FCA confirms targeted support framework under PS25/22
ArticleThe FCA has taken another step forward by confirming the introduction of a targeted support framework and publishing the near final rules in PS25/22.

With a growing need for technology assurance – from cyber security and transformation programmes to the use of AI, cloud services and third parties – what do Internal Audit and Technology Risk functions need to know to be able to respond to their organisations’ key technology risks?
Key technology risk areas for internal auditors and technology risk functions to consider in 2024:
Cyber security continues to be a critical business risk for UK and international organisations. The latest UK Government research indicates that 69% of large businesses suffered a breach or attack over the past 12 months.
While data loss and service disruption continue to be two of the major risks associated with a cyber-attack, ransomware attacks are also significant. According to a 2023 Sophos report, 66% of organisations globally were hit by a ransomware attack in the last year, with the attackers succeeding in encrypting data in over three-quarters (76%) of attacks.
Cyber security isn’t a new risk. Many organisations already have in-flight cyber security programmes to enhance their controls and their ability to defend, detect, respond, and recover from cyber-attacks. They’re also taking proactive approaches to cyber security assurance by implementing continuous monitoring and more advanced threat detection capabilities. Most organisations today have a range of security-focused assurance mechanisms in place, such as obtaining accreditations (eg, ISO 27001, Cyber Essentials Plus), performing penetration testing, or conducting red-team exercises.
Over the past year we have noted an increasing number of organisations commissioning programmes to further enhance their cyber posture in line with broader and more robust frameworks, such as NIST and CIS. While being well recognised, these frameworks tend to require greater investment to adhere to their requirements and in ongoing assurance.
Read our insight on governing cyber risk here.
In order to manage risks around service continuity, information privacy, and security, organisations need to have an effective framework of controls in place around third parties.
IT and technology functions are among the largest users of third-party products in the form of third-party tools, SaaS solutions, and direct outsourcing of business activities. This gives organisations access to a much wider range of skills and gives greater flexibility to scale up/down with demand.
Outsourcing the responsibility for these services, however, doesn't outsource the associated risks, and organisations need to expand their range of assurance activities to cover third-party providers.
The range of third-party providers involved in core business activity is growing. As many organisations reap the benefits of SaaS products and external technical expertise, the operation of the business is increasingly dependent on third parties. This includes many customer-facing services, as well as internal systems (HCM, ERP, etc).
With the increased use of third parties the perimeter of an organisation's cyber defences is effectively increased, consequently the scope of assurance also needs to increase.
Organisations are increasingly establishing in-house capabilities dedicated to marrying skills in both supplier management and security assurance to assess these third parties.
Read how you should manage risks related to or managed by third parties here.
The risks associated with generative AI are critical now due to its widespread adoption. Concerns include the potential for biased outputs, security vulnerabilities, and misuse of generated content for malicious purposes. Deep fakes, misinformation, and ethical dilemmas also pose significant challenges. As generative AI becomes integral to various industries, understanding and mitigating these risks is essential to maintain trust, safeguard privacy, and ensure responsible deployment.
Timely attention to these concerns is crucial to prevent unintended consequences, protect against malicious uses, and establish robust frameworks for the ethical and secure implementation of generative AI technologies in an organisation’s rapidly evolving digital landscape.
As these technologies rapidly advance and permeate various sectors, the urgency to address and manage these risks has heightened, necessitating swift adaptation of regulatory frameworks, ethical guidelines, and security measures to ensure responsible and safe integration.
Several countries have proposed regulations on how organisations can develop and deploy AI. While the regulatory compliance deadline has yet to be defined in the UK, the broader principles that should be followed are. Failure to adopt these principles could result in reputational damage if your use of AI is perceived negatively, and if confidential information is disclosed due to a breach or other adverse event.
For further insight, please see our article on Obtaining assurance over your use of AI →
Read about the practical steps to overcome data challenges with the adoption of AI or the role of artificial intelligence in risk and assurance.
Organisations are progressing with their change/transformation agendas at full pace, with technology enabled change dominating the portfolio as organisations seek to be more digital both internally and customer facing.
Organisations are adopting and experimenting with leaner and faster approaches to delivering transformation, often labelled as ‘agile’.
