This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.
Requirement 1 - SWIFT environment protection
SWIFT environment protection
Overall design for environment segmentation
SWIFT mandates the various connectivity components (messaging interface, SwiftNet link (SNL), hardware security model (HSM), SWIFT connector, jump server, operator PC) to be deployed in a “secure zone”: a segmented and controlled environment that is bounded to the CSP control framework. Several AWS services can help you design and implement the secure zone. The following sections detail recommendations and guidance to help you meet the CSP control objectives using a combination of different AWS services.
Scope of the secure zone

Example of a SWIFT secure zone architected by AWS
SWIFT provides general guidance on which components should be in scope for the secure zone depending on the architecture the customers select to satisfy their business requirements. The preceding diagram shows an example of a SWIFT secure zone architected on AWS.
From the perspective of environment segregation, customers
should use a dedicated AWS Account that is governed by
AWS Organizations
“We recommend that you organize workloads in separate accounts and group accounts based on function, compliance requirements, or a common set of controls rather than mirroring your organization’s reporting structure. In AWS, accounts are a hard boundary, zero trust container for your resources. For example, account-level separation is strongly recommended for isolating production workloads from development and test workloads.”
Account separation helps to ensure the ease of auditing and clear environment separation from back-office applications and other SWIFT connectivity stacks (Dev/Test).
Another important aspect of the scoping is that the SWIFT
secure zone should contain only the resources that are
intended to be deployed and run. On the preventative side, you
can leverage
AWS Organization Service Control Policies (SCP) to restrict
the resource instantiation to the intended AWS services. You
can create a dedicated deployment
AWS Identity and Access Management
On the detective side, you can use
AWS Config
You can leverage a landing zone to manage and govern the SWIFT secure zone accounts. A landing zone is a well-architected, multi-account AWS environment that is scalable and secure. This is a starting point from which your organization can quickly launch and deploy workloads and applications with confidence in their security and infrastructure environment. Building a landing zone involves making technical and business decisions across account structure, networking, security, and access management in accordance with your organization’s growth and business goals for the future.
You have a few options for creating your landing zone on AWS.
You can choose a managed service to orchestrate your
environment, or work with an AWS Partner to build your own.
AWS offers
AWS Control Tower
Protection of the secure zone — boundary protection
Amazon Virtual Private Cloud
For example, the
AWS Quick Start guide for SWIFT client connectivity
Table 1 – Security Groups in SWIFT on AWS Quick Start reference deployment
Security Group | Inbound (Port) | Outbound (Port) |
---|---|---|
Alliance Message Hub (AMH) | AMH Admin Desktop IP (8443) | SAG/SNL (48002/3), Amazon MQ (61617), RDS (1521) |
Alliance Gateway (SAG) / SNL | AMH (48002/3) | SWIFT IP range (0-65536), HSM IPs (1792) |
Amazon MQ | AMH (61617) | n/a |
Amazon RDS | AMH (1521) | n/a |
VPC Endpoint | AMH (443), SAG/SNL (443) | n/a |
Access to the secure zone systems
Traditionally, jump servers are deployed to the SWIFT secure
zone for accessing various SWIFT components. Creating,
maintaining, managing access, security hardening, and
patching on these jump servers becomes undifferentiated heavy
lifting. Access to the secure zone systems is simplified with
AWS System Manager Session Manager, as it removes the need
for the jump server in the secure zone. Session Manager is a
fully managed AWS capability that enables you to manage your
Amazon EC2 instances, on-premises instances, and virtual
machines (VMs) through an interactive, one-click,
browser-based shell, or through the AWS Command Line Interface
(AWS CLI) without the need for a
bastion
If you prefer a traditional jump server setup and GUI access,
Amazon WorkSpaces
Segregation from general enterprise IT services
The guidance of using your AWS account to achieve segregation is detailed in the Scope of the secure zone section of this document.
Operating system privileged account control
The goal for this control is to prevent individual users from having excess privilege to exploit the operating system on the host. The general best practice is to prevent human access to the EC2 host directly, except in a break glass situation. (“Break glass” refers to a quick means for a person who does not have access privileges to gain access when necessary.)
Ideally, installation and configuration of the SWIFT software should not be run manually on the EC2 host itself. Software installation should be done through an automated AMI pipeline. Per the Well-Architected Framework: Financial Service Industry Lens:
“Adopt immutable infrastructure practices with no human access to better meet your audit and compliance needs. You will be able to version control your infrastructure and handling failure will be a routine and continuous way of doing business.”
You can leverage
Amazon EC2 Image Builder
Virtualization platform protection
Customer environments are logically segregated to prevent users
and customers from accessing resources not assigned to them. You
maintain full control over who has access to your data. Services
such as EC2, that provide virtualized operational environments,
ensure that customers are segregated from one another and prevent
cross-tenant privilege escalation and information disclosure via
hypervisors
Different instances running on the same physical machine are isolated from each other via the hypervisor. The Amazon EC2 firewall resides within the hypervisor layer, between the physical network interface and the instance's virtual interface. All packets must pass through this layer, so an instance’s neighbors have no more access to that instance than to any other host on the internet, and can be treated as if they are on separate physical hosts. The physical random access memory (RAM) is separated using similar mechanisms.
Customer instances have no access to physical disk devices, but
instead are presented with virtualized disks. The AWS proprietary
disk virtualization layer automatically erases every block of
storage before making it available for use, which protects one
customer’s data from being unintentionally exposed to another.
Customers can further protect their data using traditional file
system encryption mechanisms, or, in the case of
Amazon Elastic Block Store
The AWS Nitro
System
The Nitro System provides enhanced security that continuously monitors, protects, and verifies the instance hardware and firmware. Virtualization resources are offloaded to dedicated hardware and software, minimizing the attack surface. Nitro System's security model is locked down and prohibits administrative access, eliminating the possibility of human error and tampering.
Nitro is currently available across many different EC2 instance types.
Restriction of internet access
This control objective is designed to limit exposure to an internet-based attack. This is a common security control, and best practice for many organizations. There are many well-established patterns to restrict internet access.
One simple measure that can help you meet this control objective is to completely disable internet access for the SWIFT secure zone. The SWIFT secure zone can be operated without internet access. In AWS terms, the VPC in the secure zone does not have an internet gateway attached to the VPC. An SCP can be implemented to disallow internet gateway and prevent additional components for getting internet access. Refer to the example service control policy, prevent any VPC that doesn't already have internet access from getting it.
If internet access is required, customers can consider leveraging
different traffic filtering solutions like
Gateway
Load Balancer
Advanced adversaries may attempt to use DNS-based
data
exfiltration
Amazon GuardDuty
-
VPC Flow Logs
-
AWS CloudTrail management event logs
-
CloudTrail S3 data event logs
-
DNS logs
If you use AWS DNS resolvers for your EC2 instances (the default
setting), then GuardDuty can access and process your request and
response DNS logs through the internal AWS DNS resolvers. For
example, the Trojan:EC2/DNSDataExfiltration
(https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-ec2.html#trojan-ec2-dnsdataexfiltration)
finding informs you that the listed EC2 instance in your AWS
environment is running malware that uses DNS queries for outbound
data transfers.