SWIFT Alliance Messaging Hub Security Guidance
SWIFT Alliance Messaging Hub Security Guidance
SWIFT Alliance Messaging Hub Security Guidance
Security Guidance
This document provides the reader with an overview of the security features for Alliance Messaging Hub (AMH). The
document also lists the minimum set of recommended security controls for AMH implementations and their mapping
against controls mentioned in the SWIFT Customer Security Controls Framework (CSCF v2019).
31 May 2019
Alliance Messaging Hub - Security Guidance Table of Contents
Table of Contents
Table of Contents ............................................................................................................................... 3
Preface ................................................................................................................................................ 3
1 Introduction............................................................................................................................... 4
1.1 Alliance Messaging Hub ......................................................................................................... 4
1.2 Customer Responsibilities ...................................................................................................... 6
1.3 Governance ............................................................................................................................ 6
2 Overview of Alliance Messaging Hub .................................................................................... 7
3 Security Recommendations .................................................................................................... 8
3.1 Secure Server Environment.................................................................................................... 8
3.1.1 Physical Access Control ............................................................................................... 8
3.1.2 Internet Access ............................................................................................................. 9
3.1.3 Logical Access Control ................................................................................................. 9
3.1.4 System Activity Logging ............................................................................................. 11
3.1.5 Operating System Hardening ..................................................................................... 11
3.1.6 Security Updates ........................................................................................................ 11
3.1.7 Security Software ....................................................................................................... 12
3.1.8 Backup and Resiliency ............................................................................................... 13
3.2 Secure Client Environment ................................................................................................... 13
3.2.1 Physical Security ........................................................................................................ 13
3.2.2 Internet Access ........................................................................................................... 13
3.2.3 Secure Browsing ........................................................................................................ 14
3.2.4 Anti-virus and Anti-malware........................................................................................ 14
3.2.5 Security Updates ........................................................................................................ 14
3.3 Application Security .............................................................................................................. 15
3.3.1 User Authentication and Session Management ......................................................... 15
3.3.2 Authorisation Schemes ............................................................................................... 17
3.3.3 System Configuration ................................................................................................. 18
3.3.4 Server Authentication and Confidentiality .................................................................. 19
3.3.5 Database Integrity ...................................................................................................... 20
3.3.6 Integrity of the Message Flow ..................................................................................... 21
3.3.7 Auditing and Monitoring .............................................................................................. 21
3.3.8 File Level Integrity Checks (AMH 4.0) ........................................................................ 22
3.4 Local Network Security ......................................................................................................... 22
3.4.1 Network Segregation .................................................................................................. 22
3.5 Other Security Recommendations ........................................................................................ 23
3.5.1 Reconciliation ............................................................................................................. 23
3.5.2 User Security Awareness ........................................................................................... 23
3.5.3 Incident Management ................................................................................................. 24
4 Addressing Vulnerabilities .................................................................................................... 25
4.1 Threats and Attacks .............................................................................................................. 25
4.2 Addressing Security Threats ................................................................................................. 25
5 Mapping Security Controls Against Security Guidance Recommendations................... 27
6 Glossary .................................................................................................................................. 34
Legal Notices .................................................................................................................................... 35
31 May 2019 3
Alliance Messaging Hub - Security Guidance Preface
Preface
Purpose of this document
This document is issued for information purpose only. It is aimed at providing the reader with
an overview of the security features for all releases of Alliance Messaging Hub (AMH). For
more information about AMH, consult the relevant Service Descriptions and other related
documentation.
This document also includes general guidance designed to assist Alliance customers in
protecting their access to and use of Alliance Messaging Hub. The list of recommendations in
this document is not exhaustive nor do they replace a well-structured policy, sound judgment or
compliance with the latest best practices. Furthermore, it does not address customer-specific
infrastructure and configuration issues, or other specific requirements that may apply to
customer considering in particular the technology used and the customer’s own security risk
analysis.
The information in this document refers to the description of AMH at the date of this document.
As this document may not necessarily be updated along with subsequent changes to AMH,
always refer to the latest available version of the Alliance Messaging Hub Service Description
and other related documentation.
Related documentation
Alliance Messaging Hub Service Description
Alliance Messaging Hub Installation Guide
Alliance Messaging Hub Configuration Guide
SWIFT General Terms and Conditions
31 May 2019 3
Alliance Messaging Hub - Security Guidance Introduction
1 Introduction
This security guidance document gives an overview of the key security features for all releases
of the Alliance Messaging Hub (AMH), as well as a minimum set of customer security controls
of the Customer Security Controls Framework (CSCF v2019), designed to help customers
protect their local environment. Further guidance can be found in the different guides
referenced in this security guidance document.
It is important to understand that this document is only a guide containing general guidance
designed to assist users in protecting their local infrastructure connecting to the SWIFT
network. It is neither meant to be an exhaustive list of recommendations nor to replace well-
structured policy, sound judgment or compliance with the then current best practices.
