The Monetary Authority of Singapore (MAS) Technology Risk Management (TRM) Guidelines was introduced in 2001 and revised in January 2021, provide a framework of best practices for Financial Institutions (FIs) in Singapore to identify, assess, and manage technology and cyber risks, ensuring the security, reliability, and resiliency of their systems.
The MAS TRM guidelines aim to help FIs proactively manage technology-related risks, safeguard against sophisticated cyber threats, ensure operational continuity, and maintain the integrity of Singapore's financial sector. The 2021 update strengthened the focus on cyber threats and on senior management's accountability for ensuring robust technology risk controls.
The TRM Guidelines apply to all FIs regulated by MAS, including, but not limited to:
The key requirements cover Risk Governance, Cybersecurity Controls, Third-Party Management, Operational Resilience, Systems Development and Incident Reporting.
Learn how to meet MAS TRM guidelines in Singapore with data security, encryption, and access controls for financial institutions.
Thales’ solutions can help Financial Institutions (FIs) in Singapore address the TRM Guidelines across 11 key requirements by simplifying compliance and automating security with visibility and control, thereby reducing the burden on security and compliance teams.
MAS TRM Compliance Solutions
Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF), protection against Distributed Denial of Service (DDoS) and malicious BOT attacks, security for APIs and a secure Content Delivery Network (CDN).
Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption tokenization and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment as well as identify anomalous behavior, and monitor activity to verify compliance, allowing organizations to prioritize where to spend their efforts.
Provide seamless, secure and trusted access to applications and digital services for customers, employees and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies and Multi-Factor Authentication that help ensure that the right user is granted access to the right resource at the right time.
Application Security
Data Security
Data Security
Identity & Access Management
Identity & Access Management
Application Security
Data Security
Identity & Access Management
Data Security
Identity & Access Management
Application Security
Data Security
Identity & Access Management