這是用戶在 2024-5-7 16:50 為 https://app.immersivetranslate.com/pdf-pro/a34c80a4-e7eb-4d38-83b6-3e5befad407a 保存的雙語快照頁面,由 沉浸式翻譯 提供雙語支持。了解如何保存?
2024_05_07_84ed8fec87fc7d8fdea2g

Components of the System Used to Provide the Service
用於提供服務的系統組件

I. People 一、人員

The board of directors executes independent supervision over the design and implementation of the internal control and regularly evaluates its effectiveness. The management under the supervision of the board of directors, establishes an organizational structure, reporting system, and appropriate authority and responsibilities for FISC to achieve various goals. Authorization, design, development or acquisition, configuration, documentation, testing, approval, and implementation changes to infrastructure, data, software, and operating procedures to achieve goals.
董事會對內部控制的設計和執行進行獨立監督,並定期評估其有效性。在董事會監督下的管理層建立了一個組織結構、報告系統和適當的權限和責任,以實現 FISC 的各種目標。授權、設計、開發或獲取、配置、文檔化、測試、批准和實施基礕設施、數據、軟件和操作程序的變更以實現目標。
FISC has documented established roles and responsibilities based on functional discipline within the company. The organizational structure, with defined reporting authority, is also documented and posted internally, including those involved with the security, availability, processing integrity, and confidentiality trust principles. The number of people and necessary skills needed in the IT department is periodically assessed by management and a mechanism is in place so that deficiencies in internal control are communicated to appropriate management personnel.
FISC 根據公司內的職能紀律確立了已記錄的角色和責任。組織結構具有明確的報告權威,也已在內部公佈,包括與安全、可用性、處理完整性和機密性信任原則有關的人員。管理層定期評估 IT 部門所需的人數和必要技能,並建立了一個機制,以便將內部控制的缺陷通報給適當的管理人員。
For risk management, FISC has set risk assessment organization structure, including the board of directors, risk management committee, risk management director, risk management team, every department of FISC, and the audit department which belongs to the board of directors. The annual risk assessment work is carried out by the "Risk Management Team" and the relevant results would be summarized. This team is directly under the general manager and consists of 1 team leader and 3 team members. The duties of the risk management team are including the research and revision of risk management systems, Research, planning, and implementation of risk management issues and supervise the implementation of risk management self-assessment activity of various units.
對於風險管理,FISC 已建立風險評估組織架構,包括董事會、風險管理委員會、風險管理總監、風險管理團隊、FISC 的每個部門,以及屬於董事會的審計部門。年度風險評估工作由“風險管理團隊”執行,相關結果將被總結。該團隊直屬總經理,由 1 名團隊負責人和 3 名團隊成員組成。風險管理團隊的職責包括風險管理制度的研究和修訂,風險管理問題的研究、規劃和實施,以及監督各單位風險管理自我評估活動的實施。
Regarding the FBIS, the related personnel planning is design as follow:
關於 FBIS,相關人員規劃如下設計:
System development 系統開發
1 supervisor who is responsible for reviewing the contents of the tasks undertaken by the team members and assist the team members in completing the assigned tasks.
1 位主管,負責審查團隊成員所承擔的任務內容,並協助團隊成員完成分配的任務。
1 online operation member which is responsible for daily operation such as batch result checking, add/delete setting of participating units (inquiry agency, replies to agency) and change operation such as user setting change, etc.
1 位線上運營成員,負責日常運營,如批次結果檢查,添加/刪除參與單位(查詢機構,回覆機構)的設置,以及更改操作,如用戶設置更改等。
1 approval member which is responsible for the review and release add/delete setting of participating units (inquiry agency, replies to agency), review and release daily operation and release the change operation.
1 位審批成員,負責審查和發布參與單位(查詢機構,回覆機構)的添加/刪除設置,審查和發布日常運營,並發布更改操作。
  • 1 supervisor who is responsible for reviewing the contents of the tasks undertaken by the team members and assist the team members in completing the assigned tasks.
    1 位主管,負責審查團隊成員承擔的任務內容,並協助團隊成員完成分配的任務。
  • 1 system planning and analysis member who oversees system planning, requirement confirmation and analysis, operation process planning and specification issuance, handling procurement operations, supplier communication and coordination related to FBIS.
    1 位系統規劃和分析成員,負責監督系統規劃、需求確認和分析、運營流程規劃和規範發布、處理採購操作、與 FBIS 相關的供應商溝通和協調。
2 system design and development members and they are responsible for confirming requirements with manufacturers, installing and building systems, opening test cases and functional tests, system maintenance and monitoring operations
2 位系統設計和開發成員,負責與製造商確認需求、安裝和構建系統、開啟測試案例和功能測試、系統維護和監控操作。

II. Software and Infrastructure
II. 軟體和基礎設施

FISC provides FBIS with confirmations service operations for External Confirmation Auditing Agency Service, External Confirmation Responding Bank Service, and a Financial Blockchain Network System including support services and associated data processing operations, FISC provides system hardware, software, support services and administrative services. FBIS is connected with Registration Authority ("RA") system from TAIWAN-CA INC. ("TWCA") for its Certificate Authority ("CA") service. And, the scope of this assessment includes all systems with detail information shown below. For daily maintenance management, it is supported by other systems from FISC such as Vulnerability Management System, information security management system, etc.
FISC 為 FBIS 提供外部確認審計機構服務操作、外部確認回應銀行服務,以及包括支援服務和相關數據處理操作的金融區塊鏈網絡系統,FISC 提供系統硬體、軟體、支援服務和行政服務。FBIS 與台灣數位認證股份有限公司("TWCA")的註冊機構("RA")系統相連,用於其憑證授權("CA")服務。此評估範圍包括所有系統,詳細信息如下所示。對於日常維護管理,由 FISC 的其他系統支援,例如漏洞管理系統、信息安全管理系統等。
Application
Operating
System
Database
Data Center
Location
Administered
by (location) 通過(位置)
Application Description 應用程式描述
Financial Blockchain 金融區塊鏈
Information System -- 資訊系統 --
External Confirmation 外部確認
Auditing Agency Service 審計機構服務
MS
Windows
2016
SQL
Server
2016
FISC (Taipei, 財政部(臺北)
Taiwan (R.O.C.)) 臺灣(中華民國)
FISC (Taichung, 財政部(臺中,
Taiwan (R.O.C.)) 臺灣(中華民國)
FISC (Taipei, 財政部(臺北)
Taiwan (R.O.C.)) 臺灣(中華民國)
FISC (Taichung, 財政部(臺中,
Taiwan (R.O.C.)) 臺灣(中華民國)
Providing services to auditors (audit
為審計師(審計
organization) and auditees (companies
機構)和被審計者(公司
being audited). Through the system,
被審計)提供服務。通過系統,
auditors are able to request approval
審計師能夠請求批准
from companies or apply for external
從公司或申請外部
confirmations; whereas auditees are
確認;而被稽核者則
able to approve. After the banks reply,
能夠批准。銀行回覆後,
auditors could also receive the results of
審計師也可以通過系統收到
the confirmation through the system.
確認的結果。
Financial Blockchain 金融區塊鏈
Information System - 資訊系統 -
External Confirmation 外部確認
Responding Bank 回覆銀行
Service
MS
Windows
2016
SQL
Server
2016
FISC (Taipei, Taiwan FISC(台灣台北)
(R.O.C.))
FISC (Taichung, 財政部(臺中,
Taiwan (R.O.C.)) 臺灣(中華民國)
FISC (Taipei, 財政部(臺北)
Taiwan (R.O.C.)) 臺灣(中華民國)
FISC (Taichung, 財政部(臺中,
Taiwan (R.O.C.)) 臺灣(中華民國)
Providing services to banks for replying
為銀行提供回覆服務
to external confirmation. Through the
透過外部確認。通過
system, banks are able to receive and
系統,銀行能夠接收並
respond the confirmation to the auditor.
回應審計師的確認。
Financial Blockchain 金融區塊鏈
Network System 網路系統
Ubuntu
V16.04.6
(None)
FISC (Taipei, Taiwan FISC(台灣台北)
(R.O.C.))
FISC (Taichung, 財政部(臺中,
Taiwan (R.O.C.)) 臺灣(中華民國)
FISC (Taipei, 財政部(臺北)
Taiwan (R.O.C.)) 臺灣(中華民國)
FISC (Taichung, 財政部(臺中,
Taiwan (R.O.C.)) 臺灣(中華民國)
Financial Blockchain Network System
金融區塊鏈網絡系統
consists of blockchain nodes to provide
由區塊鏈節點組成,提供
blockchain service. 區塊鏈服務。

III. Procedures 三、程序

FISC has developed various internal criteria documents, and staff follow internal procedures to perform operations. Specifications related to various trust criteria have been presented in the report, such as
FISC 已經制定了各種內部標準文件,工作人員遵循內部程序執行操作。報告中提出了與各種信任標準相關的規範,例如
  • Trust Services Criteria Relevant to Security
    與安全相關的信任服務標準
  • Control Environment 控制環境
FISC has established the "Management System Specification" stipulates that the management will approve the operational objectives, policies, and guidelines for the management system, and stipulates the "Work Rules" that employees should perform the duty of honesty. "Working Guidelines for Performance Management Implementation", "Working Guidelines for Employees' Retain and Promotion", " Management Guidelines for Contracts with Third Parties" and "Rules for Supplier Evaluation Management" are also established and regularly assessed to ensure that employees and outsourced personnel's performance meets expectations. The establishment of each department of FISC is based on the "Proper Levels & Responsibilities List", which are compiled according to different attributes, and the board of directors is convened and chaired by the chairman. In principle, it is held regularly every three months. The "Information System and Information Security Advisory Group" was also established to develop professional opinions on major proposals such as the company's information system and information security, and to strengthen the decision-making and supervision mechanism of the Board of Directors on information system and information security issues.
FISC 已建立了「管理系統規範」,規定管理層將批准管理系統的營運目標、政策和指導方針,並規定員工應該履行誠實職責的「工作規則」。同時建立了「績效管理實施工作指引」、「員工留任與晉升工作指引」、「與第三方簽約管理指引」和「供應商評估管理規則」,並定期評估以確保員工和外包人員的表現符合期望。FISC 各部門的建立基於「適當層級與責任清單」,根據不同屬性編制,董事會由董事長召集和主持。原則上,每三個月定期舉行。 「資訊系統與資訊安全諮詢小組」也成立,以制定對公司資訊系統和資訊安全等重大提案的專業意見,並加強董事會對資訊系統和資訊安全問題的決策和監督機制。
  • Communication and Information
    通訊與資訊
FISC has established "Internal Control Policy", the goal of establishing an internal control system, to promote the sound operation of the company, and to be followed by the board of directors, management, and employees. In addition, "Risk Management Operation Rules" is also established for risk management. The implementation of risk management plans or objectives by each unit shall regularly report to the business report to facilitate communication, discussion, review and improvement, and stipulate that each unit shall conduct risk management self-assessment at least once a year. To enhance the information security awareness of the whole company, "Working Guidelines for employee education and training management" contains the content of education and training and the regulations on internal and external training. If an abnormal accident occurs in the organization, it can also follow the "Reporting and Handling Points of Abnormal Incidents" for notification and further handling.
FISC 已建立“內部控制政策”,旨在建立內部控制系統,促進公司的健全運作,並由董事會、管理層和員工遵循。此外,還建立了“風險管理操作規則”進行風險管理。各單位執行風險管理計劃或目標應定期向業務報告,以促進溝通、討論、審查和改進,並規定各單位每年至少進行一次風險管理自評。為提高全公司的信息安全意識,“員工教育培訓管理工作指引”包含教育培訓內容和內外部培訓的規定。如果組織發生異常事故,也可以按照“異常事件報告和處理要點”進行通知和進一步處理。
■ Risk Assessment ■ 風險評估
FISC has established "Working Guidelines for Risk Assessment" to explain the promotion of each management system and planning the scope and schedule of risk assessment work. Each department should cooperate with the operation plan decided by the management review meeting to carry out risk assessment operations, reflect the current situation of risk changes, and explain the risk assessment operation mechanism. And FISC is also established "Regulations for Risk Management " to explain the company's implementation of risk management, regularly submit risk control reports, and report to the board of directors. Take steps to assess possible losses and provide adequate loss provisions in a timely manner and report to the board of directors.
金融監督管理委員會(FISC)已制定了《風險評估工作指引》,以說明推動各管理系統並規劃風險評估工作的範圍和進度。每個部門應配合管理審查會議決定的運營計劃進行風險評估操作,反映風險變化的現況,並說明風險評估操作機制。FISC 還制定了《風險管理規定》,以說明公司實施風險管理,定期提交風險控制報告,並向董事會匯報。採取措施評估可能的損失,及時提供足夠的損失準備金並向董事會匯報。
  • Monitoring Activities 監控活動
FISC has established "Network Security Management Manual" stipulates that the monitoring mechanism includes items such as the availability, capacity performance and various information security abnormal events of network security equipment, and establishes a vulnerability management mechanism, which requires that risk vulnerabilities such as the level of medium, high, and major risk weaknesses should be completed within 6 months. For those who cannot complete the weakness correction within the time limit (such as: the correction cannot be made, the manufacturer does not provide security updates, etc.), the management of the system equipment should fill in the "Information Security Exception Management Application Form", stating the reason or compensation measures should be submitted to the company's risk management supervisor for approval.
FISC 已建立了《網絡安全管理手冊》,規定監控機制包括網絡安全設備的可用性、容量性能和各種信息安全異常事件等項目,並建立了漏洞管理機制,要求風險漏洞(如中、高和重大風險弱點等級)應在 6 個月內完成。對於無法在時限內完成弱點修正的情況(例如:無法進行修正、製造商未提供安全更新等),系統設備管理應填寫《信息安全異常管理申請表》,說明原因或補償措施,並提交給公司風險管理主管審批。
  • Control Activities 控制活動
FISC has established the "Working Guidelines Problems and Needs Management Operation System" which states that management understands and determines the dependency and linkage between business processes, control activities, and general controls. In addition, FISC has established the "Internal Control Policy" which states that the company should established internal control audit system, self-audit system, and regulatory compliance and risk management mechanism in order to maintain the operating of internal control system. Regular review meetings are also held to review the assessment results.
金融監督管理委員會(FISC)已建立了「工作指引問題與需求管理運作系統」,其中規定管理層了解並確定業務流程、控制活動和一般控制之間的依賴性和聯繫。此外,FISC 還建立了「內部控制政策」,規定公司應建立內部控制審計系統、自我審計系統,以及監管遵循和風險管理機制,以維護內部控制系統的運作。定期舉行審查會議以審查評估結果。
  • Logical and Physical Access Controls
    邏輯和物理訪問控制
FISC has established the "Working Guidelines for Assess Apply and Change Regarding Financial Operating System" which states about the execution process and access activities of the account. Users can only log in to the operating host in the physical control area (such as operation room, terminal room, connecting management room, customer service center, etc.), and it is forbidden to log in from other places. When logging into the terminal management system (the entrance of connecting to the operating host), the user used the original account number and password, and use the one-time password provided by the Two-Factor Authentication tool (token) to conduct two-factor verification.
金融資訊服務中心(FISC)已制定了《關於金融運作系統評估、申請和更改的工作指南》,該指南闡述了帳戶的執行流程和訪問活動。用戶只能在物理控制區域(如操作室、終端室、連接管理室、客戶服務中心等)登錄運作主機,禁止從其他地方登錄。當登錄終端管理系統(連接到運作主機的入口)時,用戶使用原始帳號和密碼,並使用雙因素驗證工具(令牌)提供的一次性密碼進行雙因素驗證。
  • System Operations 系統操作
FISC has established the "Working Handbook for Internet Security Management", which stated an alert standard should be set for internet security equipment's status, effectiveness and event. If abnormal occurs, immediate messages and emails were sent to notify related operators. In addition, computers and internet equipment using TCP/IP communication protocol should execute security vulnerability evaluation by security manager or professional vendors.
金融資訊服務中心(FISC)已制定了《互聯網安全管理工作手冊》,其中提到應為互聯網安全設備的狀態、有效性和事件設置警報標準。如果發生異常,將立即發送消息和郵件通知相關操作人員。此外,使用 TCP/IP 通信協議的計算機和互聯網設備應由安全經理或專業供應商執行安全漏洞評估。
  • Change Management 變更管理
FISC has established the "Financial Information System Change Management Procedure", which is set out in detail the procedures for application review and execution of permissions and the development process of the system change. The application system of organization is mostly changed in response to demand, thus the organization has established control mechanism to implement change management, which is divided into R&D, testing, and operation environments. The R&D environment needs to be
FISC 已建立了“財務信息系統變更管理程序”,詳細列出了申請審查和執行權限以及系統變更的開發過程。組織的應用系統主要是根據需求進行更改,因此組織建立了控制機制來實施變更管理,分為研發、測試和運營環境。研發環境需要從 Dimensions 檢查代碼進行校正。完成後,使用測試工作表申請對操作系統的更改。

corrected by checking out the code from the Dimensions. After completion, use the test worksheet to apply for changes to the operating system.
  • Risk Mitigation 風險緩解
FISC has established the "Financial Blockchain Information Inquiry Operation Plan", which is stated that mechanisms for system backup, data backup, and function recovery in order to prevent the serious impact caused by the loss of data or the interruption of operation due to system failure and the establishment of a backup mechanism ensures the normal operation of the system. In addition, FISC also insures commercial fire insurance and electronic equipment insurance for all hardware equipment of Donghu, Nangang and Taichung Backup Center. Finally, for the risk management and response of vendors and business partners, FISC has incorporated relevant requirements into the contract.
金融監督管理委員會(FISC)已制定了《金融區塊鏈信息查詢運作計劃》,其中規定了系統備份、數據備份和功能恢復機制,以防止由於系統故障而導致數據丟失或運營中斷而造成的嚴重影響,並建立了備份機制以確保系統正常運作。此外,FISC 還為東湖、南港和台中備份中心的所有硬件設備投保商業火險和電子設備保險。最後,為了管理供應商和商業夥伴的風險和應對措施,FISC 已將相關要求納入合同中。
  • Trust Services Criteria for the Availability
    可用性信任服務標準
According to the "Personal Computer and Server Management Manual", the demanding unit submits a demand application, and the system department is entrusted to handle or purchase the required equipment. The allocation and management of information system resources adopt sharing and sharing methods, and use Active-Active architecture or a sufficient backup mechanism to ensure the availability of resources. A single device abnormality or failure does not affect business services.
根據《個人電腦和伺服器管理手冊》,需求單位提交需求申請,系統部門負責處理或購買所需設備。資訊系統資源的分配和管理採用共享方法,並使用主動-主動架構或足夠的備份機制來確保資源的可用性。單一設備的異常或故障不影響業務服務。
Besides, FISC has established the documentation "Key Points for Handling Environmental Facility Abnormalities", which identified abnormal environmental accidents, including air-conditioning system failure, water damage, building/structure collapse, telephone communication system failure, power supply interruption, earthquake phenomenon [Taipei basin earthquake degree above 6], flood, fire, man-made damage, infectious disease (Such as bird flu, malaria, plague, SARS, etc.). If it is discovered that the accident may cause system failure, the assistant of the management department or its designated personnel shall report to the team leader of the "Emergency Handling Team" in accordance with the provisions of the "Emergency Response Operation Points".
此外,FISC 已建立了文件“處理環境設施異常重點”,其中確定了異常的環境事故,包括空調系統故障、水損害、建築/結構倒塌、電話通信系統故障、電力供應中斷、地震現象[台北盆地地震程度超過 6 級]、洪水、火災、人為破壞、傳染病(如禽流感、瘧疾、瘟疫、非典等)。如果發現事故可能導致系統故障,管理部門助理或其指定人員應根據“應急響應操作要點”的規定向“應急處理小組”的組長報告。
  • Trust Services Criteria for the Confidentiality
    保密的信託服務標準
FISC has established the documentation "Financial Blockchain Information System - External Confirmation Responding Bank Service Connection Specification" and "Financial Blockchain Information System Requirements Function External Confirmation Front-end Transaction System Analysis Specification V1.00" to identify and designate confidential information when it is received or created and to determine the period over which the confidential information is to be retained.
FISC 已建立了文件“金融區塊鏈信息系統-外部確認應答銀行服務連接規範”和“金融區塊鏈信息系統需求功能外部確認前端交易系統分析規範 V1.00”,以在接收或創建時識別和指定機密信息,並確定機密信息應保留的期限。
Besides, these documentations also describe how to erase or otherwise destroy confidential information that has been identified for destruction.
此外,這些文件還描述了如何刪除或以其他方式銷毀已被確定要銷毀的機密信息。
  • Trust Services Criteria for the Processing Integrity
    處理完整性的信任服務標準
FISC has established the documentation "Financial Blockchain Information System - External Confirmation Responding Bank Service Connection Specification" and "Financial Blockchain Information System - External Confirmation Auditing Agency Service Connection Specification" to identify information specifications required to support the use of products and services.
FISC 已建立了文件“金融區塊鏈信息系統-外部確認應答銀行服務連接規範”和“金融區塊鏈信息系統-外部確認審計機構服務連接規範”,以確定支持產品和服務使用所需的信息規範。
Besides, the system has established a fool-proof mechanism for input data when inputting relevant information from the confirmation inquiry and reply to unit. The relevant data processing and transmission process will exist in the system in the form of certificate encryption, and the system will not keep a temporary file after the data transmission is completed.
此外,系統已建立了一個防範機制,用於在從確認查詢和回覆單位輸入相關信息時輸入數據。相關數據處理和傳輸過程將以證書加密的形式存在於系統中,系統在數據傳輸完成後將不保留臨時文件。

IV. Data IV. 數據

The end-to-end verification is taken between the accounting firm and the financial institution, and use confirmation for encryption. No other third-party institutions (including FISC) cannot know the content of the confirmation request, which meets the transaction data mask to ensure data privacy. This mode means that the confirmation request data replies from the financial institution are encrypted and protected by the accounting firm's certificate. The confirmation request data during the transmission process is cipher text transmission. FISC does not have the decryption certificate of the accounting firm, enhance it cannot decrypt the enquiry inquiry data. After the accounting firm receives the encrypted request confirmation data, the firm needs to use the corresponding certificate to decrypt, and then the firm can know the content in plain text. In order to ensure data confidentiality, information security control and customer rights protection, the FISC records the hash value of the transaction data on the blockchain. The relevant transaction records cannot be added or changed. The data content of the confirmation request is not stored on the chain to achieve the effect of protecting transaction data.
會計師事務所與金融機構之間進行端對端驗證,並使用確認進行加密。沒有其他第三方機構(包括 FISC)可以知道確認請求的內容,這滿足了交易數據遮罩以確保數據隱私。這種模式意味著金融機構回覆的確認請求數據是由會計師事務所的證書加密和保護的。在傳輸過程中,確認請求數據是密文傳輸。FISC 沒有會計師事務所的解密證書,因此無法解密查詢請求數據。當會計師事務所收到加密的請求確認數據後,需要使用相應的證書進行解密,然後才能知道明文內容。為確保數據保密性、信息安全控制和客戶權益保護,FISC 在區塊鏈上記錄交易數據的哈希值。相關交易記錄無法添加或更改。 確認請求的數據內容未存儲在鏈上,以實現保護交易數據的效果。

Relevant Aspects of the Control Environment, Risk Assessment Process, Information and Communication, and Monitoring
控制環境、風險評估過程、信息和溝通以及監控的相關方面

The security category and applicable trust services criteria were used to evaluate the suitability of design and operating effectiveness of controls stated in the description. Security criteria and controls designed, implemented, and operated to meet them ensure that the system is protected against unauthorized access (both physical and logical). The controls supporting the applicable trust services security criteria are included in section 4 of this report. Although the applicable trust services criteria and related controls are included in section 4, they are an integral part of FISC's description of FBIS.
使用安全類別和適用的信任服務準則來評估設計和操作控制的適當性和運行效果。設計、實施和運行以滿足這些控制的安全準則,確保系統受到未經授權訪問(包括物理和邏輯訪問)的保護。支持適用的信任服務安全準則的控制包含在本報告的第 4 部分中。儘管適用的信任服務準則和相關控制包含在第 4 部分中,但它們是 FISC 對 FBIS 描述的一部分。

Security Control elements
安全控制元素

FISC's security control reflects the position taken by management and the Board of Directors concerning the importance of controls and the emphasis given to controls in FBIS's policies, procedures, methods, and organizational structure. Key elements of FISC's control environment include oversight by FISC's Board of Directors, Human Resources (HR) Policies and Practices, Employee Education, Risk Assessment and Monitoring, and Information and Communication.
FISC 的安全控制反映了管理層和董事會對控制的重要性以及在 FBIS 政策、程序、方法和組織結構中賦予控制的重視所採取的立場。 FISC 控制環境的關鍵元素包括 FISC 董事會的監督、人力資源(HR)政策和實踐、員工教育、風險評估和監控,以及信息和溝通。

Security Control elements
安全控制元素

Communication and 溝通和
Enforcement of Integrity and Ethical Values
廉潔和道德價值觀的執行
Commitment to Competence
對能力的承諾

Participation of the Board of
董事會的參與

Directors
Management Philosophy and Operating Style
管理哲學和經營風格
Organizational Structure
組織架構
Authority and Responsibility
權威和責任

Description at FISC FISC 的描述

  • A statement of ethical values is available throughout the organization.
    組織內提供道德價值觀的聲明。
  • A formal code of conduct is communicated to employees.
    向員工傳達正式的行為準則。
  • A culture exists emphasizing the importance of integrity and ethical behavior through oral communication and management example.
    透過口頭溝通和管理示範,存在著強調誠信和道德行為重要性的文化。
  • HR policies and procedures are accessible to employees.
    員工可以取得人力資源政策和程序。
  • Job descriptions are available containing minimum qualifications and job responsibilities.
    工作描述包含最低資格和工作職責。
  • Resources are available for employees, including equipment, software, and manuals.
    為員工提供資源,包括設備、軟體和手冊。
  • Training is provided within FISC from a variety of sources.
    在 FISC 內提供來自各種來源的培訓。
  • FISC Corporate bylaws and/or charter(s) exist outlining the responsibilities of the board and management.
    FISC 公司章程和/或憲章明確規定董事會和管理層的責任。
  • A board of directors has been established and is charged with FISC corporate governance.
    已成立董事會,負責 FISC 公司治理。
  • The board members include eleven to fifteen Directors and three to five Supervisors who shall be elected by the shareholders' meeting from among the persons with disposing capacity.
    董事會成員包括十一至十五名董事和三至五名監事,應由具有處置能力的人士中從股東大會選舉產生。
  • The board members meet periodically to discharge the responsibilities of the board.
    董事會成員定期會面,履行董事會的責任。
  • The board members receive detailed reports and other information in advance of each meeting.
    董事會成員在每次會議之前提前收到詳細報告和其他信息。
  • FISC IT Management emphasizes the importance of managing risks related to security trust principles in FBIS interaction with those involved in the process.
    FISC IT 管理強調管理風險的重要性,這些風險與 FBIS 與參與過程的人員的互動中的安全信任原則有關。
  • FISC IT Management is aware of security trust principle breaches or other significant issues.
    FISC IT 管理知悉安全信任原則違反或其他重大問題。
  • Policies and Standard Operating Procedures are established and articulated by management.
    政策和標準作業程序由管理層建立和闡明。
  • FISC has an Incident Response process and breach protocol.
    FISC 擁有事件應變程序和違反協議。
  • FISC has documented established roles and responsibilities based on functional discipline within the company. The organizational structure, with defined reporting authority, is also documented and posted internally, including those involved with the security trust principles.
    FISC 已根據公司內的功能性學科確立了角色和責任。組織結構具有明確的報告權威,也已在內部進行了記錄和張貼,包括與安全信任原則有關的人員。
  • The number of people and necessary skills needed in the IT department is periodically assessed by management.
    IT 部門所需的人數和必要技能由管理層定期評估。
  • A mechanism is in place so that deficiencies in internal control are communicated to appropriate management personnel.
    已建立機制,以便將內部控制的缺陷通報給適當的管理人員。
  • Management's description of key security trust principle position's responsibilities and authorities is reviewed by those charged with governance (or the Board).
    管理對關鍵安全信任原則位置的責任和權限的描述由治理機構(或董事會)審查。
  • With respect to security trust principle areas, there is assignment of responsibility and authority for decision making.
    就安全信任原則領域而言,責任和權力的分配是有關決策的。
  • Limitations are placed on the assignment of authority and responsibility.
    對權力和責任的分配設定了限制。

Security Control elements
安全控制元素

Human Resources Policies and Procedures
人力資源政策和程序

Risk Assessment 風險評估

Information and Communication
資訊與溝通

Description at FISC FISC 的描述

  • Human resources policies and practices are available on the FISC Corporate intranet and are updated on a periodic basis.
    人力資源政策和實踐可在 FISC 企業內部網絡上找到,並定期更新。
  • For the position related to security trust principle, management conducts background investigations and performs reference checks prior to hiring. It includes criminal background search, past employment verification, education verification.
    對於與安全信任原則相關的職位,管理層在招聘前進行背景調查和參考檢查。這包括犯罪背景搜索,過去就業驗證,教育驗證。
  • Background checks are also performed for positions with high-level responsibility.
    針對具有高級責任的職位也進行背景調查。
  • To promote ethical behavior in the organization, training and awareness programs are provided.
    為了促進組織中的道德行為,提供培訓和意識計劃。
  • Periodic performance reviews and appraisals are done for all personnel, and the results are well documented.
    對所有人員進行定期績效評估和評估,並將結果詳細記錄。
  • Training is provided within FISC from a variety of sources. Management develops and conducts training on their systems, processes and procedures, and to provide specifically identified skills and knowledge to their workforce. Management also sends individual employees to training conducted externally by various organizations.
    FISC 內提供來自各種來源的培訓。管理層開發並進行有關其系統、流程和程序的培訓,並為其員工提供明確確定的技能和知識。管理層還將個別員工派往由各種組織在外部進行的培訓。
  • Exit interviews are performed, including inquiries about concerns related to integrity and ethical values, and internal control.
    進行離職面談,包括有關誠信和道德價值觀以及內部控制的相關問題的詢問。
  • The FISC Risk Management Team conducts a yearly risk assessment. The risk assessment is used to drive the activities of the internal control function.
    FISC 風險管理團隊每年進行一次風險評估。風險評估用於推動內部控制功能的活動。
  • Business plans are created each year that establish priorities and allocates resources to address those priorities.
    每年都會制定業務計劃,確立優先事項並分配資源來解決這些優先事項。
  • IT plans are created each year that establish priorities and allocate resources to address those priorities.
    每年都會制定 IT 計劃,確立優先事項並分配資源來解決這些優先事項。
  • An incident investigation and remediation system exist that includes a tracking mechanism that allows management to report on material fraud events.
    存在一個事故調查和補救系統,其中包括一個跟踪機制,允許管理層報告重大欺詐事件。
  • The organization periodically assesses the sufficiency of FBIS information systems to capture and report data that are timely, current, accurate, and accessible.
    組織定期評估 FBIS 信息系統的充分性,以捕捉和報告及時、當前、準確和可訪問的數據。
  • Information about the entity's security trust principle objectives, internal control policies and procedures, and related individual responsibilities are communicated via e-mail, NOTES billboards, MS SharePoint, etc. to reinforce the entity's commitment to internal control.
    有關實體安全信任原則目標、內部控制政策和程序以及相關個人責任的信息通過電子郵件、NOTES 公告板、MS SharePoint 等途徑進行傳達,以加強實體對內部控制的承諾。
  • FISC corporate intranet site or other communication tool exists for disseminating information, including information about internal control around the security trust principles.
    FISC 公司內部網站或其他通訊工具用於傳播信息,包括有關安全信任原則周圍內部控制的信息。
  • Instructions on how to access and submit a matter using the entity's whistle-blower program is available.
    可獲得有關如何存取和提交事項的指示,使用實體的舉報者計劃。
  • Findings of the external auditor, along with management's proposed resolutions, are addressed with those charged with governance.
    外部稽核師的發現,以及管理層提出的解決方案,將與負責治理的人士討論。

    Security Control elements Description at FISC
    FISC 的安全控制元素描述。

    Monitoring 監控
  • The organization periodically assesses the sufficiency of FBIS systems to capture and report data that
    組織定期評估 FBIS 系統的充分性,以捕捉和報告及時、準確且可存取的數據。

    are timely, current, accurate, and accessible.
    及時、準確且可存取。
  • Information about the entity's security trust principle objectives, internal control policies and procedures, and related individual responsibilities are communicated via e-mail, NOTES billboard, MS SharePoint, etc. to reinforce the entity's commitment to internal control.
    通過電子郵件、NOTES 公告牌、MS SharePoint 等方式傳達有關實體安全信任原則目標、內部控制政策和程序以及相關個人責任的信息,以加強實體對內部控制的承諾。
  • FISC corporate intranet site or other communication tool exists for disseminating information, including information about internal control around the security trust principles.
    FISC 公司內部網站或其他通訊工具用於傳播信息,包括有關安全信任原則周圍內部控制的信息。
  • Instructions on how to access and submit a matter using the entity's whistle-blower program is generally available.
    有關如何訪問和提交事項使用實體舉報計劃的指示通常是可用的。
  • Information regarding the whistle-blower program is made available to external parties.
    有關告發者計劃的信息已提供給外部方。
  • Findings of the external auditor, along with management's proposed resolutions, are addressed with those charged with governance.
    外部審計師的發現以及管理層提出的解決方案將與負責治理的人員討論。

Security and Availability Incident Communication
安全和可用性事件通訊

The company's main communication channel is the official document. Others are handled in compliance with laws and regulations. For example, the Information Security Management Law reports information about security incidents in accordance with" Notification and Handling Guidelines for Abnormal Incidents." The contact person and procedure when incident occurs are stated, and also other countermeasures. During the period, there was no security incident and no system failure occurred.
公司的主要溝通渠道是官方文件。其他事項按照法律法規處理。例如,信息安全管理法根據“異常事件通報和處理指南”報告安全事件信息。當事件發生時,會說明聯繫人和程序,以及其他對策。在此期間,沒有發生安全事件,也沒有系統故障發生。
FISC's related controls and mapping to applicable criteria are included in section 4 of this report, "Trust Services Category, Criteria, Related Controls, and Tests of Controls," to eliminate the redundancy that would result from listing them in this section and repeating them in section 4. Although the related controls and mapping to applicable criteria are included in section 4 of this report, they are, nevertheless, an integral part of FISC's description of the system.
FISC 的相關控制和映射到適用標準包含在本報告的第 4 部分中,“信任服務類別、標準、相關控制和控制測試”,以消除在本部分列出它們並在第 4 部分中重複它們將導致的冗餘。儘管相關控制和映射到適用標準包含在本報告的第 4 部分中,它們仍然是 FISC 系統描述的一部分。

