SHR Infra Sec Op Fwork 2020 v1 0
SHR Infra Sec Op Fwork 2020 v1 0
This document establishes a set of mandatory security controls for service bureaux participating in the Shared
Infrastructure Programme. This version of the document is effective as from 1st January 2020.
03 January 2020
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Table of Contents
Description
Table of Contents
Preface .................................................................................................................................................3
SWIFT Security Control Framework Summary ...............................................................................4
Framework Objectives and Principles .............................................................................................5
Scope of Controls ..............................................................................................................................7
Controls Structure ..............................................................................................................................9
Controls Compliance .......................................................................................................................10
Controls Summary Table .................................................................................................................11
Detailed Control Description ...........................................................................................................15
Legal Notices ....................................................................................................................................29
27 December 2019 2
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Preface
Description
Preface
About this document
This document establishes a set of mandatory security controls for service bureaux
participating in the Shared Infrastructure Programme.
Intended audience
This document is intended for parties that offer or want to offer shared infrastructure
services in the context of the Shared Infrastructure Programme.
Significant changes
This version aligns with the SWIFT’s Customer Security Control Framework (CSCF) v2020
removing the now obsolete elements incorporated in the CSCF itself. It also clarifies and
rationalises few other existing elements such as expectations regarding performance
monitoring (controls 8.x) and resilience (controls 9.x).
Note Additional guidance and other clarifications to existing CSCF controls have to be
retrieved from the CSCF v2020 documents as they are not visible in this
documents only referring to the control objective and statement.
Changes after publication of the advance information
The updated framework was published as advance information in October 2019. After that
date, the following inconsistencies were updated:
• Control 1.1.3 was rewritten to highlight the requirements present in the CSCF and the
need of a network configuration review process.
Related documentation
• Shared Infrastructure Programme Terms and Conditions
• Shared Infrastructure Policy
• Customer Security Programme Terms and Conditions
• Customer Security Controls Framework (CSCF)
• Shared Infrastructure Programme area of swift.com
• SWIFT Certified Interface Programme Overview
• List of certified interface providers
• SWIFT General Terms and Conditions
• SWIFT Corporate Rules
• SWIFT By-laws
• SWIFT Personal Data Protection Policy
• SWIFT Trademark Guidelines
27 December 2019 3
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed SWIFT Security Control Framework Summary
Description
27 December 2019 4
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Framework Objectives and Principles
Description
The controls listed in this document underpin the above objectives and principles. The
controls are intended to help mitigate specific cybersecurity and availability risks that SWIFT
users, as customers of a service bureau, face. Within each control, SWIFT has documented
the main objective the control is designed to help mitigate. Complying with the Control
Statements in line with the Implementation Guidelines aims to prevent or minimise
undesirable and potentially fraudulent business consequences or disruptions, such as:
• unauthorised sending or modification of financial transactions
• processing of altered or unauthorised SWIFT inbound transactions
• business conducted with an unauthorised counterparty
• confidentiality breach (of business data, computer systems, or operator details)
• integrity breach (of business data, computer systems, or operator details)
• availability breach or business disruptions
Ultimately, these consequences represent enterprise level risks, including:
• financial risk
27 December 2019 5
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Framework Objectives and Principles
Description
• legal risk
• regulatory risk
• reputational risk
27 December 2019 6
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Scope of Controls
Description
Scope of Controls
The controls in this document are scoped to encompass a defined set of components in the
provider's local environment in complement of the CSCF Scope described below. Refer to
the CSCF document for a description of the various components.
The service bureaux play a critical Man-in-the-Middle role between their customers being
SWIFT users and the SWIFT network.
Therefore, in a service bureau’s infrastructure, the Business and/or or Web Application(s)
and other customer facing components, are considered as messaging interface/other
SWIFT-related applications and are in scope as depicted below.
27 December 2019 7
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Scope of Controls
Description
If the service bureau outsources any component of its infrastructure or service to a third
party (for example, to an external IT provider, cloud provider, or a hosting provider), then the
service bureau remains responsible for the conformance with the security controls and must
seek compliance from its third party.
