Framework

SWIFT Customer Security Programme
CSCF independent assessment, evidence, and remediation

The SWIFT Customer Security Programme (CSP) requires every SWIFT user to attest annually against the Customer Security Controls Framework. Most user types must back the attestation with an independent assessment. Run CSCF assessments, coordinate independent assessor work, track mandatory and advisory controls, and produce KYC-SA-ready evidence from one platform.

No credit card required. Free plan available forever.

SWIFT CSP in context: the Customer Security Programme and the CSCF

SWIFT introduced the Customer Security Programme (CSP) in 2016 in response to a series of attacks where adversaries compromised customer environments and used legitimate SWIFT credentials to move funds. CSP is the framework SWIFT uses to lift the floor of cyber hygiene across its user community. The Customer Security Controls Framework (CSCF) is the catalogue of controls every SWIFT user is expected to assess against, and the KYC-SA application on swift.com is the surface where users submit their annual self-attestation and consume the attestations of their counterparties.

The CSCF is refreshed annually. Each version (v2024, v2025, and successors) introduces or adjusts controls and may move controls between mandatory and advisory or change the architecture types they apply to. SWIFT publishes the in-force version with implementation guidance and the assessment expectations. SWIFT CSP sits alongside other financial-sector frameworks that SecPortal already covers, including the Digital Operational Resilience Act for EU financial entities, the TIBER-EU threat-led penetration testing methodology, and the CBEST intelligence-led testing framework operated by the Bank of England. SWIFT CSP is more narrowly scoped: it governs the SWIFT-related infrastructure and the operations that produce SWIFT messages, rather than the firm as a whole.

Architecture types: where CSCF scope is set

SWIFT classifies users into architecture types based on how they connect to the SWIFT network and which components they operate. The architecture type sets the in-scope CSCF controls because controls are flagged as applicable per architecture. Confirming the architecture type before the assessment begins is the structural step that prevents scope drift mid-cycle.

Architecture A1: full local SWIFT infrastructure

Customer hosts the messaging interface, the communication interface, and the SWIFTNet Link or equivalent on its own premises. The full secure zone is operated by the customer, including HSMs and connectivity. Architecture A1 carries the broadest CSCF control coverage because every component sits inside the customer scope.

Architecture A2: customer connector with messaging on premises

Customer hosts a SWIFT-related connector and a messaging interface on premises while delegating selected components or connectivity to a service. Architecture A2 retains most secure zone obligations and a slightly narrower scope than A1 depending on the components delegated.

Architecture A3: connector on premises, messaging at a service bureau

Customer keeps a SWIFT-related connector on premises but uses a service bureau for the messaging interface. Architecture A3 reduces the on-premises scope but retains operator and access controls on the customer side, with a documented boundary between customer and service bureau responsibility.

Architecture A4: fully outsourced via service bureau

Customer connects to SWIFT entirely through a service bureau, with no SWIFT-related connector on customer premises. Architecture A4 narrows the scope to operator access, password and credential management, and the relationship with the service bureau, while many infrastructure controls fall to the bureau under its own attestation.

Architecture B: third-party SWIFT-connected provider

Customer connects to SWIFT through a third party that already operates the SWIFT-related infrastructure. Architecture B narrows the in-scope controls to those that govern the customer side of the relationship: operator access, credential security, awareness training, and the way customer instructions reach the third party.

The CSCF principles: three objectives, seven principles

The Customer Security Controls Framework groups controls under three high-level objectives (secure your environment, know and limit access, detect and respond) and seven principles. Each principle owns a set of controls, with mandatory and advisory flags and the architecture types each control applies to. The principles below are the structure that makes the CSCF easier to navigate for assessors and assessor-led conversations with operators.

Principle 1: Restrict internet access and protect critical systems from general IT environment

Establish a SWIFT secure zone, isolate it from the broader IT environment, and limit internet access. Controls include environment protection, OS privileged account control, virtualisation platform protection, and back-office data flow security.

Principle 2: Reduce attack surface and vulnerabilities

Harden the SWIFT-related components, manage external transmission security, and apply secure software loading. Controls cover internal data flow security, external transmission protection, operator session confidentiality, vulnerability scanning, and system hardening.

Principle 3: Physically secure the environment

Apply physical access restrictions to the systems, equipment, and storage media that carry SWIFT-related operations. Controls cover physical security of premises, cabling, and the protected media used to install or move SWIFT-related software and credentials.

