ECB CROE — Cyber Resilience Oversight Expectations for Financial Market Infrastructures

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting. Framework text may require a separate license unless explicitly provided.
Overview
ECB CROE — Cyber Resilience Oversight Expectations for Financial Market Infrastructures is a supervisory framework that establishes cybersecurity expectations for financial market infrastructures (FMIs) operating in the European Union. The framework defines principles and expectations for cyber resilience to protect critical financial systems and maintain the stability of EU financial markets.
Published by the European Central Bank (ECB), the CROE applies to FMIs including central counterparties, central securities depositories, and payment systems under ECB oversight. It covers governance, identification, protection, detection, response, recovery, and testing — aligned with international standards such as CPMI-IOSCO guidance.
FMIs implement CROE by developing cyber resilience strategies, conducting risk assessments, establishing incident response plans, and undergoing regular cyber resilience testing. The framework supports broader regulatory compliance and is increasingly referenced alongside DORA requirements for EU financial sector entities.
Why it Matters
ECB CROE establishes mandatory cybersecurity expectations for EU financial market infrastructures that underpin the stability of European financial markets.
Key benefits include:
- Strengthen systemic cyber resilience
Establish robust cybersecurity practices protecting critical infrastructure that supports settlement, clearing, and payment across EU markets.
- Enhance regulatory alignment
Meet ECB supervisory expectations and align with CPMI-IOSCO guidance, DORA, and other EU cybersecurity regulatory requirements.
- Improve incident response capability
Develop structured response and recovery processes to minimize the impact of cyber incidents on market operations.
- Increase testing and assurance maturity
Demonstrate cyber resilience through regular threat-led penetration testing and scenario-based exercises.
- Promote governance and accountability
Establish board-level ownership and systematic oversight of cyber resilience across FMI operations and third-party relationships.
How it Works
ECB CROE structures cyber resilience around seven components: governance, identification, protection, detection, response and recovery, testing, and situational awareness. Each component defines specific expectations that FMIs must address in their cyber resilience programs. The framework emphasizes proportionality, requiring stronger controls for FMIs with greater systemic importance.
FMIs implement CROE through cyber resilience strategies endorsed by the board, comprehensive risk identification exercises, deployment of protective controls, and robust detection and response capabilities. Regular TLPT (Threat-Led Penetration Testing) exercises verify resilience effectiveness and inform continuous improvement.
Within SmartSuite, organizations track CROE component implementation, manage cyber resilience testing schedules, document incident response procedures, and maintain evidence for ECB supervisory reviews through integrated governance and compliance workflows.
Key Elements
- Governance and Accountability Structure
Establishes board-level responsibility and management oversight for cyber resilience across FMI operations.
- Identification and Risk Assessment
Defines processes for identifying critical systems, assets, and cyber risks affecting financial market operations.
- Protection Mechanisms
Specifies controls safeguarding FMI systems and data from unauthorized access, disruption, and compromise.
- Detection Capabilities
Outlines monitoring and detection processes to identify cyber incidents affecting FMI infrastructure.
- Response and Recovery Framework
Establishes structured processes for managing cyber incidents and restoring critical FMI services.
- Testing and Validation Activities
Requires regular cyber resilience testing including TLPT to verify effectiveness of implemented controls.
Framework Scope
ECB CROE applies to financial market infrastructures under ECB oversight including central counterparties, central securities depositories, and systemically important payment systems operating in the European Union.
Framework Objectives
ECB CROE establishes cyber resilience expectations to protect EU financial market infrastructure and maintain systemic financial stability.
- Establish governance and board-level accountability for cyber resilience
- Identify and protect critical assets supporting EU financial market operations
- Implement robust detection, response, and recovery capabilities
- Conduct regular testing including threat-led penetration testing
- Maintain situational awareness and share threat intelligence
- Align with CPMI-IOSCO guidance and EU regulatory requirements
ECB CROE aligns with CPMI-IOSCO Guidance on Cyber Resilience, ISO/IEC 27001, and the NIST Cybersecurity Framework. FMIs implement it to meet ECB supervisory expectations, align with DORA requirements, and demonstrate robust cyber resilience protecting systemic financial infrastructure.
Common Framework Mappings
Organizations map ECB CROE to complementary cybersecurity and operational resilience frameworks to align FMI-specific controls with broader enterprise security programs and regulatory requirements.
Mapped frameworks include:
CPMI-IOSCO Guidance on Cyber Resilience for Financial Market Infrastructures
Digital Operational Resilience Act (DORA)
ISO/IEC 27001
ISO/IEC 27002
NIST Cybersecurity Framework
NIST SP 800-53
TIBER-EU
UK CBEST
- ClassicifationCategoryOperational ResilienceDomainOperational ResilienceFramework FamilyOther
- Regulatory ContextTypeGuidanceLegal InstrumentGuidelineSectorFinancial SectorIndustryFinancial Services
- Region / PublisherRegionEuropeRegion DetailEuro areaPublisherEuropean Central Bank (ECB)
- VersioningVersionCROE FrameworkEffective Date2019Issue DateMay 6, 2019
- AdoptionAdoption ModelRegulatory ComplianceImplementation ComplexityHigh
- Official ReferenceOpen Link in New TabSource
License included / downloadable: Yes
The ECB Cyber Resilience Oversight Expectations framework is publicly available through the European Central Bank.
How SmartSuite Supports ECB CROE
Centralize controls, evidence, and audit workflows to stay continuously SOC 2–ready.
CROE Expectation Mapping
Map CROE expectations to controls, owners, and evidence sources.
Test Scheduling and Remediation Tracking
Schedule tests, capture results, and track remediation through closure.
Situational Awareness Evidence Hub
Track monitoring coverage, threat intelligence inputs, and detection validation proof.
Incident Response and Recovery Workflows
Run incidents and recovery tasks with full documentation and improvement actions.
Third-Party and Dependency Oversight
Manage provider risk, monitoring, and exit planning evidence.
Executive and Oversight Reporting
Report readiness, gaps, and maturity progression for governance stakeholders.
Related frameworks

