bmad-plus 0.4.4 → 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +54 -0
- package/README.md +5 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +76 -12
- package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
- package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
- package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +31 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,276 @@
|
|
|
1
|
+
# SOC 2 Vendor Risk Reference
|
|
2
|
+
|
|
3
|
+
## Table of Contents
|
|
4
|
+
1. [Vendor Risk Program Overview](#vendor-risk-program-overview)
|
|
5
|
+
2. [Vendor Inventory Template](#vendor-inventory-template)
|
|
6
|
+
3. [Vendor Risk Questionnaire](#vendor-risk-questionnaire)
|
|
7
|
+
4. [Reviewing a Vendor's SOC 2 Report](#reviewing-a-vendors-soc-2-report)
|
|
8
|
+
5. [CUEC Management](#cuec-management)
|
|
9
|
+
6. [Vendor Onboarding Checklist](#vendor-onboarding-checklist)
|
|
10
|
+
|
|
11
|
+
---
|
|
12
|
+
|
|
13
|
+
## Vendor Risk Program Overview
|
|
14
|
+
|
|
15
|
+
SOC 2 CC9.2 requires organizations to assess and manage risks arising from vendors and business
|
|
16
|
+
partners who have access to systems or data, or on whom the organization depends for critical
|
|
17
|
+
services.
|
|
18
|
+
|
|
19
|
+
### What auditors look for:
|
|
20
|
+
1. A **vendor inventory** exists and is maintained
|
|
21
|
+
2. Vendors are **tiered by risk** and assessed accordingly
|
|
22
|
+
3. **Due diligence** was performed before critical vendors were onboarded
|
|
23
|
+
4. Vendor assessments are **reviewed at least annually**
|
|
24
|
+
5. **Contracts** include appropriate security and data protection requirements
|
|
25
|
+
6. **CUECs** from vendor SOC 2 reports are identified and addressed
|
|
26
|
+
|
|
27
|
+
---
|
|
28
|
+
|
|
29
|
+
## Vendor Inventory Template
|
|
30
|
+
|
|
31
|
+
Maintain a spreadsheet or GRC tool record for each vendor:
|
|
32
|
+
|
|
33
|
+
| Field | Description |
|
|
34
|
+
|---|---|
|
|
35
|
+
| Vendor Name | Legal entity name |
|
|
36
|
+
| Service Provided | What they do for you |
|
|
37
|
+
| Risk Tier | Critical / High / Medium / Low |
|
|
38
|
+
| Data Access | Types of data they can access (PII, Confidential, none) |
|
|
39
|
+
| System Access | Production / Staging / None |
|
|
40
|
+
| SOC 2 Available? | Yes / No / In progress |
|
|
41
|
+
| Last Assessment Date | Date of most recent due diligence |
|
|
42
|
+
| Next Review Due | Based on tier cadence |
|
|
43
|
+
| Contract Expiry | Date |
|
|
44
|
+
| DPA Signed? | Yes / No / N/A |
|
|
45
|
+
| Security Addendum? | Yes / No / N/A |
|
|
46
|
+
| Primary Contact | Vendor security/legal contact |
|
|
47
|
+
| Owner | Internal stakeholder who owns the relationship |
|
|
48
|
+
|
|
49
|
+
### Risk Tier Definitions
|
|
50
|
+
|
|
51
|
+
**Critical:** Vendor has access to production systems or processes/stores customer PII.
|
|
52
|
+
Examples: AWS, Azure, GCP, Salesforce, Snowflake, Stripe, database vendors.
|
|
53
|
+
- Requires: SOC 2 report review OR full questionnaire + annual re-assessment
|
|
54
|
+
- Contract must include: DPA, security addendum, breach notification <72hr, right to audit
|
|
55
|
+
|
|
56
|
+
**High:** Vendor processes sensitive business data or is operationally critical.
|
|
57
|
+
Examples: HR systems (Workday, Rippling), GitHub, Slack, identity providers.
|
|
58
|
+
- Requires: SOC 2 report or questionnaire annually
|
|
59
|
+
- Contract must include: DPA (if any personal data), security requirements
|
|
60
|
+
|
|
61
|
+
**Medium:** Limited data exposure, some operational dependency.
|
|
62
|
+
Examples: Project management tools, design tools, analytics platforms.
