CSP Update v2021 English
CSP Update v2021 English
CSP Update v2021 English
Sept, 2020
Agenda
̶ CSP - Evolution
̶ 2020 EOY KYC-SA Attestation
̶ CSCF v2021
̶ Independent Assessment Framework (IAF)
̶ Summary
̶ FAQ
̶ Resources
3
CSP - Evolution
4
CSP | Programme Reminder – Where does the CSCF stand?
Your
Counterparts
Your Prevent and Detect
Community • RMA, DVR and ‘In Flight’ Sender
Share and Prepare Payment Controls Service
• Intelligence Sharing • KYC-SA application
• SWIFT ISAC Portal (request/review)
• Independent Assessment
Framework
5
CSCF v2021 | Pragmatically Raising the Bar – Strategic Approach for v2021
Covid-19
2021
2020
2021
• Re-introduction of the
2020 self–assessment option
2019 • Independent Assessment by 31 • Jurisdictional overseers
Dec 2020 reporting
• Refusal to perform a
2019 • Users need to SA between June and SWIFT Mandated
December; their attestation is then valid assessment is reportable
2017 • Attestation of Compliance by till the end of the following year • Grant all features
• Attestation and compliance by 31 Dec 2019 • SA must be supported by an independent • Updated provisions
external/internal assessment
31 Dec 2017/2018 regarding the use of
• Published attestation turn amber when • SWIFT Reserves the right to mandate an
independent external assessment personal data
expired or invalidated
• Advisory review by external/internal audit • Policy and CSCF updates follow an
• Internal Service Bureau are now annual update cycle
2017/2018 considered as Non SWIFT user group Hub • User Guide section transferred to KYC-
• Go Local India (GLI) users do not have to SA documentation
self attest
7
2020 EOY KYC-SA Attestation
8
CSP | CSCF v2019 remains valid for 2020 attestation cycle
• Users are requested to attest against the CSCF v2019 during the
second half of 2020
• KYC-SA baseline 2019.3 to be used in KYC-SA, available since 1st July 2020
EOY Attestation
9
CSP | Grant All Features and Functions
‘Grant All’ objective: To improve operational efficiency of sharing attestation data by allowing access to your
attestation data for all pending and new access requests from messaging counterparties
During an initial notice period of 2 months, ability for customer to opt-out of the ‘grant all’ capability. After the notice period of
2 months, remaining customers will be opted in by default.
• For customers opted in to ‘Grant all’, all incoming Access Requests from messaging counterparties will be
‘granted’
• All customers are opted in after the initial notice period, unless they choose to opt out
• If you are opted in after the initial notice period, you may opt out at any time
• Extend overview of active Counterparties to Granters & Security Officers
• Updated grid view of counterparties and request status
11
CSCF v2021
12
CSCF Controls Evolution
2021
2020
Covid-19
2019
2021 - 31 Controls
2020 - 31 Controls • 22 Mandatory
• 21 Mandatory • 9 Advisory
• 10 Advisory • Compliance by 31 Dec 21
2018 - 27 Controls 2019 - 29 Controls • Compliance by
• 16 Mandatory • 19 Mandatory
• 11 Advisory 2018 • 10 Advisory
31 Dec 20 - Ensure full propagation of existing controls
- Enhance efficient control implementation (clarifications
• Compliance by 31 Dec 18 • Compliance by 31 Dec 19 - Embed new Model/Technology in line w ith
SWIFT Strategy (Cloud/API’s)
X Mandatory Control X Advisory Control Control is subsequently promoted Control is subsequently split 1) 1.3 & 1.4 were split from 1.1 2) 2.11 was split from 2.9 14
CSCF v2021 | Consultation Process and Summary of resulting Changes
Consultation Process Summary of CSCF v2021 Changes
A1/A2
SWIFT Footprint
• SWIFT or vendors’ compatible Connectors: local software to facilitate communication with
Products to link with an interface, or to a service provider
Interfaces SWIFTNet Differentiate
• SAG/AGI/SAA/AMH in Secure Zone SWIFT connectors - provided by SWIFT or vendors - • Better split to ease
• All controls SWIFT Footprint e.g. Autoclient, SIL proper architecture
Customer connectors - off the shelf (file transfer solutions, identification by
SWIFT Footprint Middleware/MQ servers…) or home made product users
• SWIFT or Compatible Vendors (implementing API’s) - Non-SWIFT footprint
Software to connect Interfaces
at Service Provider or Lite2
• Differentiate pace
A3
• (SIL)DL/AC/MicroGateway in Secure A3 Architecture - relies on SWIFT connectors of changes
Zone (New) A4 Architecture - relies on Customer connectors
Connectors
• All but 1 control • Pave the way for
Other Footprint progressively in
• File transfer solutions, local
future models (no
Controls with Clarified In-Scope SWIFT-Footprint
middleware servers to connect
with Service Provider A3 – No Change
with API’s)
• Less controls (Advisory) • Same controls as today - SWIFT connector in-scope
• Could allow to
A3… Mix of SWIFT and non-SWIFT A4 – Introduced as Advisory to pave the way identify and cover
• Difficult to extend the scope • Controls with customer connector in-scope other intermediate
Limitations • Basic Cyber Hygiene
• Mix of Mandatory <> Advisory actors (third party)
• API model will extend usage of • Connectivity for local App2app
Non-SWIFT Footprint • Centralised business controls
• Scope can be progressively wider
16
CSCF v2021 – Architecture A3 versus New Architecture A4
17
CSCF v2021 – Summary and Controls Applicability
Arch A1 A2 A3 A4 B
Man. 22 22 21 17 14
Adv. 9 9 9 9 8
Tot. 31 31 30 26 22
18
CSCF v2021 – Clarifications for Efficiency and Alignment to Reality
19
Independent Assessment Framework (IAF)
CSP | Flavours of the assessments
Timeline
Assessment Type Selection Criteria Assessor 2022
2019 2020 2021
and beyond
Start of IAF
21
CSP | Audit vs Assessment
The objective is the same: providing assurance on the compliance with the stated CSCF
Control Objective.
