{"id":33395,"date":"2023-10-05T07:06:13","date_gmt":"2023-10-05T14:06:13","guid":{"rendered":"https:\/\/www.syteca.com\/?page_id=33395"},"modified":"2024-10-17T04:48:55","modified_gmt":"2024-10-17T11:48:55","slug":"swift-customer-security-program-compliance","status":"publish","type":"page","link":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance","title":{"rendered":"SWIFT Customer Security Program (CSP) Compliance Solution"},"content":{"rendered":"\n\t\t<div  class=\"block-f5079566-0004-4154-8340-b273d4980858 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-33f1a298-a759-4ec5-8657-c6a2fbeb87af areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-06767dc3-5c8a-4746-b379-df642c4be14b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9f4e21aa-6e40-4237-aa04-d082b77c2ced col areoi-element d-flex flex-column align-items-center d-md-block align-self-center\">\n\t\t\t\n\t\t\t\n\n<h1 class=\"wp-block-heading has-text-align-center mb-4\">SWIFT Customer Security Programme (CSP) Compliance Solutions<\/h1>\n\n\n\n<p class=\"has-text-align-center p-poppins mb-0 main-screen-description\">Monitor insider activity. Detect anomalies. Respond to incidents. <strong>ALL-IN-ONE<\/strong><\/p>\n\n\n\n\t\t<div  class=\"block-fe2ab81d-5e8a-4366-b436-dd1bcb368f76 areoi-element  d-flex flex-column flex-md-row align-items-center justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-23bf6d8e-b086-4039-a88c-8bd6fef74945 btn areoi-has-url position-relative me-lg-2  me-md-2 me-sm-2 me-lg-4 mb-3 hsBtn-demo btn-info  btn-info\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-73ce0ee1-77c0-4e3c-a888-abf319b5a509 btn areoi-has-url position-relative  mb-3 btn-outline-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9428c056-03eb-4d36-99db-c13c1a448840 areoi-element lets-talk overflow-hidden\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a28b1584-40e1-447d-842c-3213af0a030d areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-fe2f94de-d77e-4a85-872a-133e4836a42b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9ff6eab0-043c-4896-b816-f84dd8e9b484 col areoi-element align-self-center align-self-md-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"pe-xxl-5 p-poppins text-18-15\" style=\"font-style:normal;font-weight:500\">The SWIFT Customer Security Programme (CSP) aims to enhance the security of interactions within the SWIFT network and protect financial entities against cyber threats and fraud.<\/p>\n\n\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:500\">Meeting SWIFT CSP requirements can help your organization improve overall cybersecurity resilience, avoid fines and penalties, and emphasize reliability to customers.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b650c22d-713d-4da8-9125-a24caedd1f2e col areoi-element align-self-lg-center d-none d-sm-none d-md-none d-lg-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full text-xxl-end\"><img decoding=\"async\" width=\"816\" height=\"450\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/02234217\/pic.png\" alt=\"\" class=\"wp-image-33400\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/02234217\/pic.png 816w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/02234217\/pic-300x165.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/02234217\/pic-768x424.png 768w\" sizes=\"(max-width: 816px) 100vw, 816px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-73604c08-c68c-4d85-b703-d2a364c95f34 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e9f05c8-53c2-4be3-8262-251f9fb05728 areoi-element container rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-528d5488-0692-4b46-9511-30b1e05423d6 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c12185e5-9a7b-464e-8fd7-6bb7ad4d0aae col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading text-center text-xl-start mb-5 mb-xl-0 has-white-color has-text-color\">Benefits of using Syteca for SWIFT CSP compliance<\/h2>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4ccb3351-28d2-47d5-86f8-f8a4ef551bfd col areoi-element d-flex flex-wrap col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bf2d269d-fd0e-4107-a451-2a0541a483e7 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Enhance organizational security<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0c96961-4794-4587-8e06-d1f7abf207ff areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Detect insider threats<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d8b09e86-fa2e-48f8-b795-df3db13ac973 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Avoid fines and lawsuits<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-40018c16-879d-4abc-87c7-64e5f49e290f col areoi-element d-flex flex-wrap col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bf2d269d-fd0e-4107-a451-2a0541a483e7 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Secure access to financial data<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0c96961-4794-4587-8e06-d1f7abf207ff areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Prevent data breaches<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d8b09e86-fa2e-48f8-b795-df3db13ac973 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Promptly respond to incidents<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-60dbec61-9165-4e8e-b118-08454567a119 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-4\">Who does SWIFT CSP apply to?<\/h2>\n\n\n\n<p class=\"has-text-align-center p-poppins text-18-15 mb-0\">SWIFT CSP applies to financial institutions and organizations that use SWIFT services<br> for financial messaging and transactions:<\/p>\n\n\n\n\t\t<div  class=\"block-b31cd6e9-37a5-4996-a646-36ed1b26e2d1 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-03c7ad3c-a30b-4234-9762-c6730c7d3589 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-2cca471f-cb6f-4a9b-99b6-ededf44b3c57 col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d1a2105-7135-419f-8c4b-cb3ee9377e4d areoi-element rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Banks<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e076ac32-de53-467d-8bdd-f7ddaa2a00f4 col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d9b6eccc-bef6-4a4f-8a3e-5dc1b11508fa areoi-element rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Credit unions<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2cca471f-cb6f-4a9b-99b6-ededf44b3c57 col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d1a2105-7135-419f-8c4b-cb3ee9377e4d areoi-element rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Securities firms<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-dc4c826b-afd7-4a64-9b97-cdbea2a94b2b col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-05bd371b-70ff-4f91-b287-10eec469f289 areoi-element rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Corporate treasuries<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2cca471f-cb6f-4a9b-99b6-ededf44b3c57 col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d1a2105-7135-419f-8c4b-cb3ee9377e4d areoi-element rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Payment processors<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-82078351-f946-4601-b7dc-eff7aa30a448 col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ff76ff06-a039-4122-99d9-d285f2ce3f08 areoi-element rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Financial service providers<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-001592f9-afd0-49f4-bf13-fefa0a5e3ee6 areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-4\">Key objectives of SWIFT CSP<\/h2>\n\n\n\n\t\t<div  class=\"block-aee70489-2d24-4383-8a5b-7aa26b4591fd areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center with-link p-poppins text-18-15 mb-0\">SWIFT CSP incorporates the <a href=\"https:\/\/www.swift.com\/myswift\/customer-security-programme-csp\/security-controls\" target=\"_blank\" rel=\"noreferrer noopener\">Customer Security Controls Framework<\/a> (CSCF) that defines the security controls and guidelines financial institutions need to implement to secure their SWIFT-related operations. SWIFT CSCF translates 24 mandatory and 8 advisory security controls into the following objectives:<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div id=\"accordion-md\" class=\"block-e9d7a47f-6f76-4bcc-a5e4-848debd9c5b1 accordion\">\n\t\t\t\n\n\t\t<div  class=\"block-2192daca-63c4-432d-8e82-f7972ecacb29 accordion-item accordion-item-01 d-lg-flex mb-4 align-items-center\">\n\n\t\t\t<p \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-2192daca-63c4-432d-8e82-f7972ecacb29-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-2192daca-63c4-432d-8e82-f7972ecacb29-collapse\" \n\t\t\t\t\taria-expanded=\"true\" \n\t\t\t\t\taria-controls=\"block-2192daca-63c4-432d-8e82-f7972ecacb29-collapse\"\n\t\t\t\t>\n\t\t\t\t\tSecure your environment\n\t\t\t\t<\/button>\n\t\t\t<\/p>\n\n\t\t\t<div \n\t\t\t\tid=\"block-2192daca-63c4-432d-8e82-f7972ecacb29-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse show\" \n\t\t\t\taria-labelledby=\"block-2192daca-63c4-432d-8e82-f7972ecacb29-header\"\n\t\t\t\tdata-bs-parent=\".block-e9d7a47f-6f76-4bcc-a5e4-848debd9c5b1\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<ol class=\"wp-block-list ps-lg-5\">\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\"> Restrict internet access and protect critical systems from general IT environment<\/li>\n\n\n\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Reduce attack surface and vulnerabilities<\/li>\n\n\n\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Physically secure the environment<\/li>\n<\/ol>\n\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f51b0adf-8944-4e80-840b-50af1455f830 accordion-item accordion-item-02 d-lg-flex mb-4 align-items-center\">\n\n\t\t\t<p \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-f51b0adf-8944-4e80-840b-50af1455f830-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-f51b0adf-8944-4e80-840b-50af1455f830-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-f51b0adf-8944-4e80-840b-50af1455f830-collapse\"\n\t\t\t\t>\n\t\t\t\t\tKnow and limit access\n\t\t\t\t<\/button>\n\t\t\t<\/p>\n\n\t\t\t<div \n\t\t\t\tid=\"block-f51b0adf-8944-4e80-840b-50af1455f830-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-f51b0adf-8944-4e80-840b-50af1455f830-header\"\n\t\t\t\tdata-bs-parent=\".block-e9d7a47f-6f76-4bcc-a5e4-848debd9c5b1\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<ol start=\"4\" class=\"wp-block-list ps-lg-3 ps-xl-5\">\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Prevent compromise of credentials<\/li>\n\n\n\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Manage identities and separate privileges<\/li>\n<\/ol>\n\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d938bf14-1e8c-4664-b1c1-7700e72d04fe accordion-item accordion-item-03 d-lg-flex align-items-center\">\n\n\t\t\t<p \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-d938bf14-1e8c-4664-b1c1-7700e72d04fe-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-d938bf14-1e8c-4664-b1c1-7700e72d04fe-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-d938bf14-1e8c-4664-b1c1-7700e72d04fe-collapse\"\n\t\t\t\t>\n\t\t\t\t\tDetect and respond\n\t\t\t\t<\/button>\n\t\t\t<\/p>\n\n\t\t\t<div \n\t\t\t\tid=\"block-d938bf14-1e8c-4664-b1c1-7700e72d04fe-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-d938bf14-1e8c-4664-b1c1-7700e72d04fe-header\"\n\t\t\t\tdata-bs-parent=\".block-e9d7a47f-6f76-4bcc-a5e4-848debd9c5b1\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<ol start=\"6\" class=\"wp-block-list ps-lg-5 ms-lg-4 ms-xl-0\">\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Detect anomalous activity to systems or transaction records<\/li>\n\n\n\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Plan for incident response and information sharing<\/li>\n<\/ol>\n\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-21338989-959a-4c56-b8f7-806f5afd5e73 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-47d75ce5-bdca-4ec5-afa1-a0d7e142239b areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-4\">Comply with SWIFT CSP using Syteca<\/h2>\n\n\n\n<p class=\"has-text-align-center p-poppins text-18-15 mb-4 pb-3\">Syteca is a universal insider risk management platform designed to deter, detect, and disrupt human-related threats in your IT environment. Ensure secure SWIFT infrastructure management, meet most SWIFT CSP requirements, and protect your organization\u2019s sensitive assets by deploying Syteca. Here\u2019s how:<\/p>\n\n\n\n<hr class=\"wp-block-separator aligncenter has-text-color has-alpha-channel-opacity has-background mb-4 mb-lg-5 is-style-default\" style=\"background-color:#1a3b4e;color:#1a3b4e\"\/>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center mb-5\">Detailed mapping of SWIFT CSP security controls to Syteca features<\/h3>\n\n\n\n\t\t<div id=\"swift-tabs\" class=\"block-39f7a67f-3dac-450d-a92a-d8798e433371 areoi-tabs\">\n\t\t\t\n\n\t\t<nav role=\"tablist\" id=\"nav-tab\" class=\"block-91bb0fda-3cc2-4630-b58c-5d491ce3c236 nav d-none d-md-flex flex-column flex-md-row nav-tabs\">\n\t\t\t\n\n\t\t<a aria-controls=\"nav-1\" aria-selected=\"true\" data-bs-target=\"#nav-1\" data-bs-toggle=\"tab\" id=\"nav-tab-1\" class=\"block-7ef8df5f-7d59-4767-a83f-f12b7a4d6498 nav-link nav-link active p-poppins active\">\n\t\t\tSecure your environment\n\t\t<\/a>\n\t\n\n\n\t\t<a aria-controls=\"nav-2\" aria-selected=\"false\" data-bs-target=\"#nav-2\" data-bs-toggle=\"tab\" id=\"nav-tab-2\" class=\"block-744ceb98-2493-48e7-9f60-c9d58d2562ef nav-link nav-link p-poppins\">\n\t\t\tKnow and limit access\n\t\t<\/a>\n\t\n\n\n\t\t<a aria-controls=\"nav-3\" aria-selected=\"false\" data-bs-target=\"#nav-3\" data-bs-toggle=\"tab\" id=\"nav-tab-3\" class=\"block-26df6350-bc54-41d6-b070-7049418d231a nav-link nav-link p-poppins\">\n\t\t\tDetect and respond\n\t\t<\/a>\n\t\n \n\t\t<\/nav>\n\t\n\n\n\t\t<div id=\"nav-tabContent\" class=\"block-7269bd6d-b05d-44aa-b349-d6dce6a4bc7a areoi-element tab-content  mt-md-4 pt-md-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div id=\"accordionSwift\" class=\"block-c6b2dd08-8de6-41e8-859b-ebd186cbae89 areoi-element accordion\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ff5f31e8-6c62-47cf-b887-328de6ec5055 areoi-element accordion-item d-flex flex-wrap justify-content-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"d-md-none rounded-0 accordion-button min-vw-100 nav-link-mobile p-poppins mb-0 has-text-color has-background\" id=\"headingOne\" style=\"color:#ffffff;background-color:#4790ea;font-size:1.25rem\" aria-controls=\"collapseOne\" aria-expanded=\"true\" data-bs-target=\"#collapseOne\" data-bs-toggle=\"collapse\">Know and limit access<\/p>\n\n\n\n\t\t<div aria-labelledby=\"headingOne\" data-bs-parent=\"#accordionSwift\" id=\"collapseOne\" class=\"block-e86ab46d-8942-40e4-829c-23acdd73fdde areoi-element accordion-collapse collapse show\">\n\t\t\t\n\t\t\t\n\n\t\t<div aria-labelledby=\"nav-tab-1\" role=\"tabpanel\" id=\"nav-1\" class=\"block-488ad73a-43e1-4ac2-8da8-bf42793d8e14 areoi-element tab-pane fade show active accordion-body px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f2f26b48-ae81-42d3-af51-fb8c946853f1 areoi-element table-block-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0eba2475-4e8f-452d-bf68-302be348dfa1 areoi-element d-none d-md-flex header-cells flex-column flex-md-row justify-content-between\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0830f57d-4dfc-484f-afe0-1365e1c3862c areoi-element d-inline col-left\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#1a3b4e;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b9538d78-91a7-4761-9728-10fec4078e1e areoi-element d-inline col-right\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#5059ab;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">1.1&nbsp;<\/mark>   SWIFT environment protection<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Ensure protection of the user\u2019s SWIFT infrastructure from potentially compromised elements of the general IT environment and external environment.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Protect the SWIFT secure zone by setting up a jump server and providing access to it only to trusted administrators (see <a href=\"#architecture-type-a\">Architecture type A<\/a>).<\/li>\n\n\n\n<li class=\"with-link mb-3\">Ensure visibility and detect cybersecurity risks in your secure zone with <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">continuous user activity monitoring<\/a>.<\/li>\n\n\n\n<li class=\"with-link\">Granularly <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">manage user access<\/a>, <a href=\"\/en\/solutions\/privileged-user-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">monitor privileged user activity<\/a>, and <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">respond to threats<\/a> inside your SWIFT environment.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">1.2&nbsp;<\/mark>   Operating system privileged account control<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Restrict and control the allocation and use of administrator-level operating system accounts.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Use Syteca\u2019s <a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">secondary authentication<\/a> feature to identify and provide access to users of shared accounts, such as built-in admin accounts.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Avoid use of built-in accounts by providing privileged users with <a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">temporary access permissions<\/a> and logins with mandatory <a href=\"https:\/\/docs.syteca.com\/view\/administrator-approval-on-login\" target=\"_blank\" rel=\"noreferrer noopener\">manual approval from a security officer<\/a>.<\/li>\n\n\n\n<li class=\"with-link\"><a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Monitor user activity<\/a> within the secure zone to control all administrator-level activity, including sudo commands and executed scripts.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">1.3&nbsp;<\/mark>   Virtualization or cloud platform protection<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Secure virtualization or cloud platform and virtual machines (VMs) that host SWIFT-related components at the same level as physical systems.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Secure SWIFT-related components hosted on a virtual platform by deploying Syteca, which supports <a href=\"\/en\/product\/supported-platforms\/vdi-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">VMware Horizon<\/a>, <a href=\"\/en\/product\/supported-platforms\/vdi-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Hyper-V<\/a>, <a href=\"\/en\/product\/supported-platforms\/citrix-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Citrix<\/a>, <a href=\"\/en\/product\/supported-platforms\/amazon-workspaces-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Amazon WorkSpaces<\/a>, <a href=\"\/en\/product\/deployment\/aws\" target=\"_blank\" rel=\"noreferrer noopener\">AWS (Amazon Web Services)<\/a>, and <a href=\"\/en\/product\/supported-platforms\/windows-virtual-desktop-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Windows Virtual Desktops<\/a>.<\/li>\n\n\n\n<li class=\"with-link\">Simplify the deployment of Syteca in your virtual environment by integrating it into the VM\u2019s golden image and configuring flexible floating licensing.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">1.4&nbsp;<\/mark>   Restriction of internet access<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Control\/protect internet access from operator PCs and systems within the secure zone.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Use Syteca\u2019s <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">PAM module<\/a> to configure access to resources via a jump server that has no internet access.<\/li>\n\n\n\n<li class=\"with-link\">Leverage Syteca Connection Manager to replace the Windows Shell so that users won\u2019t be able to access the internet.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">1.5&nbsp;<\/mark>   Customer environment protection<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Ensure the protection of the customer\u2019s connectivity infrastructure from an external environment and potentially compromised elements of the general IT environment.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link\">Protect the customer environment by providing user access with the help of Syteca Connection Manager.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">2.1&nbsp;<\/mark>   Internal data flow security<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Ensure the confidentiality, integrity, and authenticity of application data flows between a user\u2019s SWIFT-related components.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Oversee data interactions and detect signs of potential data mishandling by <a href=\"\/en\/product\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">monitoring and recording user activity<\/a> in your IT environment.