Finding #17

Formatted Text *

Network Segmentation Gaps

Severity Level: Priority 2
Category: Security / Infrastructure

Description:
While phones are segmented, printers and other non-workstation devices remain on the trusted network, and core/third-party vendor connections are not fully isolated, increasing exploit risks.

Impact
:

  • Vulnerable devices (e.g., IoT) can be exploited for lateral movement.
  • Messy audit reports from improper segmentation.
  • Vendor network threats could access the bank's network.

FFIEC Reference:

  • FFIEC IT Examination Handbook (November 2016):
    • "Non-workstation devices require network segmentation." (p. 37)
    • "Vendor connections must be isolated to reduce risks." (p. 39)

Recommendations:

  • Segment Devices: Move printers and IoT to a restricted network.
  • Isolate 3rd party Vendor Connections: Using your firewall.
  • Implement Firewall Rules: Enforce strict access controls between segments.
Back to list