|
|
63
|
+
- Requires: Security questionnaire or SOC 2 review at onboarding + biennial review
|
|
64
|
+
- Contract should include: acceptable use and data handling clauses
|
|
65
|
+
|
|
66
|
+
**Low:** No meaningful data access, low operational risk.
|
|
67
|
+
Examples: Office supplies vendors, most SaaS point solutions without data access.
|
|
68
|
+
- Requires: Lightweight onboarding check (do they have a security program?)
|
|
69
|
+
- Standard contract terms sufficient
|
|
70
|
+
|
|
71
|
+
---
|
|
72
|
+
|
|
73
|
+
## Vendor Risk Questionnaire
|
|
74
|
+
|
|
75
|
+
Use this questionnaire for High/Critical vendors that don't have a SOC 2 report, or to
|
|
76
|
+
supplement a SOC 2 report. Customize based on the vendor's service type.
|
|
77
|
+
|
|
78
|
+
---
|
|
79
|
+
|
|
80
|
+
### Section 1: Company and Security Program
|
|
81
|
+
|
|
82
|
+
1. Does your organization have a documented Information Security Policy? If yes, when was it last reviewed?
|
|
83
|
+
|
|
84
|
+
2. Do you have a dedicated security function (e.g., CISO, security team)? Please describe its structure.
|
|
85
|
+
|
|
86
|
+
3. Has your organization undergone any third-party security assessments in the past 12 months? (SOC 2, ISO 27001, pen test, etc.) If yes, please provide the most recent report or executive summary.
|
|
87
|
+
|
|
88
|
+
4. Does your organization carry cybersecurity insurance? Please provide coverage amount.
|
|
89
|
+
|
|
90
|
+
5. Have you experienced a security incident or data breach in the past 24 months that affected customers? If yes, please describe.
|
|
91
|
+
|
|
92
|
+
---
|
|
93
|
+
|
|
94
|
+
### Section 2: Access Controls
|
|
95
|
+
|
|
96
|
+
6. Do you enforce multi-factor authentication (MFA) for access to systems that process our data? Which systems require MFA?