<\/li>\n\n\n\n<li class=\"with-link\">Reduce the risk of unauthorized access and data manipulation by implementing Syteca\u2019s strong <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">access controls and authentication mechanisms<\/a>.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">2.6&nbsp;<\/mark>   Operator session confidentiality and integrity<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Protect the confidentiality and integrity of interactive operator sessions connecting to SWIFT infrastructure.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Capture user activity inside operator sessions while ensuring complete confidentiality of personally identifiable information with <a href=\"\/en\/user-privacy\" target=\"_blank\" rel=\"noreferrer noopener\">monitored data anonymization<\/a>.<\/li>\n\n\n\n<li class=\"with-link\">Safeguard session data from unauthorized access or manipulation with Syteca\u2019s <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">access management<\/a> capabilities, encryption, and tamper-proof audit trails.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">2.8&nbsp;<\/mark>   Outsourced critical activity protection<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Ensure the protection of local SWIFT infrastructure from risks related to outsourcing of critical activities.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">Grant secure third-party access<\/a> inside the secure zone without revealing credentials.&nbsp;<\/li>\n\n\n\n<li class=\"with-link mb-3\">Provide third parties with <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">one-time passwords<\/a> and limit their user session time in your IT infrastructure.<\/li>\n\n\n\n<li class=\"with-link\">Set up mandatory manual login approval from a security officer with subsequent real-time <a href=\"\/en\/solutions\/third-party-vendor-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">video supervision of third-party activity<\/a>.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">2.9&nbsp;<\/mark>   Transaction business controls<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Ensure outbound transaction activity within the expected bounds of normal business.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Leverage <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">user activity monitoring<\/a> and <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">access management<\/a> to limit user access to specific parts of the system, ensuring that only authorized individuals can conduct business with approved entities.<\/li>\n\n\n\n<li class=\"with-link\">Detect deviations from established policies with Syteca\u2019s <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">alert and incident response<\/a> functionality.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c1d49766-8c58-401f-bd20-7d5d00947619 areoi-element accordion-item d-flex flex-wrap justify-content-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"d-md-none rounded-0 accordion-button min-vw-100 nav-link-mobile p-poppins mb-0 has-text-color has-background\" id=\"headingTwo\" style=\"color:#ffffff;background-color:#4790ea;font-size:1.25rem\" aria-controls=\"collapseTwo\" aria-expanded=\"true\" data-bs-target=\"#collapseTwo\" data-bs-toggle=\"collapse\">Know and limit access<\/p>\n\n\n\n\t\t<div aria-labelledby=\"headingTwo\" data-bs-parent=\"#accordionSwift\" id=\"collapseTwo\" class=\"block-320f73ef-6ec4-42e1-ab59-da458afc19cc areoi-element accordion-collapse collapse\">\n\t\t\t\n\t\t\t\n\n\t\t<div aria-labelledby=\"nav-tab-2\" role=\"tabpanel\" id=\"nav-2\" class=\"block-267e7042-5b86-4665-b772-3a2018c82475 areoi-element tab-pane accordion-body px-0 fade\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6fd1373c-03d5-4dce-bcf7-11fdfcb1e07d areoi-element table-block-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-44925e8f-53ac-40ca-b80c-9e61d8ce9a00 areoi-element d-none d-md-flex header-cells flex-column flex-md-row justify-content-between\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0830f57d-4dfc-484f-afe0-1365e1c3862c areoi-element d-inline col-left\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#1a3b4e;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b9538d78-91a7-4761-9728-10fec4078e1e areoi-element d-inline col-right\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#5059ab;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-14f448de-0cdc-42c1-8a24-6b72e89890c6 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">4.2&nbsp;<\/mark>   Multi-factor authentication<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Prevent compromise of a single authentication factor allowing access to SWIFT systems by implementing multi-factor authentication.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link\">Secure user accounts by verifying user identities with Syteca\u2019s <a href=\"\/en\/two-factor-authentication-tool\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication (2FA)<\/a> feature.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bb97746e-3284-4b51-8a69-5495858042da areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.1&nbsp;<\/mark>   Logical access control<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Enforce security principles of need-to-know access, least privilege, and segregation of duties for operator accounts.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Enforce the principle of least privilege and segregation of duties by leveraging Syteca\u2019s <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">privileged access management (PAM)<\/a> capabilities.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Use Syteca\u2019s <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">password management<\/a> features to provide users with one-time access, limit their session time, and automate credential provisioning.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Set up a request and approval workflow to granularly manage access permissions.<\/li>\n\n\n\n<li class=\"with-link\">Integrate Syteca with your ticketing system to provide purpose-based access.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ec1fc205-5ae5-4903-9fd6-e8ae7fe48384 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.1&nbsp;<\/mark>   Password repository protection<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Physically and logically protect the repository of recorded passwords.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Secure your passwords by storing them in Syteca\u2019s encrypted password vault.<\/li>\n\n\n\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">Authenticate users<\/a> without revealing credentials to them.<\/li>\n\n\n\n<li class=\"with-link\">Rotate account credentials automatically without users\u2019 involvement.