A Treasury Management System (TMS) application is installed on the same machine as the customer connector (such as MQ server) connecting towards a Service Bureau Are these applications/systems in scope of CSCF?
Which operator session flows are expected to be protected in terms of confidentiality and integrity? (Choose all that apply.)
What type of control effectiveness needs to be validated for an independent assessment?
In the illustration, identify the component type of each of the numbered components.
A.
1. Customer Connector
2. Bridging Server (Middleware Server)
3. Customer Connector
4. Bridging Server (Middleware Server)
B.
1. Customer Connector
2. Bridging Server (Middleware Server)
3. Customer Connector
4. Customer Connector
C.
1. Bridging Server (Middleware Server)
2. Bridging Server (Middleware Server)
3. Bridging Server (Middleware Server)
4. Bridging Server (Middleware Server)
D.
1. Customer Connector
2. Customer Connector
3. Customer Connector
4. Customer Connector
The only type of HSM devices offered by Swift are HSM tokens and HSM boxes.