroy or remove the FI’s data as per the agreed retention and destruction policies as well as well upon termination. This requirement also applies to backup data. (viii) Industry-accepted cryptography standards agreed with FIs are deployed to protect FIs’ information and other sensitive data transmitted between terminals and hosts, including networks and in storage, as defined in the MAS Technology Risk Management (TRM) guidelines. (ix) Electronically transmitted FIs’ data to external parties (where permissible) is encrypted and industry-accepted cryptography standards is applied. (x) Industry-accepted password construction rules and parameters (e.g. complex password,lockout settings, password history) are implemented. The password controls for applications/systems are reviewed according to the agreed information security requirements/standards. (xi) Procedures are established to manage privilege system administration accounts (including emergency usage). Privileged access requested is documented and approved. (xii) Privileged access are reviewed at least annually and subjected to restricted OSPAR v1.0 – July 2015 Page 22 of 46 controls such as dual control, never alone principle, two-factor authentication (“2FA”), etc. Passwords are changed regularly and access removed when no longer required. Changes made via privileged access must also be logged and monitored by an appropriate staff within the organisation. (xiii) Password should be stored in a secured manner (e.g. encrypted, access controlled etc). (b) Physical Security These controls demonstrate that the OSP restrict physical access to Data Centre/Controlled (DC) areas and have put in place environmental controls to protect the IT assets hosted at its data centres. ABS Control Criteria Description of OSP’s Control 1. (i) Physical access to Data Centre/Controlled areas is restricted to authorised individuals Access to data centre/controlled areas is restricted: a. Access is physically restricted (e.g. card access, biometric systems, ISO standard locks) to authorised personnel on a needs basis only. Access mechanism may include ‘anti-passback’ feature to prevent use of card access for multiple entries. b. Access granted to employees, contractors and third parties to must be approved, documented and provided on a need to basis only. c. All visitors must be registered and entry/exit recorded. Visitors should be issued with clear identification (e.g. an ID badge) and escorted by authorised personnel at all times. (ii) For controlled areas that have emergency exits, they must audible alarms and are monitored by security personnel. Periodic verification that of OSPAR v1.0 – July 2015 Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan Page 23 of 46 the alarms are functioning must be performed and documentation retained. (iii) Entry and exit to secure areas must have an audit trail (i.e. include CCTV footage / user id / name, date and time). Access rights to data centre/controlled areas are reviewed at least annually and as agreed with FI. Monitoring of access violations should be conducted on a monthly basis. (iv) Physical access right granted to employees, contractors and thirds parties are removed upon termination or when no longer required. (v) Threat and Vulnerability Risk Assessment (“TVRA”) should be performed for the data centre. The assessment criteria should be specified and should include at a minimum the data centre’s perimeter and surrounding environment and modelled on various scenarios of threats such as, theft and explosives. Note: Before FIs procure DC services from the OSP, FIs will ensure that all identified risks are adequately addressed. Subsequent assessments may also be conducted at a frequency that commensurate with the level and type of risk to which a DC is exposed as well as the criticality of the DC to the FIs. FIs will obtain and assess the TVRA report from the OSP on the DC facility. 2. (i) Environmental controls are in place to protect the IT assets hosted at the data centre/ controlled areas. The following physical and environmental control feature are minimally available at the data centre: a. b. c. d. e. f. Systems and network equipment locked up in cabinet Uninterruptible power supply Air conditioning system Temperature and Humidity sensor Fire detector Smoke detector OSPAR v1.0 – July 2015 Page 24 of 46 g. h. i. j. k. l. (ii) Water sprinkler (drypiped or wet-piped) FM200 or other fire suppression system Raised floor CCTV Water leakage detection system Fire extinguisher The OSP should ensure that the perimeter of the DC, the DC building, facility, and equipment room are physically secured and monitored. The OSP should employ physical, human and procedural controls such as the use of security guards, card access systems, mantraps and bollards where appropriate (iii) The OSP should deploy security systems and surveillance tools, where appropriate, to monitor and record activities that take place within the DC. The OSP should establish physical security measures to prevent unauthorised access to systems and equipment. (c) Change Management These controls provide reasonable assurance that the OSP documents and approves all changes to the system software and network components. ABS Control Criteria 