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ff5f31e8-6c62-47cf-b887-328de6ec5055 areoi-element accordion-item d-flex flex-wrap justify-content-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"rounded-0 d-md-none accordion-button min-vw-100 nav-link-mobile p-poppins mb-0 has-text-color has-background\" id=\"headingThree\" style=\"color:#ffffff;background-color:#4790ea;font-size:1.25rem\" aria-controls=\"collapseThree\" aria-expanded=\"true\" data-bs-target=\"#collapseThree\" data-bs-toggle=\"collapse\">Detect and respond<\/p>\n\n\n\n\t\t<div aria-labelledby=\"headingThree\" data-bs-parent=\"#accordionSwift\" id=\"collapseThree\" class=\"block-e86ab46d-8942-40e4-829c-23acdd73fdde areoi-element accordion-collapse collapse\">\n\t\t\t\n\t\t\t\n\n\t\t<div aria-labelledby=\"nav-tab-3\" role=\"tabpanel\" id=\"nav-3\" class=\"block-6bcbfd6f-7f04-42f0-9fcc-1a55a35dbd16 areoi-element tab-pane accordion-body px-0 fade\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f2f26b48-ae81-42d3-af51-fb8c946853f1 areoi-element table-block-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0eba2475-4e8f-452d-bf68-302be348dfa1 areoi-element d-none d-md-flex header-cells flex-column flex-md-row justify-content-between\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0830f57d-4dfc-484f-afe0-1365e1c3862c areoi-element d-inline col-left\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#1a3b4e;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b9538d78-91a7-4761-9728-10fec4078e1e areoi-element d-inline col-right\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#5059ab;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">6.4&nbsp;<\/mark>   Logging and monitoring<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Record security events and detect anomalous actions and operations within the local SWIFT environment.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Monitor user activity<\/a> and watch live and recorded user sessions inside your local SWIFT environment.<\/li>\n\n\n\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">Log user sessions<\/a> in a searchable screenshot format indexed with multilayer metadata, including names of launched applications, visited URLs, entered commands, and typed keystrokes.<\/li>\n\n\n\n<li class=\"with-link\">Collect encrypted logs of all changes in Syteca configurations to increase accountability of your system administrators.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">6.5A&nbsp;<\/mark>   Intrusion detection<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#10ce9e;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">ADVISORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Detect and contain anomalous network activity within the on-premises or remote SWIFT environment.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Get real-time notifications on security events with the help of Syteca\u2019s customizable <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">user activity alerts<\/a>.<\/li>\n\n\n\n<li class=\"with-link\">Leverage Syteca\u2019s AI-powered user and entity behavior analytics (UEBA) module to automatically detect anomalous user behavior such as logging into the system outside of work hours.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">7.1&nbsp;<\/mark>   Cyber incident response planning<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Ensure a consistent and effective approach to managing cyber incidents.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">Ensure a prompt response<\/a> to detected threats and security incidents by blocking users, restricting forbidden USB devices, and killing suspicious processes.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Gather all security-related information in one place by integrating Syteca with your SIEM and ticketing system.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Streamline your incident management with Syteca\u2019s <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">reporting<\/a> and <a href=\"\/en\/solutions\/investigate-security-incidents\" target=\"_blank\" rel=\"noreferrer noopener\">incident investigation<\/a> capabilities.<\/li>\n\n\n\n<li class=\"with-link\">Export user sessions in a protected format for forensic examination purposes.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">7.2&nbsp;<\/mark>   Security training and awareness<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">MANDATORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Ensure all staff are aware of and fulfill their security responsibilities by performing regular security training and awareness activities.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Support your security training by <a href=\"\/en\/product\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">demonstrating data collected by Syteca<\/a> in the form of educational videos.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Help users develop good cybersecurity habits by displaying warning notifications in response to forbidden actions.<\/li>\n\n\n\n<li class=\"with-link\">Oversee how your employees have learned training materials by <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">monitoring their behavior<\/a>.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">7.4A&nbsp;<\/mark>   Scenario-based risk assessment<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#10ce9e;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">ADVISORY<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Evaluate the organization\u2019s risk and readiness based on plausible cyber attack scenarios.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link\"><a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">Conduct security audits<\/a> to assess the effectiveness of your organization\u2019s security measures against different cyber attack scenarios and identify potential vulnerabilities.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-05dd2942-bd64-460c-ae94-eca3036eaaef areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-0 pb-5\">Deployment schemes<\/h2>\n\n\n\n\t\t<div  class=\"block-4f1e058b-3cc9-481b-988c-cbd3014496b1 areoi-element container marked-container marked-container-green mt-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-88ccc4a9-1ad9-43a8-a437-b9f326810121 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-19626473-12af-4ebb-9cf9-73e37592a4f9 col areoi-element col-12\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading mb-3 mb-md-4 h3-marked\" id=\"architecture-type-a\">Architecture Type A: SWIFT Infrastructure within User Location<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1260\" height=\"807\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04004035\/Scheme-A.svg\" alt=\"\" class=\"wp-image-33847\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-14f90241-e241-4582-8f20-bdb2e39eccec areoi-element container marked-container marked-container-green\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d0752c14-06ca-49c9-9912-b4b20b0e2e3c row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-19626473-12af-4ebb-9cf9-73e37592a4f9 col areoi-element col-12\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading mb-3 mb-md-4 h3-marked\">Architecture Type B: SWIFT Infrastructure outside User Location<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1260\" height=\"582\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04004056\/Scheme-B.svg\" alt=\"\" class=\"wp-image-33854\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-482cd139-19ca-410a-8815-1ddd91ffdb61 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center pb-5 has-text-color\" style=\"color:#ffffff\">Why Syteca?<\/h2>\n\n\n\n\t\t<div  class=\"block-b462f339-5997-4c1b-91a4-a804a236a314 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2466dbb9-e8be-4277-b563-39ad5d3a82b7 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-30bfbb28-a547-4052-89ea-ac6eb306173f col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ba5a62e8-eef2-4ff8-987b-ae34866c1bed areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04001341\/rocket.svg\" alt=\"\" class=\"wp-image-33774\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Easy maintenance and deployment<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-30bfbb28-a547-4052-89ea-ac6eb306173f col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ba5a62e8-eef2-4ff8-987b-ae34866c1bed areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04002814\/licensing.svg\" alt=\"\" class=\"wp-image-33794\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Flexible licensing<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bea2f6d5-878e-45b9-93ed-3abf250cda0f col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c1008a6c-3825-4e48-89de-60f8f704b783 areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04002923\/enterprise.svg\" alt=\"\" class=\"wp-image-33808\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Enterprise-ready<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-943c2de5-5a93-41a8-bf36-c0abd8718588 col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a2b4261e-910c-4f9d-80bd-c9738a14713b areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04002852\/support.svg\" alt=\"\" class=\"wp-image-33801\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">24\/7 support from in-house team<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-943c2de5-5a93-41a8-bf36-c0abd8718588 col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a2b4261e-910c-4f9d-80bd-c9738a14713b areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04002957\/lightweight.svg\" alt=\"\" class=\"wp-image-33815\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Lightweight software agent<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7843897a-cc45-4835-a25f-fa4c03112c41 col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-1c424610-8104-4216-a33d-58738342b3d8 areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\" style=\"min-width:60px\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04003040\/data.svg\" alt=\"\" class=\"wp-image-33829\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Highly optimized data storage formats<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9ce5d62b-ff08-472a-b30f-210166152223 col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-eed4ffe1-85f0-4563-b7ea-0da14fc97743 areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\" style=\"min-width:60px\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04003022\/server.svg\" alt=\"\" class=\"wp-image-33822\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Complete server and desktop OS support<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9ce5d62b-ff08-472a-b30f-210166152223 col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-eed4ffe1-85f0-4563-b7ea-0da14fc97743 areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\" style=\"min-width:60px\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04003058\/protection.svg\" alt=\"\" class=\"wp-image-33836\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Privacy protection with user data anonymization<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d5bca69d-998c-4d69-822d-1ab54814d510 areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-5\">FAQ<\/h2>\n\n\n\n\t\t<div  class=\"block-5d43915f-bd7e-4412-94a2-0587b296fd0c row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-ab61b939-df46-4405-807a-8a0a34b54b19 col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f0162fcd-1e8d-463f-923f-a311180256ee accordion\">\n\t\t\t\n\n\t\t<div  class=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-collapse\" \n\t\t\t\t\taria-expanded=\"true\" \n\t\t\t\t\taria-controls=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat is SWIFT CSP?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse show\" \n\t\t\t\taria-labelledby=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-fc9ecaa4-c53a-4c01-ab82-878bb8e98ba4 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>SWIFT CSP, or SWIFT Customer Security Programme, is a comprehensive cybersecurity framework developed to enhance the security practices of financial organizations using SWIFT transactions. SWIFT CSP incorporates the Customer Security Controls Framework (CSCF), which establishes security controls and guidelines for financial institutions to protect against cyber threats. SWIFT CSP also includes guidelines and self-attestation requirements to mitigate cybersecurity risks within the SWIFT network.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-f40c8174-5b70-4409-a2fd-0e2839c1c019-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat happens if the organization does not comply with SWIFT CSP?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-29a487f9-8ce1-43d4-9fe8-36f50f76cbcc areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Non-compliance with SWIFT CSP can have negative consequences for a financial organization, including reputational damage, legal liabilities, and even fines. The SWIFT Customer Security Programme itself can&#8217;t impose financial penalties on organizations. However, failure to secure sensitive financial data may result in fines and penalties imposed by other <a href=\"\/en\/blog\/banking-and-financial-cyber-security-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity laws and regulations for the financial sector<\/a>. In some severe cases of non-compliance, SWIFT may suspend an organization&#8217;s ability to conduct international financial transactions using the SWIFT network.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-0a0ec48a-69d1-44f0-b184-31de8d011440-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat are the common challenges of complying with SWIFT CSP?