Furthermore, it does not address customer-specific infrastructure and configuration issues, or
other specific requirements that may apply to customers.
31 May 2019 4
Alliance Messaging Hub - Security Guidance Introduction
The Alliance Messaging Hub offers the following security features (this list is not exhaustive):
User authentication via username/password mechanism or integration with external LDAP
and/or Single Sign On infrastructure (LDAP, SAML) or two-factor authentication with TOTP.
Authorisation schemes: RBAC and data driven access rights, allowing for configurable and
fine- grained segregation of duties.
Change approval mechanism (4 or 6 eyes) for key user management configuration
LAU-key based message integrity verification for backend connectors
Ability to secure connections with external components (e.g. MQ, DB) and/or between internal
components (e.g. AMH Web Interface, Control Centre, PowerSearch, External trigger)
Configurable workflow, facilitating 6-eyes principle for message processing
Audit trail for configuration changes and monitoring
31 May 2019 5
Alliance Messaging Hub - Security Guidance Introduction
1.3 Governance
SWIFT’s Alliance Messaging Hub (AMH) is designed and built using industry-strength
processes that help ensure best-in-class quality, security and reliability: development life-cycle
processes ensure that security and availability are built in right from the start.
To a large extent, these are the very same processes used by SWIFT to deliver the FIN and
SWIFTNet services on which the global financial community relies on a daily basis. While AMH
is not in scope of SWIFT’s ISAE 3402 Type 2 report, their processes are the same (that is,
secure coding, penetration testing, change management, problem & incident management).
Therefore, AMH users can to a certain extent derive assurance from the ISAE 3402 report.
The development process at SWIFT requires independent verification of quality and security.
Rigorous testing ensures quality and conformance with requirements including security
requirements. In addition, with a risk-based periodicity, SWIFT performs penetration tests to
identify potential vulnerabilities in off-the-shelf technology, customised software or in-house
developed code that is used within AMH, focussing on application level vulnerabilities. Finally,
the AMH as well as all underlying processes are part of SWIFT’s Internal Audit Universe and
get reviewed in-depth on a regular systematic basis.
31 May 2019 6
Alliance Messaging Hub - Security Guidance Overview of Alliance Messaging Hub
31 May 2019 7
Alliance Messaging Hub - Security Guidance Security Recommendations
3 Security Recommendations
SWIFT’s products rely on a number of security features under direct control and management
of SWIFT users. User organisations, also referred to as customers, should accordingly
establish their own internal controls or procedures to complement those of SWIFT.
Both the physical and logical security of the computers and network that are used to run
Alliance Messaging Hub (AMH) are important in maintaining a secure environment. The
security of the infrastructure is not specific to AMH but is valid for any critical business
application at customer premises.
Five different topics are covered in this document:
Secure Server Environment: controls that help secure the servers that host AMH
software and the servers that they communicate with.
Secure Client Environment: controls that help secure the workstations used to connect
to the servers that host AMH software.
Application Security: controls that help secure the application. These are security
features provided by the AMH. Users can and should configure them correctly.
Network Security: controls that help secure the network environment of the Alliance
infrastructure.
Other recommendations: controls that are recommended by SWIFT that do not fit in the
above categories.
This section lists the minimum set of controls that SWIFT recommends for customer
implementation. The controls are listed in a table and have the following rows:
ID: an identification number that can be used to refer to a specific control
Control: the control to put in place
Where applicable, links are provided to the appropriate AMH documentation. For any questions
regarding operating system or third party application configuration, we recommend the
customer to contact their vendor.
ID Control
SPA.01 Physical security controls are in place. They ensure that only authorised personnel can
access the servers running Alliance Messaging Hub.
31 May 2019 8
Alliance Messaging Hub - Security Guidance Security Recommendations
ID Control
SPA.02 Physical access to the hosts running Alliance Messaging Hub is logged. These logs are
available for audits and investigations.
ID Control
CIA.01 All servers hosting Alliance Messaging Hub are disconnected from the Internet, except if
the SWIFT product requires it (via VPN).
Application server
As from AMH 4.0 Alliance Messaging Hub software runs on an application server that is
delivered as part of the application. Before AMH 4.0 Alliance Messaging Hub software had to
be deployed within an application server, provided by the Customer.
Authorised application server users can take control of the application server and the
applications deployed within the application server. Such users are able to take complete
control of the system.
Database
Alliance Messaging Hub software requires access to the database for storing configuration
data, message data and other run-time data. This database environment is provided by the
customer. Database systems have the notion of administrator accounts, within this document
referred at as ‘DBA-accounts’, which are able to take complete control of the database and its
content. Access rights must be set up so that only the Alliance Messaging Hub software can
access the application data.