27 December 2019 8
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Controls Structure
Description
Controls Structure
Security and operational controls in this document are articulated in three parts: General
Control Information, Control Definition, and Implementation Guidance, as described below.
Control Number and Title
Each control has a unique number and title aligned with the CSCF. All CSCF controls are
Mandatory and must be implemented by service bureaux. Only exceptions are 2.9
Transaction Business Controls and 2.11 RMA Controls which, by default, are not taken into
account in the Shared Infrastructure Programme compliance evaluation. In order to reduce
cross-reference problems along the Shared Infrastructure Programme Security and
Operational Framework releases, the controls numbering is not altered (for example, when
introducing new items). Similarly, obsolete controls do not result in renumbering other
controls. Such controls are marked as Obsolete and only referred to for numbering
relevance.
Control Definition
Control Objective: the security goal to be achieved irrespective of the implementation
method.
When a control complements an existing control, the Control Objective is not repeated.
Implementation Guidance
Control Statement: the requirement by which the Control Objective can be fulfilled and that
requires compliance with by the service bureau.
When a control complements an existing control, the Control Statement may not be
repeated.
Implementation Guidelines: SWIFT-formulated method for control implementation that
must be taken into account during self-assessment reporting and that will be used as
baseline during on-site inspections.
27 December 2019 9
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Controls Compliance
Description
Controls Compliance
As per the security controls structure described in the Control Structure chapter, the
objective of a control states the security goal to be achieved irrespective of the
implementation method used.
To comply with a security control, service bureaux must implement a solution that fulfils all
the following conditions:
• meets the stated Control Objective
• addresses the risk drivers (see CSCF Appendix A for a risk matrix and Appendix C for
illustrations of such risks)
• covers the in-scope components
The Control Statement is the suggested mean to fulfil the control objective and the
Implementation Guidelines are common methods for implementing the control.
Compliance can be obtained by either of the following methods:
• implementing a solution aligned with the implementation guidance provided in this
document or in the CSCF by SWIFT
• implementing an alternative solution to the SWIFT-formulated implementation
guidance, which equally meets the control objective and addresses related outlined
risks
In such (last) case, deployed controls, their effectiveness, and particular environment
specificities have to be taken into account to properly assess the control objective
compliance of the solution (risk assessment approach).
Service bureaux are ultimately responsible for assessing the suitability of SWIFT-formulated
implementation guidance in their environment or determining if they wish to adopt
alternative implementation solutions. However, the implementation guidance section will be
considered as an "audit checklist" during on-site inspection referred in the Shared
Infrastructure Programme Terms and Conditions. Therefore, in the case that some
implementation guidelines elements are not present or partially covered, mitigations as well
as particular environment specificities have to be taken into account to properly assess the
overall guidelines adherence level.
27 December 2019 10
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Controls Summary Table
Description
Non-shaded controls The plain Customer Security Controls Framework (CSCF) controls. They
are fully documented in the CSCF document.
Shaded controls The controls that complement and extend the CSCF controls.
27 December 2019 11
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Controls Summary Table
Description
1 Restrict Internet Access and Protect Critical Systems from General IT Environment
27 December 2019 12
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Controls Summary Table
Description
27 December 2019 13
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Controls Summary Table
Description
27 December 2019 14
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
27 December 2019 15
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
27 December 2019 16
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
(for example, AES, ECDHE), with key lengths in accordance with current best
practices. More guidelines on cryptographic algorithms to be used in order
to provide integrity and confidentiality of data in transit can be found in
SWIFT Knowledge Base tip 5021566 algorithms and protocols.