Principle 4: Prevent compromise of credentials

Manage password policies, multi-factor authentication, and operator credential lifecycle for SWIFT-related operators. Controls require multi-factor authentication for interactive operator access and structured credential management across the operator population.

Principle 5: Manage identities and segregate privileges

Apply logical access control to SWIFT-related applications, segregate operator and administrator duties, and review entitlements regularly. Controls cover token management, physical and logical password storage, and the review cadence on privileged accounts.

Principle 6: Detect anomalous activity in systems and transaction records

Implement malware protection, software integrity verification, database integrity checks, and logging and monitoring for SWIFT-related systems and transaction records. Controls include anti-malware deployment, software integrity, transaction record integrity, and event recording with retention.

Principle 7: Plan for incident response and information sharing

Maintain a cyber incident response plan, deliver security training, and share information with SWIFT and counterparties as required. Controls cover incident response readiness, security training and awareness, penetration testing, and scenario-based risk assessment.

Independent assessment: the structural feature of CSP

SWIFT moved CSP from a self-attestation-only model to a model that requires an independent assessment for most user populations. The assessment can be performed by an internal team that is independent of the SWIFT-related operations or by an external assessor. The independence basis is itself part of the evidence record. The assessor walks every in-scope mandatory control, tests implementation, reviews supporting evidence, and records the compliance position with rationale. Advisory controls follow a lighter walk where the user has elected to claim them.

  • Confirm the user architecture type (A1, A2, A3, A4, or B) and the in-scope components for the CSCF cycle currently in force
  • Identify the assessor (internal team independent of SWIFT-related operations, or external assessor) and document the independence basis on the engagement record
  • Map the in-scope mandatory and advisory controls to the responsible owner, the implementation guidance reference, and the evidence the assessor will examine
  • Walk every in-scope mandatory control with the assessor, capture the evidence (configuration extracts, screenshots, log samples, policy references) on the control record, and document the compliance position with rationale
  • Log deviations and compensating controls on the same workflow, with the risk acceptance, the remediation plan, and the retest condition tied to the control rather than to a side document
  • Produce the independent assessor report and retain the evidence pack so the KYC-SA submission and any future supervisor or counterparty query can be addressed from the engagement record

The evidence pack: what an assessor will look for

The independent assessment is only as defensible as the evidence behind it. The list below is the working set of artefacts a SWIFT CSP assessor will commonly request across the in force CSCF cycle. The exact list varies with architecture type, in-force CSCF version, and any deviations the user has logged, but this is the core that recurs across cycles.

  • Architecture diagram of the secure zone, the network segmentation, and the boundary with the broader IT environment, with version history
  • Operator inventory for SWIFT-related operations with roles, multi-factor authentication state, and review history
  • Vulnerability scanner output for the in-scope assets, with findings tied to the relevant CSCF controls and remediation status against SLA
  • Penetration test reports covering the SWIFT-related infrastructure and the application boundary, with findings tied to the relevant CSCF controls
  • Patch management evidence showing the in-scope assets are at supported versions and inside the SLA window for security updates
  • Anti-malware deployment evidence and signature update history across the in-scope endpoints, servers, and HSMs where applicable
  • Logging and monitoring configuration extracts, with retention period evidence and the link to the detection runbook the SOC operates against
  • Incident response runbook, contact tree (including SWIFT Customer Security Officer), tabletop exercise evidence, and the historical incident record
  • Security awareness training records for SWIFT-related operators with the curriculum, the cadence, and the completion evidence
  • Counterparty attestation review records for KYC-SA inbound consumption tied to the relationship and the onboarding or ongoing monitoring decision

Vulnerability scanning evidence and penetration test findings are usually the highest volume artefacts in the pack. The scanner result triage workflow covers how to turn raw scanner output into assessor-ready findings without losing the audit trail, and the scanner false positives guide covers the triage discipline that keeps the evidence pack focused on real issues. For the broader pentest finding workflow that feeds CSCF detection and response controls, the penetration testing workflow keeps engagement, findings, and remediation tied to a single record.

KYC-SA: annual attestation and counterparty consumption

Every SWIFT user submits an annual self-attestation through the KYC-SA application, covering the in-scope mandatory controls and the optional advisory controls the user has elected to claim. The submission carries the architecture type, the control compliance status, and a reference to the independent assessment that supported the position. KYC-SA is bidirectional: counterparties consume the attestations of their correspondents to inform onboarding and ongoing monitoring decisions, so the integrity of the submission has downstream effects on the relationships the SWIFT user maintains.

The structural risk in KYC-SA is desync between the submitted attestation and the live evidence pack: the attestation says compliant, the evidence has aged out, and the next assessor cycle finds the gap. Driving the attestation from the same workspace that holds the evidence pack closes that loop because the submission text traces back to the artefacts that supported it. Combined with the aging pentest findings research, the structural pattern across regulated frameworks is that evidence quality compounds over time only if the workflow keeps the submission and the artefact in the same record.

How SecPortal aligns to a SWIFT CSP cycle

SecPortal is built for security service providers and internal security teams running regulated assessment cycles. SWIFT CSP fits the platform model directly: the architecture type and in-scope CSCF controls drive the engagement, the assessor walks the controls on the workspace, the evidence pack lives on the finding and control records, and the attestation reflects what the workspace already says.

  • Engagement management dedicated to the SWIFT CSP cycle, with the architecture type, the in-scope components, and the assessor record on a single workspace
  • Findings management with CVSS 3.1 scoring, 300+ templates, and explicit mapping of vulnerability and assessor findings to the relevant CSCF control
  • Compliance tracking that maps CSCF controls to architecture type and tracks the evidence pack alongside the attestation submission
  • AI report generation that turns control assessment notes, deviations, and remediation plans into the assessor report and the KYC-SA narrative without manual rewriting
  • External and authenticated scanning to feed the vulnerability scanning and detection controls under CSCF principles 2 and 6, with scheduled scans across the cycle
  • Continuous monitoring with scheduled scans so the in-scope assets carry a coverage record across the year rather than a single audit-time snapshot
  • Findings audit trail with reasons and re-evaluation dates so suppressions and deviations are defensible at assessor sign-off and at counterparty review

For the wider compliance picture, the PCI DSS framework page covers the cardholder data environment with adjacent vulnerability scanning and penetration testing expectations, and the ISO 27001 framework page covers the information security management system that often sits above the SWIFT CSP scope at the firm level. For the EU regulatory picture, the DORA framework page covers the operational resilience expectations and the threat-led penetration testing requirement that runs at least every three years for in-scope entities. For the Australian regulatory picture, the APRA CPS 234 framework page covers the prudential information security obligations APRA-regulated entities meet alongside their SWIFT-related infrastructure controls.

Practical sequencing: how to run a CSP cycle without scrambling at year end

SWIFT CSP cycles concentrate work at the end of the year because attestation and independent assessment land near the SWIFT submission window. The pattern that breaks the scramble is sequencing the work across the year rather than against the deadline.

  • Q1: confirm architecture type, refresh the in-scope component list, and reconcile against the in-force CSCF version released by SWIFT
  • Q2: run the routine vulnerability scans, refresh operator inventories, and run the first of two tabletop exercises against the incident response runbook
  • Q3: schedule the independent assessor walk, line up the penetration test against the SWIFT-related infrastructure, and address the outstanding remediation items from the previous cycle
  • Q4: complete the assessor walk, finalise the evidence pack, prepare the KYC-SA submission, and submit the attestation with the assessor record attached
  • Year-round: KYC-SA counterparty review on a structured cadence, with the inbound attestation review tied to the relationship rather than to a one-off PDF read

Common deviation patterns and how to record them

Most users carry a small number of deviations from the CSCF, especially in the first two cycles after a control change or after a significant architecture migration. The defensible position is not zero deviations; it is documented deviations with a rationale, a compensating control, an owner, a remediation plan, and a retest condition. The pattern below is what the assessor reads as a mature programme.

  • Deviation reason recorded on the control: the structural reason the control is not implemented as written, in plain language rather than auditor jargon
  • Compensating control identified and tied to the deviation, with the evidence the compensating control is implemented and operating
  • Risk acceptance signed by the accountable owner, with the date and the duration of the acceptance bounded against the next cycle or the remediation deadline
  • Remediation plan attached to the deviation with owners, deadlines, and the explicit retest condition that closes the deviation when met
  • Re-evaluation date on the deviation so the next cycle does not silently inherit the acceptance without a fresh review of the underlying conditions

Scope and limitations

SWIFT CSP is the framework operated by SWIFT and the assessor community. SecPortal is the workspace that holds the engagement, the controls, the evidence, and the audit trail. Submission to KYC-SA on swift.com remains an action the user takes through the SWIFT application; SecPortal holds the supporting record so the submission is grounded in the evidence pack rather than reconstructed from email and shared drives at year end.

