bmad-plus 0.4.4 → 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (197) hide show
  1. package/CHANGELOG.md +54 -0
  2. package/README.md +5 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +76 -12
  8. package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
  9. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
  10. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
  11. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
  12. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
  13. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
  14. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
  15. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
  16. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
  17. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
  18. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
  19. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
  20. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
  21. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
  22. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
  23. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
  24. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
  25. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
  26. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
  27. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
  28. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
  29. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
  30. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
  31. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
  32. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
  33. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
  34. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
  35. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
  36. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
  37. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
  38. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
  39. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
  40. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
  41. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
  42. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
  43. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
  44. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
  45. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
  46. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
  47. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
  48. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
  49. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
  50. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
  51. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
  52. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
  53. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
  54. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
  55. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
  56. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
  57. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
  58. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
  59. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
  60. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
  61. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
  62. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
  63. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
  64. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
  65. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
  66. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
  67. package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
  68. package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
  69. package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
  70. package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
  71. package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
  72. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  73. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  74. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  75. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  76. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  77. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  78. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  79. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  80. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  81. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  82. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  83. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  84. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  85. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  86. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  87. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  88. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  89. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  90. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  91. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  92. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  93. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  94. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  95. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  96. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  97. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  98. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  99. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  100. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  101. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  102. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  103. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  104. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  105. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  106. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  107. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  108. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  109. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  110. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  111. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  112. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  113. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  114. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  115. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  116. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  117. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  118. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  119. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  120. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  121. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  122. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  123. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  124. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  125. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  126. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  127. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  128. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  129. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  130. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  131. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  132. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  133. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  134. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  135. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  136. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  137. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  138. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  139. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  140. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  141. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  142. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  143. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  144. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  145. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  146. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  147. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  148. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  149. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  150. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  151. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  152. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  153. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  154. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  155. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  156. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  157. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  158. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  159. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  160. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  161. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  162. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  163. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  164. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  165. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  166. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  167. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  168. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  169. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  170. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  171. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  172. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  173. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  174. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  175. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  176. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  177. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  178. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  179. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  180. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  181. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  182. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  183. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  184. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  185. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  186. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  187. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  188. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  189. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  190. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  191. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  192. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  193. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  194. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  195. package/tools/cli/commands/install.js +31 -9
  196. package/tools/cli/commands/update.js +4 -2
  197. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,545 @@
1
+ # SWIFT CSCF v2025 — Full Control Reference
2
+
3
+ All 31 controls across 3 objectives. Architecture applicability: ✅ = Mandatory | 🔶 = Advisory | ➖ = Not Applicable
4
+
5
+ ---
6
+
7
+ ## Architecture Applicability Matrix
8
+
9
+ | Control | A1 | A2 | A3 | A4 | B |
10
+ |---------|----|----|----|----|---|
11
+ | 1.1 SWIFT Environment Protection | ✅ | ✅ | ✅ | ✅ | ✅ |
12
+ | 1.2 OS Privileged Account Control | ✅ | ✅ | ➖ | ➖ | ✅ |
13
+ | 1.3A Virtualisation Platform Security | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
14
+ | 1.4 Restriction of Internet Access | ✅ | ✅ | ✅ | ✅ | ✅ |
15
+ | 1.5A Customer Environment Protection | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
16
+ | 2.1 Internal Data Flow Security | ✅ | ✅ | ✅ | ✅ | ✅ |
17
+ | 2.2 Security Updates | ✅ | ✅ | ✅ | ✅ | ✅ |
18
+ | 2.3 System Hardening | ✅ | ✅ | ✅ | ✅ | ✅ |
19
+ | 2.4A Back-Office Data Flow Security | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
20
+ | 2.5A External Transmission Data Protection | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
21
+ | 2.6 Operator Session Confidentiality | ✅ | ✅ | ✅ | ✅ | ✅ |
22
+ | 2.7 Vulnerability Scanning | ✅ | ✅ | ✅ | ✅ | ✅ |
23
+ | 2.8 Critical Activity Outsourcing | ✅ | ✅ | ✅ | ✅ | ✅ |
24
+ | 2.9A Transaction Business Controls | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
25
+ | 2.10 Application Hardening | ✅ | ✅ | ✅ | ✅ | ✅ |
26
+ | 2.11A RMA Business Controls | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
27
+ | 3.1 Physical Security | ✅ | ✅ | ✅ | ✅ | ✅ |
28
+ | 4.1 Password Policy | ✅ | ✅ | ✅ | ✅ | ✅ |
29
+ | 4.2 Multi-Factor Authentication | ✅ | ✅ | ✅ | ✅ | ✅ |
30
+ | 5.1 Logical Access Controls | ✅ | ✅ | ✅ | ✅ | ✅ |
31
+ | 5.2 Token Management | ✅ | ✅ | ✅ | ✅ | ✅ |
32
+ | 5.3A Staffing | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
33
+ | 5.4 Physical and Logical Password Storage | ✅ | ✅ | ✅ | ✅ | ✅ |
34
+ | 6.1 Malware Protection | ✅ | ✅ | ✅ | ✅ | ✅ |
35
+ | 6.2 Software Integrity | ✅ | ✅ | ✅ | ✅ | ✅ |
36
+ | 6.3 Database Integrity | ✅ | ✅ | ✅ | ✅ | ✅ |
37
+ | 6.4 Log and Monitoring | ✅ | ✅ | ✅ | ✅ | ✅ |
38
+ | 6.5A Intrusion Detection | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
39
+ | 7.1 Cyber Incident Response Planning | ✅ | ✅ | ✅ | ✅ | ✅ |
40
+ | 7.2 Security Training and Awareness | ✅ | ✅ | ✅ | ✅ | ✅ |
41
+ | 7.3A Penetration Testing | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
42
+ | 7.4A Scenario Risk Assessment | 🔶 | 🔶 | 🔶 | 🔶 | 🔶 |
43
+
44
+ ---
45
+
46
+ ## Objective 1 — Secure Your Environment
47
+
48
+ ### Control 1.1 — SWIFT Environment Protection (Mandatory)
49
+
50
+ **Purpose:** Create and maintain a dedicated, protected SWIFT zone isolated from the general IT environment and internet.
51
+
52
+ **Requirements:**
53
+ - Establish a dedicated **Secure Zone** containing all SWIFT infrastructure components (Alliance Access/Gateway, HSMs, operator workstations used exclusively for SWIFT)
54
+ - The Secure Zone must be isolated from the general IT environment by firewalls with deny-by-default rules
55
+ - SWIFT servers must not be used for non-SWIFT activities (email, web browsing, general business applications)
56
+ - Network flows in and out of the Secure Zone must be documented and restricted to those strictly necessary
57
+ - Dual-homed systems (connected to both SWIFT zone and general network) are prohibited
58
+
59
+ **Evidence artifacts:**
60
+ - Network architecture diagram showing SWIFT Secure Zone boundaries
61
+ - Firewall ruleset documentation and change records
62
+ - System inventory for all components in the Secure Zone
63
+ - Configuration evidence that servers are dedicated (no dual-homing)
64
+
65
+ **Implementation steps:**
66
+ 1. Map all current SWIFT components and their network connectivity
67
+ 2. Design SWIFT Secure Zone with dedicated VLAN or physical segment
68
+ 3. Deploy stateful firewall between Secure Zone and general corporate network
69
+ 4. Configure deny-all default rules; whitelist only required flows
70
+ 5. Remove any shared-use applications from SWIFT servers
71
+ 6. Document and periodically review all approved network flows
72
+
73
+ ---
74
+
75
+ ### Control 1.2 — OS Privileged Account Control (Mandatory — A1, A2, B only)
76
+
77
+ **Purpose:** Restrict and control privileged operating system accounts on SWIFT infrastructure.
78
+
79
+ **Requirements:**
80
+ - Privileged OS accounts (root, local admin) must not be used for routine operations
81
+ - Privileged accounts must have strong authentication (MFA where technically feasible)
82
+ - All use of privileged accounts must be logged and reviewable
83
+ - Default/factory OS accounts must be renamed or disabled
84
+ - Privileged access must follow least-privilege and need-to-know principles
85
+
86
+ **Evidence artifacts:**
87
+ - Privileged account inventory for all SWIFT servers
88
+ - Evidence of MFA for privileged sessions (PAM tool screenshots, auth logs)
89
+ - Policy for privileged account usage
90
+ - OS audit logs showing privileged account activity
91
+
92
+ ---
93
+
94
+ ### Control 1.3A — Virtualisation Platform Security (Advisory)
95
+
96
+ **Purpose:** Secure the hypervisor and virtualisation layer if SWIFT components run on virtual machines.