Changes to the System during the Period
期間內系統的變更

During the covid-19 epidemic, the main maintenance and operation structure of the system remained unchanged, and the employees who are diagnosed or are in home isolation should worked from home according to the company's instructions. Related instructions will be announced in the company's internal epidemic prevention area. Employees assigned to work from home during the covid-19 epidemic have been issued company laptops and applied for remote access rights. If need, employees can use online meeting software such as Webex for online meetings.
在新冠疫情期間,系統的主要維護和運營結構保持不變,被診斷或居家隔離的員工應根據公司的指示在家工作。相關指示將在公司內部防疫區域公佈。在新冠疫情期間被指派在家工作的員工已獲發公司筆記本電腦並申請了遠程訪問權限。如有需要,員工可以使用 Webex 等在線會議軟件進行線上會議。
Besides, to follow organizational adjustments and the implementation of division of labor, the Information Security Department of FISC is established after approval from the 3rd meeting of the 9th board of directors on November . The official adjustment is effective from December. Information Security Department is responsible for organizing information security-related management operations which was belonging to the security control team of Information Technology Department. It is mainly responsible for information security policies and compliance matters, Establishment, promotion and maintenance of information security management system, collection and analysis of threat intelligence, and other information security management matters.
此外,為了遵循組織調整和分工實施,FISC 的信息安全部門在第 9 屆董事會第 3 次會議批准後於 年 11 月成立。正式調整自 12 月生效。信息安全部門負責組織相關的信息安全管理運營,原屬於信息技術部安全控制小組的職責。主要負責信息安全政策和合規事項,信息安全管理體系的建立、推廣和維護,威脅情報的收集和分析,以及其他信息安全管理事項。

Applicable Trust Services Criteria Relevant to Security
適用於安全性的信任服務標準

The trust services criteria relevant to security address the need for information and systems to be protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise the availability, processing Integrity and confidentiality of information or systems and affect the service organization's ability to achieve its service commitments and system requirements.
有關安全的信任服務標準涉及保護信息和系統免受未經授權訪問、未經授權信息披露和可能危害信息或系統的系統損壞,這可能危及信息或系統的可用性、處理完整性和機密性,並影響服務組織實現其服務承諾和系統要求的能力。

Security refers to the protection of
安全是指保護

i. Information during its collection or creation, use, processing, transmission, and storage and;
i. 在收集或創建、使用、處理、傳輸和存儲信息期間的信息,以及;
ii. Systems that use electronic information to process, transmit or transfer, and store information to enable the achievement of FISC's service commitments and system requirements. Controls over security prevent or detect the breakdown and circumvention of segregation of duties, system failure, incorrect processing, theft or other unauthorized removal of information or system resources, misuse of software, and improper access to or use of, alteration, destruction, or disclosure of information.
ii. 使用電子信息來處理、傳輸或轉移、存儲信息,以實現 FISC 的服務承諾和系統要求的系統。對安全的控制可防止或檢測職責分離的破壞和規避、系統故障、處理不正確、信息或系統資源的盜竊或其他未經授權的移除、軟件的濫用,以及對信息的不當訪問或使用、修改、破壞或披露。

Control Environment 控制環境

Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
CC1.1
cOSO Principle 1: The
cOSO 原則 1:實體展示了
entity demonstrates a 實體展示了
commitment to integrity 致力於誠信
and ethical values. 和道德價值。
The organization has established
本組織已建立
documentation "Management System
文件 "管理系統
Specification" and" Work Rules" which is
規範" 和 "工作規則",其中
stated the guidance of work for
說明了工作指導
supporting organization's internal
支持組織的內部
controls.
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established
本組織已建立
standards of conduct in documentation
文件中的行為標準
such as "Work Rules", Labor Contract"
例如"工作規則"、"勞動合同"
and "Declaration of Avoidance of
和"避免聲明"
Interests".
Inspected the documentation named "Work Rules"
審查了名為「工作規則」的文件
article 11 that we have confirmed the proper labor
我們已確認第 11 條的適當勞動
relation of trust and harmony, as well as employees'
信任和和諧的勞動關係,以及員工們
integrity duty, which has been approved and
經管理層批准和實施的誠信義務。所有
implemented by the management level. All
員工必須簽署《勞動合同》和
employees must sign the "Labor Contract" and the
"Declaration of Avoidance of Interests". The latest
"避免利益衝突宣言"。最新版本的"工作規則"已獲批准。
version of "Work Rules" which was approved by the
chief executive officer on April 12th, 2022.
2022 年 4 月 12 日上任的首席执行官。
Inspected a selection of employee, all of them have
審查了一些員工,他們全部簽署了「勞動合同」和「利益避免聲明」。
signed "Labor Contract" and the "Declaration of
簽署了「勞動合同」和「利益避免聲明」的員工。
Avoiding of Interests". 避免利益衝突的聲明。
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
documentation "Work Rules", "Working
文件“工作規則”,“工作
Guidelines for Performance Management
績效管理準則
Implementation" and "Personnel
實施"和"人事
Evaluation Committee Procedure" which
評估委員會程序",其中
is stated the evaluation and report
評估和報告的機制已被規定
mechanism of performance management
績效管理的機制
and the related award or punishment.
以及相關的獎勵或懲罰。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established
本組織已建立
documentation "Management Guidelines
文件“管理指南”
for Contracts with Third Parties" which is
与第三方签订合同",其中规定了
stated the requirements to the
对要求进行了说明
contractors and vendors.
承包商和供應商。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected "Management Guidelines for Contracts
審查了由首席簽署的“與第三方簽訂合同的管理指南”。
with Third Parties" which was signed by the chief
與第三方簽訂合同的管理指南”。
executive officer on March , 2020, article 5.1
2020 年 3 月 日,第 5.1 條的執行官
"Identify Risk of Third Parties Access", it has listed
「識別第三方訪問風險」,已列出
relative regulations to evaluate third parties and
相關法規以評估第三方和
was approved by the chief executive officer.
獲首席執行官批准。
Inquired the HR manager, the outsourcing
向人力資源經理詢問,外包
personnel and contractors are hired by the
人員和承包商由招聘。
company in accordance with the contract must
根據合同,公司必須
abide by the company's relevant operating
遵守公司相關的營運
regulations.
Inspected a selection of the outsourced personnel
檢查外包人員的選擇
sampling, all of them have signed the
取樣,他們全部已簽署
Confidentiality Agreement and Computer Software
保密協議和電腦軟體
Safety Affidavit. 安全宣誓書。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC1.2
COSO Principle 2: The
COSO 原則 2:董事會
board of directors 獨立性
demonstrates
independence from 
management and 管理和
exercises oversight of the
監督開發和
development and
performance of internal 內部績效
control.
The organization has established
本組織已建立
Responsibilities List" to demonstrate the
「責任清單」以展示
importance of integrity and ethical values
誠信和道德價值的重要性
to support the functioning of the system
支持系統運作
of internal control. 內部控制。
Inspected "Proper Levels & Responsibilities List"
審查「適當水平和責任清單」
which we have confirmed the roles are split into
我們已確認角色分為
seven levels with proper responsibilities, and the
七個層級,具有適當的責任,並且
latest version was approved by the board of
最新版本已獲董事會批准
directors on November 17th, 2022.
2022 年 11 月 17 日的董事
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
documentation "Management of
文件“董事會會議管理”
Operation of Board Meeting" which was
董事會議的運作"
approved through shareholder meeting
通過股東大會批准
on June
directors shall be convened by the
董事應由召集
chairman and the chairman should be
主席和主席應該是
the moderator. In principle, the board
主持人。原則上,董事會
shall be convened regularly every three
應每三個月定期召開
months and the reason for convening
會議召開的原因
shall be stated. The directors and
應詳述。董事和
supervisors shall be notified and the
監事應被通知,並且
agenda of the board of directors shall be
董事會議程應該是
Inspected a selection of the board of directors
審查了董事會的一部分選擇
meeting agenda, the reason had been specified for
會議議程,已指明召開的原因
the convening, and the directors and supervisors
董事和監事
were notified and the agenda of the board of
已通知並於七天前交付董事會議程。
directors was delivered seven days ago.
董事會議程已於七天前交付。
No exceptions noted. 未發現任何例外。
Confidential 機密
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
notified seven days in advance. But in
提前七天通知。但在
case of emergency, the meeting could be
緊急情況下,會議可以
convened at any time.
隨時召開。
The organization has established
本組織已建立
documentation "Management of
文件“董事會會議管理”
Operation of Board Meeting" and
董事會議運作
"Charters" which is stated that the
「章程」中指明
members of the Board of Directors.
董事會成員。
Inspected article 5 of “Management of Operation of
檢查了《董事會運作管理-會議管理 V1》的第 5 條,其中規定如果不到一半的
Board Meeting V1", it states that if less than half of
the directors are present, the chairman may
董事出席時,主席可能
announce that the meeting is postponed. Also,
宣布會議延期。同時,
inspected article 18 of "Charters" which was
檢查了《章程》第 18 條。
approved by through shareholder meeting on June
經股東大會於 2021 年 6 月 23 日通過,指出董事會有
23 rd, 2021 , it notes that the board of directors have
十一至十五名董事和三至五名
eleven to fifteen Directors and three to five
Supervisors who shall be elected by the
應由股東大會選舉產生,並具有處分能力的監事。
shareholders' meeting from among the persons with
股東大會從具有
disposing capacity. 處分能力的人員中選舉監事。
Inspecting the list of Directors, it meets the
審查董事名單,符合
requirement.
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
documentation "Information System and
文件“信息系統和
Information Security Advisory Group
信息安全諮詢小組
Setting Procedure" which is stated the
設置程序"中所述
professional consultants supplements
專業顧問補充
the Board expertise is available.
董事會專業知識可用。
Inspected the "Information System and Information
審查了董事會於七月通過的“信息系統和信息安全諮詢小組設置程序”
Security Advisory Group Setting Procedure" which
was approved by the board of directors on July
18th, 2019, it states that in order to maintain the
2019 年 18 日,它指出為了維護國家重要基礎設施的穩定運作
stable operation of national key infrastructure
銀行間系統,加強決策制定
interbank system, strengthen the decision-making
保護金融系統安全和穩定,防範系統性金融風險
and supervision mechanism of the board of
董事會對信息系統和信息的監督機制
directors on information systems and information
安全方法,“信息系統和
security methods, "Information System and
Information Security Advisory Group" is established
成立了信息安全諮詢小組
specially.
The group researches and provides professional
該小組研究並提供專業意見
opinions on the company's information system and
有關公司信息系統和
information security and other major indicators for
資訊安全和其他主要指標
the reference of the board of directors' decision-
供董事會決策參考的。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
making. There are seven to nine members of this
這個委員會通常有七至九名成員。
group. The board of directors elects three of them
董事會選出其中三人為成員,並指定其中一人為召集人;其他成員由任命
as members and assigned one of them as the
convener; the other members are appointed by the
company's financial information (security) industry,
公司的財務信息(安全)行業,
officials, academics, research, and other experts.
官員、學者、研究人員和其他專家。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
CC1.3
COSO Principle 3: COSO 原則 3:
Management establishes, 管理建立,
with board oversight, 在董事會監督下,
structures, reporting lines,
結構、報告線路,
and appropriate authorities
及適當當局
and responsibilities in the
及責任
pursuit of objectives. 組織已建立了
The organization has followed the
该组织已遵循《公司法》规定了组织的结构。
regulation "Company Law" to state the
该组织已遵循《公司法》规定了组织的结构。
structures of organization.
该组织已遵循《公司法》规定了组织的结构。
Inquired the representative of Information Security
向信息安全部代表詢問,公司實施外部
Department, the company's director structure is
根據目前的規定組成的
constituted in accordance with the current
"Company Law" which should comply with the
應符合《公司法》
regulations.
Inspected the "Management of Operation of Board
檢查了《董事會運作管理會議 V1》
Meeting V1" we have confirmed that it states the
我們確認其記載了
chairperson of the meeting maintains the order of
會議主席維持會議秩序
the meeting and appoint lawyer, accountant or any
並指派律師、會計師或任何相關人員參加會議並回答
related personnel to the meeting to answer the
相關人員參加會議以回答董事會的問題或匯報目前
board of firectors' questions or to report current
董事會提問或匯報公司目前狀況,以便董事會做出適當決策。
status of the company, in order for the board of
公司目前狀況,以便董事會做出適當決策。
directors to make appropriate decisions.
董事會做出適當決策。
Inspected a selection of meeting minutes, there
審查了一些會議記錄,公司沒有指派律師和會計師參加會議。
were no assign lawyers and accountants appointed
指派的律師和會計師未出席會議。
by the company to attend the meeting.
公司未指派律師和會計師參加會議。
No exceptions noted. 未發現任何例外。
The organization has documentation
組織有文件
"Proper Levels & Responsibilities List"
適當的層級和責任清單
which is stated the responsibility and
其中列明了責任和
business of different level.
不同層次的業務。
Inspected the "Proper Levels & Responsibilities
審查了董事會批准的“適當層次和責任清單”。
List" which was approved by the board of directors
董事會批准的“適當層次和責任清單”。
on November 17th, 2022, we have confirmed that
在 2022 年 11 月 17 日,我們已確認
the establishment of each department is organized
每個部門的成立是根據不同的屬性組織的
according to different attributes, and it states the
並且它說明
roles and responsibilities of each level.
每個層級的角色和責任。
Inspected the meeting minutes, the meeting of
審查會議記錄,會議
board of directors are held regularly.
董事會定期舉行。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established
本組織已建立
documentation "Charters" which is stated
記錄“憲章”中所述
the external connection, supervision, and
外部連接、監督和
return mechanisms. 回報機制。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inquired the representative of Information Security
向信息安全部代表詢問,公司實施外部
Department, the company implements external
連接、監督和回報機制
connection, supervision, and return mechanisms in
accordance with the relevant provisions of the
根據相關規定
"Company Law" and "Charters V16".
《公司法》和《章程 V16》。
Inspected the "Operational Rules for Compliance
審查了《合規運營規則》
with Laws" which was revised and approved by the
由主席於 2017 年 5 月 27 日修訂並批准的《法律》開始,該法律規定每個部門應審查應該處理的事項清單
chairman on May 27 th, 2017 , it states that each
由主席於 2017 年 5 月 27 日修訂並批准的《法律》開始,該法律規定每個部門應審查應該處理的事項清單
department review the "list of matters that should be
由主席於 2017 年 5 月 27 日修訂並批准的《法律》開始,該法律規定每個部門應審查應該處理的事項清單
reported to the competent authority in accordance
根據外部法律法規向主管機關報告,並每年進行必要的修訂。
with external laws and regulations" and revise if
根據外部法律法規向主管機關報告,並每年進行必要的修訂。
needed every year. 根據外部法律法規向主管機關報告,並每年進行必要的修訂。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC1.4
COSO Principle 4: The
COSO 原則 4:致力於吸引、
entity demonstrates a 實體展示了
commitment to attract, 開發和留住
develop, and retain 人才
competent individuals in
能幹的個人
alignment with objectives.
與目標一致。
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Employees' Retain and Promotion" which
"員工保留和晉升",其中
is stated the mechanism related to
記載了與
personnel evaluation, retain and
人員評估、保留和
promotion.
Inspected article 2 of "Working Guidelines for
審查了《員工留任和晉升工作指引》第 2 條款
Employees' Retain and Promotion" which was
《員工留任和晉升》
approved by the board of directors on November
董事會於 200 年 11 月 19 日批准
19th, 200, it states that ethic, ability, knowledge
該文件指出,道德、能力、知識
and performance are the main consideration
和表現是主要考慮因素
regarding company employees' retain and
關於公司員工的留任和
promotion. The ability to lead and coordinate were
晉升。在晉升為管理層時,領導和協調能力被視為重要因素
considered when promoting to management
position. In accordance with this regulation, the
根據這項規定,成立了「新人選拔規定」來處理新人的選拔。
"Regulations for the Selection of Newcomers" was
established to handle the selection of newcomers
for positions below the twelfth level and was
對於第十二級以下的職位而言
approved by the chairman on December 9th, 2020.
於 2020 年 12 月 9 日獲主席批准。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Rules for Supplier
供應商評估管理"文件規定的供應商評估管理規則
Evaluation Management" which is stated
管理"文件規定的供應商評估管理規則
the mechanism related to supplier
與供應商相關的機制
evaluation of their capacity.
評估其能力。
Inspected the "Rules for Supplier Evaluation
審查了「供應商評估準則"。
Management" which was approved by the chief
經首席執行官於 2018 年 2 月 8 日批准的"管理"旨在
executive officer on February 8th, 2018, is for
改善公司的供應商評估
improving the company's supplier evaluation
system, establish a database of selected
建立系統,建立一個選定的資料庫
manufacturers, and strengthen the company's
製造商,並加強公司的
performance management of suppliers.
供應商的績效管理。
Inspected the "Rules for Supplier Evaluation
審查了「供應商評估準則"。
Management" which was approved by the chief
經首席執行官於 2018 年 2 月 8 日批准的"管理"旨在
executive officer on February 8th, 2018, is for
改善公司的供應商評估
improving the company's supplier evaluation
system, establish a database of selected
建立系統,建立一個選定的資料庫
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
manufacturers, and strengthen the company's
製造商,並加強公司的
performance management of suppliers.
供應商的績效管理。
Inspected the "Supplier Supervision and
審查了 2022 年 12 月 7 日總裁批准的《供應商監督和管理措施》
Management Measures" which was approved by
the chief executive officer on December 7th, 2022,
is for strengthening the supervision and
用於加強對供應商的監督和績效管理,以確保公司資產的安全
performance management of suppliers, and to
,並
ensure the safety of the company's assets and
確保公司資產的安全
equipment, information communication system and
設備、信息通信系統和
contractual rights. 合同權利。
Inspected a selection of the supplier, the supplier
檢查了供應商的選擇,供應商
evaluation was proceeded.
進行了評估。
Inspected a selection of manpower evaluated
檢查了一部分評估過的人力資源
record, as outsourced manpower is evaluated every
記錄,因為外包人力資源每隔一段時間就會被評估。
six months, the evaluation mechanism was
六個月,評估機制已經
implemented.
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Employees' Retain and Promotion" which
"員工保留和晉升",其中
is stated the mechanism related to
記載了與
personnel evaluation, retain and
人員評估、保留和
promotion.
Inspected the "Working Guidelines for Employees'
審查了員工“工作準則”
Retain and Promotion" to promote outstanding
人才,實施人事透明,建立
talents, implement personnel disclosure, establish a
fair and reasonable promotion system, and pay
公平合理的晉升制度,並支付
equal attention to the principle of "internal
同等重視"內部晉升和外部補充"的原則
promotion and external supplementation" for
以促進公司內部員工的成長和發展
recruitment. In addition to internal promotion, new
招聘。除了內部晉升外,新
recruits adopt open selection or selection of the
招聘者採用公開選拔或選拔
best. In accordance with this regulation, the
最佳人選。根據這項規定,
"Regulations for the Selection of Newcomers V9"
新人選拔規定 V9
was established to handle the selection of
旨在處理十二級以下職位的新人選拔。
newcomers for positions below the twelfth level.
旨在處理十二級以下職位的新人選拔。
Inspected a selection of new recruit's record, all of
審查了一些新員工的記錄,全部都是從公開選拔中選出的。
them were selected from open selection.
他們都是從公開選拔中選出的。
Inspected the "Working Guidelines for employee
審查了「員工工作指引」
education and training management V6.1" is to
"教育和培訓管理 V6.1" 的目的是
achieve the company's development goals, improve
實現公司的發展目標,提高
human quality and work performance, assist
人員素質和工作表現,協助
employees to improve their professional knowledge
員工提升專業知識
and capabilities, and integrate employee growth
與能力,並整合員工成長
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
with company development, thereby improving work
與公司發展,從而提高工作
quality and efficiency, and improving customers'
品質和效率,並提高客戶的
satisfaction.
Inspected a selection of internal education and
審查了一系列內部教育和
training courses record for employees to determine
員工培訓課程記錄,以確定
the mechanism was implemented
實施了機制
Inspected a selection of the performance evaluation
審查了一部分績效評估記錄,績效評估是根據公司的職能完成的
record, the performance evaluation is completed
記錄,績效評估已完成
according to the functions of the company.
根據公司的職能。
Inspected the list of training schedules, FISC also
檢查了培訓時間表清單,FISC 也
provide various topic of training course
提供各種主題的培訓課程
opportunities to the employee.
為員工提供機會。
Inspected the "Working Guidelines for Employees'
審查了員工“工作準則”
Retain and Promotion" was revised and approved
保留和晉升”已經修訂並獲得批准
by the board of directors on November 19th, 2020,
由董事會於 2020 年 11 月 19 日通過,
and "Employee Performance Improvement
並且“員工績效改善
Guidelines" was revised and approved by the
指南”已經修訂並獲得批准
chairman on February 26 th, 2020 .
2020 年 2 月 26 日主席。
The organization has established the
組織已建立
documentation "Employee Rotation
文件“員工輪調”
Implementation Rules" which is stated
規定的實施規則
the mechanism related to personnel
與人員相關的機制
rotating.
"Inspected the "Employee Rotation Implementation
"審查了"員工輪調實施
Rules" which was revised and approved by the
2021 年 5 月 28 日由主席修訂並批准的《規則》,處理員工
chairman on May 28 th, 2021 , it handles employee
輪調以增強員工工作經驗和
rotation to enhance employee work experience and
strengthen internal control.
強化內部控制。
Inspected a selection of the rotation notification to
檢查了一些輪換通知,以確定機制是否得以實施。
determine the mechanism was implemented."
確定機制是否得以實施。
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
documentation "Regulations for the
"新人選擇"文件和
Selection of Newcomers" and
績效管理系統
"Performance Management System
Specifications" related to considering the
與考慮個人和人員背景相關的“規格”
background of individuals and personnel
新人表現評估
performance evaluation of new
employee.
Inspected article 3 of the "Regulations for the
根據《新進人員選拔辦法第 9 版》第 3 條條款檢查文章,雇主首先
Selection of Newcomers V9", the employer first
對其專業進行初步測試
conducts a preliminary test on its professional
,雇主首先進行其專業的初步測試
abilities and functions, and submits a resume of the
能力和功能,並將公司新招聘的員工簡歷提交給人力資源部,數量是適合的五倍
company's new recruits to the Human Resources
部門
Department with five times the number of suitable
部門
candidates as required. 根據需要的候選人。
Inspected the "Regulations for the Selection of
檢查了經修訂並獲批准的《新人選拔規定》。
Newcomers" which was revised and approved by
檢查了經修訂並獲批准的《新人選拔規定》。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
the chairman on December 9th, 2020 and inspected
2020 年 12 月 9 日主席並檢查
a selection of new recruits, all of them did all have
一批新人選,他們全都有
recruitment resumes. Inspected a selection of
招聘簡歷。檢查了一批
official documents of four new recruits, all of them
四名新兵的官方文件,全部
indeed issued official documents that are applicable
確實發出適用的官方文件
and qualified. 並且合格。
Inspected the "Performance Management System
審查了經過董事長於 2017 年 11 月 24 日批准後修訂的“績效管理系統規範”
Specifications" which was revised after the approval
by the chairman on November 24 th, 2017, it
specifies the performance cycle, performance
指定了績效週期、績效
planning, performance review and performance
規劃、績效評估和績效
evaluation, etc. to assess the capabilities of
評估等,以評估能力
employees.
Inspected a selection of the performance evaluation
審查了一部分績效評估記錄,績效評估是根據公司的職能完成的
record, the performance evaluation was completed
記錄,績效評估已完成
according to the functions of the company.
根據公司的職能。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
employee education and training
management" which is related to
與管理相關的
personnel training to maintain technical
人員培訓以保持技術
competencies.
"Inspected the "Working Guidelines for employee
審查了員工的「工作準則"
education and training management (V6.1)" states
教育和培訓管理(V6.1)" 聲明
the rights and responsibilities of education and
教育和培訓的權利和責任
training, operating procedures, and operating
營運程序和營運
monitoring.
Inspected a selection of internal education and
審查了一系列內部教育和
training courses to determine the mechanism was
培訓課程,以確定機制是
implemented." 實施。
Inspected a selection of internal education and
審查了一系列內部教育和
training courses to determine the mechanism was
培訓課程,以確定機制是
implemented.
No exceptions noted. 未發現任何例外。
CC1.5
COSO Principle 5: The
COSO 原則 5:
entity holds individuals
實體擁有個人
accountable for their 對他們負責
internal control 內部控制
responsibilities in the 追求目標時的責任。
pursuit of objectives. 組織已建立了
The organization has established the
組織已建立
Responsibilities List" which is related to
責任清單",與
personnel performance evaluation.
人員績效評估相關。
Inspected the "Proper Levels & Responsibilities List
檢查了"適當水平和責任清單"
V14" which it states the obligations of all levels of
V14" 規定了各級人員的義務以及其批准和轉移的審查機制。
personnel and the review mechanism for their
人員和其審批和轉移的審查機制。
approval and transfer. 批准和轉移的審查機制。
Inspected "Proper Levels & Responsibilities List"
審查「適當水平和責任清單」
that we confirm it contains confirmation of
我們確認其中包含確認
"appointment, dismissal and remuneration of
「任命、解雇和酬金
accountants." which is approved by the board of
會計師。"經董事會批准
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
documentation "Regulations for Annual
年度文件"規定"
Comprehensive Performance Evaluation"
全面績效評估
which is related to personnel
與人員相關
performance evaluation. 績效評估。
Inspected article 5 of the "Regulations for Annual
審查了《年度綜合績效評估 V8.5 規定》第 5 條,其中
Comprehensive Performance Evaluation V8.5", it
記載了績效的四個等級,並且在
states the four grades of performance, and in
accordance with the standards of the grades,
根據等級標準,
factors such as the company's annual operating
例如公司的年度營運
performance and employee contribution are used
績效和員工貢獻等因素被使用
as appraisal rewards and punishments.
作為評估獎懲。
Inspected a selection of meeting minutes of the
檢查了二月份「人事評估委員會」的部分會議記錄。
"Personnel Evaluation Committee" on February
作為評估獎懲。
21 st, 2022 and December 2nd, 2022, the case of
2022 年 12 月 21 日和 2022 年 12 月 2 日,討論處罰人員的案例。
punished personnel is discussed.
討論處罰人員的案例。
No exceptions noted. 未發現任何例外。

Communication and Information
通訊與資訊

Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
documentation "Internal Control Policy"
文件“內部控制政策”
and "Risk Management Operation Rules"
和“風險管理操作規則”
which is stated the identification of
應執行已說明識別的
information requirements and the self-
資訊需求和自我-
assessment operation shall be executed
評估操作
at least once a year.
每年至少一次。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected article 3 of the "Internal Control Policy"
檢查了《內部控制政策》第 3 條
which was revised and approved by the board of
經董事會修訂並批准
directors on November 19th, 2020, it states the goal
董事們於 2020 年 11 月 19 日提出了建立內部控制系統的目標
of establishing an internal control system to promote
以促進公司運作,並由公司實施
company operation, and to be implemented by the
board of directors, management and all the
董事會、管理層和所有
employees.
Inspected "Risk Management Operation
檢查“風險管理操作
Rules(V1.3)" to determine every department should
規則(V1.3)”以確定每個部門應
conduct risk self-assessment at least once a year
每年至少進行一次風險自我評估
and the self-assessment evaluation items which is
並經董事長批准的自我評估評估項目
approved by the chairman, and the form of self-
形式和自我
assessment is set separately and authorized by the
評估是單獨設定並由首席執行官授權進行批准。相關
chief executive operation for approval. The relevant
工作文件和材料用於自我評估
work papers and materials for the self-assessment
由首席執行官操作批准。
should be kept for at least five years.
應至少保存五年。
Inspected a selection of the record of risk self-
檢查了風險自我記錄的一部分
assecsment the merhanism was imnlemented
評估機制已實施
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted 未發現任何例外情況
CC2.1
COSO Principle 13: The
COSO 原則 13:該
entity obtains or 實體獲得或
generates and uses 生成並使用
relevant, quality 相關的、優質的
information to support the
資訊來支持
functioning of internal 內部功能的运作
control.
The organization has established the
組織已建立
documentation "Internal Control Policy"
文件“內部控制政策”
which is stated the mechanism of internal
內部機制的陳述
controls.
Inspected article 4.4 Information and
檢查第 4.4 條《內部控制政策 V1.2》的資訊和
Communication of "Internal Control Policy V1.2"
溝通
which was revised and approved by the board of
經董事會修訂並批准
directors on November 19th, 2020, it states
於 2020 年 11 月 19 日,文件中指出
financial, operating and compliance information is
財務、營運和合規信息
intact, information maintains its integrity, timeliness,
完整,信息保持其完整性,及時性,
and accessibility, and be provided with unified
和可訪問性,並提供統一
format; internal control system should develop an
格式;內部控制系統應制定一個
effective communication channel.
有效的溝通渠道。
No exceptions noted. 未發現任何例外。
CC2.2
COSO Principle 14: The
COSO 原則 14:該
entity internally 實體內部
communicates
information, including 包括信息
objectives and 目標和
responsibilities for 責任
internal control, 內部控制,
necessary to support the
必要支持
functioning of internal 內部功能的运作
control.
The organization has established the
組織已建立
documentation "Internal Control Policy"
文件“內部控制政策”
which is stated the communication
其中載明了溝通
mechanism of internal control information
內部控制信息機制
and the communication responsibilities of
及與之相關的高級管理層溝通責任
high management level related to the
水平
operation strategies execution.
執行操作策略。
Inspected article 4 "Internal Control System's
審查了《內部控制系統的第 4 條》
Principle" of "Internal Control Policy V1.2" which
“內部控制政策 V1.2”的“原則”。
was revised and approved by the board of directors
經董事會審定通過
on November 19 th, 2020 , it is stated that high level
於 2020 年 11 月 19 日,指出高層管理層負責執行運營
management is responsible for executing operation
管理層負責執行運營
strategies and policies approved by the board of
董事會批准的策略和政策,以制定足夠的程序
directors, to develop a procedure sufficient to
來識別、衡量、監控和控制風險,並
identify, measure, monitor and control risk, and to
致力於
establish appropriate internal control policies and
建立適當的內部控制政策並
monitor it's suitability.
監控其適用性。
Inspected article 7 "Evaluation, Review and Report
檢查第 7 條“評估、審查和報告”
of Internal Control System" of “Internal Control
2020 年 11 月 19 日董事會修訂並批准的“內部控制制度”和“內部控制政策”
Policy" which was revised and approved by the
board of directors on November 19th, 2020, it is
stated that each department are supervised to
指出每個部門都受監督
evaluate performance and review internal control
評估績效並審查內部控制
system carefully. 系統仔細。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Management of
文件“董事會會議管理”
Operation of Board Meeting" which is
操作
stated the mechanism of communicating
陳述了與董事會溝通的機制。
with the Board of Directors.
檢查了《營運管理》第 6 條。
Inspected article 6 of "Management of Operation of
Board Meeting" which was revised and approved by
經董事會於 2005 年 6 月 27 日修訂並批准的"董事會會議"中指出,會議主席維護會議秩序
the board on June 27 th, 2005 , it is stated that the
chairman of the meeting maintains the order of the
meeting and appoint lawyer, accountant or any
與律師、會計師或任何相關人員會面並任命
related personnel to the meeting to answer the
相關人員參加會議以回答董事會的問題或匯報目前
board of directors' questions or to report current
status of the company, in order to assist the board
公司的狀況,以協助董事會
of directors to understand the company operation
了解公司的運作
situation to make appropriate decisions.
情況,以做出適當的決策。
Inspected a selection of meetings minutes, the
審查了一些會議記錄,董事會會議已召開
meeting of the board of directors were held
董事會會議已召開
regularly.
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Labor Complaint
文件 "勞資爭議法規" 中規定了內部溝通方式。
Regulations" which is stated the internal
規定了內部溝通方式。
communication way.
Inspected the "Labor Complaint Regulations V3.2",
審查了《勞資申訴規定 V3.2》,
it specifies the personnel, scope, methods, and
規定了工人可以上訴的機構、範圍、方法和
procedures of the agency that workers can appeal.
程序。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentations “Internal Control Policy"
文件“內部控制政策”
which is stated the responsibility of high
負責高级
level management and the annually
層級管理和每年
department objective will be announced
部門目標將被宣布
on Announcement Board. 在公告板上。
Inspected article 4 "Internal Control System" of
審查了《內部控制制度》第 4 條
"Internal Control Policy", it is stated that high level
“內部控制政策”,指出高層管理層負責執行
management are responsible for executing
operation strategies and policies approved by the
董事會批准的營運策略和政策,以制定足夠的程序
board of directors, to develop a procedure sufficient
來識別、衡量、監控和控制風險
to identify, measure, monitor and control risk and
,並且
establish appropriate internal control policies and
建立適當的內部控制政策並
monitor its suitability.
監測其適用性。
Inspected the company's "2022-year company
檢查了公司的“2022 年公司
target", it has been announced to the
目標”,已宣布至
Announcement Board 公告牌
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentations "Internal Control Policy"
文件 "內部控制政策"
which is stated that internal control
其中提到內部控制
system needs to identify and
系統需要識別並
continuously evaluate possible risk that
持續評估可能的風險,這可能
cause negative affect when achieving
在實現時造成負面影響
objective and decide how to react to limit
確定目標並決定如何對限制做出反應
it in acceptable level and "Working Rules
將其控制在可接受的水平並「工作規則
for Risk Evaluation Management", it
用於風險評估管理」中,這是
states that the performance for risk
指出風險績效
management plan or objective in each
管理計劃或目標在每個部門定期報告
department is reported periodically for
communication, discussion and
溝通、討論和
improvement in article 15.
在第 15 條中的改進。
Inspected the record of staff transfer, the job change
檢查了員工調動、工作變更的記錄
announcement will be released by official letter.
官方信函將發布公告。
No exceptions noted. 未發現任何例外。
CC2.3
COSO Principle 15: The
COSO 原則 15:該
entity communicates with
實體與溝通
external parties regarding
有關外部方面
matters affecting the 影響
functioning of internal 內部功能的运作
control.
The organization uses official document
組織使用官方文件
as main way for Internal and external
作為內部和外部主要方式
communication and has established
通訊,並建立了
"Working Guidelines for Offficial
官方工作指南
Documents" which is stated related
"文件"中所述的相关
management mechanism. 管理機制。
Inquired of the representative of Information
詢問信息代表。
Security Department, the company's communication
公司的通訊安全部門
channel from inside to outside would be official
從內部到外部的通道將是正式的
document.
Inspected the "Working Guidelines for Official
審查了「官方工作指南」
Documents" which was revised and approved by the
根據 2019 年 9 月 16 日首席執行官修訂並批准的"文件",其中指出為了澄清和規範
chief executive officer on September 16th, 2019, it
states that in order to clarify and standardize the
company's official document processing operations,
公司的官方文件處理操作,
so as to effectively control the process of
以有效控制
undertaking/conference office documents, and
承辦/會議辦公室文件,和
improve work efficiency, this Working Guidelines is
提高工作效率,這份工作指南是
specifically formulated.
專門制定的。
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
"Evaluation, Review and Report of
"評估、審查和報告
Internal Control System" which was
由董事會於 2016 年 5 月{{0}}日修訂並批准的"內部控制系統"中記載
revised and approved by the board of
directors on May 2016, it is stated
that each department should be
每個部門都應該受監督以評估績效並
supervised to evaluate performance and
仔細審查內部控制系統。
review internal control system carefully.
每個部門都應該受監督以評估績效並
Internal Control SSystem Statement was
內部控制系統聲明已由董事會主席、首席執行官、首席審計師簽署
signed by Chief Director of the Board,
簽署者為董事會主席
Chief Executive Officer, Lead Auditor and
首席執行官、首席審計師
Manager of Regulatory Compliance and
法規合規經理
approved by the Board of Directors.
經董事會批准。
Inspected a selection of meeting minutes, the
審查了一些會議記錄,
meeting of the board of directors were held
董事會會議已召開
regularly.
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
"Notification and Handling Guidelines for
異常事件通知和處理指南
Abnormal Incidents" for abnormal
用於異常事件報告和使用官方
incident reporting and using official
通知和處理指南
document as main way for Internal and
文件作為內部和主要溝通方式。
external communication. 外部溝通。
Inquired of the representative of Information
詢問信息代表。
Security Department, the company's main
公司的主要安全部門
communication channel would be official document.
溝通渠道將是官方文件。
Others are handled in compliance with laws and
其他事項將按照法律處理。
regulations. For example, the Information Security
例如,信息安全管理法報告有關安全事件的信息
Management Law reports information about security
通報和
incidents in accordance with" Notification and
規定。
Handling Guidelines for Abnormal Incidents(V13)".
異常事件處理指南(V13)"。
Inspected article 5 Incident Notification of the
檢查第 5 條事件通知的文章
"Notification and Handling Guidelines for Abnormal
"異常通知和處理指南
Incidents(V13)" which was revised and approved by
經修訂並獲得批准的事件(V13)"
the chief executive officer on December 7th, 2022,
the contact person and procedure when incident
聯絡人和事件發生時的程序已列明,還有其他對策。
occurs are stated, and also other countermeasures.
發生時已列明,還有其他對策。
No exceptions noted. 未發現任何例外。
Risk Assessment 風險評估
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC3.1
COSO Principle 6: The
COSO 原則 6:實體
entity specifies objectives
明確指定目標
with sufficient clarity to
具有足夠的清晰度以
enable the identification
啟用風險識別
and assessment of risks
和風險評估
relating to objectives. 關於目標的相關性。
The organization has established
本組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated the
評估風險"中所述的
Risk assessment mechanism, the related
風險評估機制,相關
result be reported to management review
結果應報告給管理層審查
meeting and the calculation of risk value.
會議和風險值的計算。
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment", The article 1 Purpose, how to execute
目的。
risk assessment, in order to confirm the risk level of
風險評估,以確認風險水平
information asset is stated. An acceptable risk level
資訊資產被說明。可接受的風險水平
for corresponding control mechanism is decided
對應的控制機制被決定
according to the result of risk assessment as a basis
根據風險評估結果作為基礎
for selection control mechanism; The article 2
進行選擇控制機制; 第 2 條
Scope, it is stated that to promote and plan the
範圍,指出促進和規劃
range of risk assessment, all departments follow the
風險評估範圍,所有部門遵循
procedure plans made during Management Review
管理審查期間制定的程序計劃
Meeting, execute risk assessment and report any
會議,執行風險評估並報告任何
change of risk; The article 5.5 Calculation of Risk
風險變化;第 5.5 條風險計算
Value, it is stated that through information asset's
值,指出通過信息資產的
risk assessment model, and taking asset value,
風險評估模型,並考慮資產價值,
vulnerability, threats and all other factors into
漏洞、威脅和所有其他因素
consideration, risk level can be quantized as a basis
考慮到,風險水平可以量化為基礎
for selection control mechanism; The article 5.7
用於選擇控制機制; 第 5.7 條
Identify and Implement Safety Control
識別和實施安全控制
and "Regulations for Risk Management", were
以及“風險管理規定”,被確立為風險管理和
established as a basis for risk management and
執行的基礎,以加強公司的風險
execution, in order to reinforce the company's risk
管理
management mechanism for sustainable
可持續管理機制
development.
The latest version of the "Working Guidelines for
《工作指南》的最新版本
Risk Assessment" was revised and approved by the
「風險評估」已經修訂並獲得批准
chief executive officer on Januarv 12 th, 2018.
2018 年 1 月 12 日上任的首席执行官。
The organization has established
本組織已建立
documentation "Accounting System"
文件“会计系统”
which is stated the applicable accounting
其中规定了适用的会计
standards.
Inspected the "Accounting System", it is stated that
審查了“會計系統”,指出
the accounting system could produce financial
會計系統可以製作能夠公正表達財務狀況的財務報告
report that can fairly express the financial condition
會計系統可以製作能夠公正表達財務狀況
and operation result, providing the management
並且操作結果,提供管理
analysis and explanation for decision making. The
分析和解釋以做出決策。這個
latest version of the "Accounting System" was
"會計系統"的最新版本是
revised and approved by the board of directors on
經董事會於
November 17th, 2022. 2022 年 11 月 17 日修訂並批准。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established
本組織已建立
documentation "Regulations for Risk
風險管理規定"文件。
Management" which is stated the
被規定為“管理”的
materiality consideration of management
管理的實質性考量
level.
Inspected the "Regulations for Risk Management"
審查了《風險管理規定》
article 4.3, it is stated that the company executes
根據第 4.3 條,公司執行
risk management and reports to the board
風險管理並向董事會匯報
periodically. When cross-bank operation, financial
定期進行。在跨行業務運作時,財務
disaster or legal problem occurs, immediate
當災害或法律問題發生時,應立即採取行動,評估可能的損失
response shall be taken, evaluate the possible loss
作好準備並向董事會匯報。
for preparation and report to the board of directors.
當災害或法律問題發生時,應立即採取行動,評估可能的損失。
The latest version of the "Regulations for Risk
《風險管理規定》的最新版本已於 2017 年 5 月 18 日經董事會修訂並批准。
Management" was revised and approved by the
board of directors on May 18th, 2017.
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
documentation "Company Act" which is
記錄了《公司法》規定的與業務相關的報告
stated that the business-related reports
需要向股東報告
need to be reported to shareholders
meeting.
Inquired of the representative of accounting
向會計代表詢問
department, according to the "Company Act" article
部門,根據《公司法》第
20 , at the end of every fiscal year, the company
20 條,每個財政年度結束時,公司
submits operation report, financial statement and
提交營運報告、財務報表和
earning's distribution or loss to the regular
盈利分配或虧損給定期
shareholders meeting to be admitted. Inspected the
股東大會審核。檢查
agenda of shareholders meeting, the above issues
股東會議議程,上述問題
are reported. 已報告。
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
documentation "Regulations for
"最低標準行為規範"文件
Regulatory Compliance" for external laws
外部法律的「法規合規性」
and regulations compliance.
和法規合規性。
Inspected the "Regulations for Regulatory
審查了《監管合規法規》第 4 條監管合規系統,指出公司應當
Compliance" article 4 Regulatory Compliance
System, it is stated that the company should
properly plan, manage and execute relative
妥善計劃、管理和執行相關
regulations and with precautions. When illegal
法規並採取預防措施。當發現違法
conditions were identified, corrections are required.
情況時,需要進行更正。
The regulatory compliance system is independent
監管合規系統是獨立的
with sufficient consultation and responsibility. The
充分諮詢和負責的情況下。
latest version of the "Regulations for Regulatory
“監管合規規定”的最新版本已經修訂並獲得批准。
Compliance" was revised and approved by the
最新版本的“監管合規規定”已經修訂並獲得批准。
board of directors on February 9th, 2017.
該組織設定了不同的子部門。
No exceptions noted. 未發現任何例外。
The organization has considered the
組織已考慮到
required level of precision to established
建立所需的精確水平
documentation such as "Working
例如“工作文檔
Guidelines for Homeland Security
國土安全指南
Emergency Notification", "Information
緊急通知”,“信息
Security Policy" and "Personal
安全政策"和"個人
Information Management Handbook".
資訊管理手冊"。
Inspected of the "Working Guidelines for Homeland
國土工作指南"的檢查
Security Emergency Notification", "Information
安全緊急通知", "信息
Security Policy" and "Personal Information
安全政策"和"個人信息
Management Handbook", the company sets down
管理手冊", 公司制定
different policies corresponding to different
針對不同情況採取不同政策
regulations.
Inspected latest version of the "Working Guidelines
檢視了《國土安全緊急通知工作指南》的最新版本
for Homeland Security Emergency Notification" was
revised and approved by the chief executive officer
經首席執行官修訂並批准
on December 13th, 2022; "Information Security
於 2022 年 12 月 13 日;「資訊安全
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Policy" was revised and approved by the board of
政策」經董事會修訂並批准
directors on May 21st, 2020 ; "Personal Information
2020 年 5 月 21 日,董事們;「個人資訊管理手冊」於 2019 年 4 月 1 日經副總裁批准修訂。
Management Handbook" was revised and approved
經副總裁批准修訂的「個人資訊管理手冊」。
by the vice chief executive officer on April 1st, 2019.
2019 年 4 月 1 日,副總裁批准。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established
本組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated the
評估風險"中所述的
Risk assessment mechanism and all
風險評估機制和所有
possible weakness from threat and
可能的威脅和弱點
vulnerability are listed for each
每個資訊資產群組都列出了可能來自威脅和弱點的弱點。
information asset groups.
每個資訊資產群組都列出了可能來自威脅和弱點的弱點。
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment (V4.1)" article 5.8, it is stated that risk
根據《評估(V4.1)》第 5.8 條,風險
value should be reevaluated when control
值應在控制重新評估時重新評估。
procedures or mechanisms are enhanced. Risk
程序或機制得到加強。風險
identification and mitigation is executed repeatedly
辨識和減輕風險是重複執行的
until the risk value is acceptable.
直到風險值可接受。
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated the
評估風險"中所述的
Risk assessment mechanism and the
風險評估機制和相關結果應報告給管理層
related result be reported to management
審查會議。
review meeting. 相關結果應報告給管理層审查会议。
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment" article 2 Scope, it states that the
評估"第 2 條範圍中指出,
promotion unit of each management system plan
预定基于风险评估的范围和时间表
the scope and schedule of risk assessment based
基於實際需求的風險評估範圍和時間表
on practical needs and submit to the management
提交給管理層
review meeting for deliberation.
審查會議進行審議。
The latest version of "Working Guidelines for Risk
Assessment" was revised and approved by the chief
評估"於 2018 年 1 月 12 日由首席執行官修訂並批准。
executive officer on January 12th, 2018.
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated the
評估風險"中所述的
Risk assessment mechanism.
首席執行官於 2018 年 1 月 12 日修訂並批准。
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment" article 5.4 Threat and Vulnerability
來自
Evaluation Analysis, all possible weakness from
來自
threat and vulnerability are listed for each
對每個威脅和弱點進行列出
information asset groups. Evaluate the frequency of
資訊資產群組。評估威脅引起的影響和異常事件的頻率
impacts and abnormal events caused by threats,
並考慮弱點對系統的影響有多大
and consider how difficult it is for the weakness to
be exploited threats and the strength of the control
被利用的威脅和控制的強度
measures.
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment" article 5.8, it is stated that risk value
評估"第 5.8 條款指出風險值
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
should be reevaluated when control procedures or
在控制程序或應重新評估
mechanisms are enhanced. Risk identification and
機制得到增強。風險識別和
mitigation is executed over and over till the risk
風險減輕一再執行,直到風險
value is acceptable. 值可接受。
The latest version of "Working Guidelines for Risk
Assessment" was revised and approved by the chief
評估"於 2018 年 1 月 12 日由首席執行官修訂並批准。
executive officer on January 12th, 2018.
The organization has established
本組織已建立
documentation "Regulations for
"最低標準行為規範"文件
Regulatory Compliance" as minimum
作為法規合規的最低標準
standard of conduct. 標準文件。
Inspected the "Regulations for Regulatory
審查了《監管合規法規》第 4 條監管合規系統,指出公司應當
Compliance" article 4 Regulatory Compliance
System, it is stated that the company should
properly plan, manage and execute relative
妥善計劃、管理和執行相關
regulations and with precautions. When illegal
法規並採取預防措施。當發現違法
conditions were identified, corrections are required.
情況時,需要進行更正。
The regulatory compliance system is independent
監管合規系統是獨立的
with sufficient consultation and responsibility. The
充分諮詢和負責的情況下。
latest version of "Regulations for Regulatory
監管法規的最新版本
Compliance" was revised and approved by the
最新版本的“監管合規規定”已經修訂並獲得批准。
board of directors on February 9th, 2017.
該組織設定了不同的子部門。
No exceptions noted. 未發現任何例外。
The organization has set different sub-
goals annually and announced on
每年目標並在
"Announcement Board". "公告板"上宣布。
Inspected a selection of Summary report on the
檢查了摘要報告的選擇。
achievement of information security objectives, the
達成資訊安全目標,
Measurement results have been collected and
已定期收集和測量結果,
reported regularly and the 2022 Annual
並定期報告 2022 年度
Management System Goals, the KPIs of four
管理系統目標,四個不同管理系統的 KPI 已經通過管理審查會議確認。
different management systems have been
confirmed by the Management Review Meeting.
由管理審查會議確認了四個不同管理系統的 KPI。
Inspected the company's "2022-year company
檢查了公司的“2022 年公司
target", it has been announced to the
目標”,已宣布至
Announcement Board 公告牌
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established
本組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated the
評估風險"中所述的
scope of performing assessment and the
進行評估範圍和
risk assessment based on practical
基於實際風險評估
needs and submit to the management
需求並提交給管理層
review meeting for deliberation.
審查會議進行審議。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment" article 2 Scope, it states that the
評估"第 2 條範圍中指出,
promotion unit of each management system shall
每個管理系統的晉升單位應該
plan the scope and schedule of risk assessment
計劃風險評估的範圍和進度
based on practical needs and submit to the
根據實際需要制定並提交給管理審查會議審議。
management review meeting for deliberation. The
latest version of "Working Guidelines for Risk
「風險評估工作指南」的最新版本於 2018 年 1 月 12 日經首席執行官修訂並批准。
Assessment" was revised and approved by the chief
評估"於 2018 年 1 月 12 日由首席執行官修訂並批准。
executive officer on January 12th, 2018.
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC3.2
COSO Principle 7: The
COSO 原則 7:實體識別風險以達到其
entity identifies risks to
目標的
the achievement of its
成就
objectives across the 跨越目標
entity and analyzes risks
實體並分析風險
as a basis for
作為基礎為
determining how the risks
確定風險應該如何
should be managed. 進行管理。
The organization has established
本組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated that all
風險評估"指出所有
possible weakness from threat and
可能的威脅和弱點
vulnerability are listed for each
每個資訊資產群組都列出了可能來自威脅和弱點的弱點。
information asset groups.
每個資訊資產群組都列出了可能來自威脅和弱點的弱點。
"Inspected the "Working Guidelines for Risk
審查了《風險評估工作指南》第 5.4 條的威脅和弱點評估分析,所有可能的弱點
Assessment (V4.1)" article 5.4 Threat and
脆弱性評估分析,所有可能的
Vulnerability Evaluation Analysis, all possible
weakness from threat and vulnerability are listed for
從威脅和弱點列出
each information asset groups. Evaluate the
每個資訊資產組的評估
frequency of impacts and abnormal events caused
影響和異常事件的頻率引起
by threats and consider how difficult it is for the
通過威脅並考慮對於弱點被利用的困難程度
weakness to be exploited threats and the strength of
威脅的利用和控制措施的強度
the control measures, also evaluate the impact from
也評估來自
threat, frequency of abnormal event and the
威脅、異常事件頻率和
difficulty of using the vulnerability to decide the
使用漏洞的困難程度來決定
strength of control. 控制力量。
Inspected the record of information asset inventory,
審查了資訊資產清單的記錄,
the inventory is conducted regularly and be reported
定期進行清點並報告清點結果,
on the management review meeting. "
在管理審查會議上報告。
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated the
評估風險"中所述的
identified risk are analyzed through
通過分析識別的風險
process that included estimating the
過程中包括估計
potential significance of the risk.
風險的潛在重要性。
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment (V4.1)" article 5.3 Evaluation of
評估(V4.1)"第 5.3 條 資訊資產群組的評估中指出,當
Information Asset Groups, it is stated that when
分配價值給資訊資產時,對
assigning value to information assets, the impact to
資訊資產的影響要考慮在內
Confidentiality, Integrity and Availability when being
當機密性、完整性和可用性受到破壞、損壞或濫用時,將被考慮。
destroyed, damage or abused are considered.
風險應對機制。
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated the
評估風險"中所述的
mechanism of risk response.
風險應對機制。
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment (V4.1)" article 5.7 Identify and
評估(V4.1)"第 5.7 條確定和
Implement Safety Control and "Regulations for Risk
實施安全控制和"風險管理法規
Management", were established as a basis for risk
",作為風險管理的基礎。
management and execution, in order to reinforce
管理和執行,以加強
the company's risk management mechanism for
公司的風險管理機制,以
sustainable development.
促進可持續發展。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established
本組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated all
《風險評估》中列出了所有可能的威脅和弱點
possible weakness from threat and
可能的威脅和弱點
vulnerability are listed for each
每個資訊資產群組都列出了可能來自威脅和弱點的弱點。
information asset groups. Also, the
資訊資產群組。此外,組織已識別並
organization has identified and
分類了信息資產。
categorized the information assets.
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment (V4.1)" article 5.2 Information Asset
評估(V4.1)"第 5.2 條資訊資產
Groups, it is stated that information assets should
群組中指出,資訊資產應該
be categorized into different groups, software,
分類為不同的群組,軟體,
hardware, documents (papers and data) and
硬件、文件(文件和数据)和
human, updated and reviewed periodically and
人员,定期更新和审查,并
confirmed by all units.
經所有單位確認。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC3.3
COSO Principle 8: The
COSO 原則 8:實體考慮
entity considers the 
potential for fraud in
詐欺的潛在可能性
assessing risks to the
評估風險
achievement of 實現
objectives.
The organization has established
本組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated that all
風險評估"指出所有
possible weakness from threat and
可能的威脅和弱點
vulnerability are listed for each
每個資訊資產群組都列出了可能來自威脅和弱點的弱點。
information asset groups.
每個資訊資產群組都列出了可能來自威脅和弱點的弱點。
"Inspected the "Working Guidelines for Risk
審查了《風險評估工作指南》第 5.4 條的威脅和弱點評估分析,所有可能的弱點
Assessment" article 5.4 Threat and Vulnerability
來自
Evaluation Analysis, all possible weakness from
來自
threat and vulnerability are listed for each
對每個威脅和弱點進行列出
information asset groups. Evaluate the frequency of
資訊資產群組。評估威脅引起的影響和異常事件的頻率
impacts and abnormal events caused by threats and
,並考慮弱點被利用的難度
consider how difficult it is for the weakness to be
exploited threats and the strength of the control
利用威脅和控制的力量
measures.
The department who is in charge of each
負責每個部門的人员
management system shall plan the scope and
管理系統應根據實際需求計劃風險評估操作的範圍和時間表並提交給管理者。
schedule of risk assessment operations according
管理系統應根據實際需要計劃風險評估操作的範圍和時間表,並將其提交給管理者。
to actual needs and submit them to the
管理系統應根據實際需要計劃風險評估操作的範圍和時間表,並將其提交給管理者
management review meeting for deliberation.
審議管理審查會議。
Inspected the record, the risk assessment was
檢查記錄,風險評估已完成。
completed on June 30 th, 2022 and the risk
於 2022 年 6 月 30 日完成風險评估。
assessment results were deliberated by the
評估結果已在 Webex 上於六月的管理審查會議上討論
management review meeting on Webex on June
風險工作指南的最新版本
30th, 2022.
The latest version of "Working Guidelines for Risk
Assessment" was revised and approved by the chief
評估"於 2018 年 1 月 12 日由首席執行官修訂並批准。
executive officer on January 12 th, 2018."
執行官。
No exceptions noted. 未發現任何例外。
CC3.4
COSO Principle 9: The
COSO 原則 9:
entity identifies and 實體識別並
assesses changes that 評估可能對
could significantly impact
產生重大影響的
the system of internal
內部系統
control.
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated that all
風險評估"指出所有
possible weakness from threat and
可能的威脅和弱點
vulnerability are listed for each
每個資訊資產群組都列出了可能來自威脅和弱點的弱點。
information asset groups, the risk
資訊資產群組中,風險
identification process considers changes
識別過程考慮變更
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment" article 5.4 Threat and Vulnerability
來自
Evaluation Analysis, all possible weakness from
來自
threat and vulnerability are listed for each
對每個威脅和弱點進行列出
information asset groups. Evaluate the frequency of
資訊資產群組。評估威脅引起的影響和異常事件的頻率
impacts and abnormal events caused by threats and
,並考慮弱點被利用的難度
consider how difficult it is for the weakness to be
No exceptions noted. 未發現任何例外。
Confidential 機密
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
arising from changes in the systems and
來自系統變更
in vendor and business partner
在供應商和商業夥伴中
relationships.
exploited threats and the strength of the control
利用威脅和控制的力量
measures. The latest version of "Working
措施。《風險評估工作指引》的最新版本已於 1 月獲首席執行官審定並通過。
Guidelines for Risk Assessment" was revised and
approved by the chief executive officer on January
12th, 2018.
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which is stated the
評估風險"中所述的
promotion unit of each management
每個管理推廣單位
system plans the scope and schedule of
系統規劃範圍和時間表
risk assessment based on practical
基於實際風險評估
needs and submit to the management
需求並提交給管理層
review meeting for deliberation.
審查會議進行審議。
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment" article 2 Scope, it states that the
評估"第 2 條範圍中指出,
promotion unit of each management system plans
每個管理系統計劃的促銷單位
the scope and schedule of risk assessment based
基於實際需求的風險評估範圍和時間表
on practical needs and submit to the management
提交給管理層
review meeting for deliberation. The latest version of
審議會議。最新版本的
"Working Guidelines for Risk Assessment" was
《風險評估工作指引》已經
revised and approved by the chief executive officer
經首席執行官修訂並批准
on January 12th, 2018.
在 2018 年 1 月 12 日。
No exceptions noted. 未發現任何例外。

Monitoring Activities 監控活動

Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
by the vice chief executive officer on December
由副首席执行官于 2021 年 12 月
28 th, 2021 , it states that the monitoring mechanism
28 日,指出监控机制
includes the availability of network security
包括網絡安全的可用性
equipment, capacity performance, and various
設備、容量性能和各種
information security abnormal events.
信息安全異常事件。
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which states that what
"風險評估"指出了應將哪些資訊資產進行分類,
information assets should be categorized,
以及"網路安全管理"
and "Network Security Management
Operation Manual" which states what
"操作手冊"說明應收集、評估和通知的資訊。
information should be collected,
資訊應收集,
evaluated, and notified.
評估和通知。
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment" article 5.2 Information Asset Groups, it
根據《評估》第 5.2 條「信息資產組」,指出信息資產應該被歸類為不同的組別,軟體,
is stated that information assets should be
說明了信息資產應該被歸類為不同的組別,軟體,
categorized into different groups, software,
說明了信息資產應該被歸類為不同的組別,軟體,
hardware, documents (papers and data) and
硬件、文件(文件和数据)和
human, updated and reviewed periodically and
人员,定期更新和审查,并
confirmed by all units. The latest version of
得到所有部門的確認。最新版本為
"Working Guidelines for Risk Assessment" it was
"風險評估工作指南"已於 2018 年 1 月 12 日經首席執行官修訂並批准。
revised and approved by the chief executive officer
經首席執行官修訂並批准
on January 12th, 2018 .
Inspected the "Network Security Management
審查了由副首席執行官於 7 月 20 日修訂並批准的“網絡安全管理操作手冊”
Operation Manual" which was revised and approved
by the vice chief executive officer on July 20th,
2022, it states that for security weaknesses,
2022 年,它指出對於安全弱點,
relevant information should be collected, the scope
應收集相關信息,評估影響的範圍
and severity of the impact should be evaluated, and
和嚴重性,並
relevant units should be notified to complete the
應通知相關單位及時完成
update and correction operations in a timely
更新和更正操作
manner. For example, the level of medium, high,
例如,中、高级
and major risk weaknesses should be completed
並且主要風險弱點應該在 6 個月內完成。
within 6 months. For those who cannot complete the
對於無法在時限內完成弱點修正的人(例如:
weakness correction within the time limit (such as:
the correction cannot be made, the manufacturer
不能進行更正,製造商
does not provide security updates, etc.), the
不提供安全更新等),系統設備的管理應填寫
management of the system equipment should fill in
the "Information Security Exception Management
"信息安全例外管理申請表",應提交陳述理由或補償措施
Application Form", stating the reason or
compensation measures should be submitted to the
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which states whenever
"風險評估"指出每當
risk assessment should be executed.
應執行風險評估。
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment V4.1", it stated that risk assessment
在"評估 V4.1"中,指出風險評估
should be executed at least twice a year, and all
應至少每年執行兩次,並要求所有
services and business activities within management
管理範圍內的所有服務和業務活動
system audit scopes are required to cooperate.
系統審計範圍必須合作。
Computer hosts and network equipment that use
使用 TCP/IP 協議的計算機主機和網絡設備執行安全漏洞評估
the TCP/IP protocol perform security vulnerability
每個網絡上的主機和設備
assessments: host and equipment on each network
執行安全漏洞評估
segment are assessed for security weaknesses
段落會被評估是否存在安全弱點
quarterly; websites that provide Internet services to
每季一次;提供互聯網服務給外部世界的網站
the outside world are subject to external penetration
可能受到外部滲透的影響
twice a year test and conduct four DDoS drills on
每年兩次測試並在外部電信線路上進行四次 DDoS 演練;
external telecommunications lines; conduct internal
進行內部滲透測試和網站黑盒測試
penetration testing and black box testing of website
進行內部滲透測試和網站黑盒測試
applications for business-related testing websites
適用於商業相關測試網站的應用程式
twice a year, and adjust operating websites
每年兩次,並調整運作中的網站
according to the test and testing results.
根據測試和測試結果進行調整。
If all units need to add or change the system host or
如果所有單位需要新增或更改系統主機或
network equipment or other operations, they can
網路設備或其他操作,他們可以
submit a "requirement sheet", and the network
提交一份“需求表”,並且網路
security management personnel will conduct
安全管理人員將進行
security vulnerability assessment and black box
安全漏洞評估和黑盒
detection of website applications.
網站應用程式的偵測。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Customer Satisfaction Survey
客戶滿意度調查
Management" which is conducted as the
作為公司客戶
base for the company customer
基礎進行的管理"
satisfaction surveys, and individual
定期進行滿意度調查和個人
assessments are performed periodically
評估,以提供客觀反饋。
to provide objective feedback.
Inspected the article 1 of "Working Guidelines for
審查了由首席執行官修訂並批准的“客戶滿意調查管理工作指南”第 1 條款。
Customer Satisfaction Survey Management" which
審查了由首席執行官修訂並批准的“客戶滿意調查管理工作指南”第 1 條款。
was revised and approved by the chief executive
審查了由首席執行官修訂並批准的“客戶滿意調查管理工作指南”第 1 條款
officer on April 26 th, 2019 , it is conducted as the
於 2019 年 4 月 26 日進行的官員,作為公司客戶滿意度調查的基礎
base for the company customer satisfaction surveys
為了了解真實的感受和客觀
in order to know the true feelings and objective
意見
evaluations of the customers' services provided by
顧客服務的評估由
the company.
Individual assessments include website security
個別評估包括網站安全性
vulnerability testing, system penetration testing,
弱點測試、系統滲透測試、
DDOS drills, etc., all of which are executed at a
DDoS 攻擊演練等,所有這些都以一定頻率執行。
certain frequency. 特定頻率。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
documentation "Internal Control Policy"
文件“內部控制政策”
which states that each unit should be
每個單位應該
supervised to evaluate performance and
仔細審查內部控制系統。
review internal control system.
審查內部控制系統。
Inspected the article 7 of "Internal Control Policy", it
檢查了《內部控制政策》第 7 條,指出每個單位應該受到監督。
is stated that each unit should be supervised to
evaluate performance and review internal control
評估績效並審查內部控制
system carefully by the chief executive officer.
系統由首席執行官仔細檢查。
Internal Control System Statement was signed by
內部控制系統聲明已由主席簽署
the chairman, the chief executive officer, Lead
主席、首席執行官、领导签署了
Auditor and Manager of Regulatory Compliance and
監察員和合規經理
approved by the board of directors.
獲董事會批准。
Inspected the "Internal Control Policy," it revised
審查了《內部控制政策》,並對其進行了修訂。
and approved and by the board of directors on
並經董事會於 2020 年 11 月 19 日批准;有關「財務資訊內部控制系統宣言」
November 19th, 2020; the "Declaration on the
Internal Control System of Financial Information
Co., Ltd." was approved by the chairman Mr. Lin,
「有限公司」由董事長林先生批准,
the chief executive officer Mr. Huang, Chief Auditor
首席執行官黃先生,首席審計師
Mr. Li and the company law compliance supervisor
李先生和公司法律合規主管
Miss Chen published on the company's official
陳小姐於 2022 年 2 月 24 日在公司官方網站上發表了一篇文章。
website on February 24 th, 2022 .
該文章指出公司應該
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Internal Control Policy"
文件“內部控制政策”
which stated that the company should
monitor the effectiveness of internal
監測內部效能
control.
Inspected the "Internal Control Policy" article 4, it is
檢查了《內部控制政策》第 4 條,其中提到
stated that the company should monitor the
公司應該監測
effectiveness of internal control. If any deficiency is
內部控制的有效性。如果發現任何缺陷,
discovered, report to appropriate level; however, if it
請報告給適當層級;但如果是
is a major lack of internal control, it should be
嚴重的內部控制缺陷,應該
reported to high management level and the board of
向高層管理層和董事會匯報
directors and take corrective measures immediately.
並立即採取糾正措施。
Inspected the "Internal Control Policy" revised and
檢查了修訂後的“內部控制政策”
approved and by the board of directors on
經董事會於 2020 年 11 月 19 日批准;
November 19th, 2020; and the attachment of
並附上
"Declaration on the Internal Control System of
《內部控制制度聲明》
Financial Information Co., Ltd.", there is no issue
財務信息有限公司。", 沒有問題
need to be strengthened.
需要加強。
No exceptions noted. 未發現任何例外。

