top of page

Application for Banking License: IT & IS Framework

IT & IS - Banking License

Applying for a banking (or PSP/EMI) license requires more than capital and governance. Supervisors expect a risk-based IT & Information Security pack that shows how your technology, third parties, and controls support business strategy and meet legal duties on Information and Communication Technology (ICT) risk, outsourcing, and operational resilience.

 

Investors who enter projects aimed at obtaining a banking, EMI, or PSP license often underestimate the true scope of resources required. While attention is usually focused on regulatory, legal, and capital requirements, the IT dimension is frequently overlooked or treated as secondary. In reality, the technological backbone, including infrastructure, security, and compliance with regulatory standards, constitutes one of the most substantial and complex components of the licensing process. Failure to properly assess and budget for these IT requirements at the application stage not only delays approval but also jeopardizes the financial viability of the entire venture.

​

This article outlines the core content regulators and investors expect at submission, and a practical process to plan and manage activities with the license team.

Wavy Abstract Background

Analysis and Research Phase

Translate business, compliance, non-functional, and information-security inputs into a clear IT & IS scope and a regulatory map. In this phase we identify the license and jurisdictions, build a compact compliance matrix, capture business requirements (products, channels, geographies, volumes), draft NFRs (availability, RTO/RPO, latency, data residency), list processes and external integrations/data flows, and define governance (CIO/CTO, CISO, DPO, decision rights).

Business Strategy Analysis

Captures the bank’s business strategy and product scope and aligns them with the ICT strategy. Forms the foundation for the target architecture, delivery roadmap, and budget.

Non-functional Requirements

Specify the quality attributes and operational constraints of the system—how it must perform. Typical NFRs include performance, scalability, security, reliability, usability, and maintainability.

Compliance Documents Research

Maps the business and IT scope to applicable regulatory requirements and clarifies what must be included in the license application. Getting this wrong triggers regulator queries or rejection.

Information Security Requirements

Define information-security requirements by mapping regulatory obligations and recognized standards to our scope. Consolidate data protection and security into baseline controls, policies, and training commitments for the application.

Documents Development Phase

Produce the IT documentation based on the captured requirements. This documentation set is reviewed and approved by the client’s license team.

Business Description

Describes target client segments, banking products, and core business processes. Serves as a prerequisite for solution architecture and vendor communication.

​

Regulatory Map

List of IT-related regulatory requirements with links to official sources from the licensing authority.​

​

​

Target IT Architecture

The blueprint of IT banking solutions, data flows, internal/external integrations supporting operations. The diagram is the starting point for budget estimation and resource planning.

Indicative Budget

Translates the IT scope into an indicative CapEx/OpEx budget that demonstrates sufficient resources to meet regulatory and digital-operational-resilience obligations (e.g., EBA ICT, DORA).

Reference for Information

Core document for engaging potential vendors and shaping the indicative IT budget. Unlike an RFP, an RFI does not oblige you to select a vendor.

​

​

IT & IS Application Pack

Consolidates the IT & IS deliverables and aligns them with the investor’s business plan; submitted to the supervisor as part of the license application.

​

Conclusion

A strong license application  requires a concise, risk-based IT & IS pack that proves governance, shows a coherent target architecture, sets measurable NFRs, lists key policies and third-party dependencies, describes incident reporting and data protection.

​

When these elements are consistent and proportional to the business, supervisors can quickly see that ICT risks are understood and managed, reducing clarification rounds and accelerating the overall assessment.

 

At the same time, investors gain a clear view of the funding required to build and operate the IT backbone of a modern financial institution.

© 2025 Fintegrator. All rights reserved.

bottom of page