Article 13 Network security management


  1. Financial entitiesas defined in Article 2, points (a) to (t) shall, as part of the safeguards ensuring the security of networks against intrusions and data misuse, develop, document, and implement policies, procedures, protocols, and tools on network security management, including all of the following:

    1. the segregation and segmentation of ICT systems and networks taking into account:

      1. the criticality or importance of the function those ICT systems and networks support;

      2. the classification established in accordance with Article 8(1) of Regulation (EU) 2022/2554;

      3. the overall risk means the potential for loss or disruption caused by an incident and is to be expressed as a combination of the magnitude of such loss or disruption and the likelihood of occurrence of the incident; profile of ICT assets means a software or hardware asset in the network and information systems used by the financial entity; using those ICT systems and networks;

    2. the documentation of all of the financial entity means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations;’s network connections and data flows;

    3. the use of a separate and dedicated network for the administration of ICT assets means a software or hardware asset in the network and information systems used by the financial entity;;

    4. the identification and implementation of network access controls to prevent and detect connections to the financial entity means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations;’s network by any unauthorised device or system, or any endpoint not meeting the financial entity means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations;’s security requirements;

    5. the encryption of network connections passing over corporate networks, public networks, domestic networks, third-party networks, and wireless networks, for communication protocols used, taking into account the results of the approved data classification, the results of the ICT risk means any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment; assessment and the encryption of network connections referred to in Article 6(2);

    6. the design of networks in line with the ICT security requirements established by the financial entity means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations;, taking into account leading practices to ensure the confidentiality, integrity, and availability of the network;

    7. the securing of network traffic between the internal networks and the internet and other external connections;

    8. the identification of the roles and responsibilities and steps for the specification, implementation, approval, change, and review of firewall rules and connections filters;

    9. the performance of reviews of the network architecture and of the network security design once a year, and periodically for microenterprises, ‘small enterprises’ and ‘medium-sized enterprises’ mean, respectively, microenterprises, small enterprises and medium-sized enterprises as defined in the Annex to Recommendation 2003/361/EC;, to identify potential vulnerabilities means a weakness, susceptibility or flaw of a product with digital elements that can be exploited by a cyber threat;;

    10. the measures to temporarily isolate, where necessary, subnetworks, and network components means software or hardware intended for integration into an electronic information system; and devices;

    11. the implementation of a secure configuration baseline of all network components means software or hardware intended for integration into an electronic information system;, and the hardening of the network and of network devices in line with any vendor instructions, where applicable standards means a standard as defined in Article 2, point (1), of Regulation (EU) No 1025/2012 of the European Parliament and of the Council (^29^); Regulation (EU) No 1025/2012 of the European Parliament and of the Council of 25 October 2012 on European standardisation, amending Council Directives 89/686/EEC and 93/15/EEC and Directives 94/9/EC, 94/25/EC, 95/16/EC, 97/23/EC, 98/34/EC, 2004/22/EC, 2007/23/EC, 2009/23/EC and 2009/105/EC of the European Parliament and of the Council and repealing Council decision 87/95/EEC and Decision No 1673/2006/EC of the European Parliament and of the Council (OJ L 316, 14.11.2012, p. 12)., as defined in Article 2, point (1), of Regulation (EU) No 1025/2012, and leading practices;

    12. the procedures to limit, lock, and terminate system and remote sessions after a specified period of inactivity;

    13. for network services agreements:

      1. the identification and specification of ICT and information security measures, service levels, and management requirements of all network services;

      2. whether those services are provided by an ICT intra-group service provider means an undertaking that is part of a financial group and that provides predominantly ICT services to financial entities within the same group or to financial entities belonging to the same institutional protection scheme, including to their parent undertakings, subsidiaries, branches or other entities that are under common ownership or control; or by ICT third-party service providers means an undertaking providing ICT services;.

  2. For the purposes of point (h), financial entitiesas defined in Article 2, points (a) to (t) shall perform the review of firewall rules and connections filters on a regular basis in accordance with the classification established in accordance with Article 8(1) of Regulation (EU) 2022/2554 and the overall risk means the potential for loss or disruption caused by an incident and is to be expressed as a combination of the magnitude of such loss or disruption and the likelihood of occurrence of the incident; profile of ICT systems involved. For ICT systems that support critical or important functions means a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;, financial entitiesas defined in Article 2, points (a) to (t) shall verify the adequacy of the existing firewall rules and connection filters at least every 6 months.

We're continuously improving our platform to serve you better.

Your feedback matters! Let us know how we can improve.

Found a bug?

Springflod is a Swedish boutique consultancy firm specialising in cyber security within the financial services sector.

We offer professional services concerning information security governance, risk and compliance.

Crafted with ❤️ by Springflod