Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Join us today!
Blog
/
Current article

BSP Circular 1213: Philippine banks must replace SMS OTPs by June 2026

Last Updated:
March 17, 2026
Ashutosh Bhadauriya
BSP Circular 1213: Philippine Banks Must Replace SMS OTPs by June 2026
AWS Partner
Authsignal is an AWS-certified partner and has passed the Well-Architected Review Framework (WAFR) for its Cognito integration.
AWS Marketplace

The Bangko Sentral ng Pilipinas, the country's central bank, has set June 30, 2026, as the deadline for financial institutions to stop using SMS OTPs for high-risk banking transactions. Deputy Governor Elmore Capule has confirmed the central bank is holding the date firm: "As of now we are not extending it, so they have to catch up."

Under the Anti-Financial Account Scamming Act (AFASA), banks that fail to put adequate authentication controls in place are required to reimburse customers for funds lost to scams. Banks that comply get liability protection.

Why the BSP is moving away from SMS OTPs

SMS OTPs travel over the telecom network, which the bank has no control over. SIM swap fraud lets attackers receive OTP messages intended for the account holder. Phishing pages harvest codes in real time. Smishing tricks users into reading the code aloud over the phone. Each of these attacks works because the authentication factor has to leave the bank's systems and pass through a channel anyone can potentially intercept.

BSP Circular 1213 requires institutions to "transition away from interceptable authentication mechanisms" for financial transactions and high-risk activities. The coverage extends beyond login. Adding a new payee, updating registered contact details, initiating large transfers - any high-risk transaction or critical account change falls under the mandate.

What the BSP is actually requiring

The regulation goes beyond a mandate to adopt biometrics. The BSP has published specific guidelines on server-side biometric authentication, which it recognises as an acceptable control for covered transactions.

The difference between server-side and device-side biometrics matters here. Device-side biometrics, the fingerprint or face scan that unlocks a banking app, rely on whatever is happening on the user's phone. If the device is compromised, that check can be bypassed. Server-side biometrics validate the user's identity against templates stored in the bank's own backend, so the check happens independently of the device's state.

The guidelines also acknowledge the security tradeoff that comes with centralising biometric data. A database of biometric templates is a high-value target for attackers. Banks are required to store templates as encrypted mathematical representations rather than raw images, and to encrypt data both at rest and in transit. Liveness and deepfake detection are mandatory. Biometrics also has to be layered with other controls rather than used alone, and banks are required to monitor false acceptance rates, false rejection rates, and algorithmic bias across different user groups.

The BSP also requires banks to think about users who may struggle with biometric authentication: elderly customers with worn fingerprints, people with certain disabilities, users on lower-end devices. Solutions have to work for these cases while maintaining the security standard.

The liability provision

Before AFASA(Anti-financial account scamming act), liability for digital banking fraud was often contested. The law changes that. Banks with adequate risk management systems and strong authentication are protected from liability when scams occur despite those controls. Banks without adequate controls are required to reimburse customers directly.

The BSP also clarified that OTPs retain one permitted use: confirming the existence or ownership of a registered mobile number. OTPs remain in the toolkit, just not as a way to authorise transactions.

What compliance actually involves

Circular 1213 sets the fraud management baseline. Institutions handling complex electronic services, or with average monthly transaction volumes above PHP 75 million, are required to have real-time fraud detection covering behavioral anomalies, geolocation, blacklist screening, and device change events. This infrastructure has to be in place alongside the authentication changes, and the authentication side requires phishing-resistant mechanisms for anything classified as high-risk. Methods that can be socially engineered out of a user, including SMS codes, fall outside that definition.Biometrics alone does not satisfy the requirement either. The BSP is explicit that authentication has to be layered: biometrics combined with device binding, behavioral signals, and transaction risk scoring. Banks using third-party biometrics vendors also carry obligations under the circular. The circular requires due diligence on the vendor's security architecture, explicit data protection clauses in contracts, and independent audits on an ongoing basis.

Where Authsignal fits

Authsignal's platform handles adaptive, risk-based authentication. Financial institutions can configure authentication to scale with transaction risk, so a balance check and a large transfer to a new payee go through different flows. The platform supports passkeys, biometric-backed authenticators, in-app push confirmations, and a no-code rules engine that can be tuned to each institution's risk profile. Given that the BSP mandate is risk-tiered by design, that configurability is where the compliance work actually happens.

Get in touch with if you're figuring out what the transition looks like for your stack, we've helped banks across the region move off SMS OTPs without rebuilding their identity layer.

Try out our passkey demo
Passkey Demo
Have a question?
Talk to an expert
You might also like
How to add adaptive MFA and passkeys to any web app with Authsignal and Lambda@Edge
Use AWS Lambda@Edge and Authsignal to intercept logins at the CloudFront layer and enforce risk-based MFA, without touching your origin app or writing a single backend route.
The real cost of building authentication in-house
From session management to MFA fallbacks, in-house auth is harder than it looks. See why more teams are choosing to buy instead of build.
Bank Negara Malaysia’s RMiT update just raised the bar on authentication. Here’s how to comply
Bank Negara Malaysia’s updated RMiT raises authentication standards. Learn the new device binding, MFA, and transaction rules, and how to comply.

Secure your customers’ accounts today with Authsignal