UK FCA announces tougher cyber-incident reporting rules for financial firms

    Britain's Financial Conduct Authority has confirmed that stricter cyber-incident reporting requirements will apply to financial firms starting March 2026, with a 12-month compliance window running until March 2027. The rules are not a surprise to anyone who has been watching FCA consultations over the past two years, but the formal confirmation and the hard deadline change the calculation for compliance teams across the sector.

    The timing is tied directly to data the FCA has been collecting. In the 12 months preceding the announcement, more than 40 percent of cyber incidents reported to the regulator involved third-party providers rather than the firms' own internal systems. That statistic drove a specific policy decision: mandatory disclosure of critical technology dependencies will now be part of the formal reporting framework, not just a recommended practice.

    What the new rules actually require

    Under the updated framework, regulated financial firms must report material cyber incidents to the FCA within defined timeframes, with initial notification required within 24 hours of a firm becoming aware of a significant disruption. A fuller report detailing root cause, affected systems, customer impact, and remediation steps must follow within 72 hours. These timelines are tighter than what most firms have been working to informally.

    The third-party dependency disclosure requirement is the genuinely new part. Firms will need to maintain and submit formal registers of the technology providers that are material to their operations. If one of those providers experiences an outage or breach, the financial firm is now responsible for reporting that event to the FCA even if the firm's own systems were never directly compromised. That closes a gap that regulators identified repeatedly in post-incident reviews.

    Financial regulation and cybersecurity compliance
    Financial regulation and cybersecurity compliance

    Why third-party providers became the focus

    Financial services firms have outsourced substantial portions of their technology infrastructure over the past decade. Cloud hosting, payment processing, identity verification, data analytics, and core banking functions are routinely handled by specialist vendors. A single vendor can sit at the heart of dozens of regulated firms simultaneously. When that vendor has a problem, the downstream effect can be wide and fast.

    The 2023 MOVEit data breach illustrated this exactly. MOVEit was a file transfer tool used by thousands of organisations globally, including several UK financial institutions. When a zero-day vulnerability was exploited, firms that had no direct relationship with each other found themselves disclosing the same breach. The FCA referenced incidents of this type in its consultation documents as part of the justification for mandatory third-party registers.

    The EU's Digital Operational Resilience Act, which came into force for EU financial firms in January 2025, includes similar third-party risk provisions. The FCA's rules are partly a response to that regulatory alignment pressure, and partly the product of the UK's own incident data. Either way, firms operating in both jurisdictions now face parallel obligations that will require coordinated compliance programs.

    How firms are expected to prepare

    The 12-month compliance window gives firms time to build or update their incident response procedures, but it is not a generous timeline for organisations that have not done this work systematically. Building a material technology dependency register requires input from procurement, IT, legal, and operations teams. Firms that have acquired other businesses in recent years often have fragmented vendor lists that have never been consolidated into a single authoritative document.

    The FCA has indicated it will provide guidance on what qualifies as a material dependency, but firms should not wait for that guidance before starting. The practical test is straightforward: if a vendor went offline today and your regulated activities would be materially disrupted within 48 hours, that vendor belongs on the register. Applying that test across the full vendor list is time-consuming work.

    Incident response playbooks will also need updating. The 24-hour initial notification requirement means that internal escalation paths have to be fast and unambiguous. A breach discovered on a Friday evening needs to reach someone with authority to file an FCA notification before Saturday evening. Firms that rely on manual escalation chains, where a security analyst emails a manager who forwards to a compliance officer who calls a lawyer, are unlikely to meet that window consistently.

    The enforcement picture

    The FCA has enforcement tools available and has used them. In 2023, it fined Equifax's UK subsidiary 11.1 million pounds for its handling of the 2017 data breach, citing failures in incident management and consumer communication. The new reporting rules give the regulator a clearer basis for future enforcement actions, because firms will now have explicit documented obligations rather than relying on interpretation of broader conduct principles.

    Firms that fail to report within the required timeframes, or that submit incomplete dependency registers, face regulatory action that can include public censure, financial penalties, and, in serious cases, restrictions on regulated activities. The FCA has signalled that it views operational resilience and cyber readiness as areas where it intends to increase supervisory intensity through 2026 and 2027.

    The compliance deadline is March 2027. That gives the sector roughly two years from the announcement to have everything in place. Given the scope of the changes required, particularly the third-party dependency work, that window will pass faster than most compliance calendars currently reflect.

    Love this story? Explore more trending news on fca

    Share this story

    Frequently Asked Questions

    Q: When do the FCA's new cyber-incident reporting rules take effect?

    The rules take effect in March 2027. Firms have a 12-month compliance window starting from March 2026 to get their reporting procedures and third-party registers in order.

    Q: What counts as a material third-party dependency under the new rules?

    The FCA has indicated it will publish formal guidance, but the practical test is whether an outage at that vendor would materially disrupt the firm's regulated activities within a short timeframe. Vendors handling cloud hosting, payment processing, or core banking functions typically qualify.

    Q: Does a firm need to report to the FCA if its own systems were not breached, but a vendor was?

    Yes. Under the new framework, if a material third-party provider experiences a disruption that affects the firm's regulated activities, the firm is responsible for notifying the FCA regardless of whether its own internal systems were directly involved.

    Q: How does this compare to the EU's Digital Operational Resilience Act?

    DORA, which took effect for EU financial firms in January 2025, includes similar third-party risk management and incident reporting obligations. Firms operating in both the UK and EU will need to run parallel compliance programs, though the specific timelines and thresholds differ between the two frameworks.

    Q: What penalties can firms face for failing to meet the new reporting requirements?

    The FCA can issue public censure, financial penalties, and in serious cases, restrictions on a firm's regulated activities. The regulator fined Equifax's UK arm 11.1 million pounds in 2023 for incident management failures, which gives a reference point for how it treats non-compliance in this area.

    Read More