1. (i) Description of OSP’s Control Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan Changes to the system software and network components are documented and approved A formal change management process is established, documented and reviewed at least annually or when there are changes to the process. The change management process is reviewed and approved by management. Segregation of change management duties should also be specified. OSPAR v1.0 – July 2015 Page 25 of 46 (ii) The following controls exist for changes applied to the production environment: a. b. c. d. e. f. g. h. i. Changes should be initiated through a formal change request process and classified according to different severity levels. Change requests are approved in accordance to an established Change Authority Matrix (includes internal and FIs’ approvals), as agreed with FIs. A risk and impact analysis of the change request in relation to existing infrastructure, network, upstream and downstream systems should be performed. All changes must be tested and appropriate approvals must be obtained prior to implementation. System Integration Testing (“SIT”) and User Acceptance Testing (“UAT”) test plans should be prepared and signed off in accordance to the established Change Authority Matrix. Emergency change escalation protocols (e.g. by phone and email) and approval requirements should be established in the change approval matrix (includes internal and FI approvals) as agreed with FIs. Documented approval must still be obtained after the emergency change. A rollback plan (which may include a backup plan) is prepared and approved prior to changes being made. System logging is enabled to record activities that are performed during the migration process Segregation of duties should be enforced so that no single individual has the ability to develop, compile and migrate object codes into the production environment. Disaster recovery environment versions are updated timely after production migration is successfully completed. OSPAR v1.0 – July 2015 Page 26 of 46 (iii) Change risk categories are used to determine approval requirements in accordance with the defined change management process. Appropriate escalation levels and approvals are established and documented in the Change Authority matrix for changes. (iv) Segregation of environments for development, testing, staging and production is established. UAT data must be anonymised. If UAT contains production data, the environment must be subject to appropriate production level controls. (d) Incident Management These controls provide reasonable assurance that the OSP resolves all system and network processing issues in a timely manner. ABS Control Criteria Description of OSP’s Control Test of Controls 1. (i) System and network processing issues (once input into the incident and problem management tool) are resolved in a timely manner A formal documented incident management process exists. The process is reviewed at least annually or when there are changes to the process. The procedures documentation should be reviewed, updated and approved accordingly. (ii) Clear roles and responsibilities of staff involved in the incident management process should be outlined in the procedures, including recording, analysing, remediating and monitoring of problem and incidents. Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan Clear escalation and resolution protocols, including timelines should be documented. The need for incident notification to the FIs; and all these notifications should be tracked and reported to the FIs regularly. (iii) Incidents are recorded and tracked with the following information: OSPAR v1.0 – July 2015 Page 27 of 46 a. b. c. d. e. f. g. h. Severity Client information Date and time raised; description of incident or problem Incident type Application, systems and / or network component impacted Escalation and approvals Actions taken to resolve the incident or problem, including date and time action was taken Post-mortem on incidents that includes root-cause analysis. (iv) Problems attributing to the occurrence of the incidents should be identified to address root cause and to prevent recurrence. Trend analysis of past incidents should be performed to facilitate the identification and prevention of similar problems. Problems and incidents occurrence, root cause and resolution are tracked, monitored and reported to FIs. (e) Backup and Disaster Recovery These controls provide reasonable assurance that the OSP’s business and information systems recovery and continuity plans are documented, approved, tested and maintained. Backups are performed and securely stored. ABS Control Criteria 1. (i) Description of OSP’s Control Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan Backups are performed and securely stored. Backup and restoration processes have been implemented such that FIs’ critical system information can be recovered. Backup procedures are formally documented based on the data backup and recovery requirements of FIs. These should include a data retention policy and procedures designed to meet business, statutory and regulatory requirements as agreed with FIs. OSPAR v1.0 – July 2015 Page 28 of 46 (ii) System level backups are securely stored at off-site storage facilities. (iii) Backup logs associated with system level backups are generated and remedial action is taken for unsuccessful backups. (iv) Data backed up to external media such as tapes is is encrypted and industryaccepted cryptography standards is applied. (v) Tape (or other media) tracking/management system is used to manage the physical location of backup tapes. This includes a full inventory of all tapes on and off site, tapes retention periods and tapes due for rotation. (vi) Tape (or other media) inventory checks are performed at least annually such that all tapes are accounted for. (vii) Backup tapes (or other media) are periodically tested to validate recovery capabilities. 2. Business and information systems recovery and continuity plans are documented, approved, tested and maintained. Disaster Recovery (“DR”) refers to disaster recovery capabilities as a whole for services rendered and not specific to information technology (“IT”) disaster recovery only. (i) A DR strategy and business continuity plan is established and maintained based on business, operational and information technology needs of FI. Operational considerations include geographical requirements, on-site and off-site redundancy requirements. a. Different scenarios such as major system outages, hardware malfunction, operating errors or security incidents, as well as a total incapacitation of the primary processing centre should be considered in a DR plan b. DR facilities shall accommodate the capacity for recovery as agreed with FIs OSPAR v1.0 – July 2015 Page 29 of 46 (ii) DR strategy and business continuity plan, including activation and escalation process is reviewed, updated and tested at least annually. In consultation with FIs this may be conducted more frequent depending on the changing technology conditions and operational requirements. (iii) DR exercise (i.e. testing plans and results) should be documented with action plans to resolve and retest exceptions. (iv) Recovery plans include established procedures to meet recovery time objectives (RTO) and recovery point objectives (RPO) of systems and data. (v) (f) Redundancies for single point of failure which can bring down the entire network are considered and implemented. Network & Security and Monitoring These controls provide reasonable assurance that the OSP’s systems and network controls are implemented based on FIs’ business needs. ABS Control Criteria Description of OSP’s Control 1. (i) Systems and network controls are implemented based on client and business needs. Information Security (IS) policies and procedures are established, documented and reviewed at least annually or when there are changes. IS policies and procedures are reviewed and approved by management. Specific security controls for systems and networks are defined to protect the confidentiality, integrity and availability of systems and data. (ii) Security baseline standards (i.e. system security baseline settings and configuration rules) are defined for the various middleware, operating system, databases and network devices. Regular checks against baseline standards OSPAR v1.0 – July 2015 Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan Page 30 of 46 should be carried out to monitor compliance. (iii) Systems are ‘hardened’ (i.e. system security settings configured to the required level of protection) and meet established baseline standards. This should include changing of all default passwords and protection against known vulnerabilities. (iv) Anti-virus/ malware detection programs are installed and operational. Procedures should include the timely detection and removal of known viruses/malware. (v) Patch management procedures include the monitoring, review, testing and timely application of vendor patches, prioritising security patches to address known vulnerabilities. (vi) Any identified deviations of security policy/standards are documented, tracked and remediated. Deviations which impact the services rendered to the FIs should be communicated. (vii) File integrity checks are in place to detect unauthorised changes (e.g. databases, files, programs and system configuration). (viii) Network security controls should be deployed to protect the internal network. These include firewalls and intrusion detection-prevention devices (including denial-of-service security appliances where appropriate) between internal and external networks as well as between geographically separate sites, if applicable. Review for obsolete and duplicate firewall rules should be carried out at least half-yearly. (ix) Network surveillance and security monitoring procedures (e.g. network scanners, intrusion detectors and security alerts) are established. (x) Security system events are logged, retained and monitored. OSPAR v1.0 – July 2015 Page 31 of 46 (xi) Two-factor authentication at login for all online financial systems and transaction signing for authorising high risk transactions is implemented. (xii) Internal Network Vulnerability Assessment (“VA”) should be conducted quarterly to detect security vulnerabilities, including common web vulnerabilities. A combination of automated tools and manual techniques should be deployed. The scope, results (i.e. number of critical, high, medium and low risk