🧾 Overview

Name: Joint Standard 2 of 2024 – Cybersecurity and Cyber Resilience Requirements for Financial Institutions

Act no: N/A

Effective Date: 1 June 2025

Type: Principle-based

Regulator: Financial Sector Conduct Authority (FSCA) and Prudential Authority (PA)

Purpose: Establishes minimum cybersecurity and cyber resilience standards for financial institutions to safeguard IT systems, data, and services.

👥 Who Does This Affect?

Direct Applicability:

a) A bank, a branch, a branch of a bank and a controlling company as respectively defined in section 1 of the Banks Act, 1990 (Act No. 94 of 1990);
b) A mutual bank as defined in section 1 of the Mutual Banks Act, 1993 (Act No. 24 of 1993);
c) An insurer and a controlling company as defined in section 1 of the Insurance Act, 2017 (Act No. 18 of 2017);
d) A manager as defined in section 1 of the Collective Investment Scheme Control Act, 2002 (Act No. 45 of 2002);
e) A market infrastructure as defined in section 1 of the Financial Markets Act 2012 (Act No. 19 of 2012);
f) A discretionary FSP as defined in Chapter II of the Notice on Codes of Conduct for Administrative and Discretionary FSPs, 2003 (Category II);
g) A category 1 FSP as contemplated in section 3(a) of the Determination of Fit and Proper Requirements for FSPs, 2017, that provides investment fund administration services;
h) An administrative FSP as defined in Chapter I of the Notice on Codes of Conduct for Administrative and Discretionary FSPs, 2003 (Category III);
i) A pension fund registered under the Pension Funds Act, 1956 (Act No. 24 of 1956);
j) An OTC derivative provider as defined in the Financial Markets Act Regulations;
k) An administrator approved in terms of Section 13B of the Pension Funds Act, 1956 (Act No.24 of 1956) and
l) A registered credit rating agency as defined in section 1 of the Credit Rating Services Act, 2012 (Act No 24 of 2012)

High Impact On:

Financial Service Providers (FSPs), IT vendors servicing financial institutions.

📋 Key Requirements Relating to Cybersecurity

  • Board Accountability: Governing body must oversee cyber risk and approve cybersecurity strategies and frameworks [Clause 4.1, 4.2]
  • Cybersecurity Strategy: Institutions must establish, maintain, and annually review a cybersecurity strategy aligned to business objectives [Clause 6.1.1–6.1.2]
  • Access and Identity Management: Implement strict access controls and identity verification processes including strong authentication and remote access policies [Clause 7.2.2]
  • Data Security Controls: Encrypt sensitive data, control endpoint access, and enforce secure data handling in both production and non-production environments [Clause 7.2.3]
  • Incident Response and Recovery: Maintain tested plans for rapid response and recovery from cyber incidents, with defined RPO and RTO [Clause 7.4.1–7.5.1]
  • Threat Intelligence Sharing: Participate in external cyber threat intelligence sharing and ensure internal monitoring systems are in place [Clause 7.6.2]
  • Vulnerability and Penetration Testing: Regular vulnerability scans and penetration testing (black, grey, white box) on critical systems [Clause 7.7.2–7.7.3]
  • Multi-Factor Authentication: Enforce MFA for critical systems, privileged accounts, and internet-facing applications [Clause 8.3.1]
  • Malware and Patch Management: Proactively manage malware threats and apply patches in a timely and risk-based manner [Clause 8.5.1, 8.7.1]

⚠️ Consequences of Non-Compliance

Financial Penalties:

Administrative penalties [Section 167 – Financial Sector Regulation Act]

Criminal Penalties:

N/A

Regulatory Consequences:

Institutions may face regulatory interventions including supervisory reviews and enforceable undertakings [Section 134 – Financial Sector Regulation Act]

Reputational Harm:

Customers are likely to lose faith in an FSP that has been exposed to security vulnerabilities or has failed to protect their data, leading to a decline in customer base and potential loss of revenue.

✅ How ARMD.digital Helps You Comply

Product:

What it does:

Performs a safe, external scan of your public digital footprint to detect security weaknesses visible to attackers.

How it supports compliance:

  • Vulnerability Assessment: Enables regular vulnerability identification aligned with the institution’s external exposure profile [Clause 7.7.2]
  • Vulnerability and Patch Management: Identifies external vulnerabilities to inform patching and mitigation priorities [Clause 8.5.1]

Product:

What it does:

Enforces domain-based email authentication to block spoofing, stop phishing, and boost email deliverability.

How it supports compliance:

  • Email System Authorisation: Ensures that only authorised email systems and domains are used for communication, reducing the risk of impersonation attacks [Clause 7.2.3(a)(v)]
  • Internet Service Control: Helps detect and block unauthorised use of email-related internet services that could leak sensitive information [Clause 7.2.3(a)(vi)]

📚 Additional Resources

Explore More Regulations