bmad-plus 0.4.3 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +48 -0
- package/README.md +4 -3
- package/package.json +5 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +22 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +514 -394
|
@@ -0,0 +1,545 @@
|
|
|
1
|
+
# SWIFT CSCF v2025 — Full Control Reference
|
|
2
|
+
|
|
3
|
+
All 31 controls across 3 objectives. Architecture applicability: ✅ = Mandatory | 🔶 = Advisory | ➖ = Not Applicable
|
|
4
|
+
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
## Architecture Applicability Matrix
|
|
8
|
+
|
|
9
|
+
| Control | A1 | A2 | A3 | A4 | B |
|
|
10
|
+
|---------|----|----|----|----|---|
|
|
11
|
+
| 1.1 SWIFT Environment Protection | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
12
|
+
| 1.2 OS Privileged Account Control | ✅ | ✅ | ➖ | ➖ | ✅ |
|
|
13
|
+
| 1.3A Virtualisation Platform Security | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
|
|
14
|
+
| 1.4 Restriction of Internet Access | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
15
|
+
| 1.5A Customer Environment Protection | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
|
|
16
|
+
| 2.1 Internal Data Flow Security | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
17
|
+
| 2.2 Security Updates | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
18
|
+
| 2.3 System Hardening | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
19
|
+
| 2.4A Back-Office Data Flow Security | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
|
|
20
|
+
| 2.5A External Transmission Data Protection | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
|
|
21
|
+
| 2.6 Operator Session Confidentiality | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
22
|
+
| 2.7 Vulnerability Scanning | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
23
|
+
| 2.8 Critical Activity Outsourcing | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
24
|
+
| 2.9A Transaction Business Controls | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
|
|
25
|
+
| 2.10 Application Hardening | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
26
|
+
| 2.11A RMA Business Controls | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
|
|
27
|
+
| 3.1 Physical Security | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
28
|
+
| 4.1 Password Policy | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
29
|
+
| 4.2 Multi-Factor Authentication | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
30
|
+
| 5.1 Logical Access Controls | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
31
|
+
| 5.2 Token Management | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
32
|
+
| 5.3A Staffing | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
|
|
33
|
+
| 5.4 Physical and Logical Password Storage | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
34
|
+
| 6.1 Malware Protection | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
35
|
+
| 6.2 Software Integrity | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
36
|
+
| 6.3 Database Integrity | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
37
|
+
| 6.4 Log and Monitoring | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
38
|
+
| 6.5A Intrusion Detection | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
|
|
39
|
+
| 7.1 Cyber Incident Response Planning | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
40
|
+
| 7.2 Security Training and Awareness | ✅ | ✅ | ✅ | ✅ | ✅ |
|
|
41
|
+
| 7.3A Penetration Testing | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
|
|
42
|
+
| 7.4A Scenario Risk Assessment | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
|
|
43
|
+
|
|
44
|
+
---
|
|
45
|
+
|
|
46
|
+
## Objective 1 — Secure Your Environment
|
|
47
|
+
|
|
48
|
+
### Control 1.1 — SWIFT Environment Protection (Mandatory)
|
|
49
|
+
|
|
50
|
+
**Purpose:** Create and maintain a dedicated, protected SWIFT zone isolated from the general IT environment and internet.
|
|
51
|
+
|
|
52
|
+
**Requirements:**
|
|
53
|
+
- Establish a dedicated **Secure Zone** containing all SWIFT infrastructure components (Alliance Access/Gateway, HSMs, operator workstations used exclusively for SWIFT)
|
|
54
|
+
- The Secure Zone must be isolated from the general IT environment by firewalls with deny-by-default rules
|
|
55
|
+
- SWIFT servers must not be used for non-SWIFT activities (email, web browsing, general business applications)
|
|
56
|
+
- Network flows in and out of the Secure Zone must be documented and restricted to those strictly necessary
|
|
57
|
+
- Dual-homed systems (connected to both SWIFT zone and general network) are prohibited
|
|
58
|
+
|
|
59
|
+
**Evidence artifacts:**
|
|
60
|
+
- Network architecture diagram showing SWIFT Secure Zone boundaries
|
|
61
|
+
- Firewall ruleset documentation and change records
|
|
62
|
+
- System inventory for all components in the Secure Zone
|
|
63
|
+
- Configuration evidence that servers are dedicated (no dual-homing)