findings) and remediation status (i.e. open, closed pending and extension, if any) are established and gaps are fully addressed in a timely manner. (xiii) Network and Application Penetration Testing (“PT”) should be conducted annually, particularly for internet facing systems. The scope, results (i.e. number of critical, high, medium and low risk findings) and remediation status (i.e. open, closed pending and extension, if any) are established and gaps are fully addressed in a timely manner. (xiv) Secured code review should be conducted before on-boarding new application. The scope, results (i.e. number of critical, high, medium and low risk findings) and remediation status (i.e. open, closed pending and extension, if any) are established and gaps are fully addressed. (g) Security Incident Response These controls provide reasonable assurance that appropriate personnel within the OSP are contacted and immediate action is taken in response to a security incident. Requirements in the relevant notices such as the MAS TRM Notice are adhered to. ABS Control Criteria 1. Description of OSP’s Control Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan Appropriate Personnel are contacted and immediate action taken in response to a security incident OSPAR v1.0 – July 2015 Page 32 of 46 (i) Incident Response Plan establishes and documents specific procedures that govern responses to security incidents (physical or system security). The roles and responsibilities of staff involved in responding to security incidents are clearly defined. (ii) Security response procedures are reviewed and tested annually and the Incident Response Plan updated where necessary. (iii) When an incident is detected or reported, the defined incident management process is initiated by authorised personnel. The incident severity level and escalation process must be pre-agreed with FIs. FIs should be notified immediately upon discovery and an Incident Report should be provided post-event. (h) System Vulnerability Assessments These controls provide reasonable assurance that the OSP performs regular system vulnerability assessment and penetration testing on environments with FIs’ customer information. ABS Control Criteria 1. (i) Vulnerability Assessments The OSP should continually monitor for emergent security exploits, and perform regular vulnerability assessments of its IT systems against common and emergent threats. (ii) As vulnerability assessments would only enable the OSP to identify security deficiencies in its IT systems at a particular point in time, OSP should institute a robust regime of prompt system patching and hardening, as well as adopt secure software coding OSPAR v1.0 – July 2015 Description of OSP’s Control Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan Page 33 of 46 practice. 2. (i) Penetration Testing The OSP should perform penetration testing at least annually on its internet facing systems. (ii) As penetration testing would only enable the OSP to identify security deficiencies in its IT systems at a particular point in time, the OSP should institute a robust regime of prompt system patching and hardening, as well as adopt secure software coding practice 3. (i) Timely Remediation The OSP should establish a process to effectively remediate issues identified from the vulnerability assessments and penetration testing a timely manner. (i) Technology Refreshment Management These controls provide reasonable assurance that the OSP maintains up-to-date software and hardware components used in the production and disaster recovery environment. ABS Control Criteria Description of OSP’s Control 1. (i) Timely refresh of IT systems and software of the production and disaster recovery supporting FIs To facilitate the tracking of IT resources, the OSP should maintain an up-to-date inventory of software and hardware components used in the production and disaster recovery environment (supporting FIs) of which includes all relevant associated warranty and other supporting contracts related to the software and hardware components. (ii) The OSP should actively manage its IT systems and software (supporting FIs) so that outdated and unsupported systems which significantly increase its exposure to security risks are replaced on a timely basis. The OSP should pay OSPAR v1.0 – July 2015 Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan Page 34 of 46 close attention to the products’ end-ofsupport (“EOS”) date as it is common for vendors to cease the provision of patches, including those relating to security vulnerabilities that are uncovered after the products’ EOS date. (iii) The OSP should establish a technology refresh plan to ensure that systems and software are replaced timely manner. OSP should conduct a risk assessment for systems approaching EOS dates to assess the risks of continued usage and establish effective risk mitigation controls where necessary. OSPAR v1.0 – July 2015 Page 35 of 46 III. SERVICE CONTROLS (a) Setting-up of New Clients/Processes These controls provide reasonable assurance that client contracting procedures within the OSP are defined and monitored, and client processes are set up and administered in accordance with client agreements/instructions. ABS Control Criteria 1. (i) Description