• Customer multi-factor authentication must be implemented and used by all
SWIFT customers in human-to-machine communication at application and
also, when such access is required, at operating system level. This targets both
SWIFT-related components or Web applications and/or systems accessed by
customers to perform SWIFT-related operations (such as posting, creating,
approving, or modifying transactions). The machine-to-machine or application-
to-application communication (between the SWIFT customer and a service
bureau) must be authenticated. This is usually done by using a pre-shared
secret (at least 17 characters long) or a certificate (preferred option). Pre-
shared keys and certificates must be securely distributed.
2.6 Operator Session Control Objective: Protect the confidentiality and integrity of interactive
Confidentiality and operator sessions connecting to the local SWIFT infrastructure.
Integrity Control Statement: The confidentiality and integrity of interactive operator
sessions connecting to SWIFT-related applications or into the secure zone is
safeguarded.
2.7 Vulnerability Control Objective: Identify known vulnerabilities within the local SWIFT
Scanning environment by implementing a regular vulnerability scanning process.
Control Statement: Secure zone including dedicated operator PC systems are
scanned for vulnerabilities using an up-to-date, reputable scanning tool and
results are considered for appropriate resolving actions.
2.7.1 Vulnerability Superseding 2.7 Vulnerability Scanning
Scanning Frequency & Implementation Guidelines: Vulnerability scanning must be performed at least
Scope quarterly and should include network components (such as routers and
switches.)
2.8 Critical Activity Control Objective: Ensure protection of the local SWIFT infrastructure from
Outsourcing risks exposed by the outsourcing of critical activities.
Control Statement: Critical outsourced activities are protected, at a minimum,
to the same standard of care as if operated within the originating organisation.
27 December 2019 17
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
27 December 2019 18
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
2.11 RMA Controls Not relevant by default but kept for alignment with the CSCF.
(Not Applicable by To be considered if the service bureau performs such control on explicit
default) request of at least one customer as part of its standard offering to its
customers.
27 December 2019 19
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
4.1 Password Policy Control Objective: Ensure passwords are sufficiently resistant against common
password attacks by implementing and enforcing an effective password policy.
Control Statement: All application and operating system accounts enforce
passwords with appropriate parameters such as length, complexity, validity,
and the number of failed log-in attempts. Similarly, personal tokens and mobile
devices enforce passwords or Personal Identification Number (PIN) with appropriate
parameters.
4.2 Multi-Factor Control Objective: Prevent that a compromise of a single authentication factor
Authentication allows access into SWIFT systems, by implementing multi-factor
authentication.
Control Statement: Multi-factor authentication is used for interactive user
access to SWIFT-related applications and operating system accounts.
27 December 2019 20
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
6.5 Intrusion Detection Control Objective: Detect and prevent anomalous network activity into and
within the local SWIFT environment.
Control Statement: Intrusion detection is implemented to detect unauthorised
network access and anomalous activity.
7.2 Security Training Control Objective: Ensure that all staff are aware of and fulfil their security
and Awareness responsibilities by performing regular security training and awareness
activities.
Control Statement: Annual security awareness sessions are conducted for all
staff members, including role-specific training for SWIFT roles with privileged
access.
7.3 Penetration Control Objective: Validate the operational security configuration and identify
Testing security gaps by performing penetration testing.
Control Statement: Application, host, and network penetration testing is
conducted into and within the secure zone and on operator PCs.
7.3.1 Yearly Testing Superseding 7.3 Penetration Testing
Implementation Guidelines: The penetration testing must be performed
yearly.
7.4 Scenario Risk Control Objective: Evaluate the risk and readiness of the organisation based on
Assessment plausible cyberattack scenarios.
Control Statement: Scenario-driven risk assessments are conducted regularly
to improve incident response preparedness and to increase the maturity of the
organisation’s security programme.
27 December 2019 21
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
• the delegation of any SWIFT customer configuration changes such as, but
not limited to, customer settings on the following components: messaging
and communication interface, HSMs, SWIFTNet Online Operations
Manager, and Secure Channel
8.2 Obsolete Covered in support requirements
8.3 Obsolete
8.4 Capacity Control Objective: Ensure availability, capacity, and quality of service to
Management customers.