Control Activities 控制活動

Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment", which establishes a
風險評估", 這建立了一
basis for risk management and
風險管理和的基礎
execution.
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment" article 5.7 Identify and Implement
評估"第 5.7 條識別和實施
Safety Control and "Regulations for Risk
安全控制和"風險管理法規
Management", were established as a basis for risk
",作為風險管理的基礎。
management and execution, in order to reinforce
管理和執行,以加強
the company's risk management mechanism for
公司的風險管理機制,以
sustainable development. The latest version of the
可持續發展。最新版本的
"Working Guidelines for Risk Assessment" was
《風險評估工作指引》已經
revised and approved by the chief executive officer
經首席執行官修訂並批准
on January 12th, 2018.
在 2018 年 1 月 12 日。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC5.1
COSO Principle 10: The
COSO 原則 10:實體選擇並
entity selects and 開發控制活動
develops control activities
that contribute to the
有助於
mitigation of risks to the
減輕風險
achievement of 實現
objectives to acceptable
至可接受的目標
levels.
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment", which lists that all
"風險評估",列出所有
possible weakness from threat and
可能的威脅和弱點
vulnerability.
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment" article 5.4 Threat and Vulnerability
來自
Evaluation Analysis, all possible weakness from
來自
threat and vulnerability are listed for each
對每個威脅和弱點進行列出
information asset groups. Evaluate the frequency of
資訊資產群組。評估威脅引起的影響和異常事件的頻率
impacts and abnormal events caused by threats,
並考慮弱點對系統的影響有多大
and consider how difficult it is for the weakness to
be exploited threats and the strength of the control
被利用的威脅和控制的強度
measures. The latest version of the "Working
措施。"工作的最新版本
Guidelines for Risk Assessment" was revised and
approved by the chief executive officer on January
12 th, 2018.
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which states whenever
"風險評估"指出每當
risk score control measures should be
風險評分控制措施應該是
strengthened or improved, or new control
加強或改進,或採取新的控制
measures should be taken.
應採取措施。
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment" article 5.7 Identification and selection
評估"第 5.7 條識別和選擇
of safety control measures stated that after
安全控制措施的來源指出,在
calculation and evaluation, if the risk score is higher
計算和評估後,如果風險分數較高
than the acceptable level of risk, then existing
超過可接受的風險水平,則現有的
control measures should be strengthened or
應加強或改進控制措施,或應採取新的控制措施。
improved, or new control measures should be
最新版本的「工作指南」
taken. The latest version of the "Working Guidelines
for Risk Assessment" was revised and approved by
「風險評估」已於 2018 年 1 月 12 日由首席執行官修訂並批准。
the chief executive officer on January 12th, 2018.
首席執行官於 2018 年 1 月 12 日批准了「風險評估」。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Risk Assessment" which states that the
「風險評估」指出
promotion unit of each management
每個管理推廣單位
system shall plan the scope and
系統應該規劃風險評估操作的範圍和進度。
schedule of risk assessment operations.
評估操作的範圍和進度。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the "Working Guidelines for Risk
審查了《風險評估工作指引》第 1 條目的,如何執行
Assessment" article 2 Scope, it is stated that the
評估"第 2 條範圍中指出,這是
promotion unit of each management system shall
每個管理系統的晉升單位應該
plan the scope and schedule of risk assessment
計劃風險評估的範圍和進度
operations based on practical needs, and submit
根據實際需求進行操作,並提交
them to the management review meeting for
供管理審查會議審議
deliberation. The latest version of the "Working
。"工作
Guidelines for Risk Assessment" was revised and
approved by the chief executive officer on January
12th, 2018 .
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC5.2
COSO Principle 11: The
COSO 原則 11:實體還選擇並
entity also selects and
制定和發展一般控制
develops general control
activities over technology
技術活動
to support the 以支持
achievement of 實現
objectives.
The organization has established the
組織已建立
documentation "Working Guidelines
文件 "工作指南"
Problems and Needs Management
問題和需求管理
Operation System" which states that
"操作系統"指出
management understands and
管理了解並
determines the dependency and linkage
確定依賴性和聯繫
between business processes, control
業務流程、控制之間的關係
activities, and general controls.
活動和一般控制。
Inspected the "Working Guidelines Problems and
審查了“工作指南問題和
Needs Management Operation System V4.8", the
需求管理操作系統 V4.8”,
chairman of the Review Team shall be assigned by
審查小組主席應由指定
the chief executive officer, while managers from
行政總裁,而經理們來自
Business Division, R&D Division, System Division
商業部門、研發部門、系統部門
and Security Control as the members of the Review
以及安全控制作為審查委員會的成員
Team.
Inspected Question Sheet No. E-B06-2022000015",
檢查問題表編號 E-B06-2022000015
inter-bank host and credit card business connection
銀行間主機和信用卡業務連接
is abnormal
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Working Procedure and
文件 "工作程序和
Control" which states management
"控制"指管理
selects and develops control activities.
選擇並制定控制活動。
Inspected the "Working Procedure and Control", it
檢查了"工作程序和控制",這表明
has listed all information regarding working process,
已列出有關工作流程、風險和控制的所有信息。
risk and control. 風險和控制。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
documentation "Working Procedure and
文件 "工作程序和
Control" which lists that process and
"控制"列出了該流程和
controls regarding access control, and
有關存取控制的控制,
"Management Department Operation
"管理部門操作
Process and Control" which states that
"流程和控制",其中指出
how to manage control operations.
如何管理控制操作。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the "Working Procedure and Control", it
檢查了"工作程序和控制",這表明
has listed all process and controls regarding access
已列出所有有關存取的流程和控制
control.
Inspected "Management Department Operation
檢查了"管理部門運作
Process and Control" was revised and approved by
流程和控制"已經修訂並獲得批准
the department supervisor on December ,
年 12 月的部門主管,
and it has been stated that how to manage control
並且已經說明如何進行管理控制
operations.
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC5.3
COSO Principle 12: The
COSO 原則 12:
entity deploys control 實體通過控制部署
activities through policies
通過政策進行活動
that establish what is
以確立什麼是
expected and in 預期和在
procedures that put 將程序放入的程序
policies into action. 實施政策。
The organization has established the
組織已建立
documentation "Internal Control Policy"
文件“內部控制政策”
which states what control activities are
陳述了控制活動是什麼
matters, and "Rules for Rulemaking"
問題,以及「制定規則的規則」
which unify the formulation (fixing),
用於統一制定(修正)
amendment and abolition of the
修訂和廢除
company's rules and regulations, and to
公司的規章制度,並
clearly delineate their powers and
明確劃分他們的權力和
responsibilities.
Inspected the "Internal Control Policy" article 4
審查了《內部控制政策》第 4 條
Internal Control System, it is stated that control
內部控制系統中指出控制
activities are within daily operating matters, and
活動屬於日常營運事項,並
mature control structure and internal control
成熟的控制結構和內部控制
procedure should be established to each level.
應該為每個層級建立程序。
Internal control system should delegate proper
內部控制系統應該委派適當的
responsibilities while management level should not
管理層不應該有衝突的責任。
have conflicting responsibilities. The latest version
“內部控制政策”的最新版本已經修訂。
of "Internal Control Policy" was revised and
責任,管理層不應該有衝突的責任。最新版本
approved by the board of directors on November
董事會於 200 年 11 月 19 日批准
19th, 2020.
"Rules for Rulemaking V3" is to unify the formulation
"制定规则的规则 V3" 是为了统一公司规章制度的制定
(fixing), amendment and abolition of the company's
(修订)、修改和废止,并清晰界定其
rules and regulations, and to clearly delineate their
规则和条例
powers and responsibilities. The ranks and
權力和責任。等級和
principles of the regulations are as follows:
規定的原則如下:
1. The first level: rules approved by the
1. 第一級:經由批准的規則
shareholders meeting, the board of directors or
股東大會、董事會或
chairman of the board.
董事會主席。
2. The second level: rules approved by the chief
2. 第二層:由首席批准的規則
executive officer, but rules related to the audit
行政主管,但與審計相關的規則由主席批准。
business are approved by the chairman.
業務由主席批准。
3. The third level: the regulations approved by the
第三級:經董事會批准的規定。
vice chief executive officer, but the regulations
副首席执行官,但审计业务相关规定由总审计批准。
related to the audit business are approved by the
general audit. 一般审计。
4. The fourth level: It is only applicable to the
4. 第四級:僅適用於單位的內部規定,並經部門主管批准。
internal regulations of the unit and is approved by
the department supervisor.
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Inspected the "Rules for Rulemaking" which was
審查了於 2017 年 5 月 18 日制定的“制定規則的規則”。
revised and approved by the board of directors on
經董事會於
May 18th, 2017. 責任清單",其中指出
The organization has established the
組織已建立
Responsibilities List" which states that
each employee should have their work
每位員工應該在合同中寫明他們的工作
responsibilities written in contract.
責任。
Roles are split into seven levels with proper
角色分為七個級別,具有適當的
responsibilities in "Proper Levels & Responsibilities
在“適當水平和責任清單”中的責任
List", and has been approved by the board of
,並已獲董事會批准。
directors. And inquired of representative of IS
並詢問了 IS 代表。
Department, each employee has their work
部門,每位員工都有自己的工作
responsibilities and contents written in contract
責任和內容寫在合同中
attachment.
Inspected the "Proper Levels & Responsibilities List"
檢查了“適當水平和責任清單”
which was revised and approved by the board of
經董事會修訂並批准
directors on November 17th, 2022.
2022 年 11 月 17 日的董事
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Notification and Handling
文件“通知和處理異常事件指南”中指出,對於處理异常事件的人员,应当进行
Guidelines for Abnormal Incidents" which
進行的操作包括
lists that every person in charge of
services or system should draw up a plan
服務或系統應制定計劃
corresponding to possible incidents.
以應對可能發生的事件。
Inspected article 5 "Incident Notification" of the
檢查第 5 條“事件通知”
"Notification and Handling Guidelines for Abnormal
"異常通知和處理指南
Incidents" which was revised and approved by the
《事件》已於 2022 年 12 月 7 日由首席執行官修訂並批准,其中列明每位負責服務或
chief executive officer on December 7th, 2022, it is
服務的負責人員應
listed that every person in charge of services or
system should draw up a plan corresponding to
系統應該制定與之相應的計劃
possible incidents, to respond and process
針對可能發生的事件,進行回應和處理
immediately when incident occurs.
當事件發生時應立即處理。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Notification and Handling
文件“通知和處理異常事件指南”中指出,對於處理异常事件的人员,应当进行
Guidelines for Abnormal Incidents" which
進行的操作包括
states that what the person who is
進行的操作包括
handling incidents should follow common
處理事件應遵循常見
principles of this guidelines and should
本指南的原則,並應
consider.
Inspected article 5 "Incident Notification" of the
檢查第 5 條“事件通知”
"Notification and Handling Guidelines for Abnormal
"異常通知和處理指南
Incidents" which was revised and approved by the
《事件》已於 2022 年 12 月 7 日由首席執行官修訂並批准,其中列明每位負責服務或
chief executive officer on December 7th, 2022, it is
服務的負責人員應
stated that the person who is handling incidents
should follow common principles of this guidelines
應遵循本指南的共同原則
and should consider the nature of the incident and
並應考慮事件的性質和
the type of operation, and relevant matters should
操作類型,以及相關事項應
be handled in accordance with the corresponding
應根據相應的進行處理
regulations.
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
documentation "Work Rules" which
文件《工作規則》
facilitates internal personnel to perform
有助於內部人員執行
control activities in positions that meet
在符合其能力的職位上控制活動。
their abilities. 他們的能力。
Inquired of the representative of IS Department,
向 IS 部門代表詢問,
company has a job adjustment system in article 17
公司在第 17 條的《工作規則》中設有工作調整制度,以便內部人員在符合其職位的情況下進行控制活動。
of the "Work Rules" to facilitate internal personnel to
perform control activities in positions that meet their
使其能夠在符合其職位的情況下進行控制活動
abilities; and in accordance with the "Personnel
能力;並根據人事評審委員會規定進行人員
Review Committee Regulations" for personnel
評估、晉升、獎勵和懲罰
assessment, promotion, rewards and punishments
評估、晉升、獎勵和懲罰
and other matters. 及其他事項。
Inspected the "Work Rules" which was revised and
審查了經首席執行官於四月審定的《工作規則》。
approved by the chief executive officer on April
並核准了由首席執行官於四月審定的《工作規則》。
12 th, 2022 and "Personnel Evaluation Committee
2022 年 12 月和“人事評估委員會
Procedure" which was signed and revised by the
程序”,該程序於 2021 年 8 月 4 日由主席簽署和修訂。
chairman on August 4th, 2021.
Inspected selections of announcements and
根據公司的規定處理了公告和人事信函的選擇
personnel letters for the changes of deputy were
關於副手變動的人事信函進行了審查
processed in accordance with the company"s
根據公司的規定進行了處理
requirements or procedures.
評估、應用和變更。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Internal Control Policy"
文件“內部控制政策”
which states that the company should
公司應當
established internal control audit system,
建立內部控制審計制度,
self-audit system, and regulatory
自我審核系統和監管
compliance and risk management
遵循和風險管理
mechanism.
Inspected the "Internal Control Policy" article 6 , it is
檢查了《內部控制政策》第 6 條,這是
stated that the company should established internal
指出公司應建立內部
control audit system, self-audit system, and
控制審計系統、自我審計系統和
regulatory compliance and risk management
監管遵循和風險管理
mechanism in order to maintain the operating of
為了維持
internal control system. Regular review meetings
內部控制系統的運作,定期舉行審查會議
are also held to review the assessment results. The
以審查評估結果。
latest version of the "Internal Control Policy" was
「內部控制政策」的最新版本是
revised and approved by the board of directors on
經董事會於
November 19th, 2020. 2020 年 11 月 19 日。
Inspected the meeting minutes of management
審查了管理會議記錄
review meeting minutes on July 8th, 2021, results of
審查 2021 年 7 月 8 日的會議紀要,結果
risk assessment of ISMS, PIMS, and QMS were
ISMS、PIMS 和 QMS 的風險評估
determined.
No exceptions noted. 未發現任何例外。

