← Back to all briefings
Policy 7 min read Published Updated Credibility 89/100

MAS Technology Risk Management Update

MAS’s 2021 Technology Risk Management update compels Singapore financial institutions to elevate board oversight, cybersecurity, third-party governance, and resilience programs across their technology estates.

Editorially reviewed for factual accuracy

Policy pillar illustration for Zeph Tech briefings
Policy, regulatory, and mandate timeline briefings

On 18 January 2021 the Monetary Authority of Singapore (MAS) issued an updated edition of its Technology Risk Management (TRM) Guidelines, setting a higher bar for financial institutions’ governance, resilience, and cyber defense capabilities. The guidelines apply to banks, insurers, capital market intermediaries, financial market infrastructures, and payment service providers. They codify expectations for board oversight, senior management accountability, third-party risk management, and operational resilience in an more digital financial environment. Institutions operating in Singapore must integrate the revised requirements into enterprise risk frameworks, regulatory reporting processes, and technology investment roadmaps.

Governance and accountability

The updated guidelines emphasize board and senior management responsibility for technology risk. Paragraphs 3.1 to 3.6 require boards to approve technology strategies, define risk appetite statements, and ensure adequate resources for cyber resilience.

Senior management must establish clear lines of responsibility, appoint qualified chief information officers and chief information security officers, and oversee the effectiveness of control environments. MAS expects regular reporting to the board covering key risk indicators, incident trends, audit results, and remediation status. Institutions should review board charters, committee mandates, and management delegation frameworks to ensure technology risk oversight is explicitly documented.

Paragraph 3.5 introduces the requirement for independent assurance. Internal audit functions must evaluate technology governance, cybersecurity, and third-party management, while reporting findings directly to the board or audit committee. Institutions should align audit plans with the TRM guideline themes, incorporating penetration testing, resilience assessments, and control testing of critical systems.

Technology risk management framework

MAS requires institutions to maintain a complete technology risk management framework encompassing risk identification, assessment, mitigation, monitoring, and reporting. Paragraph 4.1 highlights the need for regular risk assessments covering hardware, software, network components, and emerging technologies such as cloud, artificial intelligence, and robotic process automation. The guidelines advocate a defense-in-depth strategy, combining preventive, detective, and responsive controls. Teams must maintain an inventory of critical systems, mapping them to business services, recovery objectives, and compliance obligations.

The framework should integrate with enterprise risk management, ensuring technology risks are evaluated alongside credit, market, and operational risks. Scenario analysis, stress testing, and threat modeling must inform capital planning and resource allocation. MAS expects institutions to document methodologies, maintain risk registers, and ensure risk owners are accountable for remediation timelines.

Cybersecurity and protective controls

Chapters 5 and 6 expand on security requirements. MAS mandates strong identity and access management, including multi-factor authentication for privileged users, biometric or hardware token-based customer authentication, and regular access reviews. Institutions must implement network segmentation, secure configuration baselines, and continuous vulnerability management. Logging and monitoring should capture privileged activity, system changes, and security events, with logs retained for at least one year in tamper-evident storage.

The guidelines also address emerging threats such as advanced persistent threats and ransomware. MAS encourages deployment of threat intelligence programs, security operations centers, and behavior analytics to detect anomalies. Institutions should participate in national information sharing platforms like the Financial Services Information Sharing and Analysis center (FS-ISAC) Asia Pacific, aligning detection capabilities with industry intelligence.

Secure software development and change management

Paragraphs 9.1 to 9.7 focus on system development lifecycle (SDLC) controls. MAS expects secure coding practices, peer reviews, automated static and dynamic testing, and segregation of duties between developers and production support. Continuous integration/continuous delivery (CI/CD) pipelines must incorporate security gates, vulnerability scanning, and approval workflows. Institutions should maintain software bills of materials, track open-source components, and implement patch management processes that prioritize critical vulnerabilities. Change advisory boards must consider risk impact, rollback strategies, and testing evidence before approving deployments.

Third-party software and APIs require due diligence. MAS highlights the need for contractual safeguards, including security requirements, audit rights, and incident reporting clauses. Institutions must monitor vendor updates and assess compatibility with internal security architectures.

Third-party and cloud risk management

The 2021 update strengthens expectations around outsourcing and cloud adoption. Paragraph 8.3 requires full due diligence on service providers, evaluating financial stability, security controls, incident history, and concentration risk. Contracts must include termination rights, data ownership clauses, confidentiality obligations, and requirements to notify MAS before significant changes. Institutions must develop exit strategies, ensuring data and systems can be migrated or decommissioned without disrupting critical services.

For cloud services, MAS expects adherence to principles of data sovereignty, encryption, and secure access. Institutions should evaluate multi-region deployment strategies, assess shared responsibility models, and implement continuous monitoring of cloud configurations. The guidelines encourage the use of Cloud Security Alliance frameworks, penetration testing, and independent audits to validate provider controls. Institutions must maintain an inventory of cloud assets, document security baselines, and ensure alignment with MAS notices such as the Outsourcing Guidelines and Notices on Cyber Hygiene.

Resilience, business continuity, and incident response

Operational resilience is a central theme. Paragraphs 11.1 to 11.6 require institutions to define recovery time objectives (RTOs) and recovery point objectives (RPOs) for critical systems, conduct business impact analyzes, and maintain geographically separated backup sites. Disaster recovery plans must be tested at least annually, incorporating scenarios such as cyber attacks, pandemics, and widespread infrastructure outages. MAS emphasizes the importance of end-to-end testing involving critical third parties to validate failover capabilities.

Incident response procedures must help rapid detection, containment, eradication, and recovery. Institutions need to notify MAS of significant incidents promptly—typically within one hour of discovery for major outages or breaches, followed by detailed reports within 14 days. Incident playbooks should include escalation matrices, communication protocols, regulatory notifications, and post-incident reviews. Lessons learned must feed into control improvements and training programs.

Data governance and protection

The guidelines reiterate the need for strong data governance. Institutions must classify data, enforce access controls based on sensitivity, and implement encryption for data at rest and in transit. Data loss prevention technologies, key management practices, and secure disposal procedures are expected. MAS also emphasizes compliance with the Personal Data Protection Act (PDPA) and cross-border data transfer regulations. Institutions should maintain data lineage documentation and ensure third parties handling customer data meet equivalent standards.

Monitoring, testing, and assurance

Continuous monitoring and assurance form the backbone of MAS expectations. Institutions must perform regular vulnerability assessments, penetration tests, and red team exercises. Security monitoring should include user behavior analytics, anomaly detection, and integration with security information and event management (SIEM) systems. MAS encourages the adoption of threat-led penetration testing methodologies, such as intelligence-led cyber resilience testing (iCRT), to validate defenses against real-world adversaries.

Independent assurance, including internal audit and external reviews, should validate the effectiveness of controls. Metrics such as patch compliance rates, incident response times, and third-party audit completion should be reported to senior management. Institutions should maintain remediation trackers, with accountability assigned to system owners and deadlines aligned to risk severity.

Human factors and training

Paragraph 7 highlights the human element in technology risk management. Institutions must deliver role-based training on cybersecurity, incident response, and data protection. Programs should be updated regularly to address emerging threats such as social engineering and insider risk. MAS expects institutions to conduct phishing simulations, monitor training completion rates, and integrate human risk metrics into performance evaluations.

Staff vetting, including background checks for privileged roles, is essential. The guidelines recommend periodic review of employee access rights upon role changes or departures, ensuring timely revocation of privileges. Institutions should maintain insider threat monitoring capabilities, combining behavioral analytics with policies that encourage ethical reporting.

Regulatory reporting and supervisory engagement

MAS expects transparent communication. Institutions must maintain documentation evidencing compliance, including policies, risk assessments, incident reports, audit findings, and remediation plans. During supervisory inspections, MAS may request evidence of board oversight, third-party risk assessments, and test results. Institutions should prepare data rooms and dashboards that provide regulators with real-time visibility into control effectiveness.

Collaboration with MAS-led initiatives—such as the Financial Services Industry Transformation Map and Project Ubin—can provide insights into supervisory priorities. Institutions that show early engagement, including participating in industry working groups and sharing incident learnings, may build supervisory trust and influence future guidance.

How to implement this

To implement the updated TRM guidelines, teams should set up a structured roadmap. Phase one: perform a gap assessment referencing each paragraph, prioritizing high-risk areas such as board oversight, incident reporting, and third-party management. Phase two: launch remediation programs with clear owners, milestones, and budget allocations. This may include investing in identity governance platforms, security operations centers, and resilient infrastructure. Phase three: embed continuous improvement through automation, analytics, and periodic reviews, ensuring the framework evolves with emerging threats.

Institutions should align TRM compliance with other regulatory initiatives, including MAS Notices on Cyber Hygiene (PSN06, MAS 644, MAS 654), the Payment Services Act, and global standards such as ISO/IEC 27001. Integrating compliance efforts reduces duplication and ensures consistent risk coverage across jurisdictions.

By incorporating MAS’s improved TRM guidelines into their governance and operational practices, financial institutions can strengthen resilience, protect customer trust, and meet supervisory expectations in one of Asia’s most technologically advanced financial centers.

Continue in the Policy pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Documentation

  1. Technology Risk Management Guidelines — mas.gov.sg
  2. MAS improves Technology Risk Management Guidelines for Financial Institutions — mas.gov.sg
  3. ISO 31000:2018 — Risk Management Guidelines — International Organization for Standardization
  • Monetary Authority of Singapore
  • Technology Risk Management
  • Outsourcing controls
  • Financial services compliance
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.