Network Segmentation Gaps
Severity Level: Priority 2
Category: Security / Infrastructure
Description:
While phones are segmented, printers and other non-workstation devices remain on the trusted network, and core/third-party vendor connections are not fully isolated, increasing exploit risks.
Impact:
- Vulnerable devices (e.g., IoT) can be exploited for lateral movement.
- Messy audit reports from improper segmentation.
- Vendor network threats could access the bank's network.
FFIEC Reference:
- FFIEC IT Examination Handbook (November 2016):
- "Non-workstation devices require network segmentation." (p. 37)
- "Vendor connections must be isolated to reduce risks." (p. 39)
Recommendations:
- Segment Devices: Move printers and IoT to a restricted network.
- Isolate 3rd party Vendor Connections: Using your firewall.
- Implement Firewall Rules: Enforce strict access controls between segments.