Logical and Physical Access Controls
邏輯和物理訪問控制

Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
documentation "Guidelines for
文件「指南」
Categorizing and Controlling Information
分類和控制信息
Asset" which states how assets match
資產" 說明資產如何匹配
the definition of information assets.
資訊資產的定義。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the "Guidelines for Categorizing and
審查了《信息資產分類和控制指南》第 2 條範圍,指出符合信息定義的資產
Controlling Information Asset" article 2 Scope, it
stated assets that match the definition of information
assets mainly on documents, software, hardware,
資產主要包括文件、軟體、硬體和人力資源。"資訊系統
and human resource. The "Information System
元件清單"由自動工具管理
Component List" is managed by automatic tools
according to each platform. It can correctly reflect
根據每個平台。它可以正確反映
the current information system, including all
目前的信息系統,包括所有
components within the scope of the information
信息範圍內的所有組件
system and relevant tracking reports, so that the
系統和相關的追踪報告,以便
supervisor can understand the required information,
主管可以了解所需的信息,
including hardware specification, software version,
包括硬件規格,軟件版本,
software version, network components or
軟體版本、網路元件或
equipment, machine name and network address.
設備、機器名稱和網路位址。
This information will be updated when the device is
當設備更新時,此資訊將被更新。
installed or moved. Therefore, when the system
安裝或移動。因此,當系統
automatically detects unauthorized components,
自動檢測到未經授權的元件,
such as illegal MAC address of the machine, or
如機器的非法 MAC 地址,或
insufficient protection, such as virus pattern is not
保護不足,例如病毒模式未更新
updated, the established procedures will be
將實施已建立的程序進行保護,例如隔離。
implemented for protection, such as isolation. The
實施保護措施,例如隔離。
latest version of "Guidelines for Categorizing and
"資訊資產分類和控制指南"的最新版本於 2022 年 9 月 15 日由首席執行官簽署。
Controlling Information Asset" was signed by the
"資訊資產分類和控制指南"的最新版本於 2022 年 9 月 15 日由首席執行官簽署。
chief executive officer on September 15th, 2022.
"資訊資產分類和控制指南"的最新版本於 2022 年 9 月 15 日由首席執行官簽署。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC6.1
The entity implements 實體實施
logical access security 邏輯訪問安全
software, infrastructure,
軟體、基礎設施
and architectures over 和架構超過
protected information 保護信息
assets to protect them
資產以保護它們
from security events to
免受安全事件的影響
meet the entity's 遇見實體的
objectives.
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Assess Apply and Change Regarding
評估申請和變更
Financial Operating System" which states
關於財務運作系統",其中指出
that the responsibility of access apply
負責存取申請
and password protection.
和密碼保護。
Inspected the "Working Guidelines for Assess Apply
檢查了《評估申請和變更財務運作指南》
and Change Regarding Financial Operating
有關財務運作的更改。
System" article 6 Account Management and Usage
"系統"第 6 條 帳戶管理和使用
Principle, it is stated that the responsibility of access
原則中指出了訪問的責任
apply and password protection regarding the
申請和密碼保護方面
company's host computer and related equipment.
公司的主機和相關設備。
The latest version of "Working Guidelines for
《工作指南》的最新版本
Assess Apply and Change Regarding Financial
有關財務評估、應用和變更
Operating System" was signed by the chief
"操作系统"由首席执行官于 2022 年 11 月 15 日签署。
executive officer on November 15th, 2022.
"执行总裁于 2022 年 11 月 15 日签署了"操作系统"。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
"The summary is as follows:
"摘要如下:
1. Account types include personal, change, highest
1. 帳戶類型包括個人、變更、最高權限、緊急使用、遠端備份演練使用和程式使用。
authority, emergency use, remote backup drill use
and program use.
2. Assign account manager to resource control
2. 指派帳戶經理來控制資源
group.
3. The account manager shall review the account
3. 帳戶經理應每半年審查帳戶和權限
and authority every half a year, and adjust the
並調整
"'"operating host user authority list"'" and related
"'"操作主機使用者權限清單"'"及相關
account number and authority according to the
帳號和權限根據確認結果。
confirmation results.
4. The account manager shall produce the
4. 帳戶經理應每日製作管理報告並提交給安全控制部門的高級經理。
management report daily and submit it to the senior
管理報告每日提交給安全控制部門的高級經理。
manager of the security control department for
安全控制部門的高級經理。
approval. The management report includes daily
審批。管理報告包括每日
report of violation record and daily report of track
違規記錄報告和每日追踪報告
record.
5. Responsible for managing account addition /
5. 負責管理帳戶新增/
change / deletion, password reset, permission
更改/刪除,重設密碼,權限
change, etc.
6. The account manager shall list and record the
6. 帳戶經理應列出並記錄
password reset cycle of '"'program account
“程式帳戶”的密碼重設週期
number"'", and update it timely when the program
數字“'”,並在程序進行時及時更新
account changes, and submit it to the manager of
帳戶變更時,並每年向單位使用帳戶的經理提交
the account using unit for confirmation every year.
以便確認。
7. For the emergency use of account numbers and
7. 用於主中心和遠程備份中心密碼保險箱中密封的帳號和密碼的緊急使用
passwords sealed in the password safe boxes of the
main center and remote backup center, the account
manager reset the password every year, and put it
管理員每年重設密碼,並在重新密封後放回密碼保險箱中,
back into the password safe box after re sealing,
由機房操作員保管。
which was kept by the machine room operators.
Inspected completed daily management reports to
檢查每日完成的管理報告,以確定管理報告是否
determine that management reports were
根據公司的規定進行處理
processed in accordance with the company's
requirements or procedures.
評估、應用和變更。
Inspected the completed host account permission
檢查完成的主機帳戶權限
application forms to determine that application forms
申請表以確定申請表
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
were processed in accordance with the company's
根據公司的要求或程序進行處理。
requirements or procedures.
評估、應用和變更。
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Assess Apply and Change Regarding
評估申請和變更
Financial Operating System" which states
關於財務運作系統",其中指出
about identifies and authenticates users.
關於識別和驗證用戶。
Inspected the "Working Guidelines for Access Apply
審查了"訪問申請工作指南"
and Change Regarding Financial Operating
有關財務運作的更改。
System" article 6, it is clearly stated that the
系統》第 6 條清楚規定,執行過程和存取活動的
execution process and access activities of the
account will be recorded. The latest version of
帳戶將被記錄。最新版本的
"Working Guidelines for Assess Apply and Change
"評估、應用和更改工作指南
Regarding Financial Operating System" was signed
有關財務運作系統"已簽署
by the vice chief executive officer on November
由副行政總裁於十一月
15th, 2022.
The summary is as follows:
摘要如下:
1. Users can only log in to the operating host in the
1. 用戶只能登錄操作主機
physical control area (such as operation room,
實體控制區域(如操作室、
terminal room, connecting management room,
終端室、連接管理室、
customer service center, etc.), and it is forbidden to
客戶服務中心等),嚴禁
log in from other places.
從其他地方登錄。
2. When logging into the terminal management
2. 登錄到終端管理時
system (the entrance of connecting to the operating
系統(連接到操作
host), the user used the original account number
主機),用戶使用原始帳號號碼
and password, and use the one-time password
和密碼,並使用一次性密碼
provided by the Two-Factor Authentication tool
由雙因素身份驗證工具提供
(token) to conduct two-factor verification.
(令牌) 進行雙因素驗證。
When establishing a connection, the company's
在建立連接時,公司的
network system first identifies the device as a
網絡系統首先將設備識別為
legitimate device, identifies the device with the MAC
合法設備,使用 MAC 地址或網卡的 TCP/IP 地址識別設備,
address or TCP / IP address of the network card,
並使用雙向加密,如 TLS 雙向
and uses two-way encryption, such as TLS two-way
authentication, to identify the device.
認證,用於識別設備。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "FISC Information System
文件“FISC 信息系統
Network Operation Manual" which states
網絡操作手冊”,其中記載
about the network architecture.
關於網絡架構。
Inspected the "FISC Information System Network
檢查了“FISC 信息系統網絡
Operation Manual", the network architecture is
運營手冊”,網絡架構是
divided into Wan and LAN, the latest version of
分為 WAN 和 LAN,最新版本的
"FISC Information System Network Operation
「FISC 信息系統網絡運營
Manual" was signed by the chief executive officer on
手冊」已由首席執行官簽署
August 5th, 2020. 2020 年 8 月 5 日。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The summary is as follows:
摘要如下:
1. WAN connections are separated by different
1. WAN 連接是由不同的分隔。
logical channels of Frame Relay, PPP and TCP / IP
Frame Relay、PPP 和 TCP/IP 的邏輯通道
protocols. The NAT function of the router is
協議。路由器的 NAT 功能
implemented to avoid the leakage of the real IP
被實現以避免真實 IP 的洩露
address of the host, and to avoid the possible
主機的地址,並避免可能的
conflict between the financial terminal and the
金融終端和
participating unit end due to the duplication of IP
參與單位端之間的衝突,因為 IP 的重複
segments. The IP network connection between the
分段。金融終端和參與單位之間的 IP 網絡連接可以通過網絡設備進行加密。
financial terminal and the participating units can be
金融終端和參與單位之間的 IP 網絡連接可以通過網絡設備進行加密。
encrypted through the network equipment.
金融終端和參與單位之間的 IP 網絡連接可以通過網絡設備進行加密。
2. LAN architecture can be divided into OA area
2. LAN 架構可以分為 OA 區域網路
network, Test/R&D area network, business area
網路、測試/研發區域網路、商業區域
network and management area network, all of which
網路和管理區域網路,所有這些
operate independently. The interconnection
獨立運作。不同區域之間的連接要求受到防火牆系統的控制
requirements between different areas are controlled
要求之間的連接要求受到防火牆系統的控制
by the firewall system.
由防火牆系統控制不同區域之間的連接要求
Network hardware equipment (such as routers,
網絡硬件設備(如路由器、
switches, load balancers) or network management
交換機、負載均衡器)或網絡管理
system changes shall be implemented according to
系統變更應根據
the "Management Procedure for Financial
由安全控制部門發布的《金融信息系統變更管理程序 V10》。
Information System's Change V10" issued by the
由安全控制部門發布的《金融信息系統變更管理程序 V10》。
security control department.
由安全控制部門發布的《金融信息系統變更管理程序 V10》。
Inspected the completed change application forms
審查已完成的變更申請表
to determine that application forms were processed
確定申請表已按照公司的要求處理
in accordance with the company's requirements or
或符合公司的要求
procedures.
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Assess Apply and Change Regarding
評估申請和變更
Financial Operating System" which states
關於財務運作系統",其中指出
about the execution process and access
有關執行過程和存取
activities of the account.
帳戶的活動。
Inspected the "Working Guidelines for Assess Apply
檢查了《評估申請和變更財務運作指南》
and Change Regarding Financial Operating
有關財務運作的更改。
System" article 7, it is clearly stated that the
根據《系統》第 7 條,明確規定將記錄帳戶。
execution process and access activities of the
account will be recorded.
該公司的內部主機資源,例如
The company's external access point provides
公司的外部接入點提供
remote work for internal employees. Employees can
內部員工的遠程工作。員工可以
use mobile computer devices to remotely access
使用移動電腦設備遠程訪問
the company's internal host resources, such as
home office; there is no wireless Wi-Fi access type.
在家辦公;沒有無線 Wi-Fi 訪問類型。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The summary is as follows:
摘要如下:
1. Remote work must be approved by the
1. 遠程工作必須經過批准
application and granted access permission during
申請並在期間獲得訪問權限。
the required period of the job; remote work service
工作所需的時間;遠程工作服務
has server-side user authentication authorization
具有伺服器端用戶身份驗證授權
and connection monitoring mechanism, and limit the
和連接監控機制,並限制
access area.
2. Remote work must be connected by dedicated
2. 遠程工作必須通過專用線路或加密協議連接,以確保數據的保密性。
line or encrypted protocol to ensure the
confidentiality of data.
3. Internet users adopted two-factor authentication
3. 網絡用戶採用了雙因素驗證
mechanism, such as user domain account and one
機制,例如用戶域帳戶和一次性密碼(OTP)驗證機制。
time password (OTP) authentication mechanism.
4. Before logging into the intranet, the remote user's
4. 登入內部網路之前,遠端使用者的
computer equipment must pass the connection and
電腦設備必須通過連接和
configuration settings check (e.g. restricted
配置設置檢查(例如受限制
encryption algorithm, operating system, or
加密算法、操作系統或
equipment distributed by the company).
公司分發的設備)。
The latest version of "Working Guidelines for
《工作指南》的最新版本
Assess Apply and Change Regarding Financial
有關財務評估、應用和變更
Operating System" was signed by the vice chief
運作系統"由副主管簽署
executive officer on November 15th, 2022.
"执行总裁于 2022 年 11 月 15 日签署了"操作系统"。
Inspected announcement of HR, relevant
人力資源檢查公告,相關
departments adopted remote work and didn't need
部門採用遠程工作,不需要
to apply for remote use of OA system. Unrelated
申請辦公自動化系統的遠程使用。不相關
departments still need to apply and nobody applied
部門仍需要申請,但沒有人申請
during the examination period.
在考試期間。
The organization has established the
組織已建立
documentation "Network Security
文件 "網絡安全"
Management Operation Manual"" which
管理操作手冊""
specifies the connection access controls.
指定連接訪問控制。
Inspected the "Network Security Management
審查了由副首席執行官於 7 月 20 日修訂並批准的“網絡安全管理操作手冊”
Operation Manual" which was revised and approved
by the vice chief executive officer on July 20 th,
由副總裁於 7 月 20 日。
2022, it specifies the connection access control as
2022 年,它將連接訪問控制指定為
follows:
1. All external (Internet) server hosts (e.g. SMTP
1. 所有外部(互聯網)伺服器主機(例如 SMTP
server, web server, etc.) should be placed in
伺服器、網頁伺服器等)應該放置在
the DMZ. Important database hosts such as
重要的資料庫主機,如
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
transaction details and customer data should
交易詳細資料和客戶資料不應該
not be placed in the DMZ.
放置在 DMZ 中。
2. The external network (Internet) must access the
2. 外部網絡(互聯網)必須通過位於伺服器上的內部主機或數據進行訪問
internal host or data through the server located
3. 禁止設置互聯網連接
in the DMZ.
3. It is forbidden to set the Internet connection
access rules with unlimited source IP and
具有無限來源 IP 和訪問規則
destination IP. 目的地 IP。
4. The principle of "Ieast privilege" is adopted for
4.採用“最小特權”原則
the network connection in the business
在業務運營區域的網絡連接中,使用白名單控制。
operation area, and the whitelist control is used.
未經批准的人將被列入白名單控制。
Those who have not been approved will be
denied. If there is a connection requirement, the
拒絕。如果有連接要求,則源 IP、目標 IP 和服務端口必須逐一指定,應用程序應該
source IP, target IP and service port must be
指定一個
specified one by one, and the application shall
拒絕。如果有連接要求,則源 IP、目標 IP 和服務端口必須逐一指定,應用程序應該
be approved.
5. Proxy system for Internet website access
5. 用於互聯網網站訪問的代理系統
(proxy) manages the company's open access
(代理)管理公司的開放訪問
internet websites and website categories in a
互聯網網站和網站類別
forward tabulation manner. Both personal
正向制表方式。個人
computers and servers should access internet
電腦和伺服器應通過互聯網訪問
websites through Internet website access agent
網站通過互聯網網站訪問代理訪問
system. If there is any special consideration
系統。如果有任何特殊考慮
that requires direct access to external Internet
需要直接訪問外部互聯網
sites, it should be approved by the vice chief
網站,應經副主席批准
executive officer to restrict the opening of
執行官員限制開放
specific source IP, destination IP and Internet
特定來源 IP、目的地 IP 和互聯網
application service ports (such as 80 and 443).
應用服務端口(如 80 和 443)。
The internal host computer connecting to the
連接到互聯網的內部主機計算機應使用域名解析服務(DNS)指向公司的 DNS
Internet using domain name resolution sevice
(DNS) should point to the company's DNS
server.
6. The wireless network protection and detection
6. 無線網絡保護和檢測系統使用白名單來管理
system uses the whitelist to manage the
批准的無線網絡基站和
approved wireless network base stations and
wireless network clients. Wireless network base
無線網絡客戶端。無線網絡基地
station must have user authentication
站必須具有用戶身份驗證
mechanism. Static IP management must be
機制。靜態 IP 管理必須是
adopted to connect the base station. Dynamic
用於連接基站。動態
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Host Configuration Protocol (DHCP) is
主機配置協議(DHCP)是
prohibited for dynamic setting.
禁止用於動態設置。
7. The user interface (UI) of the host equipment in
7. 主機設備在業務操作區域的使用者界面(UI)只能由業務操作中的主機設備存取
the business operation area can only be
accessed by the host in the business operation
存取
area in the way of secure connection (such as:
通過安全連接方式的區域(例如:
HTTPS, SSH). If it is necessary to connect the
HTTPS,SSH)。如果需要連接
business operation area (host computer or
業務運營區域(主機或
equipment) with OA or R & test area (server
設備)與 OA 或 R&測試區域(伺服器
or personal computer) due to operation
或個人電腦)由於操作
requirements such as monitoring or
要求,如監控或
management, the requesting unit shall specify
在管理方面,請求單位應詳細說明
the operation contents, connection
操作內容、連接
requirements and risk control measures, and
要求以及風險控制措施,並
apply for setting after being approved by the
獲得副行政總裁批准後申請設置
vice chief executive officer.
8. The computer equipment carried by the third
8. 第三方攜帶的電腦設備
party shall be regulated and shall not be
派對應受規範,不得連接到公司的區域網絡。
connected to the company's regional network.
9. 如果嵌入式系統設備與
9. If the embedded system equipment with
network connection function (such as digital
網絡連接功能(如數碼相機、電話交換機、傳真機、
camera, telephone exchange, fax machine,
視聽設備、影印機等)是
audio-visual equipment, photocopier, etc.) is
unable to implement the provisions of articles 4-
無法實施《金融機構使用的物聯網設備安全控制規範》第 4-7 條規定
7 of the "code for security control of Internet of
things equipment used by financial institutions"
due to system function limitation, the Internet
由於系統功能限制,因此網際網路
connection capability of embedded system
嵌入式系統的連接能力
equipment with network connection function
具有網路連接功能的設備
shall be limited or access control shall be
應限制或實施存取控制
strengthened.
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Assess Apply and Change Regarding
評估申請和變更
Financial Operating System" which states
關於財務運作系統",其中指出
stated that the requirement, application,
要求、應用程式
and usage record of account user,
以及帳戶使用者的使用記錄
authorization, and administrator, and
授權,管理員,和
"Operating Host User Permissions List"
操作主機使用者權限清單
which states that the operating host
聲明操作主機
permissions according to the user role.
根據使用者角色的權限。
Inspected the "Working Guidelines for Assess Apply
檢查了《評估申請和變更財務運作指南》
and Change Regarding Financial Operating System
有關財務運作系統的變更
V15" article 4, it is stated that the requirement,
根據"V15"第 4 條,規定了要求。
application, and usage record of account user,
申請,以及帳戶使用者的使用記錄,
authorization, and administrator are recorded.
授權和管理員的記錄。
The "Operating Host User Permissions List" gives
“操作主機使用者權限清單”根據使用者角色提供操作主機權限。
the operating host permissions according to the
例如,應用程式維護
user role. For example, the application maintenance
personnel of the FBIS in the "Design Team 1" have
"Design Team 1"的 FBIS 人員
access to the relevant applications and data of the
可以存取相關應用程式和資料
FBIS.
Inspected the operating host user permissions list to
檢查操作主機使用者權限清單,以確定使用者角色是否在清單中定義。
determine that user roles were defined in the list.
確定使用者角色是否在清單中定義。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Guidelines for
文件「指南」
Categorizing and Controlling Information
分類和控制信息
Asset" which states that each level of
"資產",指出每個層級的
information assets' definition and
資訊資產的定義和
corresponding management of control
對應控制的管理
assess, and "Working Guidelines of
評估,以及“存取控制操作指南”規定
Access Control Operation" stipulates
存取控制操作指南規定
"Identification Certificate".
“識別證書”。
Inspected the "Guidelines for Categorizing and
審查了《信息資產分類和控制指南》第 2 條範圍,指出符合信息定義的資產
Controlling Information Asset V5", each level of
"控制信息資產 V5",已經說明了每個層級的
information assets' definition and corresponding
資訊資產的定義和相應的
management of control assess has been stated.
控制評估管理已經被陳述。
The "Working Guidelines of Access Control
"存取控制操作指南 V1" 規定 "識別證書" 是身份證或生物識別證
Operation V1" stipulates that "Identification
Certificate" is an identification card or biometric
feature for identification of personnel entering and
用於識別進入和離開“公司大樓”的人員的功能,可以分為員工卡、服務卡、工作卡,
leaving the "company building", which can be
,這可以
divided into employee card, service card, work card,
,這可以分為員工卡、服務卡、工作卡,
temporary identification card and guest card. During
臨時身份證和客人卡。在工作日的 7:00 至{{0}}期間,
the period from 7:00 to on business days,
需要有權限的人進行雙因素身份驗證。
those with authority need to conduct two-factor
authentication (such as card, password or biometric)
認證(如卡片、密碼或生物特徵)
only through the identification of signs can we pass.
只有通過識別符號才能通過。
If an employee no longer uses the identification card
如果員工不再使用識別卡
due to resignation, suspension of salary or other
由於辭職、停薪或其他因素,他/她應申請身份證和存取控制權限取消
factors, he / she shall apply for the identification
辨識卡和存取控制權限取消
card and access control authority cancellation in
卡和存取控制權限取消
advance.
Inspected the Identification card and access control
檢查身份證和存取控制
authority cancellation applications to determine that
權限取消申請以確定
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
identification card and access control authority
身份證和存取控制權限
cancellation were processed in accordance with the
根據公司的要求或程序處理取消。
company's requirements or procedures.
公司的要求或程序。
Information system identification and authentication
資訊系統識別和驗證
of internal users were processed in accordance with
根據內部用戶進行處理
"Working Guidelines for Assess Apply and Change
"評估、應用和更改工作指南
Regarding Financial Operating System".
有關財務運作系統」。
Inspected the account cancellation applications to
審核帳戶取消申請以
determine that account cancellation was processed
確定帳戶取消已處理
in accordance with the company's requirements or
或符合公司的要求
procedures.
External users in the "'"FBIS - External
外部用戶在"FBIS - 外部
Confirmation"'" include personnel from accounting
確認"中包括會計人員
firms and banks to issue account numbers and chip
公司和銀行發行帳號和晶片卡,並設置自己的固定密碼以實現
cards and set their own fixed passwords to achieve
雙因素驗證。沒有明確的信息
two-factor authentication. No explicit information
(such as unified number, ID card number, mobile
(例如統一編號、身分證號碼、手機號碼、電子郵件帳號、信用卡號碼、存款帳號號碼等)的客戶
phone number, e-mail account number, credit card
電話號碼、電子郵件帳號號碼、信用卡號碼、存款帳號號碼等)的客戶
number, deposit account number, etc.) of customers
(例如統一編號、身分證號碼、手機號碼、電子郵件帳號、信用卡號碼、存款帳號號碼等)的客戶
shall be used for account number promotion. The
應用於帳號推廣。晶片卡的安全模組符合 FIPS {{0}} Level 3 或以上的安全強度。
security module of the chip card meets the safety
晶片卡的安全模組符合 FIPS {{0}} Level 3 或以上的安全強度。
strength of FIPS Level 3 or above. The fixed
固定
password design meets the following requirements:
密碼設計需滿足以下要求:
1. Not less than eight digits.
1. 不少於八位數字。
2. Mixed use of English numerals, including upper-
2. 混合使用英文數字,包括大寫。
and lower-case English letters.
和小寫英文字母。
3. When changing the password, the password
3. 更改密碼時,密碼
should not be the same as the previous three times.
不應與之前三次相同。
4. If it is more than 90 days, the password should be
4. 如果超過 90 天,密碼應該
changed.
Inspected program to determine that account and
檢查程序以確定帳戶和
fixed password design logic were aligned with the
固定密碼設計邏輯與
company's requirements. 公司的需求。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
documentation "Guidelines for
文件「指南」
Categorizing and Controlling Information
分類和控制信息
Asset" which states that each level of
"資產",指出每個層級的
information assets' definition and
資訊資產的定義和
corresponding management of control
對應控制的管理
assess, and the static data to be
評估,以及靜態數據
encrypted and protected by "FBIS -
進行加密並受到"FBIS -"保護
External Confirmation". 外部確認".
Inspected the "Guidelines for Categorizing and
審查了《信息資產分類和控制指南》第 2 條範圍,指出符合信息定義的資產
Controlling Information Asset V5", each level of
"控制信息資產 V5",已經說明了每個層級的
information assets' definition and corresponding
資訊資產的定義和相應的
management of control assess has been stated.
控制評估管理已經被陳述。
The static data to be encrypted and protected by
要加密和保護的靜態數據
"FBIS - External Confirmation" include fixed
「FBIS - 外部確認」包括固定
passwords and certificates of external users, which
外部用戶的密碼和證書,描述如下:
are described as follows:
1. 外部用戶的固定密碼應該
1. The fixed password of external users should be
stored with irreversible operation (such as hash
以不可逆操作(如哈希)存儲
algorithm).
2. Inspected the operation process of financial
2. 檢查金融操作過程
blockchain information external confirmation to
區塊鏈信息外部確認以
synchronize the certificates of participating
同步參與公司的證書
companies, it is in accordance with "'FBIS -
,符合“'FBIS -
External confirmation demand function expansion -
外部確認需求功能擴展 -
External confirmation bank foreground ap2ap
外部確認銀行前景 ap2ap
analysis specification"'" Arc 4.9 batch operation of
分析規範"'" Arc 4.9 批次操作
certificate synchronization information, it is clearly
證書同步信息,這是明顯的
stated that the finance company sends the
聲明財務公司發送
certificate synchronization request API to the RA
證書同步請求 API 給 RA
system (Network) by batch scheduling to obtain the
系統(網絡)通過批量排程獲取
certificate information of the participating units.
參與單位的證書資訊。
Inspected program to determine that fixed password
檢查程序以確定固定密碼
design logic was aligned with the company's
設計邏輯與公司的一致。
requirements or procedures.
評估、應用和變更。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Guidelines for
文件「指南」
Categorizing and Controlling Information
分類和控制信息
Asset" which states that each level of
"資產",指出每個層級的
information assets' definition and
資訊資產的定義和
corresponding management of control
對應控制的管理
assess, and the encryption key to be
評估,並保護加密金鑰
protected by "FBIS - External
由"FBIS - 外部
Confirmation" 確認"保護
Inspected the "Guidelines for Categorizing and
審查了《信息資產分類和控制指南》第 2 條範圍,指出符合信息定義的資產
Controlling Information Asset V5", each level of
"控制信息資產 V5",已經說明了每個層級的
information assets' definition and corresponding
資訊資產的定義和相應的
management of control assess has been stated.
控制評估管理已經被陳述。
The encryption key to be protected by "FBIS -
要由“FBIS -外部確認”保護的加密金鑰僅在“d”和
External Confirmation" only occurs when the "d" and
“會計前端平台”申請時才會發生
"Accounting Front-End Platform" apply for
certificates. The certificate signing request (CSR) is
憑證。憑證簽署請求(CSR)由硬體安全模組(HSM)生成,
produced by the hardware security module (HSM),
並且憑證管理進行
and the certificate management is conducted
according to the "Hashing Operation Manual".
根據"雜湊操作手冊"。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
The latest version of "Hashing Operation Manual"
"雜湊操作手冊"的最新版本
was signed by the vice chief executive officer on
是由副首席執行官簽署的
June 7th, 2021. 2021 年 6 月 7 日。
Inspected the certificates to determine that
檢查證書以確定
certificates were processed in accordance with the
證書是按照
company's requirements or procedures.
公司的要求或程序。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
CC6.2
Prior to issuing system
在發出系統之前
credentials and granting
憑證並授予
system access, the entity
系統存取,實體
registers and authorizes
註冊並授權
new internal and external
新的內部和外部
users whose access is
由實體管理存取權限的使用者。
administered by the 管理
entity. For those users
對於這些使用者
whose access is 其存取權由
administered by the 管理
entity, user system 實體、使用者系統
credentials are removed 憑證已移除
when user access is no
當使用者訪問未經授權時
longer authorized. 不再授權。
The organization has established the
組織已建立
documentation "Guidelines for
文件「指南」
Categorizing and Controlling Information
分類和控制信息
Asset" which states that each level of
"資產",指出每個層級的
information assets' definition and
資訊資產的定義和
corresponding management of control
對應控制的管理
assess, and "Working Guidelines for
評估和“工作指南
Assess Apply and Change Regarding
評估申請和變更
Financial Operating System" which states
關於財務運作系統",其中指出
that controls access credentials to
控制訪問憑證
protected assets. 保護資產。
Inspected the "Guidelines for Categorizing and
審查了《信息資產分類和控制指南》第 2 條範圍,指出符合信息定義的資產
Controlling Information Asset V5", each level of
"控制信息資產 V5",已經說明了每個層級的
information assets' definition and corresponding
資訊資產的定義和相應的
management of control assess has been stated.
控制評估管理已經被陳述。
Inspected the "Working Guidelines for Assess Apply
檢查了《評估申請和變更財務運作指南》
and Change Regarding Financial Operating System
有關財務運作系統的變更
V15" article 5, it is clearly stated that the change,
根據第 15 條第 5 款,明確規定了變更,
deletion, management and monitor of account
刪除,管理和監控帳戶
privilege will be recorded.
權限將被記錄。
Inspected the application form to determine that
審查申請表以確定
application was processed in accordance with the
申請是否按照
company's requirements or procedures.
公司的要求或程序。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Assess Apply and Change Regarding
評估申請和變更
Financial Operating System" which states
關於財務運作系統",其中指出
that removes access to protected assets.
這會移除對受保護資產的存取。
Inspected the "Working Guidelines for Assess Apply
檢查了《評估申請和變更財務運作指南》
and Change Regarding Financial Operating System
有關財務運作系統的變更
V5" article 5 , it is clearly stated that the change,
根據第 5 條,明確規定了更改、
deletion, management and monitor of account
刪除,管理和監控帳戶
privilege will be recorded.
權限將被記錄。
Inspected the application form to determine that
審查申請表以確定
application was processed in accordance with the
申請是否按照
company's requirements or procedures.
公司的要求或程序。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Assess Apply and Change Regarding
評估申請和變更
Financial Operating System" which states
關於財務運作系統",其中指出
that creates or modifies access to
創建或修改對
protected information assets.
受保護的信息資產的訪問權限。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the "Working Guidelines for Assess Apply
檢查了《評估申請和變更財務運作指南》
and Change Regarding Financial Operating System
有關財務運作系統的變更
V5" article 5, it is clearly stated that the change,
根據第 5 條,明確規定了變更、
deletion, management and monitor of account
刪除,管理和監控帳戶
privilege will be recorded.
權限將被記錄。
Inspected the completed application forms to
檢查完成的申請表格
determine that create or modify access was
確定建立或修改訪問權限
processed in accordance with the company's
requirements or procedures.
評估、應用和變更。
Inspected selections of account review record were
審查帳戶審核記錄的選擇
completed and approved by the department
部門完成並批准
supervisor.
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC6.3
The entity authorizes, 實體授權,
modifies, or removes 修改或移除
access to data, software,
根據角色訪問數據、軟件、
functions, and other 功能和其他
protected information 保護信息
assets based on roles,
資產
responsibilities, or the
責任,或
system design and 系統設計和
changes, giving 變更,給予
consideration to the 對最低特權和隔離概念的考慮
concepts of least 最低特權和隔離概念
privilege and segregation
特權和隔離概念
of duties, to meet the
職責,以滿足
entity's objectives. 實體的目標。
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Assess Apply and Change Regarding
評估申請和變更
Financial Operating System" which states
關於財務運作系統",其中指出
that removes access to protected assets,
以移除對受保護資產的訪問,
and "Working Guidelines for
以及《工作指南"
Authorization and Protection of
授權和保護
Information Equipment" which states that
資訊設備" 規定
how long users should change their
用戶應該多久更改其
passwords.
Inspected the "Working Guidelines for Assess Apply
檢查了《評估申請和變更財務運作指南》
and Change Regarding Financial Operating System
有關財務運作系統的變更
V5" article 5, it is clearly stated that the change,
根據第 5 條,明確規定了變更、
deletion, management and monitor of account
刪除,管理和監控帳戶
privilege will be recorded.
權限將被記錄。
According to the "Working Guidelines for
根據《信息授權和保護工作指南》
Authorization and Protection of Information
信息授權和保護
Equipment V3.2", users should change their
在使用「設備 V3.2」時,用戶應該每 90 天至少更改一次密碼。
passwords at least once every 90 days. The
資源控制組應清除
resource control group should clear the accounts of
the operating system and database that have not
未登錄超過 90 天的操作系統和數據庫,以及帳戶
logged in for more than 90 days, and the accounts
在帳戶創建後未登錄的帳戶
that have not logied in after the account has been
added and require users to log in to the system
添加並要求用戶登錄系統
immediately to change their passwords.
立即更改他們的密碼。
Inspected the completed application forms to
檢查完成的申請表格
determine that remove access was processed in
確定已根據公司的要求或文件 "操作主機使用者" 處理了移除訪問權限
accordance with the company's requirements or
使其符合公司的要求或文件
procedures.
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
documentation "Operating Host User
文件"操作主機使用者"
Permissions List" which give the
「權限清單」,根據使用者角色授予
operating host permissions according to
運行主機權限。
the user role. 「權限清單」,根據使用者角色授予。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
The "Operating Host User Permissions List" gives
“操作主機使用者權限清單”根據使用者角色提供操作主機權限。
the operating host permissions according to the
例如,應用程式維護
user role. For example, the application maintenance
personnel of the FBIS in the "Design Team 1" have
"Design Team 1"的 FBIS 人員
access to the relevant applications and data of the
可以存取相關應用程式和資料
FBIS.
Inspected the Operating Host User Permissions List
檢查操作主機使用者權限清單
to determine that Role-based access control is
確定基於角色的存取控制正在使用
utilized to support segregation of incompatible
用於支援不相容的隔離
functions.
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC6.4
The entity restricts 實體限制
physical access to 實體存取至
facilities and protected
設施和受保護的
information assets (for 資訊資產(供
example, data center 範例,數據中心
facilities, back-up media
設施,備份媒體
storage, and other 儲存,以及其他
sensitive locations) to 敏感地點)給
authorized personnel to 授權人員
meet the entity's 遇見實體的
objectives.
The organization has established the
組織已建立
documentation "Working Guidelines of
文件《工作指南
Access Control" which standardizes the
"存取控制"標準化
company's access control management,
公司的存取控制管理,
and strengthens the management, and
並加強管理,
"Operation Manual for Data Media
公司數據媒體的操作手冊
Storage" which regulates the storage and
儲存規定儲存
storage of the company's data media.
公司數據媒體。
Inspected the "Working Guidelines of Access
審查了《存取控制工作指南》
Control" is to standardize the company's access
旨在規範公司的存取控制管理
control management, and strengthen the
並加強該
management of personnel, goods and vehicles in
人員、貨物和車輛的管理
and out to maintain the overall security, including
進出以維護整體安全,包括
the Donghu finance building, Taichung backup
東湖金融大樓、台中備援
center and Nangang office, which are divided into
分為中心和南港辦公室
public, office, rental and control areas, and maintain
公共、辦公、租賃和控制區域,並保持
the "Access Control List", which is reviewed
「存取控制清單」,定期檢視
annually. The latest version of "Working Guidelines
每年。《存取控制工作指南》的最新版本於 2018 年 11 月 26 日由首席執行官簽署。
of Access Control" was signed by the chief
executive officer on November 26 th, 2018.
2018 年 11 月 26 日由首席執行官簽署。
Inspected the access control settings to determine
檢查存取控制設定以確定
that access control was processed in accordance
存取控制是否按照公司的要求或程序進行處理。
with the company's requirements or procedures.
符合公司的要求或程序。
Inspected the "Operation Manual for Data Media
審查了《數據媒體存儲操作手冊 V1.7》規定了公司數據媒體的存儲和管理。
Storage V1.7" regulates the storage and storage of
媒體包括
the company's data media. The media include
various types of tapes, optical disks and disks. At
各種類型的磁帶、光盤和磁盤。目前,只剩下一些磁帶用於備份
present, only a few tapes are left to back up
歷史數據,這些磁帶將逐年淘汰
historical data, which will be phased out year by
year. "FBIS - External Confirmation" does not use
年。「FBIS - 外部確認」不使用
media.
Inspected the blank media general ledger list on
檢查了 2022 年 12 月 12 日的空白媒體總帳清單,以確定該
December 12th, 2022 to determine that the
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
inventory was processed in accordance with the
按照庫存進行處理
company's requirements or procedures.
公司的要求或程序。
The organization has established the
組織已建立
documentation "Working Guidelines for
「員工教育培訓工作指引」文件
Assess Apply and Change Regarding
評估申請和變更
Financial Operating System" which states
關於財務運作系統",其中指出
that removes physical access, and
以移除實體訪問
"Working Guidelines of Access Control"
《存取控制工作指南》
which standardizes the company's
標準化公司的
access control management.
存取控制管理。
Inspected the "Working Guidelines for Assess Apply
檢查了《評估申請和變更財務運作指南》
and Change Regarding Financial Operating System
有關財務運作系統的變更
V15" article 5, it is clearly stated that the change,
根據第 15 條第 5 款,明確規定了變更,
deletion, management and monitor of account
刪除,管理和監控帳戶
privilege will be recorded.
權限將被記錄。
"Working Guidelines of Access Control V1" is to
《存取控制工作指南 V1》的目的是
standardize the company's access control
標準化公司的存取控制
management, and strengthen the management of
管理,並加強管理
personnel, goods and vehicles in and out to
進出的人員、物品和車輛
maintain the overall security, including the Donghu
保持整體安全,包括東湖
finance building, Taichung backup center and
財務大樓、台中備援中心和
Nangang office, which are divided into public, office,
南港辦公室,分為公共、辦公室、
rental and control areas, and maintain the "Access
租賃和控制區域,並維護每年審查的“存取控制清單”。
Control List", which is reviewed annually.
"控制清單",每年審查一次。
Inspected the identification card and access
authority cancellation applications to determine that
權限取消申請以確定
the applications were processed in accordance with
應用程式是根據
the company's requirements or procedures.
公司的要求或程序進行處理。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Working Guidelines of
文件《工作指南
Access Control" which states about
存取控制",關於
reviews physical access.
審查實體進入。
"Working Guidelines of Access Control V1" is to
《存取控制工作指南 V1》的目的是
standardize the company's access control
標準化公司的存取控制
management, and strengthen the management of
管理,並加強管理
personnel, goods and vehicles in and out to
進出的人員、物品和車輛
maintain the overall security, including the Donghu
保持整體安全,包括東湖
finance building, Taichung backup center and
財務大樓、台中備援中心和
Nangang office, which are divided into public, office,
南港辦公室,分為公共、辦公室、
rental and control areas, and maintain the "Access
租賃和控制區域,並維護每年審查的“存取控制清單”。
Control List", which is reviewed annually.
"控制清單",每年審查一次。
Inspected the access control list in December 2021
2021 年 12 月檢查存取控制清單
to determine that the list is reviewed annually.
確定該清單每年審查一次。
Inspected the video record of the access control
審查了主要中心機房進出的未經授權人員的訪問控制視頻記錄
records of unauthorized personnel entering and
記錄了進入和離開電腦機房的未經授權人員的記錄
leaving the computer room of the main center and
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
backup center to determine that the time and reason
備份中心確定時間和原因
for the entry and exit were recorded.
進出記錄
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
CC6.5
The entity discontinues 實體停止
logical and physical 邏輯和物理
protections over physical
物理上的保護
assets only after the
資產僅在
ability to read or recover
能力閱讀或恢復
data and software from
資料和軟體
those assets has been
從這些資產中已經
diminished and is no
減少並且不再需要達到
longer required to meet
機構的目標。
the entity's objectives.
The organization has established the
組織已建立
documentation "Guidelines for
文件「指南」
Categorizing and Controlling Information
分類和控制信息
Asset" which states that removes data
"資產"指的是從實體控制中刪除數據
and software from entity control.
和軟件。
Inspected the "Guidelines for Categorizing and
審查了《信息資產分類和控制指南》第 2 條範圍,指出符合信息定義的資產
Controlling Information Asset V5", each level of
"控制信息資產 V5",已經說明了每個層級的
information assets' definition and corresponding
資訊資產的定義和相應的
management of control assess has been stated.
控制評估管理已經被陳述。
The open system server and device policy forbids
開放系統伺服器和設備政策禁止
the use of USB connection devices with storage
使用具有存儲功能的 USB 連接設備,並通過封存方式控制。如果
function, and is controlled by means of sealing. If
真的有使用的必要,應用方法,
there is a real need for use, the application method,
security inspection mechanism (such as virus
安全檢查機制(例如病毒掃描 USB 存儲設備),數據保護
scanning of USB storage device), data protection
機制(例如 USB 存儲設備的數據刪除)
mechanism (such as data removal of USB storage
device) and track record retention shall be specified
應由請求單位的副首席執行官指定和批准設備)和記錄保留的保留期限。
and approved by the vice chief executive officer of
並獲得請求單位副首席執行官的批准。
the requesting unit. 請求單位的副首席執行官指定和批准。
Inspected the personal computer-controlled data
檢查了個人電腦控制的數據
storage device application forms to determine that
存儲設備應用表格,以確定
data and software stores on equipment were
數據和軟件存儲在設備上
disposed when the equipment had other uses.
當設備有其他用途時處置。
Use OPSWAT file threat removal solution to remove
使用 OPSWAT 檔案威脅移除解決方案來移除
entity-controlled data and software.
實體控制的數據和軟體。
Inspected the contract to determine that the use of
審查合同以確定使用
OPSWAT is authorized. OPSWAT 已獲授權。
No exceptions noted. 未發現任何例外。
CC6.6
The entity implements 實體實施
logical access security 邏輯訪問安全
measures to protect 保護措施
against threats from 面對來自威脅
sources outside its 系統邊界之外的來源
system boundaries. 的威脅。
The organization has established the
組織已建立
documentation "Management Guidelines
文件“管理指南”
for Internet and Communication Security"
用於網際網路和通訊安全"
which states that the management
聲明管理
regulations regarding internet system and
有關互聯網系統和管理的規定
equipment.
Inspected the "Management Guidelines for Internet
審查了互聯網管理指南
and Communication Security V6", the management
有關互聯網系統和
regulations regarding internet system and
有關互聯網系統和管理的規定
equipment are stated to avoid mal-use leading to
設備被規定以避免誤用導致
damage or waste resources.
損壞或浪費資源。
Wireless blockers are used to prevent Wi-Fi network
無線阻斷器用於防止 Wi-Fi 網絡
connection companies from using internal
公司之間的連接
resources.
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Inspected the PCI DSS report to determine that
檢查了 PCI DSS 報告,以確定
there was no Wi-Fi connection for the company to
公司沒有 Wi-Fi 連接
use internal resources. 使用內部資源。
Employees work remotely by connecting to the
員工通過連接到公司的 VPN 來遠程工作,使用公司提供的筆記本電腦
company via VPN using the notebook computers
。不同的跳板伺服器
provided by the company. Different jump servers
are set up according to the office use and business
根據辦公室使用和業務目的設置,
operation purpose, and log in using the existing
並使用現有的帳號和驗證信息登錄。
account number and authentication information.
帳號和驗證資訊。
Inspected announcement of HR, relevant
人力資源檢查公告,相關
departments adopted remote work and didn't need
部門採用遠程工作,不需要
to apply for remote use of OA system. Unrelated
申請辦公自動化系統的遠程使用。不相關
departments still need to apply and nobody applied
部門仍需要申請,但沒有人申請
during the examination period.
在考試期間。
The organization has established the
組織已建立
documentation "Management Guidelines
文件“管理指南”
for Internet and Communication Security"
用於網際網路和通訊安全"
which states that each internal segment
每個內部區段
should be properly separated and
應該被正確分隔和
monitored, unauthorized connection is
監控,未經授權的連接是
prohibited.
Inspected the "Management Guidelines for Internet
審查了互聯網管理指南
and Communication Security V6" article 5.3
和文章
Management of network connections, it is stated
管理網絡連接,聲明
that each internal segment should be properly
每個內部環節應適當
separated and monitored, unauthorized connection
分離並監控,禁止未經授權的連接
is prohibited. 禁止。
Employees work remotely by connecting to the
員工通過連接到公司的 VPN 來遠程工作,使用公司提供的筆記本電腦
company via VPN using the notebook computers
。不同的跳板伺服器
provided by the company. Different jump servers
are set up according to the office use and business
根據辦公室使用和業務目的設置,
operation purpose, and log in using the existing
並使用現有的帳號和驗證信息登錄。
account number and authentication information. In
addition, one time password (OTP) is generated by
此外,一次性密碼(OTP)是由
FORTITOKEN products to protect the transmission
FORTITOKEN 產品生成,以保護傳輸
process outside the system boundary.
系統邊界之外的處理。
Inspected employees' smart phone to determine
檢查員工的智慧手機以確定
that the smart phone have FORTITOKEN products
該智慧手機具有 FORTITOKEN 產品
installed.
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
documentation "Management Guidelines
文件“管理指南”
for Internet and Communication Security"
用於網際網路和通訊安全"
which states that devices outside the
聲明說,設備在外部
company should use proper safety
公司應該使用適當的安全措施
mechanism.
Inspected the "Management Guidelines for Internet
審查了互聯網管理指南
and Communication Security V6" article 5.3
和文章
Management of network connections, it is stated
管理網絡連接,聲明
that devices outside the company should use proper
公司外部設備應使用適當的安全機制
safety mechanism such as VPN to link to internal
(如 VPN)連接到內部
equipment; passwords should be revised
設備; 密碼應該定期修改
periodically.
Employees work remotely by connecting to the
員工通過連接到公司的 VPN 來遠程工作,使用公司提供的筆記本電腦
company via VPN using the notebook computers
。不同的跳板伺服器
provided by the company. Different jump servers
are set up according to the office use and business
根據辦公室使用和業務目的設置,
operation purpose, and log in using the existing
並使用現有的帳號和驗證信息登錄。
account number and authentication information. In
addition, one time password (OTP) is generated by
此外,一次性密碼(OTP)是由
FORTITOKEN products to protect the transmission
FORTITOKEN 產品生成,以保護傳輸
process outside the system boundary.
系統邊界之外的處理。
Inspected employees' smart phone to determine
檢查員工的智慧手機以確定
that the smart phone have FORTITOKEN products
該智慧手機具有 FORTITOKEN 產品
installed.
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Management Guidelines
文件“管理指南”
for Internet and Communication Security"
用於網際網路和通訊安全"
which states what the company's internal
公司內部和外部互聯網應設置為
area and external internet should set to
區域
control connection. 控制連接。
Inspected the "Management Guidelines for Internet
審查了互聯網管理指南
and Communication Security V6" Art 5.1 Protection
和安全。
of local network, it is stated that the company's
有關本地網絡,聲明公司的
internal area and external internet should set DMZ
內部區域和外部互聯網應分別設置 DMZ
respectively and protect with firewall to control
並使用防火牆進行保護,以控制
connection.
Employees work remotely by connecting to the
員工通過連接到公司的 VPN 來遠程工作,使用公司提供的筆記本電腦
company via VPN using the notebook computers
。不同的跳板伺服器
provided by the company. Different jump servers
are set up according to the office use and business
根據辦公室使用和業務目的設置,
operation purpose, and log in using the existing
並使用現有的帳號和驗證信息登錄。
account number and authentication information. In
addition, one time password (OTP) is generated by
此外,一次性密碼(OTP)是由
FORTITOKEN products to protect the transmission
FORTITOKEN 產品生成,以保護傳輸
process outside the system boundary.
系統邊界之外的處理。
Inspected the jump server to determine that there is
檢查跳板伺服器以確定沒有未經授權的存取權限。
no unauthorized access to jump servers.
確保跳板伺服器沒有未經授權的存取權限。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
documentation "Management Guidelines
文件“管理指南”
for Internet and Communication Security"
用於網際網路和通訊安全"
which states that remote access to
該規定遠程訪問
internal system and net services should
內部系統和網絡服務應該
be limited and mechanism should be set
受限制,並應設置機制
up for all equipment.
適用於所有設備。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the "Management Guidelines for Internet
審查了互聯網管理指南
and Communication Security" Art 5.3 Management
和通信安全》第 5.3 條管理。
of network connections, it is stated that remote
有關網絡連接,應指出遠程
access to internal system and net services should
訪問內部系統和網絡服務應該
be limited and mechanism should be set up for all
受限制,並應為所有設置機制
equipment. The latest version of "Working
設備。《存取控制工作指南》的最新版本已於 2022 年 7 月 19 日由首席執行官簽署。
Guidelines of Access Control" was signed by the
存取控制指南》的最新版本已於 2022 年 7 月 19 日由首席執行官簽署。
chief executive officer on July 19th, 2022.
首席執行官於 2022 年 7 月 19 日簽署了《存取控制工作指南》的最新版本。
Defense in depth mechanism is used. Firewalls
使用深度防禦機制。防火牆
include Check Point, Fortinet, Juniper and other
包括 Check Point、Fortinet、Juniper 和其他
brands. Softnext mail filtering device is used, and
品牌。使用 Softnext 郵件過濾設備,以及
apt attack defense of Softnext is provided.
Softnext 提供 APT 攻擊防禦。
Inspected the firewall, mail filtering device and APT
檢查防火牆、郵件過濾設備和 APT。
defense mechanism to determine that defense in
防禦機制以確定防禦。
depth mechanism was used.
使用了深度機制。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC6.7
The entity restricts the
實體限制
transmission, movement, 傳輸,移動,
and removal of 並刪除
information to authorized
資訊提供給授權
internal and external 內部和外部
users and processes, 用戶和進程,
and protects it during
並在此期間保護它,
transmission, movement, 傳輸,移動,
or removal to meet the
或刪除以滿足
entity's objectives. 實體的目標。
The organization has established the
組織已建立
documentation "Management Guidelines
文件“管理指南”
for Internet and Communication Security"
用於網際網路和通訊安全"
which states that intranet connection from
該文件指出,內部網絡連接源自
outside the company, should have proper
公司外部應該有適當的身份驗證機制
identity verification mechanism according
根據檢查身份驗證機制
to the need.
Inspected the "Management Guidelines for Internet
審查了互聯網管理指南
and Communication Security" article 5.1 Protection
和通信安全"第 5.1 條保護
of local network, it is stated that intranet connection
本地網絡的保護,指出內部網絡連接
from outside the company, should have proper
從公司外部連接,應該有適當的
identity verification mechanism according to the
根據需要的身份驗證機制。
need. The latest version of the "Management
「互聯網和通信管理指南」的最新版本
Guidelines for Internet and Communication
Security" was signed by the chief executive officer
"安全"由首席执行官签署
on July 19th, 2022.
于 2022 年 7 月 19 日
FBIS adopts TLS1.1 and TLS1.2 encryption
FBIS 采用 TLS1.1 和 TLS1.2 加密
transmission protocol to protect the transmission of
保護傳輸的傳輸協議
data and other communications.
數據和其他通信。
Inspected the web application firewall to determine
檢查網絡應用防火牆以確定
that TLS1.1 and TLS1.2 were used.
使用了 TLS1.1 和 TLS1.2。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
documentation "Network Security
文件 "網絡安全"
Management Operation Manual" which
管理操作手冊",其中
states that USB are prohibited to be
禁止使用 USB。
connected to open server nor equipment.
連接到開放伺服器或設備。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the article 5.1.5 End Protection of
檢查了第 5.1.5 條 《結束保護》
"Network Security Management Operation Manual"
“網絡安全管理操作手冊”
which was revised and approved by the vice chief
經副首席執行官修訂並批准,日期為 2022 年 7 月 20 日,規定
executive officer on July 20th, 2022, it is stated that
禁止將 USB 連接到開放伺服器
USB are prohibited to be connected to open server
nor equipment; 5.2.2 Personal Computer, USB
也不包括設備;5.2.2 個人電腦,USB
connection control is stated.
連接控制已說明。
Inquired of the system administrator to determine
請系統管理員查明
that FBIS did not use removable media (such as
FBIS 未使用可移動媒體(例如
USB hard disk and backup tape).
USB 硬碟和備份磁帶)。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted 未發現任何例外情況
The organization has established the
組織已建立
documentation "Network Security
文件 "網絡安全"
Management Operation Manual" which
管理操作手冊",其中
states that nonbusiness use portable
聲明非商業用途的便攜式
devices are prohibited to connect
設備禁止連接
intranet, may apply if needed.
內部網絡,如有需要可能適用。
Inspected the "Network Security Management
審查了由副首席執行官於 7 月 20 日修訂並批准的“網絡安全管理操作手冊”
Operation Manual" article 5.1.5. 2 Personal
"操作手冊"第 5.1.5.2 節個人
Computer, it is stated that nonbusiness use portable
電腦中指出,非商業用途的便攜式
devices are prohibited to connect intranet, may
設備禁止連接內部網絡,可能
apply if needed. The latest version of "Network
如有需要,請申請。最新版本的《網絡安全管理操作手冊》已由副首席執行官修訂並批准。
Security Management Operation Manual" which was
revised and approved by the vice chief executive
officer on July 20th, 2022
2022 年 7 月 20 日的官員
Inquired of the system administrator to determine
請系統管理員查明
that mobile device (such as laptops, smart phones
表示移動設備(如筆記本電腦、智能手機
and tablets) are not used in FBIS.
和平板電腦)不得在 FBIS 中使用。
No exceptions noted. 未發現任何例外。
CC6.8
The entity implements 實體實施
controls to prevent or
預防或控制
detect and act upon the
檢測並採取行動
introduction of 介紹
unauthorized or malicious
未經授權或惡意
software to meet the
軟體以滿足
entity's objectives. 實體的目標。
The organization has established the
組織已建立
documentation "Guidelines for
文件「指南」
Information Equipment's Authorization
資訊設備的授權
and Protection" which states that
和保護"規定了
information equipment's operation and
資訊設備的操作和
maintenance should be executed in
維護應在执行
accordance with the standard process
根據標準流程
handbook offered by services provider.
由服務提供商提供的手冊。
Inspected the "Guidelines for Information
審查了「信息指南"
Equipment's Authorization and Protection" article
"設備授權和保護"條款
5.1.2 Equipment Maintenance, it is stated that
5.1.2 設備維護,指出
information equipment's operation and maintenance
資訊設備的操作和維護
should be executed in accordance with the standard
應按服務提供商提供的標準流程手冊執行。
process handbook offered by services provider.
授權和保護"已由簽署。
Unless authorized by maintenance operator,
未經維護操作人員授權,
disassemble and maintain are prohibited. The latest
禁止拆卸和維護。最新版本的「信息設備指南」
version of "Guidelines for Information Equipment's
Authorization and Protection" was signed by the
chief executive officer on March 4th, 2020.
2020 年 3 月 4 日,公司的首席執行官。
The software used by the company is installed and
公司使用的軟體是由特定的執行官或集中安裝和
uninstalled by a specific executive or centralized
解除安裝。
delivery server. 交付伺服器。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Inspected the most recently completed change
檢查最近完成的更改。
application forms to determine that software
應用程式表單,以確定軟體
installation by change executive and centralized
通過更改執行和集中安裝
delivery server. 交付伺服器。
The organization has established the
組織已建立
documentation "Guidelines for
文件「指南」
Information Equipment's Authorization
資訊設備的授權
and Protection" which states that system
和保護",其中規定系統
or users' operation process, abnormal
或用戶操作過程、異常
situation or security event.
情況或安全事件。
Inspected the "Guidelines for Information
審查了「信息指南"
Equipment's Authorization and Protection", it stated
"設備的授權和保護",它指出
system or users' operation process, abnormal
系統或使用者的操作過程,異常
situation or security event. By synchronize
情況或安全事件。通過同步
monitoring or post approval, monitoring or reviewing
監控或核准後,監控或審查
system operation for unauthorized access can be
系統操作以防止未經授權的訪問
achieved. The latest version of "Guidelines for
可以實現。《指南》的最新版本
Information Equipment's Authorization and
資訊設備的授權和
Protection" was signed by the chief executive officer
保護"由首席執行官簽署
on March 4th, 2020.
於 2020 年 3 月 4 日。
Inspected the information equipment to determine
檢查信息設備以確定
that Symantec, ESET, Sophos and other anti-virus
使用了 Symantec、ESET、Sophos 等防病毒機制。
mechanisms were used.
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Management System
文件 "管理系統
Specification" which states that how to
"規範",說明如何
maintain information security
維護資訊安全
management mechanism's flexibility and
管理機制的靈活性和
integrity, and "Financial Information
完整性和“財務信息
System Change Management Procedure"
系統變更管理程序”
which states that change operation of
規定變更操作的
operating host and equipment of financial
金融信息系統的操作主機和設備。
information system. 檢查了“管理系統規範”。
Inspected the "Management System Specification"
article 2.1.1 Information Security Policy, it is stated
第 2.1.1 條資訊安全政策中指出
that to maintain information security management
為了維護信息安全管理
mechanism's flexibility and integrity, control
機制的靈活性和完整性,控制
measures that involves regulatory compliance,
涉及法規遵循的控制措施,
technique capacity or cost-effectiveness, should go
技術能力或成本效益,應該經過適當的程序,包括申請、評估和批准。
through a proper procedure including applying,
最新版本的
evaluating, and approving. The latest version of
"Management System Specification" was signed by
"管理系統規範" 於 2021 年 8 月 30 日由首席執行官簽署。
the chief executive officer on August 30th, 2021.
Inspected the "Financial Information System
檢查了 "財務信息系統"
Change Management Procedure", It stated the
變更管理程序",它規定了
change operation of operating host and equipment
運作主機和設備的變更操作
of financial information system. The latest version of
財務信息系統的最新版本。
"Financial Information System Change Management
"財務信息系統變更管理程序"於 2021 年 12 月 27 日由副首席執行官簽署。
Procedure" was signed by the vice chief executive
過程"於 2021 年 12 月 27 日由副首席執行官簽署。
officer on December 27 th, 2021.
官員簽署。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Inspected the completed change application forms
審查已完成的變更申請表
to determine that the systems were changed by
確定系統是由誰更改的
change executive. 更改執行者。
The organization has established the
組織已建立
documentation "Working Handbook for
文件「工作手冊」
Internet Security Management" which
「網際網路安全管理」指出每台 Windows 電腦都應安裝防毒軟體。
states that every Windows computer has
指出每台 Windows 電腦都應安裝防毒軟體。
installed antivirus. 安裝了防毒軟體。
Inspected the "Working Handbook for Internet
審查了《互聯網安全管理手冊 V7》第 5.4 節安全。
Security Management" article 5.3.3 Antivirus'
Installation and Virus Codes' Update, it is stated that
every Windows computer has installed antivirus.
每台 Windows 電腦都安裝了防毒軟體。
When system managing personnel delivers a
當系統管理人員交付電腦給使用者時,
computer to user, both parties should confirm the
雙方應確認
status of antivirus. The latest version of "Working
防毒軟體的狀態。《網路安全管理手冊》的最新版本於 7 月由副總裁簽署。
Handbook for Internet Security Management" was
signed by the vice chief executive officer on July
20th, 2022..
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Working Handbook for
文件「工作手冊」
Internet Security Management" which
「網際網路安全管理」指出每台 Windows 電腦都應安裝防毒軟體。
states that if internet security manage
personnel is notified for security
通知人員進行安全性
vulnerability, one should collect relevant
漏洞,應收集相關
information and evaluate affecting range
資訊並評估影響範圍
and level of damage.
損壞程度和等級。
Inspected the "Working Handbook for Internet
審查了《互聯網安全管理手冊 V7》第 5.4 節安全。
Security Management V7" article 5.4 Security
安全。
Vulnerability and Information Management, it is
漏洞和信息管理,它是
stated that if internet security manage personnel is
指出如果互聯網安全管理人員被
notified for security vulnerability, one should collect
通知有安全漏洞,應該收集
relevant information and evaluate affecting range
相關信息並評估影響範圍
and level of damage. Contact related units and fix
和損壞程度。聯繫相關單位並修復
the problem as soon as possible.
問題。盡快解決。
Inspected engineers use OPSWAT File Threat
檢查工程師使用 OPSWAT 檔案威脅
Removal Solution to remove foreign data and
移除解決方案來移除外來數據和
software.
No exceptions noted. 未發現任何例外。

