Bank Negara Malaysia's Risk Management in Technology (RMiT) policy was introduced in July 2019 to address cyber-risk exposures in Malaysian financial institutions. It covers governance, technology risk management, cybersecurity, technology operations, audit, and internal training.
The BNM’s Risk Management in Technology (RMiT) policy aims to reduce vulnerabilities that could disrupt essential services or compromise customer data. The policy is mandated under various legislations to preserve public confidence and ensure Malaysia's financial system's resilience in digital transformation.
The latest version of RMiT policy was updated and came into effect on November 28, 2025. The policy revision outlines new requirements on the financial institution’s management of technology risks to improve the resilience of financial services and enhance system-wide cyber defence and extending RMiT standards to more institutions.
Discover how financial institutions can address RMiT Policy through our comprehensive cybersecurity solutions and learn more about the requirements.
Thales’ solutions can help financial institutions in Malaysia to address the RMiT Policy on Part B Policy Requirements as well as Appendix 1, 3, 4, 5 and 10 on Control Measures by simplifying compliance and automating security with visibility and control, reducing the burden on security and compliance teams.
RMiT Compliance Solutions
Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF), protection against Distributed Denial of Service (DDoS) and malicious BOT attacks, security for APIs, and a secure Content Delivery Network (CDN).
Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption tokenization and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment as well as identify anomalous behavior, and monitor activity to verify compliance, allowing organizations to prioritize where to spend their efforts.
Provide seamless, secure and trusted access to applications and digital services for customers, employees and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies and Multi-Factor Authentication that help ensure that the right user is granted access to the right resource at the right time.
Data Security
Data Security
Data Security
Application Security
Data Security
Identity & Access Management
Data Security
Identity & Access Management
Identity & Access Management
Identity & Access Management
Identity & Access Management
Identity & Access Management
Identity & Access Management
Application Security
Data Security
Application Security
Data Security
Identity & Access Management
Application Security
Data Security
Data Security
Data Security
Identity & Access Management