InfoGuard AG (Headquarter)
Lindenstrasse 10
6340 Baar
Switzerland
InfoGuard AG
Stauffacherstrasse 141
3014 Bern
Switzerland
InfoGuard Deutschland GmbH
Landsberger Straße 302
80687 Munich
Germany
The Society for Worldwide Interbank Financial Telecommunication (Swift) is continuously developing its customer security programme (CSP) to meet new challenges. The upcoming changes to the Swift Customer Security Controls Framework (CSCF) v2024 focus on third-party risk management and reflect the increasing security and regulatory concerns in the EU area such as DORA and NIS2. Here we analyse the most important changes to the controls and their impact on you as a Swift user.
In the face of the ongoing threats posed by cyber criminals in the financial sector, compliance requirements are subject to regular revision. The aim is to secure transaction systems in a digital environment that never stands still. In line with this, version 2024 of the SWIFT Customer Security Control Framework (CSCF) also entails various new regulations.
Swift has revised the Customer Security Programme CSP for 2024 and communicated the latest control mechanisms in the binding Swift CSCF v2024.
You need to implement the following control measures by the deadline of 31 December and have them validated by an independent body.
Swift has declared “Control 2.8 Outsourced Critical Activity Protection”, newly introduced for 2024, to be mandatory for all architecture types. This shift from optional to mandatory status emphasises the crucial role of risk management in connection with third-party providers and service providers. And not without good reason: companies all too often grant external parties extensive access, which brings with it additional risks that need to be actively identified and controlled.
In the past, the CSCF focussed on securing the “Swift Secure Zone”, a separate zone with critical components. Swift has now extended its security efforts to the back-office system (core system), as it has identified significant risks in data exchange with back-office applications, including outdated ones.
These risks include the confidentiality and integrity of sensitive data, unauthenticated traffic and unauthorised access to data and systems. Consequently, “Control 2.4A Back Office Data Flow Security” is expected to be mandatory in the coming years.
Swift encourages its users to prepare for the implementation of this requirement.
Further minor changes or clarifications have been made to specific CSCF controls to improve usability and understanding and assist users in implementing the controls correctly.
All users must have the validity of the current controls checked and confirmed annually by an independent body, with full compliance required by 31 December. New participants need to be confirmed prior to joining the Swift network.
In addition to the requirements of Swift v2024, the assessment can be combined with the review of your “Swiss Interbank Clearing” (SIC) network. By utilising the synergies of both assessment procedures, you avoid duplicating the effort and ensure that both networks meet the highest security standards. Whether SIC or Swift assessment – we can support you with both implementation projects – do not hesitate to contact us.
The launch of Swift CSCF v2024 heralds significant changes aimed at improving the security of the global financial transaction network. The new mandatory controls and enhanced recommendations provide a comprehensive framework to protect Swift users from cyber threats. By combining these measures with the SIC requirements, financial institutions can further strengthen their security situation and create a secure and reliable environment for financial transactions.
Act now and ensure that your organisation is Swift-compliant before the deadline. 31 December will come around before you know it. We at InfoGuard are happy to support you in fulfilling the requirements of Swift compliance v2024.