Compliance - GLBA Safeguards Rule
Quick Links
Document status | In Progress |
---|---|
Target release | 2023 / Q2 |
Epic Link | https://www.interactcp.com/taskaroo/Project/Edit?projectId=1273 |
Document owner | Jenn Ouderkirk |
Lean Canvas | |
Dealer Cost | Value Add |
Requirements | None |
Overview
Objective
The GLBA Safeguards Rule requires compliance for website vendors who collect or process financing information on behalf of dealers/shoppers. Full compliance must be in place by 6/9/23 (pushed out from original requirement of 12/9/22). LV Legal Dept has reviewed compliance rules and asked the Ignite platform to address 4 primary areas of concern regarding MFA, passwords, and encryption.
Success metrics
Goal | Metric |
---|---|
All existing and new users will have password requirements & MFA instituted | |
Credit app passwords will be obfuscated and reset to improved complexity requirements |
|
LV Legal will approve implementation of requirements for compliance |
|
Dealers will have communication to help them answer compliance inquiries. |
|
How Does it Work
This information is directly provided by the FTC website - https://www.ftc.gov/business-guidance/resources/ftc-safeguards-rule-what-your-business-needs-know
Design and implement safeguards to control the risks identified through your risk assessment. Among other things, in designing your information security program, the Safeguards Rule requires your company to:
FTC Safeguard Rule | Ignite Platform Technical Resolution |
---|---|
Implement and periodically review access controls. Determine who has access to customer information and reconsider on a regular basis whether they still have a legitimate business need for it. |
|
Know what you have and where you have it. A fundamental step to effective security is understanding your company’s information ecosystem. Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted. Keep an accurate list of all systems, devices, platforms, and personnel. Design your safeguards to respond with resilience. |
|
Encrypt customer information on your system and when it’s in transit. If it’s not feasible to use encryption, secure it by using effective alternative controls approved by the Qualified Individual who supervises your information security program. |
|
Implement multi-factor authentication for anyone accessing customer information on your system. For multi-factor authentication, the Rule requires at least two of these authentication factors: a knowledge factor (for example, a password); a possession factor (for example, a token), and an inherence factor (for example, biometric characteristics). The only exception would be if your Qualified Individual has approved in writing the use of another equivalent form of secure access controls. |
|
Technical Details
Requirements
Requirement | User Story | Importance | Task | Notes |
---|---|---|---|---|
Passwords for CP
| As the Ignite platform, we need to have additional security in place for password requirements. | HIGH |
|
|
Addition of 2FA for CP
| As the Ignite platform, we need to have additional security in place for password requirements. | HIGH |
|
|
Credit App Password updates
|
| HIGH |
|
|
Encryption
|
| HIGH |
|
|
Brute Force Attacks
|
| HIGH |
|
|
Ops steps
|
| HIGH |
|
|
User interaction and design
Open Questions
Question | Answer | Date Answered |
---|---|---|
Out of Scope
Additional Details
Setup Guide
Instructions
Termination Guide
Instructions