Access control
The OS administrator account, the application server users, and the DBA accounts are
privileged accounts, on which there is no real ability to exercise 4-eyes control. Therefore
specific controls must be implemented to tightly control the use of privileged accounts.
Keep the “least privilege” principle in mind when assigning access rights. An individual should
only be able to access the features required for their specific job. Access rights can change
due to employees changing roles or leaving the company.
It is the customer responsibility to protect access to the operating system, database and
31 May 2019 9
Alliance Messaging Hub - Security Guidance Security Recommendations
application server. Additionally, each access and/or operation on the infrastructure component
must be adequately logged, and evidence kept for auditing purposes.
Alliance Messaging Hub relies on a customer-provided Oracle database to store data such as
message data, user profiles, security settings and configuration data. The AMH data is stored
in a dedicated Oracle scheme.
Note Physical and host-based firewalls can restrict connectivity to the Alliance hosts.
Strong firewall rules tighten logical access controls. Firewalls are covered in
section 3.4.1.
Further Reading
Alliance Messaging Hub Installation Guide
ID Control
SLA.01 Careful consideration is put into who is assigned the role of administrator of the operating
system, application server and database.
SLA.02 Employees with administrative access to the operating system, the application server or
the database have the required skills to perform their tasks, on the respective
infrastructure component.
SLA.03 Employees with access to OS administrator accounts, application server accounts and
DBA Accounts are aware about security best practices.
They receive sufficient security awareness training.
SLA.04 For administrator account, the application server accounts and the DBA account there
are procedures in place to:
Identify who is logged in on such an account
Identify which commands are run on such an account
This information is securely stored and available for audits and investigations.
SLA.05 Careful consideration is given to the choice of passwords for privileged accounts. The
password policy is in line with industry best practices. For example:
Minimum password length
Password complexity
Number of days after which a password must be changed
The same password is not reused on multiple hosts
Passwords are changed after use
The password policy is documented and enforced.
The emergency procedure is documented and the usage of the procedure is logged.
Under no circumstances should it allow a non-authorized person to access the Alliance
hosts unnoticed.
SLA.08 Sessions are not left open unattended.
SLA.09 A multi-factor protocol is used for authentication.
31 May 2019 10
Alliance Messaging Hub - Security Guidance Security Recommendations
ID Control
SLG.01 Operating system log files are monitored and regularly reviewed. Such logs can contain
and are not limited to:
• administrator-level operating system accounts activity log
• Alliance Messaging Hub application owner activity log
• Relevant Messaging Hub application events distributed to the operating system logs
(for example, Alliance Messaging Hub event logs stored in Syslog in CEF format).
SLG.02 Operating system logs are stored on a remote system that cannot be accessed by the
same operating system privileged account or by the same individuals.
SLG.03 Log files are retained (safe-stored) for a least 12 months and are available for audits or
forensic investigations.
SLG.04 Where possible, the operating system log files are integrated with a centralised logging
system.
ID Control
SSH.01 The operating systems and other software that are installed on the servers which host
Alliance Messaging Hub are configured according to the vendor recommendations and
security baselines.
SSH.02 Only authorised and required software is installed on the servers which host Alliance
Messaging Hub.
1 SWIFT does not give recommendations regarding vendors of Security Information and Event Management (SIEM)
systems.
31 May 2019 11
Alliance Messaging Hub - Security Guidance Security Recommendations
recommendations.
Alliance Messaging Hub security updates can be downloaded from the SWIFT Download
Centre.
SWIFT notifies its customers of the availability of new security updates when applicable.
ID Control
SSP.01 The Alliance Messaging Hub and related embedded or hosted Oracle database are up to
date with the latest security updates, aligned to the assessed risk or Common
Vulnerability Scoring System (CVSS), Version 3.
SSP.02 Recommended Alliance Messaging Hub releases or security updates are installed on a
timely basis and for mandatory releases or cumulative security updates, before the
mandatory installation date.
ID Control
SSS.01 Security software is installed to protect against malicious software or other threats.
31 May 2019 12
Alliance Messaging Hub - Security Guidance Security Recommendations
ID Control
SBS.01 Back-ups of data and software are made frequently. The back-up policy and procedures
are documented. The process to restore back-ups is documented and is tested
periodically.
SBS.02 Availability and resilience objectives, such as Recovery Time Objective (RTO) and
Recovery Point Objective (RPO) are defined, considering the business criticality of the
services supported by the application.
SBS.03 The AMH deployment and configuration is defined in function of the availability and
resiliency objectives. Testing is performed to demonstrate the setup allows meeting those
objectives. Such testing precedes using the AMH application for production purposes.
SBS.04 Sensitive SWIFT-related data leaving the secure zone as a result of backups, data
replication for recovery or further off-line processing is encrypted.