|
|
64
|
+
|
|
65
|
+
**Implementation steps:**
|
|
66
|
+
1. Map all current SWIFT components and their network connectivity
|
|
67
|
+
2. Design SWIFT Secure Zone with dedicated VLAN or physical segment
|
|
68
|
+
3. Deploy stateful firewall between Secure Zone and general corporate network
|
|
69
|
+
4. Configure deny-all default rules; whitelist only required flows
|
|
70
|
+
5. Remove any shared-use applications from SWIFT servers
|
|
71
|
+
6. Document and periodically review all approved network flows
|
|
72
|
+
|
|
73
|
+
---
|
|
74
|
+
|
|
75
|
+
### Control 1.2 — OS Privileged Account Control (Mandatory — A1, A2, B only)
|
|
76
|
+
|
|
77
|
+
**Purpose:** Restrict and control privileged operating system accounts on SWIFT infrastructure.
|
|
78
|
+
|
|
79
|
+
**Requirements:**
|
|
80
|
+
- Privileged OS accounts (root, local admin) must not be used for routine operations
|
|
81
|
+
- Privileged accounts must have strong authentication (MFA where technically feasible)
|
|
82
|
+
- All use of privileged accounts must be logged and reviewable
|
|
83
|
+
- Default/factory OS accounts must be renamed or disabled
|
|
84
|
+
- Privileged access must follow least-privilege and need-to-know principles
|
|
85
|
+
|
|
86
|
+
**Evidence artifacts:**
|
|
87
|
+
- Privileged account inventory for all SWIFT servers
|
|
88
|
+
- Evidence of MFA for privileged sessions (PAM tool screenshots, auth logs)
|
|
89
|
+
- Policy for privileged account usage
|
|
90
|
+
- OS audit logs showing privileged account activity
|
|
91
|
+
|
|
92
|
+
---
|
|
93
|
+
|
|
94
|
+
### Control 1.3A — Virtualisation Platform Security (Advisory)
|
|
95
|
+
|
|
96
|
+
**Purpose:** Secure the hypervisor and virtualisation layer if SWIFT components run on virtual machines.
|
|
97
|
+
|
|
98
|
+
**Requirements:**
|
|
99
|
+
- Hypervisor patched to current supported version
|
|
100
|
+
- Hypervisor management interfaces restricted (no general user access)
|
|
101
|
+
- VM isolation configured; no shared storage between SWIFT VMs and general VMs
|
|
102
|
+
- Snapshots of SWIFT VMs treated as sensitive; protected and retention-controlled
|
|
103
|
+
|
|
104
|
+
**Evidence artifacts:**
|
|
105
|
+
- Hypervisor version and patch status
|
|
106
|
+
- Access control list for hypervisor management console
|
|
107
|
+
- VM architecture diagram showing isolation
|
|
108
|
+
|
|
109
|
+
---
|
|
110
|
+
|
|
111
|
+
### Control 1.4 — Restriction of Internet Access (Mandatory)
|
|
112
|
+
|
|
113
|
+
**Purpose:** Prevent SWIFT servers and operator workstations from having direct internet access.
|
|
114
|
+
|
|
115
|
+
**Requirements:**
|
|
116
|
+
- SWIFT servers must have no direct internet access
|
|
117
|
+
- SWIFT-dedicated operator workstations must have internet access blocked
|
|
118
|
+
- Where internet access is technically necessary for SWIFT operations (e.g., SWIFTNet access), traffic must be strictly controlled and monitored
|
|
119
|
+
- Jump servers or proxies used for administration must not be internet-facing
|
|
120
|
+
|
|
121
|
+
**Evidence artifacts:**
|
|
122
|
+
- Firewall rules showing internet access blocked for SWIFT zone IPs
|
|
123
|
+
- Proxy configuration if applicable
|
|
124
|
+
- Network flow test results
|
|
125
|
+
|
|
126
|
+
---
|
|
127
|
+
|
|
128
|
+
### Control 1.5A — Customer Environment Protection (Advisory)
|
|
129
|
+
|
|
130
|
+
**Purpose:** Extend security controls to protect the broader customer IT environment from threats that could cascade to SWIFT.
