Table of Contents - X.1150 (03/2024) - Security assurance framework for digital financial services

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Introduction
7 Overview of Recommendation ITU-T X.805
8 DFS provider business models
8.1 Bank led business model
8.2 MNO led business model
8.3 MVNO model
8.4 Hybrid model
9 DFS ecosystem
9.1 Elements of a DFS ecosystem for USSD, SMS, IVR, STK and NSDT
9.2 Elements of a DFS ecosystem based on applications and digital wallets
10 Security threats
10.1 Threats to DFS using USSD, SMS, IVR, STK and NSDT
10.2 Threats to DFS ecosystem based on apps and digital wallets
11 DFS security assurance framework
12 Security risk management process
12.1 Overview
12.2 Establishing a context
12.3 Risk assessment
13 Assessment of DFS security vulnerabilities, threats and mitigation controls requirements
13.1 Threat: Account and session hijacking
13.2 Threat: Attacks against credentials
13.3 Threat: Attacks against systems and platforms
13.4 Threat: Code exploitation attacks
13.5 Threat: Data misuse
13.6 Threat: Denial of service (DoS) attacks
13.7 Threat: Insider attacks
13.8 Threat: Man-in-the-middle and social engineering attacks
13.9 Threat: Compromise of DFS infrastructure
13.10 Threat: SIM attacks
Page
13.11 Threat: Compromise of DFS services
13.12 Threat: Unauthorized access to DFS data
13.13 Threat: Malware
13.14 Threat: Zero-day attacks
13.15 Threat: Rogue devices
13.16 Threat: Unauthorized access to mobile devices
13.17 Threat: Unintended disclosure of personally identifiable information
14 DFS security incident management
Annex A – Detailed DFS ecosystem infrastructure and threats
A.1 Customer – mobile device
A.2 Mobile device – mobile application
A.3 Customer – DFS agent
A.4 Mobile device – Base station
A.5 Mobile device – Internet
A.6 Base station - mobile switching station – gateways
A.7 Mobile network - DFS operator
A.8 DFS operator – third party
Annex B – Additional key components and recommendations for future work
Appendix I – Template for best practices of application security
I.1 Device and application integrity
I.2 Communication security and certificate handling
I.3 User authentication
I.4 Secure data handling
I.5 Secure application development
Bibliography