97
+
98
+ **Requirements:**
99
+ - Hypervisor patched to current supported version
100
+ - Hypervisor management interfaces restricted (no general user access)
101
+ - VM isolation configured; no shared storage between SWIFT VMs and general VMs
102
+ - Snapshots of SWIFT VMs treated as sensitive; protected and retention-controlled
103
+
104
+ **Evidence artifacts:**
105
+ - Hypervisor version and patch status
106
+ - Access control list for hypervisor management console
107
+ - VM architecture diagram showing isolation
108
+
109
+ ---
110
+
111
+ ### Control 1.4 — Restriction of Internet Access (Mandatory)
112
+
113
+ **Purpose:** Prevent SWIFT servers and operator workstations from having direct internet access.
114
+
115
+ **Requirements:**
116
+ - SWIFT servers must have no direct internet access
117
+ - SWIFT-dedicated operator workstations must have internet access blocked
118
+ - Where internet access is technically necessary for SWIFT operations (e.g., SWIFTNet access), traffic must be strictly controlled and monitored
119
+ - Jump servers or proxies used for administration must not be internet-facing
120
+
121
+ **Evidence artifacts:**
122
+ - Firewall rules showing internet access blocked for SWIFT zone IPs
123
+ - Proxy configuration if applicable
124
+ - Network flow test results
125
+
126
+ ---
127
+
128
+ ### Control 1.5A — Customer Environment Protection (Advisory)
129
+
130
+ **Purpose:** Extend security controls to protect the broader customer IT environment from threats that could cascade to SWIFT.
131
+
132
+ ---
133
+
134
+ ### Control 2.1 — Internal Data Flow Security (Mandatory)
135
+
136
+ **Purpose:** Protect SWIFT message data in transit within the customer environment.
137
+
138
+ **Requirements:**
139
+ - All connections between SWIFT components within the Secure Zone must be encrypted or physically protected
140
+ - TLS 1.2+ required for all internal connections carrying SWIFT data
141
+ - Message broker connections (MQ, middleware) must be authenticated and encrypted
142
+ - Back-office to SWIFT interface connections must be secured
143
+
144
+ **Evidence artifacts:**
145
+ - Data flow diagram showing all internal SWIFT connections
146
+ - TLS configuration evidence for each connection
147
+ - Certificate inventory with expiry tracking
148
+
149
+ ---
150
+
151
+ ### Control 2.2 — Security Updates (Mandatory)
152
+
153
+ **Purpose:** Apply security patches to SWIFT-related software and underlying systems promptly.
154
+
155
+ **Patching SLAs:**
156
+ | Severity | Maximum Remediation Time |
157
+ |----------|--------------------------|
158
+ | Critical / Emergency SWIFT advisory | 3 calendar days |
159
+ | High | 90 calendar days |
160
+ | Medium | Next scheduled maintenance cycle |
161
+ | Low | Best effort; documented |
162
+
163
+ **Requirements:**
164
+ - All SWIFT-connected systems (OS, middleware, SWIFT application) included in patch scope
165
+ - SWIFT-issued security advisories must be tracked and acted upon
166
+ - Exceptions documented with risk acceptance and compensating controls
167
+
168
+ **Evidence artifacts:**
169
+ - Vulnerability/patch management tool reports showing SWIFT components
170
+ - Evidence of SWIFT advisory subscription and action log
171
+ - Exception register with approval dates
172
+
173
+ ---
174
+
175
+ ### Control 2.3 — System Hardening (Mandatory)
176
+
177
+ **Purpose:** Apply security hardening baselines to all SWIFT-connected systems.
178
+
179
+ **Requirements:**
180
+ - Apply CIS Benchmarks (or equivalent hardening standard) to all SWIFT servers and operator workstations
181
+ - Disable all unnecessary services, ports, and protocols
182
+ - Remove all unused software and accounts
183
+ - Enforce host-based firewalls on SWIFT systems
184
+ - Document and maintain hardening baseline; re-check after every change
185
+
186
+ **Evidence artifacts:**
187
+ - Hardening baseline document per system type
188
+ - Configuration scan results vs. baseline (CIS-CAT or equivalent)
189
+ - Evidence of unnecessary services disabled (netstat/ss output)
190
+
191
+ ---
192
+
193
+ ### Control 2.4A — Back-Office Data Flow Security (Advisory)
194
+
195
+ **Purpose:** Protect SWIFT transaction data as it flows between SWIFT components and back-office / ERP systems.
