Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 1

General Enterprise IT Environment Specialized Financial

ES TIIS
Security Controls
user mailbox
integration
(Email Security) (Threat Intelligence and FDR
• Apply phishing email Information Sharing) (Fraud Detection and credit card statement,
detection mechanisms. UPI- transaction
• Utilize threat intelligence Reporting) history
• Identify and report indicators feeds from various sources. • Use statistical analysis and
of compromise (IoC) related • Collect and analyze threat data machine learning algorithms for
to phishing emails. from Google News, Dark Web, fraud detection.
and other specified feeds. • Implement controls to identify
and report fraudulent transactions. Integrated Security
Controls
ENC
Biometric Log-In Gateway LAM (Data
BDP Encryption)
(Logging and
face-image (Biometric Data Protection) Apply data
input • Utilize facial recognition for Monitoring)
encryption
authentication. To track and
techniques to all
• Implement controls to detect fake faces analyze security
data-in-rest and
and ensure the authenticity of biometric events.
data-in-transit
data.

IAM
government-
issued IDs
(Identity and Access government-
issued IDs
DSC
Management) (Data Security)
• Integrate ID parsing into the Implement controls to ensure
authentication process. the security and validity of
• Validate and authenticate user parsed ID data.
identity using extracted details
from ID cards.

The ZEUS CRCF Framework


“Zero Exploitation Unified System for Entity Security: Cyber Resilience Controls for Finance”

You might also like