Operational Resilience
DETAIL

ECB CROE — Cyber Resilience Oversight Expectations for Financial Market Infrastructures

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting.
Framework text may require a separate license unless explicitly provided.

Overview

ECB CROE — Cyber Resilience Oversight Expectations for Financial Market Infrastructures is a supervisory framework that establishes cybersecurity expectations for financial market infrastructures (FMIs) operating in the European Union. The framework defines principles and expectations for cyber resilience to protect critical financial systems and maintain the stability of EU financial markets.

Published by the European Central Bank (ECB), the CROE applies to FMIs including central counterparties, central securities depositories, and payment systems under ECB oversight. It covers governance, identification, protection, detection, response, recovery, and testing — aligned with international standards such as CPMI-IOSCO guidance.

FMIs implement CROE by developing cyber resilience strategies, conducting risk assessments, establishing incident response plans, and undergoing regular cyber resilience testing. The framework supports broader regulatory compliance and is increasingly referenced alongside DORA requirements for EU financial sector entities.

Why it Matters

ECB CROE establishes mandatory cybersecurity expectations for EU financial market infrastructures that underpin the stability of European financial markets.

Key benefits include:

  • Strengthen systemic cyber resilience

Establish robust cybersecurity practices protecting critical infrastructure that supports settlement, clearing, and payment across EU markets.

  • Enhance regulatory alignment

Meet ECB supervisory expectations and align with CPMI-IOSCO guidance, DORA, and other EU cybersecurity regulatory requirements.

  • Improve incident response capability

Develop structured response and recovery processes to minimize the impact of cyber incidents on market operations.

  • Increase testing and assurance maturity

Demonstrate cyber resilience through regular threat-led penetration testing and scenario-based exercises.

  • Promote governance and accountability

Establish board-level ownership and systematic oversight of cyber resilience across FMI operations and third-party relationships.

How it Works

ECB CROE structures cyber resilience around seven components: governance, identification, protection, detection, response and recovery, testing, and situational awareness. Each component defines specific expectations that FMIs must address in their cyber resilience programs. The framework emphasizes proportionality, requiring stronger controls for FMIs with greater systemic importance.

FMIs implement CROE through cyber resilience strategies endorsed by the board, comprehensive risk identification exercises, deployment of protective controls, and robust detection and response capabilities. Regular TLPT (Threat-Led Penetration Testing) exercises verify resilience effectiveness and inform continuous improvement.

Within SmartSuite, organizations track CROE component implementation, manage cyber resilience testing schedules, document incident response procedures, and maintain evidence for ECB supervisory reviews through integrated governance and compliance workflows.

Key Elements

  • Governance and Accountability Structure

Establishes board-level responsibility and management oversight for cyber resilience across FMI operations.

  • Identification and Risk Assessment

Defines processes for identifying critical systems, assets, and cyber risks affecting financial market operations.

  • Protection Mechanisms

Specifies controls safeguarding FMI systems and data from unauthorized access, disruption, and compromise.

  • Detection Capabilities

Outlines monitoring and detection processes to identify cyber incidents affecting FMI infrastructure.

  • Response and Recovery Framework

Establishes structured processes for managing cyber incidents and restoring critical FMI services.

  • Testing and Validation Activities

Requires regular cyber resilience testing including TLPT to verify effectiveness of implemented controls.

Framework Scope

ECB CROE applies to financial market infrastructures under ECB oversight including central counterparties, central securities depositories, and systemically important payment systems operating in the European Union.

Framework Objectives

ECB CROE establishes cyber resilience expectations to protect EU financial market infrastructure and maintain systemic financial stability.

  • Establish governance and board-level accountability for cyber resilience
  • Identify and protect critical assets supporting EU financial market operations
  • Implement robust detection, response, and recovery capabilities
  • Conduct regular testing including threat-led penetration testing
  • Maintain situational awareness and share threat intelligence
  • Align with CPMI-IOSCO guidance and EU regulatory requirements

ECB CROE aligns with CPMI-IOSCO Guidance on Cyber Resilience, ISO/IEC 27001, and the NIST Cybersecurity Framework. FMIs implement it to meet ECB supervisory expectations, align with DORA requirements, and demonstrate robust cyber resilience protecting systemic financial infrastructure.

Common Framework Mappings

Organizations map ECB CROE to complementary cybersecurity and operational resilience frameworks to align FMI-specific controls with broader enterprise security programs and regulatory requirements.

Mapped frameworks include:

CPMI-IOSCO Guidance on Cyber Resilience for Financial Market Infrastructures

Digital Operational Resilience Act (DORA)

ISO/IEC 27001

ISO/IEC 27002

NIST Cybersecurity Framework

NIST SP 800-53

TIBER-EU

UK CBEST

At a Glance
ECB CROE — Cyber Resilience Oversight Expectations for Financial Market Infrastructures
  • checklist
    Classicifation
    Category
    info
    Operational Resilience
    Domain
    info
    Operational Resilience
    Framework Family
    info
    Other
  • info
    Regulatory Context
    Type
    info
    Guidance
    Legal Instrument
    info
    Guideline
    Sector
    info
    Financial Sector
    Industry
    info
    Financial Services
  • arrow_upload_ready
    Region / Publisher
    Region
    info
    Europe
    Region Detail
    info
    Euro area
    Publisher
    info
    European Central Bank (ECB)
  • published_with_changes
    Versioning
    Version
    info
    CROE Framework
    Effective Date
    info
    2019
    Issue Date
    info
    May 6, 2019
  • graph_3
    Adoption
    Adoption Model
    info
    Regulatory Compliance
    Implementation Complexity
    info
    High
  • captive_portal
    Official Reference
License Information

License included / downloadable: Yes

The ECB Cyber Resilience Oversight Expectations framework is publicly available through the European Central Bank.

