You are on page 1of 25

Ebook

Unlocking the value of


your counterparties’ CSP
attestation data
Leading financial institutions share
their key success factors
Ebook | Contents 2

1.0 Overview  →
2.0 Combatting the cyber threat with CSP attestation data  →
3.0 Collecting and assessing attestation data  →
4.0 Handling non-compliance  →
5.0 Success factors  →
5.1 Methodology  →
5.2 Resources  →
5.3 Communication  →
5.4 Tools and processes →
5.5 Community →
6.0 Best practices: A planning and execution checklist  →
7.0 Conclusion  →
Ebook | Unlocking the value of your counterparties’ CSP attestation data 3

Overview
Ebook | Overview 4

With increasing digitisation, SWIFT’s Customer Security


Programme (CSP) helps you cover
the cyber threat facing both bases. As well as attesting to your

financial institutions has own security controls, you can also access
your counterparties’ attestation data – and
never been greater. thereby tap into another data point to help
you manage counterparty risk.

In this environment, financial In this ebook, financial institutions that

institutions need to have the are leading the way in this field share the
insights they have learned along the way,
right controls in place to protect and some key success factors that can help

their own organisations — and you and your organisation get additional
value from counterparty attestation data.
they also need to understand
the risks associated with
their counterparties.

“Counterparties that generally


have weaker CSP controls
may run greater cyber risks,
which increases the likelihood
and potential severity of an
unexpected outcome.”
Victor Abiola — Global Head, Operational Risk, Corporate and
Investment Bank at Standard Bank
Ebook | Unlocking the value of your counterparties’ CSP attestation data 5

Combating the
cyber threat with
CSP attestation data
Ebook | Combating the cyber threat with CSP attestation data 6

Cybercrime continues to
present a major challenge for
financial institutions. In today’s
93-99%
average compliance
environment, you need to have rate for individual
robust defences in place to mandatory controls
protect yourself from attacks. in 2020.
Introduced in 2016, SWIFT’s Customer
And, as attacks such as the Security Programme (CSP) aims to

2020 SolarWinds hack and support our community in combating


cyber threats. As part of the programme,
the Accellion FTA breach have financial institutions are required to assess

highlighted, an important part of their compliance with a list of mandatory


and advisory security controls, and to attest
these defences is understanding compliance with the mandatory controls

the risk associated with your (advisory controls are recommended) on


an annual basis. This attestation is done
counterparties and suppliers. via the KYC Security Attestation (KYC-SA)
application on swift.com.

In 2020, the overall attestation rate was


89%, while the average compliance rate for
individual mandatory controls ranged from
93% to 99% – a particularly impressive
achievement against the backdrop of
the pandemic. This demonstrates the
community’s commitment to cyber hygiene,
and shows how far entities in the SWIFT
community have come in establishing cyber
risk management frameworks and adopting
cybersecurity risk countermeasures.
Ebook | Combating the cyber threat with CSP attestation data 7

Requesting counterparty data entities in the SWIFT community, it was Learn from the early adopters
As well as submitting your own attestations, formed in early 2019. A CCRM guide was Many institutions may wish to use their
you can also request attestation data from also published, focused on the sharing and counterparties’ attestation data to better
counterparties in order to find out whether integration of counterparties’ cyber risk data manage risks, but don’t always know where
those counterparties are compliant with into institutions’ existing risk management to start. Now there is an opportunity to learn
CSP controls. processes. from leading financial institutions that have
taken the initiative and are already using
The work of the Counterparty Cyber Risk This practice benefits the financial CSP attestation data to gain more insights
Management Forum (CCRM) has been key community in several ways. into their counterparties.
to developments in this area. Comprising
Following on from our previous publication,
Assessing Cybersecurity Counterparty Risk
– A Getting Started Guide, and building on
the information and good practices shared
by the CCRM forum, this ebook explores
how you can use counterparty attestation
data to measure risk more effectively. In
1. Counterparties Counterparties that allow attestation data the following pages, leading institutions
to be used in this way can raise their profile share the insights they have gained as
and engender trust with other entities by early adopters. They also identify some
demonstrating a ‘clean bill of health.’ Without key success factors that can help others
this, financial institutions could find they are make the most of counterparty attestation
subject to additional security measures when data – from the methodology and
doing business. processes needed, to the importance of
communicating effectively with internal and
2. Supervisors Supervisors benefit from a stronger external stakeholders.
ecosystem if their supervised entities allow
their attestation data to be used.

