Contact us

BOOK A PRESENTATION

How CBUAE’s 2025 directive is Shaping the Next Phase of of Strong Customer Authentication  in the UAE: Perspectives from Europe’s PSD2

NO NAME
The UAE is transitioning from static MFA to adaptive, risk‑based Strong Customer Authentication (SCA), driven by the CBUAE’s 2025 directive. Europe’s PSD2 experience shows banks can reduce fraud and maintain customer experience only when authentication, fraud intelligence, and contextual risk scoring are unified.

The UAE is entering a decisive new phase in digital banking security.Of course, this is not a starting point for the UAE. It is a progression.

The UAE is widely recognized as one of the most advanced digital economies in the world. From AI strategy and smart government initiatives to real-time payments and digital banking innovation, the country has consistently positioned itself at the forefront of financial modernization.

With the  Central Bank of the UAE (CBUAE) Notice No. CBUAE/FCMCP/2025/3057, financial institutions are being pushed toward:

  •  stronger consumer protection,
  • adaptive authentication,
  • risk-based controls to combat rising account takeover (ATO) and digital payment fraud.

How CBUAE directive mirrors the path Europe took under PSD2, but gives the UAE a chance to start at a more mature level

Other markets have undergone similar regulatory transitions in recent years. In Europe, the Revised Payment Services Directive (PSD2) introduced Strong Customer Authentication (SCA) requirements across the EU. What followed was a multi-year transformation, both operationally and strategically, as institutions refined how they balanced fraud prevention, compliance, and customer experience.

Europe's journey provides useful context, not as a blueprint, but as a reference point for how authentication models tend to evolve under regulatory change.

How Is the UAE’s Regulatory Landscape Evolving Beyond Static MFA

The CBUAE directive is not simply about adding another authentication factor. It reflects a deeper shift in philosophy.

Historically, many banks relied heavily on static controls. That implies passwords at login and OTPs at transactions. That model assumes that once a user successfully authenticates, the session is trustworthy. Today’s fraud landscape has made that assumption full of errors.

Account takeover attacks now commonly involve:

  • Credential stuffing from large data breaches
  • Social engineering and real-time phishing
  • SIM swap fraud
  • Malware-assisted session hijacking

In this context, static MFA is necessary, yet still insufficient.

The regulatory emphasis on adaptive and risk-based controls signals that authentication decisions must become contextual. Banks are expected to assess transaction risk dynamically, rather than applying uniform friction across all users and journeys.

This is a shift from “authenticate everyone the same way” to “authenticate according to risk potential.”

That distinction is critical.

What Europe Learned From PSD2 (and Why It Matters to the UAE)

When PSD2 introduced SCA, it required two independent authentication factors for digital payments. The directive also required dynamic linking. This means that authentication has to be cryptographically tied to the transaction amount and beneficiary.

On paper, the rule is straightforward.

In practice, it is forcing banks to rethink:

  • Authentication architecture
  • Fraud decisioning workflows
  • E-commerce payment processing
  • Customer experience design

The primary technical vehicle for enforcing SCA in e-commerce was EMV 3D Secure (EMV 3DS), particularly version 2.x, which allowed issuers to exchange richer contextual data and apply risk-based logic.

Although the rules were clear, the majority of institutions were not yet mature enough to apply them effectively in practice.

The Early PSD2 Implementation Pitfalls

1. Over-Authentication and Customer Friction

In the early stages, many European banks adopted a conservative compliance setup. Rather than fully leveraging transaction risk analysis, they triggered step-up authentication for nearly all card-not-present transactions.

From a regulatory perspective, this was safe.

From a business perspective, it was expensive.

Merchants reported measurable increases in cart abandonment. Customer complaints about frequent OTP prompts significantly increased. Some consumers shifted to alternative payment methods with lower perceived friction, such as digital wallets, A2A payments, and BNPL options.

The result? Fraud decreased, but so did conversion rates.

The European experience suggests the following: strong authentication must be intelligent, not one-size-fits-all.

2. Delayed Integration of Fraud Intelligence

PSD2 allowed exemptions from step-up authentication for low-risk transactions. However, to use those exemptions effectively, banks needed mature fraud scoring engines and accurate risk calibration.

Many institutions discovered that their fraud systems were not sufficiently integrated with their authentication layers.

Fraud teams and identity teams operated in silos. Risk scores were not dynamically driving authentication decisions. As a result, exemptions were underutilized, and friction remained unnecessarily high.

It boils down to this: PSD2 structurally favored institutions that could align fraud intelligence with authentication orchestration, because doing so enabled more frictionless approvals while remaining compliant.

3. Treating SCA as an IT Upgrade Instead of an Identity Transformation

Perhaps the most strategic mistake was framing SCA as a compliance project rather than an opportunity to modernize identity.

Some institutions implemented:

  • Two-factor authentication modules
  • 3DS upgrades
  • Basic risk thresholds

They met regulatory deadlines.

But they did not redesign their broader identity architecture around zero-trust principles or continuous risk assessment.

The banks that invested in adaptive authentication, behavioral monitoring, and integrated risk orchestration are now operating at significantly higher maturity levels. As a result, these institutions were able to reduce account takeover losses while maintaining higher transaction approval rates and lower customer drop-off.

The European Maturity Curve

As PSD2 rolled out, a clear evolution in authentication strategy began to take shape across Europe.

Initially, authentication was rule-based and uniform. Step-up mechanisms were triggered broadly to ensure compliance.

As fraud engines matured and data exchange within EMV 3DS improved, issuers began distinguishing between low- and high-risk transactions. Frictionless flows increased. Approval rates stabilized.

Today, leading institutions go further. They deploy behavioral analytics and continuous authentication mechanisms that assess risk not only at login or payment, but throughout the session lifecycle.