ID Control
ID Control
CPS.01 Only authorised individuals have physical access to the client systems.
31 May 2019 13
Alliance Messaging Hub - Security Guidance Security Recommendations
device can also connect to the SWIFT environment, you are also exposing your SWIFT
environment to those threats.
ID Control
CIA.02 Jump servers, which are used to remotely manage the operating systems on which
Alliance products are installed, do not have Internet access.
CIA.03 System administrators connect through a jump server or a dedicated Operator PC within a
secure zone to servers hosting Alliance Messaging Hub.
ID Control
CSB.02 There are no unsupported browsers used to access Alliance Messaging Hub.
Avoid installing browsers plugins unless explicitly mandatory, trusted and signed.
ID Control
CAV.01 Anti-virus, anti-malware services and associated databases are up-to-date on the client
host infrastructure.
ID Control
CSP.01 The client infrastructure is up-to-date with the latest security updates.
31 May 2019 14
Alliance Messaging Hub - Security Guidance Security Recommendations
LDAP Authentication
Alliance Messaging Hub allows you to authenticate users via an LDAP server.
31 May 2019 15
Alliance Messaging Hub - Security Guidance Security Recommendations
Further reading
AMH Configuration Guide, section “AMH Security”
ID Control
USM.01 All user-defined passwords used in Alliance Messaging Hub must be in line with
industry best practices. The application enforces below list of rules for operators with
the "Normal users" password policy assigned:
• Passwords and PINs should be configured using the parameters specified in the
latest versions of SWIFT Knowledge Base TIP 5021567 and 5022038.
• Disable Period - The number of calendar days after which a user is disabled if
there was no successful login. The check is done at server start-up and every
hour. Changes to this parameter will take effect at midnight or at the next restart
of the servers. Recommended value: 120.
USM.02 All user-defined passwords used in Alliance Messaging Hub must be in line with
industry best practices. The application enforces the following list of rules for operators
with the "Admin users" password policy assigned:
• Passwords and PINs should be configured using the parameters specified in the
latest versions of SWIFT Knowledge Base TIP 5021567 and 5022038.
• Admin Disable Period - The number of calendar days after which an
administrator is disabled if there was no successful login. Changes to this
parameter will take effect at midnight or at the next restart of the servers.
Recommended value: 120
USM.03 The connections with external systems used for authentication (LDAP and SSO
infrastructure) are secured.
OSC.02 For the security parameter Session Expiry Timeout, set the session time-out to a small
value (maximum of 15 minutes or 900 seconds).
MFA.01 At least a two-factor authentication method is used for authentication on Alliance
products. The options are:
31 May 2019 16
Alliance Messaging Hub - Security Guidance Security Recommendations
ID Control
security officers
• LDAP (Lightweight Directory Access Protocol) authentication where a second factor
is required at the single login, or at a later stage.
• Personal Token (AMH 4.0): requiring a hardware device and a PIN or password.
• Identity Provider authentication with SAML (AMH 4.0)
Further reading
AMH Configuration Guide, section “The User Security Model”
AMH Installation Guide, section “Main Actors”
31 May 2019 17
Alliance Messaging Hub - Security Guidance Security Recommendations
ID Control
AAS.01 The "need-to-know", "least privilege", and "segregation of duties" principles are applied
when defining operators and operator profiles in Alliance applications.
The embedded logical access control and security parameters features can be used for
this purpose.
AAS.02 The AMH Security Operators are two independent individuals, with independent back-ups
identified in case of their absence.
Further reading
AMH Configuration Guide, section “Stage the Configuration” and section “Configuration
Management”)
ID Control
ASC.01 Configuration data is managed in thereto designed third party configuration management
tools, ensuring full visibility and audit on changes.
31 May 2019 18
Alliance Messaging Hub - Security Guidance Security Recommendations
ID Control
ASC.03 Direct access rights to configuration data on production systems is limited. Similarly,
access rights to components (e.g. file system, MQ, configuration management tool) used
to automate the configuration deployment are limited.
ASC.05 Access to configuration data stored on the file system is restricted following the Secure
Server Environment guidelines (See 3.1)
The External Trigger, a standalone Java Application, connects as client to Alliance Messaging
Hub. The username and password used to establish the connection are stored in a property file
and are encrypted at first usage. It is the customer’s responsibility to secure the exchanges
between the External Trigger and Alliance Messaging Hub, using two-way Transport Layer
Security (TLS).
Alliance Messaging Hub connects as a client to SWIFT Alliance Gateway. The connection is
established in relaxed mode, and secured using the SWIFT proprietary SwTL protocol.
31 May 2019 19
Alliance Messaging Hub - Security Guidance Security Recommendations
HTTPS can be enforced on Web Service integration, connecting external applications to the
Application Server that hosts Alliance Messaging Hub. Dedicated AMH users must be defined
through which WebService calls should be authenticated.
It is strongly recommended to configure the transport security for all the connections towards
Alliance Messaging Hub.
ID Control
LSC.01 Certificates provided by a trusted Certificate Authority (CA) or a Certificate Authority under
the customer’s control are used to secure all connections supporting Transport Layer
Security.
LSC.03 Data encryption with host authentication is enabled to secure all the connection towards
Alliance Messaging Hub.
LSC.04 Integration between back-office applications and Alliance Messaging Hub, typically relying
on MQ/JMS, communicate via encrypted channels.
LSC.05 External Trigger access is limited to authorised users, and connections secured using
TLS.
LSC.06 Client connections established for Web Services and/or External Trigger rely on dedicated
AMH users.
ID Control
DBI.01 A database integrity check is regularly performed on the Alliance Massaging Hub.
DBI.02 Ensure that the new security configuration parameter Shutdown on Database
Tampering Detection is always set to Yes on Alliance Gateway.
DBI.03 Database security features are implemented for detection and prevention of unauthorized
access of users other than the AMH application user.
DBI.05 Database access for any users other than the AMH application user are monitored,
logged, and responsive procedures are put in place to react on unauthorized actions by
authenticated users.
31 May 2019 20
Alliance Messaging Hub - Security Guidance Security Recommendations
DBI.01 A database integrity check is regularly performed on the Alliance Massaging Hub
Further reading
AMH MQ JMS Host Connectivity Guide
AMH File System Host Connectivity Guide
ID Control
LAU.01 The connections between the back-office applications and Alliance Messaging Hub are
(LSC.03) authenticated.
This can be achieved using LAU (configured on the AMH Backend Configuration) or any
other client authentication mechanisms.
LAU.02 The integrity of messages sent between the back-office and Alliance Messaging Hub is
protected.
This can be achieved using LAU or any other protocols ensuring data integrity such as
TLS.
LAU.03 Distinct LAU keys are used for each distinct connection flow.
31 May 2019 21
Alliance Messaging Hub - Security Guidance Security Recommendations
configuration changes) in the application logging module, and writes this logging to database
and/or to the file system. Logging written to the database can be consulted within the AMH
User Interface. Email notifications can be setup to notify specific user groups in case specific
events would occur.
For performance tuning exercises, it is possible to expose metrics via JMX. It is recommended
to disable JMX monitoring on production systems.
Finally, on each individual message, a full history is kept of its lifecycle within the application.
This history can be visualised and/or exchanged with external applications for long term
archiving.
ID Control
ALG.02 Application Event Logs are stored on a remote system that cannot be accessed by the
same individuals.
ALG.03 Application Log files are safe stored and available for audits or forensic investigations.
ALG.04 Where applicable, Alliance Event Log events are integrated with a centralised logging
and monitoring system.
ALG.06 Ensure that the Alliance Messaging Hub alarm script is owned by the software owner.
31 May 2019 22
Alliance Messaging Hub - Security Guidance Security Recommendations
between the end-user’s browser and Alliance ControlCentre, allowing only HTTPS
between Alliance Messaging Hub and Alliance Gateway packages, allowing only SWIFT
Transport Layer (SwTL, a TCP-based SWIFT proprietary transport protocol) based on
Transport Layer Security (TLS)
between the ControlCentre and Alliance Messaging Hub, allowing only HTTPS
between Alliance Messaging Hub and PowerSearch, allowing only HTTPS
between the External Trigger and Alliance Messaging Hub, allowing only HTTPS
between distinct Alliance Messaging Hub nodes, allowing only HTTPS
Similarly, network traffic between Alliance Messaging Hub and customer infrastructure (e.g.
Oracle database, MQ/JMS) can also be restricted by firewall rules.
ID Control
NET.01 The network (firewall) complies with the Network Configuration Tables Guide. It strictly
whitelists all flows required by the SWIFT network.
NET.02 Strong firewall rules are in place between the end-user’s browser and Alliance
ControlCentre, allowing only HTTPS
NET.03 Strong firewall rules are in place between Alliance Messaging Hub and Alliance Gateway
packages, allowing only SWIFT Transport Layer (SwTL, a TCP-based SWIFT
proprietary transport protocol) based on Transport Layer Security (TLS).
NET.04 Strong firewall rules are in place between the External Trigger and the Alliance
Messaging Hub, allowing only HTTPS, allowing only SWIFT Transport Layer (SwTL)
based on TLS, or SOAP over HTTPS in the context of web services.
NET.05 Strong firewall rules are in place between the Alliance Messaging Hub and PowerSearch,
allowing only HTTPS
NET.06 Strong firewall rules are in place between the servers running Alliance Messaging Hub
and the middleware used for integrating back-office applications. For example MQ or
other JMS implementations.
NET.08 Management services are only accessible from dedicated operator PCs or by means of a
jump server inside the secure zone.
ID Control
REC.01 A reconciliation is performed between the messages that are sent to/from the back- office
and to/from the SWIFT Network.
31 May 2019 23
Alliance Messaging Hub - Security Guidance Security Recommendations
ID Control
UAW.01 Annual security awareness sessions are conducted for all staff members. In addition to
CSCF examples, topics may include:
• protection from viruses, worms, Trojan horses, and other malicious code -
scanning and updating definitions
• unknown e-mail and attachments
• internet usage
• social engineering
• access control issues - address least privilege and separation of duties
• individual accountability
Security awareness and knowledge acquired is measured (for example, by means of
quizzes, certifications, and so on).
ID Control
IMA.01 The customer has a sound and tested cyber security incident management process that
includes information on who to contact, which channels to use, and under what
conditions to use them.
IMA.02 The Cyber Security Incident - Recovery roadmap is integrated or checked against in the
internal cyber security processes and plans. As per their roles, employees are aware
and trained on the respective actions required to be followed in case of a cyber-security
breach.
IMA.03 Regularly review and consume information shared by means of the SWIFT ISAC portal,
and share evidence or indicators of compromise with SWIFT.
31 May 2019 24
Alliance Messaging Hub - Security Guidance Addressing Vulnerabilities
4 Addressing Vulnerabilities
Before deploying any critical application within an institution, customers must be aware of the
technology’s vulnerabilities and the means to address them.
This section gives an overview of the typical threats and attacks for Alliance Messaging Hub
and summarises the security features and controls available to mitigate security threats, and
the likelihood of attacks, as well as methods to limit the impact of successful attacks.
Impact
For all impersonation attacks, the highest impact is always equal to the highest user privilege.
As a consequence, the best way to limit the impact is to have application authorisations
implemented with the “Need-to-know” and “least privilege” principles in mind. In addition,
traceability of user actions plays an important role in limiting the impact of malicious acts.
For DoS attacks, the impact of unavailability must be evaluated by every institution.
Controls
Typical attacks Customer
Alliance Messaging Hub Users and processes
infrastructure
Authentication mechanism [3.3.1] Physical controls [3.1.1] Secure browsing [3.2.3]
Authorisation schemes [3.3.2] Privileged account Auditing and monitoring
Impersonation management [3.1.2] [3.3.7]
Server authentication [3.3.4]
Integrity mechanisms [3.3.5] Reconciliation [3.5.1]
31 May 2019 25
Alliance Messaging Hub - Security Guidance Addressing Vulnerabilities
Controls
Typical attacks Customer
Alliance Messaging Hub Users and processes
infrastructure
TLS encryption [3.3.4] Physical controls [3.1.1]
Privileged account
Message
management [3.1.2]
eavesdropping
Network segregation
[3.4.1]
Physical controls [3.1.1]
Privileged account
management [3.1.2]
Third-party
Anti-virus [3.1.6, 3.2.4]
software
weakness Update management
[3.2.5]
Network segregation
[3.4.1]
Update management
[3.1.5]
Denial of Anti-virus [3.1.6, 3.2.4]
Service (DoS) Network segregation
[3.4.1]
31 May 2019 26
Alliance Messaging Hub - Security Guidance Mapping Security Controls Against Security Guidance Recommendations
31 May 2019 27
Alliance Messaging Hub - Security Guidance Mapping Security Controls Against Security Guidance Recommendations
Complementary requirements:
- Support availability.
Security update deployment policy based in a risk assessment process
and/or recommended on the Common Vulnerability Scoring System (CVSS),
Version 3.
2.3 System Hardening Secure Server Environment
Control: Security hardening is conducted 3.1.4 Operating System Hardening
2 Requirements included in the SWIFT Customer Security Controls Framework that complement the existing SWIFT
recommendations and which are not yet specifically addressed in the product-specific AMH security guidance.
31 May 2019 28
Alliance Messaging Hub - Security Guidance Mapping Security Controls Against Security Guidance Recommendations
Complementary requirements:
- Operator PCs and supporting infrastructure within the secure zone are
included in the scope.
- All in-scope systems are hardened in accordance with a hardening
standard/guide (vendor, industry or local) but can be overruled by
application-specific configuration requirements to maintain a proper
operational state.
Documented follow-up of the implementation deviations.
2.4A Back-Office Data Flow Security 3.3 Application Security
Control: Confidentiality, integrity, and 3.3.4 Server Authentication and Confidentiality
mutual authentication mechanisms are Applicable control: LSC.04
implemented to protect data flows
between back-office (or middleware) 3.3.7 Integrity of the message flow
applications and connecting SWIFT Applicable control: LAU.01, LAU.02, LAU.03
infrastructure components.
Complementary requirements:
- Mutual authentication of the data flows between back-office systems (or
middleware systems) and directly connected SWIFT infrastructure
components.
