Contact salesSign inSign up
AuthsignalAuthsignal
Product
Passwordless / multi-factor authentication (MFA)
Drop-in authentication
Risk-based authentication
Passkeys
Biometric authentication
WhatsApp OTP
Authenticator apps (TOTP)
Push authentication
SMS OTP
Email OTP
Magic links
See all authenticators
See less authenticators
Palm biometrics
Contactless payments & identity verification
Flexible integration modes
Pre-built UI
Low code
UI components
Customizable
Custom UI
Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Keep users signed in across web and mobile after authentication
Fraud Controls
Rules and policies engine
Step-up authentication
No-code rule creation
Risk alerts
User observability
Audit trails
Dynamic linking
Why Authsignal?
Complete authentication infrastructure from enrollment to step-up auth, modular by design
Solutions
By USE CASE
View All
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm biometrics payments
By INDUSTRY
View All
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By ROLe
Engineers
Product
Passwordless / Multi-factor Authentication (MFA)
Flexible Integration Modes
Pre-built UI · Low code
UI Components · Customizable
Custom UI · Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Issue JWT access and refresh tokens
Why Authsignal?
Plug in Authsignal to elevate your IDP — effortless integration with any architecture.
Drop-in Authentication
Risk-based authentication
Passkeys
Biometric authentication
WhatsApp OTP
SMS OTP
Email OTP
Magic links
Authenticator apps (TOTP)
Push notifications
Palm Biometrics
Contactless payments & identity verification
Fraud Controls
Rules and Policies Engine
Step-up Authentication
No Code Rule Creation
Risk Alerts
User Observability
Audit Trails
Use Cases
Financial services
Account takeovers (ATO)
Marketplace
Go passwordless
e-Commerce
Solutions
By Use Case
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm Biometric Payments
View all Use Cases
By Industry
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
View all Industries
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By Role
Engineers
PricingAboutDocsBlog
Schedule a call
Try Authsignal
AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Join us today!
Right icon
Blog
/
Current article
regulation
Banking
Multi-factor authentication

Bank Negara Malaysia’s RMiT update just raised the bar on authentication. Here’s how to comply

Ashutosh Bhadauriya
⬤
February 20, 2026
Share
Bank Negara Malaysia’s RMiT update just raised the bar on authentication. Here’s how to comply

Bank Negara Malaysia (BNM) recently issued an updated Risk Management in Technology (RMiT) policy, replacing a previous version from June 2023. While the update spans a wide range of technology risk requirements, some of the most actionable changes sit in authentication, device binding, and fraud prevention controls.

Financial institutions operating in Malaysia, including banks, insurers, e-money issuers, and payment system operators, need to comply with it. This post breaks down the key authentication related requirements in the updated RMiT, and shows how modern identity and authentication infrastructure can help you meet them.

‍

A bit of context first

BNM has been pushing financial institutions away from SMS OTP since 2022, when the central bank publicly directed major banks to start migrating to more secure authentication methods. The reasoning behind this was, fraudsters had developed tools to intercept and silently delete SMS authentication codes before customers even saw them. SIM-swap attacks allowed criminals to redirect those codes to a device they fully controlled.

In 2024, Malaysian banks collectively blocked over RM 399 million in fraudulent transactions, five times the amount actually lost to online fraud that year. The authentication upgrades worked.

The November 2025 update takes that progress and turns it into law. What was previously guidance or best practice is now a mandatory standard. And the requirements go further than before.

‍

What has changed in the updated RMiT?

BNM's latest update consolidates and strengthens several earlier circulars and specifications, including the 2022 and 2024 fraud countermeasure specifications. The result is a single, comprehensive policy with sharper requirements around how financial institutions authenticate users and protect digital services.

Here are the four authentication areas your team needs to act on.

‍

1. One device per user, by default

ensure secure binding and unbinding processes for restricting authentication of digital service transactions by default to one mobile device or secure device per account holder

RMiT Appendix 3 - Control Measures for Digital Services, paragraph 3(a)

This is a direct response to SIM-swap fraud and account takeover attacks, where fraudsters register a new device to an existing account and then drain it.The "default" framing matters. Customers can opt to use multiple devices, but they must explicitly request this and accept the associated risks. The institution cannot make multi-device the default.Practically, this means your onboarding and authentication flows need to track device registration, enforce a single binding by default, and have a clear, auditable process for customers who request exceptions.

‍

2. Strong verification before a phone number can change

the registration of new mobile phone number or replacement of existing mobile phone number is only processed after applying robust verification methods to confirm the authenticity of the customer

RMiT Appendix 3 - Control Measures for Digital Services, paragraph 3(c)

This sounds simple, but in practice many institutions still allow phone number changes with nothing more than an OTP sent to the current number. That approach fails completely if the current number has already been compromised or the SIM swapped."Robust verification" in BNM's framing means methods that go beyond the channel being changed. Think identity re-verification, step-up authentication using biometrics, or in-branch confirmation for high-risk changes.

‍

3. Cooling-off periods and transaction limits for new devices

apply appropriate verification and cooling-off period for first time enrolment of digital services or secure device and multiple successive high-volume transactions or other abnormal transaction patterns. Transaction limit increase must also be subject to appropriate verification.

RMiT Appendix 3 - Control Measures for Digital Services, paragraph 3(e)

This is a friction-as-a-feature requirement. A newly enrolled device should not immediately have full transaction capabilities. Institutions need to implement time-based restrictions and velocity controls that gradually unlock as the device and user behaviour establish a trust history.Combined with the fraud detection standards, which require real-time behavioural profiling and risk scoring, this creates a clear expectation: your authentication layer needs to be aware of context, not just credentials.

