Skip to content
Sectona LogoSectona Logo
Menu
  • Platform
    • 1
    • Sectona Security Platform

      Security Platform Thumbnail
      Explore Platform
    • 28679
    • Products

      Privileged Access Management Icon

      Privileged Access Management
      Manage passwords, secrets & monitor sessions

      Endpoint Privilege Management Icon

      Endpoint Privilege Management
      Control and secure administrators credentials

      Privileged Access Governance Icon

      Privileged Access Governance
      Govern Privileged Entitlement

    • Platform Capabilities

      Continuous Discovery Icon

      Continuous Discovery

      Password Management Icon

      Password Management

      Secure Remote Access Icon

      Secure Remote Access

      Session Recording and Threat Analytics Icon

      Session Recording and Threat Analytics

      Multi-Factor Authentication Icon

      Multi-Factor Authentication

      Just-in-time Access Icon

      Just-in-time Access

      Privileged Task Management Icon

      Privileged Task Management

      Account Lifecycle Management Icon

      Account Lifecycle Management

  • Solutions
    • 2
    • Accelerating Privilege Management Thumbnail

      Accelerating Privilege Management Transformation

      Read Whitepaper
    • 28680
    • By Use Case Icon

      BY USE-CASES

      Secure remote privileged access

      Remove administrator rights

      Secure cloud environments

      Automate entitlement reviews

      Simplify privileged account lifecyle

      By Initiative Icon

      BY INITIATIVE

      PCI-DSS Compliance

      ISO 27002

      SWIFT Security Framework

      Documentation Downloads Try Free Edition
  • Resources
    • 3
    • Accelerating Privilege Management Header Thumbnail

      Accelerating Privilege Management Transformation

      Read Whitepaper
    • 28633
    • Resources Icon

      RESOURCES

      Datasheets

      Solution Briefs

      Whitepapers

      Case Studies

      Guides & Toolkits

      View all resources

    • Learn Icon

      LEARN

      Key Concepts

      Technology Blog

      Product Updates

      Documentation

    • EXPLORE
      Documentation Learn how to implement & manage
      Downloads Find software, plugins & updates
      Try Free Edition
  • Services
    • 4
    • FROM THE BLOG

      Gartner Magic Quadrant
      Gartner Magic Quadrant 2021: Sectona PAM Gets a Notable Mention
      Read More
    • 28634
    • TRAINING & SERVICE Professional Services Get the help you need to succeed with your privileged access management project.Explore
      Training & Certification Access learning and trainings options to improve the success of Sectona platform.Explore
    • Get Support Icon

      GET SUPPORT

      Email us

      Create a case

      Customer Success

      Download Resources

    • EXPLORE
      Documentation Learn how to implement & manage
      Downloads Find software, plugins & updates
      Try Free Edition
  • Company
    • 5
    • COMPANY
      Company Thumbnail

      About us

      Leadership team

      Contact us

      Branding

    • 28635
    • PARTNER
      Partner Thumbnail

      Find a partner

      Become a partner

      Register a Deal

    • CAREERS
      Career Thumbnail

      Join the team

      Explore career opportunities

    • Become Partner Thumbnail
      Become a Partner

      The Sectona Technology Partner Program empowers you to deliver strategic value to your customers.

      Become a Partner
Contact Sales Request Demo
Sectona Logo

Find out SWIFT requirements specific to privileged access

Modern infrastructure is dynamic. Secure privileged accounts with continuous discovery and vaulting.​

Request Demo

Find out SWIFT requirements specific to privileged access

The increasing payment frauds in customer’s environments have led to the launch of the Customer Security Program (CSP) aimed at improving information sharing among the community, enhancing customer experiences, and providing audit frameworks. Revolving around the objectives of securing an organization’s environment, restricting privileged access, and responding to anomalous activities, a set of 16 mandatory and 11 advisory security controls have been described to which customer must attest to and have proof of compliance. Among the clauses that customers must adhere to CSP framework around privileged access are highlighted below:

Requirement 1

Ensure protection of SWIFT user’s local infrastructure, virtual platforms and control the access of operating system privileged accounts

Requirement 4.1

Ensure passwords are sufficiently resistant against common passwords through an effective password policy

Requirement 4.2

Prevent compromise of a single authenticator factor that authorized access to SWIFT systems by implementing multi-factor authentication

Requirement 5.1

Enforce security principles of need-to-know access, least privileged access and segregation of duties for operator accounts

Requirement 5.4

Protect Physically and logically recorded passwords

Requirement 6.4

Record security events and detect anomalous activities and operations within the SWIFT environment


Explore how Sectona helps you achieve compliance with SWIFT

Sectona Privileged Access Management Solution is an integrated solution of several capabilities like password management, session management and threat analytics adhered to and governed by customers in the SWIFT environment. Listed below are few of the use cases compliant with each of the clauses of the SWIFT Framework w.r.t privileged access.
Swift Requirement
Addressing Requirement 1

Monitor every SWIFT privileged session

Capture comprehensive logs of all critical sessions in video format. Logs are stored in an encrypted format and provide auditable details accessible only to authorized personnel for improved governance.

Addressing Requirement 4.1

Automate Password Management

Manage and Inventorize privileged accounts across infrastructure. Leverage strong password change capabilities from discovery, onboarding to rotation for all vendor supplied default accounts.

Swift Requirement 4-1
Swift Requirement 4-2
Addressing Requirement 4.2

Enforce MFA authentication for admins

Add a second layer of authentication to SWIFT environment by configuring customizable MFA mechanisms including token-based or built-in app-based OTP.

