Implementing the NIST SP 800 Series for a Bank: A Step-by-Step Guide

Nova Novriansyah
Novai-Cybersecurity 101
6 min readOct 1, 2024

Banks manage a variety of critical applications and assets that are central to financial services, such as core banking systems, payment processing, and mobile banking platforms. Protecting these systems from cyber threats while maintaining compliance with regulatory standards is essential. The NIST (National Institute of Standards and Technology) SP 800 series provides a comprehensive framework for establishing security controls and risk management practices.

This guide walks through the step-by-step implementation of the NIST SP 800 series for banks in Indonesia(it applicable also for other banks), with a specific focus on NIST SP 800–53, NIST SP 800–37, NIST SP 800–88, NIST SP 800–171, and NIST SP 800–199, which helps categorize and secure information based on its impact.

Common Applications and Assets in an Indonesian Bank

Before delving into implementation steps, it’s important to understand the key systems and assets banks typically manage. These include:

Core Banking System (CBS): Manages customer accounts, loans, deposits, and transactions.

Internet and Mobile Banking Platforms: Allows customers to perform transactions and access account information.

ATM Networks: Offers cash withdrawals and basic banking services.

Payment Systems: Processes payments and settlements between financial institutions.

SWIFT Messaging System: Facilitates secure international transactions.

Fraud Detection Systems: Monitors for suspicious activity and potential fraud.

Customer Relationship Management (CRM) Systems: Manages customer service interactions and information.

Third-party Services: HR systems, accounting software, vendor management platforms, etc.

Data Storage and Backup Systems: Stores critical financial data and customer information.

Email and Collaboration Tools: Used for internal and external communication (e.g., Google Workspace, Microsoft Office 365).

Step 1: Categorizing Systems and Data (NIST SP 800–199)

The first step is to categorize information systems and the data they handle based on their potential impact if compromised. This step is crucial for prioritizing security efforts and aligning protections with the sensitivity of the data.

Actions:

Identify Information Types: Classify the types of data handled by the bank’s systems, such as customer financial data, payment information, and internal communications.

Assign Impact Levels: Use NIST SP 800–199 to categorize information and systems as low, moderate, or high impact based on the potential consequences of a security breach. For instance:

High Impact: Core banking systems, SWIFT transactions, and customer data.

Moderate Impact: Internal emails, CRM systems, and third-party HR applications.

Low Impact: Public-facing marketing websites and non-sensitive customer service systems.

Prioritize Security Controls: Align security controls based on the assigned impact level, applying more rigorous measures to high-impact systems.

Outcome: A clear categorization of information systems that helps determine the appropriate level of security for each system based on its impact.

Step 2: Conducting an Initial Risk Assessment (NIST SP 800–30)

The first step is to understand the risk landscape. NIST SP 800–30 provides guidelines for conducting a thorough risk assessment, helping banks identify vulnerabilities in key systems such as core banking, internet banking, and payment systems.

Actions:

Form a Risk Assessment Team: Bring together cybersecurity experts, compliance officers, and operational leaders.

Identify Critical Assets: Focus on high-impact systems, such as the core banking system, payment platforms, and the SWIFT network.

Analyze Risks: Assess the potential impact of threats like data breaches, insider threats, or ATM fraud.

Prepare a Risk Report: Document the vulnerabilities, assess their potential impact, and prioritize mitigation strategies.

Outcome: A detailed risk assessment report that identifies vulnerabilities and outlines an action plan to mitigate them.

Step 3: Establishing a Risk Management Framework (NIST SP 800–37)

Once systems are categorized, the next step is to create a Risk Management Framework (RMF) to guide the ongoing security and compliance efforts across the bank’s operations.

Actions:

Develop Risk Management Policies: Establish policies for managing risk across all systems, focusing on high-impact areas like payment systems and core banking.

Select Security Controls (from NIST SP 800–53): Choose appropriate security controls based on the classification of systems, with more stringent controls for high-impact systems.

Integrate Risk Management: Incorporate the risk management process into the bank’s ongoing operations, ensuring continuous monitoring and updates.

Outcome: A framework that integrates security controls with operational processes, ensuring ongoing protection against evolving threats.

Step 4: Implementing Security and Privacy Controls (NIST SP 800–53)

NIST SP 800–53 provides a detailed set of security and privacy controls that banks should implement to protect their critical systems and sensitive data.

