ICT risk managementCHAPTER II (Articles 5-16) points out the monitoring activities and other security procedures and policies financial institutions should establish and regularly update to enable a proper ICT risk management process. |
|
ICT-related incident management, classification, and reportingCHAPTER III (Articles 17-23) states that applicable entities need to have the means to quickly detect, track, classify, and report ICT-related incidents as well as establish responsibilities and mitigation plans for various incident scenarios. |
|
Digital operational resilience testingCHAPTER IV (Articles 24-27) outlines that financial organizations should assess and test their preparedness for handling ICT-related incidents at least once a year to identify and eliminate gaps in operational resilience. |
|
ICT third-party risk managementCHAPTER V (Articles 28-44) lists the rules and requirements financial entities need to follow to ensure secure cooperation with ICT service providers and properly manage third-party risks. |
|
Information and intelligence sharingCHAPTER VI (Article 45) encourages financial institutions to exchange cyber threat information and intelligence to enhance digital operational resilience in the whole sector. |
- Capture detailed records of user activity and document security incidents to share them with regulatory bodies and other financial entities as part of incident reporting and cooperation.
- Generate comprehensive logs and reports to demonstrate adherence to cybersecurity regulatory requirements.
- Export data in a protected file format to share cybersecurity evidence.
|