Financial institutions can use their


3. Financial Institutions
counterparties’ attestation data to identify
counterparties that are not yet compliant with
key controls, and integrate that data into their
risk frameworks.
Ebook | Unlocking the value of your counterparties’ CSP attestation data 8

Collecting
and assessing
attestation data
Ebook | Collecting and assessing attestation data 9

There is a clear opportunity First you need to have processes in


place to collect and assess CSP data.
for financial institutions to use
counterparty attestation data to At the simplest level, attestation data can be
collected using SWIFT’s KYC-SA application.
help them assess the way they Beyond that, different financial institutions

interact and do business with may approach the task in different ways.
Some request attestation data from all their
those counterparties. counterparties, whereas others focus on
specific groups such as high-risk countries.

“We’ve got a number of


different data sets that help
us get comfortable with the
counterparties we deal with.
And CSP data is one of those
critical data points.”
Brad Lustig — Global Transaction Banking – Risk Executive at
Bank of America
Ebook | Collecting and assessing attestation data 10

Managing the data that has been gathered

Manual or automated? Holistic view Negative news


While some opt for spreadsheets, others As well as addressing compliance gaps, Leading financial institutions are also
have built in-house tools to consume financial institutions are also incorporating increasingly referring back to their
their attestation data. For example, Kamal CSP data into their existing risk frameworks counterparties’ attestation data in response
Mohanty, SVP Cyber Risk, Global Payments and reviews. “Citi continually enhances its to external events. For example, if the bank
& Receivables at Citi’s Treasury and Trade comprehensive multi-faceted risk reviews, hears negative news about a particular
Solutions group, explains that the bank’s designed around holistic data elements region or type of entity that is currently being
internally developed application ingests including relevant counterparty CSP data,” targeted by cyber criminals, there is the
SWIFT's KYC-SA report for analysis. The says Mohanty. option of drilling down into relevant entities’
application reduces manual touchpoints and CSP scores to check for any weaknesses.
also builds the foundation for SWIFT’s CSP “The advent of the CSP tool has been a huge
API integration, when launched. help for us,” adds Bank of America’s Lustig. “If a counterparty were to disclose an event
“We do very thorough annual portfolio to us, we could then track this back to their
BNY Mellon, meanwhile, is currently reviews and client reviews for clients that CSP attestation data and ask, ‘How did this
exploring the possibility of incorporating a fit into that high-risk spectrum, and those bank fail in terms of those controls, versus
real-time data feed using APIs that could routines incorporate a lot of our risk partners what’s actually happened?’” explains Andrew
help them aggregate data and track metrics across the bank. We have now embedded a Pamphilon, Network Manager at
over time. review of CSP scores into that process.” Standard Bank.
Ebook | Unlocking the value of your counterparties’ CSP attestation data 11

Handling
non-compliance
Ebook | Handling non-compliance 12

While financial institutions report You’ll need to decide for yourself how to
handle each of these scenarios. In some
that most of their counterparties are cases, this may mean initiating a one-to-one Enhancing CSP processes

fully compliant with CSP controls, communication process with counterparties


that fall short of full compliance, and/or
Several financial institutions initially
found that some counterparties did not
a minority may fall short of full tracking their progress in adopting any respond to their requests for attestation

compliance in the following ways: missing controls. data. However, this issue was largely
addressed with the introduction of the

On occasion, ‘Grant All’ feature in November 2020.

counterparties may fail For counterparties that have opted

to submit attestation in, Grant All automatically grants all


requests for attestation data from
data. This can be existing correspondents – considerably

due to a number of reducing the number of data requests


that go unanswered.
reasons, including
lack of resources. In another development, SWIFT has
introduced an additional layer of
Counterparties do not comply with all assurance for attestations. As of 2021,
In some cases, missing data may simply
CSP controls. If counterparties do not all attestations must be supported by
be an oversight. “We have had cases
meet all the controls, financial institutions an independent assessment, including
where the counterparty came back and
need to decide how to proceed. One a review of existing controls and their
said they had saved the attestation as a
consideration is that some CSP controls are efficiency, and confirmation that they
draft,” says Alexander Reinecke, Senior
mandatory, whereas others are advisory. support compliance with the relevant
Product Manager Industry Engagement and
Some institutions may carry out a ranking CSP controls. The independent
Transaction Surveillance at Deutsche Bank.
exercise to identify which of the CSP assessment can be performed by
controls are the most critical. internal and/or external resources, and a
Some institutions may decide not to share
directory of CSP assessment providers
attestation data with their counterparties
Attestation has expired. A recently is available on swift.com.
based on internal policies or other reasons.
expired attestation may not be a major
In these situations, financial institutions may
concern. However, an attestation that
be concerned about the possible reasons
expired six months ago could indicate a lack
why, such as a weakness in their controls.
of stringent cybersecurity management that
institutions may decide to investigate.
Ebook | Handling non-compliance 13

Taking action Leif Simon, Director, Transactions Surveillance


If counterparties refuse to share attestation Solutions, Deutsche Bank, adds: “Ultimately
data, or fall short of compliance with key the intention is to continue doing business
controls, this may affect the decisions financial with our counterparties. We want to avoid a
institutions make about those relationships. As situation where we have to pull the plug.”
Bank of America’s Lustig observes: “If we’re
expanding business with a client that refuses Context matters
to share that information, it’s absolutely going Financial institutions should also look at
to be a factor in our decision-making as to attestation data in the context of other
whether we want to proceed or not.” information about those relationships. For
example, counterparties may be able to

In some cases, the demonstrate that they address a particular


CSP control using an alternative approach.
actions financial
institutions take to Market considerations
In some markets, there may be few
address non-compliance alternative providers available, meaning it is

may vary depending on not necessarily feasible to draw a line in the


sand. “If you’re a global bank, you have the
whether the counterparty power of choice and the CSP information is a

in question is a new or bit more actionable,” comments Victor Abiola


– Global Head, Operational Risk, Corporate
existing relationship. and Investment Bank at Standard Bank.

“We’ve drawn a line in the sand, which However, as Abiola notes, there are
basically says that if a counterparty does not still options available when it comes to
comply with all mandatory controls, we will addressing a shortfall in controls. “If you
not onboard them – we’re quite upfront about don’t have those choices, and the only
that,” says Tony Valente, Senior Manager, partner you depend on in a particular country
Economic Crime Prevention, Commercial doesn’t have those strong controls, how do
Banking, Lloyds Bank. “I think there’s a bit you make a decision about that? It might be
more complexity with existing relationships. that you focus on working it out with that
That’s where we really have to understand the bank, or improving the dialogue,” he explains.
other factors, and see if there’s anything else
we can draw comfort from.”
Ebook | Unlocking the value of your counterparties’ CSP attestation data 14

Success
factors
Ebook | Success factors 15

So what are the factors that you need


to consider when getting the most
out of your counterparties’ attestation
data? Leading banks have identified the
following areas as key to success:

5.1 Methodology  →
5.2 Resources  →
5.3 Communication  →
5.4 Tools and processes  →
5.5 Community  →
Ebook | Success factors 16