System Operations 系統操作

Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
"Management Procedure for Major
"主要安全參數管理程序"。根據第 4.5 條,其中包括設備管理
Security Parameter", which is stated that
"安全參數",即所述
financial information system's operating
金融信息系統的運行
equipment's major security parameter
設備的主要安全參數
has to be approved by Vice Chief
必須經副首席批准
Executive Officer before setting.
執行官在設定之前
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the latest version of "Management
檢查了最新版本的「管理」
Procedure for Major Security Parameter" was
"主要安全參數程序"於 7 月由副首席執行官簽署
signed by the vice chief executive officer on July
6th, 2022.
If the "Government Configuration Baseline (GCB)"
如果"政府配置基準(GCB)"
announced by the government has been adopted
政府宣布已被採納
for the relevant information system or equipment,
針對相關資訊系統或設備,
the relevant parameter setting shall comply with the
相關參數設定應符合
provisions of the latest version. However, if the use
最新版本的規定。但是,如果使用
of GCB will affect the operation of the system, it can
GCB 會影響系統的運作,可以
be modified and managed with exception.
進行修改和管理。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC7.1
To meet its objectives,
為了達到其目標,
the entity uses detection
實體使用檢測
and monitoring 和監控
procedures to identify (1)
用於識別的程序(1)
changes to configurations
配置更改
that result in the
導致
introduction of new 新功能介紹
vulnerabilities, and (2)
漏洞,以及(2)
susceptibilities to newly
對新漏洞的易感性
discovered
vulnerabilities.
The organization has established the
組織已建立
"Management Procedure for Major
"主要安全參數管理程序"。根據第 4.5 條,其中包括設備管理
Security Parameter". Under article 4.5, it
includes equipment management
安全管理。
mechanism, which is stated equipment
設備所述的機制
management units should periodically
管理單位應定期
review the parameter to align with the list
審查參數以符合清單
set before.
Inspected a sample of major security parameter
檢查了由安全部門維護的主要安全參數檢查表的樣本,以確定記錄已保存
checklist, which is maintained by security
檢查了由安全部門維護的主要安全參數檢查表的樣本,以確定記錄已保存
department, to determine that records were kept
檢查了由安全部門維護的主要安全參數檢查表的樣本,以確定記錄已保存
and signed by the department supervisor.
並由部門主管簽署。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
"Management Procedure for Financial
《財務信息系統變更管理程序》
Information System's Change", which is
,該程序是
stated all changes made to the system
記錄對系統所做的所有更改
has to follow this procedure and uses
必須遵循此程序並使用
ChangeMan and Dimensions software to
ChangeMan 和 Dimensions 軟體
control the integrity of the software.
控制軟體的完整性。
Inspected the latest version of "Management
檢查了最新版本的「管理」
Procedure for Financial Information System's
財務信息系統的程序。
Change" was signed by the vice chief executive
"變更"由副首席執行官簽署
officer on December 27 th, 2021 .
於 2021 年 12 月 27 日。
Inspected a selection of the change application
審查了變更申請的選擇
forms to determine that change-detection
用於確定變更檢測的形式
mechanism was implemented.
實施了機制。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
"Working Handbook for Internet Security
"網絡安全工作手冊
Management". Under article 5.2.4, which
"管理"。根據第 5.2.4 條,應設定警報標準
is stated an alert standard should be set
以確保互聯網安全設備的狀態,
for internet security equipment's status,
effectiveness and event. If abnormal
效能和事件。如果發生異常
occurs, immediate messages and emails
,立即發送消息和電子郵件
were sent to notify related operators.
通知相關操作員。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the latest version of "Working Handbook
for Internet Security Management" was signed by
「網絡安全管理」的協議由副首席執行官於 2022 年 7 月 20 日簽署。
the vice chief executive officer on July 20 th, 2022.
檢查了一個漏洞評估樣本
Inspected a selection of the information security
審查了一些信息安全
monitoring report to determine the Information
監控報告,以確定信息
security monitoring alarm to determine that monitor
安全監控警報,以確定監視器
mechanism was implemented.
實施了機制。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
"Working Handbook for Internet Security
"網絡安全工作手冊
Management". Under article 5.4.2, which
管理"。根據第 5.4.2 條款,
is stated that computers and internet
據說電腦和互聯網
equipment using TCP/IP communication
使用 TCP/IP 通信的設備
protocol should execute security
協議應執行安全
vulnerability evaluation by security
由安全經理或專業供應商進行漏洞評估。
manager or professional vendors.
檢查了最新版本的「工作手冊」。
Inspected the latest version of "Working Handbook
for Internet Security Management" was signed by
「網絡安全管理」的協議由副首席執行官於 2022 年 7 月 20 日簽署。
the vice chief executive officer on July 20 th, 2022.
檢查了一個漏洞評估樣本
Inspected a sample of the vulnerability assessment
report to determine that vulnerability scans were
報告以確定漏洞掃描已完成
completed.
No exceptions noted. 未發現任何例外。
CC7.2
The entity monitors 實體監控
system components and 系統組件和
the operation of those
那些操作
components for 用於的組件
anomalies that are 異常情況
indicative of malicious 指示惡意
acts, natural disasters,
行為、自然災害、
and errors affecting the
以及影響
entity's ability to meet its
實體達成其
objectives; anomalies are
目標的能力;異常情況
analyzed to determine 被分析以確定
whether they represent 是否它们代表
security events. 安全事件。
The organization has established the
組織已建立
"Information Security Policy", which is
"資訊安全政策",其中
stated that business information system
指出商業信息系統
should establish monitor, notify and
應建立監控、通知和
reaction mechanism to effectively deal
反應機制,以有效應對
with information security event.
具有信息安全事件。
Audit events of information system
信息系統的審計事件
access control includes password
存取控制包括密碼
change, login failure, information system
更改、登錄失敗、信息系統
access failure, use of administrative
存取失敗、管理使用
authority, use of personal authentication
權限、個人認證使用
(PIV) certificate or use of third-party
(PIV)證書或使用第三方
certificate.
Information system network security audit
資訊系統網絡安全審計
events includes FISAC information
事件包括 FISAC 信息
sharing, information security monitoring,
共享、信息安全監控、
network detection and analysis, network
網絡檢測和分析、網絡
access analysis, endpoint protection, mail
存取分析、端點保護、郵件
gateway, boundary firewall connection,
閘道,邊界防火牆連接,
Inspected a selection of network security daily
每天檢查一組網絡安全
report to determine that the detection was
報告以確定檢測結果
processed in accordance with company's regulation.
根據公司規定進行處理。
No exceptions noted. 未發現任何例外。
Confidential 機密
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
information security equipment
資訊安全設備
availability alarm, etc.
可用性警報等。
The organization has established the
組織已建立
"Information Security Policy", which is
"資訊安全政策",其中
stated that appropriate access control
規定應實施適當的存取控制
management should be implemented
管理
through company's environment; security
通過公司的環境; 安全
procedures should be implemented for
應該為實施程序
information system and internet
資訊系統和互聯網
management to maintain the
管理以維護
information's integrity and availability;
資訊的完整性和可用性;
business information system should
establish an access policy to prevent
建立存取政策以防止
unauthorized breach and access.
未經授權的侵入和存取。
The audit records of information system
資訊系統的稽核記錄
access control include event type, when
存取控制包括事件類型,何時
and where, event source, result after
以及在哪裡,事件來源,事件後的結果
event, identification of any user / principal
事件,任何使用者/主體的識別
related to the event, full-text record of
與事件相關,完整記錄
privilege command or identity information
特權命令或身份信息
of group account user, etc.
群組帳戶使用者等。
Information system network security audit
資訊系統網絡安全審計
records includes intrusion detection
記錄包括入侵檢測
system (IDS) events (such as analyzer)
系統(IDS)事件(如分析器)
Microsoft Remote Desktop brute force,
Microsoft 遠端桌面暴力破解,
web application firewall events (such as
網頁應用程式防火牆事件(例如
the number of blocked), Endpoint
被封鎖的數量),端點
Protection events (such as the risk
保護事件(如風險
distribution within the period, the success
分佈在期間內,成功
record of writing clear documents),
撰寫清晰文件的記錄),
Inspected audit records are collected under the
經過檢查的審計記錄是在 QRadar 工具的控制下收集的。當 QRadar 的審計
control of QRadar tool. When QRadar' s audit
記錄處理失敗時,其中包括軟體/
record processing fails, which includes software /
hardware errors, auditit capture mechanism failure,
硬件錯誤,審計捕獲機制失敗,
audit storage capacity saturation or exceeding, the
審計存儲容量飽和或超出,系統將警報系統負責人員
system will alert the system's responsible personnel
and take corresponding actions, such as closing the
並採取相應的行動,例如關閉
QRadar information system, rewriting the oldest
QRadar 信息系統,重寫最老的
audit record or stopping the generation of audit
審計記錄或停止生成審計
records.
Inquired of QRadar responsible person and
向 QRadar 負責人詢問並
inspected a selection of the completed account and
檢查了一些已完成的帳戶和
authority management report to determine that the
權限管理報告,以確定
detection was effective.
檢測效果良好。
No exceptions noted. 未發現任何例外。
Confidential 機密
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
unexpected changes of website files, mail
網站文件、郵件的意外更改
gateway events (such as the sender's
網關事件(例如發送者的
source domain is not blocked, forged
來源域名未被封鎖,被偽造
attack mail, mail with malicious files,
攻擊郵件,帶有惡意文件的郵件
NDRs(Non-Delivery Reports), and anti-
NDRs(非傳遞報告)和防止
virus module interception email) and
病毒模組攔截電子郵件)
boundary firewall connection events
邊界防火牆連接事件
(such as instantaneous traffic is too
(例如瞬時流量過高
large).
The organization has established the
組織已建立
"Information Security Policy", which is
"資訊安全政策",其中
stated that business information systems
規定商業資訊系統
planning should consider security, and
規劃應考慮安全性,並
design, test, change and maintain each
設計、測試、更改和維護每個
step with appropriate security
步驟,並採取適當的安全措施
management.
The mainframe is responsible for the
主機負責
maintenance of the time synchronization
時間同步的維護
every month. A network time protocol
每個月。設置網絡時間協議
(NTP) server is set up to obtain the
(NTP)伺服器以獲取
correct time by satellite signal. The time
透過衛星信號校正時間。每台服務伺服器(包括伺服器、
of each service server (including server,
個人電腦等)的時間已同步
personal computer, etc.) is synchronized
with it. The system time is synchronized
與之同步。系統時間定期同步
regularly to ensure that the system time
以確保系統時間
is consistent. Therefore, each detection
保持一致。因此,每次檢測
tool can keep the same time stamp to
工具可以保持相同的时间戳以
analyze the abnormal situation.
分析異常情況。
The system time of each business information
每个业务信息的系统时间
system is checked regularly.
系統定期檢查。
Inspected a selection of the NTP server
檢查了一些 NTP 伺服器。
maintenance record to determine that time
檢查維護記錄以確定時間。
synchronization was implemented to ensure each
實施了同步化,以確保每個
detection tool can keep the same time stamp to
檢測工具可以保持相同的時間戳記,以便
analyze the abnormal situation.
分析異常情況。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has the "Information
這個組織擁有“信息安全政策”,其中規定
Security Policy", which is stated that
商業信息系統應該
business information system should
establish monitor, notify and reaction
建立監控、通知和反應機制,有效應對
mechanism to effectively deal with
資訊安全事件。
information security event.
建立監控、通知和反應機制,有效應對
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inquired of responsible person to realize the audit
向負責人詢問以實現審計
tool is in real time, which will alert the person in
工具是實時的,將通過短信、電子郵件或即時通知系統負責人
charge of the system with SMS, e-mail or instant
询问负责系统的人员,以短信、电子邮件或即时通知方式通知
messaging tool (Team+ Pro) in case of any
在任何情況下,使用通訊工具(Team+ Pro)
abnormality.
Inspected a selection of warning messages to
檢查一系列警告訊息,以確定在任何異常情況下
determine that in case of any abnormality the
確定在任何异常情况下
system could alert the person in charge of the
系統可以通過簡訊、電子郵件或即時通訊工具警報負責人
system with SMS, e-mail or instant messaging tool
系統可以通過簡訊、電子郵件或即時通訊工具警報負責人
(Team+ Pro).
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC7.3
The entity evaluates 實體評估
security events to 安全事件以
determine whether they 確定它們是否
could or have resulted in
可能或已導致
a failure of the entity to
實體失敗
meet its objectives 達不到其目標
(security incidents) and, if
(安全事件)和,如果
so, takes actions to
因此,採取行動來
prevent or address such
預防或解決這種情況
failures.
The organization has established the
組織已建立
"Information Security Policy", which is
"資訊安全政策",其中
stated that business information system
指出商業信息系統
should establish monitor, notify and
應建立監控、通知和
reaction mechanism to effectively deal
反應機制,以有效應對
with information security event.
具有信息安全事件。
The organization regularly review the
組織定期審查
procedures related to incident response
與事件應變相關的程序
and submit the results to the
並將結果提交給
management system review meeting.
管理系統審查會議。
Inspected a selection of the management system
審查管理系統的一部分
review meeting records to determine that the
審查會議記錄,以確定
meeting including information security policy and
會議包括信息安全政策和
related operating procedures changed.
相關操作程序已更改。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
"Notifying and Handling Guidelines for
處理指南的通知和處理
Abnormal Incidents". Under article 5.4 ,
which is listed that every person in
每個負責服務或系統的人應該制定一個對應可能情況的計劃
charge of services or system should draw
以列出每個人
up a plan corresponding to possible
負責服務或系統的人應該制定一個對應可能情況的計劃
incidents to respond and process
回應和處理事件
immediately when incident occurs. Under
發生事件時立即
article 5.5, which is stated that after
在第 5.5 條中提到,在
abnormal incident ended, related
異常事件結束,相關
departments should review and analysis
部門應該進行審查和分析
root cause, occur frequency and affective
根本原因,發生頻率和影響
range to take appropriate precaution and
採取適當預防措施的範圍
lower the chances of happening again.
降低再次發生的機會。
Inquired of responsible person to realize employees
詢問負責人以了解員工
will immediately notify the relevant personnel (such
將立即通知相關人員(例如系統操作員、業務或系統負責人員以及資訊安全
as the system operator, the person in charge of the
)等。
business or system, and the information security
personnel), and record the relevant contents of the
人員),並記錄事故相關內容(如發生時間、通知
accident (such as the occurrence time, notification
人員、過程描述等)。當他們
personnel, process description, etc.) when they
人員、過程描述等)時。
discovers or receives the notice of an abnormal
發現或收到來自客戶或供應商的異常事故通知
accident from a customer or a supplier of an
有關外包信息系統或服務的通知,他/她
outsourcing information system or service, he / she
shall.
Whenever incident and problem of system
系統的事件和問題每當發生時
happened, it will be recorded on "Incidents and
,將被記錄在“事件和問題摘要清單”上。檢查“事件和
Problems Summary List". Inspected "Incidents and
問題摘要清單”
Problems Summary List", there were no incidents
「問題摘要清單」中,沒有發生任何事件
and problems of FBIS happened during the
和 FBIS 的問題發生在
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
examination period. In addition, incidents and
檢查期間。此外,事件和
problems of other systems were solved and
其他系統的問題已經解決了
recorded.
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
"Working Handbook for Personal
《個人工作手冊》
Information Breach Incidents", which is
"信息泄露事件",應
stated procedure and process when
personal information breach incident
個人資訊違規事件
occurs.
Inspected "Incidents and Problems Summary List",
檢查“事件和問題摘要清單”,
there were no personal information breach incidents
在檢查期間沒有個人資訊遭到侵犯的事件
of FBIS happened during the examination period. In
發生了 FBIS 的事件
addition, there were no personal information breach
此外,在檢查期間沒有個人資訊違規
incidents of other system happened.
其他系統發生的事件。
Inspected "Minutes of Personal Information Intrusion
審查了“個人信息侵入會議記錄”。
Drill Review Meeting", drills of personal information
審查了個人信息演練回顧會議,演練。
breach incidents were performed and recorded.
違反事件已執行並記錄。
No exceptions noted. 未發現任何例外。
CC7.4
The entity responds to
實體回應
identified security 識別的安全
incidents by executing a
通過執行事故
defined incident response
定義的事故應對
program to understand, 程序來了解,
contain, remediate, and 包含、糾正和
communicate security 溝通安全
incidents, as appropriate.
事件,如適當。
The organization has established the
組織已建立
"Information Security Policy", which is
"資訊安全政策",其中
stated that business information systems
規定商業資訊系統
planning should consider security, and
規劃應考慮安全性,並
design, test, change and maintain each
設計、測試、更改和維護每個
step with appropriate security
步驟,並採取適當的安全措施
management.
Inspected the latest version of "Information Security
審查了董事會於五月簽署的最新版本的「資訊安全政策」
Policy" was signed by the board of directors on May
審查了「事件和問題摘要清單」
21 st, 2020.
Inspected "Incidents and Problems Summary List",
檢查“事件和問題摘要清單”,
there were no incidents and problems of FBIS
在考試期間沒有發生 FBIS 的事件和問題。
happened during the examination period. In
此外,還發生了其他事件和問題。
addition, other incidents and problems were
assigned handlers and recorded.
分配處理程序並記錄。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
"Working Handbook for Emergency",
"應急工作手冊",
which is stated that first to evaluate the
指出首先評估
degree of the event then proceed to
事件的程度然後繼續進行
emergency incident process according to
根據緊急事件程序
the level.
According to the factors such as the
根據諸如
occurrence institution, occurrence time,
發生機構、發生時間,
influence scope and business type of the
影響範圍和業務類型
abnormal accident, and referring to the
異常事故,並指涉到
Inspected the latest version of "Working Handbook
for Emergency" was signed by the chief executive
緊急情況"由首席執行官簽署
officer on December 7th, 2022.
於 2022 年 12 月 7 日。
Inspected "Incidents and Problems Summary List",
檢查“事件和問題摘要清單”,
there were no incidents and problems of FBIS
在考試期間沒有發生 FBIS 的事件和問題。
happened during the examination period. In
此外,還發生了其他事件和問題。
addition, other incidents and problems were
recorded and didn't reach information security
記錄並未達到資訊安全
incident level. 事件等級。
No exceptions noted. 未發現任何例外。
Confidential 機密
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
classification method of the information
資訊的分類方法
security incident notification and
安全事件通知和
response measures, the organization
响应措施,组织
classifies security incidents into four
将安全事件分类为四种
levels according to the severity, namely,
根據嚴重程度分為不同級別,即
"level 4", "level 3", "level 2" and "level 1".
"第 4 級"、"第 3 級"、"第 2 級"和"第 1 級"。
The organization has established the
組織已建立
"Working Handbook for Emergency",
"應急工作手冊",
which is stated that the company
公司聲明
organize an emergency react team to
組織一支緊急應變小組
recover to normal operation status as
恢復正常運作狀態
soon as possible and follow procedure to
盡快並按照程序進行
prevent the spread of incident and
預防事件擴散並
mitigate impact. 減輕影響。
Inspected the latest version of "Working Handbook
for Emergency" was signed by the chief executive
緊急情況"由首席執行官簽署
officer on December 7th, 2022.
於 2022 年 12 月 7 日。
Inquired of responsible person to realize If the FBIS
向負責人詢問以了解是否為 FBIS。
- External Confirmation fails and cannot be
- 外部確認失敗且無法在短時間內恢復,影響應通過業務處理來減輕,並且
recovered in a short time, the impact shall be
mitigated by business processing, and the
emergency handling methods of the company's
公司的緊急應對方法
business shall be informed to the participating units
應通知參與單位的業務
through telephone, fax, e-mail and other
通過電話、傳真、電子郵件等方式
transmission modes, and relevant information shall
傳輸模式和相關信息應同時記錄。
be recorded at the same time.
應同時記錄。
Inspected "Incidents and Problems Summary List",
檢查“事件和問題摘要清單”,
there were no system failure of FBIS occurs during
在考試期間,FBIS 沒有出現系統故障。
the examination period. In addition, other system
此外,其他系統故障已處理並記錄。
failure was handled and recorded.
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
"Working Handbook for Emergency",
"應急工作手冊",
which is stated that follow "Notifying and
其中提到遵循"異常通知和
Handling Procedure for Abnormal
處理程序"
Incidents" to processes; as for major
將「事件」轉換為流程;至於重大事件,請參照「通報和處理重大事件程序」。
events, follow "Notifying and Handling
事件,請參照「通報和處理重大事件程序」。
Procedure for Major Event".
重大事件程序」。
Inquired of the representative of IS Department,
向 IS 部門代表詢問,
"Information System Emergency Response Team
"資訊系統應急響應小組
Rotation Table" is updated monthly.
輪值表"每月更新。
Inspected a selection of the information system
檢查了一些資訊系統
emergency response team rotation tables to
緊急應變小組輪班表以
determine that the table include telephone numbers
確定該表格包括電話號碼
of internal and external informer.
內部和外部通報者。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
"Business Continuity Plan", which is
"業務持續計劃",即
stated the recovery procedure after the
發生事故後的恢復程序。
incident occurs. 事故發生後的恢復程序。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the latest version of "Business Continuity
審查了 2022 年 6 月 7 日首席執行官簽署的最新版本的“業務持續計劃”。
Plan" was signed by the chief executive officer on
June 7th, 2022.
Inspected the business continuity operation exercise
審查業務連續性操作演練計劃和記錄,執行了演練計劃
plan and records, exercise plan was performed and
和記錄,執行了演練計劃
recorded.
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
"Working Handbook for Personal
《個人工作手冊》
Information Breach Incidents", which is
"信息泄露事件",應
stated related units should take actions
要求相關單位採取行動
toward the incident and simulate the
面對事件並模擬
explanation script for contacting related
聯繫相關方的解釋腳本
parties, and assist the communication to
,並協助與外部的溝通;
outsiders; and which is also stated that
同時也指出
trained in/external expert are responsible
外部專家負責培訓
for colllecting evidence, analysis and
收集證據、分析和
evaluate the scope of influence.
評估影響範圍。
Inspected the latest version of "Working Handbook
for Personal Information Breach Incidents" was
對於個人信息泄露事件"
signed by the vice chief executive officer on January
副首席執行官於一月簽署
4th, 2021.
Inspected "Incidents and Problems Summary List",
檢查“事件和問題摘要清單”,
there were no personal information breach incidents
在檢查期間沒有個人資訊遭到侵犯的事件
of FBIS happened during the examination period. In
發生了 FBIS 的事件
addition, there were no personal information breach
此外,在檢查期間沒有個人資訊違規
incidents of other systems happened.
其他系統發生的事件。
Inspected "Minutes of Personal Information Intrusion
審查了“個人信息侵入會議記錄”。
Drill Review Meeting", drills of personal information
審查了個人信息演練回顧會議,演練。
breach incidents were performed and recorded.
違反事件已執行並記錄。
No exceptions noted. 未發現任何例外。
CC7.5
The entity identifies,
develops, and 發展,以及
implements activities to
實施活動以
recover from identified 從已識別的情況中恢復
security incidents. 安全事件。
The organization has established the
組織已建立
"Business Continuity Plan", which is
"業務持續計劃",即
stated that during the restoration stage,
指出在恢復階段期間,
the main center will be recovered and
主要中心將被恢復並
back to operation. 恢復運作。
Inspected the latest version of "Business Continuity
審查了 2022 年 6 月 7 日首席執行官簽署的最新版本的“業務持續計劃”。
Plan" was signed by the chief executive officer on
June 7th, 2022.
Inspected the business continuity operation exercise
審查業務連續性操作演練計劃和記錄,執行了演練計劃
plan and records, exercise plan was performed and
和記錄,執行了演練計劃
recorded.
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
"Notifying and Handling Guidelines for
處理指南的通知和處理
Abnormal Incidents", which is stated that
"異常事件",其中指出
emergency react team leader has to
緊急應變小組負責人必須
notify risk management team for
通知風險管理小組以進行
reporting to the Audit Function when
當異常事件高於水平時向審計部門匯報
abnormal incidents were higher than level
當異常事件高於水平時向審計部門匯報
two.
In addition, "Working Guidelines for Major
此外,對於主要工作指南"
Information and Communication Incidents
資訊和通訊事件
External Notify", "Notifying and Handling
外部通知", "通知和處理
Procedure for Major Event", and
重大事件程序",和
"Working Guidelines for Homeland
祖國安全緊急通知工作指南
Security Emergency Notification", all of
,所有上述均陳述了報告程序
the above stated the reporting procedure
and channel for external incident.
以及外部事件的渠道。
Inspected "Incidents and Problems Summary List",
檢查“事件和問題摘要清單”,
there were no personal information breach incidents
在檢查期間沒有個人資訊遭到侵犯的事件
of FBIS happened during the examination period. In
發生了 FBIS 的事件
addition, incidents and problems of other systems
此外,其他系統的事件和問題也沒有超過二級。
were not higher than level two.
其他系統的事件和問題也沒有超過二級。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
"Problems and Needs Management
"問題和需求管理
Operation System", which is stated that
運作系統",其中提到
the detail of everything that happened,
發生的一切細節,
response method, root cause and result
回應方法、根本原因和結果
should be recorded. 應該被記錄。
Inspected "Incidents and Problems Summary List",
檢查“事件和問題摘要清單”,
there were no personal information breach incidents
在檢查期間沒有個人資訊遭到侵犯的事件
of FBIS happened during the examination period. In
發生了 FBIS 的事件
addition, details, root cause and result of other
此外,其他事件的詳細資料、根本原因和結果
incidents and problems were recorded.
記錄了事件和問題。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
"Information Security and Personal
“信息安全和個人
Information Inspection Record", which is
信息檢查記錄”,這是
listed incident simulation made including
包括列出的事件模擬
content and time. 內容和時間。
Inspected "Minutes of Personal Information Intrusion
審查了“個人信息侵入會議記錄”。
Drill Review Meeting", drills of personal information
審查了個人信息演練回顧會議,演練。
breach incidents were performed and recorded.
違反事件已執行並記錄。
No exceptions noted. 未發現任何例外。

Change Management 變更管理

Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the"
組織已建立"
Financial Information System Change
金融信息系统变更
Management Procedure", which is stated
管理程序",其中规定
that system changes should be made in
系统变更应该在
accordance with this management
根據這個管理
procedure.
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inquired of responsible person to realize the
向負責人詢問以實現
organization uses Dimensions to control the code of
組織使用維度來控制代碼
FBIS.
Inspected a selection of the application forms to
檢查了一些應用表格
determine that changes related information was
documented, such as change start date, scheduled
change time, business type, system type, host type,
變更時間、業務類型、系統類型、主機類型
change method, scope of influence, execution
變更方法、影響範圍、執行
procedure or change data, change basis, change
程序或變更數據、變更依據、變更
demand source, application system verification
需求來源,應用系統驗證
instructions, account authorization and other
指示,帳戶授權和其他
management information. 管理資訊。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC8.1
The entity authorizes, 實體授權,
designs, develops or 設計、開發或
acquires, configures, 取得、配置、
documents, tests, 文件、測試、
approves, and 批准並
implements changes to 實施變更
infrastructure, data, 基礎設施、數據、
software, and procedures
軟體和程序
to meet its objectives.
以達到其目標。
The organization has established the
組織已建立
"Financial Information System Change
"財務信息系統更改
Management Procedure", which is set out
"管理程序",其中詳細說明了申請、審查和執行許可的程序
in detail the procedures for application
的程序
review and execution of permissions and
審查和執行許可的程序
the development process of the system
系統的開發過程
change.
The organization has established control
組織已建立控制
mechanism to implement change
機制來實施變革
management, which uses Dimensions to
使用尺寸來進行管理。
control the code of system.
控制系統的代碼。
Inspected a selection of the application forms to
檢查了一些應用表格
determine that Dimensions code changes were
確定尺寸代碼更改是
authorized.
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
"Notes on Maintenance of Business
"有關維護業務
Application System Files", which is stated
應用系統文件",如所述
the process of system file changes for
系統文件更改的過程
developers and maintenance staff.
開發人員和維護人員。
The application system of organization is
組織的應用系統
mostly changed in response to demand,
大多數情況下會根據需求進行更改,
thus the organization has established
因此組織已建立
control mechanism to implement change
控制機制來實施變革
management, which is divided into R&D,
管理,分為研發,
testing, and operation environments. The
測試和運營環境。該
R&D environment needs to be corrected
研發環境需要被更正
by checking out the code from the
通過檢查代碼來自
Dimensions. After completion, use the
尺寸。完成後,使用
test worksheet to apply for changes to
測試工作表申請更改
the operating system. 作業系統。
Inspected the "Change Management System V10",
審查了“變更管理系統 V10”,
the change process of each application is recorded
每個應用程式的變更流程被記錄。
in detail.
Inspected a selection of the application forms to
檢查了一些應用表格
determine that the forms attached with test work
的表格
sheet, demand sheet and related application system
documents.
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
"Financial Information System Change
"財務信息系統更改
Management Procedure". Under chapter
管理程序"。在第
4 rights and responsibilities, which is set
out in detail the procedures for
詳細說明程序
application review and execution of
申請審查和執行
permissions, which is stated all system
權限的程序,其中說明了所有系統
changes must be approved by the
變更必須獲得批准
"Change Schedule Review Meeting".
變更排程審查會議
Inspected the "Change Management System V10",
審查了“變更管理系統 V10”,
the detailed record of the test content and approval
測試內容和批准的詳細記錄
in the application change operation.
在應用程式變更操作中。
Inspected a selection of the application forms to
檢查了一些應用表格
determine that the form had a record of passing the
確定該表單有通過記錄
"Change Schedule Review Meeting". The "List of
"更改時間表審查會議"。"每個業務變更的操作清單"中指出
Operations for Changes in Each Business" states
每個業務變更的操作清單"中指出
the "cope of influence" and the "Change
"影響範圍"和"變更驗證說明"。
verification instructions".
驗證說明"。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the"
組織已建立"
Financial Information System Change
金融信息系统变更
Management Procedure". Under chapter
管理程序"。在第
5 operation rules, which is set out in
运营规则中,规定了
detail the development process of the
詳細描述開發過程
system change. 系統變更。
The organization has established control
組織已建立控制
mechanism to examine and directly
機制來檢查並直接
returned offline if the changes do not
如果更改不符合要求,則返回離線
meet the requirements. 滿足要求。
Inspected the "Change Management System V10",
審查了“變更管理系統 V10”,
the detailed record of the deployment change
部署變更的詳細記錄
operation content and approval.
操作內容和批准。
Inspected a selection of the application forms and
審查了一些申請表格
Dimension to determine that the form was submitted
確定表格是由申請人提交的
by the applicant, approved by the supervisor of the
並獲得主管的批准
application unit, assigned authorized personnel,
應用單位,指定授權人員,
assigned to change executive personnel, scheduled
指定更改執行人員,預定
change date and time, changed scheduled
更改日期和時間,更改預定
operations, changed command director, effective
操作、更改命令主管、有效
date of actual authorization, authorized use of
實際授權日期、授權使用
account, authorization information, track records, or
帳戶、授權資訊、追踪記錄或
recovery records, etc., must be changed before
必須在實施(在線操作)之前更改恢復記錄等。
implementation (operation on-line). FISC managed
FISC 由 CCM 和 Dimension 系統管理變更。
change by CCM and Dimension system.
由 CCM 和 Dimension 系統管理變更。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
"Financial Information System Change
"財務信息系統更改
Management Procedure". Under chapter
管理程序"。在第
5 Temporary Change Schedule, which is
5 章臨時更改計劃下,這是
stated that for those have not been
指出尚未
submitted to the "Change Schedule
提交給“變更時間表
Review Committee" for consideration in
審查委員會”審議
advance, the applicant should first
在進行申請之前,申請人應首先
confirm the content of the change,
確認變更的內容,
assess the scope of impact and the need
評估影響範圍和需求
for the change. After that, follow the
進行更改。之後,按照
formal procedures to apply.
正式程序進行申請。
Inspected "Temporary Schedule Change Request
檢查“臨時時間表更改請求”
Forms" to determine that changes were necessary
確定需要進行變更
in emergency situations, all must be applied on
在緊急情況下,所有必須適用於
paper, the scope of changes involving business
紙上,變更涉及業務範圍
operations must be approved by the operating unit
操作必须经经营单位批准
and approved by the risk management supervisor
并经风险管理主管批准
(the vice chief executive officer) before the
(副首席执行官)批准后
implementation (operation on-line) changes. There
實施(在線操作)更改。有
is no temporary change request during the audit
審計期間沒有臨時更改請求
period.
No exceptions noted. 未發現任何例外。
The organization has established control
組織已建立控制
mechanism to monitor all changes to the
監控所有對系統的更改的機制,由終端機房的數據控制團隊實施
system, which are implemented by the
系統的所有更改都是由終端機房的數據控制團隊實施的
data control team in the terminal room on
终端机房的数据控制团队负责实施对系统的所有更改
the fourth floor, with a smart audit system
配備智能審計系統的第四層
for full monitoring. 進行全面監控。
Inspected a selection of the CCTV surveillance
檢查了一部分閉路電視監視。
video records to determine that CCTV surveillance
影片記錄以確定閉路電視監控
video is available in terminal rooms.
視頻在終端機房可用。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
"Application System Development Safety
"應用系統開發安全
Operation Manual", which is stated the
操作手冊",其中記載了個人相關規範
relevant specifications for personal
information protection during the design
在設計過程中的信息保護
and development process are described
和開發過程中進行描述
in detail.
Inspected the design principles for the protection of
檢查了保護設計原則
personal data in the development of the FBIS
在開發 FBIS 程序中的個人數據
program, covering the following:
範圍包括以下內容:
1. It is forbidden to write user code (ID) and
1. 禁止寫入用戶代碼(ID)和
password or other personal-related information
密碼或其他個人相關信息
into the program module. If the user password
輸入到程序模塊。如果用戶密碼
is stored in a database, should be garbled,
存儲在數據庫中,應該被加密。
and the password transmission process must
密碼傳輸過程必須加密。
be encrypted. 2. 顯示的個人資料欄位必須經過加密。
2. The personal data fields displayed by the
relevant functions of the application system
應用系統的相關功能
should be masked based on the principle of
應根據需要-to-know 原則進行遮蔽
need-to-know, except for identity confirmation
除了身份確認外
or operational operations. If more than two
或操作操作。如果需要顯示兩個以上的個人資料欄位
columns of personal data need to be displayed
由於操作操作,個人資料
due to operational operations, personal data
由於操作操作,個人資料
access trace records should be kept.
應保留存取跟踪記錄。
Inspected the principles for the protection of
檢查了保護原則
external user login is with certificate. If the certificate
外部用戶登錄需使用證書。如果證書
confirmation fails, the user cannot log in and change
確認失敗,用戶無法登錄並更改
his password. The explanation is as follows:
他的密碼。解釋如下:
1. Corporate customers: 1. 企業客戶:
uniform in wimber and industrial the company's
公司的制服在溫伯和工業中
certificate/period certificate.
證書/期證書。
2. Accounting firm: In the new firm, FISC will
2. 會計師事務所:在新公司中,FISC 將
assist in the establishment of an administrator
協助建立管理員
account, and the system will automatically
帳戶,系統將自動
generate a password letter and send it to the
生成密碼函並發送至
client, and then the client's administrator will
客戶,然後客戶的管理員將
add other operator accounts by himself. The
自行添加其他操作員帳戶。該
release personnel use TWCA's software
釋出人員使用 TWCA 的軟體
certificate to log in and conduct transactions.
登錄和進行交易的證書。
3. Bank: Operators must use TWCA's exclusive
3. 銀行:操作人員必須使用 TWCA 的專用
hardware certificate (chip card) to log in and
硬件證書(芯片卡)登錄和
conduct transactions. 進行交易。
No exceptions noted. 未發現任何例外。

