Changes in Russian Information Security Legislation in 2026
Russian regulation in the field of information protection is undergoing a major transformation. This article summarizes key changes from January 2026, provides a detailed comparison of FSTEC Order No.117 with No.17, and outlines practical implications for organizations.
Note: This overview covers Russian federal regulations. Acronyms used: CII — Critical Information Infrastructure (КИИ); FSTEC — Federal Service for Technical and Export Control; GIS — State Information System (ГИС); PD — Personal Data (ПДн).
Overview of Regulatory Changes in January 2026
Critical Information Infrastructure (CII)
Sector-specific categorization rules for CII objects in nuclear energy
On January 16, 2026, the Russian Government adopted Decree No.4 approving sector-specific rules for categorizing CII objects in the nuclear energy sector.
Key provisions:
- Representatives of the State Corporation “Rosatom” may be included in the categorization commission.
- Certain significance indicators from the list approved by Decree No.127 of 08.02.2018 (positions 4, 10, 10¹–10⁷, 14) do not apply to nuclear sector CII objects.
- Additional input data include: technical and design documentation, service agreements, operation and maintenance documents, scenarios of possible cyberattacks and incidents, and information from employee questionnaires.
- Methods for calculating indicators: expert assessment, analogy method, attack and incident modeling, and risk-based calculation.
The calculation takes into account physical effects of accidents (fires, toxic releases), defense procurement parameters, and other factors.
Sector-specific categorization rules for CII objects in banking and financial markets
On February 6, 2026, the Russian Government adopted Decree No.92 “On approval of sector-specific rules for categorizing CII objects in the banking sector and other sectors of the financial market.” The document enters into force on February 15, 2026.
What it is and why it matters
In simple terms: banks, insurance companies, pension funds, exchanges, payment systems, and other financial market participants must identify their information systems that qualify as critical infrastructure and assign them significance categories. Previously, general rules applied to all sectors. Now the financial sector has its own rules — what counts as significant and how to assess it.
Who is covered
CII subjects in the banking and financial market sector include:
- Central Bank of Russia;
- credit institutions (banks);
- non-credit financial organizations (insurance, microfinance, pension funds, etc.);
- national payment system participants;
- payment infrastructure service operators;
- digital ruble platform operator;
- credit bureaus;
- professional financial market service providers;
- government bodies and their subordinate organizations performing banking and financial market functions.
How a system is determined to be a CII object
An organization inventories its information systems and checks them against sector-specific lists of typical CII objects. If a system is on the list — it must be categorized. If a system is not on the list but a failure could cause serious consequences (by damage scale) — it must also be categorized and proposed for inclusion in the list.
Which systems are assessed and by which indicators
The document specifies which system types correspond to which significance indicators. For example:
- Central Bank money transfer systems — indicators 6 and 10 (volume of operations, functional significance).
- Remote banking systems (internet banking, mobile banking) — indicator 10.
- Automated banking systems — indicator 10.
- Payment processing systems — indicator 10.
- Clearing systems (settlements between participants) — indicator 10¹ (volume of executed obligations in rubles).
- Securities custody and accounting systems — indicator 10² (number of securities).
- Pension fund systems (pension savings and reserves accounting) — indicator 10³.
- Insurance systems (policy, payment, loss accounting) — indicator 10⁴.
- Information exchange systems for e-payment operations — indicator 10⁵.
- Microfinance organization systems (microloan accounting) — indicator 10⁶.
- Credit bureaus — indicator 10⁷ (number of credit histories).
- Data centers providing resources for significant CII objects (except Central Bank, banks, etc.) — indicators 6 and 7.
For each system category, the document provides formulas for calculating indicator values — based on transaction volume, assets, number of clients, etc.
Commission and reporting
The organization establishes a categorization commission, conducts the assessment, and assigns categories. Information is submitted to FSTEC. Additionally:
- To the Ministry of Finance — government bodies, state unitary enterprises, state institutions, and organizations that are not banks, payment systems, etc.
- To the Bank of Russia — credit institutions, non-credit financial organizations, payment system participants, professional market participants.
Annually, by the 10th business day of the year, an updated list of significant CII objects and a decision on category revision (or no revision) must be submitted.
Practical implications
For banks and financial organizations, the document provides a clear algorithm: which systems to treat as critical, how to rank them, and where to report. This forms the basis for applying protection measures under Federal Law 187-FZ and FSTEC Order No.117.
Document links
- Government Decree No.92 of 06.02.2026 — full text on Kontur.Normativ
- Official publication — Official internet portal of legal information (published 07.02.2026)
Personal Data
Biometrics in access control systems
On January 24, draft amendments to Federal Law No.572-FZ of 29.12.2022 on the use of biometric personal data were published. The changes concern physical and logical access control systems (ACS):
- Expanded possibility to use own accredited systems with vectors from the unified biometric system — not only for employees but also for visitors, affiliated persons, and subsidiaries.
- Differentiated requirements for CII objects by significance category: in controlled zones of categories 1 and 2, accredited government systems and own systems (with accreditation) are permitted; in category 3 and uncategorized objects — systems of other accredited organizations.
Criminal liability for automated processing of personal data
On January 27, draft amendments to Article 272.1 of the Criminal Code were published. A new offense is introduced — “automated processing” of personal data obtained unlawfully. This will allow prosecution for illegal processing regardless of subsequent actions. The bill targets the use of deepfakes for fraud, blackmail, and harm.
Administrative liability in telecommunications
On January 15, draft amendments to the Administrative Offenses Code were published:
- Liability for concluding telecommunications service agreements in unauthorized or non-compliant locations.
- Increased fines under Art. 13.29(4) for legal entities — from 500,000 to 1 million rubles.
- Liability for telecom operators for non-compliance with verification node requirements of the “Antifraud” GIS (including ongoing interaction) — fines for legal entities from 600,000 to 1 million rubles.
- Extended statute of limitations under Art. 13.33 (electronic signature) to 1 year.
The bill may enter into force on September 1, 2026.
FSTEC Russia
Certification of informatization objects
On January 26, a draft FSTEC order amending the certification procedure (Order No.77 of 29.04.2021) was published. The draft aligns with Order No.117 of 11.04.2025. Key points:
- Requirements extend to information systems of government bodies, state unitary enterprises, and state institutions.
- Periodic control may be conducted by own information protection units (after notifying FSTEC).
- New certification testing methods, including modeling of current threats.
- Mandatory penetration testing for GIS and government information systems of protection classes 1 and 2 that have internet connectivity or interact with external systems (with exceptions for systems operating only via VPN or encrypted networks).
- Data center infrastructure for digital transformation of public administration is subject to mandatory certification.
- Security control — by vulnerability analysis and penetration testing per FSTEC methodology of 25.11.2025. A report (protocol) is submitted to FSTEC at least once every 3 years.
Licensing of development and production of information protection tools
On January 29, a draft Government decree amending the licensing regulation (Decree No.171 of 03.03.2012) was published:
- Direct prohibition for sole proprietors with foreign citizenship and legal entities whose heads are foreign citizens.
- Reduced required experience for heads to 5 years (previously 7).
- Increased minimum number of engineers: at least 5 for technical protection tools, at least 10 for development and production of software protection tools.
- Mandatory use of predominantly domestically produced equipment and software located in Russia.
- Presence of certified (attested) information system for processing confidential information at the place of activity.
- Mandatory production control system per GOST R 56939-2024 “Information protection. Secure software development. General requirements.”
Licensing of technical information protection activities
On January 29, draft amendments to the TIP licensing regulation (Decree No.79 of 03.02.2012) were published:
- Same restrictions for foreign sole proprietors and legal entities with foreign heads.
- New staffing requirements: for security monitoring — at least 15 engineers (5 with 3+ years experience); for certification testing — at least 9 engineers (3 with 3+ years); for other services — at least 5 engineers with 3+ years experience.
- Mandatory use of predominantly domestic equipment and software in Russia.
- Production quality control system for most types of activities.
FSTEC Order No.117 vs No.17: Key Differences
As of March 1, 2026, Order No.17 loses force and FSTEC Order No.117 takes effect. This is not a minor update but a shift in regulatory logic.
Shift in approach: from checklist to risk-based model
Order No.17 established a fixed set of requirements. Categorization and choice of measures largely depended on system type rather than actual threats and consequences.
Order No.117 requires building protection based on threat models, risks, and operating conditions. Systems of the same type may require different protection levels depending on incident consequences. The regulator evaluates not only the presence of measures but also their justification and effectiveness.
Terminology and scope
Order No.117 revises the conceptual framework. Terms are aligned with Federal Laws 149-FZ, 187-FZ, and subordinate acts. The understanding of an information security system is expanded: organizational, software, and technical measures are considered as a whole.
Classification and protection levels
Order No.17: protection class effectively defined an exhaustive set of measures.
Order No.117: levels are formed based on damage analysis, current threats, and architecture. Information security risks are considered, not just formal criteria.
