verified_user
Standardful
首頁chevron_right標準chevron_rightSWIFT CSP
現行有效國際標準update 最後更新:2024年7月

SWIFT CSP

SWIFT 客戶安全計畫——客戶安全控制框架

apartment發布組織:環球銀行金融電信協會(SWIFT)

標準簡介

SWIFT 客戶安全計畫(CSP)是所有連接 SWIFT 金融報文網路的機構必須遵守的安全倡議。該計畫於 2016 年 5 月推出,起因是孟加拉國央行 8100 萬美元網路盜竊事件。CSP 透過客戶安全控制框架(CSCF)定義了基本安全要求,所有 11,000 多家 SWIFT 連接機構必須每年證明其合規性。

CSCF v2025 包含 25 項強制性和 7 項建議性安全控制措施,圍繞三個目標組織:保護環境安全、了解並限制存取、偵測與回應。SWIFT 每年更新該框架,逐步將建議性控制升級為強制性控制。機構必須接受獨立評估並在每年 12 月 31 日前提交證明結果。不合規機構將被報告給監管機構,並可能面臨中斷 SWIFT 網路連線的處罰。

account_balance

Mandatory for SWIFT Users

All 11,000+ organizations connected to the SWIFT network must attest compliance with mandatory controls annually by December 31, with independent assessment required.

security

25 Mandatory Controls

The CSCF v2025 defines 25 mandatory and 7 advisory security controls covering environment protection, access management, detection, and response capabilities.

update

Annual Framework Updates

SWIFT publishes an updated CSCF each July, effective the following year, progressively elevating advisory controls to mandatory status based on evolving threats.

list_alt CSCF Control Objectives

  • Restrict internet access and protect critical systems
  • Reduce attack surface and vulnerabilities
  • Physically secure the environment
  • Prevent compromise of credentials
  • Manage identities and segregate privileges
  • Detect anomalous activity on systems and transactions
  • Plan for incident response and information sharing
  • Outsourced critical activity protection

Who Needs to Comply?

groups

All organizations connected to the SWIFT network — banks, financial institutions, securities firms, market infrastructures, corporates with direct SWIFT access, and their service bureaus and third-party providers.

Key Requirements

1

Secure Environment

Restrict internet access from the SWIFT infrastructure, segment the SWIFT secure zone from general IT, and reduce the attack surface of SWIFT-connected components.

2

Access Management

Implement strong authentication (multi-factor) for operator access to SWIFT systems. Apply least-privilege and segregation of duties principles for all user accounts.

3

Detect and Respond

Implement security monitoring to detect anomalous behavior on SWIFT infrastructure. Establish incident response plans and share threat information with SWIFT ISAC.

4

Independent Assessment

Undergo independent assessment of compliance against mandatory controls by an internal or external assessor. Submit annual attestation through the KYC Security Attestation application.

5

Back Office Data Flow Security

Protect the confidentiality, integrity, and authenticity of data flows between the SWIFT infrastructure and back-office systems. Control 2.4A becomes mandatory in 2026.

Penalties & Enforcement

warning

Non-compliant organizations are reported to local regulators and counterparts. SWIFT can restrict or disconnect non-attesting institutions from the network. Counterpart banks may refuse to transact with non-compliant institutions, effectively cutting off access to global interbank messaging.

官方文件

查看全部

實施時間線

warning
2016年2月
Bangladesh Bank cyber heist ($81M) exposes SWIFT infrastructure vulnerabilities
rocket_launch
2016年5月
SWIFT launches Customer Security Programme in response to attacks
description
2017年4月
First CSCF published with 16 mandatory and 11 advisory controls
verified_user
2019年
Independent assessment requirement introduced; mandatory controls expanded to 19
security
2024年
CSCF v2024 with 25 mandatory and 7 advisory controls; Control 2.8 becomes mandatory
update
2024年7月
CSCF v2025 published; Control 2.4A (Back Office Data Flow Security) mandatory from 2026

相關分類