Operational Guidelines For Open Banking in Nigeria
Operational Guidelines For Open Banking in Nigeria
Operational Guidelines For Open Banking in Nigeria
Classified as Confidential
Contents
AC API Consumer
AP API Provider
CM Configuration Management
FI Financial Institution
IM Information Management
MLS Message Level Security. In the context of this document, this refers to
Message Signing.
Participants in open banking shall adhere strictly to security standards when accessing
and storing data, and shall be subject to minimum privacy, operational, customer
experience and risk management standards as prescribed by the Bank.
4.0 SCOPE
The Guidelines apply to banking and other related financial services as categorised and
determined by the Bank in the Regulatory Framework for Open Banking in Nigeria.
4.1 PARTICIPANTS
Given the open banking regulation, any organisation that has data of customers which
may be exchanged with other entities for the purpose of providing innovative financial
services within Nigeria, shall be eligible to participate in the Open Banking ecosystem.
Access Level by Data and Service Category shall be as specified in Section 5.1 of the
Regulatory Framework for Open Banking in Nigeria.
Entities participating in Open banking shall be categorised based on the following roles.
Participants shall assume a role depending on the services:
i. API Provider (AP): This refers to a participant that uses API to avail data or service
to another participant. An API Provider can be a licensed financial
institution/service provider, a Fast-Moving Consumer Goods (FMCG) Company or
other retailers, Payroll Service Bureau etc.
ii. API Consumer (AC): This refers to a participant that uses API released by the
(API) providers to access data or service. An API Consumer can be a licensed
financial institution/service provider, an FMCG or other retailers, Payroll Service
Bureau etc.
5.0 OBJECTIVES
The Open Banking Operational Guidelines:
The OBR shall maintain an API interface, defined within these guidelines, which shall
serve as the primary means by which API providers manage the registration of their API
consumers.
6.2.1 The Bank shall provide data oversight and governance for open banking information
assets for participants in the open banking arrangement to ensure compliance with
relevant legal and regulatory provisions.
6.2.2 Notwithstanding the provisions in 6.2.1 above, all participants shall be guided by all
extant laws relating to data protection, consumer rights and fair practices.
The provisions guiding consent management are as contained in the API Standards
Document (Appendix I) and other corresponding sections of Customer Experience
(Appendix IV).
i. Operations involving movement of funds within the API provider’s domain shall
be recorded at the account level of the API consumer involved
ii. Metrics used for billing shall be definitively agreed and included in the SLA
iii. Separate principal and fee-collection accounts shall be maintained.
All participants shall state the fees in the SLA and publicly disclose on their websites
and applications.
Participants shall implement event-triggered billing systems where the bills are easily
traceable to the activity performed per transaction.
The details, roles and responsibilities of sponsored participants and direct third parties
shall be included in the contract and the sponsoring participant shall be responsible for
the execution and performance of the contract.
ii. Collect performance metrics for all API transactions - these metrics shall be
frequently stored.
iii. Implement monitoring processes that alert (visually or otherwise) first-level support
personnel to identify suspicious and critical level occurrences.
i. Determine the scope and impact of the incident and notify API
providers/consumers relying on services via the recommended communication
channel;
iv. Evaluate the cost efficiency of the failover compared with the loss experienced
from the incident; and
iii. Publish performance metrics in the Meta Directory under the Get Performance API
call
iv. Record individual API performance metrics with at most 5-minute intervals
between data points. Any interval missed is assumed to be downtime except within
a period coinciding with a scheduled change or maintenance activity
vi. Publish the KPIs on the open banking portal which shall be available to the public
without requiring any token, cookies, etc.
vii. APs shall send a summarized monthly report to the Bank using the Open
Banking registry API interface.
The following types of performance information, at the minimum, are required from all
APIs published by API providers:
# Metric Description
2 network_proc_time Network processing time i.e. time between the timestamp in the
request message and the timestamp on the API server at the
time of receipt.
11 %_approved Relates to messages that achieved the function for which the
call was made.
APs shall provide API availability metrics which include metrics collected:
8.4.2 The threshold for failover and fail-back procedures is 30 minutes of downtime.
i. Possibility of in-flight data loss and if such losses occur, the viability of
recovery procedures to maintain integrity
ii. If replication is employed to maintain redundant processing infrastructure,
a. the replication time-lag between OLTP systems and on the average, the
nature and quantity of data processed in that timeframe; and
b. the replication time-lag from OLTP to OLAP systems.
i. Made available to Regulators, Auditors, Risk and Control teams within the
organization; and
ii. The software architectural style shall be Representational state transfer (REST)
while the data interchange format shall be JavaScript Object Notation (JSON)
The platform shall be required to accommodate text, voice, and video conferencing
modes of communication to support various scenarios.
In addition, formal channels (such as help and support systems or ticketing solutions)
shall be used for incident reporting and management.
For the avoidance of doubt, emails are not a sufficient method of incident management
for the Open Banking system.
i. API Performance levels for the month and previous Fiscal Year months or
previous quarter;
ii. Metrics grouped into the following three API categories: Registration, Meta-
Data and Transact APIs;
iii. Statistics of incidents/problems, SLA compliance and aggregate impact in
downtime or loss of service;
iv. Number and category of Fraud and Disputes with accompanying SLA
performance;
v. Excerpts of the problem register indicating new, existing and resolved
problems;
vi. Changes made, reason (in sufficient detail), timing and estimated impact; and
vii. Changes scheduled for the next month and potential impact.
The policy shall ensure that all aspects of the data is well managed and fulfil legal and
regulatory requirements.
The AP/AC shall incorporate the following into its Data governance policy, procedures
and mechanisms:
b. Generate fair and accurate reports for both the customers and society
i. Prevent:
Operate regular risk assessment and risk monitoring in order to anticipate
potential data threats, hazards and impacts.
ii. Prepare:
Ensure that the procedures for managing data incidents are clearly set out,
together with clear roles and responsibilities, lines of escalation and
communication for all parties involved in risk management procedures.
iv. Contain:
Activate the relevant processes and procedures to limit the impact of the incident.
v. Communicate:
Ensure that all relevant parties receive efficient, regular and timely
communication in the event of a data incident.
vi. Review:
Conduct a robust analysis of the underlying cause of the incident, the efficacy of
the incident response, the lessons learned, and the actions required to prevent
future similar incidents.
vii. Recover:
Start the recovery process to ensure minimal disruption to service delivery.
viii. Test:
Regularly test adherence to the Incident Management Policy and associated
Incident Management Procedures to ensure their adequacy and effectiveness.
APs/ACs shall comply with the Technical Security Standards as provided in the Security
Standards (Appendix III)
9.3.3.3 CYBERSECURITY
i. Volume of transactions
ii. Value of transactions
iii. Number of users
iv. Success rates
v. Failure rates
vi. Security incidents
vii. Fraud incidents
viii. Downtime reports
ix. Any other requirements as the CBN shall determine from time to time.
9.6 TESTING
The Bank shall oversee testing procedures in the open banking ecosystem, while
APs/ACs shall provide appropriate facilities for testing, both at initial launch and through
subsequent changes.
i. identify a designated alternative site, critical roles, critical systems and access
requirements, and a communication strategy for staff, external suppliers and other
stakeholders;
iii. specify protocol for call cascades, text messages or a simple call recording to notify
staff to relocate to alternate site.
Authentication of end-users and the validation of information to be shared with the ACs
shall be done directly by the AP using the prescribed authentication mechanism within
the API Security and Risk Management Standards.
For consent obtained from a customer to be valid, the following information shall be
presented to the customer by the AC:
If the customer’s data will be disclosed to an outsourced service provider including non-
Nigerian participants, the approval of the Bank shall be obtained, and the following
additional information shall be required:
a. A statement indicating that the data would be used or disclosed in such manner;
b. Sufficient information about the data handling/privacy policy of the service
provider; and
c. A guarantee that the customer can obtain further information about such
disclosures from the policy or on request to the participant, if they so wish.