Threat and attacker model
Order No.17: threat models were often formal and used mainly during design and certification.
Order No.117: special attention to threats related to remote access, supply chains, and human factors. The model must reflect real attack scenarios.
Organizational measures
Order No.17: organizational measures often boiled down to having regulations and orders.
Order No.117: the information security policy must be a working document with roles, responsibilities, and decision-making procedures. Requirements for staff training and internal control are strengthened.
Technical and software measures
Order No.17: emphasis on the list of certified protection tools and their presence.
Order No.117: focus on outcome — the ability to prevent and detect incidents. Combined solutions are allowed with justification of effectiveness. The role of monitoring and logging increases.
New focus areas
Order No.117 separately highlights:
- protection of web applications and APIs;
- protection of remote access (mandatory strong authentication, VPN, configuration control of remote workstations);
- security when working with contractors;
- protection of virtualization and cloud environments;
- IoT, container, and orchestration technologies.
Infrastructure and contractors
Order No.17 focused on the GIS perimeter. IT infrastructure components outside the perimeter could remain uncertified.
Order No.117 extends requirements to the IT infrastructure on which GIS operate. Contractors must provide certification under the same threat model and class as the customer. This fundamentally changes supply chain requirements.
Incident response
Order No.117 clarifies processes for detection, analysis, and remediation of incidents. Event correlation and integrity control tools are required.
Why Costs Will Rise
Expanded scope
Requirements apply not only to GIS but also to information systems of government bodies, state unitary enterprises, state institutions, and municipal bodies. The definition of GIS is broadened — any system of government bodies where state data is processed.
New mandatory measures
- Mandatory penetration testing for GIS of classes 1 and 2 with internet access.
- Remote access protection with configuration control, VPN, antivirus, and additional tools.
- Protection of web applications and APIs.
- Virtualization requirements: certified solutions or overlay protection tools.
- Mandatory certification of data center infrastructure for digital transformation of public administration.
Contractors
Contractors must build certified segments and meet the same requirements as the customer. For many, this means new tasks requiring consulting and infrastructure upgrades. The pool of suppliers capable of meeting requirements shrinks, leading to price increases.
Market estimates
According to market participants, implementing solutions in 2025 could yield savings of up to 30%. From 2026, the following is expected:
- 25–30% cost increase due to changes in tax and certification regulation;
- higher certification costs due to new requirements;
- rising license and certification prices.
Responsibility
Order No.117 effectively expands management responsibility. Errors in threat assessment may lead not only to regulatory but also to financial risks. Responsibility no longer rests solely with the information security department.
Additional 2026 Trends
Federal Law 152-FZ (personal data)
- Stricter fines (up to millions of rubles).
- Stronger localization requirements for Russian citizens’ personal data.
- New consent and notification rules for data subjects (from September 1, 2025).
Federal Law 187-FZ (CII)
- Exclusion of sole proprietors from CII subjects.
- Expanded powers of the Russian Government.
- Requirements for use of domestic software on significant objects.
- Extension of requirements to contractors and suppliers.
Antifraud platform and biometrics
- From March 1, 2026 — launch of GIS to combat cyber fraud (Federal Law 41-FZ).
- Microfinance organizations must authenticate borrowers by biometrics when concluding consumer loan agreements in electronic form.
Draft law on fines for CII operation violations
Introduction of Art. 13.12.2 of the Administrative Offenses Code is under consideration: fines for individuals 5–10 thousand rubles, for officials 10–50 thousand rubles, for legal entities 100–500 thousand rubles for violation of CII object operation rules.
Preparation Recommendations
- Conduct a legal audit — compare current measures with Order No.117 requirements, assess the justification of measure selection from the perspective of threats and consequences.
- Update the threat model — ensure it reflects real attack scenarios, including remote access, supply chains, and human factors.
- Revise local regulations — information security policies and procedures must align with the new terminology and logic of Order No.117.
- Define responsibility allocation — roles and authority not only for information security specialists but also for department heads, IT, and top management.
- Check incident readiness — presence of procedures for detection, recording, analysis, and decision-making.
- Don’t delay — certifications under Order No.17 conducted before March 1, 2026 remain valid; when planning new projects, it is advisable to align with Order No.117 requirements.
Sources: USSC review January 2026 , Klerk.Ru on Order 117 , Anti-Malware.ru on GIS requirements , Computerra on 2026 IS trends , Lidings on CII changes 2025–2026 , D-Russia on Decree 92
