Why AD360
 
Solutions
 
Resources
 
 

Achieve BACEN Resolution CMN 4,893/2021 compliance with ManageEngine

BACEN strengthened Brazil’s financial sector cybersecurity by advancing from Resolution CMN 4,658 (2018) to Resolution CMN 4,893 (2021), mandating robust identity governance, real-time monitoring, multi-factor authentication, continuous compliance, and comprehensive audit trails to counter evolving digital threats.

Compliance

How can ManageEngine support Brazil’s financial institutions in meeting these standards?

With ManageEngine AD360 (IAM), banks and other financial institutions can start aligning with the principles of BACEN 4,893/2021. See the key clauses and how our solutions help in the table below.

Chapter II, Section I - Art. 3 (II) The procedures and controls adopted to reduce the institution's vulnerability to incidents and to address other cyber security objectives

Compliance actions Reports and evidences How AD360 can help
  1. Quarterly automated vulnerability scans on all systems
  2. Prioritized patch management with severity-based timelines
  3. Security-reviewed change management for production
  4. Continuous IDS/IPS for threat blocking, updated IT asset inventory
  1. Smart Card Enabled Users
  2. Bitlocker Enabled Computers
  3. Bitlocker Disabled Computers
  4. MFA Enrolled Users Report
  5. MFA Usage Audit Report
  6. MFA Failures Report
  1. Password Policy Enforcer enforces strong, compliant passwords, blocking weak and compromised credentials during reset and creation processes
  2. Context-based multi-factor authentication (MFA) with 20+ authentication factors secures endpoint, application, and VPN logins by verifying user identities using adaptive techniques
  3. Identity risk assessment analyzes AD and Microsoft 365 for vulnerabilities, computing risk scores and remediation
  4. Risk exposure management maps attack paths, prioritizes vulnerabilities, and enables proactive remediation of high-risk objects

Chapter II, Section I - Art. 3 (III) The specific controls, including those directed at information traceability, aiming to ensure the security of sensitive information

Compliance actions Reports and evidences How AD360 can help
  1. Centralized logging for DB access/files/admin to tamper-proof repo
  2. UAM to record user actions with timestamps/ID
  3. RBAC with permission matrices and reviews
  4. Data classification for encryption/logging
  5. Quarterly access reviews to revoke outdated rights
  1. Permissions for Folders (NTFS Reports)
  2. Folders Accessible by Accounts (NTFS Reports)
  3. Security Permission Entitlements - AD Objects Accessible by Accounts
  4. Security Permission Entitlements - Servers Accessible by Account
  5. Reset Password Audit Report
  6. Change Password Audit Report
  7. User Attempts Audit Report
  8. Application Access Audit Report
  9. JIT Provisioning Audit Report
  1. Exchange online auditing tracks mailbox access, delegations, permission changes
  2. Non-owner mailbox access detection identifies potential email data theft
  3. Azure AD auditing monitors user modifications and permission changes
  4. SharePoint/OneDrive tracking monitors file operations and sharing changes
  5. Teams activity logging captures messages, channels, and member modifications
  6. Search across multiple mailboxes and attachments with condition or pattern filters, automated schedules, and alerts for compliance and threat detection
  7. Workflow notification rules track all administrative changes with audit chain
  8. Provides audit trail documents workflow execution with approvals and confirmations
  9. Backup audit trail records all backup operations with status and details
  10. Recovery history tracks restored objects, timing, source, and responsible admin

Chapter II, Section I - Art. 3 (IV) The record of incidents relevant to the institution's activities, as well as the analysis of their cause and impact and the control of their effects

Compliance actions Reports and evidences How AD360 can help
  1. Centralized incident logging with date/time/systems/severity
  2. Formal RCA for vulnerabilities and patterns
  3. Timeline/impact docs (disruption, exposure, costs)
  4. Track control enhancements post-incident
  5. Quarterly trend reports for leadership
  1. Admin Audit Report
  2. Help Desk Audit Report
  3. Recent Logon Failures
  4. User Attempts Audit Report
  5. MFA Failures Report
  6. Agent Installation Failures Report
  1. Backup versions enable recovery to pre-incident states with documentation
  2. Attribute-level restoration enables precise recovery of compromised objects
  3. Recovery testing validates backup validity and recovery procedure effectiveness
  4. Roll-back restores systems to pre-incident state from known-good backup
  5. Multi-point-in-time backups enable recovery to latest pre-compromise state

Chapter II, Section I - Art. 3 (Paragraph 1) When defining the cyber security objectives mentioned in item I, the institution must consider its capacity to prevent, detect and reduce the vulnerability to cyber incidents

Compliance actions Reports and evidences How AD360 can help
  1. Assess and document maturity, infrastructure, and resources
  2. Define targeted objectives based on risk and regulations
  3. Set measurable KPIs like MTTD, MTTR, and vulnerability remediation rates
  4. Allocate resources and secure board approval
  5. Establish governance with clear accountability and monthly reporting
  1. Password Policy
  2. Account Lockout Policy
  3. Users with Password Never Expires
  4. Users with Cannot Change Password
  5. Disabled Users
  6. Locked-out Users
  7. MFA Non-Enrolled Users Report
  8. Blocked Users Report

PREVENTION

  1. Granular permission management enforces least-privilege access preventing unauthorized directory access
  2. Automated account lifecycle management eliminates dormant accounts used in attacks
  3. Group Policy distribution enforces security baselines preventing common attack vectors
  4. Password policy enforcement prevents weak credentials and brute-force attacks
  5. Delegation management controls administrative rights reducing privilege escalation attack surface
  6. Risk assessment continuously identifies and scores identity vulnerabilities and risky access
  7. Risk exposure management visualizes attack paths, prioritizes high-risk entitlements for remediation
  8. Access certification automates attestation and review of permissions, reducing unauthorized access risks
  9. Strong password enforcement with breach database integration blocks weak passwords
  10. 20+ MFA methods including passkeys, biometric, hardware keys prevent credential theft
  11. Conditional access restricts access by IP, device, time, geolocation

DETECTION

  1. Zia Insights in AD Explorer provides AI-powered group membership analysis, including anomaly detection, privileged group identification, and peer comparison scores, enabling faster detection of outliers and corrective actions

VULNERABILITY REDUCTION

  1. Rapid recovery minimizes downtime and system unavailability impact
  2. Recovery testing ensures preparedness for rapid execution during incidents
  3. Automated compliance reporting demonstrates security posture, reducing vulnerability windows
  4. Multi-layer authorization workflows reduce the likelihood of unauthorized changes
  5. Change tracking and rollback capability enables rapid restoration of secure configurations
  6. Access certification automates periodic review and attestation of user permissions, ensuring removal of excessive or stale access to minimize attack surface and compliance risk

Chapter II, Section I - Art. 3 (Paragraph 2) The procedures and controls mentioned in item II must comprise, at least, authentication, cryptography, prevention and detection of intrusions, prevention of information leaking, performance of periodic tests and scanning to detect vulnerabilities, protection against malicious software, implementation of traceability mechanisms, control of access and segmentation of the computer network, as well as maintenance of data and information backups

Compliance actions Reports and evidences How AD360 can help
  1. MFA on all systems (password + biometrics/token)
  2. AES-256 encryption + TLS 1.2+ for data
  3. Enterprise IDS/IPS for real-time monitoring/blocking
  4. DLP for outgoing data scanning
  5. Automated vuln scans/pen tests with remediation
  1. Smart Card Enabled Users
  2. Bitlocker Enabled Computers
  3. Bitlocker Disabled Computers
  4. Computers Trusted for Delegation
  5. GPO Reports (All GPOs and Linked AD Objects)
  6. Admin Audit Report
  7. MFA Enrolled Users Report
  8. MFA Usage Audit Report
  9. FIDO Passkeys Report
  10. MFA Trusted Browser Report
  11. MFA Trusted Machines Report
  12. MFA Failures Report

AUTHENTICATION

  1. Enforces MFA during system, VPN, and app logins to block unauthorized access even if passwords are compromised
  2. Supports diverse MFA methods like OTP, push, biometrics, and security keys for stronger identity verification
  3. Applies conditional MFA based on user, device, or location to ensure access control aligns with risk levels
  4. Extends MFA to self-service and VPN access, preventing misuse of account recovery and remote logins
  5. Provides audit logs and MFA reports to track authentication activities and support compliance verification
  6. Enforces strong password policies to prevent weak or reused credentials and strengthen account security

VULNERABILITY SCANNING

  1. Identity risk assessment assesses potential vulnerabilities in AD and Microsoft 365, providing detailed reports and actionable insights

TRACEBILITY

  1. Exchange auditing and tracks mailbox activities with identification
  2. Azure AD auditing records user activities with source and timestamp
  3. SharePoint/OneDrive tracking monitors file operations with user identification
  4. Teams logging records activities, enabling collaboration traceability
  5. Backup audit trails record operations creating execution evidence
  6. Recovery logs document operations enabling accountability for restoration
  7. Admin audit reports provide detailed logs of all help desk and administrative activities for accountability and compliance
  8. MFA failure reports detect repeated authentication failures, alerting on potential unauthorized access attempts

ACCESS CONTROLS

  1. OU/group policies enable organization-specific configuration by user type
  2. Authenticator enforcement varies authentication requirements by user role
  3. Context policies require stronger authentication for suspicious contexts
  4. Privilege-based control varies authentication intensity by operation risk
  5. Delegation enables secure role-based task assignment with tracked, auditable administrative actions
  6. Approval workflow automates request validation, enforcing policy-compliant access and change controls
  7. Access certification enforces periodic entitlement reviews, ensuring continuous least privilege adherence
  8. Automated offboarding streamlines timely removal of access and accounts upon employee termination
  9. Notification rules ensure interested parties aware of changes

BACKUPS

  1. Complete AD backup preserves all directory data for disaster recovery
  2. Full backups with incremental reduce storage consumption maintaining recovery points
  3. Automated scheduling during off-hours minimizes production system impact
  4. Retention policies optimize storage by automatically removing old backups
  5. Granular restoration enables precise recovery of objects or attributes
  6. Exchange Online backup preserves email data for recovery
  7. Microsoft 365 backup preserves Teams, OneDrive, and SharePoint data
  8. Google Workspace backup preserves email and cloud storage data
  9. Multiple storage options enable backup redundancy across physical locations
  10. Restart-free recovery maintains domain availability during restoration
  11. Password recovery restores accounts with security relationships intact
  12. Version management enables recovery to optimal pre-incident state
  13. Multi-tenant support enables centralized management of multiple cloud tenants
  14. Recovery testing validates backup validity and procedure effectiveness

Chapter II, Section III - Art. 6 The institutions mentioned in art. 1 must establish a plan of action and response to incidents, aiming at the implementation of the cyber security policy

Compliance actions Reports and evidences How AD360 can help
  1. Multidisciplinary response team with defined roles
  2. Detailed playbooks/escalation for incident types
  3. BC/DR procedures with RTO/RPO targets
  4. Communication templates/escalation chains
  5. Annual tabletop exercises with lessons learned
  1. Admin Audit Report
  2. Help Desk Audit Report
  3. Account Lockout Policy
  4. User Attempts Audit Report
  5. MFA Failures Report
  6. Agent Installation Failures Report
  1. Rapid recovery enables system restoration from backup to pre-incident state
  2. Restoration triggers containment and recovery response procedures
  3. Workflows define required incident response steps and approval requirements
  4. Assignment routes tasks to designated incident response team members
  5. Notifications ensure incident response teams are aware of incident requirements
  6. Audit trails document actions showing the results of what is taken, by who, and when

Chapter III - Art. 11 The institutions mentioned in art. 1 must ensure that their policies, strategies and structures for risk management established in regulation in force, specifically regarding to the criteria for decision on the outsourcing of services, include the contracting of relevant data processing, data storage and cloud computing services, in the country or abroad

Compliance actions Reports and evidences How AD360 can help
  1. Pre-contract vendor security due diligence
  2. Contractual cybersecurity clauses (controls, notifications, audits)
  3. Require ISO 27001/SOC 2 certifications with annual reports
  4. Quarterly oversight, audits, vuln scans
  5. On-demand audit rights and incident notification provisions
  1. Google Workspace Users Report
  2. Active Users Report
  3. Suspended Users Report
  4. Users without Mailbox
  5. Mailbox Enabled Users
  6. Licensed Users Report
  7. Application Access Audit Report

DATA PROCESS MONITORING

  1. Service monitoring tracks Microsoft 365 data processing within requirements
  2. Compliance reporting verifies contracted cloud services comply with requirements
  3. Cloud backup storage enables recovery strategy for cloud-based data
  4. Multi-tenant support enables management across multiple cloud providers
  5. Cross-cloud backup supports recovery from one cloud to another
  6. Cloud data backup preserves Microsoft 365 and Workspace data

BACKUP AND RECOVERY

  1. Cloud backup protects contracted services data from outages
  2. Multiple options enable backup redundancy and geographic distribution
  3. Recovery enables rapid restoration of cloud services if outages occur
  4. Cloud restoration enables recovery from BACEN-controlled backups independently
  5. Multi-provider support enables vendor flexibility across cloud landscape
  6. Cross-cloud restoration enables recovery between cloud providers

Conclusion

Now that you’ve explored how BACEN Resolution 4,893/2021 strengthens cybersecurity standards in Brazil’s financial sector and how AD360 helps you meet every clause, it’s time to take the next step.

Whether it’s identity governance, audit logging, threat detection, or building a compliance-ready audit trail, we’re here to guide you through it. Start a 30-day free trial to experience our solutions in your own environment, or contact us to schedule a one-on-one consultation.

Disclaimer: The information provided on this page is for general knowledge and awareness purposes only. It is not intended to serve as professional, legal, or regulatory advice. Compliance with BACEN Resolution 4,893/2021 depends on your organization’s specific environment, processes, and risk profile.

To accurately assess your compliance posture, we strongly recommend engaging a qualified consultant, compliance agency, or referring directly to the official BACEN documentation and guidelines.

 
Chat now
   

Hello!
How can we help you?

I have a sales question  

I need a personalized demo  

I have a product query  

E-mail our sales team  

Book a meeting  

Chat with sales now  

Back

Book your personalized demo

Thanks for registering, we will get back at you shortly!

Preferred date for demo
  •  
    • Please choose an option.
    • Please choose an option.
  •  
  •  
    This field is required.

    Done

     
  • Contact Information
    •  
    •  
    •  
    •  
  • By clicking ‘Schedule a demo’, you agree to processing of personal data according to the Privacy Policy.
Back

Book a meeting

Thanks for registering, we will get back at you shortly!

Topic

What would you like to discuss?

  •  
  • Details
  •  
    • Please choose an option.
    • Please choose an option.
    Contact Information
    •  
    •  
    •  
    •  
  • By clicking ‘Book Meeting’, you agree to processing of personal data according to the Privacy Policy.