The Hacken 2025 Yearly Security ReportCovers major Web3 breaches, their root causes, prevention insights, and key regulatory trends for 2026.
Learn more

CBUAE SVF Cybersecurity Requirements: What Payment Providers Need to Know

6 min read

By Hacken

A practical guide for CISOs navigating UAE's stored value facilities regulation

According to the UAE Cybersecurity Report 2025, 21% of all cybersecurity incidents in the region target banks and financial services, making it the most attacked sector. With ransomware attacks up 32% year-over-year and data breaches in the Middle East costing an average of $8.7 million, the Central Bank of the UAE isn't taking chances.

The CBUAE's Stored Value Facilities (SVF) Regulation establishes cybersecurity requirements that every digital payment provider operating in the UAE must meet. At Hacken, we've helped fintech and Web3 companies navigate these requirements — drawing on eight years of blockchain security expertise and our work with regulators including the Abu Dhabi Global Market (ADGM). Here's what you need to know.

What Are the CBUAE SVF Cybersecurity Requirements?

The CBUAE SVF Regulation (Circular No. 6/2020), specifically Article 12, establishes detailed technology and cybersecurity risk management requirements. Licensees must adopt international best practices when designing and implementing these systems. The regulation covers:

Domain

Key Requirements

IT Governance

IT control policies, clear structure of IT functions, independent technology audit function

Risk Management

Continuous risk management process, change management, project management methodology

SDLC & Coding

Secure development guidelines, source code reviews, formal testing and acceptance

Access Control

Role-based access, need-to-have basis, privileged access management

Security Operations

Vulnerability management, patch management, security monitoring and logging

Cyber Resilience

Cyber threat intelligence, penetration testing, cyber-attack simulation

Payment Security

Information classification, encryption, customer authentication, fraud detection

Business Continuity

Business impact analysis, recovery strategies, alternate site requirements

Purpose of the Regulation

The regulation exists to:

  • Protect the financial ecosystem — Ensure providers can identify risks, protect critical services, and respond to attacks
  • Maintain consumer trust — Safeguard customer data and funds from fraud and breaches
  • Align with global standards — Position the UAE alongside frameworks like MiCA and DORA
  • Enable safe innovation — Provide clear compliance frameworks for scaling with confidence

Who Is Affected?

The regulation applies to:

  • SVF Licensees — Prepaid cards, mobile wallets, digital payment instruments, payment tokens
  • Financial Free Zone Entities — DIFC/ADGM companies operating SVFs in mainland UAE
  • Banks — UAE-licensed banks launching SVF products
  • Third-Party Providers — Vendors handling payment processing or customer data

Implementation Checklist for CISOs

Based on Article 12 of the CBUAE SVF Regulation, here's a detailed implementation checklist with actionable requirements:

1. IT Governance & Policies

Requirement

Implementation Details

Establish IT governance framework

☐ Define clear structure of IT functions with assigned responsibilities

☐ Establish independent technology audit function

☐ Create technology risk management function separate from IT operations

☐ Ensure Senior Management formally approves all IT control policies

Develop IT control policies

☐ Document policies covering all technology applications and business models

☐ Define process for verifying compliance with IT policies

☐ Establish approval process for policy dispensations

☐ Specify consequences for failure to adhere to policies

2. Technology Risk Management

Requirement

Implementation Details

Implement risk management process

☐ Establish continuous risk identification, evaluation, and monitoring

☐ Document risk assessments for new products, services, and processes

☐ Monitor changes in external factors (laws, regulations, threats)

☐ Maintain risk register with treatment plans and ownership

Establish change management process

☐ Implement formal change control for applications, systems, hardware, and network

☐ Document emergency change procedures with record keeping

☐ Require appropriate approval before changes to production environment

☐ Verify changes do not have undesirable impact on production

3. Secure Development Lifecycle (SDLC)

Requirement

Implementation Details

Adopt project lifecycle methodology

☐ Define methodology for developing, implementing, and maintaining systems

☐ Establish project management framework for major technology projects

☐ Conduct quality assurance reviews with legal and compliance involvement

☐ Document software package acquisition process for vendor solutions

Implement secure coding practices

☐ Develop guidelines referencing industry-accepted secure development standards

☐ Conduct source code reviews (peer review and automated analysis)

☐ Define security requirements in early stage of system development

☐ Perform risk-based code reviews as part of quality assurance

Establish testing and deployment controls

☐ Maintain segregated environments for development, testing, and production

☐ Cover business logic, security controls, and stress-load scenarios in testing

☐ Prohibit use of production data in testing without desensitization

☐ Ensure developers cannot access production libraries or promote code directly

4. Segregation of Duties

Requirement

Implementation Details

Enforce role separation

☐ Separate development, testing, and production access permissions

☐ Implement independent review for automated code promotion tools

☐ Monitor vendor access to UAT environments

☐ Establish independent checks for privileged operations

5. Access Control & Identity Management

Requirement

Implementation Details

Implement role-based access control

☐ Grant access rights only on a need-to-have basis

☐ Adopt role-based access control (RBAC) framework

☐ Restrict access via adequate authentication mechanisms

☐ Establish formal procedures for allocating access to system resources

Manage privileged access

☐ Change all default passwords on privileged accounts

☐ Restrict number of privileged users to minimum necessary

☐ Implement strong controls over remote access by privileged users

☐ Require formal approval before releasing privileged/emergency IDs

☐ Log, preserve, and monitor all privileged account activities

☐ Prohibit sharing of privileged accounts

☐ Change privileged passwords immediately upon return by requesters

6. Security Operations & Monitoring

Requirement

Implementation Details

Implement vulnerability management

☐ Deploy combination of automated tools and manual techniques

☐ Perform comprehensive assessments including web vulnerabilities

☐ Define implementation timeframes for patches based on severity

☐ Categorize and prioritize security patches by impact

Establish security monitoring

☐ Implement tools to retain system, application, and network device logs

☐ Enable real-time monitoring of critical configurations and security settings

☐ Detect and block anomalies (abnormal behaviors, unusual processes)

☐ Define log retention policy and ensure examination capability

Document security baselines

☐ Document control procedures and baseline security requirements

☐ Maintain configurations for operating systems, databases, servers, and network

☐ Perform periodic reviews of security settings against baselines

☐ Update baselines when changes are approved

7. Cyber Resilience & Testing

Requirement

Implementation Details

Establish cyber threat intelligence

☐ Subscribe to quality cyber threat intelligence services

☐ Collaborate with industry organizations to share threat information

☐ Monitor trends in cyber threats relevant to SVF business

☐ Update security measures based on emerging threats

Conduct penetration testing

☐ Regularly assess necessity for penetration and cyber-attack simulation

☐ Cover external and internal networks and application systems

☐ Include social engineering testing in scope

☐ Mitigate identified vulnerabilities based on risk exposure analysis

8. Incident Management

Requirement

Implementation Details

Develop incident management framework

☐ Establish sufficient management oversight for incident response

☐ Define timely reporting process to CBUAE for fraud and security breaches

☐ Include cyber-attacks, prolonged disruptions, and systemic incidents

☐ Report incidents where customers suffer monetary loss or data leakage

Implement communication strategy

☐ Define stakeholder communication protocols during incidents

☐ Establish process for addressing reputational damage

☐ Document escalation procedures and crisis management protocol

☐ Maintain updated contact details for key personnel

9. Payment Security & Data Protection

Requirement

Implementation Details

Implement information classification

☐ Classify information by degree of sensitivity

☐ Define appropriate protection procedures for each classification

☐ Assign information owners accountable for classification and protection

☐ Develop guidelines and definitions for each classification level

Protect data in storage and transit

☐ Encrypt sensitive data using strong, widely recognized techniques

☐ Implement secure end-to-end encryption for data transmission

☐ Store customer data within UAE as required by regulation

☐ Implement five-year data retention policy

Implement customer authentication

☐ Deploy two-factor authentication for high-risk transactions

☐ Combine factors: knowledge, possession, and biometrics

☐ Implement controls for password strength and complexity

☐ Limit login attempts and implement session timeouts

Deploy fraud detection systems

☐ Operate transaction monitoring to prevent and detect fraud

☐ Screen suspicious or high-risk transactions

☐ Implement card binding verification with issuer

☐ Ensure proper authorization for direct debit setups

10. Business Continuity Management

Requirement

Implementation Details

Conduct business impact analysis

☐ Identify scenarios that may interrupt services

☐ Define minimum service levels for critical business functions

☐ Establish recovery time objectives (RTO) and recovery point objectives (RPO)

☐ Define maximum tolerable downtime for critical services

Develop business continuity plan

☐ Document detailed recovery procedures for all critical systems

☐ Define escalation procedures and crisis management protocol

☐ Establish proactive communication strategies (customer notification, media)

☐ Assign primary and alternate personnel for recovery responsibilities

Establish alternate sites

☐ Ensure alternate sites are sufficiently distanced from primary sites

☐ Install appropriate facilities and communication equipment

☐ Implement physical access controls at alternate locations

☐ Avoid excessive reliance on external vendors for DR support

Test and maintain BCP

☐ Conduct BCP testing at least annually

☐ Involve Senior Management and key personnel in testing

☐ Prepare formal testing documentation and post-mortem reports

☐ Obtain CEO sign-off on annual BCP statement to board

How Hacken Helps

Since 2017, Hacken has secured 1,500+ digital asset leaders and built deep expertise in regional compliance frameworks, including VARA, CBUAE, and ADGM requirements. Our team of 60+ certified engineers combines Web3-native security knowledge with traditional financial services compliance experience.

We guide organizations through the full CBUAE SVF compliance journey:

  • Gap Assessments — Evaluate your current posture against Article 12 requirements and prioritize remediation
  • Security Program Development — Build governance frameworks, policies, and technical controls
  • Penetration Testing & TLPT — Identify vulnerabilities with testing that satisfies regulatory requirements
  • Secure Development Advisory — Implement SDLC controls, code review processes, and secure coding standards
  • Audit Preparation — Prepare documentation and evidence for regulatory examinations

Ready to get started? Contact our compliance team to discuss your CBUAE SVF requirements.

This article is for informational purposes only and does not constitute legal or regulatory advice.

Subscribe to our newsletter

Be the first to receive our latest company updates, Web3 security insights, and exclusive content curated for the blockchain enthusiasts.

Speaker Img