1) Applies to financial entities and ICT providers.
2) ICT risk management frameworks covering identification, protection, detection, response, and recovery.
3) Mandatory incident reporting and classification.
4) Threat-led penetration testing (TLPT) for critical entities.
5) Oversight of third-party ICT providers.