Requirement 6 - Detect anomalous activity - SWIFT Customer Security Controls Framework (v2022) on AWS

This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.

Requirement 6 - Detect anomalous activity

Malware protection

AWS is responsible for the deployment and management of antivirus and anti-malware solutions on AWS managed services such as Amazon RDS, Amazon ECS, and AWS Fargate. Customers inherit the security and compliance for AWS managed operating systems. You are responsible for configuring and running appropriate antivirus software on any applicable EC2 instance in which you have access to and responsibility for the underlying operating system. The AWS Marketplace offers numerous products.

Software integrity

Software integrity checks are generally embedded in SWIFT software components (AMH, SAA, SAG, SNL). If additional software and components are required to run in the SWIFT secure zone, consider getting a third-party file integrity monitoring tool in the AWS Marketplace.

The immutable infrastructure mentioned in the Security updates section of this document also plays a part in this security control objective. In an immutable infrastructure environment setup, no individuals should be allowed to perform any software changes or modification directly on the live SWIFT system.

Database integrity

Similar to the software integrity requirement, database integrity checks are enabled for SWIFT software components (AMH, SAA, SAG).

From the environment perspective, use a dedicated database instance for SWIFT connectivity purposes. The database should be encrypted with KMS keys. You should have designated users and roles for ensuring separation of duty for the database tables and schemas. Use AWS Secrets Manager to store the password for the database user login, and use the password rotation capability to rotate the database password periodically. You can implement detective controls for password checkout from AWS Secrets Manager.

Regarding database integrity, Amazon RDS creates and saves automated backups of your database (DB) instance during the backup window of your DB instance. Amazon RDS snapshots are automatically encrypted with the same encryption key that was used to encrypt the source Amazon RDS database. For the IAM permission aspect, grant least-privileged IAM policy to authorized roles that are required to perform infrastructure operations on the database instances. For details, refer to Identity-based policy examples for Amazon RDS.

Logging and monitoring

The overall goal is to capture security-related logs, configure alarms for suspicious events, and establish a plan to remediate the incident. Per SWIFT CSP implementation guidelines, enable logging on jump servers, firewall logs, databases, messaging interfaces, and command line history.

GuardDuty can help you detect unauthorized and unexpected activity in your AWS environment. You can use it to analyze and process data from AWS CloudTrail event logs, VPC Flow Logs, and DNS logs to detect anomalies involving the following AWS resource types:

  • EC2 instances

  • S3 buckets

From the application and middleware components perspective, this control objective can be covered by configuring logging and monitoring for different services in the SWIFT secure zone.

Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon S3. It also uses integrated threat intelligence such as known malicious IP addresses, anomaly detection, and machine learning (ML) to identify threats more accurately.

Logging in SWIFT secure zone by component:

All logging mechanisms have integration with Amazon CloudWatch Logs, which can be used to store, access, and monitor the behavior in the SWIFT secure zone. You can leverage create metrics from log events using filters to be alerted for suspicious activities. If you want to perform analytics on the logs generated, you can use Amazon CloudWatch Logs Insights, Amazon Athena, or Amazon OpenSearch Service. You can choose to integrate all AWS logs into your existing security information and event management (SIEM) and log archival solutions.

Intrusion detection

Amazon GuardDuty (described in the Logging and monitoring section of this document) can be leveraged to help you meet this control objective. This can not only detect anomalies in the networking traffic that is happening in the VPC, but can also detect suspicious activities on the AWS account level.

AWS Network Firewall can also be used to act as a network intrusion prevention system/intrusion detection system (IPS / IDS) within AWS as well as other IPS / IDS offerings from the AWS Marketplace.