Ekran Swift Booklet
Ekran Swift Booklet
Ekran Swift Booklet
Aiming at reinforcing SWIFT customers’ cyber security and preventing fraud, the Framework translates the industry
best security practices and guidelines into three key objectives (Secure Your Environment, Know and Limit Access,
Detect and Respond). These main objectives are further detailed in groups of technical, organizational, and educational
security controls.
Secure Your
Objective Know and Limit Access Detect and Respond
Environment
This robust and flexible agent-based software supports a wide range of operating systems, configurations, and network
architectures, including desktops, servers, and jump servers. It supports both physical and virtual infrastructures. With
Ekran System, you can control access to your secure zone and identities of your users, monitor and record any activity
within it, get alerted to suspicious actions, and enable incident response.
Session Monitoring and • Terminal, remote, and local session recording in indexed video format
Recording • Searchable multi-layer text index (URLs, commands, keystrokes,
applications, connected devices, etc.)
• Continuous monitoring with optional record filtering (by user, application,
or URL)
• Forensic export of records
Real-time Alerting and • Template-based and fully customizable alerts on anomalous, suspicious,
Incident Response and high-risk events
• Alerts delivered in real time accompanied with relevant event context
• Manual and automated incident response actions including user warning
and blocking, device blocking, and process termination
Supported Platforms
Secure Solution
Application hardening
Detailed internal action logging
Highly-protected data storage
Encrypted communication channels
Flexible Deployment
High-availability mode
Multi-tenant and single-tenant modes
Integration with SIEM and ticketing systems
Online and offline updates, automated client updates
Self-monitoring system dashboard
Easily scalable deployments
1. Restrict Internet Access and Protect Critical Systems from General IT Environment
1.1 SWIFT Environment Ensure the protection of the user’s local SWIFT Ekran System allows security teams to protect the
Protection infrastructure from potentially compromised SWIFT secure zone by setting up a jump server inside
elements of the general IT environment and the secure zone and restricting access to the server
external environment. only to trusted administrators. All corresponding
Ekran System management components including
the password vault can be deployed inside the
secure zone, and authentication service segregation
can be implemented.
1.2 Operating System Restrict and control the allocation and usage of Ekran System provides a secondary authentication
Privileged Account administrator-level operating system accounts. feature to identify users of shared accounts, such as
Control built-in administrator-level operating system
accounts, based on individual credentials. This allows
not only detailed logging but also restricting and
permitting access to shared accounts for specific
users.
1.3A Virtualisation Secure virtualisation platform and virtual Ekran System provides out-of-the-box support for
Platform Protection machines (VMs) hosting SWIFT-related virtual environments, delivering its full functionality
components to the same level as physical systems. for virtual machines and virtualization platforms.
Additional features such as integration into golden
images and dynamic license pools simplify
maintenance.
2.8A Critical Activity Ensure protection of the local SWIFT Ekran System allows security teams to grant secure
Outsourcing infrastructure from risks exposed by the third-party access to the secure zone without
outsourcing of critical activities. revealing actual access credentials via its PASM
functionality. All corresponding access permissions
are temporary and can be reviewed, continued, or
revoked. A one-time password mechanism can be
used to provide one-time access. Ticketing system
integration enables additional validation of the
purpose of access.
For close contractor monitoring, access can be set up
with mandatory manual login approval from a
security officer with subsequent real-time video
supervision.
3.1 Physical Security Prevent unauthorised physical access to sensitive Ekran System protects servers from unauthorized
equipment, workplace environments, hosting physical access by blocking access to or restricting
sites, and storage. the use of USB ports. With a whitelisting option,
specific USB devices, such as hardware tokens, can
be allowed. Ekran System reliably monitors, alerts
about, and blocks both USB storage devices and
other USB devices of any nature.
4.2 Multi-factor Prevent that a compromise of a single To enhance authorization credibility, Ekran System
Authentication authentication factor allows access into SWIFT supports time-based one-time passwords delivered
systems, by implementing multi-factor via a mobile app when logging in to the operator PC.
authentication. This gives an additional layer of protection against
credential theft.
5.1 Logical Access Control Enforce the security principles of need-to-know Ekran System provides a broad set of access control
access, least privilege, and segregation of duties tools for both privileged and ordinary users.
for operator accounts.
It includes temporary credential management on a
jump server via PASM functionality coupled with a
secure password vault and automated credential
provisioning. One-time passwords are generated by
security administrators for one-time access
scenarios. Access to a secure endpoint is given only
after manual approval of this login from a security
administrator who can monitor the initiated session
in real time. The purpose of access is validated via
integration with a ticketing system. These tools allow
a security team to implement best practices such as
segregation of duties, four-eye control, the least
privilege principle, and purpose-based access.
5.4 Physical and Logical Protect physically and logically recorded To ensure the security of passwords, Ekran System
Password Storage passwords. encrypts them and stores them in the Password
Vault. Users can be authenticated on endpoints
through Ekran System without credentials being
revealed to users.
6.3 Database Integrity Ensure the integrity of the database records for
the SWIFT messaging interface. n/a
6.4 Logging and Record security events and detect anomalous Ekran System logs user sessions in a searchable video
Monitoring actions and operations within the local SWIFT format, which is indexed with multilayer metadata.
environment. This metadata includes details such as application
names, visited URLs, entered commands, the
contents of started scripts, and keystrokes. Session
details include remote IP addresses and host details.
Session recordings can be exported for forensic
examination.
7.1 Cyber Incident Ensure a consistent and effective approach for To streamline cyber incident management, Ekran
Response Planning the management of cyber incidents. System provides a centralized UI for analyzing and
reacting to detected incidents. Information about
incidents can automatically be sent to a SIEM and/or
a ticketing system.
7.2 Security Training and Ensure all staff are aware of and fulfil their
Awareness security responsibilities by performing regular n/a
security training and awareness activities.
Contact us
www.ekransystem.com