Updated 09/05/2025
In force

Initial Legal Act
Amendments
Search within this legal act

ANNEX IV - Implementing Regulation 2025/302

ANNEX IV

DATA GLOSSARY AND INSTRUCTIONS FOR NOTIFICATION OF SIGNIFICANT CYBER THREATS

Data field

Description

Mandatory field

Field type

1.

Name of the entity submitting the notification

Full legal name of the entity submitting the notification.

Yes

Alphanumeric

2.

Identification code of the entity submitting the notification

Identification code of the entity submitting the notification.

Where financial entities submit the notification/report, the identification code shall be a Legal Entity Identifier (LEI), which is a unique 20 alphanumeric character code, based on ISO 17442-1:2020.

Where a third-party provider submits a report for a financial entity, it may use an identification code as specified in the implementing technical standards adopted pursuant to Article 28(9) of Regulation (EU) 2022/2554.

Yes

Alphanumeric

3.

Type of financial entity submitting the report

Type of the entity referred to in Article 2(1), points (a) to (t) of Regulation (EU) 2022/2554 submitting the report.

Yes, if the report is not provided by the affected financial entity directly.

Choice (multiselect):

credit institution;

payment institution;

exempted payment institution;

account information service provider;

electronic money institution;

exempted electronic money institution;

investment firm;

crypto-asset service provider;

issuer of asset-referenced tokens;

central securities depository;

central counterparty;

trading venue;

trade repository;

manager of alternative investment fund;

management company;

data reporting service provider;

insurance and reinsurance undertaking;

insurance intermediary, reinsurance intermediary and ancillary insurance intermediary;

institution for occupational retirement provision;

credit rating agency;

administrator of critical benchmarks;

crowdfunding service provider;

securitisation repository.

4.

Name of the financial entity

Full legal name of the financial entity notifying the significant cyber threat.

Yes, if the financial entity is different from the entity submitting the notification

Alphanumeric

5.

LEI code of the financial entity

Legal Entity Identifier (LEI) of the financial entity notifying the significant cyber threat, assigned in accordance with the International Organisation for Standardisation.

Yes, if the financial entity notifying the significant cyber threat is different from the entity submitting the report

Unique alphanumeric 20 character code, based on ISO 17442-1:2020

6.

Primary contact person name

Name and surname of the primary contact person of the financial entity.

Yes

Alphanumeric

7.

Primary contact person email

Email address of the primary contact person that can be used by the competent authority for follow-up communication.

Yes

Alphanumeric

8.

Primary contact person telephone

The telephone number of the primary contact person that can be used by the competent authority for follow-up communication.

The telephone number shall be reported with all international prefixes (e.g. +33XXXXXXXXX)

Yes

Alphanumeric

9.

Second contact person name

Name and surname of the second contact person of the financial entity or an entity submitting the notification on behalf of the financial entity, where available.

Yes, if name and surname of the second contact person of the financial entity or an entity submitting the notification for the financial entity is available

Alphanumeric

10.

Second contact person email

Email address of the second contact person or a functional email address of the team that can be used by the competent authority for follow-up communication, where available.

Yes, if email address of the second contact person or a functional email address of the team that can be used by the competent authority for follow-up communication is available

Alphanumeric

11.

Second contact person telephone

The telephone number of the second contact person that can be used by the competent authority for follow-up communication, where available.

The telephone number shall be reported with all international prefixes (e.g. +33XXXXXXXXX).

Yes, if the telephone number of the second contact person that can be used by the competent authority for follow-up communication is available

Alphanumeric

12.

Date and time of detection of the cyber threat

Date and time at which the financial entity has become aware of the significant cyber threat.

Yes

ISO 8601 standard UTC (YYYY-MM-DD Thh: mm:ss)

13.

Description of the significant cyber threat

Description of the most relevant aspects of the significant cyber threat.

Financial entities shall provide:

(a)

a high-level overview of the most relevant aspects of the significant cyber threat;

(b)

the related risks arising from it, including potential vulnerabilities of the systems of the financial entity that can be exploited;

(c)

information about the probability of materialisation of the significant cyber threat; and

(d)

information about the source of information about the cyber threat.

Yes

Alphanumeric

14.

Information about potential impact

Information about the potential impact of the cyber threat on the financial entity, its clients or financial counterparts if the cyber threat has materialised

Yes

Alphanumeric

15.

Potential incident classification criteria

The classification criteria that could have triggered a major incident report if the cyber threat had materialised.

Yes

Choice (multiple):

clients, financial counterparts and transactions affected;

reputational impact;

duration and service downtime;

geographical spread;

data losses;

critical services affected;

economic impact.

16.

Status of the cyber threat

Information about the status of the cyber threat for the financial entity and whether there have been any changes in the threat activity.

Where the cyber threat has stopped communicating with the financial entity’s information systems, the status can be marked as inactive. If the financial entity has information that the threat remains active against other parties or the financial system as a whole, the status shall be marked as active.

Yes

Choice:

active;

inactive.

17.

Actions taken to prevent materialisation

High-level information about the actions taken by the financial entity to prevent the materialisation of the significant cyber threats, if applicable.

Yes

Alphanumeric

18.

Notification to other stakeholders

Information about notification of the cyber threat to other financial entities or authorities.

Yes, if other financial entities or authorities have been informed about the cyber threat)

Alphanumeric

19.

Indicators of compromise

Information related to the significant threat that may help identify malicious activity within a network or information system (Indicators of Compromise, or IoC), where applicable.

The IoC provided by the financial entity may include, but is not to be limited to, the following categories of data:

(a)

IP addresses;

(b)

URL addresses;

(c)

domains;

(d)

file hashes;

(e)

malware data (malware name, file names and their locations, specific registry keys associated with malware activity);

(f)

network activity data (ports, protocols, addresses, referrers, user agents, headers, specific logs or distinctive patterns in network traffic);

(g)

email message data (sender, recipient, subject, header, content);

(h)

DNS requests and registry configurations;

(i)

user account activities (logins, privileged user account activity, privilege escalation);

(j)

database traffic (read/write), requests to the same file.

This type of information may include data relating to indicators describing patterns in network traffic corresponding to known attacks/botnet communications, IP addresses of machines infected with malware (bots), data relating to ‘command and control’ servers used by malware (usually domains or IP addresses), and URLs relating to phishing sites or websites observed hosting malware or exploit kits.

Yes, if information about indicators of compromise connected with the cyber threat are available)

Alphanumeric

20.

Other relevant information

Any other relevant information about the significant cyber threat

Yes, if applicable and if there is other information available, not covered in the template

Alphanumeric


ELI: http://data.europa.eu/eli/reg_impl/2025/302/oj

ISSN 1977-0677 (electronic edition)