Control Statement: the service bureau must demonstrate an effective capacity
planning process driving infrastructure changes when required.
Implementation Guidelines:
Capacity planning covering the SWIFT business needs must be performed at
least yearly. The formal capacity planning process must include:
• the monitoring of the current capacity of the resources underlying
Messaging and Communication interface
• the planning for future capacity based on anticipation of number of
customers variation and of system requirements
The capacity planning process must cover:
• a connectivity Pack (Gold, Silver) to ensure compliance with 9.4
Implementation Guidelines in terms of performance
• a communication interface (CPU, memory, and disks)
• a messaging interface (CPU, memory, and disks)
8.5 Early Availability of Control Objective: Ensure early availability of SWIFTNet releases and of the FIN
SWIFTNet Releases standards for proper testing by the customer before going live.
and of FIN Standards Control Statement: The service bureau must implement:
• SWIFTNet messaging services software upgrades at least 1 month before
products end of life
• SWIFT Standard releases at least 6 weeks before the annual FIN standard
changeover
Implementation guidelines:
Upgrade timely the software that enables SWIFTNet messaging
- for FIN, FileAct, Interact, and SWIFT WebAccess: SWIFTNet Link
- for SWIFNet Instant: Alliance Gateway Instant
Implement timely the new SWIFT Standards for testing in the Messaging
Interface.
After implementations are complete, communicate to the customer the
early availability to allow testing.
27 December 2019 22
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
9.1 Local Resilience Control Objective: The service bureau must ensure that the service remains
available for customers in the event of a local disturbance or malfunction.
Control Statement: The service bureau must provide and test formal
monitoring and operational measures to allow timely activation of a local
fallback solution at the primary site to be able to cope with the customers'
traffic.
Implementation Guidelines:
These measures must include:
• The presence of a resilient (that is, duplicated, clustered, or virtualised)
production infrastructure supporting the SWIFT messaging, such as (but not
limited to):
− network components
− middleware (like MQ or ftp server)
− messaging and communication interfaces
− HSM boxes
• The availability of data to allow fast recovery in case of hardware or
software failure, such as (but not limited to):
− back-ups (or images) of the systems supporting the SWIFT messaging
− back-ups (at application level) of the messaging interface and the
communication interface
• In case resiliency is achieved by duplication, regular (at least once a year)
test of or switch to the local fallback solution must be performed.
Considerations for alternative implementations:
• multiple active sites, all being capable of running full load, can also ensure
service availability
9.2 Site and Systems Control Objective: The service bureau must ensure that the service remains
Resilience available for customers in the event of a site disaster.
Control Statement: The service bureau is required to have a disaster recovery
site that enable to meet the committed Recovery Time Objective (RTO) and
Recovery Point Objective (RPO).
Implementation Guidelines:
• The following infrastructure supporting the SWIFT messaging must be
present at the disaster recovery site
− network components
− jump server
− middleware (if applicable)
− SWIFT-related applications (if applicable)
− SWIFT related applications
− messaging and communication interfaces
− HSM boxes
• The service bureau must have documented disaster recovery procedures.
• The service bureau must regularly (at least yearly) perform disaster
recovery test with at least some customers involvement, confirming ability
to meet the committed RTO (that should not exceed 4 hours) and RPO (that
27 December 2019 23
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
9.3 Physical Control Objective: The service bureau must ensure that the service remains
Environmental available for customers in the event of a disturbance, a hazard, or an incident.
Controls Control Statement: the service bureau must implement environmental
controls that address risks exposures relevant to the location of its data
centres.
Implementation Guidelines:
These controls include:
• air conditioning (preferably resilient)
• earthquake protection, when relevant
• water leaks detection, when relevant
• fire detection and suppression measures
• diesel generator
• non-interruptible power supplies (UPS) and batteries (preferably resilient).
The service bureau or the hosting company must provide evidence of
activation of such environmental controls as well as the regular maintenance of
the related equipment
9.4 Connect Solidly to Control Objective: Availability and quality of service is ensured through usage
the SWIFT Network of the recommended SWIFT connectivity pack.