The in-force CSCF version, the architecture type mapping, and the assessment expectations are published by SWIFT and refreshed annually. This page describes the structure of the framework and how a workspace-driven cycle plays against it; the authoritative reference for the in-force controls and the implementation guidance remains the SWIFT-published CSCF document for the cycle currently in scope.

Key control areas

SecPortal helps you track and manage compliance across these domains.

Architecture types A1, A2, A3, A4, and B

SWIFT CSP scopes the controls to the architecture type the user operates. A1 covers the full SWIFT infrastructure on customer premises. A2 covers a customer connector with messaging interface on premises. A3 uses a service bureau for messaging while keeping a connector. A4 uses a fully outsourced model through a service bureau. B covers users connecting via a third-party SWIFT-connected provider. Capture the architecture type, the secure zone boundary, and the components in scope as a structured record so the assessor can see what is in and out of scope before evidence collection begins.

Mandatory and advisory controls under the CSCF

The Customer Security Controls Framework groups controls under three objectives (secure your environment, know and limit access, detect and respond) across seven principles. Each year, SWIFT publishes an updated CSCF (v2024, v2025) with controls flagged as mandatory or advisory and with the architecture types they apply to. Track each control as an open work item with the architecture mapping, the implementation guidance reference, the owner, the evidence captured, and the assessor outcome on a single engagement record.

Annual self-attestation and KYC-SA submission

Every SWIFT user submits an annual attestation through the KYC-SA application on swift.com, covering the in-scope mandatory controls and the optional advisory controls. The submission includes architecture type, control compliance status, deviation reasons, and the supporting independent assessment record. Drive the attestation from the same workspace that holds the evidence so the submission text traces back to the artefacts that supported it rather than being rewritten from a status spreadsheet.

Independent assessment requirement and assessor evidence

The SWIFT CSP independent assessment requirement applies to most user populations and uses an internal team independent of the SWIFT-related operations or an external assessor. The assessor walks every in-scope mandatory control, tests implementation, reviews evidence, and records the compliance position. Manage the assessor workspace, the evidence pack, the deviation log, and the closure record on the same platform that holds the attestation so the audit trail is provable rather than reconstructed from email.

Secure zone, environment segregation, and operator separation

CSCF principles 1 and 2 push hard on the secure zone concept: the SWIFT-related infrastructure is isolated from the broader environment, with hardened operator access, multi-factor authentication, and privileged access management. Map the secure zone topology, the segmentation controls, and the operator separation evidence to the controls that govern them so the assessor and the supervisor can see the implementation rather than infer it from network diagrams.

Vulnerability scanning, penetration testing, and detection controls

CSCF includes explicit vulnerability scanning expectations on the SWIFT-related infrastructure and broader detection requirements (logging, anomaly detection, integrity verification). Pair authenticated and external scanner output, penetration test findings, and detection capability evidence to the relevant CSCF controls so the assessor can validate the testing programme rather than the testing artefacts in isolation. Remediation tracking carries the SLA expectations that the assessor will check at retest.

Cyber incident reporting and response readiness

CSCF principle 7 covers detection and response: incident response planning, security incident reporting, and the obligation to notify SWIFT of significant cyber incidents that could affect the SWIFT operating environment. Capture the incident response runbook, the contact tree (including the SWIFT Customer Security Officer), the playbook tests, and the historical incident record on the same workflow so the readiness evidence is current rather than a year-old document discovered at assessment time.

Counterparty assurance through KYC-SA consumption

KYC-SA is bidirectional: SWIFT users publish their attestation, and counterparties consume the attestations of their correspondents to inform onboarding, sanctions screening, and ongoing monitoring decisions. Hold the inbound counterparty attestation review as a structured workflow tied to the relationship and the risk decision rather than as a one-off PDF read, so the recurring review is repeatable and the rationale for retaining or terminating a relationship is provable.

Run a defensible SWIFT CSP assessment without spreadsheet sprawl

Bring CSCF control mapping, evidence collection, independent assessment, and KYC-SA-ready attestation into one workflow. Start free.

No credit card required. Free plan available forever.