2.5A. External Transmission New security requirement.
Data Protection
Control: Sensitive SWIFT-related data
leaving the secure zone is encrypted.
2.6. Operator Session Confidentiality 3.1 Secure Server Environment
and Integrity 3.1.2 Logical Access Control
Control: The confidentiality and integrity Applicable control: SLA.08
of interactive operator sessions
connecting into the secure zone are
safeguarded. 3.3 Application Security
3.3.1 User authentication and session management
Applicable control: OSC.02
Complementary requirements:
- Enhanced the scope (sessions to SWIFT-related applications & OS).
- All interactive sessions are protected by a cryptographic protocol (for
example, ssh, https).
2.7A. Vulnerability Scanning New security requirement.
Control: Secure zone and operator PC
systems are scanned for vulnerabilities
using an up-to-date, reputable scanning
tool.
2.8A Critical Activity Outsourcing New security requirement.
Control: Critical outsourced activities are
protected, at a minimum, to the same
standard of care as if operated within the
originating organisation.
31 May 2019 29
Alliance Messaging Hub - Security Guidance Mapping Security Controls Against Security Guidance Recommendations
Complementary requirements:
- Security of the Workplace Environment.
- Security for Remote Workers (for example, teleworkers, "on call" duties).
- Additional requirements on the security of the Server Environment.
4.1 Password Policy 3.1 Secure Server Environment
Control: All application and operating 3.1.2 Logical Access Control
system accounts enforce passwords with Applicable control: SLA.05
appropriate parameters such as length,
complexity, validity and the number of
failed login attempts. 3.3 Application Security
3.3.1 User authentication and session management
Applicable control: USM.01
Complementary requirements:
- Enhanced the scope (log-in to Operator PC (or jump server); secure zone: all
application and operating system accounts).
- Password policy established and aligned to current industry standards or
industry best practices and defines specified criteria. For good practice
guidelines, see KB tip 5021567.
- Password policy developed in consideration to of known password-based
vulnerabilities in the computing environment (that is, LAN Manager
password hash).
- Effectiveness of the password policy is reviewed at least annually.
- Passwords for secure zone systems are stored only within the zone as
described in the guidance for the design of the secure zone.
4.2. Multi-factor Authentication 3.1 Secure Server Environment
Control: Multi-factor authentication is 3.1.2 Logical Access Control
used for interactive user access to Applicable control: SLA.09
SWIFT-related applications and operating
system accounts.
3.3 Application Security
3.3.1 User authentication and session management
31 May 2019 30
Alliance Messaging Hub - Security Guidance Mapping Security Controls Against Security Guidance Recommendations
Complementary requirements:
- Multi-factor authentication with Operator PC and to jump server.
- Prioritised order for implementing multi-factor authentication for OS admin
and end-users.
- Multi-factor authentication implemented for remote user administrative
access.
5.1. Logical Access Control 3.1 Secure Server Environment
Control: Accounts are defined according 3.1.2 Logical Access Control
to the security principles of need-to-know Applicable control: SLA.06, SLA.07
access, least privilege, and segregation
of duties.
3.3 Application Security
3.3.2 Authorisation Schemes
Applicable control: AAS.01, AAS.02, AAS.03, AAS.04, AAS.05
3.3.3 System configuration
Applicable control: ASC.03, ASC.05
Complementary requirements:
- Enhanced the scope (all operator accounts (for example, operating systems,
applications)).
5.2. Token Management New security requirement (applicable if connected hardware authentication
tokens are used for SWIFT operations).
Control: Connected
hardware
authentication tokens are managed
appropriately during issuance,
revocation, use, and storage.
5.3A. Personnel Vetting Process 3.1 Secure Server Environment
Control: Staff operating the local SWIFT 3.1.2 Logical Access
infrastructure are vetted prior to initial Control Applicable
employment in that role and periodically
thereafter. control: SLA.01
Complementary requirements:
- Personnel Vetting Process.
5.4. Physical and Logical Password New security requirement.
Storage
Control: Any recorded passwords for
privileged accounts are stored in a
protected physical or logical location, with
access restricted on a need-to-know
basis.
6.1. Malware Protection 3.1 Secure Server Environment
Control: Anti-malware software from 3.1.6 Security Software
a reputable vendor is installed and Applicable control: SSS.01
kept up- to-date on all systems.
3.2 Secure Client Environment
3.2.4 Anti-virus and Anti-malware
Applicable control: CAV.01
Complementary requirements:
- On-access anti-malware scanning (also known as real-time or background
scanning) is performed on all in-scope systems. On-demand full scanning is
scheduled at least on weekly basis for servers and on daily basis for operator
31 May 2019 31
Alliance Messaging Hub - Security Guidance Mapping Security Controls Against Security Guidance Recommendations
PCs.
