The Digital Operational Resilience Act (DORA) is the EU’s regulatory framework aimed at strengthening the cyber resilience of financial entities, including banks, insurance companies, and investment firms. It establishes strict requirements for risk management, incident reporting, third-party risk oversight, and resilience testing to ensure financial stability in the face of cyber threats. DORA mandates that firms identify, protect, detect, respond to, and recover from IT-related disruptions while also enforcing stricter oversight of third-party ICT providers. Non-compliance can lead to severe penalties, including fines and operational restrictions. The regulation takes effect on January 17, 2025, requiring financial institutions to enhance their cybersecurity strategies and resilience measures.
Establish and maintain a comprehensive digital operational resilience framework in line with DORA.
Establish clear governance structures and roles for digital operational resilience
Develop and document a digital operational resilience strategy and related policies
Regularly review and update the digital operational resilience framework to reflect changes in risk technology and the regulatory landscape
Establish communication channels and awareness programs for digital operational resilience across the organisation
Implement a robust ICT risk management framework as a key component of digital operational resilience.
Identify and classify ICT-related risks across all relevant areas of the business
Define and document the organisations risk appetite and tolerance for ICT risks
Implement appropriate risk mitigation measures and controls to address identified ICT risks
Establish and maintain a robust ICT incident management process
Implement robust ICT security measures to protect ICT systems and data.
Develop and implement comprehensive ICT security policies and procedures covering all relevant areas
Implement strong access control measures to restrict access to ICT systems and data to authorised personnel only
Implement measures to ensure the security and protection of data throughout its lifecycle
Implement network security measures to protect ICT networks from unauthorised access and cyber threats
Implement endpoint security measures to protect user devices (laptops desktops mobile devices etc)
Establish and maintain a vulnerability management program to identify assess and remediate ICT vulnerabilities
Implement security monitoring and logging to detect and respond to security events
Implement physical security measures to protect ICT infrastructure and data centres
Establish and implement a comprehensive ICT resilience testing program.
Develop a risk-based ICT resilience testing strategy that covers various scenarios and threat types
Conduct scenario-based testing to simulate various disruptive events (cyberattacks system failures natural disasters etc)
Perform regular penetration testing and vulnerability assessments to identify weaknesses in ICT systems and security controls
Implement a process for capturing lessons learned from testing exercises and incidents and using them to improve resilience
Manage ICT third-party risk as part of operational resilience.
Conduct thorough risk assessments of all ICT third-party providers
Implement due diligence processes for selecting and onboarding ICT third-party providers
Establish clear contractual agreements with ICT third-party providers that address resilience requirements and implement ongoing monitoring of provider performance
Develop and test exit strategies and transition plans for ICT third-party providers to ensure business continuity in case of provider failure or contract termination
Establish and implement an ICT-related incident reporting framework.
Define clear criteria for classifying ICT-related incidents and thresholds for reporting to competent authorities
Establish clear procedures and timelines for reporting ICT-related incidents internally and to competent authorities
Define the required content and format of ICT-related incident reports for internal and external stakeholders including competent authorities
Conduct thorough post-incident analysis and follow-up actions to identify root causes improve controls and prevent recurrence
Establish arrangements for sharing of cyber threat information and intelligence.
Establish a framework and procedures for participating in cyber threat information sharing arrangements
Define the types of cyber threat information and intelligence to be shared and received
Implement security measures to protect shared information and maintain confidentiality
Specific requirements for oversight of key ICT third-party providers.
Establish processes for designating ICT third-party providers as "key" and implementing enhanced oversight for these providers
Manage concentration risk arising from dependencies on key ICT third-party providers including potential systemic risk
Manage risks related to subcontracting arrangements of key ICT third-party providers and their supply chain
Facilitate direct supervision and oversight of key ICT third-party providers by competent authorities where applicable