of OSP’s Control Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan OSP contracting procedures are defined and monitored In considering, renegotiating or renewing an outsourcing arrangement, the OSP is to provide accurate and timely information to FIs so that they can perform an appropriate due diligence to assess the risks associated with the outsourcing arrangements. Information provided should include: a. experience and competence to implement and support the outsourcing arrangements over the contracted period b. financial strength and resources c. corporate governance, business reputation and culture, compliance, complaints and outstanding or potential litigation d. security and internal controls, audit coverage, reporting and monitoring environment e. risk management framework and capabilities, including in technology risk management and business continuity management in respect of the outsourcing arrangements f. arrangements for disaster recovery provisioning should be tracked and recorded g. reliance on and success in dealing with sub-contractors h. insurance coverage i. external factors (such as the political, economic, social and legal environment of the jurisdiction in which the OSP OSPAR v1.0 – July 2015 Page 36 of 46 j. operates, and other events) that may impact service performance track record and ability to comply with applicable laws and regulations (ii) Contractual terms and conditions governing relationships, functions, obligations (including minimal insurance coverage of assets), responsibilities, rights and expectations of all contracting parties are set out fully in written agreements, e.g. Service Level Agreements (“SLA”). (iii) OSP’s SLA with FIs should clearly include the following: a. the scope of the outsourcing arrangements b. the performance, operational, internal control and risk management standards c. confidentiality and security (i.e. roles and responsibility, liability for losses in the event of breach of security/confidentiality), including a written undertaking to protect, isolate and maintain the confidentiality of FIs information and other sensitive data d. business resumption and contingency requirements. The OSP is required to develop and establish a disaster recovery contingency framework which defines its roles and responsibilities for documenting, maintaining and testing its contingency plans and recovery procedures e. the process and procedures are in place to adequately monitor the controls in place f. notification of adverse developments or breach of legal and regulatory requirements g. dispute resolution (i.e. protocol for resolving disputes and continuation of contracted service during disputes as well as the jurisdiction and rules under which disputes are to be settled) OSPAR v1.0 – July 2015 Page 37 of 46 h. i. j. k. l. m. n. default termination and early exit by all parties. Note: FIs have right to terminate the SLA in the event of default, ownership change, insolvency, change of security or serious deterioration of service quality sub-contracting (i.e. restrictions on sub-contracting, and clauses governing confidentiality of data) FIs’ contractual power to remove or destroy data stored at the OSP’s systems and backups in the event of contract termination ownership and access (i.e. ownership of assets generated, purchased or acquired during the outsourcing arrangements and access to those assets) provisions that allow the FIs to conduct audits on the OSP and its sub-contractors, whether by its internal or external auditors, or by agents appointed by the FIs; and to obtain copies of any report and findings made on the OSP and its sub-contractors, in relation to the outsourcing arrangements and to allow such copies of any report or finding to be submitted to the Monetary Authority of Singapore (“MAS”) provisions that allow the MAS, or any agent appointed by the MAS, where necessary or expedient, to exercise the contractual rights of the FIs to access and inspect the OSP and its sub-contractors, to obtain records and documents of transactions, and information given to the OSP, stored at or processed by the OSP and its sub-contractors, and the right to access and obtain any report and finding made on the OSP and its sub-contractors provisions that indemnify and hold MAS, their officers, agents and employees harmless from any liability, loss or damage to the OSP and its sub-contractors arising out of any action taken to access and inspect the OSP or its sub- OSPAR v1.0 – July 2015 Page 38 of 46 o. p. q. r. contractors pursuant to the outsourcing agreement provisions for the OSP to comply with FIs’ security policies, procedures and controls to protect the confidentiality and security of the FIs’ sensitive or confidential information, such as customer data, computer files, records, object programs and source codes provisions for the OSP to implement of security policies, procedures and controls that are at least as stringent as the FIs’ provisions to ensure that audit is completed for any new application/system prior implementation that will address FIs’ information asset protection interests. The audit should at least cover areas like system development & implementation life cycle adherence, the relevant documentation supporting each cycle phase, business user (including client where applicable) involvement and sign-off obtained on testing and penetration test outcome for application/ system and compliance with pre-agreed security policies with FIs. Provisions to sub-contracting of material outsourcing arrangements to be subjected to prior approval of the FIs and any applicable laws. 2. (i) OSP’s processes are set up and administered in accordance with FIs agreements/instructions. Controls should be agreed by the FIs. The nature of these controls is appropriate for the nature and materiality of the outsourcing arrangements. (ii) Operating procedures are documented, kept current and made available to appropriate personnel. OSPAR v1.0 – July 2015 Page 39 of 46 (b) Authorising and Processing Transactions These controls provide reasonable assurance that services of the OSP are authorised, recorded and subjected to internal checks to ensure completeness, accuracy and validity on a timely basis. Services are processed in stages by independent parties such that there is segregation of duties from inception to completion. . ABS Control Criteria Description of OSP’s Control Test of Controls 1. (i) Services and related processes are authorised and recorded completely, accurately and on a timely basis Services provided to the FIs and related automated and manual processes, including controls, are set up and administered in accordance with the FIs’ standard operating procedures (SOP) agreements/ instructions. (ii) Service procedures are documented, kept current and made available to appropriate personnel. 2. (i) Services are subjected to internal checks to reduce the likelihood of errors. All services are recorded and checked against the FIs’ specifications as defined in documented procedures. Errors or omissions should be rectified promptly. All breaches and incidents are escalated as per the SLA. Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan (ii) Controls for reconciliation, error prevention, and error correction mechanisms such as “Maker & Checker” should be in place for key processes. (iii) A Management Information report should be generated as per the agreed procedure which would identify status of the task performed. KPIs need to be monitored as per the agreed procedure. (iv) For any exceptions noted, root cause analysis should be undertaken and where appropriate, remedial actions should be implemented to prevent recurrence. 3. Services are processed in stages by independent parties such that there is segregation of duties from inception to completion OSPAR v1.0 – July 2015 Page 40 of 46 (i) Appropriate segregation of duties should be implemented for transaction processing as access should be based upon need to know. (ii) Access to record, post and authorise transactions or services are restricted. Only authorised users should have access to update customer service records. 4. Sample Control for Data Entry Services Data entry procedures are performed in an accurate and timely manner. The mail receiving clerk data stamps mails and client information as it is received. Each mail is logged in a tracking sheet. (i) (ii) Mails and client information are sent to the relevant business department and recorded. (iii) Service Supervisor reviews and approves, and initials the data entry record as evidences of review. 5. Sample Controls for Debt Collection Services Collections and monies received are posted to customer accounts in an accurate and timely manner Documented collection processing procedures are in place to guide personnel in the debt collection process. (i) (ii) Debt collection information is scanned into a document imaging application for archiving and retrieval of information. (iii) Debt collection information received from client is balanced in total to the check, wire or amount received. (iv) Debt collection information entered in the system is reviewed by the Service Supervisor before final posting. 6. (i) Sample Controls for Physical & Electronic Statement Printing Services Customer Statements are printed accurately and sent timely to participants Documented statement printing procedures are in place to guide plan administrators in statement printing process. OSPAR v1.0 – July 2015 Page 41 of 46 (ii) A statement schedule outlines when statements are required to be printed and mailed for each customer. (iii) Service Staff compare system reports to ensure that statement include the correct balance information. (iv) A log of the number of statements printed is created by the Service Staff and reviewed by the Service Supervisor to ensure that the correct number of statements was printed. (c) Maintaining Records These controls provide reasonable assurance that the OSP classifies data according to sensitivity, which determines protection requirements, access rights and restrictions, and retention & destruction requirements Auditor’s Recommendation and OSP Management’s Response/Action Plan Data are classified according to sensitivity, which determines protection requirements, access rights and restrictions, and the retention and destruction requirements. Policies for data classification, retention and destruction are implemented. Retention is as required by local law (governing the FIs) or as required by the FIs. ABS Control Criteria 1. (i) (ii) Description of OSP’s Control Test of Controls Results of Tests Data held with the OSP (both in physical and electronic forms) are to be stored in appropriate mediums where level of storage/ backups are determined based on the classification of data. For information/ records held in electronic storage media (including cloud based storage services), the OSP is to ensure appropriate levels of data/ record segregation exist to prevent co-mingling of data. Procedures on Retention Management of Information/ Records/ Data are to be in place. These procedures should clearly state retention guidelines and they should be based on the OSPAR v1.0 – July 2015 Page 42 of 46 classification of information held and applicable law. (iii) Procedures on Destruction of Information/Records/Data by the OSP are to be in place. These procedures should clearly state the destruction process and they should be based on the classification of information held. (iv) For terminated arrangements, the OSP is to provide the FIs with the relevant reports/documentation and evidence that demonstrates that all forms of data/records/information (both electronic and physical) held have been destroyed. (d) Safeguarding Assets These controls provide reasonable assurance that physically held assets of the OSP are safeguarded from loss, misappropriation and unauthorised use. ABS Control Criteria Description of OSP’s Control 1. (i) Physically held assets are safeguarded from loss, misappropriation and unauthorised use Physical access to the operational OSP’s office/facilities is restricted to authorised personnel. The entry to office/ facilities is through an automated proximity access card entry control system. (ii) A security system is authored to restrict access to the office/facilities after normal business hours. Access must be monitored 24 hours a day, 365 days a year. (iii) Physical assets (e.g. office equipment, storage media) are tagged and are assigned to custodians. Annual inventory of assets are performed. There should be procedures to manage any outdated systems and software. Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan (iv) Proper tracking and verifying of asset movement should be in place. OSPAR v1.0 – July 2015 Page 43 of 46 (v) Access rights are reviewed in accordance with relevant policies. Access rights for personnel that no longer require access must be removed immediately. OSPAR v1.0 – July 2015 Page 44 of 46 (e) Service Reporting and Monitoring These controls provide reasonable assurance that OSP’s engagement with (1) its FI clients and (2) outsourced activities with its sub-contractors (that handles material outsourcing and FIs’ customer information) are properly managed. ABS Control Criteria Description of OSP’s Control 1. (i) Outsourced activities are properly managed and monitored Establish a structure and define ongoing governance process (including SLA and KPIs) to manage and deliver its services. (ii) Establish trainings to ensure its relevant staff and sub-contractors understand the FIs’ requirements. (iii) The SLA with its FI clients and the subcontractors clearly defines the performance monitoring (i.e. includes performance measures and indicators such as system uptime) and reporting requirements. Achievements of key performance indicators (KPIs) and key risk indicators (KRIs) are tracked and monitored. The OSP arranges regular meetings with its FI clients and the subcontractors to discuss its performance. Test of Controls Results of Tests Auditor’s Recommendation and OSP Management’s Response/Action Plan (iv) Establish service recovery procedures and reporting of lapses relating to the agreed service standards, including processes ensuring regular exchange of information and communication of critical issues. The OSP meets its FI clients and sub-contractors to discuss issues periodically. Corrective actions and plans are prepared and agreed with FI clients and sub-contractors if performance does not meet expected service levels. (v) Conduct periodic review, at least on an annual basis on its sub-contractors. The review includes the internal risk management, management of information and deficiency or breach in the agreed service standards. OSPAR v1.0 – July 2015 Page 45 of 46 Due diligence on its sub-contractors is performed on an annual basis. This includes: a. reviewing of internal controls report, where available b. confirming that the subcontractors have appropriate IT security policies and procedures in place c. reviewing of relevant aspects outlined under MAS Guidelines and Notices relevant to the outsourced services and as agreed with the FIs. (vi) Ensure that an independent control audit and/or expert assessment of its services are conducted at least every 12 months. The scope of the audits and/or expert assessment includes the security and control environment and incident management process. A copy of the audit report should be made known to the FIs as soon as it is available. At least once every 12 months to engage an independent auditor to perform a control audit and provide the control audit report on its sub-contractors’ compliance with the internal controls standards stipulated by the OSP and the respective FIs. OSPAR v1.0 – July 2015 Page 46 of 46