ATM Security Service comprises of the following areas:
|
ATM Secuirty Risks
|
Our Approach
|
Our Methodology
|
ActivitiesStep 1: Prioritize and Scope – Identify business/mission objectives and high-level priorities of your organization. Determine the scope of systems, components and assets that support the ATM systems Step 2: Orient - Identify related systems and assets, threats and vulnerabilities, regulatory requirements, and overall risk approach for the ATM components. Step 3: Create a Current Profile - Develop a Current Profile of Bank and the ATM system by quantifying policy and practice maturity on a scale from 1-5. Step 4: Conduct a Risk Assessment - Identify emerging risks and use cyber threat information from internal and external sources to document the likelihood and impact of cybersecurity events. Step 5: Create a Target Profile - Create a Target Profile that describe Bank’s desired cybersecurity outcomes. Step 6: Determine, Analyze, and Prioritize Gaps - Compare the Current Profile and the Target Profile to determine gaps. Step 7: Create Gaps & Remediation Plan - Determine which actions to take to address the gaps identified in the previous step and adjust Bank’s current cybersecurity practices. |
Benefits
SPS gives you a comprehensive view of your compliance status and continuously monitors your environment using automated compliance checks based on the SPS best practices and industry standards your organization follows.
SPS provides services that help you protect your data, accounts, and workloads from unauthorized access. AWS data protection services provide encryption and key management and threat detection that continuously monitors and protects your accounts and workloads.