Source: OJ L, 2024/1774, 25.6.2024
EN- Digital operational resilience in the financial sector
ICT risk management
- RTS on ICT risk management framework
Article 21 Access control
As part of their control of access management rights, financial entitiesas defined in Article 2, points (a) to (t) shall develop, document, and implement a policy that contains all of the following:
the assignment of access rights to ICT assets means a software or hardware asset in the network and information systems used by the financial entity; based on need-to-know, need-to-use and least privilege principles, including for remote and emergency access;
the segregation of duties designed to prevent unjustified access to critical data or to prevent the allocation of combinations of access rights that may be used to circumvent controls;
a provision on user accountability, by limiting to the extent possible the use of generic and shared user accounts and ensuring that users are identifiable for the actions performed in the ICT systems at all times;
a provision on restrictions of access to ICT assets means a software or hardware asset in the network and information systems used by the financial entity;, setting out controls and tools to prevent unauthorised access;
account management procedures to grant, change or revoke access rights for user and generic accounts, including generic administrator accounts, including provision on all of the following:
assignment of roles and responsibilities for granting, reviewing, and revoking access rights;
assignment of privileged, emergency, and administrator access on a need-to-use or an ad-hoc basis for all ICT systems;
withdrawal means withdrawal as defined in Article 3, point (23), of Regulation (EU) 2019/1020; of access rights without undue delay upon termination of the employment or when the access is no longer necessary;
update of access rights where changes are necessary and at least once a year for all ICT systems, other than ICT systems supporting critical or important functions means a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law; and at least every 6 months for ICT systems supporting critical or important functions means a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;;
authentication methods, including all of the following:
the use of authentication methods commensurate to the classification established in accordance with Article 8(1) of Regulation (EU) 2022/2554 and to the overall risk means the potential for loss or disruption caused by an incident and is to be expressed as a combination of the magnitude of such loss or disruption and the likelihood of occurrence of the incident; profile of ICT assets means a software or hardware asset in the network and information systems used by the financial entity; and considering leading practices;
the use of strong authentication methods in accordance with leading practices and techniques for remote access to the financial entity means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations;’s network, for privileged access, for access to ICT assets means a software or hardware asset in the network and information systems used by the financial entity; supporting critical or important functions means a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law; or ICT assets means a software or hardware asset in the network and information systems used by the financial entity; that are publicly accessible;
physical access controls measures including:
the identification and logging of natural persons that are authorised to access premises, data centres, and sensitive designated areas identified by the financial entity means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations; where ICT and information assets means a collection of information, either tangible or intangible, that is worth protecting; reside;
the granting of physical access rights to critical ICT assets means a software or hardware asset in the network and information systems used by the financial entity; to authorised persons only, in accordance with the need-to-know and least privilege principles, and on an ad-hoc basis;
the monitoring of physical access to premises, data centres, and sensitive designated areas identified by the financial entity means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations; where ICT and information assets means a collection of information, either tangible or intangible, that is worth protecting; or both reside;
the review of physical access rights to ensure that unnecessary access rights are promptly revoked.
For the purposes of point (e)(i), financial entitiesas defined in Article 2, points (a) to (t) shall establish the retention period taking into account the business and information security objectives, the reasons for recording the event in the logs, and the results of the ICT risk means any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment; assessment.
For the purposes of point (e)(ii), financial entitiesas defined in Article 2, points (a) to (t) shall, where possible, use dedicated accounts for the performance of administrative tasks on ICT systems. Where feasible and appropriate, financial entitiesas defined in Article 2, points (a) to (t) shall deploy automated solutions for the privilege access management.
For the purposes of point (g)(i), the identification and logging shall be commensurate with the importance of the premises, data centres, sensitive designated areas, and the criticality of the operations or ICT systems located therein.
For the purposes of point (g)(iii), the monitoring shall be commensurate to the classification established in accordance with Article 8(1) of Regulation (EU) 2022/2554 and the criticality of the area accessed.
Springlex and this text is meant purely as a documentation tool and has no legal effect. No liability is assumed for its content. The authentic version of this act is the one published in the Official Journal of the European Union.