|
|
131
|
+
|
|
132
|
+
---
|
|
133
|
+
|
|
134
|
+
### Control 2.1 — Internal Data Flow Security (Mandatory)
|
|
135
|
+
|
|
136
|
+
**Purpose:** Protect SWIFT message data in transit within the customer environment.
|
|
137
|
+
|
|
138
|
+
**Requirements:**
|
|
139
|
+
- All connections between SWIFT components within the Secure Zone must be encrypted or physically protected
|
|
140
|
+
- TLS 1.2+ required for all internal connections carrying SWIFT data
|
|
141
|
+
- Message broker connections (MQ, middleware) must be authenticated and encrypted
|
|
142
|
+
- Back-office to SWIFT interface connections must be secured
|
|
143
|
+
|
|
144
|
+
**Evidence artifacts:**
|
|
145
|
+
- Data flow diagram showing all internal SWIFT connections
|
|
146
|
+
- TLS configuration evidence for each connection
|
|
147
|
+
- Certificate inventory with expiry tracking
|
|
148
|
+
|
|
149
|
+
---
|
|
150
|
+
|
|
151
|
+
### Control 2.2 — Security Updates (Mandatory)
|
|
152
|
+
|
|
153
|
+
**Purpose:** Apply security patches to SWIFT-related software and underlying systems promptly.
|
|
154
|
+
|
|
155
|
+
**Patching SLAs:**
|
|
156
|
+
| Severity | Maximum Remediation Time |
|
|
157
|
+
|----------|--------------------------|
|
|
158
|
+
| Critical / Emergency SWIFT advisory | 3 calendar days |
|
|
159
|
+
| High | 90 calendar days |
|
|
160
|
+
| Medium | Next scheduled maintenance cycle |
|
|
161
|
+
| Low | Best effort; documented |
|
|
162
|
+
|
|
163
|
+
**Requirements:**
|
|
164
|
+
- All SWIFT-connected systems (OS, middleware, SWIFT application) included in patch scope
|
|
165
|
+
- SWIFT-issued security advisories must be tracked and acted upon
|
|
166
|
+
- Exceptions documented with risk acceptance and compensating controls
|
|
167
|
+
|
|
168
|
+
**Evidence artifacts:**
|
|
169
|
+
- Vulnerability/patch management tool reports showing SWIFT components
|
|
170
|
+
- Evidence of SWIFT advisory subscription and action log
|
|
171
|
+
- Exception register with approval dates
|
|
172
|
+
|
|
173
|
+
---
|
|
174
|
+
|
|
175
|
+
### Control 2.3 — System Hardening (Mandatory)
|
|
176
|
+
|
|
177
|
+
**Purpose:** Apply security hardening baselines to all SWIFT-connected systems.
|
|
178
|
+
|
|
179
|
+
**Requirements:**
|
|
180
|
+
- Apply CIS Benchmarks (or equivalent hardening standard) to all SWIFT servers and operator workstations
|
|
181
|
+
- Disable all unnecessary services, ports, and protocols
|
|
182
|
+
- Remove all unused software and accounts
|
|
183
|
+
- Enforce host-based firewalls on SWIFT systems
|
|
184
|
+
- Document and maintain hardening baseline; re-check after every change
|
|
185
|
+
|
|
186
|
+
**Evidence artifacts:**
|
|
187
|
+
- Hardening baseline document per system type
|
|
188
|
+
- Configuration scan results vs. baseline (CIS-CAT or equivalent)
|
|
189
|
+
- Evidence of unnecessary services disabled (netstat/ss output)
