Publication Date: June 25, 2024 (Official Journal)
Application Date: January 17, 2025
Official Source: EUR-Lex (eur-lex.europa.eu/eli/reg_del/2024/1774/oj/eng)
📋 Executive Summary
Objective: This RTS establishes the regulatory technical standards specifying the ICT risk management tools, methods, processes and policies, as well as the simplified ICT risk management framework for small financial entities.
🎯 Scope of Application
Entities Covered
Banks and credit institutions
Insurance and reinsurance undertakings
Investment firms
Payment service providers
Electronic money institutions
Crypto-asset service providers
Credit rating agencies
Central securities depositories
🔐 Components of the ICT Risk Management Framework
1. Governance and Organization
Article 3 - Roles and Responsibilities:
The management body must approve the ICT risk strategy
Appointment of an ICT risk management function
Clear separation of responsibilities between the three lines of defense
At least annual review of the strategy by the management body
2. Identification and Classification of ICT Assets
Article 4 - Asset Inventory:
Maintain a complete and up-to-date inventory of all ICT assets
Classify assets according to their criticality to business functions
Identify interdependencies between ICT assets
Document legacy and obsolete systems
3. ICT Risk Assessment and Management
Article 5 - Assessment Methodology:
Conduct ICT risk assessments at least annually
Use recognized methodologies (ISO 27005, NIST, etc.)
Assess the likelihood and impact of threats
Prioritize risks according to their criticality
Document risk acceptance decisions
🛡️ Protection and Prevention Measures
4. Information Security (Article 6-12)
Domain
Key Requirements
Access Control
• Multi-factor authentication (MFA)
• Principle of least privilege
• Periodic review of access rights
• Logging of privileged access
Cryptography
• Encryption of sensitive data at rest
• Encryption of communications (TLS 1.2+)
• Secure management of cryptographic keys
• Use of approved algorithms
Vulnerability Management
• Regular vulnerability scanning
• Patch management within required timeframes
• Annual penetration testing minimum
• Monitoring of emerging threats
Network Security
• Network segmentation
• Firewalls and intrusion detection systems
• Network traffic monitoring
• DDoS protection
5. Physical and Environmental Security (Article 18)