5.1 Methodology Africa. “The nature of the issues is quite multi-


departmental,” comments Abiola.
Risk-based approach
Another key decision is how many
“So it was quite important, especially at the counterparties you should target in the first
beginning, to have different perspectives in the instance. While some financial institutions
room on how we were going to use the data.” may aim to request attestation data from
all their counterparties, others may prefer
Finding a home for the project a more iterative approach, focusing on the
For Lloyds Bank, one initial challenge was biggest-risk counterparties first.
the lack of a ‘natural home’ for the project,
particularly because – unlike KYC – it is not
a regulatory requirement. “It didn’t fit neatly
into the KYC process, because assessing
CSP compliance for a new relationship comes
Tips for your institution
It is essential to define what you plan to do Centralised approach before KYC has even started,” says Valente.
“If you can’t do everything in one go, I
with counterparty attestation data once it BNY Mellon has opted to centralise the “Nor did it fit into our financial crime risk
would recommend that you do as we did
has been gathered. “In our case, because management of counterparty attestation framework, which is very specific.” Ultimately,
– define a risk-based approach that helps
there are not many examples of non- data through a central control team. “That is the team opted to build attestation data into
you to prioritise the counterparties you
compliance, we felt the most logical thing important because it ensures that we have a the bank’s payment services policy – “and
want to request, and then work through
was to approach any counterparties that consistent approach to the framework, how from that, we were able to build the necessary
them in order.”
are not meeting a control, and have direct we’re looking at the data, and how we’re risk management approach and get the
bilateral contact with them to find out what measuring it across our lines of business,” accountabilities assigned.”
Leif Simon — Director, Transactions
happened,” says Deutsche Bank’s Simon. explains Joanne Cash, Head of Operations
Surveillance Solutions, Deutsche Bank
Control Management, BNY Mellon. “Then we
In addition, some users might consider some bring relevant experts to the table to look at
CSP controls to be particularly crucial, and what we’re pulling together on their behalf.”
focus on those accordingly. “We have come
up with a handful of core controls that we She adds that this has enabled the bank
believe are critically important,” says Raghu to develop expertise not only on the
Srinivasan, Managing Director, Treasury completion of its own attestations, but on
Product Executive, Bank of America. the consumption of counterparty attestations,
“Whether counterparties are compliant and managing any questions that arise.
with those specific controls factors heavily
into our understanding of the risk that the Standard Bank, has also centralised the
counterparty brings to the portfolio.” management of counterparty attestation
data within a central team based in South
Ebook | Success factors 17

5.2 Resources
Tips for your institution
“He established a process to consistently
“Aligning teams and deciding who should
interpret the information received from
be involved – both on your side and on
counterparties, where they fell short of
your counterparty’s side – will be more
compliance and where they had plans to
and more important as you get more into
remediate; and he was able to present that
using CSP data to form appetite, make
information in an easily digestible way.”
decisions or conduct follow-up due
diligence with counterparties.”
With the process developed, the contractor
was able to hand the resulting model over
Victor Abiola — Global Head,
to a business as usual team. Key to this
Operational Risk, Corporate and
As with any project, it’s essential to have new and existing clients. This approach approach, notes Baggott, was being able to
Investment Bank, Standard Bank
the right resources in place. An important has helped streamline and progress the explain the importance of cyber controls to
step is getting engagement from all relevant CSP programme, and in sharing ongoing senior management in order to secure the
stakeholders and gaining senior sponsorship. information with relevant stakeholders, necessary budget.
including client oversight and relationship
“We set up a small team covering our internal divisions,” comments Citi’s Mohanty. “As an
efforts to work with the CSP programme, organisation, this contributes to the ongoing
both in terms of our own self-attestation, conversation on the risk(s) when making
and also in terms of consuming and making decisions about a relationship.”
sense of counterparty data,” says Deutsche
Bank’s Simon. “The important thing was to Bringing in resources
involve a number of stakeholders right from In some cases, the project may call for
the beginning – the earlier you get everyone additional resources. Lloyds Bank, for
on board, the easier it is to work as a team.” example, opted to bring in an external
contractor to help develop the process.
In practice, there are a number of
stakeholders to consider, from key subject “He wasn’t from a financial crime or
matter experts for the lines of business to cybersecurity background, but he did
risk, compliance and legal teams, as well as understand how things work in large
internal and external auditors. financial institutions in terms of management
information and reporting,” says John
“We have operationalised our CSP Baggott, Senior Manager, Payments,
Consultation and Consumption efforts for Industry & Development, Lloyds Bank.
Ebook | Success factors 18

5.3 Communication “It’s about reaching out to those clients


and understanding any mitigations
before any decision is made against Tips for your institution
appetite,” says Baggott from Lloyds “Invest upfront in creating documents
Bank. “It’s also about understanding what and putting information in one place so
the client intends to do to close those you can direct people to it, instead of
gaps – so it’s quite an open dialogue.” having to answer the same questions
every time they come in. Otherwise
you’re going to end up buried in
requests.”