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-db0816f5-a231-47f6-b0d0-bbdb2f99f747 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>One of the most common challenges with meeting the requirements of SWIFT CSP is allocating the necessary resources. Finding financial, technological, and human resources and <a href=\"\/en\/blog\/how-to-effectively-communicate-it-security-to-the-executive-board\" target=\"_blank\" rel=\"noreferrer noopener\">justifying them to the board<\/a> can be difficult. Implementing the necessary cybersecurity measures described by SWIFT may require significant investments. It may also be challenging to track and understand the specific controls SWIFT CSP requires. Hiring external SWIFT CSP consultancy services and implementing all-in-one cybersecurity solutions like <a href=\"\/en\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca<\/a> can help your organization cover the majority of requirements.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-collapse\"\n\t\t\t\t>\n\t\t\t\t\tHow to perform a SWIFT independent assessment?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-4168ed8d-5059-48ff-93cd-bc0794174a63 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Since 2022, SWIFT requires organizations to support their self-assessments with SWIFT independent assessments. An independent external assessor should evaluate your financial institution&#8217;s compliance with SWIFT CSP requirements. Your organization can choose from a list of approved SWIFT CSP auditors or select your own assessor. Performed annually, the SWIFT CSP audit includes making an on-site assessment of your cybersecurity controls, conducting a compliance gap analysis, and compiling a detailed assessment report. Based on this report, your organization creates an action plan to address any gaps between your organization\u2019s security measures and controls required by SWIFT CSP. Once your independent audit is finished, you provide a summary of the assessment and your remediation efforts to SWIFT.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-collapse\"\n\t\t\t\t>\n\t\t\t\t\tDoes SWIFT outline any measures for enhancing network security?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-999e6e81-184d-4cf6-80f0-024a2e80e2fe areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Yes. SWIFT Customer Security Controls Framework requires organizations to restrict internet access and create a <em>SWIFT secure zone to <\/em>protect SWIFT-related critical systems from the general IT environment<em>. <\/em>It\u2019s a segregated environment with only necessary payment systems and software that are protected by firewalls. Another essential measure enforced by SWIFT CSP is implementing <a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">identity<\/a> and <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">access management<\/a> controls, including <a href=\"\/en\/two-factor-authentication-tool\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication<\/a>, to ensure the principle of least privilege. Finally, SWIFT CSP requires financial organizations to implement security measures such as continuous <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">user activity monitoring<\/a> and robust <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">threat detection<\/a> to be able to promptly identify and respond to security threats. <a href=\"\/en\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca<\/a>&#8216;s robust insider risk management functionality can help your organization implement most SWIFT security requirements and secure sensitive financial data.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-45b57971-717c-443c-922f-f0df5b8248ea areoi-element d-flex justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-78c79352-3373-4cf5-96b7-d8110802c031 btn areoi-has-url position-relative btn-outline-secondary\"\n\t href=\"https:\/\/docs.syteca.com\/view\/faq-troubleshooting\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tMore FAQ \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-414d3b4f-bf1a-4b73-9e06-c6cf59691a47 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-11b6e401-6951-4d0e-b884-830193dcc8b7 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9f6c2f8a-0f3b-4f68-b76a-c8230e238439 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center\">Meet other IT security requirements with Syteca<\/h2>\n\n\n\n\t\t<div  class=\"block-ce59ecde-e09c-4dc0-8772-a2845b211ce1 row areoi-element standard-set\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-b5b19f3a-8089-430d-b8df-57779e2561cb col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b76cc725-7c87-49f5-8142-351b878979d7 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100 \"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a6bed40c-b544-464a-a83b-b3204282f7cf col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a124878b-4ffa-4003-b4cc-a0b614be59c9 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/pci-dss-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">PCI DSS<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-33613801-d2d1-48a5-a170-d3cd136178ca col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-8add58f2-3e03-40bd-825b-92e94567f5f8 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SWIFT CSP<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e43326f9-047f-494e-af2d-695055055472 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e7b7441d-517e-4d22-8c31-5939b6b7cf14 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/sox-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOX<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9ed3edea-864d-4cd9-8204-0f39f65ea416 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2c0dd273-60c2-48b0-a1d1-0d5bf595e4f0 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/fisma-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">FISMA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f5c71927-e795-4fc7-b5d8-1336d19fefb0 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-71978f43-04dc-4ab3-83ed-a8c22cca778e areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/gdpr-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f3b08ab4-5a59-4633-af80-1f6ede1c1bf6 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c6aee13f-6acd-496a-b450-3c7793846e59 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nist-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-53<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af56e4f7-5aa8-4e97-9e7f-1110ff8c81d6 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d277acf6-c0e8-4906-b4b8-9eeb22640812 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nist-800-171-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-171<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6c49f66f-789d-4a8e-a47d-f2eef32621f7 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-988ff469-99a6-48bb-a06c-749de2e59159 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nerc-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NERC<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9977c2a2-163d-48ca-ba4f-9b6132704998 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e40e22a8-388b-4aa8-bd14-36c9f33c479b areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/glba-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">GLBA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-38bc542e-0b69-47f3-89c2-01acc885743b col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7da2f8b4-83f4-4b04-94ca-8093fb5d0020 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nispom-change-2-and-h-r-act-666\" target=\"_blank\" rel=\"noreferrer noopener\">NISPOM Change 2 and H.R. 666<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-954a3a8e-95fa-406a-a329-4ce26852cb6a col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0820a35f-52fd-4605-bd29-8f6f7d0e2431 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/soc-2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9977c2a2-163d-48ca-ba4f-9b6132704998 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e40e22a8-388b-4aa8-bd14-36c9f33c479b areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/hipaa-compliance-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">HIPAA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-38bc542e-0b69-47f3-89c2-01acc885743b col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7da2f8b4-83f4-4b04-94ca-8093fb5d0020 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">DORA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-954a3a8e-95fa-406a-a329-4ce26852cb6a col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0820a35f-52fd-4605-bd29-8f6f7d0e2431 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-8c89124e-253f-4805-9f93-347c86377a5b areoi-element lets-talk overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.2)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-72b6197e-3dfe-4ec1-89f6-e5d6a1394c3a areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-03ae15ca-7610-4452-ac69-d7f00edd880d row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-0e8081c0-dbaf-469c-bf7f-523ca6f7694a col areoi-element align-self-md-center col-xxl-5\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading text-center text-md-start\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#4790ea\" class=\"has-inline-color\">Let\u2019s <\/mark>get the conversation started<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"text-center text-md-start opacity-75 pe-xxl-5\">Contact our team to learn how our insider risk management software can safeguard your organization&#8217;s data from any risks caused by human factors. Book a call with us at a time that suits you best, and let&#8217;s explore how we can help you achieve your security goals.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t<div  class=\"block-cf14a16c-6c30-4ce2-96c4-909d173f9c7b areoi-element d-flex justify-content-center justify-content-md-start\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-5446f9ca-cbaa-42df-8020-fec51b20785e btn areoi-has-url position-relative btn-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3a7702ac-7e87-4702-abff-88e557a0d73c col areoi-element align-self-md-center col-xxl-7 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/Rectangle-205.png\" alt=\"\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":16,"featured_media":0,"parent":12284,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full.php","meta":{"footnotes":""},"class_list":["post-33395","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SWIFT Customer Security Program (CSP) Compliance Solution | Syteca<\/title>\n<meta name=\"description\" content=\"Discover how Syteca can help you meet the requirements of the SWIFT Customer Security Program (CSP) and pass compliance audits.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SWIFT Customer Security Program (CSP) Compliance Solution | Syteca\" \/>\n<meta property=\"og:description\" content=\"Discover how Syteca can help you meet the requirements of the SWIFT Customer Security Program (CSP) and pass compliance audits.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-17T11:48:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance\",\"url\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance\",\"name\":\"SWIFT Customer Security Program (CSP) Compliance Solution | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png\",\"datePublished\":\"2023-10-05T14:06:13+00:00\",\"dateModified\":\"2024-10-17T11:48:55+00:00\",\"description\":\"Discover how Syteca can help you meet the requirements of the SWIFT Customer Security Program (CSP) and pass compliance audits.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance#primaryimage\",\"url\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png\",\"contentUrl\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Solutions\",\"item\":\"https:\/\/www.syteca.com\/en\/solutions\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Compliance Solution\",\"item\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SWIFT Customer Security Program (CSP) Compliance Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SWIFT Customer Security Program (CSP) Compliance Solution | Syteca","description":"Discover how Syteca can help you meet the requirements of the SWIFT Customer Security Program (CSP) and pass compliance audits.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance","og_locale":"en_US","og_type":"article","og_title":"SWIFT Customer Security Program (CSP) Compliance Solution | Syteca","og_description":"Discover how Syteca can help you meet the requirements of the SWIFT Customer Security Program (CSP) and pass compliance audits.","og_url":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance","og_site_name":"Syteca","article_modified_time":"2024-10-17T11:48:55+00:00","og_image":[{"url":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance","url":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance","name":"SWIFT Customer Security Program (CSP) Compliance Solution | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance#primaryimage"},"thumbnailUrl":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png","datePublished":"2023-10-05T14:06:13+00:00","dateModified":"2024-10-17T11:48:55+00:00","description":"Discover how Syteca can help you meet the requirements of the SWIFT Customer Security Program (CSP) and pass compliance audits.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance#primaryimage","url":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png","contentUrl":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Solutions","item":"https:\/\/www.syteca.com\/en\/solutions"},{"@type":"ListItem","position":2,"name":"IT Compliance Solution","item":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements"},{"@type":"ListItem","position":3,"name":"SWIFT Customer Security Program (CSP) Compliance Solution"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/33395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/comments?post=33395"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/33395\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/12284"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=33395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}