11.2 VERIFICATION OBLIGATION
When the AP receives customer’s consent to provide customer’s data to an AC, it shall
verify that:
i. the consent emanated from its customer: This shall require Two Factor
Authentication (2FA) of the customer to verify the consent.
ii. the request for customer’s data contains the purpose of the request.
iii. the request contains the credentials of the requesting AC.
iv. the request contains a valid date and was made through appropriate channels.
11.3 DIGITAL SIGNATURES
i. Upon due verification, the AP shall create a token which shall reflect the details
of the rights granted to the AC by the customer.
ii. The token shall be encrypted and securely exchanged with the AC.
iii. All responses of the AP shall be in real-time.
i. A regular reporting mechanism shall be established, to ensure that APs and ACs
provide the competent authorities, on a regular basis, with an updated assessment
of security risks and the measures taken;
ii. Application for authorisation or accreditation of payment institutions shall be
accompanied by a description of the procedure to monitor, handle and follow up
on security incident and security-related customer complaints, including incident
reporting mechanism;
iii. There shall be a risk management framework specifying:
a. Technology risk management framework;
b. System security, reliability, resiliency, and recoverability; and
c. Strong authentication to protect access to customer data and systems.
a. Without undue delay, notify the CBN and other relevant stakeholders, of the
incident and remediating measures; and
b. Upon receipt of the notification, the CBN and other stakeholders shall assess the
incident with respect to the ecosystem and where appropriate, take necessary
measures to protect safety and stability of the financial system.
11.8 INCIDENT REPORTING PORTAL
i. An incident reporting portal shall be introduced to enable easy and fast reporting
by participants in the ecosystem.
ii. Reportable incidents under this heading shall include incidents that;
a. Affect participants, operations, and the systems; and
b. Any other incident as may be determined by the CBN through relevant
regulations and guidelines.
11.9 DATA BREACH POLICY AND PROCEDURE
i. APs/ACs shall develop and implement a data breach policy and procedure as part
of information security management system to;
a. Carry out regular risk assessment and monitoring;
ii. The Data Incident Management Procedure must apply to and shall be followed by
all workers, in any capacity, including employees, contractors, directors, external
consultants, third party representatives, business partners, etc.
iii. The Data Incident Management Procedure shall run concurrently as follows:
Participants shall abide by the dispute resolution mechanism laid down under “Liability
Management, Customer Complaint and Redress Management” of the Customer
Experience Standards (Appendix IV) as well as the CBN Consumer Protection
Framework.
The Bank shall approve appropriate liability models and redress mechanisms, (such as
insurance, collateral requirements, pool industry funds etc.) for participants.
API Identification,
Categorization and Risk Matrix Appendix 1.xlsx
Click on link to access the information: API Identification: Categorisation and Risk Matrix
API Identification -
Voluntary_Involuntary Implementation Appendix 2.xlsx
Click on link to access the information: API Identification: Voluntary and Involuntary
Implementations
Integrity ● Idempotency
● Non-Repudiation
Experience ● Headers
● Status Codes
● HTTP Status Codes
● Pagination
● Resource URI Convention
● Developer Onboarding
Data ● Archiving
● Analytics
i. Consent Stage
a. The customer shall be informed of type and purpose of data requested, terms
and conditions applicable, in concise and easy to understand manner
b. The consent shall be explicit
c. The customer shall be presented with the option to accept or decline
onboarding into the Open Banking arrangement
d. In the consent stage, customer shall be shown the requested information and
purpose
e. The consent provided shall be time-bound, not in perpetuity
f. A customer shall be allowed to explicitly opt-out, which shall be provided to
customer periodically in line with the provisions of this guideline
g. A customer after providing consent, shall be accurately informed of the time-
bound permission provided.
ii. Authentication Stage
Data Description
Data Description
3.3.3 Transaction-History
This shall be the transaction history of a particular customers’ account based on date
range.
