Story image

Securing SWIFT networks vitally important for cyber attack prevention

11 May 18

Businesses that use the SWIFT network must comply with SWIFT’s Customer Security Programme (CSP) or face the risk of attacks.

Those attacks, which can cost both organisations and their customers money, can be prevented with a strong security posture and absolute visibility, says ForeScout. The company believes that visibility should be non-negotiable.

ForeScout CMO Steve Redman explains that SWIFT is a banking communications platform that manages most financial transfers between banks and organisations.

“The number and severity of cyber attacks targeting SWIFT networks is growing. However, attacks happen entirely through the customer enterprise, as opposed to the infrastructure that SWIFT owns and operates, putting the onus for security squarely on banks and businesses,” he says.

The SWIFT Customer Security Programme (CSP) is designed to drive security improvement and transparency for the world’s financial community, and also to help customers prevent cyber fraud.

“SWIFT hacks happen when cybercriminals get in between the customer’s network and the SWIFT network. There, they can change or reroute messages and even currency, making a successful SWIFT hack highly lucrative for cybercriminals,” Redman continues.

“It is therefore absolutely critical to gain 100 per cent visibility into all SWIFT components. 99.999999%  isn’t good enough. From clients and servers to gateway devices and network fabric, no part of the network should remain invisible. Many of these devices can’t or shouldn’t run agents but that shouldn’t prevent customers from gaining visibility into them. They simply need to run an agentless solution to get that visibility. Anything left unseen is a potential attack vector.”

ForeScout says the CSP provides a common set of security standards and requirements, not just a technology solution. It includes three key objectives: secure the environment; know and limit access; and detect and respond to threats. 

There are also eight principles that govern the CSP:

1.  Restrict internet access
2.  Protect critical systems from the general IT environment
3.  Reduce attack surface and vulnerabilities. 
4.  Physically secure the environment
5.  Prevent compromise of credentials
6.  Manage identities and segregate privileges
7.  Detect anomalous activity
8.  Plan for incident response and information sharing

“It’s also essential to understand the context and severity of risks and potential consequences so the customer can take intelligent action to mitigate that risk. Customers need to be able to control how risks are dealt with so the entire system doesn’t come to a stop just because someone forgot their password, for example,” Redman says.

“There is no silver bullet to prevent SWIFT attacks but organisations can make themselves very unattractive targets by hardening their security and gaining that complete visibility,” he concludes.

Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).