|
|
190
|
+
|
|
191
|
+
---
|
|
192
|
+
|
|
193
|
+
### Control 2.4A — Back-Office Data Flow Security (Advisory)
|
|
194
|
+
|
|
195
|
+
**Purpose:** Protect SWIFT transaction data as it flows between SWIFT components and back-office / ERP systems.
|
|
196
|
+
|
|
197
|
+
---
|
|
198
|
+
|
|
199
|
+
### Control 2.5A — External Transmission Data Protection (Advisory)
|
|
200
|
+
|
|
201
|
+
**Purpose:** Encrypt SWIFT-related data transmitted outside the customer environment.
|
|
202
|
+
|
|
203
|
+
---
|
|
204
|
+
|
|
205
|
+
### Control 2.6 — Operator Session Confidentiality and Integrity (Mandatory)
|
|
206
|
+
|
|
207
|
+
**Purpose:** Protect operator sessions to SWIFT applications from interception and tampering.
|
|
208
|
+
|
|
209
|
+
**Requirements:**
|
|
210
|
+
- All operator sessions to SWIFT applications must use TLS 1.2+ or equivalent encryption
|
|
211
|
+
- Sessions must be authenticated via MFA (aligned to 4.2)
|
|
212
|
+
- Session timeouts configured (maximum 30 minutes of inactivity)
|
|
213
|
+
- Session logs retained per control 6.4 requirements
|
|
214
|
+
- Clipboard, screen-share, and remote control tools restricted on SWIFT workstations during sessions
|
|
215
|
+
|
|
216
|
+
**Evidence artifacts:**
|
|
217
|
+
- TLS configuration for Alliance Access/Gateway web interface
|
|
218
|
+
- Session timeout configuration screenshots
|
|
219
|
+
- Remote access tool inventory and restriction evidence
|
|
220
|
+
|
|
221
|
+
---
|
|
222
|
+
|
|
223
|
+
### Control 2.7 — Vulnerability Scanning (Mandatory)
|
|
224
|
+
|
|
225
|
+
**Purpose:** Identify and remediate vulnerabilities in SWIFT-connected systems through regular scanning.
|
|
226
|
+
|
|
227
|
+
**Requirements:**
|
|
228
|
+
- Quarterly credentialed vulnerability scans of all in-scope SWIFT systems
|
|
229
|
+
- Scans must be authenticated (credentialed) — unauthenticated scans do not meet the requirement
|
|
230
|
+
- Results reviewed and remediated per Control 2.2 patching SLAs
|
|
231
|
+
- Scan coverage includes OS, middleware, SWIFT application components, and network devices in Secure Zone
|
|
232
|
+
|
|
233
|
+
**Evidence artifacts:**
|
|
234
|
+
- Vulnerability scan reports for last 4 quarters (showing SWIFT system IPs/hostnames)
|
|
235
|
+
- Evidence of authenticated scans (scanner configuration or credential records)
|
|
236
|
+
- Remediation tracking for identified vulnerabilities
|
|
237
|
+
|
|
238
|
+
---
|
|
239
|
+
|
|
240
|
+
### Control 2.8 — Critical Activity Outsourcing (Mandatory)
|
|
241
|
+
|
|
242
|
+
**Purpose:** Ensure security obligations are maintained when SWIFT-related activities are outsourced.
|
|
243
|
+
|
|
244
|
+
**Requirements:**
|
|
245
|
+
- If any SWIFT-related activity is outsourced (service bureau, managed SOC, cloud), the outsourced party must comply with applicable CSCF controls
|
|
246
|
+
- Contracts must include SWIFT CSP security obligations
|
|
247
|
+
- Annual review of outsourced providers' compliance evidence (their KYC-SA attestation or equivalent)
|
|
248
|
+
- The attesting entity remains responsible for compliance regardless of outsourcing
|
|
249
|
+
|
|
250
|
+
**Evidence artifacts:**
|
|
251
|
+
- Contracts with SWIFT security obligations
|
|
252
|
+
- Provider KYC-SA attestations or audit reports
|
|
253
|
+
- Annual vendor review records
|
|
254
|
+
|
|
255
|
+
---
|
|
256
|
+
|
|
257
|
+
### Control 2.9A — Transaction Business Controls (Advisory)
|
|
258
|
+
|
|
259
|
+
**Purpose:** Implement business-level controls to detect and prevent fraudulent SWIFT transactions.
|
|
260
|
+
|
|
261
|
+
**Includes:** Payment value thresholds, expected transaction patterns, time-of-day restrictions, currency controls, beneficiary whitelisting.
