| 1. | Transaction monitoring standard: To enable early detection of fraudulent activities, VASPs are expected to implement comprehensive transaction monitoring, including but not limited to— | a. | behavioural analysis to detect anomalous patterns, and rule-based monitoring for known suspicious activities; | | b. | machine learning capabilities for advanced threat detection; | | c. | real-time alerting for Suspicious Transactions; and | | d. | regular review and refinement of detection methodologies. |
|
| 2. | Internal user activity monitoring standard: To enhance the ability to identify compromised accounts or insider threats early, VASPs are expected to implement monitoring of internal user activities, including but not limited to— | a. | authentication attempts and failures and pattern analysis to detect insider threats; | | b. | access to sensitive or critical systems and administrative activities; and | | c. | segregation of monitoring from operational teams. |
|
| 3. | Enhanced monitoring standard: To provide visibility into activities on critical systems, enabling early detection of any compromises, VASPs are expected to implement enhanced monitoring of developer and signing systems, including but not limited to— | a. | process creation and termination monitoring; | | b. | network connection analysis and file system change detection; | | c. | software installation and execution control; and | | d. | user behaviour analytics. |
|
| 4. | Tactical hardening standard: To enable organisations to limit attacker access once a compromise is detected, VASPs are expected to maintain capability to rapidly implement tactical hardening measures, including but not limited to— | a. | emergency access revocation, including individual end-points; | | b. | network segmentation capabilities and system isolation procedures; | | c. | pre-approved emergency change procedures; and | | d. | regular testing of hardening capabilities. |
|
| 5. | Investigation capability standard: To enhance the ability to identify attack vectors and compromised assets during incidents, VASPs are expected to maintain comprehensive investigation capabilities, including but not limited to— | a. | dedicated forensic resources (internal or contracted) deployable and responsive in real-time and/or on immediate notice; | | b. | secure evidence collection and handling procedures; | | c. | chain of custody documentation; | | d. | root cause analysis methodologies; and | | e. | regular training and capability testing. |
|
| 6. | On-chain analysis standard: To improve the ability to trace stolen funds and identify potential recovery opportunities, VASPs are expected to develop and maintain on-chain analysis capabilities, including but not limited to— | a. | transaction tracing tools and wallet attribution capabilities; | | b. | collaboration with other VASPs for fund tracing; and | | c. | regular training and capability development. |
|
| 7. | Remediation standard: To reduce the risk of re-exploitation, VASPs are expected to implement comprehensive remediation procedures, including but not limited to— | a. | complete rotation of all secret components (including but not limited to passwords, keys and key shards) after incidents; | | b. | system rebuilding from secure baselines and enhanced monitoring post-incident; | | c. | formal verification of attacker removal; and | | d. | post-incident review and lessons learned. |
|