One of the key programmes of work we're seeing at many organisations is dealing with the challenge of Legacy IT, longstanding or out-of-date infrastructure or applications that are still in use and prevent an organisation from modernising their ways of working and expose them to availability risks and cyber security vulnerabilities.
Investment into the decommissioning of Legacy IT has picked up as a reduction in risk appetite at the board level for both resilience and cyber security matters has pushed CTOs and CIOs to prioritise keeping the IT estate evergreen.
Agile methodologies vary greatly in maturity mainly based on the level of experience in those running the transformation agenda. The progression to agile methods alongside the more traditional waterfall approach doesn't reduce the need for project assurance. The same broad risks remain, however the identification of controls points becomes increasing difficult.
Additionally, risk events and the overall risk profile of programmes tend to evolve quicker when agile is adopted, therefore assurance approaches need to reflect this.
Define a control framework for agile, where delivery teams undertake a comprehensive risk assessment and decide on the Key Risk Indicators (KRIs) to self‑monitor; which will guide the audit team on how to assure
Adopt real-time “heartbeat assurance”, where auditors attend scrums, sprint meetings, and governance forums to assess controls for decisions to be made
Quantify the increased costs of providing resilience and cyber security from running the legacy estate covering the identification, decommissioning, and funding of out-of-date IT BaU costs
Ensure new IT solutions are built in sustainable and ‘evergreen’ ways. Futureproof against Legacy IT, including: ensuring that any IP is owned internally, evergreen provisions are included in contracts with service providers; and use MI to monitor the status and risk mitigation for current and end-of-life software
Over the past few years, the use of cloud solutions has increased rapidly. In particular, organisations are increasingly using cloud solutions to host their critical systems, such as ERP and customer-facing applications, or sensitive data, such as personal data, or intellectual property. The proposed changes to the UK Corporate Governance Code (the Code) have brought a heightened focus on organisations’ financial and IT control frameworks ahead of the 2025 deadline; this would include controls in Cloud environments.
Organisations still face challenges around cloud controls and assurance, inconsistent approaches across assurance teams, cloud concentration risks, and lock-in with vendors. There's also a shortage of cloud-risk specialists in the market who can support organisations to review whether practices are aligned with recommendations from the Cloud Security Alliance and the cloud service providers.
Cloud assurance issues are increasingly being compounded by the inherent complexity of cloud solutions, lack of visibility at all layers of the computing stack, limited understanding of shared responsibilities for managing cloud controls, and varying compliance requirements for companies operating across multiple jurisdictions.
To address these challenges, organisations need to adopt good practices across all three lines of defence and for giving the same amount of attention across all cloud service models (IaaS, SaaS, PaaS, etc). People are key enablers, therefore teams need to upskill around cloud risks and controls, and call on subject matter experts to provide in-depth tailored insight and independent assurance for the chosen cloud solutions.
For further insight, please see our article on cloud assurance here.
The adoption of DevOps practices is increasing among large corporate organisations, especially in those which internally develop software for business or customer-facing applications. According to Gartner research, 70% of organisations will have adopted DevOps and infrastructure automation by 2025.
Software development risks are exacerbated by the adoption of DevOps, including around insecure configurations and tooling, misalignment of software with business or customer requirements, insufficient documentation, and difficulty in meeting compliance or regulatory requirements. The DevOps industry is currently ‘shifting left’ on security, which is a deliberate effort to embed security activities earlier in the process.
Security threats and cyber attacks targeting development pipelines will continue to increase in 2024 as the adoption of DevOps practices becomes more commonplace. The increased use of DevOps to manage infrastructure means that even organisations which don't develop software features may also fall prey to these attacks and face data breaches and business disruption.
The fast-paced dynamic nature of DevOps practices is impacting the ability of certain traditional audit methods from keeping pace with change led through DevOps and their ability to provide effective assurance over these.
However, if internal audit and risk functions respond well, the rise of DevOps also presents some opportunities to provide more robust assurance.
For further insight, please see our article on DevSecOps assurance here.
One of the foundational pillars of securing your organisation's data is to ensure you're adequately managing access to that information. This includes authentication of access, authorisation to access data based on genuine business needs, and monitoring and reviewing of access to data.
Organisations need to have robust frameworks in place to manage access to their information and reduce the risk of inappropriate or unauthorised access which could cause significant loss.
