Updated 01/07/2025
In force

Initial Legal Act
Amendments
Search within this legal act

ANNEX II - Implementing Regulation 2025/302

ANNEX II

DATA GLOSSARY AND INSTRUCTIONS FOR THE REPORTING OF MAJOR INCIDENTS

Data field

Description

Mandatory for initial notification

Mandatory for intermediate report

Mandatory for final report

Field type

General information about the financial entity

1.1.

Type of submission

Indicate the type of incident notification or report being submitted to the competent authority.

Yes

Yes

Yes

Choice:

initial notification;

intermediate report;

final report;

major incident reclassified as non-major.

1.2.

Name of the entity submitting the report

Full legal name of the entity submitting the report.

Yes

Yes

Yes

Alphanumeric

1.3.

Identification code of the entity submitting the report

Identification code of the entity submitting the report.

Where financial entities submit the notification/report, the identification code shall be a Legal Entity Identifier (LEI), which is a unique 20 alphanumeric character code, based on ISO 17442-1:2020.

A third-party provider that submits a report for a financial entity can use an identification code as specified in the implementing technical standards adopted pursuant to Article 28(9) of Regulation (EU) 2022/2554.

Yes

Yes

Yes

Alphanumeric

1.4.

Type of the affected financial entity

Type of the entity as referred to in Article 2(1), points (a) to (t), of Regulation (EU) 2022/2554 for whom the report is submitted.

In case of aggregated reporting as referred to in Article 7 of this Regulation, the different types of financial entities covered in the aggregated report to be selected.

Yes

Yes

Yes

Choice (multiselect):

credit institution;

payment institution;

exempted payment institution;

account information service provider;

electronic money institution;

exempted electronic money institution;

investment firm;

crypto-asset service provider;

issuer of asset-referenced tokens;

central securities depository;

central counterparty;

trading venue;

trade repository;

manager of alternative investment fund;

management company;

data reporting service provider;

insurance and reinsurance undertaking;

insurance intermediary, reinsurance intermediary and ancillary insurance intermediary;

institution for occupational retirement provision;

credit rating agency;

administrator of critical benchmarks;

crowdfunding service provider;

securitisation repository.

1.5.

Name of the financial entity affected

Full legal name of the financial entity affected by the major ICT-related incident and required to report the major incident to its competent authority under Article 19 of Regulation (EU) 2022/2554.

In case of aggregated reporting:

(a)

list of all names of the financial entities affected by the major ICT-related incident, separated by a semicolon;

(b)

the third-party provider submitting a major incident notification or report in an aggregated manner as referred to in Article 7 of this Regulation, to list the names of all financial entities impacted by the incident, separated by a semicolon.

Yes, if the financial entity affected by the incident is different from the entity submitting the report and in case of aggregated reporting

Yes, if the financial entity affected by the incident is different from the entity submitting the report and in case of aggregated reporting

Yes, if the financial entity affected by the incident is different from the entity submitting the report and in case of aggregated reporting

Alphanumeric

1.6.

LEI code of the financial entity affected

Legal Entity Identifier (LEI) of the financial entity affected by the major ICT-related incident assigned in accordance with the International Organisation for Standardisation.

In case of aggregated reporting:

(a)

a list of all LEI codes of the financial entities affected by the major ICT-related incident, separated by a semicolon.

(b)

the third-party provider submitting a major incident notification or report in an aggregated manner as referred to in Article 7 of this Regulation to list the LEI codes of all financial entities impacted by the incident, separated by a semicolon.

The order of appearance of LEI codes and financial entities names shall be identical.

Yes, if the financial entity affected by the major ICT-related incident is different from the entity submitting the report and in case of aggregated reporting

Yes, if the financial entity affected by the major ICT-related incident is different from the entity submitting the report and in case of aggregated reporting

Yes, if the financial entity affected by the major ICT-related incident is different from the entity submitting the report and in case of aggregated reporting

Unique 20 alphanumeric character code, based on ISO 17442-1:2020

1.7.

Primary contact person name

Name and surname of the primary contact person of the financial entity.

In case of aggregated reporting as referred to in Article 7 of this Regulation, the name of the primary contact person in the entity submitting the aggregated report.

Yes

Yes

Yes

Alphanumeric

1.8.

Primary contact person email

Email address of the primary contact person that can be used by the competent authority for follow-up communication.

In case of aggregated reporting as referred to in Article 7 of this Regulation, the email of the primary contact person in the entity submitting the aggregated report.

Yes

Yes

Yes

Alphanumeric

1.9.

Primary contact person telephone

The telephone number of the primary contact person that can be used by the competent authority for follow-up communication.

In case of aggregated reporting as referred to in Article 7 of this Regulation, the telephone number of the primary contact person in the entity submitting the aggregated report.

The telephone number shall be reported with all international prefixes (e.g. +33XXXXXXXXX)

Yes

Yes

Yes

Alphanumeric

1.10.

Second contact person name

Name and surname of the second contact person or the name of the responsible team of the financial entity or an entity submitting the report on behalf of the financial entity

Yes

Yes

Yes

Alphanumeric

1.11.

Second contact person email

Email address of the second contact person or a functional email address of the team that can be used by the competent authority for follow-up communication.

Yes

Yes

Yes

Alphanumeric

1.12.

Second contact person telephone

The telephone number of the second contact person, or of a team, that can be used by the competent authority for follow-up communication.

The telephone number shall be reported with all international prefixes (e.g. +33XXXXXXXXX)

Yes

Yes

Yes

Alphanumeric

1.13.

Name of the ultimate parent undertaking

Name of the ultimate parent undertaking of the group to which the affected financial entity belongs, where applicable.

Yes, if the FE belongs to a group

Yes, if the FE belongs to a group

Yes, if the FE belongs to a group

Alphanumeric

1.14.

LEI code of the ultimate parent undertaking

LEI of the ultimate parent undertaking of the group to which the affected financial entity belongs, where applicable. Assigned in accordance with the International Organisation for Standardisation.

Yes, if the FE belongs to a group

Yes, if the FE belongs to a group

Yes, if the FE belongs to a group

Unique 20 alphanumeric character code, based on ISO 17442-1:2020

1.15.

Reporting currency

Currency used for the incident reporting

Yes

Yes

Yes

Choice populated by using ISO 4217 currency codes

Content of the initial notification

2.1.

Incident reference code assigned by the financial entity

Unique reference code issued by the financial entity unequivocally identifying the major ICT-related incident.

In case of aggregated reporting as referred to in Article 7 of this Regulation, the incident reference code assigned by the third-party provider.

Yes

Yes

Yes

Alphanumeric

2.2.

Date and time of detection of the ICT-related incident

Date and time at which the financial entity has become aware of the ICT-related incident.

For recurring incidents, the date and the time at which the last ICT-related incident was detected.

Yes

Yes

Yes

ISO 8601 standard UTC (YYYY-MM-DD Thh: mm:ss)

2.3.

Date and time of classification of the incident as major

Date and time when the ICT-related incident was classified as major according to the classification criteria established in Delegated Regulation (EU) 2024/1772

Yes

Yes

Yes

ISO 8601 standard UTC (YYYY-MM-DD Thh: mm:ss)

2.4.

Description of the ICT-related incident

Description of the most relevant aspects of the major ICT-related incident.

Financial entities shall provide a high-level overview of the following information such as possible causes, immediate impacts, systems affected, and others. Financial entities, shall include, where known or reasonably expected, whether the incident impacts third-party providers or other financial entities, the type of provider or financial entity, their name, their respective identification codes and type of the identification code (e.g. LEI or EUID).

In subsequent reports, the field content can evolve over time to reflect the ongoing understanding of the ICT-related incident and describe any other relevant information about the ICT-related incident not captured by the data fields, including the internal severity assessment by the financial entity (e.g. very low, low, medium, high, very high) and an indication of the level and name of most senior decision structures that has been involved in response to the ICT-related incident.

Yes

Yes

Yes

Alphanumeric

2.5.

Classification criteria that triggered the incident report

Classification criteria under Delegated Regulation (EU) 2024/1772 that have triggered determination of the ICT-related incident as major and subsequent notification and reporting.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, the classification criteria that have triggered determination of the ICT-related incident as major for at least one or more financial entities.

Yes

Yes

Yes

Choice (multiple):

clients, financial counterparts and transactions affected;

reputational impact;

duration and service downtime;

geographical spread;

data losses;

critical services affected;

economic impact.

2.6.

Materiality thresholds for the classification criterion ‘Geographical spread’

EEA Member States impacted by the major ICT-related incident

When assessing the impact of the major ICT-related incident in other Member States, financial entities shall take into account Articles 4 and 12 of Delegated Regulation 2024/1772.

Yes, if ‘Geographical spread’ threshold is met

Yes, if ‘Geographical spread’ threshold is met

Yes, if ‘Geographical spread’ threshold is met

Choice (multiple) populated by using ISO 3166 ALPHA-2 of the affected countries

2.7.

Discovery of the major ICT-related incident

Indication of how the major ICT-related incident has been discovered.

Yes

Yes

Yes

Choice:

IT Security;

staff;

internal audit;

external audit;

clients;

financial counterparts;

third-party provider;

attacker;

monitoring systems;

authority/agency/ law enforcement body;

other.

2.8.

Indication whether the incident originates from a third-party provider or another financial entity

Indication whether the major ICT-related incident originates from a third-party provider or another financial entity.

Financial entities shall indicate whether the major ICT-related incident originates from a third-party provider or another financial entity (including financial entities belonging to the same group as the reporting entity) and the name, identification code of the third-party provider or financial entity and type of the identification code (e.g. LEI or EUID).

Yes, if the incident originates from a third-party provider or another financial entity

Yes, if the incident originates from a third-party provider or another financial entity

Yes, if the incident originates from a third-party provider or another financial entity

Alphanumeric

2.9.

Activation of business continuity plan, if activated

Indication of whether there has been a formal activation of the business continuity response measures of the financial entity.

Yes

Yes

Yes

Boolean (Yes or No)

2.10.

Other relevant information

Any further information not covered in the template.

Financial entities that have reclassified a major ICT-related incident as non-major shall describe the reasons why the ICT-related incident does not fulfil, and is not expected to fulfil, the criteria to be considered as a major ICT-related incident.

Yes, if there is other information not covered in the template or if the major ICT-related incident has been reclassified as non-major.

Yes, if there is other information not covered in the template or if the major ICT-related incident has been reclassified as non-major

Yes, if there is other information not covered in the template or if the major ICT-related incident has been reclassified as non-major

Alphanumeric

Content of the intermediate report

3.1.

Incident reference code provided by the competent authority

Unique reference code assigned by the competent authority at the time of receipt of the initial notification to unequivocally identify the major ICT-related incident.

No

Yes, if applicable

Yes, if applicable

Alphanumeric

3.2.

Date and time of occurrence of the incident

Date and time at which the major ICT-related incident has occurred, if different from the time the financial entity has become aware of the major ICT-related incident.

For recurring major ICT-related incidents, the date and the time at which the last major ICT-related incident has occurred.

No

Yes

Yes

ISO 8601 standard UTC (YYYY-MM-DD Thh: mm:ss)

3.3.

Date and time when services, activities or operations have been recovered

Information on the date and time of the recovery of the services, activities or operations affected by the major ICT-related incident.

No

Yes, if data field 3.16. ‘Service downtime’ has been populated

Yes, if data field 3.16. ‘Service downtime’ has been populated

ISO 8601 standard UTC (YYYY-MM-DD Thh: mm:ss)

3.4.

Number of clients affected

Number of clients affected by the major ICT-related incident that use the service provided by the financial entity.

