{"id":46312,"date":"2023-11-06T14:54:24","date_gmt":"2023-11-06T13:54:24","guid":{"rendered":"https:\/\/www.usd.de\/?p=46312"},"modified":"2023-11-06T14:54:25","modified_gmt":"2023-11-06T13:54:25","slug":"swift-expert-tip-gap-analysis","status":"publish","type":"post","link":"https:\/\/www.usd.de\/en\/swift-expert-tip-gap-analysis\/","title":{"rendered":"SWIFT Expert Tip: Combine Your Current SWIFT Assessment with a Gap-Analysis for CSCFv2024"},"content":{"rendered":"\n<p>SWIFT users are required by the Customer Security Controls Framework (<a href=\"https:\/\/www.swift.com\/de\/node\/300801\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/www.swift.com\/de\/node\/300801\" rel=\"noreferrer noopener\">CSCF<\/a>) to demonstrate compliance with at least all mandatory controls through an annual independent assessment. In a SWIFT assessment of this kind, the security of an organization's SWIFT infrastructure and SWIFT systems is checked to ensure that they are protected against potential security threats and vulnerabilities.<\/p>\n\n\n\n<p>November and December are typical months for the annual <a href=\"https:\/\/www.usd.de\/en\/security-audits\/swift-assessment\/\" data-type=\"link\" data-id=\"https:\/\/www.usd.de\/en\/security-audits\/swift-assessment\/\" target=\"_blank\" rel=\"noreferrer noopener\">SWIFT Assessment<\/a>. You are therefore probably in the middle of preparing for or in the middle of your current SWIFT CSCFv2023 assessment. Have you ever considered using your current assessment to carry out a gap analysis in preparation for the next CSCFv2024 assessment?<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Tobias Weber, Managing Security Consultant and SWIFT Auditor at usd AG, explains the <strong>advantages of this approach<\/strong> and also takes a look at the <strong>upcoming changes<\/strong> under CSCFv2024:<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"502\" height=\"502\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/TW_Zitat.jpg\" alt=\"\" class=\"wp-image-39023\" style=\"aspect-ratio:1;width:142px;height:auto\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Combine current SWIFT Assessment with Gap-Analysis<\/h2>\n\n\n\n<p>The phases of a SWIFT Assessment year usually run in the same way: the corresponding assessments are always carried out for all SWIFT users concerned from July of each year until the end of the year, so that they receive their report in January at the latest and can prove their compliance with the security requirements. At the same time, an update of the CSCF for the following year is regularly published in July.<\/p>\n\n\n\n<p>This means that SWIFT is not only giving users a transition phase of roughly one year for the newly introduced frameworks, but is also enabling a joint gap analysis alongside the upcoming assessment. Use this opportunity to make the most of the transition phase until your SWIFT Assessment in the second half of 2024. Take an early look at the changes in newly published controls and determine which implementations are necessary to fulfill by the next assessment.&nbsp;<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">CSCFv2024 - Changes at a glance<\/h2>\n\n\n\n<p>In order to be well prepared, SWIFT users should familiarize themselves with the changes at an early stage. If you take a look at the <a href=\"https:\/\/www2.swift.com\/knowledgecentre\/rest\/v1\/publications\/cscf_dd\/48.0\/CSCF_v2024_20230707.pdf?logDownload=true\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/www2.swift.com\/knowledgecentre\/rest\/v1\/publications\/cscf_dd\/48.0\/CSCF_v2024_20230707.pdf?logDownload=true\" rel=\"noreferrer noopener\">CSCFv2024<\/a>, the following 3 key takeaways can be noted:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The basic <strong>structure <\/strong>of the framework has remained the same.<\/li>\n\n\n\n<li>As previously announced, <strong>cloud security<\/strong> has been given greater importance. For example, Control 2.8 (\"Outsourced Critical Activity Protection\") is now mandatory for all architecture types: Infrastructures should thus be better protected against risks that can arise from the outsourcing of critical activities.<\/li>\n\n\n\n<li>There are some changes to Control 2.4A (\"<strong>Back Office Data Flow Security<\/strong>\"): The <strong>scope<\/strong> has been extended and a new Appendix H shows the various complex possibilities. For example, every data exchange must now be protected either end-to-end or transitively. However, this control becomes mandatory in two phases: First, the focus is on new connections. In the next step, the protection of existing connections will become mandatory. We assume that these objectives will be reflected in the next CSCF releases.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"767\" height=\"422\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-HeroLab-Kachel-Mngt-1-1.jpeg\" alt=\"\" class=\"wp-image-16841\" style=\"aspect-ratio:1.8175355450236967;width:222px;height:auto\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Do you need assistance with your SWIFT Assessment or with a joint Gap-Analysis?<\/p>\n\n\n\n<p><a href=\"https:\/\/www.usd.de\/en\/contact-form-security-audits\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/www.usd.de\/en\/contact-form-security-audits\/\" rel=\"noreferrer noopener\"><strong>Contact us, we are happy to help.<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>SWIFT users are required by the Customer Security Controls Framework (CSCF) to demonstrate compliance with at least all mandatory controls through an annual independent assessment. In a SWIFT assessment of this kind, the security of an organization's SWIFT infrastructure and SWIFT systems is checked to ensure that they are protected against potential security threats and [&hellip;]<\/p>\n","protected":false},"author":90,"featured_media":15986,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[373,410,389],"tags":[7448,4218,5077,5078,4219,7440],"class_list":["post-46312","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en","category-financial-sector-compliance-en","category-security-audits-en","tag-gap-analysis","tag-swift-en","tag-swift-assessment-en","tag-swift-audit-en","tag-swift-cscf-en","tag-swift-customer-security-controls-framework-2-en"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/46312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=46312"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/46312\/revisions"}],"predecessor-version":[{"id":46351,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/46312\/revisions\/46351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/15986"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=46312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/categories?post=46312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/tags?post=46312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}