Risk Mitigation 風險緩解

Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
"Financial Blockchain Information Inquiry
"金融區塊鏈信息查詢
Operation Plan". Under chapter 4,
運營計劃"。在第 4 章下,
Section 6, "Risk Control Measures",
第 6 節,“風險控制措施”,
which is stated that mechanisms for
記載了系統備份、數據備份和
system backup, data backup, and
function recoovery in order to prevent the
為了防止數據丟失或由此造成的嚴重影響
serious impact caused by the loss of data
或因操作中斷而進行功能恢復
or the interruption of operation due to
進行操作恢復
system failure and the establishment of a
系統故障和建立備份機制確保系統正常運作。
backup mechanism ensures the normal
備份機制確保系統正常運作。
operation of the system.
系統的正常運作。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the current system operation architecture,
審查了當前系統運作架構,
adopt the active and standby center multi-node
採用主備中心多節點
operation, and have system backup and data
運作,並具有系統備份和數據
backup mechanisms, which can indeed reduce the
備份機制確實可以降低業務中斷的風險。
risk of business interruption.
實體識別,
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
CC9.1
The entity identifies,
selects, and develops 選擇並制定
risk mitigation activities
風險緩解活動
for risks arising from
針對由於風險而產生的
potential business 潛在業務
disruptions.
The organization has established
本組織已建立
contracts with the third party or
與第三方或製造商簽訂合同以減輕風險。
manufacturers to mitigate risks.
與第三方或製造商簽訂合同以減輕風險。
For a selection of the commercial fire insurance, Inspected
對於商業火災保險的選擇,已檢查並確定包括商業火災保險和
and determined it includes commercial fire insurance and
電子設備保險,涵蓋所有硬體
electronic equipment insurance, covering all hardware
equipment of Donghu, Nangang and Taichung Backup
東湖、南港和台中備用設備
Center.
No exceptions noted. 未發現任何例外。
CC9.2
The entity assesses and
實體評估
manages risks 管理風險
associated with vendors 與供應商相關
and business partners. 和商業夥伴。
The organization has established
本組織已建立
contracts with the third party or
與第三方或製造商簽訂合同以減輕風險。
manufacturers, which includes specific
製造商簽訂的合同,其中包括特定
requirements, such as scope of services
需求,如服務範圍
and product specifications, roles and
產品規格,角色和
responsibilities, compliance
責任,合規性
requirements, and service levels, etc.
需求和服務水平等。
Since there are no new projects in 2022, inspected
由於 2022 年沒有新項目,檢查了"金融區塊鏈融資系統
the "Financial Blockchain Financing System
實施項目",以確定
Implementation Project" to determine that the scope
"實施項目"以確定範圍
of services and product specifications, roles and
服務和產品規格、角色和
responsibilities, compliance requirements, service
責任、合規要求、服務
levels, supplier and business partner participation
層級、供應商和業務夥伴參與
have established specific requirements
已確立具體要求
No exceptions noted. 未發現任何例外。
The organization has established
本組織已建立
contracts with the third party or
與第三方或製造商簽訂合同以減輕風險。
manufacturers, which includes the
procedure of project management to
assess risk of project.
評估項目風險。
Since there are no new projects in 2022 , inspected
由於 2022 年沒有新項目,進行檢查。
the "Financial Blockchain Financing System
實施項目",以確定
Implementation Project" to determine that the
attached project report, statement of work, etc. have
附加的專案報告、工作聲明等
specified "Project Management" chapter.
已指定"專案管理"章節。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Security
安全的信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
The organization has established the
組織已建立
statement of work, which is stated
工作聲明,其中已述明
change terms and communication
更改條款和溝通
protocol channel, such as report or
協議通道,如報告或
meetings.
Since there are no new projects in 2022, inspected
由於 2022 年沒有新項目,檢查了"金融區塊鏈融資系統
the "Financial Blockchain Financing System
實施項目",以確定
Implementation Project" to determine that the
attached statement of work specifies the change
附加的工作聲明指定了變更
management and the project report or meeting
管理和專案報告或會議
communication.
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
statement of work, which is stated clearly
工作聲明,清楚陳述
problem-solving procedures and regularly
通過問題解決程序和定期
evaluate of contract performance through
通過評估合同履行情況
project reports or meetings.
通過項目報告或會議。
Since there are no new projects in 2022, inspected
由於 2022 年沒有新項目,檢查了"金融區塊鏈融資系統
the "Financial Blockchain Financing System
實施項目",以確定
Implementation Project" to determine that the
attached statement of work specifies problem
附加的工作聲明指定問題
solving procedures and regular evaluation of
解決程序和定期評估
contract performance through project reports or
合同履行通過項目報告或
meetings.
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
statement of work, which is stated clearly
工作聲明,清楚陳述
contract termination procedure.
合同終止程序。
Since there are no new projects in 2022, inspected
由於 2022 年沒有新項目,檢查了"金融區塊鏈融資系統
the "Financial Blockchain Financing System
實施項目",以確定
Implementation Project", the contract specifies
終止程序。
termination procedure.
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
contract, which is stated confidentiality
合同,其中規定保密性
terms meets the company's internal
條款符合公司內部
requirements and evaluated when
要求並在評估時
necessary.
Since there are no new projects in 2022 , inspected
由於 2022 年沒有新項目,進行檢查。
the "Financial Blockchain Financing System
實施項目",以確定
Implementation Project", the contract confidentiality
實施項目",合同保密
clause meets the company's internal requirements.
條款符合公司的內部要求。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
contract, which is stated protection of
合同中規定的保護
personal information terms meets the
個人信息條款符合
company's internal requirements and
公司的內部要求和
evaluated when necessary.
必要時進行評估。
Since there are no new projects in 2022, inspected
由於 2022 年沒有新項目,檢查了"金融區塊鏈融資系統
the "Financial Blockchain Financing System
實施項目",以確定
Implementation Project", the protection of personal
information is clearly regulated, and the protection
of personal information meets the company's
個人資訊的來源符合公司的
internal requirements. 內部要求。
No exceptions noted. 未發現任何例外。

Applicable Trust Services Criteria for the Availability
適用的可用性信任服務標準

The trust services criteria for the availability address the need for information and systems are available for operation and use to meet the entity's objectives. Availability refers to the accessibility of information used by the entity's systems as well as the products or services provided to its customers. The availability objective does not, in itself, set a minimum acceptable performance level; it does not address system functionality (the specific functions a system performs) or usability (the ability of users to apply system functions to the performance of specific tasks or problems). However, it does address whether systems include controls to support accessibility for operation, monitoring, and maintenance.
可用性的信任服務標準涉及確保信息和系統可供運作和使用,以滿足實體的目標。可用性指的是實體系統使用的信息以及提供給客戶的產品或服務的可訪問性。可用性目標本身並未設定最低可接受的性能水平;它不涉及系統功能(系統執行的具體功能)或可用性(用戶應用系統功能執行特定任務或問題的能力)。然而,它確保系統是否包含支持運作、監控和維護的控制。

Additional Criteria to Availability
可用性的附加標準

Trust Services Criteria for the Availability
可用性信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the "Personal Computer and Server
審查了“個人電腦和伺服器管理手冊 V8”,要求單位
Management Manual V8", the demanding unit
提交了需求申請,系統
submits a demand application, and the system
department is entrusted to handle or purchase the
部門負責處理或購買
required equipment. The allocation and
必需的設備。信息系統資源的分配和管理採用
management of information system resources adopt
共享和分享方法,並使用主動-主動
sharing and sharing methods, and use Active-Active
共享和分享方法,並使用主動-主動
architecture or a sufficient backup mechanism to
建築或足夠的備份機制以確保資源的可用性。單一設備
ensure the availability of resources. A single device
的異常或故障不影響業務
abnormality or failure does not affect business
的可用性。
services.
Considering the limited capacity due to the failure of
考慮到系統中各個元素的失敗導致容量有限,
various elements in the system, according to
根據
"Personal Computer and Server Management
個人電腦和伺服器管理
Manual V8 which establishes a system-site backup
建立系統網站備份的手動 V8
mechanism, and cooperate with
機制,並與
maintenance/change operations to actually switch to
維護/更改操作合作,實際切換至
the backup device. 備份裝置。
Besides, the "Personal Computer and Server
此外,“個人電腦和伺服器
Management Manual V8", warning standards are
管理手冊 V8”中,警告標準是
set for operating server status, resource
設置用於操作伺服器狀態、資源
performance and system messages. If an
效能和系統訊息。如果發現異常,
abnormality is found, a warning message will be
將發出警告訊息。
sent immediately to notify the equipment
立即發送以通知設備
administrator to conduct research and processing.
管理員進行研究和處理。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
A1.1
The entity maintains, 實體維護,
monitors, and evaluates 監控並評估
current processing capacity
目前的處理能力
and use of system
和系統的使用
components (infrastructure,
組件(基礎設施、
data, and software) to
數據和軟件)以
manage capacity demand 管理容量需求
and to enable the
並啟用
implementation of 實施
additional capacity to help
額外的容量以幫助
meet its objectives. 達到其目標。
The organization has established the
組織已建立
documentation "Personal Computer
文件“個人電腦
and Server Management Manual" to
和伺服器管理手冊”至
ensure and maintain the availability of
確保並維護
system.
If need, employee could use change
如有需要,員工可以使用更改
application forms, which has been
已經填寫完畢的申請表格
approved by related person in charge to
獲得相關負責人批准
change system capacity setting.
更改系統容量設定。
Trust Services Criteria for the Availability
可用性信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Finally, the "Personal Computer and Server
最後,“個人電腦和伺服器”
Management Manual V8" mentioned the equipment
"管理手冊 V8" 提到了設備
administrator will coordinate the installation of
管理員將協調安裝
performance monitoring software or use the
性能監控軟件或使用
performance monitor attached to the operating
附加到操作系統的性能監視器
system to monitor all business operation server
以監視所有業務運作伺服器系統
resources, including the use of processors, memory,
資源,包括處理器、記憶體的使用情況
disk drive usage space, etc., serve as a reference
磁盤驅動器使用空間等,作為參考
basis for system capacity planning.
系統容量規劃的基礎。
On the other side, considering that DDOS attacks
另一方面,考慮到 DDOS 攻擊
will cause network bandwidth restrictions,
將導致網絡帶寬限制,
Chunghwa Telecom's DDOS protection solution was
中華電信的 DDOS 防護解決方案是
rented by the organization.
被組織租用。
Inquired of the Information Security Group of the
向資訊安全小組詢問
Security Control Department, currently using
安全控制部門,目前使用
Chunghwa Telecom's DDOS protection solution, 3
中華電信的 DDOS 防護解決方案,3
circuits are leased throughout the company. The
公司各處都租用了電路。
maximum amount of protection for each circuit is
每條電路的最大保護量為
3Gbps. Circuit traffic usually does not pass through
3Gbps。電路流量通常不會通過
the DDOS protection zone. When a DDOS attack
DDOS 保護區域。當發生 DDOS 攻擊
occurs, after the SOC center actively detects and
之後,SOC 中心主動偵測並聯繫用戶以獲得同意(用戶傳真匯入
contacts the user to obtain consent (user fax import
)。
notice), SOC personnel will import the traffic into the
(注意),SOC 人員將在半小時內將流量導入
DDOS protection zone to mitigate the attack within
DDOS 防護區域,以減輕攻擊
half an hour, and then export the traffic to the
,然後將流量導出至
protection zone after the attack is over. In case, the
攻擊結束後的保護區。在這種情況下,
amount of attack exceeds, FISC only needs to
攻擊量超過時,FISC 只需要
purchase additional pricing for security protection.
購買額外的價格以獲得安全保護。
Tested all items including contract, change
測試所有項目,包括合同、變更
application forms and DDOS drills.
申請表格和 DDOS 演練。
A1.2
The entity authorizes, 實體授權,
designs, develops or 設計、開發或
acquires, implements, 獲取、實施、
operates, approves, 運營,批准,
maintains, and monitors 維護和監控
environmental protections,
環境保護,
software, data backup 軟體,數據備份
The organization has established the
組織已建立
documentation "Key Points for Handling
文件 "處理環境設施異常的要點"
Environmental Facility Abnormalities" to
起始:
ensure and maintain the availability of
確保並維護
system.
Inspected the "Key Points for Handling
審查了“處理環境設施異常重點 V1.8” ,發現了異常的環境事故,
Environmental Facility Abnormalities V1.8", which
該文件
identified abnormal environmental accidents,
確定了異常的環境事故,
including: air-conditioning system failure, water
包括:空調系統故障,水
damage, building/structure collapse, telephone
損壞,建築物/結構倒塌,電話
communication system failure, power supply
通信系統故障,電源供應
interruption, earthquake phenomenon [Taipei basin
中斷、地震現象 [台北盆地
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Availability
可用性信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
processes, and recovery 過程和恢復
infrastructure to meet its
基礎設施以滿足其
objectives
Relevant environmental facilities have
相關的環境設施已定期維護,以確認其設備和
been regularly maintained to confirm
可用性
the availability of their equipment and
maintain maintenance records.
維護維修記錄。
earthquake degree above 6], flood, fire, man-made
地震程度超過 6 級]、洪水、火災、人為
damage, infectious disease (Such as bird flu,
損害、傳染病(如禽流感、
malaria, plague, SARS, etc.).
瘧疾、瘟疫、非典等)。
According to the "Key Points for Handling
根據《處理環境設施異常的要點》,
Environmental Facility Abnormalities," the
organization has designed detection measures for
組織已為設計了檢測措施
different natural disaster:
不同的自然災害:
1. Air-conditioning system: Inspected "Instructions
1. 空調系統:檢查 "說明"
for Operation and Maintenance of Mechanical and
用於機械和電氣系統的運維,應對空調系統設備進行維護/檢查
Electrical Systems", the maintenance/inspection of
the air-conditioning system equipment should be
carried out in accordance with the regulations.
根據法規進行。
2. Typhoon (water disaster): inquired of General
2. 颱風(水災):向總務組組長詢問,定期檢查
Affairs Team Leader, regular inspection of the
functions of waterproof gates and pumps, and
防水閘門和泵浦的功能,以及
sandbags are available. Always pay attention to the
可用沙袋。始終注意周圍排水溝的暢通情況。
smoothness of the surrounding drainage ditch.
始終注意周圍排水溝的暢通情況。
When news of a typhoon (heavy rain) is announced,
當颱風(大雨)的消息公佈時,
the general affairs team leader is responsible for
總務組組長負責監控其移動並保持警惕。對於
monitoring its movements and being vigilant. For
example, when a land typhoon warning is issued, an
例如,當發出陸地颱風警報時,將根據隊長的指示舉行
"emergency response meeting" is held in
緊急應變會議
accordance with the instructions of the team leader
of the "emergency handling team". Then proceed
"應急處置小組"。然後按照會議決議進行
according to the meeting resolution.
3. Water damage: Inquired of general affairs team
3. 水損:詢問總務小組
leader, everyone should always pay attention to
領導者,每個人都應該時刻注意
whether there is moisture on the wall or the floor,
牆壁或地板上是否有潮濕,
and whether there are water stains on the ceiling,
以及天花板上是否有水漬,
and always pay attention to maintenance.
並始終注意維護。
4. Telephony: Inquired of general affairs team
4. 電話:向總務小組詢問
leader, the organization has signed a telephone
領導人,組織已簽署了一份電話
exchange maintenance contract to regularly
將交換維護合同定期更新
maintain the telephone communication system.
維護電話通訊系統。
5. Electricity Supply: Inquired of general affairs team
5. 電力供應:向總務部門查詢
leader, backup equipment such as uninterruptible
領導者,提供備用設備,如不間斷電源系統、發電機和油罐(可提供 7 天的運作)。
power systems, generators, and oil storage tanks
電源系統、發電機和油罐(可提供 7 天的運作)。
(available for 7 davs of oneration) are provided. and
(可提供 7 天的運作)提供。
Trust Services Criteria for the Availability
可用性信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
more than of the oil storage is fixed for
超過 的油庫儲存量已固定為
emergency needs. 緊急需求。
6. Earthquake Phenomenon: Inquired of general
6. 地震現象:一般詢問
affairs team leader, the organization conducts two
事務團隊負責人,根據消防法執行規則,組織每年進行兩次疏散演習。
evacuation drills every year in accordance with the
進行兩次疏散演習。
enforcement rules of the Fire Protection Law to
消防法執行規則
ensure that all employees are familiar with escape
確保所有員工熟悉逃生路線和集合地點,以避免疏散造成的傷亡。更高的儲物櫃
routes and assembly locations to avoid casualties
caused by evacuation. The taller storage cabinets
and bookcases in the office should be fixed, and the
辦公室的書櫃應該固定,櫥櫃門平時應該關閉,以防止櫥櫃內容物掉落
cabinet doors should be closed at ordinary times to
prevent the contents of the cabinets from falling and
causing personal injury during an earthquake.
地震期間造成人身傷害。
7. Fire: Inquired of general affairs team leader, in
7. 火災:向總務組組長詢問,
accordance with the provisions of the Fire
根據消防規定
Protection Law, formulate a fire protection plan,
保護法,制定消防保護計劃,
report it to the fire department for approval, and
向消防部門報告以獲得批准,並
execute the necessary business related to fire
執行與火災相關的必要業務
prevention management in accordance with the
根據預防管理
plan.
8. Man-made sabotage: Inquired of general affairs
8. 人為破壞:詢問總務
team leader, security personnel are equipped with a
隊長,安全人員配備了
distress system or a polico-civilian connection alarm
緊急系統或警民聯繫警報
system. Security personnel should receive
系統。安全人員應接受
education and training on "man-made sabotage"
有關"人為破壞"的教育和培訓
countermeasures on weekdays. The hall is
平日的對策。 大廳裝有紅外線防盜系統,每個
equipped with an infrared anti-theft system, each
樓層都裝有視頻監控系統,
floor is equipped with a video survillance system,
and the first and seventh floors are equipped with a
第一層和第七層均配備了玻璃震動檢測系統進行監控。
glass vibration detection system to monitor. The
人員(員工、訪客)的進出。
entry and exit of personnel (employees, visitors) is
handled in accordance with the "Working Guidelines
根據“存取控制工作指南”處理
of Access Control". The police will set up a patrol
。警方將設立巡邏哨站以阻嚇他們。
box for police nets to deter them.
警方將設立巡邏哨站以阻嚇他們。
9. Infectious diseases: Inquired of general affairs
9. 傳染病:詢問一般事務
team leader, subscribe to the "Epidemic Prevention
队长,订阅“防疫
Newsletter of the Department of Disease Control of
疾病控制部通讯稿
the Ministry of Health and Welfare, and check
衛生福利部,並檢查
relevant information on its official website to grasp
相關資訊在其官方網站上以掌握
epidemic information. 疫情資訊。
Trust Services Criteria for the Availability
可用性信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Tested the maintenance records.
測試了維護記錄。
The organization has established the
組織已建立
documentation "Emergency Response
文件“緊急應變操作點”
Operation Points" to response
"操作要點" 以回應
environmental threat events.
環境威脅事件。
During the covid-19 epidemic, the main
在新冠疫情期間,系統的主要
maintenance and operation structure of
維護和運營結構保持不變,並且
the system remained unchanged, and
the employees who are diagnosed or
被診斷出患有或處於家庭隔離中的員工應該在家工作
are in home isolation should worked
根據公司的規定,應該從家工作
from home according to the company's
从家工作
instructions. Related instructions will
指示。相關指示將
be announced in the company's
在公司的
internal epidemic prevention area.
內部防疫區域宣布。
Inquired of representative of IS Department, if the
向 IS 部門代表詢問,如果事件的發現者發現異常
discoverer of the incident discovers an abnormal
事故,原則上,事件的發現者
accident, in principle, the discoverer of the incident
事故的發現者
shall notify the manager of the general affairs group
應通知總務組的經理
of the management unit or the supervisors at all
或各級主管,並接收信息的人應
levels, and the receiver of the information shall
通知管理單位或各級主管,並接收信息的人應
immediately notify the internal personnel of the
立即通知內部人員
management unit to deal with it accordingly.
管理單位相應處理。
Inquired of representative of IS Department, if it is
向 IS 部門代表詢問,如果
discovered that the accident may cause system
發現事故可能導致系統故障後,管理部門的助理或指定人員應向團隊匯報
failure, the assistant of the management department
or its designated personnel shall report to the team
leader of the "Emergency Handling Team" in
"應急處置小組"的負責人
accordance with the provisions of the "Emergency
根據"緊急情況
Response Operation Points".
"回應操作點"。
"Employees assigned to work from home during the
"員工在家工作期間被指派到
covid-19 epidemic have been issued company
公司已發布了關於 covid-19 疫情的通知
laptops and applied for remote access rights. If
並申請了遠程訪問權限。如果
need, employees can use online meeting software
需要,員工可以使用在線會議軟件
such as Webex for online meetings.
例如 Webex 用於線上會議。
Tested all items including Emergency Handling
測試所有項目,包括緊急應對。
Team list and laptop application forms."
團隊名單和筆記本電腦應用表格。
No exceptions noted. 未發現任何例外。
The organization has established the
組織已建立
documentation "Personal Computer
文件“個人電腦
and Server Management Manual" to
和伺服器管理手冊”至
ensure and maintain the availability of
確保並維護
system.
Inquired of the member from IT Team, the main
向 IT 團隊成員詢問,主要
system hardware and software (including: host,
系統硬體和軟體(包括:主機,
server, and network communication system) are
伺服器和網路通訊系統)是
signed maintenance contracts according to actual
根據實際需求簽訂維護合同,承包商將定期進行維護。
needs, and the contractor will perform maintenance
原則上,維護工作將由承包商負責。
on a regular basis. In principle, they will be
processed once a month. Remote execution is not
每月處理一次。不允許遠程執行
allowed automatically transfer data to external
自動將數據傳輸到外部
maintenance vendors. 維護供應商。
Inspected the "Personal Computer and Server
審查了“個人電腦和伺服器管理手冊 V8”,要求單位
Management Manual V8", the applicant for backup
"管理手冊 V8",備份申請人填寫要求並提交備份申請
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Availability
可用性信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
requirements fills in the requirements and submits a
到備份系統
backup application to the backup system
進行備份申請
administrator (including: backup host name, backup
管理員(包括:備份主機名稱、備份
directory, scheduled start time, retention period,
目錄、預定開始時間、保留期限、
backup type, etc.). Inspected the company's
備份類型等)。檢查了公司的
business continuity operation plan and the annual
業務持續運營計劃和年度
operational impact analysis and risk assessment
運營影響分析和風險評估
operations, the RTO requirement for data backup is
運營,數據備份的 RTO 要求為
4hours, and the RPO is based on the information
4 小時,而 RPO 是基於信息
system data synchronization mechanism, which
系統數據同步機制,需要
takes about a few seconds.
大約幾秒鐘。
The current information system backup and data
目前的信息系统备份和数据
backup can meet the requirements of RTO and
备份可以满足 RTO 的要求和
RPO.
The main center regularly backs up the host backup
主要中心定期备份主机备份
data to the main center backup system (Avamar +
透過自動排程方法將數據備份到主中心備份系統(Avamar + Data Domain),
Data Domain) in an automatic scheduling method,
主中心備份系統定期複製
and the main center backup system regularly copies
the data to the backup center backup system
備份中心備份系統的數據
(Avamar + Data Domain), with data available
(Avamar + Data Domain),數據可用
throughout the process protection function.
在整個過程中保護功能。
The backup data transmission mechanism is
備份數據傳輸機制旨在從端點到端點分散和混淆數據
designed to disperse and garbled data from
設計用於從端點到端點分散和混淆數據
endpoint to endpoint (cut into Sub-File, Hash, De-
(切割成子文件,哈希,解密)
dupe and SSL transmission encryption).
重複和 SSL 傳輸加密)。
According to the "Personal Computer and Server
根據《個人電腦和伺服器管理手冊 V8》,申請備份的申請人
Management Manual V8", the applicant for backup
requirements fills in the requirements and submits a
填寫需求並提交
backup application to the backup system
備份應用程式到備份系統
administrator (including: backup host name, backup
管理員(包括:備份主機名稱,備份
directory, scheduled start time, retention period,
目錄,預定開始時間,保留期限,
backup type, etc.). 備份類型,等等)。
The backup materials are regularly processed for
備份資料定期進行處理,以進行
backup mechanism exercises, including same-site,
備份機制練習,包括同地點、
remote and database recoverv exercises.
遠端和數據庫恢復練習。
Trust Services Criteria for the Availability
可用性信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Inquired of the member from IT team that important
向 IT 團隊成員詢問重要
business data is backed up according to data
根據數據備份和恢復要求進行業務數據備份,並定期進行測試。
backup and recovery requirements, and tests are
目前,它們被處理
performed regularly. Currently, they are processed
once a year. The scenario assumes that the main
一年一度。該情景假定主要
center has a catastrophe, and the backup center
中心發生災難,備用中心
performs data recovery operations.
執行數據恢復操作。
Tested all items including contract, maintenance
測試所有項目,包括合同、維護
records, database restoration drills and backup
記錄、數據庫恢復演練和備份
mechanism exercise records.
機制練習記錄。
The organization has established two
這個組織已建立了兩個
backup centers. The distance between
備援中心。台中備援中心與
the Taichung Backup Center and the
Donghu Main Center is approximately
東湖主中心大約
140 kilometers. 140 公里。
Inquired of the member from IT team the company's
向 IT 團隊成員詢問公司的
main and backup centers are located in Taipei and
主要和備用中心位於台北和
Taichung to reduce the chance of environmental
台中,以降低環境发生的机会
threat incidents occurring simultaneously in both
同時發生的威脅事件
places.
The Taichung Remote Backup Center was leased
台中遠端備援中心被租借
from Chunghwa Post. The distance between the
自中華郵政。該中心與
Taichung Backup Center and the Donghu Main
台中備援中心和東湖主
Center is approximately 140 kilometers. In addition
中心距離約 140 公里。此外
to being used as a venue for remote backup of
除了用作遠程備份的場所
information systems and data backup, the
資訊系統和數據備份,
company's customer service center and second
公司的客戶服務中心和第二
connection management office are set up to provide
連接管理辦公室已設立,以提供
external operations related services.
與外部操作相關的服務。
Access control and environmental monitoring are in
存取控制和環境監控符合主要中心的實踐,並
accordance with the practice of the main center, and
符合
the gate on the other first floor is provided by
另一樓的大門由中華郵政提供,用於訪客登記和進出控制管理。
Chunghwa Post for visitor registration and access
中華郵政為訪客登記和進出控制管理提供服務。
control management. 中華郵政為訪客登記和進出控制管理提供服務。
According to the company's business continuity
根據公司的業務持續性
operation plan and the annual operational impact
運營計劃和年度運營影響
analysis and risk assessment operations, the RTO
分析和風險評估操作,RTO
requirement is 4 hours, and the RPO is based on
需求為 4 小時,而 RPO 基於
the information system data synchronization
資訊系統數據同步
mechanism, which takes about a few seconds.
機制,大約需要幾秒鐘。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Availability
可用性信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Analysis of interruption threats can be divided into
中斷威脅分析可分為
natural disasters (earthquake phenomena, floods,
自然災害(地震現象,洪水,
water damage, events that affect personal safety or
水災,影響個人安全或
health), man-made disasters (fires, man-made
健康的事件),人為災害(火災,人為
sabotage, terrorist attacks), and information security
破壞,恐怖襲擊),以及信息安全
(voice network communication failure, Information
(語音網絡通信故障,信息
system hardware failure, information system
系統硬件故障,信息系統
software failure, power supply interruption, air-
軟件故障,電源中斷,空調-
conditioning or water supply system failure,
空調或供水系統故障,
information security incident, etc., based on the
信息安全事件等,基於
acceptable risk level, and based on the evaluation
可接受的風險水平,並根據評估
results, propose risk response strategies and
結果,提出風險應對策略和
practices, and risk response strategies In order to
實踐,以及風險應對策略為了
transfer and business continuity, and follow this
轉移和業務連續性,並遵循這
strategy to extend the subsequent processing
延伸後續處理策略
measures, including insurance, drafting contingency
包括保險、起草應急計劃和加強控制等措施
plans and strengthening control, etc.
等等
The organization has established the
組織已建立
multi-node mode of active and standby
主備多節點模式
centers to operate, with both the same-
運作中心,同時具有相同的現場和遠程現場備份
site and remote-site backup
備份架構。根據
architecture. Depending on the
importance of the business and the
公司的重要性和
type of system, the start-up and backup
系統類型,啟動和備份
time of the backup system is
備份系統的時間
approximately 2 to 4 hours.
大約 2 到 4 小時。
Inspected the current system operating architecture.
審查了當前系統的運行架構。
Usually, it uses the multi-node mode of active and
通常,它使用主動和待機中心的多節點模式運行,
standby centers to operate, with both the samesite
待命中心運作,具有相同位置
and remote-site backup architecture. Depending on
和遠程站點備份架構。根據
the importance of the business and the type of
業務的重要性和类型
system, the start-up and backup time of the backup
系統,備份的啟動和備份時間
system is approximately 2 to 4 hours.
系統大約需要 2 到 4 小時。
The company sets up a "Response Center" in the
公司在
form of task grouping, with the general manager and
任務分組形式,由總經理和
deputy general managers acting as commanders
副總經理擔任指揮官
and deputy commanders to coordinate, supervise
和副指揮官協調、監督
and direct relevant emergency response operations;
並直接相關的緊急應變行動;
when an accident occurs and the situation is serious
當事故發生且情況嚴重
enough to declare a disaster, the commander
足以宣佈災難時,指揮官
Decided to announce the catastrophe and the first
決定宣布災難和首次
level opening of the "Contingency Center", and start
層級開放“應變中心”,並啟動
the "Business Continuity Operation Plan".
“業務持續運作計劃”。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Availability
可用性信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted 未發現任何例外情況
The organization has established the
組織已建立
documentation "Emergency Response
文件“緊急應變操作點”
Operation Points" to ensure the alerts
以確保警報
that are communicated to personnel for
與人員溝通的
analysis to identify environmental threat
進行分析以識別環境威脅
events.
1. Inquired of representative of IS Department, if
1. 詢問資訊系統部門代表,是否
the discoverer of the incident discovers an
事件的發現者發現異常事故,原則上,事件的發現者
abnormal accident, in principle, the discoverer
應通知事件的管理者
of the incident shall notify the manager of the
事件的發現者應通知管理者
general affairs group of the management unit or
管理單位的總務組或
the supervisors at all levels, and the receiver of
各級主管,以及接收者
the information shall immediately notify the
應立即通知該信息
internal personnel of the management unit to
管理單位的內部人員
deal with it accordingly.
應相應處理。
2. Inquired of representative of IS Department, if it
2. 向資訊系代表詢問,如果
is discovered that the accident may cause
發現可能導致事故
system failure, the assistant of the
系統故障的助理
management department or its designated
管理部門或其指定
personnel shall report to the team leader of the
人員應根據《緊急應對小組》的規定向小組負責人匯報
"Emergency Handling Team" in accordance
緊急應對小組
with the provisions of the "Emergency
的規定,向緊急應對小組負責人匯報
Response Operation Points".
"回應操作點"。
A1.3
The entity tests recovery
實體測試恢復
plan procedures supporting
計劃程序支持
system recovery to meet its
系統恢復以滿足其
objectives.
Every year, the business continuity
每年,業務持續性
operation exercise plan is drafted and
運作演練計劃草擬並
submitted to the management system
提交給管理系統
management review meeting to be
經營審查會議將在通過後實施。
implemented after it is passed. The
實施。
content includes situational exercises,
內容包括情境練習,
business continuity operation self-
業務持續運作自我-
exercise/remote backup system
練習/遠端備份系統
external operation, business continuity
外部操作,業務連續性
operation participation unit online
運營參與單元在線
exercise, fire notifications and
演練,火災通知和
evacuation drills, etc. The results of the
疏散演習等。演習結果將報告給相關單位的主管。
drills are reported to the supervisor of
演習結果將報告給相關單位的主管。
the relevant unit. 相關單位的主管。
Inspected the current system operating architecture.
審查了當前系統的運行架構。
Usually, it uses the multi-node mode of active and
通常,它使用主動和待機中心的多節點模式運行,
standby centers to operate, with both the same-site
具有相同站點。
and remote-site backup architecture.
和遠端備份架構。
1. Test Contingency Plan: In order to improve the
1. 測試應變計劃:為了提高
response efficiency and ability in the event of
在發生事件時的應對效率和能力。
an emergency or catastrophe, the company
突發事件或災難,公司
formulates related procedures based on the
根據每個業務的特點或重點制定相關程序
characteristics of each business or the focus
特性
of the operation, such as: "Reporting and
例如操作的來源:"報告和
handling of abnormal accidents "Key Points",
處理異常事故的"要點",
"Major Incident Reporting and Processing
重大事件報告和處理
Rules", "Homeland Security Emergency
規則", "國土安全緊急
Notification Operations Key Points" and
通知操作關鍵點"和
"Emergency Response Operations Key
"緊急應變操作關鍵
Points", standardize the reporting and
"點", 標準化報告和
handling principles of information system
資訊系統的處理原則
abnormal events and emergency handling
異常事件和緊急處理
operations, and have "Business Continuity
運營,並擁有“業務持續性
Operation Plan", "Business Continuity
運營計劃”,“業務持續性
Operation Plan Internal Operation Manual",
運營計劃內部運營手冊”,
"Business Continuity Operation Plan Contact
"業務持續運營計劃聯繫
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Availability
可用性信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Manual", "Business Continuity Operation
手冊","業務持續運營
Management Essentials", "Operation Impact
"管理要點", "操作影響
Analysis and Risk Assessment Procedures",
分析和風險評估程序",
"Business Continuity BCP related manuals
"與業務持續性相關的 BCP 手冊
such as "Operational Drills and Educational
例如"操作演練和教育訓練程序"。
Training Procedures". 2. {{0}} 每年,業務持續運作
2. Every year, the business continuity operation
2. 每年,業務持續運作
exercise plan is drafted and submitted to the
制定並提交運動計劃
management system management review
管理系統管理審查
meeting to be implemented after it is passed.
會議後實施。
The content includes situational exercises,
內容包括情境練習,
business continuity operation self-
業務持續運作自我-
exercise/remote backup system external
練習/遠端備份系統外部
operation, business continuity operation
運營,業務持續運作
participation unit online exercise, fire
參與單位線上演習,火災
notifications and evacuation drills, etc. The
通知和疏散演習等。
results of the drills are reported to the
演練結果向相關單位主管匯報。
supervisor of the relevant unit.
演練的內容涵蓋業務。
The content of the exercise covers business
演練的內容涵蓋業務。
operations, system recovery, BCP, crisis
運營、系統恢復、BCP、危機
management (reporting and media public
管理(報告和媒體公共
relations), platforms, networks, and operators.
關係),平台、網絡和運營商。
Part of the exercise is performed in a remote
部分運動在遠程進行
backup center to confirm the adequacy of
備用中心以確認遠程資源的充分性
remote resources. 
The organization has established the
組織已建立
documentation " Personal Computer
文件 " 個人電腦
and Server Management Manual " to
和伺服器管理手冊 " 以確保備份已在
ensure the back-up is tested on a
測試
periodic basis 定期基礎
1. Inspected the "Personal Computer and Server
1. 檢查了“個人電腦和伺服器
Management Manual v8", the applicant for
管理手冊 v8”,申請者為
backup requirements fills in the requirements
備份需求填寫需求
and submits a backup application to the backup
並向備份提交備份應用程序
system administrator (including: backup host
系統管理員(包括:備份主機
name, backup directory, scheduled start time,
名稱、備份目錄、預定開始時間,
retention period, backup type, etc.).
保留期限、備份類型等)。
2. The backup materials are regularly processed
2. 備份資料定期處理
for backup mechanism exercises, including
用於備份機制練習,包括
same-site, remote and database recovery
同地點、遠端和數據庫恢復
exercises.
3. Inquired of the member from IT team that
3. 向 IT 團隊成員詢問
important business data is backed up according
根據數據備份和恢復要求,重要的業務數據已經備份
to data backup and recovery requirements, and
,並定期進行測試。目前,它們
tests are performed regularly. Currently, they
正在執行。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Availability
可用性信任服務標準
Category
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
are processed once a year. The scenario
每年處理一次。情境
assumes that the main center has a
假設主要中心發生災難,備援中心進行數據恢復操作。
catastrophe, and the backup center performs
災難,備援中心進行數據恢復操作。
data recovery operations. regularly. Currently,
定期進行數據恢復操作。目前,
they are processed once a year. The scenario
每年處理一次。情況
assumes that the main center has a
假設主要中心發生災難,備援中心進行數據恢復操作。
catastrophe, and the backup center performs
災難,備援中心進行數據恢復操作。
data recovery operations.
數據恢復操作。

