The CBN Has Expanded Its Cybersecurity Mandate. Here Is What Your Institution Must Do Now.

On 30 March 2026, the Central Bank of Nigeria issued a directive that extends mandatory cybersecurity self-assessment to institutions not previously within its regulatory scope.

If your institution is a Microfinance Bank, Payment Service Provider, Finance Company, or Development Finance Institution, this applies to you directly. The CBN is not consulting. It is requiring compliance, with fixed submission timelines that started running from the date of the directive.

This article explains what the directive contains, who it covers, what the submission requires, and what your institution should do before the deadline arrives.

"The CSAT is a structured supervisory instrument designed to obtain comprehensive information on the cybersecurity posture of regulated institutions."

01 — The Directive

What the CBN Has Required

The CBN Compliance Department issued this directive on 30 March 2026 under reference CMD/DIR/PUB/ESSD/001/2026, formally deploying a Cybersecurity Self-Assessment Tool across the Nigerian financial sector.

The CSAT is a structured supervisory instrument. It covers cybersecurity governance, risk management practices, technology and third-party risk controls, incident response capabilities, and overall operational resilience. This is not a voluntary questionnaire. It is a mandatory regulatory submission completed through a dedicated CBN portal.

Access credentials and submission guidance will be communicated directly to Chief Information Security Officers at each institution. If your CISO has not received those credentials since 30 March, that requires immediate attention.

Institution Type

Submission Deadline

Deposit Money Banks

3 weeks — approx. 20 April 2026

Microfinance Banks, Payment Service Providers, Finance
Companies, Development Finance Institutions

5 weeks — approx. 4 May 2026

All submissions must be fully completed and accompanied by relevant supporting documentation. The data cut-off date for the assessment period is 31 December 2025. Institutions requiring clarification should contact CBN’s Enterprise Security Supervision Division at cmd.enterprisesecurity@cbn.gov.ng.

Scope

The directive explicitly names Deposit Money Banks, Payment Service Banks, Microfinance Banks, Payment Service Providers, Finance Companies, and Development Finance Institutions. This is materially broader than prior CBN cybersecurity frameworks, which focused primarily on commercial banks and payment service banks.

02 — Why This Matters

The Regulatory Shift Behind This Directive

The CBN has been tightening cybersecurity oversight since its Risk-Based Cybersecurity Framework came into force in July 2024. This directive signals a deliberate expansion of that oversight architecture to a much wider set of regulated institutions.

Microfinance Banks, Payment Service Providers, Finance Companies, and Development Finance Institutions collectively process enormous volumes of customer financial data. Many have not historically operated under the same cybersecurity governance expectations as commercial banks. That changes now, formally and with a fixed deadline.

The CBN established a dedicated Enterprise Security Supervision Division in September 2025, with cybersecurity, data protection, and third-party risk explicitly assigned to it. This directive comes from that division and signals that CBN intends to treat cybersecurity compliance with the same rigour it applies to prudential and AML requirements.

Nigeria’s financial sector faces 4,718 cyberattacks per week, according to Check Point Software’s 2024 African Perspectives on Cybersecurity Report, the highest frequency of any sector in the country. Nigerian financial institutions lost N52.26 billion to fraud in 2024 alone, according to the Nigeria Inter-Bank Settlement System, a sharp increase from the previous year. A missed or inadequate CSAT submission becomes a formal non-compliance event on the CBN supervisory record, one that will be interrogated in the next examination cycle.

03 — Assessment Areas

What the CSAT Measures

The CBN describes the CSAT as covering five core areas. Here is what your institution will need to demonstrate across each.

01. Cybersecurity Governance and Oversight

Board-level oversight of cybersecurity, a formally appointed CISO with documented authority and budget, and cybersecurity policies approved at board level. An institution that has appointed a CISO in title but without the authority or resources the role requires will be exposed here.

02. Risk Management Practices

A documented cybersecurity risk framework integrated into the institution’s overall risk management structure. Risk assessments must be current. Historical documents not reviewed or updated will not satisfy this requirement.

03. Technology and Third-Party Risk Controls

Every vendor and FinTech integration must be covered by a formal assessment, compliance monitoring programme, and business continuity plan. Institutions with large partner ecosystems frequently cannot produce this documentation on request.

04. Incident Response Capabilities

A documented, tested incident response procedure covering escalation paths, communication templates, and regulatory reporting formats. A written plan that has never been run is not a tested procedure.

05. Overall Operational Resilience

Evidence that the institution can continue to operate and recover from a significant cyber event. Business continuity planning, recovery time objectives, and tested recovery procedures are required, not just documented intentions.

04 — Recommended Actions

What Your Institution Should Do Before the Deadline

The five-week window is short. If documented controls are not already in place across the five CSAT areas, they cannot be built from scratch before the deadline. What can be done is an honest internal assessment, a credible remediation plan, and the most complete submission your institution can produce.

01. Confirm your CISO has received portal credentials from CBN
If those credentials have not arrived since 30 March, contact the Enterprise Security Supervision Division at cmd.enterprisesecurity@cbn.gov.ng. Do not wait for a follow-up communication.
 
02. Run a gap assessment against the five CSAT domains immediately
Start internally. Identify where your documentation is current, where it is not, and the difference between what exists on paper and what is operationally in place.
 
03. Commission an independent review if material gaps exist
An independent gap assessment before submitting is a materially different position from a CBN examination after the fact. The former gives your institution a defensible posture.
 
04. Confirm board sign-off is documented
Your CSAT must be endorsed by Executive Management. A board resolution or minute confirming sign-off needs to exist as a document, not as an assumed fact.
 
05. Do not submit an incomplete return without a remediation plan
CBN examiners distinguish between institutions that are engaged with their compliance obligations and those that are not. An incomplete submission with a clear timeline is materially better than no submission at all.

On the Data Cut-Off

The directive specifies that CSAT data must cover the period ending 31 December 2025. Your evidence and documented controls must reflect what your institution had in place as of that date. The preparation window is about documentation and positioning, not about implementing new controls to include in the submission.

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

Insights & Success Stories

Related Industry Trends & Real Results