Mobile Banking Risk Identification and Mitigation (2024)

Home > First Quarter 2014 > Mobile Banking Risk Identification and Mitigation

Print Article

Mobile Banking Risk Identification and Mitigation
by Jerome F. Combs, Supervisory Examiner, Federal Reserve Bank of Minneapolis

Mobile devices — smartphones and tablets — are easy to use and can be taken almost anywhere. They provide users with easy access to personal and financialdata via applications that allow the movement and storage of data locally on the devices and/or allow data to be sent to and stored with a third party. Butthey can also be lost or stolen, infected with malware, and used as a vehicle for fraud. Even so, smartphones and tablets are here to stay. The wayconsumers use them may change over time, but it is clear that mobile banking via smartphones and tablets is on trend to grow rapidly in the coming years.

Mobile device software provider Malauzai Software, Inc., released data on August 14, 2013, that confirmed the growing use of mobile banking applications.The report indicated that "For banks and credit unions who have been live a minimum of 12 months, the average month-over-month growth rate is 4.19 percent.The best in class number is 11.56 percent, with several banks and credit unions topping 10 percent. Organic growth is strong and can be attributed to thegeneral growth of mobile smart phone handsets as well as these financial institutions making mobile part of all of their marketing campaigns."1In another report based on a 2012 survey of 1,115 U.S. consumers, the Aite Group forecasted that the number of mobile banking users would continue to growsignificantly, as shown in Figure 1.2

Mobile Banking Risk Identification and Mitigation (1)

Many community banks recognize the value of mobile banking — it provides them with avenues and opportunities to reach geographically remote or ruralmarkets, to focus on new markets, to innovate, to overcome infrastructure limitations and improve efficiency, to access payment systems, or even simply toretain market share. However, the rapid growth of mobile banking introduces security risk and privacy issues that must be managed. It is critical thatbanks anticipate and recognize risk in order to protect customers and their own reputation. This article reviews mobile banking risks and risk mitigationsolutions, discusses regulatory guidance, and suggests ways to implement mobile banking risk assessment and ongoing risk management strategies at communitybanks.

What Is Mobile Banking?

To understand the risks associated with mobile banking, it is necessary to separate mobile banking from the broader arena of mobile financial services andproducts. Mobile financial services involves the use of a mobile device for transfers (originating wire or automated clearing house (ACH) transactions),marketing, banking, or payments (person-to-person or person-to-business transactions), while mobile banking allows customers of an insured depositoryinstitution to conduct banking activities, such as checking balances, receiving account alerts, or making bill payments, through a smartphone or tablet.Mobile financial services, of which mobile banking is a subset, involve nonbank third parties. As such, this article focuses only on mobile banking becauseof the unique and ongoing risks faced by financial institutions that offer this service.

Mobile Banking Risk Identification

Providing consumers with the ability to transact banking business using a mobile device — with security settings of the customer's choosing — places anincreasing amount of control over sensitive financial data into consumers' hands. The net loss of control over this information makes it more difficult forthe bank to assess risks and implement effective risk mitigation strategies.

To understand mobile banking risk, it is important to understand the three most common delivery channels (many institutions offer all three channels toreach the greatest number of customers):

  1. Text messaging/short message service (SMS)
  2. Mobile-enabled Internet browser
  3. Mobile applications

Text Messaging/SMS

SMS, commonly referred to as "texting," is limited in the number of characters used. It is most often used as an alert and inquiry delivery channel. SMS isused to make mobile banking available to users of older cell phones that do not have web browsers or applications. SMS messages are sent in cleartext overwidely used telecommunications networks, with no encryption capabilities. Also, the customer's account identifier is stored in an SMS message, which meansthat there is the possibility of misuse if the phone is lost or stolen. SMS mobile banking users can also be susceptible to receiving misleading orsocially engineered messages that could prompt them to reveal account information. Because of the limited utility of older cell phones and the growth ofsmartphones, the use of SMS for mobile banking is fading.

Mobile-Enabled Internet Browser

Mobile Internet banking via a mobile-enabled Internet browser is an extension of the online banking channel. Customers can navigate to a website on asmartphone or tablet via the embedded browser in much the same way that they can access a site from a personal computer. Although banking from a mobiledevice using a mobile-enabled Internet browser is open to the same vulnerabilities as banking from a personal computer, it is usually harder to see and usesecurity features on a mobile device.