Applicable Trust Services Criteria for the Confidentiality
保密性的適用信任服務標準

The trust services criteria for the confidentiality address the need for information designated as confidential is protected to meet the entity's objectives. Confidentiality addresses the entity's ability to protect information designated as confidential from its collection or creation through its final disposition and removal from the entity's control in accordance with management's objectives. Information is confidential if the custodian (for example, an entity that holds or stores information) of the information is required to limit its access, use, and retention and restrict its disclosure to defined parties (including those who may otherwise have authorized access within its system boundaries). Confidentiality requirements may be contained in laws or regulations or in contracts or agreements that contain commitments made to customers or others. The need for information to be confidential may arise for many different reasons. For example, the information may be proprietary, intended only for entity personnel. Confidentiality is distinguished from privacy in that privacy applies only to personal information, whereas confidentiality applies to various types of sensitive information. In addition, the privacy objective addresses requirements regarding collection, use, retention, disclosure, and disposal of personal information. Confidential information may include personal information as well as other information, such as trade secrets and intellectual property.
保密性的信任服務標準涉及將被指定為機密的信息保護起來,以滿足實體的目標。保密性涉及實體保護被指定為機密的信息的能力,從其收集或創建開始,直到根據管理目標從實體控制中移除和清除。如果信息的保管人(例如,持有或存儲信息的實體)被要求限制其訪問、使用和保留,並將其披露限制在確定的各方(包括那些在其系統範圍內可能有授權訪問權限的人)之內,則該信息是機密的。保密性要求可能包含在法律或法規中,也可能包含在向客戶或其他人作出的承諾的合同或協議中。信息需要保持機密可能出於許多不同的原因。例如,該信息可能是專有的,僅供實體人員使用。 機密性與隱私有所區別,隱私僅適用於個人信息,而機密性則適用於各種類型的敏感信息。此外,隱私目標涉及有關個人信息的收集、使用、保留、披露和處置的要求。機密信息可能包括個人信息以及其他信息,如商業秘密和知識產權。

Additional Criteria to Confidentiality
機密性的附加標準

Trust Services Criteria for the
信任服務標準
Confidentiality Category
機密性類別
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
documentation "Financial Blockchain
文件"金融區塊鏈
Information System - External
資訊系統 - 外部
Confirmation Responding Bank Service
確認回應銀行服務
Connection Specification" and
連接規範" 和
"Financial Blockchain Information
"金融區塊鏈信息
System Requirements Function
系統需求功能
External Confirmation Front-end
外部確認前端
Transaction System Analysis
交易系統分析
Specification V1.00" to identify and
規格 V1.00" 以識別和
designate confidential information when
當收到或創建時指定機密信息
it is received or created and to
並確定其持續期限
determine the period over which the
以及确定其持续期限
confidential information is to be
機密信息應該被
retained.
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the description of the 2.2.6.1confirmation
檢查了 2.2.6.1 確認的描述
respond of "Financial Blockchain Information
回應"金融區塊鏈資訊"
System - External Confirmation Responding Bank
系統 - 外部確認回應銀行
Service Connection Specification V2", which
服務連接規範 V2",其中
mentioned that the confirmation should be
提到確認應該是
encrypted with the verification unit's exclusive
使用驗證單元的專用證書加密
certificate, because FISC doest't have a private
,因為 FISC 沒有私人
verification unit's exclusive certificate, so it cannot
驗證單元的專用證書,所以它無法
be decrypted. 被解密。
Due to the description above, so the system has no
由於上述描述,系統因此沒有
confidential information.
機密信息。
Besides, the description of the 5.5 file encryption
此外,5.5 文件加密的描述
method of "Financial Blockchain Information System
方法“金融區塊鏈信息系統
- External Confirmation Responding Bank Service
- 外部確認銀行服務
Connection Specification V2", which explained the
"連接規範 V2",解釋了
operation mechanism of encryption.
審查了 4.16.4 業務規則的描述。
Inspected the description of the 4.16.4 business rule
description of "Financial Blockchain Information
金融區塊鏈信息描述
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
C1.1
The entity identifies and
實體識別並
maintains confidential 保持機密
information to meet the
符合信息
entity's objectives related
與實體目標相關
to confidentiality. 保密性。
Trust Services Criteria for the
信任服務標準
Confidentiality Category
機密性類別
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
System Requirements Function External
系統需求功能外部
Confirmation Front-end Transaction System
確認前端交易系統
Analysis Specification V1.00", stating that "(6) The
分析規範 V1.00",指出"(6)
system must confuse the generated response files
系統必須混淆生成的響應文件
the data compression password is compressed and
數據壓縮密碼已壓縮並
downloaded to the operator's computer. The server
下載到操作員的計算機。服務器
system does not retain the clear text of the reply.
系統不保留回覆的明文。
After the compressed file is generated, the
生成壓縮文件後,
temporarily generated reply file should be deleted."
應刪除暫時生成的回覆文件。
"Final, the "'"Financial Blockchain Financing System
Implementation Project"'", which relevant
實施項目」相關
specifications of the system are on the basis of the
系統規格是基於
previous project. 先前的專案。
View the real screen of the database, the
查看數據庫的實際畫面,
information is encrypted"
資訊已加密"
C1.2
The entity disposes of
該實體處置
confidential information to
機密信息
meet the entity's objectives
達到實體的目標
related to confidentiality.
與保密有關。
The organization has established the
組織已建立
documentation "Financial Blockchain
文件"金融區塊鏈
Information System - External
資訊系統 - 外部
Confirmation Responding Bank Service
確認回應銀行服務
Connection Specification" and
連接規範" 和
"Financial Blockchain Information
"金融區塊鏈信息
System Requirements Function
系統需求功能
External Confirmation Front-end
外部確認前端
Transaction System Analysis
交易系統分析
Specification V1.00" to identify
規格 V1.00" 以識別
confidential information requiring
需要保密的信息,在到达保留期限結束時需要銷毀。
destruction when the end of the
保留期限結束時需要銷毀的機密信息。
retention period is reached.
到達保留期限時需要銷毀的機密信息。
Besides, these documentations also
此外,這些文件還描述了如何刪除或以其他方式處理機密信息
describe how to erase or otherwise
destroy confidential information that has
摧毀含有机密信息
been identified for destruction.
已被確定要銷毀。
Inspected the description of the 2.2.6.1confirmation
檢查了 2.2.6.1 確認的描述
respond of "Financial Blockchain Information
回應"金融區塊鏈資訊"
System - External Confirmation Responding Bank
系統 - 外部確認回應銀行
Service Connection Specification(V2)", which
服務連接規範(V2)",其中
mentioned that the confirmation should be
提到確認應該是
encrypted with the verification unit's exclusive
使用驗證單元的專用證書加密
certificate, because FISC doesn't have a private
,因為 FISC 沒有私人
verification unit's exclusive certificate, so it cannot
驗證單元的專用證書,所以它無法
be decrypted. 被解密。
Due to the description above, so the system has no
由於上述描述,系統因此沒有
confidential information.
機密信息。
Besides, the description of the 5.5 file encryption
此外,5.5 文件加密的描述
method of "Financial Blockchain Information System
方法“金融區塊鏈信息系統
- External Confirmation Responding Bank Service
- 外部確認銀行服務
Connection Specification", which explained the
"連接規範",解釋了加密的操作機制。
operation mechanism of encryption.
審查了 4.16.4 業務規則的描述。
Inspected the description of the 4.16.4 business rule
description of "Financial Blockchain Information
金融區塊鏈信息描述
System Requirements Function External
系統需求功能外部
Confirmation Front-end Transaction System
確認前端交易系統
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the
信任服務標準
Confidentiality Category
機密性類別
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Analysis Specification V1.00", stating that "(6) The
分析規範 V1.00",指出"(6)
system must confuse the generated response files
系統必須混淆生成的響應文件
the data compression password is compressed and
數據壓縮密碼已壓縮並
downloaded to the operator's computer. The server
下載到操作員的計算機。服務器
system does not retain the clear text of the reply.
系統不保留回覆的明文。
After the compressed file is generated, the
生成壓縮文件後,
temporarily generated reply file should be deleted."
應刪除暫時生成的回覆文件。
"Final, the "Financial Blockchain Financing System
"最終,與「金融區塊鏈融資系統
Implementation Project"'", which relevant
實施項目」相關
specifications of the system are on the basis of the
系統規格是基於
previous project. 先前的專案。
View the real screen of the database, the
查看數據庫的實際畫面,
information is encrypted"
資訊已加密"

Applicable Trust Services Criteria for the Processing Integrity
處理完整性的適用信任服務標準

The trust services criteria for the Processing Integrity address the need for system processing is complete, valid, accurate, timely, and authorized to meet the entity's objectives. Processing integrity refers to the completeness, validity, accuracy, timeliness, and authorization of system processing. Processing integrity addresses whether systems achieve the aim or purpose for which they exist and whether they perform their intended functions in an unimpaired manner, free from error, delay, omission, and unauthorized or inadvertent manipulation. Because of the number of systems used by an entity, processing integrity is usually only addressed at the system or functional level of an entity. In a SOC for Supply Chain examination, processing integrity refers to whether processing is complete, valid, accurate, timely, and authorized to produce, manufacture, or distribute goods that meet the products' specifications.
處理完整性的信任服務標準涵蓋系統處理需完整、有效、準確、及時且經授權,以滿足實體的目標。處理完整性指系統處理的完整性、有效性、準確性、及時性和授權性。處理完整性涉及系統是否實現其存在的目的或目標,以及它們是否以無誤差、延遲、遺漏和未經授權或不慎操縱的方式執行其預期功能。由於實體使用的系統數量眾多,處理完整性通常僅在實體的系統或功能層面上進行處理。在供應鏈 SOC 審查中,處理完整性指的是處理是否完整、有效、準確、及時且經授權,以生產、製造或分發符合產品規格的商品。

Additional Criteria for Processing Integrity
處理完整性的附加標準

Trust Services Criteria for the Processing
處理的信任服務準則
Integrity Category 完整性類別
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
The organization has established the
組織已建立
documentation "Financial Blockchain
文件"金融區塊鏈
Information System - External
資訊系統 - 外部
Confirmation Responding Bank Service
確認回應銀行服務
Connection Specification" and
連接規範" 和
"Financial Blockchain Information
"金融區塊鏈信息
System - External Confirmation
系統 - 外部確認
Auditing Agency Service Connection
審計機構服務連接
Specification" to identify information
規範" 以識別資訊
specifications required to support the
支持產品和服務使用所需的規格。
use of products and services.
檢查了“金融區塊鏈資訊”
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Inspected the "Financial Blockchain Information
System - External Confirmation Responding Bank
系統 - 外部確認回應銀行
Service Connection Specification(V2)" and "Financial
服務連接規範(V2)" 和 "金融
Blockchain Information System - External
區塊鏈信息系統 - 外部
Confirmation Auditing Agency Service Connection
確認審計機構服務連接
Specification(V1)", the information specification of this
規範(V1)",此系統的信息規範已被確認。
system has been identified.
系統已被識別。
About the information specification's definition, which
有關於信息規範的定義,已在“金融區塊鏈信息系統 -
has mentioned in the description of 2.3.8.1, 2.3.9 and
描述 2.3.8.1、2.3.9 和
2.3.10.1 of "Financial Blockchain Information System -
2.3.10.1”中提到。
External Confirmation Responding Bank Service
外部確認回應銀行服務
Connection Specification V2".
連接規範 V2"。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
No exceptions noted. 未發現任何例外。
Pl1.1
The entity obtains or
實體獲取或
generates, uses, and 生成,使用和
communicates relevant, 交流相關的
quality information 優質信息
regarding the objectives
關於目標
related to processing, 與處理相關,
including definitions of data
包括數據定義
processed and product and
處理和產品和
service specifications, to
服務規格,以
support the use of products
支持產品的使用
and services. 以及服務。
PI1.2
The entity implements 實體實施
policies and procedures 政策和程序
over system inputs, 通過系統輸入,
including controls over 包括對控制的控制
completeness and 完整性和
accuracy, to result in
準確性,以結果為導向
products, services, and 產品、服務和
reporting to meet the
報告以滿足
entity's objectives. 實體的目標。
The organization has established the
組織已建立
documentation "Financial Blockchain
文件"金融區塊鏈
Information System - External
資訊系統 - 外部
Confirmation Responding Bank Service
確認回應銀行服務
Connection Specification" and
連接規範" 和
"Financial Blockchain Information
"金融區塊鏈信息
System - External Confirmation
系統 - 外部確認
Auditing Agency Service Connection
審計機構服務連接
Specification" to satisfied following
滿足以下規範"
reauirements: 需求:
Inspected "Financial Blockchain Information System
檢查“金融區塊鏈信息系統"
Requirements Function External Confirmation Front-
需求功能外部確認前端交易系統分析規格 V1.00"
end Transaction System Analysis Specification V1.00"
基於「金融區塊鏈資訊」的系統分析規格 V1.00"
has been based on "Financial Blockchain Information
已經完成。
System - External Confirmation Responding Bank
系統 - 外部確認回應銀行
Service Connection Specification(V2)" and "Financial
服務連接規範(V2)" 和 "金融
Blockchain Information System - External
區塊鏈信息系統 - 外部
Confirmation Auditing Agency Service Connection
確認審計機構服務連接
Specification(V1)" defines the "input" characteristics of
"規範(V1)" 定義了處理的 "輸入" 特性
processina.
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Processing
處理的信任服務準則
Integrity Category 完整性類別
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
1. Identify information specifications
1. 確定滿足需求所需的信息規範
required to meet requirements are
2. 評估處理輸入以滿足
defined.
2. Evaluate the processing inputs for
compliance with defined input
符合定義的輸入
requirements.
3. Ensure the records of system input
3. 確保系統輸入的記錄
activities are created and maintained
活動被創建並維護
completely and accurately in a timely
及時完全準確地
manner.
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
About the data store in "input" process, which has
關於“輸入”過程中存儲的數據,其中包含
mentioned in the description of 4.8 of "Financial
在“財務”4.8 的描述中提到
Blockchain Information System - External
區塊鏈信息系統 - 外部
Confirmation Responding Bank Service Connection
確認銀行服務連接
Specification V2". 規格 V2"。
Inspected the testing result, since the specific field
檢查了測試結果,由於特定字段不能為空且格式已定義,警報
could not be null and the format is defined, the alarm
訊息設計為提醒用戶必須存在
message is designed to remind user must is there's
any data incorrect. 任何數據不正確。
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Pl1.3
The entity implements 實體實施
policies and procedures 政策和程序
over system processing to
通過系統處理到
result in products, services,
產品、服務的結果,
and reporting to meet the
並進行報告以滿足
entity's objectives. 實體的目標。
The organization has established the
組織已建立
documentation "Financial Blockchain
文件"金融區塊鏈
Information System - External
資訊系統 - 外部
Confirmation Responding Bank Service
確認回應銀行服務
Connection Specification" and
連接規範" 和
"Financial Blockchain Information
"金融區塊鏈信息
System - External Confirmation
系統 - 外部確認
Auditing Agency Service Connection
審計機構服務連接
Specification" to satisfied following
滿足以下規範"
requirements: 需求:
1. Ensure the processing specifications
1. 確保符合處理規格
that are necessary to meet product or
產品或需求的必要条件
service requirements are defined.
定義了服務需求。
2. Ensure the processing activities are
2. 確保處理活動被確定為
defined to result in products or services
以產品或服務為結果進行定義
that meet specifications.
符合規格的。
3. Ensure the errors in the production
3. 確保生產過程中的錯誤被檢測並更正。
process are detected and corrected in a
timely manner. 及時。
4. Ensure the system processing
4. 確保系統處理
activities are recorded completely and
活動被完整記錄並
accurately in a timely manner.
準確及時地。
5. Ensure the inputs are processed
5. 確保輸入被處理
completely, accurately, and timely as
完全、準確且及時地。
authorized in accordance with defined
根據已定義的授權
processing activities. 進行處理活動。
The system has established a fool-
系統已建立了一個愚人
proof mechanism for input data when
輸入數據時的驗證機制
inputting relevant information from the
從相關信息輸入時
Inspected "Financial Blockchain Information System
檢查“金融區塊鏈信息系統"
Requirements Function External Confirmation Front-
需求功能外部確認前端交易系統分析規格 V1.00"
end Transaction System Analysis Specification V1.00"
基於「金融區塊鏈資訊」的系統分析規格 V1.00"
has been based on "Financial Blockchain Information
已經完成。
System - External Confirmation Responding Bank
系統 - 外部確認回應銀行
Service Connection Specification V2" and "Financial
服務連接規範 V2" 和 "金融
Blockchain Information System - External
區塊鏈信息系統 - 外部
Confirmation Auditing Agency Service Connection
確認審計機構服務連接
Specification V1" defines the "input" characteristics of
規範 V1" 定義了 "輸入" 特性
processing.
About the data store in "data processing" process,
關於在 "數據處理" 過程中存儲的數據
which has mentioned in the description of 4.8 of
在 4.8 的描述中提到了
"Financial Blockchain Information System - External
"金融區塊鏈信息系統 - 外部
Confirmation Responding Bank Service Connection
確認銀行服務連接
Specification V2". 規格 V2"。
As for the inputs are processes completely, accurately
至於輸入是完全、準確且及時進行處理,並獲得授權,這已在
and timely as authorized, which has mentioned in the
中提到。
description of 5.3 of "Financial Blockchain Information
《金融區塊鏈信息系統 - 外部確認銀行服務連接規範 V2》5.3 描述
System - External Confirmation Responding Bank
系統 - 外部確認回應銀行
Service Connection Specification V2".
服務連接規範 V2
View the evidence screen of the system's fool-proof
查看系統的防範機制證據屏幕
mechanism and the real screen of the database, the
和數據庫的真實屏幕,信息已加密
information is encrypted
No exceptions noted 未發現任何例外情況
Confidential 機密
Trust Services Criteria for the Processing
處理的信任服務準則
Integrity Category 完整性類別
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
confirmation inquiry and reply to unit.
確認查詢和回覆單位。
The relevant data processing and
相關的數據處理和
transmission process will exist in the
傳輸過程將以證書的形式存在於
system in the form of certificate
系統中
encryption, and the system will not
加密,系統將不會
keep a temporary file after the data
在數據傳輸完成後保留臨時文件
transmission is completed.
完成傳輸。
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Pl1.4
The entity implements 實體實施
policies and procedures to
政策和程序
make available or deliver
使可用或交付
output completely, 完全、
accurately, and timely in
準確且及時地
accordance with 根據
specifications to meet the
符合規格以滿足
entity's objectives. 實體的目標。
The organization has established the
組織已建立
documentation "Financial Blockchain
文件"金融區塊鏈
Information System - External
資訊系統 - 外部
Confirmation Responding Bank Service
確認回應銀行服務
Connection Specification" and
連接規範" 和
"Financial Blockchain Information
"金融區塊鏈信息
System - External Confirmation
系統 - 外部確認
Auditing Agency Service Connection
審計機構服務連接
Specification" to satisfied following
滿足以下規範"
requirements: 需求:
1. Ensure the output is protected when
1. 確保輸出在存儲或交付時受到保護,以防止
stored or delivered, or both, to prevent
被竊取、破壞、損壞或
theft, destruction, corruption, or
任何其他形式的損害。
deterioration that would prevent output
會導致輸出不符合規格的惡化。
from meeting specifications.
3. 確保輸出是分佈的或
2. Ensure the output is distributed or
2. 確保輸出是分佈的或
made available only to intended parties.
只提供給預定的各方。
3. Provide for the completeness,
3. 確保完整性,
accuracy, and timeliness of distributed
準確性和分發的及時性。
output.
4. Ensure the records of system output
4. 確保系統輸出的記錄
activities are created and maintained
活動被創建並維護
completely and accurately in a timely
及時完全準確地
manner.
Inspected "Financial Blockchain Information System
檢查“金融區塊鏈信息系統"
Requirements Function External Confirmation Front-
需求功能外部確認前端交易系統分析規格 V1.00"
end Transaction System Analysis Specification V1.00"
基於「金融區塊鏈資訊」的系統分析規格 V1.00"
has been based on "Financial Blockchain Information
已經完成。
System - External Confirmation Responding Bank
系統 - 外部確認回應銀行
Service Connection Specification(V2)" and "Financial
服務連接規範(V2)" 和 "金融
Blockchain Information System - External
區塊鏈信息系統 - 外部
Confirmation Auditing Agency Service Connection
確認審計機構服務連接
Specification(V1)" defines the "input" characteristics of
"規範(V1)" 定義了處理的 "輸入" 特性
processing.
About the data store in "output" process, which has
有關於“輸出”過程中存儲的數據
mentioned in the description of 4.8 of "Financial
在“財務”4.8 的描述中提到
Blockchain Information System - External
區塊鏈信息系統 - 外部
Confirmation Responding Bank Service Connection
確認銀行服務連接
Specification V2". 規格 V2"。
As for the outputs are processes completely,
至於輸出是否完全處理完成,
accurately and timely to meet specifications, which
準確且及時地符合規格
has mentioned in the description of 5.3 of "Financial
在“財務
Blockchain Information System - External
區塊鏈信息系統 - 外部
Confirmation Responding Bank Service Connection
確認銀行服務連接
Specification V2". 規格 V2"。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Processing
處理的信任服務準則
Integrity Category 完整性類別
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
Pl1.5
The entity implements 實體實施
policies and procedures to
政策和程序
store inputs, items in
存儲輸入,項目
processing, and outputs 處理和輸出的描述中提到
completely, accurately, and
完全、準確且
timely in accordance with
及時地按照
system specifications to
系統規格進行
meet the entity's 遇見實體的
objectives.
The organization has established the
組織已建立
documentation "Financial Blockchain
文件"金融區塊鏈
Information System - External
資訊系統 - 外部
Confirmation Responding Bank Service
確認回應銀行服務
Connection Specification" and
連接規範" 和
"Financial Blockchain Information
"金融區塊鏈信息
System - External Confirmation
系統 - 外部確認
Auditing Agency Service Connection
審計機構服務連接
Specification" to satisfied following
滿足以下規範"
requirements: 需求:
1. Ensure the stored items are
1. 確保存儲的物品
protected to prevent theft, corruption,
受到保護,以防止被竊取、損壞,
destruction, or deterioration that would
破壞或惡化可能會
prevent output from meeting
阻止輸出符合
specifications.
2. Ensure the system records are
2. 確保系統記錄是
archived and archives are protected
存檔和檔案受到保護
against theft, corruption, destruction, or
免受盜竊、損壞、破壞或
deterioration that would prevent them
使它們無法被保存的惡化
from being used. 從被使用。
3. Provide for the complete, accurate,
3. 提供完整、準確且及時的數據存儲。
and timely storage of data.
資料的完整、準確和及時存儲。
4. Ensure the records of system
4. 確保系統存儲活動的記錄完整且準確
storage activities are created and
創建和維護系統存儲活動的記錄
maintained completely and accurately
完全且準確地維護
in a timely manner.
及時。
Inspected "Financial Blockchain Information System
檢查“金融區塊鏈信息系統"
Requirements Function External Confirmation Front-
需求功能外部確認前端交易系統分析規格 V1.00"
end Transaction System Analysis Specification
結束交易系統分析規格。
V1.00," were developed based on "Financial
V1.00,是基於"財務"開發的。
Blockchain Information System - External
區塊鏈信息系統 - 外部
Confirmation Responding Bank Service Connection
確認銀行服務連接
Specification(V2)" and "Financial Blockchain
規範(V2)" 和 "金融區塊鏈
Information System - External Confirmation Auditing
信息系統 - 外部確認審計
Agency Service Connection Specification(V1)"
機構服務連接規範(V1)"
As for how to ensure the data completely and
關於如何確保數據完整和
accurately, which has mentioned in the description of
準確性,這已在“金融區塊鏈信息系統-描述中提到
5.3 of "Financial Blockchain Information System -
5.3”。
External Confirmation Responding Bank Service
外部確認回應銀行服務
Connection Specification V2".
連接規範 V2"。
Inspected "Financial Blockchain Information System -
審核"金融區塊鏈信息系統 - 外部確認銀行服務"和
External Confirmation Responding Bank Service" and
確認審計機構服務 V1" 使用 MS
"Financial Blockchain Information System - External
"金融區塊鏈信息系統 - 外部
Confirmation Auditing Agency Service V1" use MS
SQL database system to satisfy following
滿足以下條件的 SQL 數據庫系統
requirements: 需求:
1. Store and protect "system records"
1. 存儲和保護“系統記錄”
2. Store data completely and accurately.
2. 完整準確地存儲數據。
3. Create and maintain "system storage operation
3. 創建並維護“系統存儲操作
records".
Inquired the responsible staff of MS SQL database,
查詢 MS SQL 數據庫的負責人員,
FISC uses online instant remote backup in Taichung
FISC 在台中使用在線即時遠程備份
to protect DB system files. Also, physical isolation and
保護資料庫系統檔案。同時實施物理隔離和
access controls are implemented. For privileged
存取控制。對於特權
account, the application is required.
帳戶,應用程式是必需的。
Inspected the "Open Host SQL Server Database
檢查了“開放主機 SQL Server 資料庫
Routine Maintenance Checklist", and the daily
常規維護檢查表”,以及每日
database management personnel perform the
數據庫管理人員執行
following tasks: 以下任務:
1. View the execution status of all database server
1. 查看所有資料庫伺服器的執行狀態
SQL Server services. SQL Server 服務。
No exceptions noted. 未發現任何例外。
Trust Services Criteria for the Processing
處理的信任服務準則
Integrity Category 完整性類別
Description of FISC Service
FISC 服務描述
Organization's Controls 組織的控制
Service Auditor's Tests of Controls
服務稽核師對控制措施的測試
Results of Service 服務結果
Auditor's Tests of 審計師的測試
Controls
2. View the execution status of all database servers
2. 查看所有資料庫伺服器的執行狀態
SQL Server agent services.
SQL Server 代理程式服務。
3. View the error log file of the database server.
3. 查看資料庫伺服器的錯誤記錄檔。
4. View the database host system events.
4. 查看資料庫主機系統事件。
5. Check the execution status of database backup.
5. 檢查資料庫備份的執行狀態。
6. Check the available space of the database server
6. 檢查資料庫伺服器的可用空間。
disk.
7. Check the available space of the database.
7. 檢查數據庫的可用空間。
8. View the execution status of scheduled
8. 查看數據庫伺服器上預定操作的執行狀態。
operations on the database server.
Inspected the "Open Host SQL Server Database
檢查了“開放主機 SQL Server 資料庫
Routine Maintenance Checklist", and the database
常規維護檢查表”,以及資料庫
administrators perform the following tasks every
管理員每隔
week:
1. Perform a database integrity check.
1. 執行資料庫完整性檢查。
2. Perform database index optimization operations.
2. 執行資料庫索引優化操作。
3. Update and review of database statistics.
3. 更新並審查資料庫統計資料。
4. View the growth attributes of database files.
4. 查看資料庫檔案的成長屬性。
Monthly database management personnel perform
每月資料庫管理人員執行
patch installation requirements review.
安裝補丁的需求審查。
Rehearse the database restoration exercise at least
每季至少排練一次數據庫恢復演習。
once everv season. 每季至少排練一次。