- Anti-malware software from a reputable vendor is installed on all computing
platforms and updated in line with the scanning frequency.
- Ensure that the transfer of any file content does not contain any kind of
virus or other data that may create risks for the sender, for SWIFT, or for the
receiver.
6.2 Software Integrity 3.3 Application Security
Control: A software integrity check is 3.3.6 Software integrity
performed at regular intervals on Applicable control: SWI.01,SWI.02
messaging interface, communication
interface, and other SWIFT-related
applications.
6.3 Database Integrity 3.3 Application Security
Control: A database integrity check is 3.3.5 Database integrity
performed at regular intervals on Applicable control: DBI.01,DBI.02,DBI.03,DBI.04,DBI.05
databases that record SWIFT
transactions.
6.4 Logging and Monitoring 3.1 Secure Server Environment
Control: Capabilities to detect 3.1.2 Logical Access Control
anomalous activity are implemented, Applicable control: SLA.04
and a process or tool is in place to
frequently store and review logs.
3.1.3 System Activity Logging
Applicable control: SLG.01, SLG.02, SLG.03, SLG.04
Complementary requirements:
- The organisation has a defined cyber incident response plan which is
reviewed on annual basis, and tested at least every two years.
- Provided steps to be included in the plan in case of cyber incidents that
compromise the confidentiality, integrity, or availability of SWIFT services
and products.
31 May 2019 32
Alliance Messaging Hub - Security Guidance Mapping Security Controls Against Security Guidance Recommendations
- The organisation has a documented plan for the timely sharing of threat
information to intelligence-sharing organisations, law enforcement/local
regulators (as required in each customers' jurisdiction), and to SWIFT.
- The organisation has the capability to consume threat intelligence shared by
SWIFT.
7.2. Security Training and Awareness 3.1 Secure Local Server Environment
Control: Annual security awareness 3.1.2 Logical Access Control
sessions are conducted for all staff Applicable control: SLA.02, SLA.03
members, including role-specific
training for SWIFT roles with
privileged access. 3.2 Secure Client Environment
3.2.3 Secure Browsing
Applicable control: CSB.01
Complementary requirements:
- Frequency of the training and security awareness sessions.
7.3A. Penetration Testing New security requirement.
Control: Application, host, and
network penetration testing is
conducted within the secure zone and
on operator PCs.
7.4A. Scenario Risk Assessments New security requirement.
Control: Scenario-driven risk
assessments are conducted regularly
to improve incident response
preparedness and to increase the
maturity of the organisation’s security
programme.
31 May 2019 33
Alliance Messaging Hub - Security Guidance Glossary
6 Glossary
Security Term Definition
Integrity Integrity relates to information that may be relied upon to be consistent, complete,
accurate, valid, and useful. For user data, this implies that no information may be altered
by unauthorised persons.
For system data, this term implies that no unauthorised changes are made to programs,
scripts, configuration files, log files, and so on, thus ensuring the integrity of the complete
system.
Confidentiality Confidentiality refers to information that is disclosed only to authorised persons, at
authorised locations, and at authorised times
For user data, this implies that confidential information is not disclosed to unauthorised
third parties. For system data, confidentiality refers to the secure protection of sensitive
operational data, such as password files and encryption keys.
Availability The term availability implies that both the information and the systems used to process,
display, print etc. that information be both accessible and usable as and when required.
For user data, this means that information should be processed in a timely manner, and
stored in the correct place so as to be available to authorised users.
The availability (and integrity) of valid system and configuration data has a direct
influence on service availability. Also, all of the necessary components of a system must
be working to ensure service availability.
Auditability Every user of a system must be held accountable for his/her activities. This implies that
all actions can be audited. That means that all relevant actions can be monitored, and
that any one action can be uniquely attributed to a known user, at a particular time and
date.
The following principles assist in ensuring the foundation of a secure system:
31 May 2019 34
Alliance Messaging Hub - Security Guidance Legal Notices
Legal Notices
Copyright
SWIFT © 2019. All rights reserved.
You may copy this publication within your organisation. Any such copy must include these legal
notices.
Restricted Distribution
Do not distribute this publication outside your organisation unless your subscription or order
expressly grants you that right, in which case ensure you comply with any other applicable
conditions.
Disclaimer
The information in this publication may change from time to time. You must always refer to the
latest available version.
Translations
The English version of SWIFT documentation is the only official and binding version.
Trademarks
SWIFT is the trade name of S.W.I.F.T. SCRL. The following are registered trademarks of
SWIFT: 3SKey, Innotribe, MyStandards, Sibos, SWIFT, SWIFTNet, SWIFT Institute, the
Standards Forum logo, the SWIFT logo and UETR. Other product, service, or company names
in this publication are trade names, trademarks, or registered trademarks of their respective
owners.
31 May 2019 35