SWIFT CSP Assessment

Strengthening Financial Cybersecurity

The SWIFT Customer Security Programme (CSP) initiative was launched by the Society for Worldwide Interbank Financial Telecommunication (SWIFT) in 2016 and aims to strengthen the security of the global financial community. 

The programme aims to bolster the security by setting out a series of mandatory and advisory security controls. These controls are designed to help SWIFT users enhance their cyber defenses and protect their SWIFT-related infrastructure. 

As BDO is a Certified CSP Assessment Provider, we would like to share our insights into Swift’s focus areas for v2024 and the upcoming changes.

Customer Secyrity Control Framework v2024

Evolution of the SWIFT CSP

Evolution of the Swift CSP In an era where digitalisation has transformed the way financial institutions work, the security of financial data and transactions is more important than ever. Following a number of security breaches at financial institutions, Swift became concerned about the security of its users. They decided to create a set of security controls and requires all its users to attest their level of compliance with these controls transparently. The CSP is continually updated to address new threats and weaknesses in the ever-changing cybersecurity landscape.

Objectives, Principles & Controls

Swift has defined a set of security objectives, which are linked to seven principles and covered by the set of controls in the Customer Security Controls Framework (CSCF). The CSCF consists of 25 mandatory and 7 advisory controls, but not all controls are applicable to all architecture types: it depends on the extent to which an organisation is integrated with Swift systems. 

      • A note on timing: Swift users are required to confirm their compliance with the mandatory security controls between 1 July and 31 December of each year – whether fully compliant or not! 


Objectives

Objectives, principles & controls3 OBJECTIVES AND 7 PRINCIPLES:

  • Secure Your Environment 

1. Restrict Internet access & segregate critical systems from general IT environment

2. Reduce attack surface and vulnerabilities

3. Physically secure the environment 

  • Know and Limit Access 

4. Prevent compromise of credentials 

5. Manage identities and segregate privileges 

  • Detect and Respond 

6. Detect anomalous activity to system or transaction records 

7. Plan for incident response and information sharing 


CSP Assessment Methodology

Our Team

Get in touch with us

Krishna Radhakeesoon

Krishna Radhakeesoon

Partner - IT Governance & Consulting
personView bio
Nirvana Bhikajee Baurhoo

Nirvana Bhikajee Baurhoo

Manager - IT Governance & Consulting
personView bio