ICT operations security


The financial entitiesas defined in Article 2, points (a) to (t) referred to in Article 16(1) of Regulation (EU) 2022/2554 shall, as part of their systems, protocols, and tools, and for all ICT assetsa software or hardware asset in the network and information systems used by the financial entity:

  1. monitor and manage the lifecycle of all ICT assetsa software or hardware asset in the network and information systems used by the financial entity;

  2. monitor whether the ICT assetsa software or hardware asset in the network and information systems used by the financial entity are supported by ICT third-party service providersan undertaking providing ICT services of financial entitiesas defined in Article 2, points (a) to (t), where applicable;

  3. identify capacity requirements of their ICT assetsa software or hardware asset in the network and information systems used by the financial entity and measures to maintain and improve the availability and efficiency of ICT systems and prevent ICT capacity shortages before they materialise;

  4. perform automated vulnerabilitya weakness, susceptibility or flaw of an asset, system, process or control that can be exploited scanning and assessments of ICT assetsa software or hardware asset in the network and information systems used by the financial entity commensurate to their classification as referred to in Article 30(1) and to the overall risk profile of the ICT asseta software or hardware asset in the network and information systems used by the financial entity, and deploy patches to address identified vulnerabilitiesa weakness, susceptibility or flaw of an asset, system, process or control that can be exploited;

  5. manage the risks related to outdated, unsupported, or legacy ICT assetsa software or hardware asset in the network and information systems used by the financial entity;

  6. log events related to logical and physical access control, ICT operations, including system and network traffic activities, and ICT change management;

  7. identify and implement measures to monitor and analyse information on anomalous activities and behaviour for critical or important ICT operations;

  8. implement measures to monitor relevant and up-to-date information about cyber threatsas defined in Article 2, point (8), of Regulation (EU) 2019/881: any potential circumstance, event or action that could damage, disrupt or otherwise adversely impact network and information systems, the users of such systems and other persons;

  9. implement measures to identify possible information leakages, malicious code and other security threats, and publicly known vulnerabilitiesa weakness, susceptibility or flaw of an asset, system, process or control that can be exploited in software and hardware, and check for corresponding new security updates.

For the purposes of point (f), financial entitiesas defined in Article 2, points (a) to (t) shall align the level of detail of the logs with their purpose and usage of the ICT asseta software or hardware asset in the network and information systems used by the financial entity producing those logs.