Skip to content

DORA

Comply with EU Digital Operational Resilience Act requirements using CyberOrigen.

Overview

DORA (Digital Operational Resilience Act) is an EU regulation for the financial sector. It establishes uniform requirements for ICT risk management, incident reporting, and third-party risk management.

Effective Date: January 17, 2025

Scope

Covered Entities

  • Credit institutions
  • Payment institutions
  • Investment firms
  • Insurance companies
  • Pension funds
  • Crypto-asset service providers
  • ICT third-party service providers

Key Areas

PillarDescription
ICT Risk ManagementGovernance and risk framework
Incident ReportingUnified reporting mechanism
Resilience TestingRegular testing requirements
Third-Party RiskOversight of ICT providers
Information SharingThreat intelligence exchange

ICT Risk Management Framework

Article 5-16 Requirements

ArticleRequirement
5ICT risk management framework
6ICT systems and tools
7Identification
8Protection and prevention
9Detection
10Response and recovery
11Backup policies
12Learning and evolving
13Communication
14Advanced testing

CyberOrigen Mapping

DORA ArticleCyberOrigen Feature
Art. 7 IdentificationAsset discovery, scanning
Art. 8 ProtectionVulnerability remediation
Art. 9 DetectionContinuous monitoring
Art. 10 ResponseRemediation workflow
Art. 14 TestingPenetration testing support

Getting Started

1. Enable Framework

  1. Go to GRCFrameworks
  2. Click Enroll on DORA
  3. Click Enable

2. ICT Risk Assessment

Document your ICT risk framework:

  1. Go to GRCRisk Register
  2. Identify ICT-related risks
  3. Assess impact on operations
  4. Document controls

3. Third-Party Inventory

Catalog ICT service providers:

  1. Go to GRCVendors
  2. Add ICT providers
  3. Classify by criticality
  4. Track contracts

Key Requirements

ICT Incident Classification

SeverityCriteriaReporting
MajorSignificant operational impactCompetent authority
SignificantMaterial operational impactInternal reporting
MinorLimited impactLogging only

Classification Factors

  • Number of clients affected
  • Duration of incident
  • Geographic spread
  • Data losses
  • Service criticality
  • Economic impact

CyberOrigen Support

  • Incident detection
  • Severity classification
  • Evidence collection
  • Timeline documentation

Resilience Testing

Basic Testing (All Entities)

TestFrequency
Vulnerability scansContinuous
Network security assessmentAnnual
Gap analysisAnnual
Physical security reviewAnnual
Source code reviewAs needed

Advanced Testing (Significant Entities)

TestRequirement
TLPTThreat-Led Penetration Testing
FrequencyEvery 3 years minimum
ScopeCritical functions
ProviderIndependent testers

CyberOrigen Scanning

  • Continuous vulnerability scanning
  • