Article 25 - Testing of ICT tools and systems
1)
The digital operational resilience testing programme referred to in Article 24 shall provide, in accordance with the
criteria set out in Article 4(2), for the execution of appropriate tests, such as vulnerability assessments and scans, open
source analyses, network security assessments, gap analyses, physical security reviews, questionnaires and scanning
software solutions, source code reviews where feasible, scenario-based tests, compatibility testing, performance testing,
end-to-end testing and penetration testing.
criteria set out in Article 4(2), for the execution of appropriate tests, such as vulnerability assessments and scans, open
source analyses, network security assessments, gap analyses, physical security reviews, questionnaires and scanning
software solutions, source code reviews where feasible, scenario-based tests, compatibility testing, performance testing,
end-to-end testing and penetration testing.
2)
Central securities depositories and central counterparties shall perform vulnerability assessments before any
deployment or redeployment of new or existing applications and infrastructure components, and ICT services supporting
critical or important functions of the financial entity
deployment or redeployment of new or existing applications and infrastructure components, and ICT services supporting
critical or important functions of the financial entity
3)
Microenterprises shall perform the tests referred to in paragraph 1 by combining a risk-based approach with a
strategic planning of ICT testing, by duly considering the need to maintain a balanced approach between the scale of
resources and the time to be allocated to the ICT testing provided for in this Article, on the one hand, and the urgency,
type of risk, criticality of information assets and of services provided, as well as any other relevant factor, including the
financial entity’s ability to take calculated risks, on the other hand
strategic planning of ICT testing, by duly considering the need to maintain a balanced approach between the scale of
resources and the time to be allocated to the ICT testing provided for in this Article, on the one hand, and the urgency,
type of risk, criticality of information assets and of services provided, as well as any other relevant factor, including the
financial entity’s ability to take calculated risks, on the other hand