Actions:

Access Control: Implement role-based access control (RBAC) for high-impact systems such as the core banking system and payment platforms to limit access to authorized personnel only.

Encryption: Encrypt sensitive data both in transit (e.g., during online banking sessions) and at rest (e.g., stored on data servers).

Multi-factor Authentication (MFA): Enforce MFA on critical systems, especially for SWIFT transactions, internet banking platforms, and the core banking system.

Auditing and Logging: Enable audit logging for all systems, particularly customer-facing platforms like mobile and online banking. Regularly review logs for anomalies.

Network Security: Implement firewalls, network segmentation, and intrusion detection systems (IDS) to safeguard against external and internal threats.

Outcome: A set of strong security controls that provide protection across the bank’s systems and ensure the confidentiality, integrity, and availability of data.

Step 5: Assessing Security Controls (NIST SP 800–53A)

Once security controls are in place, it’s crucial to assess their effectiveness through regular testing and validation, as outlined in NIST SP 800–53A.

Actions:

Control Assessments: Regularly evaluate the effectiveness of controls for systems such as internet banking, SWIFT, and ATMs.

Penetration Testing: Conduct penetration tests on customer-facing applications, such as mobile banking, to identify vulnerabilities.

Review Logs and Alerts: Continuously monitor system logs for abnormal behavior, especially in high-risk areas like payment systems and core banking.

Outcome: Verified and validated security controls that ensure systems remain secure and protected against evolving threats.

Step 7: Securing Third-Party Integrations (NIST SP 800–171)

Third-party services, such as HR, accounting, and vendor management, introduce additional security risks. NIST SP 800–171 offers guidelines to ensure third-party providers maintain the same level of security required by the bank.

Actions:

Evaluate Third-Party Vendors: Ensure that vendors handling sensitive data, such as HR and CRM systems, meet the bank’s security standards.

Contractual Security Requirements: Establish contractual obligations that require third-party providers to implement security measures, such as data encryption, regular audits, and breach notifications.

Audit Third-Party Providers: Conduct regular audits of third-party vendors to ensure compliance with the bank’s security policies.

Outcome: A secure ecosystem of third-party integrations, ensuring that external vendors follow the same security practices as the bank.

Step 8: Implementing Data Disposal Policies (NIST SP 800–88)

Ensuring the secure disposal of sensitive data is essential, especially for financial institutions. NIST SP 800–88 provides best practices for securely erasing data no longer in use.

Actions:

Establish Data Disposal Policies: Develop policies for securely disposing of data, including customer records, financial data, and obsolete systems.

Use Cryptographic Erasure: For digital data, apply cryptographic erasure to ensure that deleted data cannot be recovered.

Hardware Destruction: When decommissioning hardware (e.g., servers, hard drives), use secure methods like shredding or incineration to prevent data leakage.

Outcome: Secure data disposal practices that prevent unauthorized access to sensitive information after it is no longer needed.

Step 8: Continuous Monitoring and Improvement

Cybersecurity is a continuous process. Banks must continually monitor their systems and make adjustments to security controls as new threats emerge.

Actions:

Implement Real-Time Monitoring: Use real-time monitoring tools to track system behavior, particularly for high-risk areas such as the core banking system and payment platforms.

Schedule Regular Audits: Conduct periodic internal and external security audits to ensure that systems remain compliant with security policies.

Update Security Controls: As new threats emerge, update incident response plans, access controls, and security policies regularly.

Outcome: A proactive security posture that adapts to evolving threats, ensuring the bank remains resilient and protected.

By following this step-by-step guide, banks in Indonesia can effectively implement the NIST SP 800 series to enhance their cybersecurity posture. Incorporating NIST SP 800–199 ensures that the bank categorizes its information systems based on their potential impact, allowing for a tailored approach to security.

From risk assessments to secure third-party integrations and ongoing monitoring, each step helps protect critical banking systems and customer data while ensuring compliance with industry standards.

--

--

Nova Novriansyah
Novai-Cybersecurity 101

C|CISO, CEH, CC, CVA,CertBlockchainPractitioner, Google Machine Learning , Tensorflow, Unity Cert, Arduino Cert, AWS Arch Cert. CTO, IT leaders. Platform owners