|
|
97
|
+
|
|
98
|
+
7. How do you manage privileged/admin access? Do you use a Privileged Access Management (PAM) solution?
|
|
99
|
+
|
|
100
|
+
8. How quickly are accounts for terminated employees deprovisioned? What is your offboarding process?
|
|
101
|
+
|
|
102
|
+
9. Do you perform periodic access reviews? How frequently?
|
|
103
|
+
|
|
104
|
+
10. Is access to customer data restricted to personnel who require it for their role (least privilege)?
|
|
105
|
+
|
|
106
|
+
---
|
|
107
|
+
|
|
108
|
+
### Section 3: Data Protection
|
|
109
|
+
|
|
110
|
+
11. What data do you collect, process, or store on our behalf? Please provide a data inventory or data flow diagram.
|
|
111
|
+
|
|
112
|
+
12. Is data encrypted at rest? If yes, what encryption standard is used?
|
|
113
|
+
|
|
114
|
+
13. Is data encrypted in transit? What TLS version is enforced?
|
|
115
|
+
|
|
116
|
+
14. How is our data logically separated from data belonging to other customers (multi-tenancy)?
|
|
117
|
+
|
|
118
|
+
15. What is your data retention policy? How and when is our data deleted at contract end?
|
|
119
|
+
|
|
120
|
+
16. Do you have a sub-processor/sub-vendor list? Will you notify us before engaging new sub-processors?
|
|
121
|
+
|
|
122
|
+
---
|
|
123
|
+
|
|
124
|
+
### Section 4: Incident Response
|
|
125
|
+
|
|
126
|
+
17. Do you have a documented Incident Response Plan? When was it last tested?
|
|
127
|
+
|
|
128
|
+
18. What is your process and timeline for notifying customers of a security incident that affects their data?
|
|
129
|
+
|
|
130
|
+
19. Do you maintain security logs? For how long are logs retained?
|
|
131
|
+
|
|
132
|
+
20. Do you have a SIEM or security monitoring solution in place?
|
|
133
|
+
|
|
134
|
+
---
|
|
135
|
+
|
|
136
|
+
### Section 5: Vulnerability Management
|
|
137
|
+
|
|
138
|
+
21. How frequently do you perform vulnerability scanning on systems that process our data?
|
|
139
|
+
|
|
140
|
+
22. What is your SLA for remediating critical and high vulnerabilities?
|
|
141
|
+
|
|
142
|
+
23. How frequently do you perform penetration testing? Who performs it (internal or third-party)?
|
|
143
|
+
|
|
144
|
+
24. Do you have a patch management program? What is your patching cadence?
|
|
145
|
+
|
|
146
|
+
---
|
|
147
|
+
|
|
148
|
+
### Section 6: Business Continuity
|
|
149
|
+
|
|
150
|
+
25. Do you have a Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)?
|
|
151
|
+
|
|
152
|
+
26. What are your RTO (Recovery Time Objective) and RPO (Recovery Point Objective) for the systems we depend on?
|
|
153
|
+
|
|
154
|
+
27. How frequently do you test your DR plan? When was the last test performed?
|
|
155
|
+
|
|
156
|
+
28. Do you have redundant infrastructure (e.g., multi-region, HA setup)?
|
|
157
|
+
|
|
158
|
+
---
|
|
159
|
+
|
|
160
|
+
### Section 7: Compliance and Legal
|
|
161
|
+
|
|
162
|
+
29. Are you subject to any industry-specific compliance requirements (HIPAA, PCI-DSS, GDPR, etc.)? Are you currently compliant?
|
|
163
|
+
|
|
164
|
+
30. Are you willing to sign a Data Processing Agreement (DPA) with our organization?
|
|
165
|
+
|
|
166
|
+
31. Will you notify us within 72 hours of becoming aware of a breach involving our data?
|
|
167
|
+
|
|
168
|
+
32. Do you have a process for responding to Data Subject Requests (DSRs) that require action on data you process on our behalf?
|
|
169
|
+
|
|
170
|
+
---
|
|
171
|
+
|
|
172
|
+
### Scoring Guidance
|
|
173
|
+
|
|
174
|
+
For each question, score:
|
|
175
|
+
- **2** — Fully in place with evidence available
|
|
176
|
+
- **1** — Partially in place or controls exist but not fully documented/tested
|
|
177
|
+
- **0** — Not in place
|
|
178
|
+
|
|
179
|
+
| Score Range | Risk Level | Recommendation |
|
|
180
|
+
|---|---|---|
|
|
181
|
+
| 45–64 | Low risk | Proceed; standard contract terms |
|
|
182
|
+
| 30–44 | Medium risk | Proceed with DPA; annual re-review |
|
|
183
|
+
| 15–29 | High risk | Requires security addendum; risk acceptance from CISO |
|
|
184
|
+
| 0–14 | Critical risk | Escalate to leadership; consider alternative vendor |
|
|
185
|
+
|
|
186
|
+
---
|
|
187
|
+
|
|
188
|
+
## Reviewing a Vendor's SOC 2 Report
|
|
189
|
+
|
|
190
|
+
When a vendor provides their SOC 2 report, review the following:
|
|
191
|
+
|
|
192
|
+
### 1. Report Basics
|
|
193
|
+
- **Report type:** Is it Type 1 (design only) or Type 2 (operating effectiveness)? Prefer Type 2.
|
|
194
|
+
- **Audit period:** Does it cover a recent period? Reports older than 12 months are stale.
|
|
195
|
+
- **Criteria in scope:** Does the report include the criteria relevant to your use case? (e.g., if you care about availability, is Availability in scope?)
|
|
196
|
+
- **Auditor:** Is the CPA firm reputable? (Larger firms: Deloitte, KPMG, EY, PwC, Grant Thornton, etc.)
|
|
197
|
+
|
|
198
|
+
### 2. Auditor's Opinion
|
|
199
|
+
- **Unqualified (clean) opinion:** No material exceptions.
|
|
200
|
+
- **Qualified opinion:** One or more criteria not met — flag for review.
|
|
201
|
+
- **Adverse opinion:** Multiple failures — escalate, this is a significant red flag.
|
|
202
|
+
|
|
203
|
+
### 3. Exceptions and Deviations
|
|
204
|
+
- Read the "results of tests of controls" section carefully.
|
|
205
|
+
- Any **exceptions** (control failures during the audit period) must be evaluated:
|
|
206
|
+
- Is the control we depend on the one that had exceptions?
|
|
207
|
+
- What was the vendor's remediation plan?
|
|
208
|
+
- Has it been addressed (look for management response)?
