+RTS ICT Risk Management T. II Ch. I Sec. 5 Art. 11 , 2

1. Overview

RTS ICT Risk Management T. II Ch. I Sec. 5 Art. 11 , 2

2. The data and system security procedure referred to in paragraph 1 shall contain all of the following elements related to data and ICT system security, in accordance with the classification established in accordance with Article 8(1) of Regulation (EU) 2022/2554:

  • (a) the access restrictions referred to in Article 21 of this Regulation, supporting the protection requirements for each level of classification;
  • (b) the identification of a secure configuration baseline for ICT assets that minimise exposure of those ICT assets to cyber threats and measures to verify regularly that those baselines are effectively deployed;
    • For the purposes of point (b), the secure configuration baseline referred to in that point shall take into account leading practices and appropriate techniques laid down in the standards defined in Article 2, point (1), of Regulation (EU) No 1025/2012.
  • (c) the identification of security measures to ensure that only authorised software is installed in ICT systems and endpoint devices;
  • (d) the identification of security measures against malicious codes;
  • (e) the identification of security measures to ensure that only authorised data storage media, systems, and endpoint devices are used to transfer and store data of the financial entity;
  • (f) the following requirements to secure the use of portable endpoint devices and private non-portable endpoint devices:
    • (i) the requirement to use a management solution to remotely manage the endpoint devices and remotely wipe the financial entity’s data;
    • (ii) the requirement to use security mechanisms that cannot be modified, removed or bypassed by staff members or ICT third-party service providers in an unauthorised manner;
    • (iii) the requirement to use removable data storage devices only where the residual ICT risk remains within the
      financial entity’s risk tolerance level referred to in Article 3, first subparagraph, point (a);
  • (g) the process to securely delete data, present on premises of the financial entity or stored externally, that the financial entity no longer needs to collect or to store;
  • (h) the process to securely dispose or decommission of data storage devices present on premises of the financial entity or stored externally containing confidential information;
  • (i) the identification and implementation of security measures to prevent data loss and leakage for systems and endpoint devices;
  • (j) the implementation of security measures to ensure that teleworking and the use of private endpoint devices does not adversely impact the ICT security of the financial entity;
  • (k) for ICT assets or services operated by an ICT third-party service provider, the identification and implementation of requirements to maintain digital operational resilience, in accordance with the results of the data classification and ICT risk assessment.
    • For the purposes of point (k), financial entities shall consider the following:
      • (a) the implementation of vendor recommended settings on the elements operated by the financial entity;
      • (b) a clear allocation of information security roles and responsibilities between the financial entity and the ICT thirdparty service provider, in accordance with the principle of full responsibility of the financial entity over its ICT third-party service provider referred to in Article 28(1), point (a), of Regulation (EU) 2022/2554, and for financial entities referred to in Article 28(2) of that Regulation, and in accordance with the financial entity’s policy on the use of ICT services supporting critical or important functions;
      • (c) the need to ensure and maintain adequate competences within the financial entity in the management and security of the service used;
      • (d) technical and organisational measures to minimise the risks related to the infrastructure used by the ICT third-party service provider for its ICT services, considering leading practices, and standards as defined in Article 2, point (1), of Regulation (EU) No 1025/2012.
Summary Regulation

1.1 References

1.2 Identified Requirements

1.3 Related Standards

2. Identified Requirements

Requirements
Source Requirement

3. Related Standards

Standards
Source Requirement
NOREA ICT (Security) Systems, tools, and solutions
Design, procure, and implement security solutions and tooling with the goal to ensure resilience, continuity, and CIA of ICT systems, particularly those supporting critical or important functions.
NOREA Data Protection Practices
Establish a secure configuration baseline for ICT assets, incorporating industry practices and techniques to minimize exposure to cyber threats. Deploy security measures to ensure CIA, prevent data loss and leakage, and protect against malicious codes. Protect data from risks arising from data management, including poor administration, processing risks, and human error. Ensure secure transfer of data and minimize the risk of data corruption or loss, unauthorized access, and technical flaws that may hinder business activity. Implement access restrictions based on data classification schemes. Regularly verify the effective deployment of these baselines.
NOREA Vendor Recommended Security Settings

Consider the security measures and settings recommended by the third-party service provider delivering the ICT service. Implement technical and organisational measures to minimise the risks related to the infrastructure used and managed by the ICT third-party service provider.

NOREA Endpoint Devices
Enforce usage requirements for portable and nonportable endpoint devices. Ensure that only authorized data storage media, systems, and endpoint devices are used to transfer and store data. Implement security measures to ensure that teleworking and the use of private endpoint devices do not adversely impact the overall security of the entity. This includes having a centralized management solution to remotely manage and wipe endpoint devices, security mechanisms that cannot be modified, removed, or bypassed, and the use of removable data storage devices only when the residual ICT risk remains within predefined risk tolerance levels. Enforce security measures to allow only authorized software installation on systems and endpoint devices.
NOREA Secure Data Deletion and Disposal
Establish a process to securely delete data on and offpremises. Establish a process to securely dispose or decommission data storage devices on and offpremises that contain confidential information.
Impressum