Addressing Requirement 5.1

Enable need based access to resources

Configure access policy definitions based on user roles & functions. Define access to critical data and enforce restrictions on a need-to-know, need-to-access basis with strong workflow based access.

Swift Requirement 5-1
Swift Requirement 5-4
Addressing Requirement 5.4

Implement Password Management System

Leverage strong password change capabilities from discovery, onboarding to rotation for all privileged accounts in a secure, encrypted, tamper – proof storage.

Addressing Requirement 6.4

Leverage Risk based scoring & SIEM integration

Detect risky events events for administrator activities with risk based scoring & SIEM integration.

Swift Requirement 6-4
Addressing Requirement 1 Monitor every SWIFT privileged session

Capture comprehensive logs of all critical SWIFT sessions in video format. Logs are stored in an encrypted format and provide auditable details accessible only to authorized personnel for improved governance.

Swift Requirement 1
Addressing Requirement 4.1 Automate Password Management

Manage and Inventorize privileged accounts across infrastructure. Leverage strong password change capabilities from discovery, onboarding to rotation for all vendor supplied default accounts.

Swift Requirement 4.1
Addressing Requirement 4.2 Enforce MFA authentication for admins

Add a second layer of authentication to SWIFT environment by configuring customizable MFA mechanisms including token-based or built-in app-based OTP.

Swift Requirement 4.2
Addressing Requirement 5.1 Enable need based access to resources

Configure access policy definitions based on user roles & functions. Define access to critical data and enforce restrictions on a need-to-know, need-to-access basis with strong workflow based access.

Swift Requirementt5.1
Addressing Requirement 5.4 Implement Password Management System

Leverage strong password change capabilities from discovery, onboarding to rotation for all privileged accounts in a secure, encrypted, tamper – proof storage.

Swift Requirement 5.4
Addressing Requirement 6.4 Leverage Risk based scoring & SIEM integration

Detect risky events events for administrator activities with risk based scoring & SIEM integration.

Swift Requirement 6.4

Explore Platform

Gartner Peer Insights Logo

"Well rounded & integrated PAM suite with easy adaptability to support critical user access across AWS resources"

Read Review

Trusted by

Dhanlaxmi Bank Logo
Sidbi Logo
Agd Bank Logo

Next Steps

Explore use-cases aligned with your privileged access requirements

See It In Action

Contents

  • 1 Find out SWIFT requirements specific to privileged access
    • 1.1 Find out SWIFT requirements specific to privileged access
    • 1.2 Requirement 1
    • 1.3 Requirement 4.1
    • 1.4 Requirement 4.2
    • 1.5 Requirement 5.1
    • 1.6 Requirement 5.4
    • 1.7 Requirement 6.4
    • 1.8 Explore how Sectona helps you achieve compliance with SWIFT
    • 1.9 Monitor every SWIFT privileged session
    • 1.10 Automate Password Management
    • 1.11 Enforce MFA authentication for admins
    • 1.12 Enable need based access to resources
    • 1.13 Implement Password Management System
    • 1.14 Leverage Risk based scoring & SIEM integration
    • 1.15 Trusted by

Explore


  • About
  • Join the team
  • Careers We're Hiring
  • Contact Us
  • Security Platform
  • Partners
  • Documentation
  • Sectona Blog
  • Key ConceptsNew

Capabilities


  • Continuous Discovery
  • Password Management
  • Secure Remote Access
  • Session Recording and Threat Analytics
  • Mutli-Factor Authentication
  • Just-in-time Access
  • Privileged Task Management
  • Account Lifecycle Management

Solutions


  • Secure remote privileged access
  • Remove administrator rights
  • Secure cloud environments
  • Automate entitlement reviews
  • Simplify privileged account lifecyle
Sectona Gartner Peer Insights Rating Sectona ISO Certification
Sectona Logo
Facebook Twitter Linkedin

© 2022 Sectona Technologies Pvt Ltd. All Rights Reserved. All Trademarks held by their respective owners.

PRIVACY POLICY | TERMS | EULA | RESPONSIBLE DISCLOSURE

Scroll to top
  • Home
  • Platform
    • Continuous Discovery
    • Password Management
    • Secure Remote Access
    • Session Recording and Threat Analytics
    • Multi-Factor Authentication
    • Just In Time Access
    • Privileged Task Management
    • Account Lifecycle Management
    • Windows Privilege Management
    • Privileged Access Governance
  • Solutions
    • Secure remote privileged access
    • Remove Administrator Rights
    • Secure Cloud Environments
    • Automate Entitlement Reviews
    • Simplify Privileged Account lifecycle
    • PCI DSS Compliance Pertaining to Privileged Access
    • ISO 27002 Standard – Best Practices for PAM
    • SWIFT Security Framework For Privileged Access
  • Resources
    • Blog
    • Key Concepts
    • Resources
    • Knowledge Base
  • Services
    • Professional Services – Personalised Industry Based Solution
    • Training & Certifications – Gain Insight into Sectona Platform
  • Company
    • About Us
    • Contact Us
    • Branding
  • Partner
    • Find a Partner
    • Become a Sectona Partner
    • Register a Deal
  • Careers
    • Join the team
    • Explore Career Opportunities
  • Explore
    • Documentation
    • Downloads
    • Free Edition – Get Your Free Trial Today
    • Explore the Sectona Security Platform