196
+
197
+ ---
198
+
199
+ ### Control 2.5A — External Transmission Data Protection (Advisory)
200
+
201
+ **Purpose:** Encrypt SWIFT-related data transmitted outside the customer environment.
202
+
203
+ ---
204
+
205
+ ### Control 2.6 — Operator Session Confidentiality and Integrity (Mandatory)
206
+
207
+ **Purpose:** Protect operator sessions to SWIFT applications from interception and tampering.
208
+
209
+ **Requirements:**
210
+ - All operator sessions to SWIFT applications must use TLS 1.2+ or equivalent encryption
211
+ - Sessions must be authenticated via MFA (aligned to 4.2)
212
+ - Session timeouts configured (maximum 30 minutes of inactivity)
213
+ - Session logs retained per control 6.4 requirements
214
+ - Clipboard, screen-share, and remote control tools restricted on SWIFT workstations during sessions
215
+
216
+ **Evidence artifacts:**
217
+ - TLS configuration for Alliance Access/Gateway web interface
218
+ - Session timeout configuration screenshots
219
+ - Remote access tool inventory and restriction evidence
220
+
221
+ ---
222
+
223
+ ### Control 2.7 — Vulnerability Scanning (Mandatory)
224
+
225
+ **Purpose:** Identify and remediate vulnerabilities in SWIFT-connected systems through regular scanning.
226
+
227
+ **Requirements:**
228
+ - Quarterly credentialed vulnerability scans of all in-scope SWIFT systems
229
+ - Scans must be authenticated (credentialed) — unauthenticated scans do not meet the requirement
230
+ - Results reviewed and remediated per Control 2.2 patching SLAs
231
+ - Scan coverage includes OS, middleware, SWIFT application components, and network devices in Secure Zone
232
+
233
+ **Evidence artifacts:**
234
+ - Vulnerability scan reports for last 4 quarters (showing SWIFT system IPs/hostnames)
235
+ - Evidence of authenticated scans (scanner configuration or credential records)
236
+ - Remediation tracking for identified vulnerabilities
237
+
238
+ ---
239
+
240
+ ### Control 2.8 — Critical Activity Outsourcing (Mandatory)
241
+
242
+ **Purpose:** Ensure security obligations are maintained when SWIFT-related activities are outsourced.
243
+
244
+ **Requirements:**
245
+ - If any SWIFT-related activity is outsourced (service bureau, managed SOC, cloud), the outsourced party must comply with applicable CSCF controls
246
+ - Contracts must include SWIFT CSP security obligations
247
+ - Annual review of outsourced providers' compliance evidence (their KYC-SA attestation or equivalent)
248
+ - The attesting entity remains responsible for compliance regardless of outsourcing
249
+
250
+ **Evidence artifacts:**
251
+ - Contracts with SWIFT security obligations
252
+ - Provider KYC-SA attestations or audit reports
253
+ - Annual vendor review records
254
+
255
+ ---
256
+
257
+ ### Control 2.9A — Transaction Business Controls (Advisory)
258
+
259
+ **Purpose:** Implement business-level controls to detect and prevent fraudulent SWIFT transactions.
260
+
261
+ **Includes:** Payment value thresholds, expected transaction patterns, time-of-day restrictions, currency controls, beneficiary whitelisting.
262
+
263
+ ---
264
+
265
+ ### Control 2.10 — Application Hardening (Mandatory)
266
+
267
+ **Purpose:** Apply security hardening to SWIFT application software (Alliance Access/Gateway).
