SWIFT Security Policy

are you ready for it?

We help banks identify security gaps, mitigate risks and comply with SWIFT’s new regulation

Facts

  • All banks will need to check their level of compliance with the new policy and report compliance to SWIFT by end of 2017
  • The new policy includes 27 topics, out of which 18 are mandatory
  • The quality of standing the policy by each bank will be published in public

Implications

  • Standardization of banking security controls, including reporting, monitoring and compliance
  • Public exposure for bank’s security controls
  • Short timeframe for assessment and implementation

Bangladesh’s lesson is clear: your threat is already inside!

Enhance your environment security

Implement detection and monitoring tools

Allow recovery actions

STP house helps your bank to comply with SWIFT regulation and perform fast and effective risk assessment

STP house Message$hield - Anti hacking tool

We help banks to adopt most efficient measures and safeguard their environment!
We introduce a robust, lean and effective protection layer for your SWIFT traffic. Our solution prevents hackers from sending messages via SWIFT interface “under the radar” or changing the content of legitimate messages generated by the back-office throughout its flow.

SWIFT Security Audit

Q1 2017
Internal Assessment:
Internal report workplan
Q4 2017
Internal Audit:
Reporting results to SWIFT
2018
External Audit:
Reporting becomes public
(for some of the banks)

Suggested Process

Define needed checks
Mapping existing situation
Identify gaps and solutions
Build a workplan
Execute workplan

STP house works with SWIFT over many different projects worldwide.
We have specific expertise in integration, process analysis and streamlining back office systems with SWIFT.
We prepared a structured analysis process, templates and questionnaire to assure short and effective mapping process, considering the new security policy requirements.
This process must be done with the customer’s team and security experts.

What does it mean

0
Kick Off meeting to define participants and resources
0
Executing security audit based on a template questionnaire
0
Collecting data and answers from subject matter experts in the bank
0
Preparing summary document: DMZ diagram, business processes, technical processes, gaps and recommendations

Contact Us For More Details

Contact Us for more details