top of page

SWIFT Customer Security Program, CSP – Is last SWIFT initiative a good one?


These days, IT security became a must and payments in particular are crucial for all companies. SWIFT (i.e. “Society for Worldwide Interbank Financial Telecommunication” based in La Hulpe in Belgium) has a key player in this payment landscape has decided to launch a program in order to testify each one compliance to base rules. The approach in itself is commendable and sound. However, we can address the issue on how far corporate treasurers should go in their compliance efforts. The measures should not be implemented at any price as they are users and not service providers. At the end of the day, SWIFT will disclose each one current level of compliance to compulsory and advisory controls.

Customer Security Programme (CSP) or the way to safeguard security across banking community

SWIFT has recently launched the CSP. A new program based on a self-assessment questionnaire to determine whether the Swift user is or not “secured” and respect best practices in terms of security. A good new idea? It looks like it is a sound initiative. However, the best is the enemy of the good. British would say that “if it ain’t broke, don’t fix it”. This program has been dedicated to support financial institutions in reinforcing the security of their SWIFT related infrastructure. A Customer Security Control Framework (i.e. CSCF) has been published in April 2017. It is certainly one consequences of the attacks faced by Swift. It defines a set of mandatory and advisory controls that should be implemented at Swift customer’s operating environments. According to SWIFT, there are two main milestones users should observe: the first one is the SWIFT BIC’s were expected by end of last year to submit to Swift a self-attestation which requires financial institutions to attest their level of compliance versus the mandatory controls. SWIFT reserves the right to report to Supervising Institutions any BIC’s that have not completed their attestation.

Then, by end of 2018, all SWIFT BIC’s must comply with mandatory controls and update their attestations. SWIFT then reserves the right to report to Supervising Institutions any BIC’s (i.e. companies/banks) that do not attest their compliance with all mandatory controls. As said, it seems interesting and useful. Claiming that a breach around these services could lead to significant disruptions and financial losses is somehow true. But are we certain that all these controls are necessary for corporates? In our views, as treasurers, it maybe goes a bit too far. A full compliance is great but isn’t it more an issue for banks than for corporates, especially those using SWIFT service bureau. Being based first a self-assessment, the exercise remains difficult and results not easy to compare. We will need some time to further clarify up to which level we should be compliant and further elaborate best practices.

Growing cyberattacks and increasing IT risks

The growing threat of cyberattacks has never been more pressing. We all know and some even faced recent instances of payment fraud in our customers’ local environments. It certainly demonstrates that there is a necessity for industrywide cooperation to fight against the IT and systems threats. It is important to notice that while SWIFT’s network or services have not been compromised, incidents take often place after a customer suffered security breaches within its

own infrastructures. Everyone is responsible when we talk about IT security and must make sure its own environment is secured and safe. In my view, security is something that belongs to all of us up to a certain degree. SWIFT is a cooperative structure, belonging to banks and is therefore and fortunately committed to playing an important role in safeguarding security. The payment and banking information ecosystem is wide and vital. It needs to be perfectly protected and risks mitigated as much as possible. This huge security program launched by SWIFT is dedicated to enhance information sharing throughout the user’s community. We need a solid customer security control framework and no one can doubt about this. The idea of sharing best practices and to better detect or prevent fraud attempts is an excellent objective. Nevertheless, IT security has a high cost and in absolute any single measure is good but the marginal cost can sometimes be exaggerated compared to the objectives it tends to reach. We must keep in mind the IT risk return in mind while investing in security. A corporate is not a market infrastructure nor a financial institution and its costs must remain reasonable. Corporates have noticed an increase of costs related to payment and security while the automation and technology were supposed to reduce them. It is a sort of paradox we have to accept.

Security is a three level work

This ambitious program has been articulated around three mutually reinforcing areas. As explained by SWIFT on its website, the customers will first need to protect and secure their local environment (US), it is then about preventing and detecting fraud in the commercial relationships (OUR COUNTERPARTS) and continuously sharing information and preparing to defend against future cyber threats (OUR WHOLE COMMUNITY). And it is right that security is a collective duty and a joined effort if we claim to succeed. This new program consists of 16 compulsory control measures and 11 optional one’s (i.e. voluntary). Customers and members can be called to present additional evidences of their compliance.

What should corporates do in order to be compliant?

Numerous corporates have started their self-assessment exercise alone and some with the support of advisors. The advantage of a joined exercise or at least a gap analysis is that it gives corporate users a bit of benchmark. Who could claim he/she knows precisely what should be implemented or not and how to assess it. It is a tricky review as it can have heavy consequences as SWIFT user. It must be taken and reviewed seriously. Advisors then try to define measures taken and milestones to protect its informational assets and risks around disclosures of nonauthorized data and its legitimacy in a regulated and legal context that became stricter over years. Therefore, three objectives (i.e. secured environment, controlled access(es), detect and act); eight principles (e.g. limit access to internet, reduce attack surface, prevent hacking of identifiers, manage access and privileges, detect abnormal activities into systems, intervention and sharing plans) and eventually 27 controls (as already mentioned above – such as compliance with international standards ISO 27002, PCI-DSS, etc…). You will easily understand that it is a huge prevention effort required and that external resources can be necessary. It also involves several support functions and company departments. One of the first tip is to set up a cross-functional team to oversee CSP implementation, including risk, compliance, technology legal and operations. In future, such program must be part of the whole IT security internal reviews and security programs (e.g. a SOC2).

Time to get ready, if you have not yet started…

It may appear to you, if you hear for the first time about CSP, to be a huge project. The IT part of it makes it complicate for treasurers and highly technical. We should conduct these readiness assessment against mandatory and advisory internal controls. It is necessary to also assess how attestation requirements align with existing service organization control (i.e. the so-called “SOC” programs) reporting. A starting point will be to review past audit and risk findings to identify potential gaps and to make a gap analysis, once the self-assessment questionnaire will be finalized for the first time. Eventually, we will have to identify manual interventions required for processing in order to determine potential technological solutions and improvements. These will have a cost and ad hoc budgets will then have to be approved by a Steering Committee or by the CFO. It is important to notice that among the treasury community this topic is not often addressed and discussed. Maybe it is too early or our community is too slow in implementing. As there are several gateways to be connected to SWIFT network, a benchmark among SWIFT corporate users could be useful. As a reminder the connection to SWIFT can use 1 of the 3 connectivity solutions: SWIFT cloud connectivity, cloud-based connectivity using a SWIFT partner interface or customer-hosted connectivity. Depending on the way to be connected and potential recourse to a service bureau the measures to be implemented can vary. I believe that the European Association of Corporate Treasurers could help in coordinating experience and positions. In conclusion, we can admit that this famous attacks on the Bangladesh bank has changed the situation. Cyber-security is a constant, never-ending and painful exercise. However, it is necessary to prevent further issues. More than 6 billion transactions a year (roughly) and more than 11 thousands customers give you an idea of the landscape. Such a program and the review of internal controls must be embedded into our IT security processes and will require, I am afraid, time, resources and money. The key paradox to keep in mind is that cyber risk is growing likely faster than IT technology and that the more sophisticated IT systems are, the more at risk we will be. We must remain vigilant and proactive as cyber-risks evolve day after day. SWIFT will begin disclosing information to counterparties about customers’ compliance with the advisory controls in January 2018.

François Masquelier, Deputy Chair of EACT


bottom of page