Swift CSP Assessment Guidelines Factsheet 2020

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

SWIFT Assessment Guidelines

Info sheet

Master the Customer


Security Programme
assessment methodology

Learning objectives
Our Customer Security Programme sets
Carry out your responsibilities
in relation to the Customer benchmark security practices, critical to
Security Programme
defending against, detecting and recovering
Gain a broader industry
perspective from cybercrime. The Independent
Ensure you have the necessary
Assessment Framework, is a significant
technical capabilities
milestone in our security programme. It
Review security best practice
scenarios and field compliance
reinforces the level of assurance provided by
experience with a SWIFT
expert
self-attestations by mandating independent
assessments by third parties.
Audience
Do you perform gap analyses for The theory includes targeted information
IT Auditors/Assessors SWIFT member organisations? Do you to help collect and analyse evidence for
help enrich and improve their level of the design, implementation and operating
Compliance Managers and compliance with the Customer Security effectiveness of each control.
Officers Controls Framework? Will you be
responsible for independent attestations? The practical elements of the workshop
Risk and Security Managers provide unique opportunities to explore
If so, you need to understand each of real-life case studies and discuss your
the controls, each of the architecture feedback as a group.
System Administrators
components in scope, and how to verify
evidence for each SWIFT infrastructure type. Examples of the topics covered include:
Chief Information Security
Officers SWIFT has designed a new Assessment —— Application hardening: security
Guidelines workshop to help you conduct parameters settings
more efficient and robust assessments. —— Logical access: profiles, RBAC
roles, permissions, segregation of
Aimed at auditors, risk managers and IT duties and the ‘4 eyes’ principle
assessors, the workshop is tailored to the —— Traceability: actions and event log
business and technical contexts in which trails
you are operating. It demonstrates how to —— Transaction business control:
interpret and comply with mandatory and message processing history
advisory controls, which evidences are —— Interface hardening tools: using a
best collected, and how to audit objectively “security best practice check” with
based on security best practices. different outputs
—— Cyber incident response: the SWIFT
The workshop is structured around a security recovery roadmap
blend of theoretical and practical modules.
SWIFT Assessment Guidelines
Workshop Agenda

Workshop preparation Connect to Alliance Gateway (or Audit trails (financial messages)
Alliance Remote Gateway)
—— Remote kick off to scope the —— Identification of a message (tracking
workshop —— Operator access history)
—— SWIFT collects and analyses —— Security management —— Message search and event log
data relating to your technical (where to see)
—— Operational and auditing profiles
environment
—— Daily message check report (the
what)
Connect to Alliance Access —— Undelivered message report (why
Overview of SWIFT
—— Operator Access it failed)
—— Context in the financial industry
—— Security parameters —— Message delivery monitoring (what
—— Core messaging services is the status)
—— Messaging data Flows
—— Secure IP network and connectivity —— Message retrievals (why to retrieve)
types —— Messaging routing terminology
—— Monitoring event log (for auditing)
—— Interface portfolio —— Operational and auditing profiles
—— SWIFT.com security and audit trail
—— FIN and ISO 20022 messaging (who has accessed)
standards
Connect to FIN and SWIFTNet
—— BIC usage and identity importance
The Customer Security Programme
—— FIN secure login and select
—— Customer Security Controls (connectivity control) Practical information
Framework (CSCF)
—— SWIFTNet communication channels
—— Independent Assessment (InterAct and FileAct profiles) The SWIFT Assessment Guidelines
Framework (IAF) workshop can be organised over two
—— Integrity, filtering and other security or three days. Thanks to its modular
controls structure, each session can be
—— Authentication methods and customised to your needs.
PKI certificates and HSMs
application integrity checks
—— Public Key Infrastructure (PKI) The organisation and delivery is
—— Transaction business control managed by a senior subject matter
—— Hardware Security Modules (HSMs) (RMA and Payment Controls best expert.
—— SWIFTNet security officers practices)
—— Confidentiality, availability and The workshop can be delivered in
integrity of messages various languages.

—— Reconciliation & integrity of the For more information, please contact


message flow your SWIFT account manager.

SWIFT is a member-owned cooperative,


providing secure financial messaging
services to more than 11,000 organisations,
across the financial ecosystem, in almost
every country in the world. For nearly five
decades we have delivered certainty,
continuity and excellence by constantly
evolving in an everchanging landscape. In
today’s fast moving, increasingly connected
and challenging world, this approach has
never been more relevant.
www.swift.com
57449 - January 2020

You might also like