Another important success factor is the FAQ document to ensure questions are Joanne Cash — Head of Operations
ability to communicate effectively about responded to with a consistent message. Control Management, BNY Mellon
the CSP programme, both within the
organisation and with external stakeholders. Set a drumbeat for your activity “Socialising the Customer Security
Other communication measures may Programme initiative at various internal
From general updates to targeted include monthly working groups to review forums will help increase organisational
discussions counterparty attestation data and updates awareness and the cyber resilience value
Deutsche Bank’s Simon explains that from internal and external audit teams. one can get from CSP consultation and
communication efforts include providing Oonagh McGrane, Director, FI consumption.”
general information about the CSP Commercialisation, Client Products at
programme widely within the bank. Lloyds Bank, says that a monthly forum Kamal Mohanty – SVP Cyber Risk,
“Then, of course, we had more focused enables the bank to review progress and Global Payments & Receivables, Citi
communications for target groups such exceptions in a structured way. “That
as sales and client managers so they provides an effective drumbeat to the “Keep those channels of communication
understood what they needed to do with activity,” she adds. open with the different business lines,
counterparties flagged as non-compliant.” because they’re the ones that are
Communicating with clients working with the counterparties.”
BNY Mellon, likewise, provides talking And, of course, a key part of managing
points to relevant front-office staff to help attestation data is communicating with Kevin Domaratius — Senior Associate,
them answer questions from counterparties counterparties to understand any issues or Operations, BNY Mellon
or clients. Other initiatives include an queries that may arise in relation to controls
intranet site that provides links to resources and compliance.
on the SWIFT website, as well as an
Ebook | Success factors 19

5.4 Tools and processes Other approaches can also work very
effectively. “As far as the process goes
internally, it doesn’t need to be anything
complicated,” says Lloyds Bank’s Baggott.
“A simple spreadsheet and PowerPoint deck
is all we required. The portal provides all the
data you need to consume – you can then
just leverage existing ways of working.”

When it comes to tools and processes, one that lists all the controls, mandatory and Tips for your institution
there is more than one way to approach the advisory, along with the controls status and “The number of counterparties we
management and analysis of attestation data. some other base data of the counterparty.” interact with is significant and we are
able to manage CSP consultation and
For financial institutions that have a sizeable From there, the bank applies logic to consumption at scale by focusing on
number of counterparties, the first step is interpret the data. “We read out which automation. Institutions with fewer
to download the counterparty attestation control is compliant, which is not compliant, counterparties can also start their CSP
report available on the KYC-SA tool. The which is compliant by a given date and journey by manually managing their data.”
data can then be reviewed, with different whether the attestation is expired or valid.
criteria applied to identify counterparties that This flows into reporting that we regularly do Kamal Mohanty — SVP Cyber Risk,
fall short of full compliance with the controls. internally, and map against those parties we Global Payments & Receivables, Citi
have requested access to.”
Getting started
As Deutsche Bank’s Reinecke explains, In-house tools vs spreadsheets
the “bare minimum” needed to get started Some institutions opt to build internal
is having the core roles in place to operate tools in order to handle their counterparty
the KYC-SA portal, both for counterparty attestation data. As mentioned earlier, Citi,
attestation consumption and to manage for example, downloads data from KYC-SA
your own CSP attestation. and uploads it to an application for data
interpretation. BNY Mellon, likewise, has
“We take a report from the KYC-SA tool,” built a process and a tool structure that
Reinecke comments. “It is possible to incorporates a lot of the detail provided by
download a number of reports, including SWIFT’s report.
Ebook | Success factors 20

5.5 Community
Tips for your institution
“This isn’t competitive – it’s in the interest
of the whole community. So let’s keep
talking and helping each other reach a
fully compliant position.”

