Skip to content
SectonaSectona
  • PlatformExpand
    • 1
  • SolutionsExpand
    • 2
  • ResourcesExpand
    • 3
  • ServicesExpand
    • 4
  • CompanyExpand
    • 5
Contact Sales Request Demo
Sectona

Find out SWIFT requirements specific to privileged access

Modern infrastructure is dynamic. Secure privileged accounts with continuous discovery and vaulting.​

Request Demo

Find out SWIFT requirements specific to privileged access

The increasing payment frauds in customer’s SWIFT environments have led to the launch of the Customer Security Programme (CSP) aimed at improving information sharing among the community, enhancing customer experiences, and providing audit frameworks. Revolving around the objectives of securing an organization’s environment, restricting privileged access, and responding to anomalous activities, a set of 16 mandatory and 11 advisory security controls have been described to which customer must attest to and have proof of compliance. Among the clauses that customers must adhere to CSP framework around privileged access are highlighted below:

Requirement 1

Ensure protection of SWIFT user’s local infrastructure, virtual platforms and control the access of operating system privileged accounts

Requirement 4.1

Ensure passwords are sufficiently resistant against common passwords through an effective password policy

Requirement 4.2

Prevent compromise of a single authenticator factor that authorized access to SWIFT systems by implementing multi-factor authentication

Requirement 5.1

Enforce security principles of need-to-know access, least privileged access and segregation of duties for operator accounts

Requirement 5.4

Protect Physically and logically recorded passwords

Requirement 6.4

Record security events and detect anomalous activities and operations within the SWIFT environment


Explore how Sectona helps you achieve compliance with SWIFT

Sectona Privileged Access Management Solution is an integrated solution of several capabilities like password management, session management and threat analytics adhered to and governed by customers in the SWIFT environment. Listed below are few of the use cases compliant with each of the clauses of the SWIFT Framework w.r.t privileged access.
Swift Requirement 1
Addressing Requirement 1

Monitor every SWIFT privileged session

Capture comprehensive logs of all critical SWIFT sessions in video format. Logs are stored in an encrypted format and provide auditable details accessible only to authorized personnel for improved governance.

Addressing Requirement 4.1

Automate Password Management

Manage and Inventorize privileged accounts across infrastructure. Leverage strong password change capabilities from discovery, onboarding to rotation for all vendor supplied default accounts.

Swift Requirement 4.1
Swift Requirement 4.2
Addressing Requirement 4.2

Enforce MFA authentication for admins

Add a second layer of authentication to SWIFT environment by configuring customizable MFA mechanisms including token-based or built-in app-based OTP.

Addressing Requirement 5.1

Enable need based access to resources

Configure access policy definitions based on user roles & functions. Define access to critical data and enforce restrictions on a need-to-know, need-to-access basis with strong workflow based access.

Swift Requirement 5.1
Swift Requirement 5.4
Addressing Requirement 5.4

Implement Password Management System

Leverage strong password change capabilities from discovery, onboarding to rotation for all privileged accounts in a secure, encrypted, tamper – proof storage.

Addressing Requirement 6.4

Leverage Risk based scoring & SIEM integration

Detect risky events events for administrator activities with risk based scoring & SIEM integration.

Swift Requirement 6.4
Addressing Requirement 1 Monitor every SWIFT privileged session

Capture comprehensive logs of all critical SWIFT sessions in video format. Logs are stored in an encrypted format and provide auditable details accessible only to authorized personnel for improved governance.

Swift Requirement 1
Addressing Requirement 4.1 Automate Password Management

Manage and Inventorize privileged accounts across infrastructure. Leverage strong password change capabilities from discovery, onboarding to rotation for all vendor supplied default accounts.

Swift Requirement 4.1
Addressing Requirement 4.2 Enforce MFA authentication for admins

Add a second layer of authentication to SWIFT environment by configuring customizable MFA mechanisms including token-based or built-in app-based OTP.

Swift Requirement 4.2
Addressing Requirement 5.1 Enable need based access to resources

Configure access policy definitions based on user roles & functions. Define access to critical data and enforce restrictions on a need-to-know, need-to-access basis with strong workflow based access.

Swift Requirement 5.1
Addressing Requirement 5.4 Implement Password Management System

Leverage strong password change capabilities from discovery, onboarding to rotation for all privileged accounts in a secure, encrypted, tamper – proof storage.

Swift Requirement 5.4
Addressing Requirement 6.4 Leverage Risk based scoring & SIEM integration

Detect risky events events for administrator activities with risk based scoring & SIEM integration.

Swift Requirement 6.4

Explore Platform right arrow blue

GartnerPeerInsightsLogo onlight

"Well rounded & integrated PAM suite with easy adaptability to support critical user access across AWS resources"

Read Review
"The GARTNER PEER INSIGHTS Logo is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates"

Trusted by

Dhanlaxmi bank
05 Sidbi
AGD Bank

Next Steps

Explore use-cases aligned with your privileged access requirements

See It In Action

Explore


  • About
  • Join the team
  • Careers We're Hiring
  • Contact Us
  • Platform
  • Partners
  • Documentation

Resources


  • Sectona Blog
  • Key ConceptsNew
  • Datasheets
  • Solution Briefs
  • Whitepapers
  • Case Studies

Capabilities


  • Continuous Discovery
  • Password Management
  • Secure Remote Access
  • Session Recording and Threat Analytics
  • Mutli-Factor Authentication
  • Just-in-time Access
  • Privileged Task Management
  • Account Lifecycle Management

Solutions


  • Secure remote privileged access
  • Remove administrator rights
  • Secure cloud environments
  • Automate entitlement reviews
  • Simplify privileged account lifecyle
Facebook Twitter Linkedin

© 2021 Sectona Technologies Pvt Ltd. All Rights Reserved. All Trademarks held by their respective owners.

PRIVACY POLICY | TERMS | EULA | RESPONSIBLE DISCLOSURE

Scroll to top
  • Home
  • Platform
    • Continuous Discovery
    • Password Management
    • Secure Remote Access
    • Session Recording and Threat Analytics
    • Multi-Factor Authentication
    • Just In Time Access
    • Privileged Task Management
    • Account Lifecycle Management
    • Windows Privilege Management
    • Privileged Access Governance
  • Solutions
    • Secure remote privileged access
    • Remove Administrator Rights
    • Secure Cloud Environments
    • Automate Entitlement Reviews
    • Simplify Privileged Account lifecycle
    • PCI-DSS Compliance
    • ISO 27002
    • SWIFT Security Framework
  • Resources
    • Blog
    • Key Concept
    • Resources
    • Knowledge Base
  • Services
    • Professional Services
    • Training & Certifications
  • Company
    • About Us
    • Contact Us
    • Branding
  • Partner
    • Find a Partner
    • Become a Partner
    • Register a Deal
  • Careers
    • Join the team
    • Explore Career Opportunities
  • Explore
    • Documentation
    • Downloads
    • Try Free Edition
    • Security Platform