Changes in Russian Information Security Legislation in 2026

Changes in Russian Information Security Legislation in 2026

Russian regulation in the field of information protection is undergoing a major transformation. This article summarizes key changes from January 2026, provides a detailed comparison of FSTEC Order No.117 with No.17, and outlines practical implications for organizations.

Note: This overview covers Russian federal regulations. Acronyms used: CII — Critical Information Infrastructure (КИИ); FSTEC — Federal Service for Technical and Export Control; GIS — State Information System (ГИС); PD — Personal Data (ПДн).


Overview of Regulatory Changes in January 2026

Critical Information Infrastructure (CII)

Sector-specific categorization rules for CII objects in nuclear energy

On January 16, 2026, the Russian Government adopted Decree No.4 approving sector-specific rules for categorizing CII objects in the nuclear energy sector.

Key provisions:

The calculation takes into account physical effects of accidents (fires, toxic releases), defense procurement parameters, and other factors.

Sector-specific categorization rules for CII objects in banking and financial markets

On February 6, 2026, the Russian Government adopted Decree No.92 “On approval of sector-specific rules for categorizing CII objects in the banking sector and other sectors of the financial market.” The document enters into force on February 15, 2026.

What it is and why it matters

In simple terms: banks, insurance companies, pension funds, exchanges, payment systems, and other financial market participants must identify their information systems that qualify as critical infrastructure and assign them significance categories. Previously, general rules applied to all sectors. Now the financial sector has its own rules — what counts as significant and how to assess it.

Who is covered

CII subjects in the banking and financial market sector include:

How a system is determined to be a CII object

An organization inventories its information systems and checks them against sector-specific lists of typical CII objects. If a system is on the list — it must be categorized. If a system is not on the list but a failure could cause serious consequences (by damage scale) — it must also be categorized and proposed for inclusion in the list.

Which systems are assessed and by which indicators

The document specifies which system types correspond to which significance indicators. For example:

For each system category, the document provides formulas for calculating indicator values — based on transaction volume, assets, number of clients, etc.

Commission and reporting

The organization establishes a categorization commission, conducts the assessment, and assigns categories. Information is submitted to FSTEC. Additionally:

Annually, by the 10th business day of the year, an updated list of significant CII objects and a decision on category revision (or no revision) must be submitted.

Practical implications

For banks and financial organizations, the document provides a clear algorithm: which systems to treat as critical, how to rank them, and where to report. This forms the basis for applying protection measures under Federal Law 187-FZ and FSTEC Order No.117.

Document links

Personal Data

Biometrics in access control systems

On January 24, draft amendments to Federal Law No.572-FZ of 29.12.2022 on the use of biometric personal data were published. The changes concern physical and logical access control systems (ACS):

Criminal liability for automated processing of personal data

On January 27, draft amendments to Article 272.1 of the Criminal Code were published. A new offense is introduced — “automated processing” of personal data obtained unlawfully. This will allow prosecution for illegal processing regardless of subsequent actions. The bill targets the use of deepfakes for fraud, blackmail, and harm.

Administrative liability in telecommunications

On January 15, draft amendments to the Administrative Offenses Code were published:

The bill may enter into force on September 1, 2026.

FSTEC Russia

Certification of informatization objects

On January 26, a draft FSTEC order amending the certification procedure (Order No.77 of 29.04.2021) was published. The draft aligns with Order No.117 of 11.04.2025. Key points:

Licensing of development and production of information protection tools

On January 29, a draft Government decree amending the licensing regulation (Decree No.171 of 03.03.2012) was published:

Licensing of technical information protection activities

On January 29, draft amendments to the TIP licensing regulation (Decree No.79 of 03.02.2012) were published:


FSTEC Order No.117 vs No.17: Key Differences

As of March 1, 2026, Order No.17 loses force and FSTEC Order No.117 takes effect. This is not a minor update but a shift in regulatory logic.

Shift in approach: from checklist to risk-based model

Order No.17 established a fixed set of requirements. Categorization and choice of measures largely depended on system type rather than actual threats and consequences.

Order No.117 requires building protection based on threat models, risks, and operating conditions. Systems of the same type may require different protection levels depending on incident consequences. The regulator evaluates not only the presence of measures but also their justification and effectiveness.

Terminology and scope

Order No.117 revises the conceptual framework. Terms are aligned with Federal Laws 149-FZ, 187-FZ, and subordinate acts. The understanding of an information security system is expanded: organizational, software, and technical measures are considered as a whole.

Classification and protection levels

Order No.17: protection class effectively defined an exhaustive set of measures.

Order No.117: levels are formed based on damage analysis, current threats, and architecture. Information security risks are considered, not just formal criteria.

Threat and attacker model

Order No.17: threat models were often formal and used mainly during design and certification.

Order No.117: special attention to threats related to remote access, supply chains, and human factors. The model must reflect real attack scenarios.

Organizational measures

Order No.17: organizational measures often boiled down to having regulations and orders.

Order No.117: the information security policy must be a working document with roles, responsibilities, and decision-making procedures. Requirements for staff training and internal control are strengthened.

Technical and software measures

Order No.17: emphasis on the list of certified protection tools and their presence.

Order No.117: focus on outcome — the ability to prevent and detect incidents. Combined solutions are allowed with justification of effectiveness. The role of monitoring and logging increases.

New focus areas

Order No.117 separately highlights:

Infrastructure and contractors

Order No.17 focused on the GIS perimeter. IT infrastructure components outside the perimeter could remain uncertified.

Order No.117 extends requirements to the IT infrastructure on which GIS operate. Contractors must provide certification under the same threat model and class as the customer. This fundamentally changes supply chain requirements.

Incident response

Order No.117 clarifies processes for detection, analysis, and remediation of incidents. Event correlation and integrity control tools are required.


Why Costs Will Rise

Expanded scope

Requirements apply not only to GIS but also to information systems of government bodies, state unitary enterprises, state institutions, and municipal bodies. The definition of GIS is broadened — any system of government bodies where state data is processed.

New mandatory measures

Contractors

Contractors must build certified segments and meet the same requirements as the customer. For many, this means new tasks requiring consulting and infrastructure upgrades. The pool of suppliers capable of meeting requirements shrinks, leading to price increases.

Market estimates

According to market participants, implementing solutions in 2025 could yield savings of up to 30%. From 2026, the following is expected:

Responsibility

Order No.117 effectively expands management responsibility. Errors in threat assessment may lead not only to regulatory but also to financial risks. Responsibility no longer rests solely with the information security department.


Federal Law 152-FZ (personal data)

Federal Law 187-FZ (CII)

Antifraud platform and biometrics

Draft law on fines for CII operation violations

Introduction of Art. 13.12.2 of the Administrative Offenses Code is under consideration: fines for individuals 5–10 thousand rubles, for officials 10–50 thousand rubles, for legal entities 100–500 thousand rubles for violation of CII object operation rules.


Preparation Recommendations

  1. Conduct a legal audit — compare current measures with Order No.117 requirements, assess the justification of measure selection from the perspective of threats and consequences.
  2. Update the threat model — ensure it reflects real attack scenarios, including remote access, supply chains, and human factors.
  3. Revise local regulations — information security policies and procedures must align with the new terminology and logic of Order No.117.
  4. Define responsibility allocation — roles and authority not only for information security specialists but also for department heads, IT, and top management.
  5. Check incident readiness — presence of procedures for detection, recording, analysis, and decision-making.
  6. Don’t delay — certifications under Order No.17 conducted before March 1, 2026 remain valid; when planning new projects, it is advisable to align with Order No.117 requirements.

Sources: USSC review January 2026 , Klerk.Ru on Order 117 , Anti-Malware.ru on GIS requirements , Computerra on 2026 IS trends , Lidings on CII changes 2025–2026 , D-Russia on Decree 92

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut