This question examines the applicability of internet access restrictions under theSwift Customer Security Controls Framework (CSCF) v2024.
Step 1: Understand Internet Access Restrictions
Control 2.6: Internet Accessibility Restrictionof theCSCF v2024requires restricting internet access for Swift-related components to minimize exposure, applicable to both secure zones and other in-scope systems.
Step 2: Analyze the Statement
The question asks if the restriction is only relevant when Swift-related components are in a secure zone, implying a scope limitation.
Step 3: Evaluate Each Option
A. Yes, because if there is no secure zone then the internet connectivity does not need to be restrictedIncorrect.Control 2.6applies to all in-scope components, not just those in secure zones. For example, operator PCs accessing hosted applications (e.g., via A3 architecture) must have restricted internet access, per theSwift Security Best Practices.Conclusion: Incorrect.
B. No, because there can be in-scope general operator PCs used to access a Swift-related application hosted at a service providerCorrect. General operator PCs (e.g., Component B in the diagram) are in scope when accessing Swift applications (e.g., hosted by a service provider in A3 architecture).Control 2.6requires internet restriction for these systems, even outside a secure zone, as confirmed in theCSCF v2024andSwift Outsourcing Guidelines.Conclusion: Correct.
Step 4: Conclusion and Verification
The correct answer isB, asControl 2.6mandates internet access restrictions for all in-scope components, including operator PCs accessing hosted Swift applications, not just those in secure zones.
References
Swift Customer Security Controls Framework (CSCF) v2024, Control 2.6: Internet Accessibility Restriction.
Swift Security Best Practices, Section: Internet Access Controls.
Swift Outsourcing Guidelines, Section: Operator PC Security.
Submit