-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Decision Proposal 225 - Data Recipient Security Standards #225
Comments
The decision proposal has now been published and is attached below: This consultation will be open for feedback until the 18th February 2022. |
On behalf of ABA members, please find our responses to the questions below: Question 1 – What principles should the Data Standards Chair apply to determine if any security standards should be made for the CDR access arrangements? • What principles should be applied to whether standards apply and to what extent? • Do the principles apply equally to all access arrangements, or are they specific to one of the access arrangements? In order to build and maintain customer trust, the following principles should be applied to all access arrangements between all participants (data recipients, data holders, trusted advisors, representatives, further on-sharing and etc) of the CDR ecosystem:
Some insecure practices (screen scraping and etc.) outside of CDR ecosystem should be strongly discouraged. CDR needs to cover all functionality that can be achieved by screen scraping, but in a secure manner and with customer consent. Additionally:
Question 2 – How should the Data Standards Chair determine whether standards apply to data recipient access arrangements, or not? • If standards are defined, is this the addition of general requirements or specific security profiles governing the disclosure of data? • If standards are recommended, do they apply equally to all access arrangements or specifically to one or more access arrangements? If standards are recommended, should they be principle-based or provide detailed standards? • If standards should not apply, why not? • If alternative channels already exist for data collection (e.g., secure APIs or screen scraping) what reasons are security standards recommended for the CDR channel but not the alternative channels? • Rather than apply additional security standards within the CDR, should they instead be imposed through adjacent regulations in each sector that apply universal high-grade security consistently across all digital channels for the transfer of data? All security standards should be principle based and use open industry standards without customisation. These standards should be independently reviewed by qualified API security professionals before the adoption. Compliance with standards should be made easier and guaranteed by using comprehensive conformance test suites (e.g., OIDF FAPI conformance testing). Specific standards should be prescribed by DSB for all the access arrangements within CDR ecosystem. Standards prescribed should be suitable for different use cases and modes of interaction. For the access arrangements outside of CDR ecosystem, the principles above should be followed with the list of requirements to meet for each access arrangement. Specific standards should be recommended but not prescribed. Adjacent regulations should not be relied upon as their coverage is unlikely to cover all the scenarios in scope for this consultation. Question 3 – If standards are supported, what standards are recommended, and why? • Should standards exist where data is in transit? • Should standards exist where data is at rest? • Should standards exist for how secondary data recipients authenticate with their sponsor or principal? • Should standards exist for how two data recipients authenticate with one another for disclosure of data? • Should standards exist for the transfer of consent where a data recipient changes its technical infrastructure or outsourced software provider? • If standards are recommended, what impact does this have to consumer experience? As a general principle, in order to build and maintain customer trust, the security standards should exist for all access arrangements and interactions. Customer should maintain visibility of their data and all parties that have access to their data. Customers should have ability to revoke access to their data at any time. This revocation should be transparent, (i.e., there should be a way for the customer to identify, via their data holder dashboard, which on-sharing related consents, facilitated through the same ADR, they are revoking). Question 4 – What concerns or considerations must be factored into pre-existing commercial data integrations and solutions? Many access arrangements supported within the CDR replicate existing commercial arrangements for non-CDR data sharing. Defining additional security and technical requirements for pre-existing commercial solutions may therefore impact existing implementations. Are there any considerations in this regard that should be factored into making standards, or alternatively where standards should not be imposed? CDR access arrangement should be used as an opportunity to increase security of data sharing and customer control. Existing access arrangements that don’t satisfy principles above should be discouraged and phased out. Question 5 – Are security considerations limited to any given sector or do they apply to all CDR data? As the CDR expands across sectors, data recipients will have access to data sets across different sectors. So too, Data Holders may operate in more than one sector (for example an organisation providing banking, wealth and general insurance products). Security standards should be consistent between different industries to promote security, interoperability and increase vendor support. Question 6 – Should the Data Standards define customer authentication requirements for customers authenticating with accredited persons or with non-accredited persons in a CDR access arrangement? Whilst consumers must authenticate with their data holders to authorise the disclosure of data to a data recipient, there are no standards pertaining to the authentication of the customer in the data recipient. A digital identity and/ or customer authentication is not a pre-requisite to the use a data recipient goods or service. For every customer interaction that results in sharing, on-sharing, deleting, or modifying data or insights based on their data, should have a minimal level of authentication and, potentially, identity proofing requirements mandated. Question 7 – If action initiation or payment initiation are introduced into the CDR, does this raise new or additional security considerations for access arrangements? If action initiation was adopted by Treasury, this may provide alternate pathways for consumers to initiate payments, update their data and accounts, and open new accounts. Considering the potential future enhancements to the CDR, are any additional security measures relevant for data recipients? Minimal levels of authentication should be reviewed to make sure that they are suitable for higher impact transactions like action or payment initiation. For example, in Europe Strong Customer Authentication requirements were introduced as a part of PSD2. Question 8 – Are there any additional implementation or security considerations? • Do these implementation considerations preclude the making of security standards or do they change or increase build considerations? • Do these considerations impact reasonable implementation obligation dates? • If so, where standards are recommended, what obligation dates are considered practical and reasonable? • What key challenges would introducing security standards present? • What key risks would introducing security standards mitigate? ABA members believe that the following should be considered:
|
Trusted Advisers cannot be captured in security standards for other non-accredited persons within the CDR regime. Trusted Advisers are a restrictive group of professionals held accountable to professional standards, the majority are licensed and regulated by a Government agency and accountable to the Privacy Act 1988. In addition, professional accountants are already required to authenticate who their clients are. That is, while not accredited within the CDR regime, TAs are held accountable on matters of privacy, usage, client verification and secure storage of personal data. Question 1: Access to CDR data for a trusted advisers is driven through consumer nomination and consent. Access within an accredited persons platform does not require additional standards as the accredited person holding this data is already held accountable to stringent security standards. Question 2: Access arrangements should not require additional standards. The accredited person holding the data is already meeting the stringent security standards for CDR data within the CDR regime. Seeking to add additional security standards to access data held by an accredited person appears to duplicate these existing standards. Question 6: We do not agree that standards are needed for customer authentication by an accredited person or trusted adviser. Customer authentication will already form part of an accredited persons’ contract to take on board a customer. Customer authentication by a trusted adviser is not relevant in the CDR regime as data disclosed to a trusted adviser moves that data outside the CDR regime. We would note that many trusted advisers already have customer authentication obligations. For example, the Australian Taxation Office and Tax practitioners Board recently released guidelines on client identify verification for tax agents. New standards should only be considered where a gap has been identified within the CDR regime that places the consumer at risk. Access to data held by an accredited person, on the accredited person platform, is already captured by the security standards for that accredited person. Disclosure to a trusted adviser moves the data outside the CDR regime therefore CDR security standards would not apply. |
Basiq response : Decision Proposal 225 - Data Recipient Security StandardsThank you for the opportunity to comment on this proposal. We very much support and embrace the model of questioning the industry, prior to an actual proposal. Overview of BasiqBasiq is a Platform As A Service that provides the building blocks for financial services, predominantly in the form of modern secure APIs. We provide services to over 120 partners, ranging from small FinTech start-ups, to big players in the Australian Tech industry. The data we currently base our services on is sourced from financial institutions that are both ADIs and non-ADIs, always with the consent of the consumer. This integration with the data holding institution can be from Digital Data Capture APIs (screen scraping), statement uploads, or CDR Open Banking APIs. In our response, Basiq would like to both represent ourselves and our current and future Partners who access the consented, aggregated and enhanced data we provide. Concerns around introducing new barriers to participationBasiq fully supports the CDR framework and we are actively encouraging all of our 120+ Partners to move to consuming CDR data in preference to other data sources. The path to accessing CDR data has of course been greatly improved with the additional optionality of the various models available. However, many of our partners see CDR as introducing friction over what is already available. Basiq is working hard to support and encourage our Partners, but if additional barriers to adoption were introduced, this would certainly make our job harder. In this vein, we would suggest any additional rules be considered with the goal of being helpful and outlining what is “best practice”, rather than overbearing. Principles-based approach to security obligationsBasiq believes a principles-based approach to data recipient access arrangements and security obligations should be applied. Detailed standards, such as stipulating a specific authentication mechanism that may be equivalent to several other options, would cause great disruption not only to ourselves and to organisations similar to us, but also to all Partners using our services, specifically under the Affiliate/Representative model. That said, we of course vet our Partners to ensure the correct technical, security and process maturity is in place before any formal relationship is executed and CDR data is shared. However, the CDR attestation questions, which guide our due diligence process when onboarding a Partner for CDR data access, already require a level of competency around securing that data, both in transit and at rest. We provide services to ensure data is well governed both in our data enclave and those of our Partners. Adding further complexity, could add to any potential friction in on-boarding Partners to consume CDR Data. Agreement of security considerations prior to a decisionAny changes to our existing API interface with our Partners will cause friction for Basiq but also for every single Partner who consumes our APIs. We ask that any such change is discussed and the benefit agreed to outweigh this friction. What the CDR framework needs most of all right now is adoption of FinTechs and other service providers to enable innovative and helpful solutions and services to Australian Consumers. Security considerations apply to all CDR dataBasiq support a single approach for all cross cutting elements across all sectors and believe the same mentality should be applied here. All sectors will be providing PII data so the same level of security should be maintained. Thank you once again for this opportunity. Please get in contact to discuss any of these points further. Kind Regards Jim Basey |
