| ICT risk managementCHAPTER II (Articles 5-16) points out the monitoring activities and other security procedures and policies financial institutions should establish and regularly update to enable a proper ICT risk management process. | 
               
             | 
| ICT-related incident management, classification, and reportingCHAPTER III (Articles 17-23) states that applicable entities need to have the means to quickly detect, track, classify, and report ICT-related incidents as well as establish responsibilities and mitigation plans for various incident scenarios. | 
               
             | 
| Digital operational resilience testingCHAPTER IV (Articles 24-27) outlines that financial organizations should assess and test their preparedness for handling ICT-related incidents at least once a year to identify and eliminate gaps in operational resilience. | 
               
             | 
| ICT third-party risk managementCHAPTER V (Articles 28-44) lists the rules and requirements financial entities need to follow to ensure secure cooperation with ICT service providers and properly manage third-party risks. | 
               
             | 
| Information and intelligence sharingCHAPTER VI (Article 45) encourages financial institutions to exchange cyber threat information and intelligence to enhance digital operational resilience in the whole sector. | 
               
                  - Capture detailed records of user activity and document security incidents to share them with regulatory bodies and other financial entities as part of incident reporting and cooperation.
 
                  - Generate comprehensive logs and reports to demonstrate adherence to cybersecurity regulatory requirements.
 
                  - Export data in a protected file format to share cybersecurity evidence.
 
                
             |