Hands on laptop keyboard with digital network overlay, symbolizing cybersecurity, data flow, and secure SWIFT transactions.

Update to the SWIFT Customer Security Controls Framework: What Changes Does CSCFv2026 Introduce?

9. October 2025

Since 2017, the Customer Security Controls Framework (CSCF) has been helping organizations to effectively secure their SWIFT infrastructure. The aim is to reduce cyber risks and to detect and stop fraudulent transactions at an early stage.

SWIFT users must demonstrate annually that they meet the CSCF requirements. The basis for this is an independent SWIFT assessment. This confirms that the organization's SWIFT infrastructure and connected systems are effectively and reliably protected against potential threats and vulnerabilities.

With the latest update to the framework, CSCFv2026, SWIFT has introduced key changes and significant improvements. Together with our colleague Najim Quraishi, Managing Security Consultant at usd AG and auditor for international security standards, we provide you with an overview of the most important new features. Knowing these now gives you an advantage – both in the upcoming SWIFT assessment according to CSCFv2025 and in the subsequent transition phase until your next SWIFT assessment in 2026.

Portrait of Najim Quraishi, Managing Security Consultant at usd AG, wearing a suit and white shirt, taken in a modern office building.

What changes does CSCFv2026 introduce?

CSCFv2026 builds incrementally on the previous version. As announced in CSCFv2025, control 2.4 “Back Office Data Flow Security” is now mandatory in CSCFv2026.

This means that the customer client connector (e.g., API users, middleware, or file transfer clients) is classified as a mandatory component for several controls. Every endpoint that is indirectly connected to SWIFT via shared resources from service providers is now considered a customer connector, regardless of whether it is server- or client-based.

This may cause institutions that were previously certified according to architecture type B to be reclassified as type A4 if customer connectors are used. Details on the implications and reclassification can be found in our previous article “SWIFT CSCFv2025: Current Version of the Framework Brings Changes for Architecture Type B”.

The following controls list the Customer Connector as an in-scope component and are classified as mandatory with the introduction of CSCFv2026:

Control NumberSecurity Control
1.2Operating System Privileged Account Control
1.3Virtualisation or Cloud Platform Protection
1.4Restriction of Internet Access
2.2Security Updates
2.3System Hardening
2.6Operator Session Confidentiality and Integrity
2.7Vulnerability Scanning
3.1Physical Security
4.1Password Policy
4.2Multi-Factor Authentication
5.1Logical Access Control
5.4Password Repository Protection
6.1Malware Protection
6.4Logging and Monitoring

The Alliance Connect instances are also included as part of the components that fall within the scope of the framework.

Why should you start thinking about CSCFv2026 now?

Your current SWIFT assessment is carried out in accordance with CSCFv2025. Nevertheless, we recommend that you familiarize yourself with the changes in the new CSCFv2026 and take them into account. Why? By making use of the transition phase, you can plan with certainty and avoid any last-minute surprises.

Our tip: Conduct a gap analysis according to CSCFv2026 in parallel to your current assessment. This will allow you to identify whether your architecture is affected and whether a reclassification to architecture type A4 is necessary at an early stage. This gives you the opportunity to implement major adjustments strategically and without time pressure.


Do you have any questions or need support with your upcoming SWIFT assessment? Contact us, we will be happy to help.

Also interesting:

Red Teaming: 5 Questions Every IT Leader Wants Answered

Red Teaming: 5 Questions Every IT Leader Wants Answered

Many companies invest in firewalls, endpoint protection, and awareness training, assuming that this puts them in a strong position. But the reality is different: attackers do not think in terms of tools, but in terms of targets. They combine technical vulnerabilities...

Stronger Together: usd AG Joins Security Network Munich

Stronger Together: usd AG Joins Security Network Munich

We are convinced that real progress in cyber security can only be achieved through open knowledge sharing and collaboration. That is why we contribute our expertise to international committees, promote dialogue within the security community and maintain close...

Categories

Categories