|
|
209
|
+
|
|
210
|
+
### 4. Complementary User Entity Controls (CUECs)
|
|
211
|
+
- Look for a section titled "Complementary User Entity Controls" or similar.
|
|
212
|
+
- These are controls the vendor *requires you to operate* for their controls to be effective.
|
|
213
|
+
- You must address every applicable CUEC (see [CUEC Management](#cuec-management) below).
|
|
214
|
+
|
|
215
|
+
### 5. System Description
|
|
216
|
+
- Does the description match the services you actually use?
|
|
217
|
+
- Are the systems and infrastructure you depend on included in scope?
|
|
218
|
+
|
|
219
|
+
### Review Log Entry
|
|
220
|
+
|
|
221
|
+
Document each vendor SOC 2 review:
|
|
222
|
+
```
|
|
223
|
+
Vendor: [Name]
|
|
224
|
+
Report Type: Type 1 / Type 2
|
|
225
|
+
Audit Period: [From] – [To]
|
|
226
|
+
Date Reviewed: [Date]
|
|
227
|
+
Reviewed By: [Name / Role]
|
|
228
|
+
Opinion: Unqualified / Qualified / Adverse
|
|
229
|
+
Notable Exceptions: [None / Description]
|
|
230
|
+
CUECs Identified: [None / List]
|
|
231
|
+
CUECs Addressed: [Yes / Partial / No — with details]
|
|
232
|
+
Risk Rating: Low / Medium / High
|
|
233
|
+
Action Items: [Any follow-up required]
|
|
234
|
+
```
|
|
235
|
+
|
|
236
|
+
---
|
|
237
|
+
|
|
238
|
+
## CUEC Management
|
|
239
|
+
|
|
240
|
+
CUECs (Complementary User Entity Controls) are controls a vendor assumes *you* have in place.
|
|
241
|
+
If you don't have them, the vendor's controls may not fully protect your environment.
|
|
242
|
+
|
|
243
|
+
### Common CUECs and Typical Responses
|
|
244
|
+
|
|
245
|
+
| Common CUEC | Typical Vendor (Example) | Your Corresponding Control |
|
|
246
|
+
|---|---|---|
|
|
247
|
+
| "User entities restrict access to the service using the vendor's access control features" | AWS, Salesforce | Access control policy; MFA enforcement; role-based access |
|
|
248
|
+
| "User entities are responsible for monitoring for unauthorized access using access logs" | AWS CloudTrail, Okta | SIEM ingesting vendor logs; alerting on suspicious logins |
|
|
249
|
+
| "User entities configure data encryption using the features provided" | AWS S3, RDS | Encryption enabled at rest; documented in system configuration |
|
|
250
|
+
| "User entities are responsible for their users' credentials" | Any SaaS | Password policy; MFA policy; offboarding process |
|
|
251
|
+
| "User entities notify the vendor of any personnel changes" | Managed service providers | Offboarding SOP includes notifying critical vendors |
|
|
252
|
+
| "User entities perform their own risk assessments" | Most vendors | Annual risk assessment process (CC3) |
|
|
253
|
+
|
|
254
|
+
### CUEC Tracking Spreadsheet Fields
|
|
255
|
+
|
|
256
|
+
| CUEC # | Vendor | CUEC Description | Applicable? | Corresponding Control | Evidence | Owner | Status |
|
|
257
|
+
|---|---|---|---|---|---|---|---|
|
|
258
|
+
| 1 | AWS | Users restrict access via IAM | Yes | Access Control Policy + IAM review | Quarterly IAM review records | DevOps | Met |
|
|
259
|
+
| 2 | Salesforce | Users monitor login activity | Yes | SIEM ingests Salesforce logs | SIEM screenshots | Security | Met |
|
|
260
|
+
|
|
261
|
+
---
|
|
262
|
+
|
|
263
|
+
## Vendor Onboarding Checklist
|
|
264
|
+
|
|
265
|
+
Before onboarding a new Critical or High-tier vendor:
|
|
266
|
+
|
|
267
|
+
- [ ] Risk tier assigned based on data access and operational dependency
|
|
268
|
+
- [ ] Security questionnaire sent (or SOC 2 report requested)
|
|
269
|
+
- [ ] Questionnaire/report reviewed and scored
|
|
270
|
+
- [ ] Risk acceptance documented if score is medium/high
|
|
271
|
+
- [ ] Data Processing Agreement (DPA) executed (if PII involved)
|
|
272
|
+
- [ ] Security addendum signed (for Critical vendors)
|
|
273
|
+
- [ ] Contract includes: breach notification <72hr, data deletion on termination, right to audit
|
|
274
|
+
- [ ] CUECs identified and mapped to internal controls
|
|
275
|
+
- [ ] Vendor added to inventory with next review date
|
|
276
|
+
- [ ] Onboarding approved by CISO or security owner
|
|
@@ -0,0 +1,202 @@
|
|
|
1
|
+
# SWIFT CSCF — Assessment Process, Attestation, and Cross-Framework Mapping
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
|
|
5
|
+
## KYC-SA Attestation Process
|
|
6
|
+
|
|
7
|
+
### Overview
|
|
8
|
+
All SWIFT users must submit an annual **KYC Security Attestation (KYC-SA)** confirming compliance with the CSCF mandatory controls. The attestation is submitted through the SWIFT portal at swift.com/myswift and is visible to your counterparties.