John Baggott — Senior Manager,


Payments, Industry & Development,
Lloyds Bank

Last but not least, community has an “By working together, we can strengthen the
important role to play for financial institutions community, and also share lessons learned
looking to make the most of their attestation and best practices. For example, during a
data. In a post-pandemic world, you should counterparty CSP conversation, we discussed
take any opportunity to meet with your the topic of staying resilient while evolving with
peers and share experiences. virtualisation, and both parties walked away
with innovative industry approaches.”
One important resource has been SWIFT’s
group of peer global transaction banks. Beyond the CSP, financial institutions can
Communicating with them has enabled tap into further opportunities for information
information sharing about how best to sharing. “We don’t just receive information
handle attestation data, as well as providing from SWIFT and from the CSP – there are
an opportunity to discuss potential also other information-sharing activities that
operational enhancements. go on at a senior level within the IT intelligence
community,” says BNY Mellon’s Cash. “That
“The community element has definitely information, handled on a need-to-know
helped by providing us a common platform basis, can provide insights that you can use to
for bi-lateral conversation regarding research a particular CSP control.”
cyber resilience,” says Citi’s Mohanty.
Ebook | Unlocking the value of your counterparties’ CSP attestation data 21

Best practices:
A planning and
execution checklist
Ebook | Best practices: A planning and execution checklist 22

Here are some key actions you Gain senior sponsorship and engage all
relevant stakeholders.
can take to start using your
counterparties’ CSP attestation Make sure the necessary resources are

data to enhance risk management in place – consider bringing in external


resources if necessary.
within your organisation:
Decide which counterparties you will ask for
data. This could be every counterparty – or
it may be preferable to focus on high-risk
counterparties in the first instance.

Communicate internally and with external


stakeholders – intranets, FAQs and monthly
forums can help to drive knowledge and
consistency.

Depending on your business, prioritise


which CSP controls are the most critical for
your firm. This might mean differentiating
between mandatory and advisory controls,
or even ranking mandatory controls to
identify the most important to you.

Building an automated tool can be


advantageous for large institutions with
high numbers of counterparties, but plenty
can be achieved using spreadsheets and
manual processes.

Take advantage of opportunities to meet


with peers and share experiences.
Ebook | Unlocking the value of your counterparties’ CSP attestation data 23

Conclusion
Ebook | Conclusion 24

CSP attestation data may not For example, while some financial
institutions may ask all counterparties for
be a silver bullet. But when it attestation data, others may benefit from

comes to assessing counterparty focusing on high-risk counterparties in


the first instance. Another consideration
risk, it is a valuable addition in is that automated tools can be a valuable

the toolbox that you can use approach if you have a high number of
counterparties – but there is still much that
very effectively alongside other can be achieved using readily available tools

available data points. such as Excel.

Counterparties’ CSP attestation data can

While some financial institutions help you improve cybersecurity in a way that
is both affordable and accessible. And as
may face challenges in terms of Deutsche Bank’s Simon notes, “The single

securing the resources needed most important piece of advice I could


give anyone is to just get going and start
to get value from counterparty requesting the data.”

data, the insights shared by early


adopters make it clear that there
are plenty of ways for financial
institutions of all sizes to benefit.
Ebook

More information Building a stronger community


As part of SWIFT’s continuing commitment
To discuss how you can use to sharing data and strengthening the

CSP counterparty attestation financial services ecosystem, we take


part in a number of initiatives to help
data to enhance your cyber risk organisations improve cybersecurity. These

management, contact: include:

csp.communications.generic@swift.com • Partnering with the Carnegie Endowment


for International Peace and the World
For more information about the SWIFT Economic Forum (WEF) to provide
Customer Security Programme, visit a toolkit to help financial institutions
www.swift.com/csp. enhance their cybersecurity.

For more information about our Financial • Providing CSP data to the world’s leading
Crime Compliance solutions, including anti-virus providers, thereby promoting
Payment Controls for enhanced fraud collaboration and data sharing while
detection and prevention, visit strengthening cybersecurity efforts
www.swift.com/fcc. across industries.

• Sharing data with central banks via


the Euro Cyber Resilience Board for
pan-European Financial Infrastructures
(ECRB).
Thank you to all the contributors to this ebook
from participating financial institutions: Bank
of America, BNY Mellon, Citi, Deutsche Bank,
Lloyds Bank and Standard Bank.

We would also like to thank CLS for the


insights they contributed to the Assessing
Cybersecurity Counterparty Risk– A Getting
Started Guide, which this ebook builds upon.

© SWIFT October 2021 | Edition 1

You might also like