What is SWIFT’s role in safeguarding payments?
SWIFT, a global financial services organisation, provides secure infrastructure for making cross-border payments. SWIFT has taken measures to strengthen and safeguard the payments landscape by integrating the SWIFT Customer Security Controls Framework (CSCF) that is updated annually, referred to as SWIFT Customer Security Programme (CSP), into its compliance landscape.
The SWIFT CSCF is aligned with security frameworks such as NIST, ISO: 27001 and PCI-DSS. It was introduced to ensure the SWIFT network was consistently reviewed for security and further enhanced to protect SWIFT workstations and user accounts in financial institutions’ corporate environments from fraudulent money transfers. Demonstrating compliance to SWIFT CSP’s requirements is mandatory for all its participants, which includes more than 11,500+ institutions (that includes banking, securities and organisations) customers (in over 200 countries).
The SWIFT CSP attestation
SWIFT introduced the CSCF in 2016. The CSP CSCF has three objectives and seven principles, covered across 32 controls. These 32 controls are split into mandatory and advisory categories: mandatory controls are designed to improve cybersecurity and advisory controls are designed to implement industry best practices. The SWIFT CSCF is refreshed annually with enhanced controls to address emerging cyber threats. In their latest version of the SWIFT CSP CSCF (v2024), there are 25 mandatory and seven advisory controls.
SWIFT has also established an Independent Assessment Framework (IAF) where all SWIFT participants with a Live Business Identified Code (BIC) are required to attest using the Know Your Customer – Self-Attestation (KYC-SA) portal on an annual basis. The attestation submissions in the portal bring transparency and enables SWIFT participants to evaluate their counterparties’ controls compliance before on-boarding or continuing business relationships with them.
Evolution and future position
In 2021, SWIFT introduced CSP Independent Assessments (CSPIAs), also known as the Community Standard Assessment (CSA), to support and validate that the annual self-attestations are meeting the SWIFT CSP’s objectives. CSPIAs can be carried out by the second or third line of defence (Internal Audit (IA)), as they are considered independent from operating SWIFT related controls. However, the expectation is that the teams undertaking these assessments should have relevant expertise and industry certifications on cybersecurity. If such options are not available, an external assessment agency can be used. To bring robustness into the attestation process, SWIFT has established the ‘SWIFT-mandated assessment’, where assessment is performed by external agencies only.
It is worth noting that the SWIFT CSPIA is not a full audit but an assessment, with lighter testing requirements and is conducted in a comparatively shorter timescale to a traditional audit. Its purpose is to verify the effective implementation of the controls and that the controls are meeting defined objective as per SWIFT CSCF. A risk-based approach is used to assess the compliance as opposed to an audit checklist.
领英推荐
Role of internal audit (IA) in CSPIA
As per the above, IA, as the third line of defence, can perform the SWIFT CSPIA if it has the right skills and knowledge. ?From 2024, SWIFT has introduced a certification process for external assessors, listed on the SWIFT CSP assessor’s directory, to bring in standardisation. SWIFT SMART training portal has the relevant training material for the preparation of certification.? Whilst this certification is not mandatory for IA, it can upskill and provide the knowledge and skills to effectively assess the controls.? There are several key areas to consider while performing the assessment:
More broadly, in all types of architectures, there could be third-party providers involved including cloud services. In case of cloud infrastructure, all major cloud players have assurance reports that could be consumed while performing the tests.? SWIFT has provided further guidance and clarification related to this subject in Outsourcing Agents Security Requirements Baseline document.
While many considerations are listed above, there could be many specific scenarios and situations with respect to concluding a control to be compliant as per SWIFT’s requirements, for example:
IA may need key subject matter expertise that could be augmented through co-source arrangements with established external agencies. Also, the independent assessment shouldn’t be considered as a one-off exercise. Instead, organisations need to use this as an opportunity to strengthen key controls that are shared with other mission-critical applications, and products and services.
?
Disclaimer: The views reflected in this article are the views of the authors and do not necessarily reflect the views of the global EY organisation or its member firms.
It must be noted that SWIFT does not certify, warrant, endorse or recommend any service provider listed in its directory and SWIFT customers are not required to use providers listed in the directory.
?
?
?