3.3.4 Debit-Mandate
This shall be a mandate signed by the customer physically or electronically to participate
in open banking.
i. Request Consent
TPP-Id Consent-Id
Consent-Type Response-Code
Expiry-Date Response-Message
Customer-Id
Data-Source-Id
TPP-Id Consent-Type
Consent-Id Expiry-Date
Data-Source-Id Customer-Id
Data-Source-Id
Response-Code
Response-Message
Consent-Id
iii. Cancel-Consent.
Request Attributes Response Attributes
TPP-Id Response-Code
Consent-Id Response-Message
Data-Source-Id
TPP-Id ResponseCode
Customer-Name ResponseMessage
BVN Mandate-Id
Bank-Code
Account-No
Description
Duration
Mandate-Type
v. Retrieve-Mandate
Request Attributes Response Attributes
TPP-Id TPP-Id
Mandate-Id Mandate-Id
Customer-Name
BVN
Bank-Code
Account-No
Description
Duration
Mandate-Type
ResponseCode
ResponseMessage
TPP-Id Response-Code
Mandate-Id Response-Message
Data-Source-Id
Participants in open banking shall strictly adhere to Appendix III (Security Standards) of
this Guidelines or as may be updated from time to time.
1.0 Introduction
Open banking promotes innovations and broadens financial products and services, which
involves sharing of customer data and inter-connectivity of systems, therefore, exposing
the participants to risks such as cybersecurity, money laundering, regulatory and
compliance, contract management, product management, etc. Open banking offers great
benefits and opportunities to the financial sector but is accompanied with risks that could
undermine the objectives if not properly managed.
It is important that these risks are properly identified and managed for the safety of the
participants and soundness of the financial system.
This Guidelines provides for the management of risks associated with open banking in
Nigeria.
The basic risks in open banking include cybersecurity, data privacy and integrity, contract
management, product management, money laundering, regulatory and compliance.
At the minimum, participants shall address all identified risks, by developing and
implementing effective risk management frameworks, policies and procedures for open
banking, approved by the Board of Directors, as well as institute a culture of sound
corporate governance.
Cybersecurity risks arise from the use of APIs for interconnectivity between participants.
APIs potentially expose the financial system to more vulnerabilities due to sharing of data
and connections.
ii. Participants shall comply with the requirements of ISO 27001 standard
(Information Security Management Standard)
iii. Participants shall comply with other standards and requirements determined by
the Bank.
Third Party risk is associated with possible losses arising from the non-fulfilment of the
terms of contract or the contract performing poorly. Participants shall have a duly executed
Service Level Agreements for all third-party contracts.
This is the likelihood or probability that a participant will knowingly or unwittingly engage
in money laundering or financing of terrorism. Money laundering is the act of directly or
indirectly concealing or disguising any fund or property that is derived from the proceeds
of an unlawful activity, with the aim of making the illicit funds seem to have been proceeds
of legitimate activities.
i. Participants shall comply with all CBN regulations relating to open banking and
ensure that third-party service providers also comply.
Open Banking creates the potential for proliferation of innovative products and services
which may increase the complexity of financial services delivery, thus, making it difficult
to control operational risk, information security, money laundering etc.
1.0 Introduction
This section defines the minimum-security requirements for open banking operation in
Nigeria covering information security and privacy controls.