|
|
262
|
+
|
|
263
|
+
---
|
|
264
|
+
|
|
265
|
+
### Control 2.10 — Application Hardening (Mandatory)
|
|
266
|
+
|
|
267
|
+
**Purpose:** Apply security hardening to SWIFT application software (Alliance Access/Gateway).
|
|
268
|
+
|
|
269
|
+
**Requirements:**
|
|
270
|
+
- SWIFT software configured per SWIFT's published Security Hardening Guides for Alliance Access and Alliance Gateway
|
|
271
|
+
- Unused SWIFT application features and interfaces disabled
|
|
272
|
+
- Application accounts configured with least privilege
|
|
273
|
+
- Default passwords changed; application-level accounts reviewed quarterly
|
|
274
|
+
|
|
275
|
+
**Evidence artifacts:**
|
|
276
|
+
- Completed SWIFT Alliance Access / Alliance Gateway Security Hardening Guide checklist
|
|
277
|
+
- Application configuration screenshots showing disabled modules
|
|
278
|
+
- Application account audit report
|
|
279
|
+
|
|
280
|
+
---
|
|
281
|
+
|
|
282
|
+
### Control 2.11A — RMA Business Controls (Advisory)
|
|
283
|
+
|
|
284
|
+
**Purpose:** Control and monitor Relationship Management Application (RMA) authorisations to limit counterparty message flows.
|
|
285
|
+
|
|
286
|
+
---
|
|
287
|
+
|
|
288
|
+
### Control 3.1 — Physical Security (Mandatory)
|
|
289
|
+
|
|
290
|
+
**Purpose:** Physically protect SWIFT infrastructure from unauthorised access, tampering, and damage.
|
|
291
|
+
|
|
292
|
+
**Requirements:**
|
|
293
|
+
- SWIFT servers housed in a locked, access-controlled facility (data centre or equivalent)
|
|
294
|
+
- Access restricted to named individuals with documented authorisation
|
|
295
|
+
- Physical access logged electronically (badge reader or equivalent)
|
|
296
|
+
- Visitor access controlled and escorted
|
|
297
|
+
- SWIFT-dedicated operator workstations in physically controlled areas
|
|
298
|
+
|
|
299
|
+
**Evidence artifacts:**
|
|
300
|
+
- Physical access control system logs
|
|
301
|
+
- Authorised access list for data centre / SWIFT server room
|
|
302
|
+
- CCTV or access badge system evidence
|
|
303
|
+
|
|
304
|
+
---
|
|
305
|
+
|
|
306
|
+
## Objective 2 — Know and Limit Access
|
|
307
|
+
|
|
308
|
+
### Control 4.1 — Password Policy (Mandatory)
|
|
309
|
+
|
|
310
|
+
**Purpose:** Enforce strong password requirements for all accounts accessing SWIFT systems.
|
|
311
|
+
|
|
312
|
+
**Requirements:**
|
|
313
|
+
- Minimum password length: 14 characters (or per organisational policy if stricter)
|
|
314
|
+
- Complexity: upper, lower, number, special character
|
|
315
|
+
- Maximum password age: 90 days for privileged accounts; 180 days for standard accounts
|
|
316
|
+
- No password reuse for 12 generations
|
|
317
|
+
- Account lockout after 5 failed attempts
|
|
318
|
+
- No shared or generic accounts
|
|
319
|
+
|
|
320
|
+
**Evidence artifacts:**
|
|
321
|
+
- Password policy document
|
|
322
|
+
- Group Policy / AD configuration screenshots
|
|
323
|
+
- Account lockout configuration evidence
|
|
324
|
+
|
|
325
|
+
---
|
|
326
|
+
|
|
327
|
+
### Control 4.2 — Multi-Factor Authentication (Mandatory)
|
|
328
|
+
|
|
329
|
+
**Purpose:** Require MFA for all interactive operator access to the SWIFT environment.
|
|
330
|
+
|
|
331
|
+
**Requirements:**
|
|
332
|
+
- MFA mandatory for **all** interactive logins to SWIFT applications (Alliance Access, Alliance Gateway, SWIFT GUI)
|
|
333
|
+
- MFA mandatory for remote administrative access to SWIFT systems
|
|
334
|
+
- Acceptable MFA methods: hardware OTP tokens, smart cards with PIN, FIDO2 hardware keys
|
|
335
|
+
- Software-based OTP (authenticator apps on shared devices) **does not satisfy** this requirement for most architecture types
|
|
336
|
+
- Token lifecycle management must align with Control 5.2
|
|
337
|
+
|
|
338
|
+
**Evidence artifacts:**
|
|
339
|
+
- MFA configuration evidence for each SWIFT interface
|
|
340
|
+
- Token inventory showing all operator tokens
|
|
341
|
+
- Authentication logs showing MFA enforcement
|
|
342
|
+
- Exemption register if any accounts are excluded (must be approved and documented)