268
+
269
+ **Requirements:**
270
+ - SWIFT software configured per SWIFT's published Security Hardening Guides for Alliance Access and Alliance Gateway
271
+ - Unused SWIFT application features and interfaces disabled
272
+ - Application accounts configured with least privilege
273
+ - Default passwords changed; application-level accounts reviewed quarterly
274
+
275
+ **Evidence artifacts:**
276
+ - Completed SWIFT Alliance Access / Alliance Gateway Security Hardening Guide checklist
277
+ - Application configuration screenshots showing disabled modules
278
+ - Application account audit report
279
+
280
+ ---
281
+
282
+ ### Control 2.11A — RMA Business Controls (Advisory)
283
+
284
+ **Purpose:** Control and monitor Relationship Management Application (RMA) authorisations to limit counterparty message flows.
285
+
286
+ ---
287
+
288
+ ### Control 3.1 — Physical Security (Mandatory)
289
+
290
+ **Purpose:** Physically protect SWIFT infrastructure from unauthorised access, tampering, and damage.
291
+
292
+ **Requirements:**
293
+ - SWIFT servers housed in a locked, access-controlled facility (data centre or equivalent)
294
+ - Access restricted to named individuals with documented authorisation
295
+ - Physical access logged electronically (badge reader or equivalent)
296
+ - Visitor access controlled and escorted
297
+ - SWIFT-dedicated operator workstations in physically controlled areas
298
+
299
+ **Evidence artifacts:**
300
+ - Physical access control system logs
301
+ - Authorised access list for data centre / SWIFT server room
302
+ - CCTV or access badge system evidence
303
+
304
+ ---
305
+
306
+ ## Objective 2 — Know and Limit Access
307
+
308
+ ### Control 4.1 — Password Policy (Mandatory)
309
+
310
+ **Purpose:** Enforce strong password requirements for all accounts accessing SWIFT systems.
311
+
312
+ **Requirements:**
313
+ - Minimum password length: 14 characters (or per organisational policy if stricter)
314
+ - Complexity: upper, lower, number, special character
315
+ - Maximum password age: 90 days for privileged accounts; 180 days for standard accounts
316
+ - No password reuse for 12 generations
317
+ - Account lockout after 5 failed attempts
318
+ - No shared or generic accounts
319
+
320
+ **Evidence artifacts:**
321
+ - Password policy document
322
+ - Group Policy / AD configuration screenshots
323
+ - Account lockout configuration evidence
324
+
325
+ ---
326
+
327
+ ### Control 4.2 — Multi-Factor Authentication (Mandatory)
328
+
329
+ **Purpose:** Require MFA for all interactive operator access to the SWIFT environment.
330
+
331
+ **Requirements:**
332
+ - MFA mandatory for **all** interactive logins to SWIFT applications (Alliance Access, Alliance Gateway, SWIFT GUI)
333
+ - MFA mandatory for remote administrative access to SWIFT systems
334
+ - Acceptable MFA methods: hardware OTP tokens, smart cards with PIN, FIDO2 hardware keys
335
+ - Software-based OTP (authenticator apps on shared devices) **does not satisfy** this requirement for most architecture types
336
+ - Token lifecycle management must align with Control 5.2
337
+
338
+ **Evidence artifacts:**
339
+ - MFA configuration evidence for each SWIFT interface
340
+ - Token inventory showing all operator tokens
341
+ - Authentication logs showing MFA enforcement
342
+ - Exemption register if any accounts are excluded (must be approved and documented)
343
+
344
+ ---
345
+
346
+ ### Control 5.1 — Logical Access Controls (Mandatory)
347
+
348
+ **Purpose:** Enforce least-privilege access to SWIFT applications and data.
349
+
350
+ **Requirements:**
351
+ - Individual named accounts for every SWIFT operator — no shared accounts
352
+ - Role-based access aligned to business need; no default admin access for standard operators
353
+ - Dual authorisation required for high-risk operations (e.g., creating new BIC connections)
354
+ - Quarterly access reviews; remove stale/terminated user access within 24 hours of departure
355
+ - Operator privileges documented and approved by a control function
356
+
357
+ **Evidence artifacts:**
358
+ - User access list with roles and approval evidence
359
+ - Access review records (last four quarters)
360
+ - Evidence of dual-authorisation for high-risk actions
361
+ - Leaver process records showing timely access removal
362
+
363
+ ---
364
+
365
+ ### Control 5.2 — Token Management (Mandatory)
366
+
367
+ **Purpose:** Manage the lifecycle of authentication tokens used to access SWIFT systems.