DORA is an EU regulation requiring financial firms to manage ICT risks, report incidents, test security, and oversee third-party providers.

ISO 22301 is a business continuity management standard helping organizations prepare for, respond to, and recover from disruptions.

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

ISO/IEC 27002:2022 provides best-practice information security controls to help organizations select, implement, and manage protections for information assets.

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.
Frequently Asked Questions For ECB CROE (Cyber Resilience Oversight Expectations for Financial Market Infrastructures)
ECB CROE is used to establish standardized expectations for the cyber resilience of systemically important financial market infrastructures (FMIs) within the Eurozone. The framework ensures these organizations can protect, detect, respond to, and recover from cyber incidents, thus contributing to the stability of the broader financial system.
ECB CROE is not a certifiable standard, but it is a supervisory expectation issued by the European Central Bank for critical FMIs. Compliance is required for FMIs overseen by the ECB, and adherence is reviewed through regulatory oversight activities rather than a formal certification process.
ECB CROE applies to systemically important FMIs operating within the Eurozone, such as payment systems, central securities depositories, and central counterparties. Organizations are expected to align with CROE if they are designated as critical to financial market infrastructure stability.
The framework is structured around operational resilience domains, including governance, identification, protection, detection, response, and recovery. Each domain contains requirements for risk management processes, security controls, incident response, and continuous improvement.
Implementation involves assessing current resilience practices against CROE’s expectations, conducting risk assessments, updating security controls, and refining incident response and recovery plans. Organizations must document compliance activities, conduct regular reviews, and ensure continuous improvement of cyber resilience capabilities.
ECB CROE is informed by global benchmarks such as CPMI-IOSCO guidance and other regulatory and industry standards. Alignment allows organizations to integrate CROE requirements into existing compliance programs and leverage synergies with frameworks like ISO 27001 or NIST CSF.
Organizations must regularly review and update resilience controls, conduct incident response exercises, and monitor the effectiveness of risk mitigation measures. Ongoing oversight, audit trails, and continuous improvement are essential to demonstrate continued alignment with ECB CROE expectations.
SmartSuite enables organizations to manage ECB CROE by centralizing risk tracking, mapping and tracking control implementation, and organizing supporting evidence for compliance. The platform offers incident and remediation workflows, real-time dashboards for audit readiness, and reporting tools to support documentation and oversight of operational resilience activities.
Put CRI Profile into action with SmartSuite
Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