Summary Feedback: The detailed feedback is provided against individual questions in the decision proposal. In summary, NAB recommends development and implementation of CDR security technical and general standards to promote customer trust in the CDR ecosystem by ensuring that all participants accessing, processing, transmitting and storing CDR data are accountable for the security of CDR data through adoption of these standards beyond primary ADRs. Due considerations may be made based on the security risks, new access arrangements including existing non-CDR channels. Question 1 NAB is of the opinion that consumer trust in the CDR ecosystem is underpinned by the security of their CDR data. With the introduction new participant arrangements, the security profile of the CDR ecosystem will significantly change with higher degree of exposure due to complex data flows amongst multiple participants in the new arrangement models. NAB recommends that the adequacy of existing security standards between data holders and primary ADRs for applicability while data sharing between new arrangement participants be assessed. Question 2 An objective risk assessment in light of new access arrangements and future ADR products is required. Question 3 The existing model that has two components addresses secure transfer of data and security of the CDR data environment that stores and processes it. Standards for data transfer/sharing between data holder and primary ADR relate to the first component and minimum mandatory security controls for CDR data environment for ADRs relate to the second component. Question 4 There are three data access pathways/interfaces in the non-CDR channel i.e. 1 , 2 ,3 and 3a as depicted in the figure 1 of the proposal. NAB opines that :
Question 5 Additional security considerations should be given to certain data classes for specific industry sectors that warrant a higher level of security regardless of the ADR consuming it E.g. Payment initiation services by CDR participants in the future through CDR channel is more likely to be targeted for cyber criminals and will bear more impact on financial industry sector over the others. Question 6 Data Standards should be defined for accredited or non-accredited persons to identify and authenticate their customers to minimize the risk of frauds and unauthorised CDR data disclosure so that the digital economy can thrive on strong foundations. Question 7 NAB believes that, with the introduction of action initiation services such as account opening, payment initiation into CDR would significantly increase the risk and additional security considerations must apply to the participants of the CDR ecosystem. E.g. payments initiation participants must have equivalent controls and processes as adopted by the banks including but not limited to stringent customer identity verification (KYC checks), fraud monitoring, controls relating to transaction limits etc. Question 8 • The additional considerations as stated above allude to change and build considerations for security standards. |
TrueLayer welcomes the opportunity to comment on Decision Proposal 225 in relation to Data Recipient Security Standards. The CDR Rules already set high level security requirements in Schedule 2 which are applicable to the protection of consumer data under a number of CDR access arrangements including both the representative and affiliate models. Schedule 2 includes requirements for security governance and the encryption of data in transit and at rest. Introducing further standards (or variations to existing standards) specific to particular access arrangements would require more complex rules, assessments, attestations and assurance obligations. This may unnecessarily further hamper participation. This would seem contradictory to the intent of these new arrangements which were introduced to lower barriers to entry and increase competition. TrueLayer is not aware of any evidence to suggest that existing security standards fall short or are inadequate. We therefore suggest that the existing wording of Schedule 2 is sufficient and appropriately principles-based. These principles should be applied relatively uniformly across all new access arrangements and sectors. We do not recommend prescribing any additional or specific technical approaches. We suggest that obligations of Principals and Sponsors are already well-defined within the rules and intermediaries adopting these business models are able to accomodate associated information security requirements into contractual arrangements with Representatives and Affiliates. There is potentially an argument that organisations receiving CDR Insights may not need to adopt such sophisticated information security controls due to the associated risk in the event of a breach. For example, MFA may not be deemed necessary in order to manage a set of binary responses to a relatively low risk query. However, there will be variability in that risk based on the query itself and the related metadata used to associated the response with an individual. In our view, the existing Information Security standards aren’t unreasonable and we would suggest that any contemporary technology business should be adopting similar principles, regardless of whether they host CDR data or not. |
EnergyAustralia welcomes the opportunity to provide feedback on this decision proposal in regards to Data Recipient Security Standards. |
Thank you to everyone who contributed. Consultation has now closed. Feedback will be reviewed and responded to before any proposals or recommendations are made. |
…ce/512 Standards Maintenance Issue #512
23rd February 2022: Feedback closed
Feedback for this consultation has closed. Thank you to everyone who contributed. Feedback will be reviewed and responded to before any proposals or recommendations are made.
--
16th November 2021: Decision Proposal 225 published.
This decision proposal presents a set of questions for the consideration if and how security standards should apply to data recipient access arrangements. This decision proposal does not propose standards, instead it asks for feedback on need, feasibility and implementation considerations.
The decision proposal is attached below:
Decision Proposal 225 - DR Security Standards.pdf
This consultation will be open for feedback until the 18th February 2022.
15th November 2021: placeholder was published.
Placeholder for a decision proposal considering security standards for data recipients and the new access arrangements.
The recent release of the Competition and Consumer (Consumer Data Right) Amendment (2021 Measures No. 1) Rules 2021 introduced amendments that:
(a) increased the ways businesses can participate in the CDR and the range of services by which consumers can derive benefit from their data through new access pathways including: trusted advisers, representatives and sponsored affiliates.
(b) permitted, or where necessary, made clear, that the Data Standards Chair may seek to define data standards in relation to the disclosure of CDR data including by data recipients.
A decision proposal will be posted here once developed.
The text was updated successfully, but these errors were encountered: