Understanding the 2025 SWIFT CSP Framework: Stabilization and Strategic Evolution

The SWIFT Customer Security Programme (CSP), introduced in 2016, continues to evolve in response to the increasing sophistication of cyber threats targeting the global financial community. The 2025 SWIFT CSP version of the Customer Security Controls Framework (CSCF) marks a strategic stabilization phase, aiming to consolidate past progress while laying the groundwork for future security expectations. This article outlines key changes, their impact on customers, and strategic context for effective compliance and forward planning.


Key Changes in CSCF v2025

1. Stabilization: No New Mandatory Controls

The 2025 SWIFT CSP update introduces no new mandatory controls. Swift has deliberately chosen to stabilize the framework after several years of increasing security requirements. All changes in v2025 are either clarifications, scope adjustments, or preparatory advisories for future mandatory expectations​CSCF_v2025_20240701.


2. Control 2.4A: Back Office Data Flow Security

While still advisory in 2025, Control 2.4A continues its phased journey to becoming mandatory by 2026. New milestones have been introduced:

  • 2026: Bridging servers between secure zones and back-office systems must be protected.
  • 2026: New direct flows must adopt security-by-design principles.
  • 2028 (tentative): Legacy flows will also require protection.

3. Expanded Scope: Customer Client Connectors

CSCF v2025 introduces a new advisory in-scope component: the “customer client connector,” which includes endpoints like API consumers, middleware, or file transfer clients. These will become mandatory in CSCF v2026.


4. Clarified Definitions and Scope Enhancements

Several terms and scope conditions have been revised to improve clarity, such as:

  • “Swift connectivity providers” now includes Business Connect and L2BA.
  • Enhanced visualizations for the scope of controls, especially relevant with the rise of API usage.
  • Expanded guidance on pre-validation and value-added services and their potential to be de-scoped under strict risk assessment​CSCF_v2025_20240701.

5. Enhanced Implementation Guidance Across Controls

Notable updates include:

  • Clarified co-hosting rules for environment protection controls (1.1, 1.5).
  • Virtual desktops now referenced in virtualization protection (1.3) for Architecture B.
  • Reinforced that flows (e.g., in 2.1, 2.4, 2.6) may span on-prem and cloud environments.
  • Control 2.7 (Vulnerability Scanning) reminds users to address OS and application-level vulnerabilities.
  • Updated cloud responsibility visuals in Appendix G​CSCF_v2025_20240701.

Strategic Context and Considerations

Industry Collaboration

The CSCF Working Group continues to integrate feedback from over 30 National Member Groups (NMGs), reflecting a collaborative and global approach to cybersecurity governance​CSCF_v2025_20240701.

Integration with Broader Security Governance

SWIFT encourages users to embed CSP controls into their enterprise-wide cyber risk governance and align them with standards like NIST, ISO 27002, PCI-DSS, SOC2, and UCF. Mapping guidance is provided in Appendix E​CSCF_v2025_20240701.

Attestation Timeline

Organizations must attest compliance against CSCF v2025 between July and December 2025 using the KYC Security Attestation (KYC-SA) platform​CSCF_v2025_20240701.


Recommendations for Customers

  • Start Early on 2.4A: Conduct a gap analysis and begin hardening bridging servers and flow channels.
  • Prepare for Scope Expansion: Identify and assess all customer client connectors in your architecture.
  • Audit Current Compliance: Ensure full implementation of existing mandatory controls with an eye on co-hosting and virtual environments.
  • Engage with Swift Resources: Review the CSCF Knowledge Centre, FAQs, and updated visual diagrams.
  • Plan for 2026 and Beyond: Align budgeting and IT project plans with the 2026 and 2028 anticipated changes.

Please contact us at for a free consultation.

Leave a Reply

Your email address will not be published. Required fields are marked *