‍

4. MFA that is more secure than unencrypted SMS

This is probably the most significant authentication requirement in the update, and it builds on years of BNM guidance pushing institutions away from SMS OTP:

deployment of MFA technology and channels that are more secure than unencrypted SMS…the MFA solution is resistant to interception or manipulation by any third party throughout the authentication process

RMiT Appendix 3 - Control Measures for Digital Services, paragraphs 5 and 6

And goes further to require that:

authentication code must be initiated and generated locally by the payer/sender using MFA... authentication code generated by payer/sender must be specific to the confirmed identified beneficiary and amount

This last point is transaction binding. The OTP or authentication code must be tied to the specific transaction details, not just to a session or login. This directly addresses "OTP redirect" attacks where fraudsters manipulate the transaction after the user has already authenticated.

RMiT Appendix 3 - Control Measures for Digital Services, paragraph 6(c) and 6(d)

BNM also explicitly requires institutions to:

offer to its customer a robust cryptographic key-based authentication such as digital certificate or passwordless as an alternative to existing password based authentication method

RMiT Appendix 3 - Control Measures for Digital Services, paragraph 9

This is a clear directive to move toward passkeys, hardware-backed authentication, or certificate-based methods.

‍

How Authsignal helps you meet these requirements

Authsignal is built for specifically the authentication challenges the updated RMiT is designed to address.

Single device binding: Authsignal supports device-bound passkeys and cryptographic credentials that are tied to a specific device. Your enrollment flows can enforce the one-device-per-user default with clear mechanisms for customer-requested exceptions, all with a full audit trail.

Step-up authentication for sensitive changes: When a customer attempts to change a phone number, email, or registered device, Authsignal's rules engine can trigger a step-up challenge requiring biometric verification or a stronger second factor, independent of the channel being modified.

Risk-based cooling-off logic:You can integrate Authsignal with your fraud risk signals to enforce transaction limits and velocity controls during the cooling-off period after new device enrollment. As trust builds, limits can be relaxed automatically based on configurable rules.

Passwordless and certificate-based authentication: Authsignal's passkey implementation is a direct path to compliance with BNM's requirement for cryptographic key-based authentication as an alternative to passwords.

‍

The bigger picture and next steps

Malaysia is ahead of much of the world on authentication regulation, but it is not alone in this direction. MAS in Singapore, RBI in India, and HKMA in Hong Kong are all pushing financial institutions toward device-bound, phishing-resistant authentication. The architecture required for RMiT compliance - cryptographic device binding, passkeys, transaction-level authentication - is where the entire region is heading.

If you have not already started your gap analysis, now is the time. Authentication controls: device binding, phishing-resistant MFA, transaction binding, and passwordless alternatives should be at the top of your list.

Authsignal's team can walk you through how our platform maps directly to the updated requirements and where the most common implementation gaps tend to show up.

Talk to our team or explore our documentation to get started.

Reference: Bank Negara Malaysia, Policy Document on Risk Management in Technology (RMiT), issued 28 November 2025. The full policy document is available here.

Question icon
Have a question?
Talk to an expert
NewsletterDemo PasskeysView docs
regulation
Banking
Multi-factor authentication

You might also like

How to add push authentication to your app with Authsignal and React Native
Push authentication
React native
Node.js
Multi-factor authentication
Guides

How to add push authentication to your app with Authsignal and React Native

March 27, 2026
BSP Circular 1213: Philippine banks must replace SMS OTPs by June 2026
BSP Circular 1213
Philippine banking
SMS OTP
Risk based authentication

BSP Circular 1213: Philippine banks must replace SMS OTPs by June 2026

March 18, 2026
How to add adaptive MFA and passkeys to any web app with Authsignal and Lambda@Edge
AWS
Authentication
Security

How to add adaptive MFA and passkeys to any web app with Authsignal and Lambda@Edge

March 10, 2026

Secure your customers’ accounts today with Authsignal

Passkey demoCreate free account

Authsignal delivers passwordless and multi-factor authentication as a service. Focused on powering mid-market and enterprise businesses to rapidly deploy optimized good customer flows that enable a flexible and risk-based approach to authentication.

AICPA SOCFido Certified
LinkedInTwitter
Passwordless / multi-factor authentication (MFA)
Pre-built UI (low code)UI components (customizable)Custom UI (flexible)
Why Authsignal?
Drop-in authentication
Risk-based authentication PasskeysBiometric authenticationWhatsApp OTPSMS OTPEmail OTPMagic linksAuthenticator apps (TOTP)Push authenticationPalm biometricsDigital Credential Verification API
Rules and policies engine
User observability
Industries
Financial services
Marketplace
e-Commerce
FinTech
Crypto
View all industries
Teams
Engineers
Use cases
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
View all use cases
Identity providers (IDPs)
Amazon Cognito
Auth0
Azure AD B2C
Custom identity provider
Duende IdentityServer
Keycloak
NextAuth.js
Integrations
ASP.NET
C#
Java
Node.js
Open ID Connect (OIDC)
PHP
Python
React
Ruby
Ruby on Rails
Compare
Twilio Verify vs AuthsignalAuth0 vs AuthsignalAWS Cognito vs Authsignal + AWS Cognito
Resources
BlogDeveloper docsFree Figma mobile passkeys templateFree Figma desktop passkeys templateFree Figma webapp passkeys template
Company
About usWhy AuthsignalCareersPress releasesPartnersContact us
What is
SMS OTP
Risk Based Authentication
IP Spoofing
Passwordless authentication
Multi-Factor Authentication (MFA)
United States
+1 214 974-4877
Ireland
+353 12 676529
Australia
+61 387 715 810
New Zealand
+64 275 491 983
© 2026 Authsignal - All Rights Reserved
Terms of servicePrivacy policySecuritySystem statusCookies