|
|
9
|
+
|
|
10
|
+
### Attestation Workflow
|
|
11
|
+
|
|
12
|
+
1. **Prepare evidence** — Gather implementation evidence for all 23 mandatory controls applicable to your architecture type
|
|
13
|
+
2. **Engage independent assessor** — Community-standard users must have an independent assessor validate compliance (see below)
|
|
14
|
+
3. **Complete KYC-SA form** — For each mandatory control, attest: Implemented / Partially Implemented / Not Implemented
|
|
15
|
+
4. **Submit by July 31** — Annual deadline; late submission triggers counterparty notifications
|
|
16
|
+
5. **Address counterparty queries** — Counterparties can view your attestation and may request clarification
|
|
17
|
+
|
|
18
|
+
### Independent Assessment Requirements
|
|
19
|
+
|
|
20
|
+
Since CSCF v2020, an **independent assessment** is required for all users (previously self-attestation was permitted for smaller institutions):
|
|
21
|
+
|
|
22
|
+
| Assessment Standard | Applies To |
|
|
23
|
+
|--------------------|-----------|
|
|
24
|
+
| Community Standard Assessment (CSA) | All SWIFT users not subject to Enhanced Standard |
|
|
25
|
+
| Enhanced Standard | Users on enhanced programmes or at regulator request |
|
|
26
|
+
|
|
27
|
+
**Who can act as an independent assessor:**
|
|
28
|
+
- Internal audit team (if sufficiently independent from the SWIFT operations team)
|
|
29
|
+
- External audit firm with SWIFT CSP assessment competency
|
|
30
|
+
- SWIFT-certified assessors (listed on SWIFT's KYC Registry)
|
|
31
|
+
- The assessor must not have operational responsibility for the SWIFT environment assessed
|
|
32
|
+
|
|
33
|
+
**Assessment scope:** All 23 mandatory controls applicable to the architecture type; advisory controls optionally included.
|
|
34
|
+
|
|
35
|
+
---
|
|
36
|
+
|
|
37
|
+
## CSCF v2024 → v2025 Key Changes
|
|
38
|
+
|
|
39
|
+
| Change Area | v2024 | v2025 |
|
|
40
|
+
|-------------|-------|-------|
|
|
41
|
+
| Control count | 31 (23 mandatory, 8 advisory) | 31 (no change) |
|
|
42
|
+
| 2.2 Patching SLAs | Critical: 7 days | Critical: 3 days (tightened) |
|
|
43
|
+
| 4.2 MFA | Hardware token strongly recommended | Hardware token explicitly required; clarified app-based OTP insufficient for most types |
|
|
44
|
+
| 6.4 Log retention | 1 year minimum | Clarified: 1 year online, 3 years total |
|
|
45
|
+
| 7.1 SWIFT notification | 24-hour notification | Unchanged; emphasis on 30-day full report |
|
|
46
|
+
| A4 (Cloud) | Introduced in v2023 | Further clarified; cloud-specific guidance expanded |
|
|
47
|
+
| Assessment guidance | Community standard | Updated assessor qualification criteria |
|
|
48
|
+
|
|
49
|
+
---
|
|
50
|
+
|
|
51
|
+
## SWIFT Incident Notification Obligations
|
|
52
|
+
|
|
53
|
+
SWIFT requires notification when a cyber incident affects SWIFT infrastructure or transactions:
|
|
54
|
+
|
|
55
|
+
| Milestone | Deadline |
|
|
56
|
+
|-----------|----------|
|
|
57
|
+
| Initial notification to SWIFT (via CISO mailbox or KYC-SA portal) | 24 hours from confirmed cyber incident |
|
|
58
|
+
| Full incident report to SWIFT | 30 days |
|
|
59
|
+
| Internal escalation to senior management | Immediately upon detection |
|
|
60
|
+
| Law enforcement / regulatory notification | Per local requirements (varies by jurisdiction) |
|
|
61
|
+
|
|
62
|
+
**What constitutes a notifiable incident:**
|
|
63
|
+
- Unauthorised access to SWIFT systems or software
|
|
64
|
+
- Compromise of SWIFT credentials (operator tokens, passwords)
