PSD3 Explained: Key cchanges, compliance requirements, and how to prepare

PSD3 Explained - Key Changes, Compliance Requirements, and How to Prepare with Secfense

What Is PSD3?

The Payment Services Directive 3 (PSD3) is the latest evolution of the European Union’s framework for regulating payment services and protecting consumers. Building on PSD2, PSD3 introduces new rules to strengthen security, improve transparency, and expand consumer rights in an increasingly digital financial ecosystem.

The directive affects banks, payment institutions, e-money providers, and third-party service providers — but its reach extends to technology vendors and partners supporting these services.

Key objectives of PSD3:

  • Close security gaps left by PSD2
  • Harmonize enforcement across the EU
  • Strengthen Strong Customer Authentication (SCA) rules
  • Address emerging payment methods (instant payments, mobile wallets)
  • Improve cross-border consumer protections

How PSD3 Differs from PSD2

While PSD2 introduced SCA and enabled open banking APIs, PSD3 refines and tightens those requirements.

AreaPSD2PSD3
Strong Customer AuthenticationMandatory, but with exemptionsExemptions narrowed, stricter enforcement
Open BankingAPIs required for banksAPI security and performance standards defined
Consumer ProtectionBasic rights for refunds and dispute resolutionExpanded refund rights, faster dispute handling
EnforcementVarying national interpretationsHarmonized EU-wide supervisory powers
ScopePayment servicesPayment + certain digital asset and fintech services

Who Needs to Comply with PSD3?

Compliance is required for all entities providing payment services in the EU, including:

  • Banks and credit institutions
  • Payment service providers (PSPs)
  • Electronic money institutions
  • Third-party providers (TPPs) offering account information or payment initiation services
  • ICT service providers supporting these organizations

If your technology stack processes, transmits, or stores payment or authentication data, PSD3 likely applies.

Download-report-about-Digital-Operational-Resilience-Act-DORA-and-The-NIS2-Network-and-Information-Security-Directive

PSD3 Compliance Timeline

  • Directive published: Mid-2025
  • Transposition into national law: Expected by mid-2026
  • Enforcement start date: Likely 2027 (subject to final adoption and national implementation)

Organizations should begin gap assessments now, as upgrading authentication systems and compliance processes can take 12–24 months.


Who Is Responsible for PSD3 Compliance?

The board of directors and senior management bear ultimate responsibility for PSD3 compliance.
They must:

  • Approve security and compliance policies
  • Allocate resources for implementation
  • Monitor ongoing compliance and risk management
  • Ensure SCA, transaction monitoring, and fraud prevention are in place

Non-compliance risks include financial penalties, loss of license, and reputational damage.


Key PSD3 Authentication Requirements

PSD3 strengthens SCA and transaction monitoring requirements from PSD2.

1. Strong Customer Authentication (SCA)

Must use at least two independent factors from:

  • Something the user knows (PIN, password)
  • Something the user has (device, hardware key)
  • Something the user is (biometrics)

2. Dynamic Linking

Each transaction must be uniquely tied to the amount and payee, and the user must be aware of this link at the time of authorization.

3. Secure Communication & API Standards

Banks and PSPs must implement stricter controls for open banking APIs, ensuring resilience against MITM and injection attacks.


PSD3 Challenges for Organizations

ChallengeWhy It MattersImpact
Legacy SystemsOlder apps may not support modern MFAExpensive rewrites or workarounds
Dynamic LinkingRequires user-visible transaction detailsAuthenticator support may be limited
Customer ExperienceStronger security can slow user flowsHigher abandonment if poorly implemented
Vendor RiskPSD3 extends responsibility to third-party providersStricter contracts and audits

How Secfense Helps with PSD3 Compliance

Secfense offers no-code, policy-driven authentication and access control that lets organizations meet PSD3 requirements without rewriting applications.

Relevant Secfense Solutions:

  • Phishing-Resistant MFA – Enforce strong authentication across all channels, eliminating passwords as an attack vector.
  • Passwordless for Workforce (IAM) – Replace passwords with passkeys for employees accessing sensitive systems.
  • Passwordless for Customers (CIAM) – Deliver frictionless, secure login experiences for customers and partners.
  • Legacy App Protection – Inject SCA into legacy payment systems without code changes.
  • Privileged Access & Microauthorizations – Enforce per-transaction approval in high-risk payment flows.
  • Regulatory Compliance (DORA, NIS2, PSD2) – Maintain compliance across overlapping EU security frameworks.

