Article 34 – ICT operations security

The financial entities referred to in Article 16(1) of Regulation (EU) 2022/2554 shall, as part of their systems, protocols, and tools, and for all ICT assets:

  1. monitor and manage the lifecycle of all ICT assets;
  2. monitor whether the ICT assets are supported by ICT third-party service providers of financial entities, where applicable;
  3. identify capacity requirements of their ICT assets and measures to maintain and improve the availability and efficiency of ICT systems and prevent ICT capacity shortages before they materialise;
  4. perform automated vulnerability scanning and assessments of ICT assets commensurate to their classification as referred to in Article 30(1) and to the overall risk profile of the ICT asset, and deploy patches to address identified vulnerabilities;
  5. manage the risks related to outdated, unsupported, or legacy ICT assets;
  6. log events related to logical and physical access control, ICT operations, including system and network traffic activities, and ICT change management;
  7. identify and implement measures to monitor and analyse information on anomalous activities and behaviour for critical or important ICT operations;
  8. implement measures to monitor relevant and up-to-date information about cyber threats;
  9. implement measures to identify possible information leakages, malicious code and other security threats, and publicly known vulnerabilities in software and hardware, and check for corresponding new security updates.

For the purposes of point (f), financial entities shall align the level of detail of the logs with their purpose and usage of the ICT asset producing those logs.