|
|
343
|
+
|
|
344
|
+
---
|
|
345
|
+
|
|
346
|
+
### Control 5.1 — Logical Access Controls (Mandatory)
|
|
347
|
+
|
|
348
|
+
**Purpose:** Enforce least-privilege access to SWIFT applications and data.
|
|
349
|
+
|
|
350
|
+
**Requirements:**
|
|
351
|
+
- Individual named accounts for every SWIFT operator — no shared accounts
|
|
352
|
+
- Role-based access aligned to business need; no default admin access for standard operators
|
|
353
|
+
- Dual authorisation required for high-risk operations (e.g., creating new BIC connections)
|
|
354
|
+
- Quarterly access reviews; remove stale/terminated user access within 24 hours of departure
|
|
355
|
+
- Operator privileges documented and approved by a control function
|
|
356
|
+
|
|
357
|
+
**Evidence artifacts:**
|
|
358
|
+
- User access list with roles and approval evidence
|
|
359
|
+
- Access review records (last four quarters)
|
|
360
|
+
- Evidence of dual-authorisation for high-risk actions
|
|
361
|
+
- Leaver process records showing timely access removal
|
|
362
|
+
|
|
363
|
+
---
|
|
364
|
+
|
|
365
|
+
### Control 5.2 — Token Management (Mandatory)
|
|
366
|
+
|
|
367
|
+
**Purpose:** Manage the lifecycle of authentication tokens used to access SWIFT systems.
|
|
368
|
+
|
|
369
|
+
**Requirements:**
|
|
370
|
+
- Token inventory maintained for all SWIFT operators
|
|
371
|
+
- Lost/stolen tokens reported immediately and deactivated within 1 hour
|
|
372
|
+
- Token allocation requires formal approval
|
|
373
|
+
- Token return process documented for leavers
|
|
374
|
+
- Token storage policy (e.g., not left unattended in public areas)
|
|
375
|
+
- Annual token inventory reconciliation
|
|
376
|
+
|
|
377
|
+
**Evidence artifacts:**
|
|
378
|
+
- Token inventory register
|
|
379
|
+
- Token issuance and return records
|
|
380
|
+
- Lost token incident records (if any)
|
|
381
|
+
- Annual reconciliation evidence
|
|
382
|
+
|
|
383
|
+
---
|
|
384
|
+
|
|
385
|
+
### Control 5.3A — Staffing (Advisory)
|
|
386
|
+
|
|
387
|
+
**Purpose:** Implement personnel security measures for staff with SWIFT access.
|
|
388
|
+
|
|
389
|
+
---
|
|
390
|
+
|
|
391
|
+
### Control 5.4 — Physical and Logical Password Storage (Mandatory)
|
|
392
|
+
|
|
393
|
+
**Purpose:** Protect passwords and credentials used for SWIFT systems from exposure.
|
|
394
|
+
|
|
395
|
+
**Requirements:**
|
|
396
|
+
- SWIFT application passwords and credentials must be stored in an approved password manager or CyberArk/PAM vault
|
|
397
|
+
- No passwords stored in plaintext files, spreadsheets, or unencrypted documents
|
|
398
|
+
- Emergency/break-glass credentials stored in sealed envelopes with tamper evidence — access logged
|
|
399
|
+
- Default application credentials changed on installation and after each maintenance