Case Example: Legacy Payment App Modernization

A major EU PSP used Secfense’s User Access Security Broker to add FIDO2 passkey authentication and dynamic linking to a decade-old payment portal — with zero application code changes. The rollout covered 100% of user accounts in under 60 days.


Recommended Next Steps

PSD3 readiness requires strategic planning across technology, policy, and training.

  1. Run a PSD3 Gap Assessment – Identify authentication, API, and monitoring gaps.
  2. Prioritize Legacy Systems – Evaluate cost and complexity of upgrades.
  3. Adopt Phishing-Resistant Authentication – Ensure SCA is in place for all channels.
  4. Test Dynamic Linking – Confirm your authentication method can display transaction details.
  5. Engage Vendors Early – Audit third-party providers for compliance readiness.

Contact Secfense

What to Expect

  • A short conversation to understand your requirements and security goals.
  • Discussion of commercial terms for relevant Secfense solutions such as Passwordless IAM, CIAM, Legacy App Protection, or Privileged Access controls.
  • Agreement on next steps – proof of concept, contract details, or rollout plan.

Who It’s For

  • Prospects ready to scope a project and discuss budgets.
  • Existing customers expanding Secfense coverage to more systems.
  • Organizations in the decision/purchase stage after reviewing our solution areas.

📩 Schedule a Call with Secfense to accelerate your PSD3 compliance plan.

Testimonials

We are faced with new challenges every day. We must always be one step ahead of the attackers and know what they are going to do before they do it. We are convinced that the User Access Security Broker will bring security to a new level, both for those working at the office and from home. For us, working with Secfense is an opportunity to exchange experience with developers who put great value on out-of-the-box thinking.

Krzysztof Słotwiński

Business Continuity and Computer Security Officer

BNP Paribas Bank Poland

As part of the pre-implementation analysis, we verified that users utilize a wide range of client platforms: desktop computers, laptops, tablets, smartphones, and traditional mobile phones. Each of these devices differs in technological advancement, features, and level of security. Because of this, and also due to the recommendation of the Polish Financial Supervision Authority (UKNF), we decided to introduce additional protection in the form of multi-factor authentication mechanisms based on FIDO. As a result, users of our applications can log in safely, avoiding common cyber threats such as phishing, account takeover, and theft of their own and their clients’ data.

Marcin Bobruk

CEO

Sandis

We are excited to partner with Secfense to enhance our user access security for our web apps. By integrating their User Access Security Broker, we ensure seamless and secure protection for our applications and systems, delivering superior security and convenience to our customers.

Charm Abeywardana

IT & Infrastructure

Visium Networks

Before investing in Secfense, we had the opportunity to talk to its existing clients. Their reactions were unanimous: wow, it’s so easy to use. We were particularly impressed by the fact that implementing their solution does not require the involvement of IT developers. It gives Secfense a huge advantage over the competition, and at the same time opens the door to potential customers who so far were afraid of changes related to the implementation of multi-factor authentication solutions.

Mateusz Bodio

Managing Director

RKKVC

Even when the network and infrastructure are secured enough, social engineering and passwords can be used to gain control of the system by attackers. Multifactor authentication is the current trend. Secfense addresses this and allows you to build zero trust security and upgrade your current systems to passwordless applications within minutes, solving this problem right away,” said Eduard Kučera, Partner at Presto Ventures and cybersecurity expert – former Director in hugely successful Czech multinational cyber security firm Avast.

Eduard Kučera

Partner

Presto Ventures

One of the biggest challenges the world is facing today is securing our identity online. That’s why we were so keen to have Secfense in our portfolio. They make it possible to introduce strong authentication in an automated way. Until now, organizations had to selectively protect applications because the deployment of new technology was very hard, or even impossible. With Secfense, the implementation of multi-factor authentication is no longer a problem, and all organizations can use the highest standards of authentication security.

Stanislav Ivanov

Founding Partner

Tera Ventures