In an era where digitalisation has transformed the way financial institutions work, the security of financial data and transactions is more important than ever.
Following a number of security breaches at financial institutions, Swift became concerned about the security of its users. Swift decided to create a set of security controls and required all its users to attest their level of compliance with these controls transparently. The CSP is continually updated to address new threats and weaknesses in the ever-changing cybersecurity landscape.
© by Swift 2023
Swift has defined a set of security objectives, which are linked to seven principles and covered by the set of controls in the Customer Security Controls Framework (CSCF). The CSCF consists of 25 mandatory and 7 advisory controls, but not all controls are applicable to all architecture types: it depends on the extent to which an organisation is integrated with Swift systems.
© by Swift 2023
3 OBJECTIVES AND 7 PRINCIPLES:
1. Restrict Internet access & segregate critical systems from general IT environment
2. Reduce attack surface and vulnerabilities
3. Physically secure the environment
4. Prevent compromise of credentials
5. Manage identities and segregate privileges
6. Detect anomalous activity to system or transaction records
7. Plan for incident response and information sharing
For more information on the Swift CSP and its history, read our article on this topic.
Third Party Risk Management – new mandatory control 2.8
Swift constantly monitors ongoing threats and evolutions in the cyber landscape, and adapts its CSCF to meet the challenges that arise. In 2024, Swift’s focus area is Third Party Risk Management, as this topic is gaining importance both from a security and a regulatory perspective (e.g. DORA, NIS2).
Many organisations rely heavily on third-party vendors and service providers to meet various operational needs, and as a result give external parties access to systems and large amounts of data. This poses additional risks that need to be actively identified and controlled.
As a result, Swift has upgraded the status of control 2.8 Outsourced Critical Activity Protection from advisory to mandatory, for all architecture types.
What is expected for this control?
Swift has also defined an Outsourcing Agents Security Requirements Baseline, which establishes good practice on the controls to be implemented.
In short, the aim of this new control is to maintain an effective third party risk management program.
This includes:
maintaining an overview of third parties (including outsourcing agents) and what components and controls they impact
identifying critical vs. non-critical activity outsourcing
performing periodic risk assessments on third parties
establishing SLAs and NDAs (for critical activities)
obtaining assurance over the security controls implemented by the third party
Swift users should ensure that security provisions are included in contracts with third parties, which at a minimum should comply with the CSP controls. Furthermore, roles and responsibilities should be documented.
Back Office Security – control 2.4A
In the past, the focus of the CSP was the so-called Swift Secure Zone – a segregated zone where the critical components reside. Now, Swift aims to ensure the security of the “first hop” of the back office, as it determined that significant risks exist related to the data exchange with (often legacy) back-office applications. This includes sensitive data confidentiality and integrity, unauthenticated system traffic and unauthorised access to data and systems.
© by Swift 2023
To achieve this, Swift intends to make control 2.4A Back-Office Data Flow Security mandatory in the coming years, and encourages its users to start looking into how to implement this control.
💡 For the year 2024, BDO recommends identifying the back-office first hops and evaluating the security of existing data exchanges. Next, a gap assessment should be performed to identify the actions that will be needed to reach the desired state. Initially, Swift will focus on new flows created between the back office and Swift systems. In a second phase, legacy flows should also be protected – although these will most likely require the biggest investment, so users should not wait too long with the gap assessment and implementation. |
Swift API offering
Furthermore, links can be made to other European regulations such as DORA and NIS2. The Digital Operational Resilience Act (DORA) is an EU regulation for the financial industry and service providers to that industry entered into force on 16 January 2023 and will apply as of January 2025. DORA is based on five key pillars, as presented in the visual below. The biggest overlap here is related to cyber incident response planning and reporting, pentesting and third party risk management.
For further information about DORA, NIS2 or other regulations, get in touch with your BDO contact person.
The Swift CSP controls are based on good practices including ISO 27002:2022, NIST Cybersecurity Framework v1.1, PCI DSS 4.0, Unified Compliance Framework (UCF) and SOC2 Trust Service Criteria 2017. Swift has created a mapping table depicting the relationships between these industry standards and its own controls framework, available through the button below (a swift.com account is required).
As your trusted partner, BDO will help you achieve your objectives in a pragmatic yet qualitative way.
As Swift Certified Assessors, our assessments are of the highest quality and strive to add value to your organisation instead of just tick-the-box compliance. Our detailed yet straightforward reporting pinpoints what areas you should focus on.
As implementation partners, we focus on the high-risk areas first, making sure your main security gaps are covered. Then, we focus on compliance areas, to ensure an assessment will pass the test.
Our methodology
Tips for v2024 implementation
BDO performed numerous assessments in 2023. Our experience across our assessments shows that getting scoping, planning and definitions right from the outset is vital for a successful assessment. Furthermore, based on our reviews, we believe the following key areas to be most likely to cause non-compliances in 2024:
On top of performing the CSP assessment, BDO can advise you on all of the above-mentioned issues and assist you with their implementation.
We get many questions from our clients and prospects regarding the scope and depth of the assessment, timelines and compliance. In the dropdowns below, we answer the most common questions.