|
|
400
|
+
|
|
401
|
+
**Evidence artifacts:**
|
|
402
|
+
- Password manager / PAM tool evidence showing SWIFT credentials
|
|
403
|
+
- Break-glass credential procedure and access log
|
|
404
|
+
- Evidence of changed default credentials
|
|
405
|
+
|
|
406
|
+
---
|
|
407
|
+
|
|
408
|
+
## Objective 3 — Detect and Respond
|
|
409
|
+
|
|
410
|
+
### Control 6.1 — Malware Protection (Mandatory)
|
|
411
|
+
|
|
412
|
+
**Purpose:** Deploy and maintain anti-malware protection on SWIFT-connected systems.
|
|
413
|
+
|
|
414
|
+
**Requirements:**
|
|
415
|
+
- Anti-malware deployed on all SWIFT servers and operator workstations in scope
|
|
416
|
+
- Malware definitions updated daily (automated)
|
|
417
|
+
- Real-time scanning enabled
|
|
418
|
+
- Scheduled full scans configured
|
|
419
|
+
- Alerts for malware detections sent to security team within 1 hour
|
|
420
|
+
- Malware found on SWIFT systems treated as a security incident per Control 7.1
|
|
421
|
+
|
|
422
|
+
**Evidence artifacts:**
|
|
423
|
+
- Anti-malware configuration and deployment scope screenshots
|
|
424
|
+
- Definition update log (last 30 days)
|
|
425
|
+
- Alert configuration evidence
|
|
426
|
+
- Scan history reports
|
|
427
|
+
|
|
428
|
+
---
|
|
429
|
+
|
|
430
|
+
### Control 6.2 — Software Integrity (Mandatory)
|
|
431
|
+
|
|
432
|
+
**Purpose:** Verify the integrity of SWIFT software before installation and after updates to detect tampering.
|
|
433
|
+
|
|
434
|
+
**Requirements:**
|
|
435
|
+
- Verify cryptographic hash of SWIFT software packages before installation (compare against SWIFT-published checksums)
|
|
436
|
+
- Integrity verification repeated after any SWIFT software update
|
|
437
|
+
- Unauthorised changes to SWIFT executable files must trigger an incident
|
|
438
|
+
- File integrity monitoring (FIM) recommended for SWIFT binary directories
|
|
439
|
+
- Evidence of integrity verification retained for audit
|
|
440
|
+
|
|
441
|
+
**Evidence artifacts:**
|
|
442
|
+
- Hash verification records for SWIFT software installations and updates
|
|
443
|
+
- FIM configuration (if deployed) covering SWIFT directories
|
|
444
|
+
- Integrity check procedure document
|
|
445
|
+
|
|
446
|
+
---
|
|
447
|
+
|
|
448
|
+
### Control 6.3 — Database Integrity (Mandatory)
|
|
449
|
+
|
|
450
|
+
**Purpose:** Protect SWIFT transaction data and configuration data in databases from unauthorised modification.
|
|
451
|
+
|
|
452
|
+
**Requirements:**
|
|
453
|
+
- Database access restricted to authorised SWIFT application service accounts only
|
|
454
|
+
- No direct database access by operators for production systems
|
|
455
|
+
- Database change logging enabled; changes alerted to security team
|
|
456
|
+
- Regular database integrity checks configured
|
|
457
|
+
- Database backups tested; restoration procedures documented
|
|
458
|
+
|
|
459
|
+
**Evidence artifacts:**
|
|
460
|
+
- Database access control configuration
|
|
461
|
+
- Database audit log samples
|
|
462
|
+
- Backup and restoration test records
|
|
463
|
+
|
|
464
|
+
---
|
|
465
|
+
|
|
466
|
+
### Control 6.4 — Log and Monitoring (Mandatory)
|
|
467
|
+
|
|
468
|
+
**Purpose:** Capture, retain, and review security-relevant events from SWIFT systems to detect anomalies.
|
|
469
|
+
|
|
470
|
+
**Requirements:**
|
|
471
|
+
- **Log sources in scope:** Alliance Access/Gateway application logs, OS security logs, authentication logs, network device logs for SWIFT zone, database audit logs
|
|
472
|
+
- **Minimum retention:** 1 year online/hot; 3 years total (hot + archived)
|
|
473
|
+
- **Review frequency:** Daily review of SWIFT transaction anomalies and authentication failures; weekly review of other events
|
|
474
|
+
- **Alerting:** Automated alerts for: failed authentications, after-hours logins, large/unusual transactions, privilege escalation, config changes
|
|
475
|
+
- SIEM or equivalent must be configured to ingest SWIFT log sources
|
|
476
|
+
- Log integrity must be protected (logs shipped to immutable SIEM or read-only store)
|
|
477
|
+
|
|
478
|
+
**Evidence artifacts:**
|
|
479
|
+
- SIEM configuration showing SWIFT log sources
|
|
480
|
+
- Log retention policy and technical evidence (log archive tool configuration)
|
|
481
|
+
- Sample alert rules for SWIFT anomalies
|
|
482
|
+
- Log review records (last 30 days)
|
|
483
|
+
|
|
484
|
+
---
|
|
485
|
+
|
|
486
|
+
### Control 6.5A — Intrusion Detection (Advisory)
|
|
487
|
+
|
|
488
|
+
**Purpose:** Deploy network or host-based intrusion detection for the SWIFT zone.
|
|
489
|
+
|
|
490
|
+
---
|
|
491
|
+
|
|
492
|
+
### Control 7.1 — Cyber Incident Response Planning (Mandatory)
|
|
493
|
+
|
|
494
|
+
**Purpose:** Maintain a documented, tested incident response capability for SWIFT-specific cyber incidents.
|
|
495
|
+
|
|
496
|
+
**Requirements:**
|
|
497
|
+
- Documented **SWIFT-specific Incident Response Plan (IRP)** covering: detection triggers, triage, containment, notification (internal and SWIFT), investigation, recovery, lessons learned
|
|
498
|
+
- IRP must define when and how to notify SWIFT (via SWIFT's CISO or through KYC-SA) — SWIFT requires notification within 24 hours of a confirmed cyber incident affecting SWIFT infrastructure
|
|
499
|
+
- IRP tested annually (tabletop exercise or live drill)
|
|
500
|
+
- Contact list for SWIFT support and internal incident team maintained and tested
|
|
501
|
+
- Evidence preservation requirements defined (forensic images, log preservation)
|
|
502
|
+
|
|
503
|
+
**SWIFT Incident Notification Obligations:**
|
|
504
|
+
- Notify SWIFT within 24 hours of confirming a cyber incident affecting SWIFT infrastructure or transactions
|
|
505
|
+
- Submit full incident report to SWIFT within 30 days
|
|
506
|
+
- Cooperate with SWIFT investigations
|
|
507
|
+
|
|
508
|
+
**Evidence artifacts:**
|
|
509
|
+
- SWIFT Incident Response Plan document (dated, approved)
|
|
510
|
+
- Last annual test record (tabletop or drill report)
|
|
511
|
+
- SWIFT notification contact list
|
|
512
|
+
- Sample incident log (if available)
|
|
513
|
+
|
|
514
|
+
---
|
|
515
|
+
|
|
516
|
+
### Control 7.2 — Security Training and Awareness (Mandatory)
|
|
517
|
+
|
|
518
|
+
**Purpose:** Ensure all staff with SWIFT access receive security awareness training.
|
|
519
|
+
|
|
520
|
+
**Requirements:**
|
|
521
|
+
- Annual security awareness training for all staff with access to SWIFT systems
|
|
522
|
+
- Training must include: phishing awareness, social engineering, SWIFT fraud scenarios (Bangladesh Bank-style attacks), incident reporting procedures
|
|
523
|
+
- Training completion tracked and evidenced
|
|
524
|
+
- Role-specific training for SWIFT operators covering CSP requirements
|
|
525
|
+
|
|
526
|
+
**Evidence artifacts:**
|
|
527
|
+
- Training completion records for all SWIFT users (last 12 months)
|
|
528
|
+
- Training content overview (showing SWIFT-specific topics)
|
|
529
|
+
- Role-specific training materials for operators
|
|
530
|
+
|
|
531
|
+
---
|
|
532
|
+
|
|
533
|
+
### Control 7.3A — Penetration Testing (Advisory)
|
|
534
|
+
|
|
535
|
+
**Purpose:** Conduct penetration testing of the SWIFT environment to identify vulnerabilities not found by scanning.
|
|
536
|
+
|
|
537
|
+
**Best practice:** Annual penetration test of SWIFT Secure Zone, including network perimeter, application layer (Alliance Access), and authentication mechanisms. Red-team exercise every 2–3 years.
|
|
538
|
+
|
|
539
|
+
---
|
|
540
|
+
|
|
541
|
+
### Control 7.4A — Scenario Risk Assessment (Advisory)
|
|
542
|
+
|
|
543
|
+
**Purpose:** Conduct scenario-based risk assessments for SWIFT-specific attack scenarios.
|
|
544
|
+
|
|
545
|
+
**Scenarios to assess:** Insider fraud, compromised SWIFT operator credentials, supply chain attack on SWIFT software, social engineering targeting SWIFT operators, ransomware propagation to SWIFT zone.
|