|
|
65
|
+
- Fraudulent or anomalous SWIFT transactions suspected to be cyber-related
|
|
66
|
+
- Malware found on SWIFT-connected systems
|
|
67
|
+
- Ransomware affecting the SWIFT zone
|
|
68
|
+
|
|
69
|
+
**SWIFT contact for incidents:** security@swift.com (SWIFT CISO office) and your SWIFT relationship manager.
|
|
70
|
+
|
|
71
|
+
---
|
|
72
|
+
|
|
73
|
+
## Service Bureau (Type B) Responsibilities
|
|
74
|
+
|
|
75
|
+
When using a service bureau (Type B architecture), responsibilities are split:
|
|
76
|
+
|
|
77
|
+
| Control Area | Service Bureau Responsibility | Customer Responsibility |
|
|
78
|
+
|-------------|-------------------------------|------------------------|
|
|
79
|
+
| SWIFT infrastructure security (1.1, 2.2, 2.3, 6.1, 6.2, 6.3) | Bureau attests on their KYC-SA | Customer must obtain and review bureau's KYC-SA |
|
|
80
|
+
| Operator access (4.2, 5.1) | Bureau provides access mechanism | Customer responsible for own operators' access |
|
|
81
|
+
| Log monitoring (6.4) | Bureau provides logs; may operate SIEM | Customer should receive relevant logs; review access |
|
|
82
|
+
| Incident response (7.1) | Bureau has own IRP | Customer must have SWIFT-specific addendum |
|
|
83
|
+
| Training (7.2) | Bureau trains its own staff | Customer trains own SWIFT users |
|
|
84
|
+
|
|
85
|
+
**Key obligation:** Customers using a service bureau must review their bureau's KYC-SA attestation annually and obtain assurance of compliance (Control 2.8). If the bureau is non-compliant, the customer may face counterparty notifications.
|
|
86
|
+
|
|
87
|
+
---
|
|
88
|
+
|
|
89
|
+
## Cross-Framework Mapping
|
|
90
|
+
|
|
91
|
+
### SWIFT CSCF ↔ ISO/IEC 27001:2022
|
|
92
|
+
|
|
93
|
+
| CSCF Control | ISO 27001:2022 Annex A Controls |
|
|
94
|
+
|-------------|--------------------------------|
|
|
95
|
+
| 1.1 SWIFT Environment Protection | A.8.22 (Segregation of networks), A.8.20 (Network security) |
|
|
96
|
+
| 1.2 OS Privileged Account Control | A.8.2 (Privileged access rights), A.8.18 (Use of privileged utility programs) |
|
|
97
|
+
| 1.4 Internet Restriction | A.8.20 (Network security), A.8.22 (Segregation) |
|
|
98
|
+
| 2.1 Internal Data Flow Security | A.8.24 (Cryptography), A.8.20 (Network security) |
|
|
99
|
+
| 2.2 Security Updates | A.8.8 (Management of technical vulnerabilities) |
|
|
100
|
+
| 2.3 System Hardening | A.8.8 (Technical vulnerability management), A.8.9 (Configuration management) |
|
|
101
|
+
| 2.6 Operator Session Security | A.8.24 (Cryptography), A.8.20 (Network security) |
|
|
102
|
+
| 2.7 Vulnerability Scanning | A.8.8 (Technical vulnerability management) |
|
|
103
|
+
| 2.8 Critical Activity Outsourcing | A.5.19 (Supplier relationships), A.5.20 (Addressing security in supplier agreements) |