Trust is no longer established once at login, but continuously evaluated as risk changes.

What UAE Banks Can Do Differently

Europe’s experience provides a useful reference point, and the UAE can take those insights and apply them from day one.

1. Build Adaptive SCA Into the Core Architecture

Rather than layering risk assessment on top of static MFA, banks should embed contextual intelligence directly into authentication flows.

This includes:

  • Device fingerprinting and risk profiling
  • Behavioral pattern analysis (typing cadence, navigation behavior, session anomalies)
  • Geolocation and impossible travel detection
  • Transaction profiling against historical baselines

By integrating these signals in real time, banks can differentiate between a returning, low-risk customer and a potentially compromised session.

Additional authentication is triggered only when the risk justifies it, rather than being applied to every transaction.

2. Use EMV 3DS as a Risk Channel, Not Just a Compliance Mechanism

EMV 3DS 2.x supports the exchange of extensive contextual data between merchants, acquirers, and issuers.

Institutions that leverage this data effectively can:

  • Increase frictionless approval rates
  • Apply transaction risk analysis with greater precision
  • Reduce false positives
  • Protect against ATO in e-commerce environments

The key is not just turning on 3D Secure, but using risk data properly to decide when to challenge a customer and when to let the payment go through smoothly.

3. Connecting Fraud Signals to Authentication Decisions

One of the biggest lessons from Europe wasn’t about technology - it was about teamwork.

In many banks, fraud prevention and authentication were handled by different teams. Fraud teams focused on detecting suspicious transactions. Authentication teams focused on login flows, MFA tools, and customer journeys.

But risk-based authentication only works well when those two areas are closely connected.

If the fraud system detects that a transaction looks suspicious, that information should immediately influence how the customer is authenticated. For example:

  • A low-risk transaction → no extra steps
  • A medium-risk transaction → biometric or app approval
  • A high-risk transaction → stronger verification or block

At the same time, the results of authentication matter for fraud models. If a customer successfully completes biometric verification, that’s useful information for improving future risk decisions.

When fraud and authentication operate separately, banks often end up either:

  • Challenging too many legitimate customers, or
  • Missing opportunities to stop risky activity early

The most effective institutions made sure fraud, security, and digital teams were working toward the same goals - balancing fraud reduction with smooth customer experience.

4. Move Toward Continuous Authentication Zero-Trust Model

Modern fraud does not respect session boundaries.

Once attackers bypass login, they often exploit lateral movement within digital banking environments.

Continuous authentication addresses this by:

  • Monitoring session behavior for anomalies
  • Re-evaluating risk during sensitive actions
  • Triggering step-up when behavioral deviations occur
  • Terminating or limiting sessions when risk thresholds are exceeded

This aligns directly with zero-trust principles, where trust is continuously validated rather than assumed.

For the UAE, this represents a chance to implement a forward-looking identity posture from the outset, rather than retrofitting it later.

How Can CBUAE Regulatory Compliance Become a Strategic Advantage for UAE Banks

Regulatory change often starts as a compliance requirement. Though over time, it can become an opportunity. In Europe, the banks that treated SCA as more than just a rule to follow were able to reduce account takeover losses while keeping approval rates strong. By avoiding unnecessary authentication challenges, they also reduced customer frustration and built greater confidence in their digital channels.

The CBUAE directive offers a similar opportunity. It is not just about implementing Strong Customer Authentication, but about doing it in a way that protects customers while keeping their experience smooth and intuitive.

Europe’s experience offers a clearer direction, so UAE banks can start off on the right foot with smarter, risk-based authentication.

FAQ about Strong Customer Authentication (SCA) and CBUAE

SCA is a regulatory requirement that ensures financial institutions verify a user’s identity using at least two independent factors. Modern SCA also adjusts authentication based on real-time risk rather than using a one-size-fits-all approach.

The Central Bank of the UAE’s 2025 directive shifts banks from static multi-factor authentication (MFA) to adaptive SCA, emphasizing continuous risk evaluation, integrated fraud detection, and enhanced consumer protection.

Adaptive SCA evaluates risk at multiple stages of a transaction, including:

  • Integration between fraud and authentication systems for ongoing optimization
  • Pre-authentication risk checks (device, geolocation, behavior)
  • Real-time fraud scoring
  • Dynamic authentication based on risk levels (frictionless, biometric, step-up, or block)
  • Continuous session monitoring
  • Over-authentication increases friction and customer drop-off.
  • Fraud detection and authentication must be integrated for better approvals.
  • EMV 3DS should be used for risk-based authentication, not just compliance.
  • SCA should be part of a broader identity strategy, not just IT compliance.

By applying authentication challenges only when risk is detected, adaptive SCA allows low-risk transactions to flow frictionlessly, reducing unnecessary steps like OTPs and improving overall digital trust.

Integration ensures that fraud signals directly influence authentication decisions, enabling faster detection, lower false positives, and higher transaction approval rates.

The UAE can implement adaptive, risk-based SCA from the start, avoiding the trial-and-error challenges Europe faced and benefiting from proven models in fraud prevention, customer experience, and authentication orchestration.

Yes. By continuously monitoring behavior and linking authentication to risk signals, adaptive SCA can detect anomalies early, reduce exposure to phishing, SIM swaps, and session hijacking, and protect both banks and customers.

maximizing the potential of your 3d secure service - ebook

Maximizing the Potential of Your  3DS Service

Learn how expert support, intelligent risk scoring, and continuous optimization can strengthen security while preserving seamless customer journeys.

Want to learn more about cybersecurity trends and industry news?

SUBSCRIBE TO OUR NEWSLETTER

CyberSecurityhub

chevron-down linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram