Control Definition
Control Objective: Ensure the protection of the customer’s connectivity infrastructure from external environment and potentially compromised elements of the general IT environment.
In-scope components:
- Customer connector
- dedicated and general-purpose operator PCs
- jump server
Note: This control must be considered by Architecture types A1, A2 and A3 when a customer connector is also present outside of an existing SWIFT secure zone.
Risk Drivers:
- compromise of enterprise authentication system
- compromise of user credentials
- credential replay
- exposure to internet-based attacks
- unauthorised access
Implementation Guidance
Note: This is almost a copy of control 1.1 focusing on the customer connector and expected usual separation between operational (or production) environment and the wider or general IT environment.
Control Statement:
A separated secure zone safeguards the customer's infrastructure used for external connectivity from external environments and compromises or attacks on the broader enterprise environment.
Control Context:
Segmentation between the customer's connectivity infrastructure and its larger enterprise network reduces the attack surface and has shown to be an effective way to defend against cyber attacks that commonly involve compromise of the general enterprise IT environment. Effective segmentation will include network-level separation, access restrictions, and connectivity restrictions.
Implementation Guidelines:
The implementation guidelines are common methods to apply the relevant control. The guidelines are a helpful way to begin an assessment, but should never be considered as an "audit checklist" as each user’s implementation may vary. Therefore, in cases where some implementation guidelines elements are not present or partially covered, mitigations as well as particular environment specificities must be considered to properly assess the overall compliance adherence level (as per the suggested guidelines
or as per the alternatives).
a) Overall design goals for implementing environment separation
- Implement a secure zone (or restricted operational zone) to separate and protect the customer connectivity infrastructure from the compromise of systems and services located outside of the secure zone.
- To the fullest extent possible, passwords and other authenticators that are usable inside the secure zone (especially for privileged accounts) are not stored or used in systems outside of the secure zone. This does not apply to encrypted back-up files.
- If the authentication services system resides outside of the secure zone, then:
- Either the system is in another existing secure zone that has similar controls,
- or the system is only used to filter the connections to the customer’s connectivity infrastructure (controlling the accesses at the boundary of the secure zone). In such a case, logical access to the component is ensured by another authentication mechanism residing in the secure zone (by another IAM or is performed by the accessed component itself).
- The secure zone is appropriately scoped to each user's environment, including the potential reuse of existing secure zones (for example, a secure “production environment”, “back-office environment”, or “payment systems zone”) to include the connectivity infrastructure.
- The components within the secure zone are all protected to the same or an equivalent level of security and trust and those components may communicate freely within the zone. Primary purpose of a secure zone is to host SWIFT-related components but can also include non-SWIFT related systems which then also need to be adequately protected by applying controls applicable to the SWIFT-related components (see the CSP FAQ for the relevant controls).
b) Scope of the secure zone
- The secure zone contains, but is not limited to, all components of the connectivity infrastructure. This includes the Hardware Security Module (when relevant), the customer connector, the jump server (see details below), and any applicable operator PCs solely dedicated to the operation or administration of the connectivity infrastructure. As such:
- General-purpose operator PCs are not included in the secure zone.
- Dedicated operator PCs with "thick client" GUI software are located in the secure zone, or the software is installed on the jump server and accessed by the general- purpose operator PCs residing outside of the secure zone.
- Back-office systems are not necessarily included in the secure zone, but may be considered for inclusion depending on the chosen size and scope of the secure zone.
- Test systems are not considered in scope of the security controls as long as (i) they are fully separated from production or live environment (including separate HSMs, when used) and (ii) they are configured to only support test traffic (for example, by only using lite certificates on test only logical terminals). If the test systems are not fully separated or can be configured for live traffic, then users must take the test systems in scope and make sure that the same security controls are applied as for production or live systems. Development systems are not within the secure zone and are not connected to the SWIFT network.
- When used, the Alliance Connect SRX VPN boxes or the Alliance Connect Virtual VPN instances (hosting systems or machines) are in a secure environment with appropriate physical controls (aligned with control 3.1).
- The secure zone size and scope are defined in away that is most appropriate to the user's environment. Options may include, but are not limited to the following:
- A specific secure zone dedicated only for the connectivity infrastructure.
- An expansion of an existing secure area (for example, a secure “production environment” or “payment systems zone”) to include the connectivity infrastructure. The size and scope of this zone may vary significantly depending on the existing environment.
- Software, systems, and services within the secure zone are assessed for need and removed from the zone if not supporting the operations or security of the zone (for example, assess the need for e-mail access).
c) Protection of the secure zone
Boundary Protection
- Transport layer stateful firewalls are used to create logical separations at the boundary of the secure zone.
- Transport layer firewalls creating the secure zone boundary should be physically or virtually dedicated to the protection of the secure zone. If a firewall is shared to separate other zones, then care must be taken for the firewall management to make sure that compromises of the firewall do not affect the protection of the secure zone.
- Access control lists (ACLs) and application firewalls may be used to provide additional protection for the secure zone, but are not sufficient alone.
- Layer 2 devices (data link layer, such as switches) may be shared between the secure zone and other uses (VLAN separation).
- Administrative access to networking devices is protected using either an out-of-band network or through controlled in-band access (for example, a management VLAN). Administrative access to the firewalls that protect the secure zone does not rely on the enterprise user authentication system, but a system located within an existing secure zone that has similar controls.
- Inbound and outbound connectivity for the secure zone is limited to the fullest extent possible. A process is implemented to analyse, review, and enforce the firewall rules governing the connectivity.
- No "allow any" firewall rules are implemented, and network flows are explicitly authorised (allow listing approach). To achieve this, a general enterprise server might initially be used to filter legitimate connectivity access towards the secure zone without losing traceability of such connections.
- Generally, connectivity crossing the secure zone boundary is restricted to bi-directional communications with back-office applications and MV-SIPN20, inbound communications from approved general-purpose operator PCs to the jump server, and outbound administration data (data logging, back-ups).
- Firewall rules are reviewed annually, at least.
- Connections through the boundary firewalls are logged