|
|
104
|
+
| 3.1 Physical Security | A.7.1 (Physical security perimeters), A.7.2 (Physical entry) |
|
|
105
|
+
| 4.1 Password Policy | A.8.5 (Secure authentication) |
|
|
106
|
+
| 4.2 Multi-Factor Authentication | A.8.5 (Secure authentication) |
|
|
107
|
+
| 5.1 Logical Access Controls | A.8.3 (Information access restriction), A.8.2 (Privileged access rights) |
|
|
108
|
+
| 5.2 Token Management | A.8.5 (Secure authentication), A.8.2 (Privileged access rights) |
|
|
109
|
+
| 6.1 Malware Protection | A.8.7 (Protection against malware) |
|
|
110
|
+
| 6.2 Software Integrity | A.8.19 (Installation of software on operational systems), A.8.29 (Security testing in development) |
|
|
111
|
+
| 6.3 Database Integrity | A.8.3 (Information access restriction) |
|
|
112
|
+
| 6.4 Log and Monitoring | A.8.15 (Logging), A.8.16 (Monitoring activities) |
|
|
113
|
+
| 7.1 Incident Response | A.5.24 (Planning and preparation), A.5.26 (Response to incidents) |
|
|
114
|
+
| 7.2 Security Training | A.6.3 (Information security awareness) |
|
|
115
|
+
|
|
116
|
+
**Synergy note:** An ISO 27001-certified organisation will have satisfied many CSCF controls through their ISMS. However, SWIFT CSP adds SWIFT-specific requirements (e.g., hardware MFA tokens, SWIFT log sources, KYC-SA submission) that are not automatically covered by ISO 27001.
|
|
117
|
+
|
|
118
|
+
---
|
|
119
|
+
|
|
120
|
+
### SWIFT CSCF ↔ PCI DSS v4.0.1
|
|
121
|
+
|
|
122
|
+
| CSCF Control | PCI DSS Requirement |
|
|
123
|
+
|-------------|---------------------|
|
|
124
|
+
| 1.1 SWIFT Environment Protection | Req 1 (Network security controls), Req 1.2 (Firewall rules) |
|
|
125
|
+
| 1.4 Internet Restriction | Req 1.3 (Restrict inbound/outbound traffic) |
|
|
126
|
+
| 2.2 Security Updates | Req 6.3 (Security vulnerabilities addressed) |
|
|
127
|
+
| 2.3 System Hardening | Req 2.2 (System components configured securely) |
|
|
128
|
+
| 4.1 Password Policy | Req 8.3 (Strong authentication) |
|
|
129
|
+
| 4.2 Multi-Factor Authentication | Req 8.4 (MFA for non-console admin access and remote access) |
|
|
130
|
+
| 5.1 Logical Access Controls | Req 7 (Restrict access to system components and cardholder data) |
|
|
131
|
+
| 6.1 Malware Protection | Req 5 (Protect against malicious software) |
|
|
132
|
+
| 6.4 Log and Monitoring | Req 10 (Log and monitor all access) |
|
|
133
|
+
| 7.1 Incident Response | Req 12.10 (Incident response plan) |
|
|
134
|
+
|
|
135
|
+
**Key difference:** PCI DSS focuses on cardholder data environments; SWIFT CSP focuses on the SWIFT messaging infrastructure. A PCI-compliant organisation will have a strong security foundation but will need SWIFT-specific additions (e.g., hardware MFA, SWIFT log sources, 1-year log retention, KYC-SA submission).