368
+
369
+ **Requirements:**
370
+ - Token inventory maintained for all SWIFT operators
371
+ - Lost/stolen tokens reported immediately and deactivated within 1 hour
372
+ - Token allocation requires formal approval
373
+ - Token return process documented for leavers
374
+ - Token storage policy (e.g., not left unattended in public areas)
375
+ - Annual token inventory reconciliation
376
+
377
+ **Evidence artifacts:**
378
+ - Token inventory register
379
+ - Token issuance and return records
380
+ - Lost token incident records (if any)
381
+ - Annual reconciliation evidence
382
+
383
+ ---
384
+
385
+ ### Control 5.3A — Staffing (Advisory)
386
+
387
+ **Purpose:** Implement personnel security measures for staff with SWIFT access.
388
+
389
+ ---
390
+
391
+ ### Control 5.4 — Physical and Logical Password Storage (Mandatory)
392
+
393
+ **Purpose:** Protect passwords and credentials used for SWIFT systems from exposure.
394
+
395
+ **Requirements:**
396
+ - SWIFT application passwords and credentials must be stored in an approved password manager or CyberArk/PAM vault
397
+ - No passwords stored in plaintext files, spreadsheets, or unencrypted documents
398
+ - Emergency/break-glass credentials stored in sealed envelopes with tamper evidence — access logged
399
+ - Default application credentials changed on installation and after each maintenance
400
+
401
+ **Evidence artifacts:**
402
+ - Password manager / PAM tool evidence showing SWIFT credentials
403
+ - Break-glass credential procedure and access log
404
+ - Evidence of changed default credentials
405
+
406
+ ---
407
+
408
+ ## Objective 3 — Detect and Respond
409
+
410
+ ### Control 6.1 — Malware Protection (Mandatory)
411
+
412
+ **Purpose:** Deploy and maintain anti-malware protection on SWIFT-connected systems.
413
+
414
+ **Requirements:**
415
+ - Anti-malware deployed on all SWIFT servers and operator workstations in scope
416
+ - Malware definitions updated daily (automated)
417
+ - Real-time scanning enabled
418
+ - Scheduled full scans configured
419
+ - Alerts for malware detections sent to security team within 1 hour
420
+ - Malware found on SWIFT systems treated as a security incident per Control 7.1
421
+
422
+ **Evidence artifacts:**
423
+ - Anti-malware configuration and deployment scope screenshots
424
+ - Definition update log (last 30 days)
425
+ - Alert configuration evidence
426
+ - Scan history reports
427
+
428
+ ---
429
+
430
+ ### Control 6.2 — Software Integrity (Mandatory)
431
+
432
+ **Purpose:** Verify the integrity of SWIFT software before installation and after updates to detect tampering.
433
+
434
+ **Requirements:**
435
+ - Verify cryptographic hash of SWIFT software packages before installation (compare against SWIFT-published checksums)
436
+ - Integrity verification repeated after any SWIFT software update
437
+ - Unauthorised changes to SWIFT executable files must trigger an incident
438
+ - File integrity monitoring (FIM) recommended for SWIFT binary directories
439
+ - Evidence of integrity verification retained for audit
440
+
441
+ **Evidence artifacts:**
442
+ - Hash verification records for SWIFT software installations and updates
443
+ - FIM configuration (if deployed) covering SWIFT directories
444
+ - Integrity check procedure document
445
+
446
+ ---
447
+
448
+ ### Control 6.3 — Database Integrity (Mandatory)
449
+
450
+ **Purpose:** Protect SWIFT transaction data and configuration data in databases from unauthorised modification.
451
+
452
+ **Requirements:**
453
+ - Database access restricted to authorised SWIFT application service accounts only
454
+ - No direct database access by operators for production systems
455
+ - Database change logging enabled; changes alerted to security team
456
+ - Regular database integrity checks configured
457
+ - Database backups tested; restoration procedures documented
458
+
459
+ **Evidence artifacts:**
460
+ - Database access control configuration
461
+ - Database audit log samples
462
+ - Backup and restoration test records
463
+
464
+ ---
465
+
466
+ ### Control 6.4 — Log and Monitoring (Mandatory)
467
+
468
+ **Purpose:** Capture, retain, and review security-relevant events from SWIFT systems to detect anomalies.