Having appropriate controls over user access management has become more challenging than ever before due to the integrated nature of application access, third-party products and cloud-based delivery.
Identity and access management (IAM) is a constantly evolving area with increased threats from ‘credential stuffing attacks’ (where credentials obtained from a cyber-attack on one system are used to try and breach another systems) and failures of controls at third parties. With the recent changes to the UK Corporate Governance Code, the importance of internal controls (including IT controls) is now higher than ever on boards’ agendas.
IAM can support the requirements of the Code by ensuring:
In a technology dependent world, it is often critical that an organisation's IT infrastructure and applications are resilient and continue to operate at acceptable levels during unexpected events or when elements of their technology environment are compromised. When outages occur, businesses need to be able to recover in an efficient and timely manner.
Many organisations are currently facing the challenges of Legacy IT that do not provide the level of resilience they now require. Additionally, the increased adoption of Cloud solutions has expanded the resilience challenge into organisations' supply chains.
The risks of systems outages are not new and have been high on risk agendas for some time. There continues to be, however, multiple high-profile examples of businesses suffering outages due to issues with Legacy IT, human error, natural disasters, cyber-attacks, and control failures at third parties.
The upcoming revisions to the UK Corporate Governance Code will require boards to monitor and report on risk management and the effectiveness of their internal controls. Given that resilience of technology systems is a major risk faced by organisations, there is an increased need to gain assurance over the controls in place to mitigated this.
Despite the government withdrawing elements of the proposed changes to the UK Corporate Governance Code (the Code), the requirement to report on and evidence the effectiveness of internal controls remains, this includes IT controls.
Formulating centralised IT control frameworks can help organisations standardise how IT controls are defined and implemented, ensuring IT controls mitigate the key technology risks their organisation is facing. They also enable control gaps or weaknesses to be easily identified and help facilitate periodic reviews of the control environment.
Automation is crucial as it enhances internal controls' effectiveness, ensures timely compliance, reduces human error, and facilitates real-time monitoring, aligning with regulatory expectations.
IT control frameworks have been a common practice for financial services firms due to regulatory demands. We are seeing, however, a growing number of large businesses from other sectors commissioning programmes to design, implement and test frameworks. With so many businesses running such programmes simultaneously, and with limited resources available in the market, organisations are facing a resourcing challenge, impacting their ability to deliver these.
The proposed updates to the Code (often known as ‘UK SOX’) include the need for boards to make sure their organisations have sufficient controls in place, including IT controls. Automation and Robotic Process Automation (RPA) have improved IT control programmes by simplifying repetitive tasks, reducing mistakes, ensuring compliance, and enhancing operational efficiency for companies.
The risks associated with data management and quality are paramount as they directly impact decision-making, business operations, and regulatory compliance. Poor data quality undermines the integrity of analytics, leading to flawed insights and misguided strategies. Inaccurate or incomplete data poses financial and reputational threats, hindering organisational success.
Robust data management mitigates cyber security risks, safeguarding sensitive information from breaches. Compliance with data protection regulations, such as GDPR, hinges on accurate data handling. Addressing these risks ensures organisations can trust their data, fostering informed decision making, maintaining customer trust, and complying with legal requirements in an increasingly data-driven business landscape.
Demands on data are ever increasing, whether that’s from the latest AI technologies or recent ESG reporting, consequently robust data management and quality measures have never been more critical.
As a result, there's been a rise in data functions being created within organisations to elevate the strategic importance of data. Data functions are often led by Chief Data Officers (CDOs) and this executive level leadership plays a pivotal role in fostering a data-driven culture, ensuring data quality, and aligning data initiatives with business goals. CDOs also navigate regulatory landscapes, ensuring compliance with data protection laws.
Get the latest insights, events and guidance, straight to your inbox.
The FCA has taken another step forward by confirming the introduction of a targeted support framework and publishing the near final rules in PS25/22.
Boards are increasingly being called upon to take ownership of technology risk oversight as a strategic imperative, reinforced by the updated UK Corporate Governance Code and the new Cyber Governance Code of Practice. In 2026, staying ahead of technology risks and regulatory shifts isn’t optional - it’s essential. Are you clear on where to focus to keep your organisation in control?
Our latest Corporate Governance Review details how a box-ticking approach to assurance is exposing companies to risks.