Mobile Applications

Mobile application banking uses a custom-designed software application installed on a smartphone or tablet that provides for a more user-friendly interfacethan is possible with either SMS or mobile browser-based banking. As such, this is the fastest growing delivery channel for mobile banking. However, thischannel introduces risks that may arise if third parties write the code for these applications, as well as the possibility that the applications can becompromised if customers install rogue, corrupted, or malicious software.

The storage of customer data on a phone or tablet presents the opportunity for misuse if the device is lost or stolen. In addition, likely attacks againstmobile banking include fraudulent requests (e.g., phishing e-mails or SMS messages) that appear to require the installation of a new application orsecurity feature from a bank, or malware that can steal credentials by prompting users to type an account number and password.

A good source of information related to mobile security risks is the Open Web Application Security Project (OWASP), a worldwide nonprofit organizationfocused on improving the security of web application software. It has developed a list of what it views as the top 10 risks arising from the use of mobileapplications. Highlights of some of the risks that may be most relevant for community banks are summarized below:3

  • Insecure data storage. Threats include lost or stolen phones or tablets and the possibility of malware gaining access to the device.
  • Weak server side controls. This pertains to the back-end computers that the mobile banking process needs to use. The security, authentication, and general controls related to these computers need to be strong.
  • Insufficient transport layer protection. This refers to the lack of data encryption when data travel over public networks.
  • Poor authorization and authentication. Some mobile applications rely only on unchanging, potentially compromised values for authentication, and some identification data can remain even after data wipes or resets.

Mobile banking introduces new security risks, threats, and challenges to financial institutions. Although no mitigation scheme can completely eliminaterisk, banks should develop practices to effectively safeguard the mobile banking process. By staying abreast of security risks and developing effectivemobile banking practices, a bank can reduce and better manage its legal, operational, and reputational risks.

Mobile Banking Risk Mitigation

With the convenience and rapid promotion of mobile banking, it may seem puzzling that many customers are still reluctant to embrace it. In a March 2013Federal Reserve System survey,4 consumers were asked "What are the main reasons you decided not to use mobile banking?" The most commonly citedreason was security, such as data loss, fraud, identity theft, and other risks (Figure 2).

A careful reading of the OWASP list of risks faced by banks offering mobile banking reveals that many of these risks are aligned with the risks that areperceived by their customers, as noted in Figure 2. Accordingly, the actions a bank takes to mitigate its risk could positively influence customers' senseof security and their willingness to adopt this service.

Mobile Banking Risk Identification and Mitigation (2)

As part of its Mobile Security Project, OWASP has also outlined suggested risk mitigation solutions — a list of its top 10 mobile controls — that addressthe mobile risks outlined above.5 The controls are discussed below from the perspective of the bank providing mobile financial services. Forexample, highlights of some controls a bank should consider when having an application developed for mobile banking include the following:

  • Identify and protect sensitive data on the mobile device. Store sensitive financial and consumer data on another computer instead of on the mobile device. If data are stored on the device, use strong encryption technology provided by a trusted source.
  • Ensure that sensitive data are protected while in transit. Assume nothing is secure. Mobile banking applications should enforce the use of an end-to-end secure channel such as secure sockets layer/transport layer security (SSL/TLS) and use strong encryption.
  • Implement user authentication, authorization, and session management correctly. Require appropriate-strength user authentication, for example, multifactor versus strong authentication. Physical tokens or voice, fingerprint, or behavioral authentication factors may be appropriate.
  • Secure data integration with third-party services and applications. Ensure that mobile banking applications and code are tested, come from a reliable source, have supported maintenance, and have no back-end malware (for example, Trojans).

Mobile Banking Risk Assessment

Once bank management understands the risks posed by mobile banking and the potential strategies for mitigating those risks at a high level, the final stepin the process is to apply those general concepts to the specific products and services offered by the bank. This begins with completing a risk assessmentbased on bank-specific factors. To complete an effective risk assessment, bank management should:

  • Understand the network architecture and mobile banking technology solution(s) being used.
  • Know how the mobile banking application is designed, understand what features are being used, and be aware of the threats to the application.
  • Identify the wireless transmission protocols and data transmission media being used.
  • Understand what data the application stores and processes, as well as how this information is stored.
  • Know the methods of attack to which the application is vulnerable and which are the most common. Identify controls to prevent attacks and/or data loss.
  • Have a robust vendor management process. If a third party (or parties) is involved in offering mobile banking, complete a thorough due diligence to understand all the preceding risk assessment elements as they apply to that third party.