469
+
470
+ **Requirements:**
471
+ - **Log sources in scope:** Alliance Access/Gateway application logs, OS security logs, authentication logs, network device logs for SWIFT zone, database audit logs
472
+ - **Minimum retention:** 1 year online/hot; 3 years total (hot + archived)
473
+ - **Review frequency:** Daily review of SWIFT transaction anomalies and authentication failures; weekly review of other events
474
+ - **Alerting:** Automated alerts for: failed authentications, after-hours logins, large/unusual transactions, privilege escalation, config changes
475
+ - SIEM or equivalent must be configured to ingest SWIFT log sources
476
+ - Log integrity must be protected (logs shipped to immutable SIEM or read-only store)
477
+
478
+ **Evidence artifacts:**
479
+ - SIEM configuration showing SWIFT log sources
480
+ - Log retention policy and technical evidence (log archive tool configuration)
481
+ - Sample alert rules for SWIFT anomalies
482
+ - Log review records (last 30 days)
483
+
484
+ ---
485
+
486
+ ### Control 6.5A — Intrusion Detection (Advisory)
487
+
488
+ **Purpose:** Deploy network or host-based intrusion detection for the SWIFT zone.
489
+
490
+ ---
491
+
492
+ ### Control 7.1 — Cyber Incident Response Planning (Mandatory)
493
+
494
+ **Purpose:** Maintain a documented, tested incident response capability for SWIFT-specific cyber incidents.
495
+
496
+ **Requirements:**
497
+ - Documented **SWIFT-specific Incident Response Plan (IRP)** covering: detection triggers, triage, containment, notification (internal and SWIFT), investigation, recovery, lessons learned
498
+ - IRP must define when and how to notify SWIFT (via SWIFT's CISO or through KYC-SA) — SWIFT requires notification within 24 hours of a confirmed cyber incident affecting SWIFT infrastructure
499
+ - IRP tested annually (tabletop exercise or live drill)
500
+ - Contact list for SWIFT support and internal incident team maintained and tested
501
+ - Evidence preservation requirements defined (forensic images, log preservation)
502
+
503
+ **SWIFT Incident Notification Obligations:**
504
+ - Notify SWIFT within 24 hours of confirming a cyber incident affecting SWIFT infrastructure or transactions
505
+ - Submit full incident report to SWIFT within 30 days
506
+ - Cooperate with SWIFT investigations
507
+
508
+ **Evidence artifacts:**
509
+ - SWIFT Incident Response Plan document (dated, approved)
510
+ - Last annual test record (tabletop or drill report)
511
+ - SWIFT notification contact list
512
+ - Sample incident log (if available)
513
+
514
+ ---
515
+
516
+ ### Control 7.2 — Security Training and Awareness (Mandatory)
517
+
518
+ **Purpose:** Ensure all staff with SWIFT access receive security awareness training.
519
+
520
+ **Requirements:**
521
+ - Annual security awareness training for all staff with access to SWIFT systems
522
+ - Training must include: phishing awareness, social engineering, SWIFT fraud scenarios (Bangladesh Bank-style attacks), incident reporting procedures
523
+ - Training completion tracked and evidenced
524
+ - Role-specific training for SWIFT operators covering CSP requirements
525
+
526
+ **Evidence artifacts:**
527
+ - Training completion records for all SWIFT users (last 12 months)
528
+ - Training content overview (showing SWIFT-specific topics)
529
+ - Role-specific training materials for operators
530
+
531
+ ---
532
+
533
+ ### Control 7.3A — Penetration Testing (Advisory)
534
+
535
+ **Purpose:** Conduct penetration testing of the SWIFT environment to identify vulnerabilities not found by scanning.
536
+
537
+ **Best practice:** Annual penetration test of SWIFT Secure Zone, including network perimeter, application layer (Alliance Access), and authentication mechanisms. Red-team exercise every 2–3 years.
538
+
539
+ ---
540
+
541
+ ### Control 7.4A — Scenario Risk Assessment (Advisory)
542
+
543
+ **Purpose:** Conduct scenario-based risk assessments for SWIFT-specific attack scenarios.
544
+
545
+ **Scenarios to assess:** Insider fraud, compromised SWIFT operator credentials, supply chain attack on SWIFT software, social engineering targeting SWIFT operators, ransomware propagation to SWIFT zone.