When assessing the number of clients affected, financial entities shall take into account Articles 1(1) and 9(1), point (b), of Delegated Regulation (EU) 2024/1772 in their assessment. A financial entity that cannot determine the actual number of clients impacted shall use estimates based on available data from comparable reference periods.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, the total number of clients affected across all financial entities.

No

Yes

Yes

Numerical integer

3.5.

Percentage of clients affected

Percentage of clients affected by the major ICT-related incident in relation to the total number of clients that make use of the affected service provided by the financial entity. In case of more than one service affected, the services shall be provided in an aggregated manner.

Financial entities shall take into account Article 1(1) and Article 9(1), point (a), of Delegated Regulation (EU) 2024/1772 in their assessment.

A financial entity that cannot determine the actual percentage of clients impacted shall use estimates based on available data from comparable reference periods.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, a financial entity shall divide the sum of all affected clients by the total number of clients of all impacted financial entities.

No

Yes

Yes

Expressed as percentage – any value up to 5 numeric characters including up to 1 decimal place expressed as percentage (e.g. 2,4 instead of 2,4 %). If the value has more than 1 digit after the decimal, reporting counterparties shall round half-up

3.6.

Number of financial counterparts affected

Number of financial counterparts affected by the major ICT-related incident that have concluded a contract with the financial entity.

When assessing the number of financial counterparts affected, financial entities shall take into account Article 1(2) of Delegated Regulation (EU) 2024/1772 in their assessment. A financial entity that cannot determine the actual number of financial counterparts impacted shall use estimates based on available data from comparable reference periods.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, the total number of financial counterparts affected across all financial entities.

No

Yes

Yes

Numerical integer

3.7.

Percentage of financial counterparts affected

Percentage of financial counterparts affected by the major ICT-related incident in relation to the total number of financial counterparts that have concluded a contract with the financial entity.

When assessing the percentage of financial counterparts affected, financial entities shall take into account Articles 1(1) and 9(1), point (c) of Delegated Regulation (EU) 2024/1772 in their assessment.

A financial entity that cannot determine the actual percentage of financial counterparts impacted shall use estimates based on available data from comparable reference periods.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, indicate the sum of all affected financial counterparts divided by the total number of financial counterparts of all impacted financial entities.

No

Yes

Yes

Expressed as percentage – any value up to 5 numeric characters including up to 1 decimal place expressed as percentage (e.g. 2,4 instead of 2,4 %). If the value has more than 1 digit after the decimal, reporting counterparties shall round half-up

3.8.

Impact on relevant clients or financial counterparts

Any identified impact on relevant clients or financial counterpart as referred to in Article 1(3) and Article 9(1), point (f), of Delegated Regulation (EU) 2024/1772.

No

Yes, if ‘Relevance of clients and financial counterparts’ threshold is met

Yes, if ‘Relevance of clients and financial counterparts’ threshold is met

Boolean (Yes or No)

3.9.

Number of affected transactions

Number of transactions affected by the major ICT-related incident.

When assessing the impact on transactions, financial entities shall take into account Article 1(4) of Delegated Regulation (EU) 2024/1772, including all affected domestic and cross-border transactions containing a monetary amount that have at least one part of the transaction carried out in the Union.

A financial entity that cannot determine the actual number of transactions impacted shall use estimates based on available data from comparable reference periods.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, indicate the total number of transactions affected across all financial entities.

No

Yes, if any transaction has been affected by the incident

Yes, if any transaction has been affected by the incident

Numerical integer

3.10.

Percentage of affected transactions

Percentage of affected transactions in relation to the daily average number of domestic and cross-border transactions carried out by the financial entity related to the affected service.

Financial entities shall take into account Article 1(4) and Article 9(1), point (d), of Delegated Regulation (EU) 2024/1772.

A financial entity that cannot determine the actual percentage of transactions impacted shall use estimates.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, a financial entity shall sum the number of all affected transactions and divide the sum by the total number of transactions of all impacted financial entities.

No

Yes, if any transaction has been affected by the incident

Yes, if any transaction has been affected by the incident

Expressed as percentage – any value up to 5 numeric characters including up to 1 decimal place expressed as percentage (e.g. 2,4 instead of 2,4 %). If the value has more than 1 digit after the decimal, reporting counterparties shall round half-up

3.11.

Value of affected transactions

Total value of the transactions affected by the major ICT-related incident shall be assessed in accordance with Article 1(4) and Article 9(1), point (e) of Delegated Regulation (EU) 2024/1772.

A financial entity that cannot determine the actual value of transactions impacted shall use estimates based on available data from comparable reference periods.

A financial entity shall report the monetary amount as a positive value.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, the total value of the transactions affected across all financial entities.

No

Yes, if any transactions have been affected by the incident

Yes, if any transaction has been affected by the incident

Monetary

Financial entities shall report the data point in units using a minimum precision equivalent to thousands of units (e.g. 2,5 instead of EUR 2 500 ).

3.12.

Information on whether the numbers are actual or estimates, or whether there has not been any impact

Information on whether the values reported in the data fields 3.4 to 3.11 are actual or estimates, or whether there has not been any impact.

No

Yes

Yes

Choice (multiple):

actual figures for clients affected;

actual figures for financial counterparts affected;

actual figures for transactions affected;

estimates for clients affected;

estimates for financial counterparts affected;

estimates for transactions affected;

no impact on clients;

no impact on financial counterparts;

no impact on transactions.

3.13.

Reputational impact

Information about the reputational impact resulting from the major ICT-related incident as referred to in Articles 2 and 10 of Delegated Regulation (EU) 2024/1772.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, the reputational impact categories that apply to at least one financial entity.

No

Yes, if ‘Reputational impact’ criterion met

Yes, if ‘Reputational impact’ criterion met

Choice (multiple):

the major ICT-related incident has been reflected in the media;

the major ICT-related incident has resulted in repetitive complaints from different clients or financial counterparts on client-facing services or critical business relationships

the financial entity will not be able to or is likely not to be able to meet regulatory requirements as a result of the major ICT-related incident;

the financial entity will or is likely to lose clients or financial counterparts with a material impact on its business as a result of the major ICT-related incident.

3.14.

Contextual information about the reputational impact

Information describing how the major ICT-related incident has affected or could affect the reputation of the financial entity, including infringements of law, regulatory requirements not met, number of client complaints, and other.

The contextual information shall include the type of media (e.g. traditional and digital media, blogs, streaming platforms) and media coverage, including reach of the media (local, national, international). Media coverage in this context shall not mean a few negative comments by followers or users of social networks.

The financial entity shall also indicate whether the media coverage highlighted significant risks for its clients in relation to the major ICT-related incident, including the risk of the financial entity’s insolvency or the risk of losing funds.

Financial entities shall also indicate whether they have provided information to the media that served to reliably inform the public about the major ICT-related incident and its consequences.

Financial entities may also indicate whether there was false information in the media in relation to the ICT-related incident, including information based on deliberate misinformation spread by threat actors, or information relating to or illustrating defacement of the financial entity’s website.

No

Yes, if ‘Reputational impact’ criterion met.

Yes, if ‘Reputational impact’ criterion met.

Alphanumeric

3.15.

Duration of the incident

Financial entities shall measure the duration of the major ICT-related incident from the moment the major ICT-related incident occurred until the moment the incident was resolved.

Financial entities that are unable to determine the moment when the major ICT-related incident has occurred shall measure the duration of the major ICT-related incident from the earlier between the moment the financial entity detected the incident and the moment when the financial entity recorded the incident in network or system logs or other data sources. Financial entities that do not yet know the moment when the major ICT-related incident will be resolved shall apply estimates. The value shall be expressed in days, hours, and minutes.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, financial entities shall measure the longest duration of the major ICT-related incident in case of differences between financial entities.

No

Yes

Yes

DD:HH:MM

3.16.

Service downtime

Service downtime measured from the moment the service is fully or partially unavailable to clients, financial counterparts or other internal or external users, until the moment when regular activities or operations have been restored to the level of service that was provided prior to the major ICT-related incident.

Where the service downtime causes a delay in the provision of service after regular activities or operations have been restored, financial entities shall measure the downtime from the start of the major ICT-related incident until the moment when that delayed service is provided. Financial entities that are unable to determine the moment when the service downtime has started, shall measure the service downtime from the earlier between the moment the incident was detected and the moment when it has been recorded.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, financial entities shall measure the longest duration of the service downtime in case of differences between financial entities.

No

Yes, if the incident has caused a service downtime

Yes, if the incident has caused a service downtime

DD:HH:MM

3.17.

Information on whether the numbers for duration and service downtime are actual or estimates

Information on whether the values reported in data fields 3.15 and 3.16 are actual or estimates.

No

Yes, if ‘Duration and service downtime’ criterion met

Yes, if ‘Duration and service downtime’ criterion met

Choice:

Actual figures;

Estimates;

Actual figures and estimates;

No information available.

3.18.

Types of impact in the Member States

Type of impact in the respective EEA Member States.

Indication of whether the major ICT-related incident has had an impact in other EEA Member States (other than the Member State of the competent authority to which the incident is directly reported), in accordance with Article 4 of Delegated Regulation (EU) 2024/1772, and in particular with regard to the significance of the impact in relation to:

(a)

clients and financial counterparts affected in other Member States; or

(b)

branches or other financial entities within the group carrying out activities in other Member States; or

(c)

financial market infrastructures or third-party providers, which may affect financial entities in other Member States to which they provide services.

No

Yes, if ‘Geographical spread’ threshold is met

Yes, if ‘Geographical spread’ threshold is met

Choice (multiple):

clients;

financial counterparts;

branch of the financial entity;

financial entities within the group carrying out activities in the respective Member State;

financial market infrastructure;

third-party providers that may be common to other financial entities.

3.19.

Description of how the incident has an impact in other Member States

Description of the impact and severity of the major ICT-related incident in each affected Member State, including an assessment of the impact and severity on:

(a)

clients;

(b)

financial counterparts;

(c)

branches of the financial entity;

(d)

other financial entities within the group carrying out activities in the respective Member State;

(e)

financial market infrastructures;

(f)

third-party providers that may be common to other financial entities as applicable in other Member State(s).

No

Yes, if ‘Geographical spread’ threshold is met

Yes, if ‘Geographical spread’ threshold is met

Alphanumeric

3.20.

Materiality thresholds for the classification criterion ‘Data losses’

Type of data losses that the major ICT-related incident entails in relation to availability, authenticity, integrity, and confidentiality of data.

Financial entities shall take into account Articles 5 and 13 of Delegated Regulation (EU) 2024/1772 in their assessment.

In case of aggregated reporting as referred to in Article 7 of this Regulation, the data losses affecting at least one financial entity.

No

Yes, if ‘Data losses’ criterion is met

Yes, if ‘Data losses’ criterion is met

Choice (multiple):

availability;

authenticity;

integrity;

confidentiality.

3.21.

Description of the data losses

Description of the impact of the major ICT-related incident on availability, authenticity, integrity, and confidentiality of critical data in accordance with Articles 5 and 13 of Delegated Regulation (EU) 2024/1772.

Information about the impact on the implementation of the business objectives of the financial entity or on meeting regulatory requirements.

As part of the information provided, financial entities shall indicate whether the data affected are client data, other entities’ data (e.g. financial counterparts), or data of the financial entity itself.

The financial entity may also indicate the type of data involved in the incident – in particular, whether the data is confidential and what type of confidentiality was involved (e.g. commercial/business confidentiality, personal data, professional secrecy: banking secrecy, insurance secrecy, payment services secrecy, etc.).

The information may also include possible risks associated with the data losses, such as whether the data affected by the incident can be used to identify individuals and could be used by the threat actor to obtain credit or loans without their consent, to conduct spear phishing attacks, to disclose information publicly.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, a general description of the impact of the incident on the affected financial entities. Where there are differences of the impact, the description of the impact shall clearly indicate the specific impact on the different financial entities.

No

Yes, if ‘Data losses’ criterion is met

Yes, if ‘Data losses’ criterion is met

Alphanumeric

3.22.

Classification criterion ‘Critical services affected’

Information related to the criterion ‘Critical services affected’.

Financial entities shall take into account Articles 6 of Delegated Regulation (EU) 2024/1772 in their assessment, including information about:

the affected services or activities that require authorisation, registration or that are supervised by competent authorities; or

the ICT services or network and information systems that support critical or important functions of the financial entity; and

the nature of the malicious and unauthorised access to the network and information systems of the financial entity.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, the impact on critical services that apply to at least one financial entity.

No

Yes

Yes

Alphanumeric

3.23.

Type of the incident

Classification of incidents by type.

No

Yes

Yes

Choice (multiple):

Cybersecurity-related;

Process failure;

System failure;

External event;

Payment-related;

Other (please specify).

3.24.

Other types of incidents

Other types of ICT-related incidents: financial entities that have selected ‘other’ type of incidents in the data field 3.23, shall specify the type of ICT-related incident.

No

Yes, if ‘other’ type of incidents is selected in data field 3.23

Yes, if ‘other’ type of incidents is selected in data field 3.23

Alphanumeric

3.25.

Threats and techniques used by the threat actor

Indicate the threats and techniques used by the threat actor, including:

(a)

social engineering, including phishing;

(b)

(D)DoS;

(c)

identity theft;

(d)

data encryption for impact, including ransomware;

(e)

resource hijacking;

(f)

data exfiltration and manipulation, excluding identity theft;

(g)

data destruction;

(h)

defacement;

(i)

supply-chain attack;

(j)

other (please specify).

No

Yes, if the type of the ICT-related incident is ‘cybersecurity-related’ in field 3.23

Yes, if the type of the ICT-related incident is ‘cybersecurity-related’ in field 3.23

Choice (multiple):

Social engineering (including phishing);

(D)DoS;

Identity theft;

Data encryption for impact, including ransomware;

Resource hijacking;

Data exfiltration and manipulation, including identity theft;

Data destruction;

Defacement;

Supply-chain attack;

Other (please specify).

3.26.

Other types of techniques

Other types of techniques

Financial entities that have selected ‘other’ type of techniques in data field 3.25 shall specify the type of technique.

No

Yes, if other’ type of techniques is selected in data field 3.25

Yes, if other’ type of techniques is selected in data field 3.25

Alphanumeric

3.27.

Information about affected functional areas and business processes

Indication of the functional areas and business processes that are affected by the incident, including products and services.

The functional areas shall include but are not limited to:

(a)

marketing and business development;

(b)

customer service;

(c)

product management;

(d)

regulatory compliance;

(e)

risk management;

(f)

finance and accounting;

(g)

HR and general services;

(h)

information Technology.

The business processes shall include but are not limited to:

account information;

actuarial services;

acquiring of payment transactions;

authentication/authorization;

authority;

client on-boarding;

benefit administration;

benefit payment management;

buying and selling packaged insurances policies between insurances;

card payments;

cash management;

cash placement or withdrawals;

insurance claim management;

claim process insurance;

clearing;

corporate loans conglomerates;

collective insurances;

credit transfers;

custody and asset safekeeping;

customer onboarding;

data ingestion;

data processing;

direct debits;

export insurances;

finalizing trades/deals;

financial instruments placing;

fund accounting;

FX money;

investment advice;

investment management;

issuing of payment instruments;

lending management;

life insurance payments process;

money remittance;

net asset calculation;

order;

payment initiation;

insurance underwriting;

portfolio management;

premium collection;

reception/transmission/execution;

reinsurance;

settlement;

transaction monitoring.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, the affected functional areas and business processes in at least one financial entity.

No

Yes

Yes

Alphanumeric

3.28.

Affected infrastructure components supporting business processes

Information on whether infrastructure components (servers, operating systems, software, application servers, middleware, network components, others) supporting business processes have been affected by the major ICT-related incident.

No

Yes

Yes

Choice:

Yes;

No;

Information not available.

3.29.

Information about affected infrastructure components supporting business processes

Description on the impact of the major ICT-related incident on infrastructure components supporting business processes including hardware and software.

Hardware includes servers, computers, data centres, switches, routers, hubs. Software includes operating systems, applications, databases, security tools, network components, others please specify. The descriptions shall describe or name affected infrastructure components or systems, and, where available:

(a)

version information;

(b)

internal infrastructure/partially outsourced/fully outsourced – third-party provider name;

(c)

whether the infrastructure is used or shared across multiple business functions;

(d)

relevant resilience/continuity/recovery/ substitutability arrangements in place.

No

Yes, if the incident has affected infrastructure components supporting business processes

Yes, if the incident has affected infrastructure components supporting business processes

Alphanumeric

3.30.

Impact on the financial interest of clients

Information on whether the major ICT-related incident has impacted the financial interest of clients.

No

Yes

Yes

Choice:

Yes;

No;

Information not available.

3.31.

Reporting to other authorities

Specification of which authorities were informed about the major ICT-related incident.

Taking into account the differences resulting from the national legislation of the Member States, the concept of law enforcement authorities shall be understood by financial entities broadly to include public authorities empowered to prosecute cybercrime, including police, law enforcement agencies, and public prosecutors.

No

Yes

Yes

Choice (multiple):

Police/Law Enforcement;

CSIRT;

Data Protection Authority;

National Cybersecurity Agency;

None;

Other (please specify).

3.32.

Specification of ‘other’ authorities

Specification of ‘other’ types of authorities informed about the major ICT-related incident.

If selected in Data field 3.31 ‘Other’, the description shall include more detailed information about the authority to which the financial entity has submitted information about the major ICT-related incident.

No

Yes, if ‘other’ type of authorities have been informed by the financial entity about the major ICT-related incident.

Yes, if ‘other’ type of authorities have been informed by the financial entity about the major ICT-related incident

Alphanumeric

3.33.

Temporary actions/measures taken or planned to be taken to recover from the incident

Indication of whether financial entity has implemented (or plan to implement) any temporary actions that have been taken (or planned to be taken) to recover from the major ICT-related incident.

No

Yes

Yes

Boolean (Yes or No)

3.34.

Description of any temporary actions and measures taken or planned to be taken to recover from the incident

The information shall describe the immediate actions taken, including the isolation of the incident at the network level, workaround procedures activated, USB ports blocked, Disaster Recovery site activated, any other additional security controls temporarily put in place.

Financial entities shall indicate the date and the time of the implementation of the temporary actions and the expected date of return to the primary site. For any temporary actions that have not been implemented but are still planned, indication of the date by when their implementation is expected.

If no temporary actions/measures have been taken, please indicate the reason.

No

Yes, if temporary actions/measures have been taken or are planned to be taken (data field 3.33)

Yes, if temporary actions/measures have been taken or are planned to be taken (data field 3.33)

Alphanumeric

3.35.

Indicators of compromise

Information related to the major ICT-related incident that may help identify malicious activity within a network or information system (Indicators of Compromise, or IoC), where applicable.

The field applies only to those financial entities that fall within the scope of Directive (EU) 2022/2555 of the European Parliament and of the Council (1) and those financial entities financial entities identified as essential or important entities pursuant to national rules transposing Article 3 of Directive (EU) 2022/2555, where relevant.

The IoC provided by the financial entity shall include the following categories of data:

(a)

IP addresses;

(b)

URL addresses;

(c)

domains;

(d)

file hashes;

(e)

malware data (malware name, file names and their locations, specific registry keys associated with malware activity);

(f)

network activity data (ports, protocols, addresses, referrers, user agents, headers, specific logs or distinctive patterns in network traffic);

(g)

email message data (sender, recipient, subject, header, content);

(h)

DNS requests and registry configurations;

(i)

user account activities (logins, privileged user account activity, privilege escalation);

(j)

database traffic (read/write), requests to the same file.

In practice, this type of information may include data relating to, inter alia, indicators describing patterns in network traffic corresponding to known attacks/botnet communications, IP addresses of machines infected with malware (bots), data relating to ‘command and control’ servers used by malware (usually domains or IP addresses), and URLs relating to phishing sites or websites observed hosting malware or exploit kits.

No

Yes, if cybersecurity-related is selected as a type of incident in data field 3.23

Yes, if cybersecurity-related is selected as a type of incident in data field 3.23

Alphanumeric

Content of the final report

4.1.

High-level classification of root causes of the incident

High-level classification of root cause of the major ICT-related incident under the incident types, including the following high-level categories:

(a)

malicious actions;

(b)

process failure;

(c)

system failure/malfunction;

(d)

human error;

(e)

external event.

No

No

Yes

Choice (multiple):

malicious actions;

process failure;

system failure / malfunction;

human error;

external event.

4.2.

Detailed classification of root causes of the incident

Detailed classification of root causes of the major ICT-related incident under the incident types, including the following detailed categories linked to the high-level categories that are reported in data field 4.1:

1.

Malicious actions (if selected, choose one or more the following):

(a)

deliberate internal actions;

(b)

deliberate physical damage/manipulation/theft;

(c)

fraudulent actions.

2.

Process failure (if selected, choose one or more the following):

(a)

insufficient monitoring or failure of monitoring and control;

(b)

insufficient/unclear roles and responsibilities;

(c)

ICT risk management process failure;

(d)

insufficient or failure of ICT operations and ICT security operations;

(e)

insufficient or failure of ICT project management;

(f)

inadequate internal policies, procedures and documentation;

(g)

inadequate ICT systems acquisition, development, or maintenance;

(h)

other (please specify).

3.

System failure/malfunction (if selected, choose one or more the following):

(a)

hardware capacity and performance: major ICT-related incidents caused by hardware resources which prove inadequate in terms of capacity or performance to fulfil the applicable legislative requirements;

(b)

hardware maintenance: major ICT-related incidents resulting from inadequate or insufficient maintenance of hardware components, other than ‘Hardware obsolescence/ageing’;

(c)

hardware obsolescence/ageing: this root cause type involves major ICT-related incidents resulting from outdated or aging hardware components;

(d)

software compatibility/configuration: major ICT-related incidents caused by software components that are incompatible with other software or system configurations, including major ICT-related incidents resulting from software conflicts, incorrect settings, or misconfigured parameters that impact the overall system functionality;

(e)

software performance: major ICT-related incidents resulting from software components that exhibit poor performance or inefficiencies, for reasons other than those specified under ‘Software compatibility/configuration’, including major ICT-related incidents caused by slow response times, excessive resource consumption, or inefficient query execution impacting the performance of the software or system;

(f)

network configuration: major ICT-related incidents resulting from incorrect or misconfigured network settings or infrastructure, including major ICT-related incidents caused by network configuration errors, routing issues, firewall misconfigurations, or other network-related problems affecting connectivity or communication;

(g)

physical damage: major ICT-related incidents caused by physical damage to ICT infrastructure which lead to system failures;

(h)

other (please specify).

4.

Human error (if selected, choose one or more the following):

(a)

omission (unintentional);

(b)

mistake;

(c)

skills & knowledge: major ICT-related incidents resulting from a lack of expertise or proficiency in handling ICT systems or processes that may be caused by inadequate training, insufficient knowledge, or gaps in skills required to perform specific tasks or address technical challenges;

(d)

inadequate human resources: major ICT-related incidents caused by a lack of necessary resources, including hardware, software, infrastructure, or personnel, and including situations where insufficient resources lead to operational inefficiencies, system failures, or an inability to meet business demands;

(e)

miscommunication;

(f)

other (please specify).

5.

External event (if selected, choose one or more the following):

(a)

natural disasters/force majeure;

(b)

third-party failures;

(c)

other (please specify).

Financial entities shall consider that for recurring major ICT-related incidents, the specific apparent root cause of the incident is taken into account and not the broad categories included in this field.

No

No

Yes

Choice (multiple):

malicious actions: deliberate internal actions;

malicious actions: deliberate physical damage/manipulation/theft;

malicious actions: fraudulent actions;

process failure: insufficient monitoring or failure of monitoring and control;

process failure: insufficient/unclear roles and responsibilities;

process failure: ICT risk management process failure;

process failure: insufficient or failure of ICT operations and ICT security operations;

process failure: insufficient or failure of ICT project management;

process failure: inadequacy of internal policies, procedures and documentation;

Process failure: inadequate ICT systems acquisition, development, and maintenance;

process failure: other (please specify);

system failure: hardware capacity and performance;

system failure: hardware maintenance;

system failure: hardware obsolescence/ageing;

system failure: software compatibility/configuration;

system failure: software performance;

system failure: network configuration;

system failure: physical damage;

system failure: other (please specify);

human error: omission;

human error: mistake;

human error: skills & knowledge;

human error: inadequate human resources;

human error miscommunication;

human error: other (please specify);

external event: natural disasters/force majeure;

external event: third-party failures;

external event: other (please specify).

4.3.

Additional classification of root causes of the incident

Additional classification of root causes of the major ICT-related incident under the incident type, including the following additional classification categories linked to the detailed categories that are to be reported in data field 4.2.

The field is mandatory for the final report if specific categories that require further granularity are reported in data field 4.2.

2(a)

Insufficient or failure of monitoring and control:

(a)

monitoring of policy adherence;

(b)

monitoring of third-party service providers;

(c)

monitoring and verification of remediation of vulnerabilities;

(d)

identity and access management;

(e)

encryption and cryptography;

(f)

logging.

2(c)

ICT risk management process failure:

(a)

failure in specifying accurate risk tolerance levels;

(b)

insufficient vulnerability and threat assessments;

(c)

inadequate risk treatment measures;

(d)

poor management of residual ICT risks.

2(d)

Insufficient or failure of ICT operations and ICT security operations:

(a)

vulnerability and patch management;

(b)

change management;

(c)

capacity and performance management;

(d)

ICT asset management and information classification;

(e)

backup and restore;

(f)

error handling.

2(g)

Inadequate ICT Systems acquisition, development, and maintenance:

(a)

inadequate ICT Systems acquisition, development, and maintenance;

(b)

insufficient software testing or failure of software testing.

No

No

Yes

Choice (multiple):

monitoring of policy adherence;

monitoring of third-party service providers;

monitoring and verification of remediation of vulnerabilities;

identity and access management;

encryption and cryptography;

logging;

failure in specifying accurate risk tolerance levels;

insufficient vulnerability and threat assessments;

inadequate risk treatment measures;

poor management of residual ICT risks;

vulnerability and patch management;

change management;

capacity and performance management;

ICT asset management and information classification;

backup and restore;

error handling;

inadequate ICT systems acquisition, development, and maintenance;

insufficient or failure of software testing.

4.4.

Other types of root cause types

Financial entities that have selected ‘other’ type of root cause in data field 4.2 shall specify other types of root cause types

No

No

Yes, if ‘other’ type of root causes is selected in data field 4.2.

Alphanumeric

4.5.

Information about the root causes of the incident

Description of the sequence of events that led to the major ICT-related incident and description of how the major ICT-related incident has a similar apparent root cause if that incident is classified as a recurring incident, including a concise description of all underlying reasons and primary factors that contributed to the occurrence of the major ICT-related incident.

Where there were malicious actions, description of the modus operandi of the malicious action, including the tactics, techniques and procedures used, as well as the entry vector of the major ICT-related incident, including a description of the investigations and analysis that led to the identification of the root causes, if applicable.

No

No

Yes

Alphanumeric

4.6.

Incident resolution

Additional information regarding the actions/measures taken/planned to permanently resolve the major ICT-related incident and to prevent that incident from happening again.

Lessons learnt from the major ICT-related incident.

The description shall contain the following points:

1.

Resolution actions description

(a)

Actions taken to permanently resolve the major ICT-related incident (excluding any temporary actions);

(b)

for each action taken, indicate the potential involvement of a third-party provider and of the financial entity;

(c)

indicate whether procedures have been adapted following the major ICT-related incident;

(d)

indicate any additional controls that were put in place or that are planned with related implementation timeline.

Potential issues identified regarding the robustness of the IT systems impacted /or in terms of the procedures or controls in place, if applicable.

Financial entities shall clearly indicate how the envisaged remediation actions will address the identified root causes and when the major ICT-related incident is expected to be resolved permanently.

2.

Lessons learnt

Financial entities shall describe findings from the post-incident review.

No

No

Yes

Alphanumeric

4.7.

Date and time when the incident root cause was addressed

Date and time when the incident root cause was addressed.

No

No

Yes

ISO 8601 standard UTC (YYYY-MM-DD Thh: mm:ss)

4.8.

Date and time when the incident was resolved

Date and time when the incident was resolved.

No

No

Yes

ISO 8601 standard UTC (YYYY-MM-DD Thh: mm:ss)

4.9.

Information if the permanent resolution date of the incidents differs from the initially planned implementation date

Descriptions of the reason why the permanent resolution date of the major ICT-related incidents is different from the initially planned implementation date, where applicable.

No

No

Yes

Alphanumeric

4.10.

Assessment of risk to critical functions for resolution purposes

Assessment of whether the major ICT-related incident poses a risk to critical functions within the meaning of Article 2(1), point (35), of Directive 2014/59/EU of the European Parliament and of the Council (2).

Entities as referred to in Article 1(1) of Directive 2014/59/EU shall indicate whether the incident poses a risk to the critical functions within the meaning of Article 2(1), point (35), of Directive 2014/59/EU, and as reported in Template Z07.01 of Commission Implementing Regulation (EU) 2018/1624 (3) and mapped to the specific entity in Template Z07.02.

No

No

Yes, if the incident poses a risk to critical functions of financial entities under Article 2(1), point 35, of Directive 2014/59/EU

Alphanumeric

4.11.

Information relevant for resolution authorities

Description of whether and, if so, how the major ICT-related incident has affected the resolvability of the entity or the group.

Entities as referred to in Article 1(1) of Directive 2014/59/EU shall provide information on whether and, if so, how the major ICT-related incident has affected the resolvability of the entity or the group.

Those entities shall also indicate whether the major ICT-related incident affects the solvency or liquidity of the financial entity and the potential quantification of the impact.

Those entities shall also provide information on the impact on operational continuity, impact on resolvability of the entity, any additional impact on the costs and losses from the major ICT-related incident, including on the financial entity’s capital position, and whether the contractual arrangements on the use of ICT services are still robust and fully enforceable in the event of resolution of the entity.

No

No

Yes, if the incident has affected the resolvability of the entity or the group

Alphanumeric

4.12.

Materiality threshold for the classification criterion ‘Economic impact’

Detailed information about thresholds eventually reached by the major ICT-related incident in relation to the criterion ‘Economic impact’ referred to in Articles 7 and 14 of the Delegated Regulation (EU) 2024/1772.

No

No

Yes

Alphanumeric

4.13.

Amount of gross direct and indirect costs and losses

Total amount of gross direct and indirect costs and losses incurred by the financial entity stemming from the major ICT-related incident, including:

(a)

the amount of expropriated funds or financial assets for which the financial entity is liable;

(b)

the amount of replacement or relocation costs of software, hardware or infrastructure;

(c)

the amount of staff costs, including costs associated to replacing or relocating staff, hiring extra staff, remuneration of overtime and recovering lost or impaired skills of staff;

(d)

the amount of fees due to non-compliance with contractual obligations;

(e)

the amount of customer redress and compensation costs;

(f)

the amount of losses due to forgone revenues;

(g)

the amount of costs associated with internal and external communication;

(h)

the amount of advisory costs, including costs associated with legal counselling, forensic and remediation services;

(i)

the amount other costs and losses, including:

(i)

direct charges, including impairments and settlement charges, to the profit and loss account and write-downs due to the major ICT-related incident;

(ii)

provisions or reserves accounted for in the profit and loss account against probable losses related to the major ICT-related incident;

(iii)

pending losses, in the form of losses stemming from the major ICT-related incident, which are temporarily booked in transitory or suspense accounts and are not yet reflected in the profit and loss which are planned to be included within a time period commensurate to the size and age of the pending item;

(iv)

material uncollected revenues, related to contractual obligations with third parties, including the decision to compensate a client following the major ICT-related incident, rather than by a reimbursement or direct payment, through a revenue adjustment waiving or reducing contractual fees for a specific future period of time;

(v)

timing losses, where they span more than one financial accounting year and give rise to legal risk.

Financial entities shall take into account in their assessment Article 7(1) and (2) of Delegated Regulation (EU) 2024/1772. Financial entities shall not include in this figure financial recoveries of any type.

Financial entities shall report the monetary amount as a positive value.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, financial entities shall take into account the total amount of costs and losses across all financial entities.

Financial entities shall report the data point in units using a minimum precision equivalent to thousands of units.

No

No

Yes

Monetary

4.14.

Amount of financial recoveries

Total amount of financial recoveries.

Financial recoveries shall relate to the original loss caused by the incident, independently from the time when the financial recoveries in the form of funds or inflows of economic benefits are received.

Financial entities shall report the monetary amount as a positive value.

In the case of aggregated reporting as referred to in Article 7 of this Regulation, financial entities shall take into account the total amount of financial recoveries across all financial entities.

No

No

Yes

Monetary

Financial entities shall report the data point in units using a minimum precision equivalent to thousands of units

4.15.

Information on whether the non-major incidents have been recurring

Information on whether more than one non-major ICT-related incident have been recurring and are together considered to be a major incident within the meaning of Article 8(2) of Delegated Regulation (EU) 2024/1772.

Financial entities shall indicate whether the non-major ICT-related incidents have been recurring and are together considered as one major ICT-related incident.

Financial entities shall also indicate the number of occurrences of these non-major ICT-related incidents.

No

No

Yes, if the major incident comprises more than one non-major recurring incidents.

Alphanumeric

4.16.

Date and time of occurrence of recurring incidents

Where financial entities report recurring ICT-related incidents, date and time at which the first ICT-related incident has occurred.

No

No

Yes, for recurring incidents

ISO 8601 standard UTC (YYYY-MM-DD Thh: mm:ss)


(1)  Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive) (OJ L 333, 27.12.2022, p. 80, 2022/2555/oj" >http://data.europa.eu/eli/dir/2022/2555/oj).

(2)  Directive 2014/59/EU of the European Parliament and of the Council of 15 May 2014 establishing a framework for the recovery and resolution of credit institutions and investment firms and amending Council Directive 82/891/EEC, and Directives 2001/24/EC, 2002/47/EC, 2004/25/EC, 2005/56/EC, 2007/36/EC, 2011/35/EU, 2012/30/EU and 2013/36/EU, and Regulations (EU) No 1093/2010 and (EU) No 648/2012, of the European Parliament and of the Council (OJ L 173, 12.6.2014, p. 190, http://data.europa.eu/eli/dir/2014/59/oj).

(3)  Commission Implementing Regulation (EU) 2018/1624 of 23 October 2018 laying down implementing technical standards with regard to procedures and standard forms and templates for the provision of information for the purposes of resolution plans for credit institutions and investment firms pursuant to Directive 2014/59/EU of the European Parliament and of the Council, and repealing Commission Implementing Regulation (EU) 2016/1066 (OJ L 277, 7.11.2018, p. 1, 2018/1624/oj" >http://data.europa.eu/eli/reg_impl/2018/1624/oj).