Source: OJ L 333, 27.12.2022, p. 1–79

Current language: EN

Article 8 Identification


    1. As part of the ICT riskmeans any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment; management framework referred to in Article 6(1), financial entities shall identify, classify and adequately document all ICT supported business functions, roles and responsibilities, the information assetsmeans a collection of information, either tangible or intangible, that is worth protecting; and ICT assetsmeans a software or hardware asset in the network and information systems used by the financial entity; supporting those functions, and their roles and dependencies in relation to ICT riskmeans any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment;. Financial entities shall review as needed, and at least yearly, the adequacy of this classification and of any relevant documentation.

    1. Financial entities shall, on a continuous basis, identify all sources of ICT riskmeans any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment;, in particular the risk exposure to and from other financial entities, and assess cyber threatsmeans ‘cyber threat’ as defined in Article 2, point (8), of Regulation (EU) 2019/881; and ICT vulnerabilitiesmeans a weakness, susceptibility or flaw of an asset, system, process or control that can be exploited; relevant to their ICT supported business functions, information assetsmeans a collection of information, either tangible or intangible, that is worth protecting; and ICT assetsmeans a software or hardware asset in the network and information systems used by the financial entity;. Financial entities shall review on a regular basis, and at least yearly, the risk scenarios impacting them.

    1. Financial entities, other than microenterprisesmeans a financial entity, other than a trading venue, a central counterparty, a trade repository or a central securities depository, which employs fewer than 10 persons and has an annual turnover and/or annual balance sheet total that does not exceed EUR 2 million;, shall perform a risk assessment upon each major change in the network and information systemmeans a network and information system as defined in Article 6, point 1, of Directive (EU) 2022/2555; infrastructure, in the processes or procedures affecting their ICT supported business functions, information assetsmeans a collection of information, either tangible or intangible, that is worth protecting; or ICT assetsmeans a software or hardware asset in the network and information systems used by the financial entity;.

    1. Financial entities shall identify all information assetsmeans a collection of information, either tangible or intangible, that is worth protecting; and ICT assetsmeans a software or hardware asset in the network and information systems used by the financial entity;, including those on remote sites, network resources and hardware equipment, and shall map those considered critical. They shall map the configuration of the information assetsmeans a collection of information, either tangible or intangible, that is worth protecting; and ICT assetsmeans a software or hardware asset in the network and information systems used by the financial entity; and the links and interdependencies between the different information assetsmeans a collection of information, either tangible or intangible, that is worth protecting; and ICT assetsmeans a software or hardware asset in the network and information systems used by the financial entity;.

    1. Financial entities shall identify and document all processes that are dependent on ICT third-party service providersmeans an undertaking providing ICT services;, and shall identify interconnections with ICT third-party service providersmeans an undertaking providing ICT services; that provide services that support critical or important functionsmeans a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;.

    1. For the purposes of paragraphs 1, 4 and 5, financial entities shall maintain relevant inventories and update them periodically and every time any major change as referred to in paragraph 3 occurs.

    1. Financial entities, other than microenterprisesmeans a financial entity, other than a trading venue, a central counterparty, a trade repository or a central securities depository, which employs fewer than 10 persons and has an annual turnover and/or annual balance sheet total that does not exceed EUR 2 million;, shall on a regular basis, and at least yearly, conduct a specific ICT riskmeans any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment; assessment on all legacy ICT systemsmeans an ICT system that has reached the end of its lifecycle (end-of-life), that is not suitable for upgrades or fixes, for technological or commercial reasons, or is no longer supported by its supplier or by an ICT third-party service provider, but that is still in use and supports the functions of the financial entity; and, in any case before and after connecting technologies, applications or systems.

We're continuously improving our platform to serve you better.

Your feedback matters! Let us know how we can improve.

Found a bug?

Springflod is a Swedish boutique consultancy firm specialising in cyber security within the financial services sector.

We offer professional services concerning information security governance, risk and compliance.

Crafted with ❤️ by Springflod