-
What's new
- All What's new
-
European
- What's new - All
- <hr>
- What's new - last 24 hrs
- What's new - last 7 days
- What's new - last 30 days
- <hr>
- New EU Legislation
- European Commission
- European Banking Authority
- European Securities and Markets Authority
- European Insurance and Occupational Pensions Authority
- <hr>
- Consultations and similar
- Commentaries
- <hr>
- Downloads and Exports
- Latest news by Topics
-
International
- What's new - All
- <hr>
- What's new - last 24 hrs
- What's new - last 7 days
- What's new - last 30 days
- <hr>
- Bank for International Settlements
- Basel Committee on Banking Supervision
- Egmont Group
- International Association of Insurance Supervisors
- International Monetary Fund
- <hr>
- Consultations and similar
- Commentaries
- <hr>
- Downloads and Exports
- Latest news by Topics
- Downloads and Exports
- Legislation
- Organisations
-
Commentaries
- Consultations
- Sanctioned regimes
- IFRSs
- Regulatory calendar
- Quicklinks
-
More
Table of Contents
Page Overview
AI Summary of Article 15 Further harmonisation of ICT risk management tools, methods, processes and policies
AI Disclaimer
Please note that AI-generated content should not be considered legal advice. Users are encouraged to consult with qualified professionals or legal advisors where specific legal guidance is required.
We are committed to transparency and responsible use of AI in a way that supports, but never replaces, human expertise.
If you have any questions or concerns about the use of AI on our platform, please feel free to contact us.
Article 15 Further harmonisation of ICT risk management tools, methods, processes and policies
The ESAs shall, through the Joint Committee, in consultation with the European Union Agency on Cybersecurity (ENISA), develop common draft regulatory technical standards in order to:
(a) specify further elements to be included in the ICT security policies, procedures, protocols and tools referred to in Article 9(2), with a view to ensuring the security of networks, enable adequate safeguards against intrusions and data misuse, preserve the availability, authenticity, integrity and confidentiality of data, including cryptographic techniques, and guarantee an accurate and prompt data transmission without major disruptions and undue delays;
(b) develop further components of the controls of access management rights referred to in Article 9(4), point (c), and associated human resource policy specifying access rights, procedures for granting and revoking rights, monitoring anomalous behaviour in relation to ICT risk through appropriate indicators, including for network use patterns, hours, IT activity and unknown devices;
(c) develop further the mechanisms specified in Article 10(1) enabling a prompt detection of anomalous activities and the criteria set out in Article 10(2) triggering ICT-related incident detection and response processes;