Control Statement: The service bureau must only operate Alliance Connect
Gold for its primary/active site(s) and an Alliance Connect Silver (with dual-VPN
solution) as the minimum for its disaster recovery site(s).
Context:
• Internet lines have no performance guarantees or managed resiliency and
are potentially more prone to distributed denial of service attacks
(DDOS)/cyber-attacks.
• SWIFT can monitor both Alliance Connect Gold lines in the case of failure
and negotiated SLA are provided on both leased lines connecting to one (or
two) managed networks operated by the network partners.
• In the case of a connection or line failure, there is an automatic fallback to
the other Alliance Connect Gold leased line, thereby limiting service
disruptions & keeping it transparent for the service bureau.
Implementation Guidelines:
The service bureau must ensure that there is sufficient bandwidth and
associated SWIFTNet Link throughput class to process the following live traffic
(excluding Test and Training):
• peak daily live traffic volumes taken over the previous 6 calendar months in
4 hours or less on the primary site
• average daily live traffic volumes taken over the previous 6 calendar
months in 6 hours or less on the disaster recovery site
27 December 2019 24
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
procedures.
Implementation Guidelines:
Business Continuity Plan must be based on the Business Impact
Analysis, covering at least the SWIFT service.
Business continuity plan should (at minimum):
• sufficiently define how the service bureau deals with various types of
disruptions to its services (at least unavailability of the primary site, missing
key human resources and natural disaster)
• define alternative communication means (in case that network or mobile
phone networks are impacted by the disaster)
27 December 2019 25
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Detailed Control Description
Description
11.3 Messaging To support critical activity performed by the service bureau on behalf of SWIFT
Monitoring on Behalf customers
of Customer Control Objective: Ensure a consistent and effective approach for the
customers’ messaging monitoring.
Control Statement: When the customer outsources the monitoring of its
messaging to a service bureau, this must be documented in the contractual
documentation.
Implementation Guidelines:
The service bureau must formally document and agree with the customer on
the processes to handle alerts in case of error and reports on data processing
received from SWIFT (for example, logical terminal disconnections, ACK/NAK
messages, and non-delivery reports).
11.4 Customer Control Statement: The service bureau must notify each impacted SWIFT
Incident Notification customer without delay in case of a major incident.
Implementation Guidelines:
An incident is considered as major if it has one of the following consequences:
• It prevents a customer from meeting its business requirements or
obligations.
• It prevents the service bureau from meeting its obligations as defined in the
customer Service Level Agreement.
11.5 Customer Support Control Objective: Effective support is offered to customers in case they face
Facility problems during their business hours.
Control Statement: Customer helpdesk and technical level 2 support (including
at least one service bureau specialist connectivity as described in control 12.1
Maintain Expertise) must be available during working hours of the service
bureau customers (which could be through on call coverage outside the service
bureau working hours).
27 December 2019 26
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Appendix A
Description
27 December 2019 27
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Appendix B
Description
27 December 2019 28
Shared Infrastructure Programme
Security and Operational Framework 2020 – Detailed Legal Notices
Description
Legal Notices
Copyright
SWIFT © 2019. All rights reserved.
Restricted Distribution
Do not distribute this publication outside your organisation unless your subscription or order expressly grants you
that right, in which case ensure you comply with any other applicable conditions.
Disclaimer
The information in this publication may change from time to time. You must always refer to the latest available
version.
Translations
The English version of SWIFT documentation is the only official and binding version.
Trademarks
SWIFT is the trade name of S.W.I.F.T. SCRL. The following are registered trademarks of SWIFT: the SWIFT logo,
SWIFT, SWIFTNet, Sibos, 3SKey, Innotribe, the Standards Forum logo, MyStandards, and SWIFT Institute. Other
product, service, or company names in this publication are trade names, trademarks, or registered trademarks of
their respective owners.
27 December 2019 29