Article 2
General authentication requirements
Those mechanisms shall be based on the analysis of payment transactions taking into account elements which are typical of the payment service user in the circumstances of a normal use of the personalised security credentials.
Payment service providers shall ensure that the transaction monitoring mechanisms take into account, at a minimum, each of the following risk-based factors:
lists of compromised or stolen authentication elements;
the amount of each payment transaction;
known fraud scenarios in the provision of payment services;
signs of malware infection in any sessions of the authentication procedure;
in case the access device or the software is provided by the payment service provider, a log of the use of the access device or the software provided to the payment service user and the abnormal use of the access device or the software.