Business Continuity
Audit
Logical Security
Vendor Management
Payments
100

Discussion-based exercise where personnel meet to validate the components of a plan by discussing their roles and responsibilities.

Tabletop Exercise

100

Document where audit findings are listed with priorities for remediation

Issue tracking document

100

Controls network traffic based on predefined rules

Firewall

100

Organizations perform this process at onboarding to assess a vendor’s financial stability and security practices

Due diligence

100

This a key access control for customers who can submit online or high-risk payment requests  

Multi-factor authentication  

200

This exercise is the process of identifying the potential impact of disruptive events on an entity’s functions and processes.

Business Impact Analysis

200

This should be clearly defined in an audit engagement letter or proposal. 

Audit scope/scope of work

200

Monitors traffic and actively blocks malicious network activity.

Intrusion Prevention System (IPS)

200

Organizations should conduct these periodically to measure performance and security.

Vendor assessments

200

These should be set and periodically reviewed for employees who process wire payments

Limits/Authority limits

300

A location partially equipped with info systems to support relocated operations in the event of a significant disruption.

Warm site

300

Used to set the scope and frequency of an audit

Risk assessment process

300

The process of dividing a network into smaller, isolated networks to limit the impact of a breach.

Network segmentation

300

Contractual agreement which defines expectations regarding response times or availability.

Service level agreement 

300

Management should perform these to verify the authenticity of payment requests received via non-in person methods

Call backs


400

When two or more processes, functions, or entities rely on another to successfully complete a task.

Interdependence/Interdependency  

400

Identifies the frequency of audits

Audit cycle/schedule  

400

Security model that works on, “never trust, always verify”, requiring authentication and authorization for every access request.

Zero trust

400

Report that evaluates a company’s control design and effectiveness over a period of time.

SOC 2 Type 2

400

This is the primary governing body of the ACH network

NACHA

500

Overall length of time a system can be in the recovery phase before negatively impacting an org’s mission.

Recovery time objective (RTO)

500

This may be determined by analyzing the reporting process and verifying candor of findings and recommendations

Audit independence

500

Host-based technology that actively monitors endpoints for malicious activity and may provide real time detection, quarantining, and reporting.

Endpoint Detection and Response

500

According to the the Federal Information Security Standards banks shall require their service providers by contract to do what?

Implement appropriate measures designed to meet the objectives outlined in the Security Standards.

500

In ACH, this is a term for a client that provides ACH entry instructions

Originator