Article 13 Network security management
Financial entitiesas defined in Article 2, points (a) to (t) shall, as part of the safeguards ensuring the security of networks against intrusions and data misuse, develop, document, and implement policies, procedures, protocols, and tools on network security management, including all of the following:
-
the segregation and segmentation of ICT systems and networks taking into account:
-
the criticality or importance of the function those ICT systems and networks support;
-
the classification established in accordance with Article 8(1) of Regulation (EU) 2022/2554;
-
the overall risk profile of ICT assetsmeans a software or hardware asset in the network and information systems used by the financial entity; using those ICT systems and networks;
-
-
the documentation of all of the financial entity’s network connections and data flows;
-
the use of a separate and dedicated network for the administration of ICT assetsmeans a software or hardware asset in the network and information systems used by the financial entity;;
-
the identification and implementation of network access controls to prevent and detect connections to the financial entity’s network by any unauthorised device or system, or any endpoint not meeting the financial entity’s security requirements;
-
the encryption of network connections passing over corporate networks, public networks, domestic networks, third-party networks, and wireless networks, for communication protocols used, taking into account the results of the approved data classification, the results of the ICT riskmeans any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment; assessment and the encryption of network connections referred to in Article 6(2);
-
the design of networks in line with the ICT security requirements established by the financial entity, taking into account leading practices to ensure the confidentiality, integrity, and availability of the network;
-
the securing of network traffic between the internal networks and the internet and other external connections;
-
the identification of the roles and responsibilities and steps for the specification, implementation, approval, change, and review of firewall rules and connections filters;
-
the performance of reviews of the network architecture and of the network security design once a year, and periodically for microenterprisesmeans a financial entity, other than a trading venue, a central counterparty, a trade repository or a central securities depository, which employs fewer than 10 persons and has an annual turnover and/or annual balance sheet total that does not exceed EUR 2 million;, to identify potential vulnerabilitiesmeans a weakness, susceptibility or flaw of an asset, system, process or control that can be exploited;;
-
the measures to temporarily isolate, where necessary, subnetworks, and network components and devices;
-
the implementation of a secure configuration baseline of all network components, and the hardening of the network and of network devices in line with any vendor instructions, where applicable standards, as defined in Article 2, point (1), of Regulation (EU) No 1025/2012, and leading practices;
-
the procedures to limit, lock, and terminate system and remote sessions after a specified period of inactivity;
-
for network services agreements:
-
the identification and specification of ICT and information security measures, service levels, and management requirements of all network services;
-
whether those services are provided by an ICT intra-group service providermeans an undertaking that is part of a financial group and that provides predominantly ICT services to financial entities within the same group or to financial entities belonging to the same institutional protection scheme, including to their parent undertakings, subsidiaries, branches or other entities that are under common ownership or control; or by ICT third-party service providersmeans an undertaking providing ICT services;.
-
For the purposes of point (h), financial entitiesas defined in Article 2, points (a) to (t) shall perform the review of firewall rules and connections filters on a regular basis in accordance with the classification established in accordance with Article 8(1) of Regulation (EU) 2022/2554 and the overall risk profile of ICT systems involved. For ICT systems that support critical or important functionsmeans a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;, financial entitiesas defined in Article 2, points (a) to (t) shall verify the adequacy of the existing firewall rules and connection filters at least every 6 months.