ICT risk management


  1. The financial entitiesas defined in Article 2, points (a) to (t) referred to in Article 16(1) of Regulation (EU) 2022/2554 shall include in their simplified ICT riskany reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment management framework all of the following:

    1. a determination of the risk tolerance levels for ICT riskany reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment, in accordance with the risk appetite of the financial entity;

    2. the identification and assessment of the ICT risksany reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment to which the financial entity is exposed;

    3. the specification of mitigation strategies at least for the ICT risksany reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment that are not within the risk tolerance levels of the financial entity;

    4. the monitoring of the effectiveness of the mitigation strategies referred to in point (c);

    5. the identification and assessment of any ICT and information security risks resulting from any major change in ICT system or ICT servicesdigital and data services provided through ICT systems to one or more internal or external users on an ongoing basis, including hardware as a service and hardware services which includes the provision of technical support via software or firmware updates by the hardware provider, excluding traditional analogue telephone services, processes, or procedures, and from ICT security testing results and after any major ICT-related incidentan ICT-related incident that has a high adverse impact on the network and information systems that support critical or important functions of the financial entity.

  2. The financial entitiesas defined in Article 2, points (a) to (t) referred to in paragraph 1 shall carry out and document the ICT riskany reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment assessment periodically commensurate to the financial entities’ ICT riskany reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment profile.

  3. The financial entitiesas defined in Article 2, points (a) to (t) referred to in paragraph 1 shall continuously monitor threats and vulnerabilitiesa weakness, susceptibility or flaw of an asset, system, process or control that can be exploited that are relevant to their critical or important functionsa function the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law, and information assetsa collection of information, either tangible or intangible, that is worth protecting and ICT assetsa software or hardware asset in the network and information systems used by the financial entity, and shall regularly review the risk scenarios impacting those critical or important functionsa function the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law.

  4. The financial entitiesas defined in Article 2, points (a) to (t) referred to in paragraph 1 shall set out alert thresholds and criteria to trigger and initiate ICT-related incidenta single event or a series of linked events unplanned by the financial entity that compromises the security of the network and information systems, and have an adverse impact on the availability, authenticity, integrity or confidentiality of data, or on the services provided by the financial entity response processes.