One possibility is to use a data-centric approach to risk assessment and ongoing risk management. Data discovery and classification are two essentialinitiatives that lay the foundation for protecting data no matter where this information resides. If a financial institution does not know what kind ofdata it has or where they reside, it cannot apply the appropriate policies and controls to protect this information.6 This especially applies tomobile banking and the risks and controls discussed in this article. The following table is a simple data classification chart that a bank can fill outthat could be used to identify critical data and associated control requirements based on the implementation of a mobile banking solution.

Mobile Banking Risk Identification and Mitigation (3)

For example, consider a financial institution that implements mobile banking and uses a mobile banking application provided by a third-party vendor. Acustomer will use a mobile device, but the actual device and operating system will not be known by the financial institution. What is known is that thecustomer's private data will be in motion on a public network between the device and the vendor (that is, this information will be located externally). Thecustomer's private data will rest in storage at the vendor (also located externally).

Mobile Banking Risk Controls

Based on information provided in this article, what control requirements should a bank consider? The answer depends on the type of mobile bankingtechnology being implemented. See the table on the previous page for sample requirements. These are samples only; specific mobile banking implementationsand risk assessments may indicate less or more controls.

Options to consider include a secure end-to-end delivery channel on the public network, strong authentication on the device, and strong secure mobileapplication coding and testing standards for the mobile banking application. If a financial institution cannot meet its controls requirements (includingassessment of the controls used by a vendor) at any point, a reassessment is necessary. A financial institution should be able to complete an assessmentand provide ongoing risk management by answering four critical questions:

  • Where is it (for example, data type, hardware, software, and process)? An effective risk assessment process should help answer this question.
  • Who owns it (for example, data type, hardware, software, process, and policy)? It is critical to assign ownership in order to establish responsibility and accountability.
  • How do you know? Is there a significant security gap? Are controls working effectively? Are they the right controls? Effective risk assessment and audit processes help answer these questions.
  • What does "normal" look like? Ensure that monitoring and reporting processes related to data flow and transactions are in place in order to effectively identify abnormal behavior that could indicate malicious activity.

Following this type of process will help ensure that control gaps are identified, action plans to mitigate gaps are developed, and residual risk isacceptable. This process also provides for effective audit validation and feedback related to the intended control environment, leading to a safer and moresuccessful implementation.

Conclusion

Whether it is because of demand from customers or a desire to enter new markets, many community banks are beginning to offer mobile financial services totheir customers. As with all new products, bankers need to understand the mobile banking environment being used and the associated risks. Effective riskidentification and implementation of mitigation controls and processes based on the data type, state, and location are key to achieving this objective.With the proper strategy and risk management elements in place, both the bank and its customers should experience a safer mobile banking environment.7

Regulatory Guidance for Mobile Banking

In addition to sources of information from industry groups and associations, regulatory guidance that is pertinent to mobile banking is also available.While not as technical in nature as the OWASP guidance, it nevertheless provides support and direction related to the same control areas. Related guidanceincludes:

Federal Reserve Supervision and Regulation (SR) Letters:a

  • SR letter 13-19/CA letter 13-21, "Guidance on Managing Outsourcing Risk"
  • SR letter 11-9, "Interagency Supplement to Authentication in an Internet Banking Environment"
  • SR letter 05-19, "Interagency Guidance on Authentication in an Internet Banking Environment"
  • SR letter 01-15, "Standards for Safeguarding Customer Information"
  • SR letter 98-9, "Assessment of Information Technology in Risk-Focused Frameworks for the Supervision of Community Banks and Large Complex Banking Organizations"

Federal Financial Institutions Examination Council (FFIEC) Information Technology Booklets:b

  • Information Security
  • Outsourcing Technology Services
  • Business Continuity Planning
  • E-Banking
  • Audit

Back to top

Mobile Banking Risk Identification and Mitigation (2024)
Top Articles
Latest Posts
Article information

Author: Rev. Porsche Oberbrunner

Last Updated:

Views: 5981

Rating: 4.2 / 5 (73 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Rev. Porsche Oberbrunner

Birthday: 1994-06-25

Address: Suite 153 582 Lubowitz Walks, Port Alfredoborough, IN 72879-2838

Phone: +128413562823324

Job: IT Strategist

Hobby: Video gaming, Basketball, Web surfing, Book restoration, Jogging, Shooting, Fishing

Introduction: My name is Rev. Porsche Oberbrunner, I am a zany, graceful, talented, witty, determined, shiny, enchanting person who loves writing and wants to share my knowledge and understanding with you.