CSCF - Password Policy
CSCF - Password Policy
Control Definition
Control Objective: Ensure passwords are sufficiently resistant against common password attacks by
implementing and enforcing an effective password policy.
In-scope components:
Passwords defined on the following components:
• dedicated and general-purpose operator PCs
• jump server
• Swift-related components (including interfaces, GUI, Swift and customer connectors, new HSM)
• systems hosting Swift-related components
• network devices protecting the secure zone
• on-premiseslocal or remote (that is hosted or operated by a third party, or both) virtualisation or cloud
platform hosting Swift-related VMs and their management PCs
• personal tokens and personal mobile devices used as possession factor for multi-factor authentication
(considered as software tokens) (see control 4.2)
• [Advisory: bridging servers (such asother Mmiddleware or file transfer servers other than customer
connectors) used for and guardian of the data exchange between back-office and Swift-related
components]
Risk Drivers:
• password cracking, guessing, or other computational compromise
Implementation Guidance
Control Statement:
All application and operating system accounts enforce passwords with appropriate parameters such as length,
complexity, validity, and the number of failed login attempts. Similarly, personal tokens and mobile devices
enforce passwords or a Personal Identification Number (PIN) with appropriate parameters.
Control Context:
Implementing a password policy that protects against common password attacks (for example, guessing and
brute force) is effective for protecting against account compromise. Attackers often use the privileges of a
compromised account to move laterally within an environment and progress the attack. Another risk is the
compromise of local authentication keys to tamper with the integrity of transactions.
However, it is important to recognise that passwords alone are generally not sufficient in the current cyber-threat
landscape. Users should consider this control in close relationship with the multi-factor authentication
requirement.
Implementation Guidelines:
The implementation guidelines are common methods to apply the relevant control. The guidelines are a
helpful way to begin an assessment but should never be considered as an audit checklist as each user’s
implementation may vary. Therefore, in cases where some implementation guidelines elements are not
present or partially covered, mitigations as well as particular environment specificities must be
considered to properly assess the overall compliance adherence level (as per the suggested guidelines
or as per the alternatives).
07 July 2023 74
Detailed Description Detailed Control Descriptions
• A password policy that also covers PIN settings is established, aligned to current industry standards or
industry best practices, and defines the following criteria:
− password expiration
− password length, composition, complexity, and other restrictions
− password re-use
− lock out after failed authentication attempts (and remedy)
− password requirements modified as necessary for the following specific use cases:
o in combination with a second factor (for example, one-time password)
o authentication target (for example, operating system, application, mobile device, or token)
o type of account (general operator, privileged operator, application-to-application account, or local
authentication keys)
For additional best practice guidelines about password and PIN parameter settings, see Swift Knowledge
Centre articles 5021567 and 5022038.
• The password policy is developed in consideration of known password-based vulnerabilities in the
computing environment. For example, requiring a password of 15 or more characters for Windows
systems prevents Windows from computing the highly vulnerable LAN Manager (LM) password hash.
• The established password policy is enforced through technical means (for example, through an Active
Directory group policy, or within application settings), when possible.
• Effectiveness of the password policy is reviewed regularly (annually, by recommendation).
• System settings related to password management and storage are aligned to industry and vendor best
practices (for example, enabling the “NoLMHash” registry setting in Windows).
• Passwords used for secure zone systems are significantly more exposed if the passwords are stored in
authentication systems outside of the secure zone (for example, an enterprise Active Directory). Instead,
passwords for secure zone systems are, to the fullest extent possible, stored only within the zone (for
example, in an Active Directory for production systems) as described in the guidance for the design of the
secure zone or another existing secure zone that has similar controls.
Optional Enhancement:
• Apply the control to all bridging servers (such as middleware or file transfer servers other than customer
connectors) used for data exchange between back-office and Swift-related components.
Note: Users should implement strong passwords and preferably strong authentication mechanisms for all
systems used within the end-to-end transaction chain, and not limit these controls to the Swift infrastructure only.
07 July 2023 75
Detailed Description Detailed Control Descriptions
Control Definition
Control Objective: Prevent that a compromise of a single authentication factor allows access into Swift-related
systems or applications by implementing multi-factor authentication.
Risk Drivers:
• credential replay
• password cracking, guessing, or other computational compromise
• password theft
Implementation Guidance
Control Statement:
Multi-factor authentication is used for interactive user access to Swift-related components or applications and
operating system accounts.
Control Context:
Multi-factor authentication requires the presentation of two or more of the following common authentication
factors:
• knowledge factor: something the operator knows (for example, a password)
• possession factor: something the operator has (for example, connected USB tokens or smart cards, or
disconnected tokens such as a (time based) one-time password- (T)OTP- generator or application storing
a cryptographic private key that runs on another device like operator’s mobile phone considered as a
software token, RSA token, 3-Skey Digital and its mobile version considered as a software token, or
Digipass)
• inherence factor: something the operator is (for example, biometrics such as fingerprints, retina scans, or
voice recognition)
Implementing multi-factor authentication provides an additional layer of protection against common authentication
attacks (for example, shoulder surfing, password re-use, or weak passwords) and provides further protection from
account compromises for malicious transaction processing. Attackers often use the privileges of a compromised
account to move laterally within an environment and to progress an attack.
Implementation Guidelines:
The implementation guidelines are common methods to apply the relevant control. The guidelines are a
helpful way to begin an assessment but should never be considered as an audit checklist as each user’s
implementation may vary. Therefore, in cases where some implementation guidelines elements are not
present or partially covered, mitigations as well as particular environment specificities must be
considered to properly assess the overall compliance adherence level (as per the suggested guidelines
or as per the alternatives).
07 July 2023 76
Detailed Description Detailed Control Descriptions
Note: All Swift and Swift-compatible third-party vendor messaging and communication interfaces must support or
embed multi-factor authentication.
41
such as creating, submitting, approving, or modifying transactions or user entitlements.
07 July 2023 77