|
|
136
|
+
|
|
137
|
+
---
|
|
138
|
+
|
|
139
|
+
### SWIFT CSCF ↔ NIST CSF 2.0
|
|
140
|
+
|
|
141
|
+
| CSCF Control | NIST CSF 2.0 Function/Category |
|
|
142
|
+
|-------------|-------------------------------|
|
|
143
|
+
| 1.1 SWIFT Environment Protection | PR.IR (Infrastructure Resilience) |
|
|
144
|
+
| 2.2 Security Updates | PR.PS-2 (Software, firmware patched) |
|
|
145
|
+
| 2.3 System Hardening | PR.PS-1 (Configuration management) |
|
|
146
|
+
| 4.2 MFA | PR.AA-3 (Authentication) |
|
|
147
|
+
| 5.1 Logical Access Controls | PR.AA-1 (Identity management) |
|
|
148
|
+
| 6.1 Malware Protection | PR.PS-3 (Malware protection) |
|
|
149
|
+
| 6.4 Log and Monitoring | DE.CM (Continuous monitoring) |
|
|
150
|
+
| 7.1 Incident Response | RS.MA (Incident management) |
|
|
151
|
+
| 7.2 Security Training | PR.AT (Awareness and training) |
|
|
152
|
+
|
|
153
|
+
---
|
|
154
|
+
|
|
155
|
+
## Regulatory Context
|
|
156
|
+
|
|
157
|
+
SWIFT CSP compliance is increasingly referenced in financial sector regulation:
|
|
158
|
+
|
|
159
|
+
| Jurisdiction | Regulatory Reference |
|
|
160
|
+
|-------------|---------------------|
|
|
161
|
+
| **EU** | ECB TIBER-EU framework; EBA ICT guidelines under DORA reference SWIFT CSP for financial messaging |
|
|
162
|
+
| **US** | FFIEC Cybersecurity Assessment Tool references correspondent banking controls; NY DFS 23 NYCRR 500 aligns to SWIFT CSP |
|
|
163
|
+
| **UK** | Bank of England / PRA supervisory expectations for payment systems include SWIFT CSP |
|
|
164
|
+
| **Singapore** | MAS TRM (Technology Risk Management) guidelines align to SWIFT CSP for banks |
|
|
165
|
+
| **Hong Kong** | HKMA Cybersecurity Fortification Initiative (CFI) references SWIFT CSP for Tier 1 and 2 banks |
|
|
166
|
+
| **Australia** | APRA CPS 234 includes SWIFT CSP controls under critical third-party system security |
|
|
167
|
+
|
|
168
|
+
---
|
|
169
|
+
|
|
170
|
+
## Gap Assessment Checklist Template
|
|
171
|
+
|
|
172
|
+
For each mandatory control, assess against these criteria:
|
|
173
|
+
|
|
174
|
+
| Column | Description |
|
|
175
|
+
|--------|-------------|
|
|
176
|
+
| Control ID | e.g., 4.2 |
|
|
177
|
+
| Status | 🔴 Not Implemented / 🟡 Partially Implemented / 🟢 Implemented |
|
|
178
|
+
| Evidence Available | Yes / No / Partial |
|
|
179
|
+
| Evidence Type | Policy / Configuration / Logs / Test result / Screenshot |
|
|
180
|
+
| Gap Description | Specific gap narrative |
|
|
181
|
+
| Remediation Action | Concrete step to close the gap |
|
|
182
|
+
| Owner | Team/individual responsible |
|
|
183
|
+
| Target Date | When gap will be closed |
|
|
184
|
+
| Attestation Impact | If 🔴: Attest as Not Implemented; if 🟡: Partially; if 🟢: Implemented |
|
|
185
|
+
|
|
186
|
+
---
|
|
187
|
+
|
|
188
|
+
## Most Common CSCF Non-Compliance Patterns
|
|
189
|
+
|
|
190
|
+
1. **Software-based OTP for MFA (Control 4.2):** Many organisations use authenticator apps rather than hardware tokens. SWIFT CSP requires hardware tokens for most architecture types.
|
|
191
|
+
|
|
192
|
+
2. **Shared operator accounts (Control 5.1):** Named individual accounts not enforced; multiple operators sharing one account ID — makes non-repudiation impossible.
|
|
193
|
+
|
|
194
|
+
3. **Log retention gaps (Control 6.4):** Logs collected but not retained for 1+ years; SWIFT-specific log sources (Alliance Access/Gateway) not included in SIEM scope.
|
|
195
|
+
|
|
196
|
+
4. **Patch exceptions undocumented (Control 2.2):** Critical patches overdue beyond 3-day SLA with no documented exception/compensating control.
|
|
197
|
+
|
|
198
|
+
5. **SWIFT zone not documented (Control 1.1):** Secure Zone exists technically but no network diagram; or servers are dual-homed to both SWIFT zone and corporate network.
|
|
199
|
+
|
|
200
|
+
6. **No SWIFT-specific IRP (Control 7.1):** General incident response plan exists but no SWIFT-specific section covering SWIFT notification obligations and fraud scenarios.
|
|
201
|
+
|
|
202
|
+
7. **Token inventory not maintained (Control 5.2):** Hardware tokens issued but no central inventory; deprovisioning process for leavers undocumented.
|