DNB Good Practice Information Security 2023
De Nederlandsche Bank's mandatory information security framework for Dutch financial institutions including banks, insurers, pension funds, and payment institutions. 58 controls across 7 elements (governance, organisation, people, processes, technology, facilities, testing) with COBIT 4.1 maturity model assessment. DORA supersedes for in-scope entities from January 2025, but continues for pension funds. Self-assessment tool available.
| Clause | Title | SP 800-53 Controls |
|---|---|---|
| DNB.1.1 | Information security plan | |
| DNB.1.2 | IT policies management | |
| DNB.2.1 | Enterprise Information architecture model | |
| DNB.2.2 | Data classification scheme | |
| DNB.3.1 | Monitor future trends and regulations | |
| DNB.3.2 | Technology standards | |
| DNB.4.1 | IT risk management framework | |
| DNB.4.2 | Risk assessment | |
| DNB.4.3 | Maintenance and monitoring of a risk action plan | |
| DNB.5.1 | Responsibility for risk, security and compliance | |
| DNB.5.2 | Management of information security | |
| DNB.6.1 | Data and system ownership | |
| DNB.7.1 | Segregation of duties | |
| DNB.8.1 | Personnel recruitment and retention | |
| DNB.8.2 | Personnel competences | |
| DNB.8.3 | Dependence upon individuals | |
| DNB.8.4 | Personnel clearance procedures | |
| DNB.8.5 | Job change and termination | |
| DNB.9.1 | Knowledge transfer to end users | |
| DNB.9.2 | Knowledge transfer to operations and support staff | |
| DNB.9.3 | Employee awareness | |
| DNB.10.1 | Change standards and procedures | |
| DNB.10.2 | Impact assessment, prioritisation and authorisation | |
| DNB.10.3 | Test environment | |
| DNB.10.4 | Testing of changes | |
| DNB.10.5 | Promotion to production | |
| DNB.11.1 | IT continuity plans | |
| DNB.11.2 | Testing of the IT continuity plan | |
| DNB.11.3 | Offsite backup storage | |
| DNB.11.4 | Backup and restoration | |
| DNB.12.1 | Storage and retention arrangements | |
| DNB.12.2 | Disposal | |
| DNB.12.3 | Security requirements for data management | |
| DNB.13.1 | Configuration repository and baseline | |
| DNB.13.2 | Identification and maintenance of configuration items | |
| DNB.14.1 | Monitoring and reporting of SLAs | |
| DNB.14.2 | Supplier risk management | |
| DNB.15.1 | Security incident definition | |
| DNB.15.2 | Incident escalation | |
| DNB.16.1 | Security testing, surveillance and monitoring | |
| DNB.16.2 | Monitoring of internal control framework | |
| DNB.16.3 | Internal control of third parties | |
| DNB.16.4 | Evaluation of compliance with external requirements | |
| DNB.16.5 | Independent assurance | |
| DNB.17.1 | Identity management | |
| DNB.17.2 | User account management | |
| DNB.18.1 | Infrastructure resource protection and availability | |
| DNB.18.2 | Infrastructure maintenance | |
| DNB.18.3 | Cryptographic key management | |
| DNB.18.4 | Network security | |
| DNB.18.5 | Exchange of sensitive data | |
| DNB.19.1 | Malicious software prevention, detection and correction | |
| DNB.19.2 | Vulnerability management | |
| DNB.19.3 | Life cycle management | |
| DNB.20.1 | Protection of security technology | |
| DNB.21.1 | Physical security measures | |
| DNB.21.2 | Physical access | |
| DNB.22.1 | Penetration testing and ethical hacking |