2.0 Principles
Participants shall comply with minimum security principles such as are encapsulated in
the US NIST CSRC.
a. Layered security is a principle that security controls are layered to reduce the
security risk.
b. Separation of duties is a principle that no user should be given enough
privileges to misuse the system on their own.
c. Least privilege is a principle that restricts the access privileges of authorized
personnel (e.g., program execution privileges, file modification privileges) to the
minimum necessary to perform their jobs.
d. Zero trust is a principle that security design that assumes asset compromise
to minimize uncertainty in enforcing accurate, least privilege per-request
access decisions in information systems and services.
e. Dual control is a principle that uses two or more separate entities operating in
concert to protect sensitive functions or information.
f. Need to know is a principle that ensures that only authorised recipients are
provided access to specific classified information to perform or assist in a lawful
and authorized function.
g. Privacy is a principle of the right of a party to maintain control and
confidentiality of information about itself.
iii. Identification
a. The Biometric Verification Number (BVN), National Identity Number (NIN) and Tax
Identification Number and other such unique identifiers, shall be stored in
independent identity systems.
b. Each endpoint accessing an open banking product and service shall be uniquely
identified and its attributes examined for compliance of information security
policies.
iv. Authentication
a. The process through which an end user authenticates itself to its service provider
shall be designed to minimize digital friction.
b. Participants shall use strong authentication which includes Multi-Factor
Authentication (MFA) to manage access to API systems and implement role-based
access control for PIFT and PAST.
c. Participants shall adopt authentication protocols at the minimum, OAuth 2.0 in
conjunction with OpenID Connect. Higher authentication protocols shall be
implemented as required.
d. Mutual authentication over Transport Layer Security (mTLS) shall be implemented
for authentication between client and server machines or any approved
authentication standard.
v. Authorisation
Participants shall:
a. Implement open banking security profiles in compliance with the Financial-grade
API (FAPI) specifications.
b. Implement digital tokens that ensures third party is acting within the bounds of the
permissions granted.
c. Provide evidence that their third-party service is entitled to use an authorisation
token such as providing client identity and client secret to provider.
Participants shall:
a. Implement anti-fraud and counter terrorism financing controls and capabilities.
b. Ensure that the API provides supports out-of-band (OOB) authentication, where
necessary;
c. Be required to notify the user asynchronously/OOB when significant actions have
occurred such as, a change to a payee etc;
d. Ensure that the API responses inform the third-party and customer that an OOB
process is underway so that, where appropriate; and
10.0 Encryption
Participants shall ensure message timestamps comply with ISO-8601 date formats or
any other up-to-date standard/format. For example, 2020-07-10 15:00:00.000,
represents the 10th of July 2020 at 3 p.m. (in local time as there is no time zone offset
specified—more on that below)
Participants shall:
a. Ensure that Message Signing require TLS 1.2 Mutual Authentication RFC 8705 for
non-repudiation, or any other up-to-date standard/format;
b. Ensure Message encryption is implemented through JSON Web Encryption (JWE)
RFC 7516, or any other up-to-date standard/format;
c. Implement JSON Web Signature (JWS) RFC 7515 signed using an algorithm that
supports asymmetric keys, or any other up-to-date standard/format; and
d. Implement asymmetric algorithms, (or any other up-to-date standard/format) RFC
7518 such as:
i. TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
ii. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
iii. TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
iv. TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
e. Use a trust anchor that is defined by the CBN which is responsible for providing an
issue, management and store of public keys and certificates; and
f. Retrieve public keys to verify messages from the trust anchor.
4. Risk KPIs
5. KPI Warning
Thresholds
stop-gap, resolution
plan and dates
business management
personnel.
3. Create process for
updating this process
with new
products/services
3. Implement controls to
ensure compliance at
all levels
17. a. Notes
b. Mandatory: These are requirements that shall be implemented to meet
regulatory conformance. The CBN shall request evidence of conformance.
c. Recommended: These are requirements that the CBN strongly encourage
for implementation for Operational Guidelines to achieve its objectives. The
CBN WILL NOT request evidence of conformance
d. API Provider (AP): This refers to a participant that uses API to avail data or
service to another participant. An API Provider can be a licensed financial
institution/service provider, a Fast-Moving Consumer Goods (FMCG)
Company or other retailers, Payroll Service Bureau etc.
e. API Consumer (AC): This refers to a participant that uses API released by
the (API) providers to access data or service. An API Consumer can be
licensed financial institution/service provider, an FMCG or other retailers,
Payroll Service Bureau etc