Official Resources
ECB Cyber Resilience Oversight Expectations Document
Defines the cyber resilience expectations for financial market infrastructures as published by ECB.
chevron_forward
SMARTSUITE

How SmartSuite Supports ECB CROE

Centralize controls, evidence, and audit workflows to stay continuously SOC 2–ready.

CROE Expectation Mapping

Map CROE expectations to controls, owners, and evidence sources.

Test Scheduling and Remediation Tracking

Schedule tests, capture results, and track remediation through closure.

Situational Awareness Evidence Hub

Track monitoring coverage, threat intelligence inputs, and detection validation proof.

Incident Response and Recovery Workflows

Run incidents and recovery tasks with full documentation and improvement actions.

Third-Party and Dependency Oversight

Manage provider risk, monitoring, and exit planning evidence.

Executive and Oversight Reporting

Report readiness, gaps, and maturity progression for governance stakeholders.

Related frameworks

EU DORA

DORA is an EU regulation requiring financial firms to manage ICT risks, report incidents, test security, and oversee third-party providers.

Learn More
arrow_forward
ISO 22301

ISO 22301 is a business continuity management standard helping organizations prepare for, respond to, and recover from disruptions.

Learn More
arrow_forward
ISO 27001:2022

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

Learn More
arrow_forward
ISO 27002:2022

ISO/IEC 27002:2022 provides best-practice information security controls to help organizations select, implement, and manage protections for information assets.

Learn More
arrow_forward
NIST CSF 2.0

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.

Learn More
arrow_forward
NIST 800-53 Rev.5

NIST SP 800-53 Rev. 5 provides a catalog of security and privacy controls to manage risks to information systems.

Learn More
arrow_forward
SWIFT CSCF

SWIFT Customer Security Framework establishes baseline cybersecurity controls for organizations using the SWIFT network to secure financial transactions.

Learn More
arrow_forward
ONBOARDING FAQS

Frequently Asked Questions For ECB CROE (Cyber Resilience Oversight Expectations for Financial Market Infrastructures)

What is ECB CROE used for?

ECB CROE is used to establish standardized expectations for the cyber resilience of systemically important financial market infrastructures (FMIs) within the Eurozone. The framework ensures these organizations can protect, detect, respond to, and recover from cyber incidents, thus contributing to the stability of the broader financial system.

Is ECB CROE mandatory or certifiable?

ECB CROE is not a certifiable standard, but it is a supervisory expectation issued by the European Central Bank for critical FMIs. Compliance is required for FMIs overseen by the ECB, and adherence is reviewed through regulatory oversight activities rather than a formal certification process.

Which organizations does ECB CROE apply to?

ECB CROE applies to systemically important FMIs operating within the Eurozone, such as payment systems, central securities depositories, and central counterparties. Organizations are expected to align with CROE if they are designated as critical to financial market infrastructure stability.

What are the key domains or control areas in ECB CROE?

The framework is structured around operational resilience domains, including governance, identification, protection, detection, response, and recovery. Each domain contains requirements for risk management processes, security controls, incident response, and continuous improvement.

How do organizations implement ECB CROE requirements?

Implementation involves assessing current resilience practices against CROE’s expectations, conducting risk assessments, updating security controls, and refining incident response and recovery plans. Organizations must document compliance activities, conduct regular reviews, and ensure continuous improvement of cyber resilience capabilities.

How does ECB CROE align with other cybersecurity frameworks?

ECB CROE is informed by global benchmarks such as CPMI-IOSCO guidance and other regulatory and industry standards. Alignment allows organizations to integrate CROE requirements into existing compliance programs and leverage synergies with frameworks like ISO 27001 or NIST CSF.

What are the ongoing compliance and maintenance requirements for ECB CROE?

Organizations must regularly review and update resilience controls, conduct incident response exercises, and monitor the effectiveness of risk mitigation measures. Ongoing oversight, audit trails, and continuous improvement are essential to demonstrate continued alignment with ECB CROE expectations.

How would SmartSuite support ECB CROE?

SmartSuite enables organizations to manage ECB CROE by centralizing risk tracking, mapping and tracking control implementation, and organizing supporting evidence for compliance. The platform offers incident and remediation workflows, real-time dashboards for audit readiness, and reporting tools to support documentation and oversight of operational resilience activities.

NEXT STEP

Put CRI Profile into action with SmartSuite

Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

Explore in SmartSuite
chevron_forward
View all Frameworks
chevron_forward