22
CSP | Risk-Based approach when assessing security compliance
Assessors must employ a risk-based approach when assessing the security compliance of the
users; i.e. assessors must not use the SWIFT proposed Implementation Guidelines as a strict
audit check list.
Hence, the implementation of a CSP control can be:
• As per the documented SWIFT proposed Implementation Guidelines
• An alternative Implementation that:
Addresses the risk drivers
Covers the relevant in-scope components
Meets the stated control objective, i.e. the security goal to be achieved
IMPORTANT: Both methods are valid and equivalent from a CSP compliance perspective
23
CSP | Independent Assurance Framework flow and timeline
1 3
2 4
Since 2020
Community-Standard Assessments
All customers from 2021
Internal or external assessment
25
CSP | Independent Assurance Framework – details (2/2)
Community-Standard Assessments
All customers from 2021
Internal or external assessment
Escalation • Absence of assessment results in reporting to the supervisors and visibility to counterparties
27
CSP | COVID-19 : Expectation from Customers in 2020
DO’S
• When attesting between July 2020 and December 2020, Users MUST use the CSCF v2019. SWIFT recommends to use the v2020 or the v2021
for clarifications only and at user’s discretion; Consulting the published v2020 or v2021 must not result in any scope creep in 2020.
• Focus on the controls which are applicable this year for data attestation against CSCF v2019.
• Since attesting window in KYC-SA (baseline 2019.3) opens up on 1st July 2020, ensure that you submit your attestation at the earliest.
Attestation submitted 1st July 2020 onwards, will have its validity till 31st Dec 2021, (Thus not limited to 12 months anymore).
• If you are a first time user, please ensure that you have access to KYC-SA application and you have identified and assigned designated users to
perform data contribution to KYC-SA. Please refer the slides “How SWIFT can Help”, for more information and further assistance.
• If you have not started working on your 2020 attestation yet, please initiate process, as we are heading towards Year End.
• Ensure that you are using the correct draft version any time in the process. This avoid re-work at your end.
• Once your attestation draft is finalized & submitted to the approver internally, please request the Approver to approve draft.
• If your Entity is managed centrally and intend to submit data attestation centrally, follow-up with your Parent BIC and remind them to submit
data.
• If you are hosting SWIFT infrastructure for an attesting user, please help your hosted entity by proactively furnishing all required information
needed to complete their attestation.
• Read the Tip 5024006 IAF FAQ COVID-19, if unsure about the impact on CSP timelines
28
CSP | Expectation from Customers
DON’TS
• Don’t wait for last minute data submission in December, due to various reasons, such as:
o Staff unavailability due to unforeseen sick leaves or planned personal leaves.
o Year end resource crisis at customer end, due to long Christmas festival, in some regions.
o Unforeseen emergencies/crisis at customer end will ideally takes precedence over data submission and attestation.
Through these Do’s and Don’ts, SWIFT wants to re-iterate that it’s a
collaborative journey and without your genuine efforts, SWIFT may not
be able to safeguard community from emerging Cyber Security threats at
any given time. Your Co-operation is highly appreciated.
29
CSP | FAQ
With the introduction of
Compared to Architecture type A4 in CSCF
CSCFv2019, how many v2021, is there a need to
new mandatory & With the introduction of
reassess one’s Architecture
advisory controls Architecture type A4 in
type, before data submission
introduced in CSCF v2021, which existing
for July 2021 onwards?
CSCFv2021? Architecture type can have
potential impact, for which
reassessment required?
32
CSP | Supporting the Community
Where can I go to find additional info?
34
CSP | Supporting the Community
Need more help?
1) Though we are in year 2020, KYC data-attestation this year is based on CSCF v2019 controls ?
True/False.
2) Independent Assessment, is mandated by SWIFT for year 2020 & as a customer I must work on this?
True/False
3) After the Nov Grant All activation, if the default “Opt In” is set in KYC-SA, access request (to attestation
data) from messaging counterparties will be automatically processed/granted?True/False.
4) As per CSCF v2021 controls, there will be five architecture types going forward? True/False.
6) For performing community-standard assessment, customer is responsible for advance planning and
budgeting? True/False
CSP | Quiz Answers
Though we are in year 2020, KYC data-attestation this year is based on CSCF v2019 controls ?
TRUE
Independent Assessment, is mandated by SWIFT for year 2020 & as a customer I must work on this?
FALSE
After the Nov Grant All activation, if the default “Opt In” is set in KYC-SA, access request (to attestation
data) from messaging counterparties will be automatically processed/granted?
TRUE
As per CSCF v2021 controls, there will be five architecture types going forward?
TRUE
For performing community-standard assessment, customer is responsible for advance planning and
budgeting?
TRUE
&
Feedback Poll is opened in parallel. Request you to
please share your valuable Feedback, before you
Leave.
CSP | Poll
1) Whether session was informative & met your expectation around CSP?
a. Yes
b. No
2) If the answer to above question is NO, please explain what was missed out and what you would like to
hear more in upcoming session?
41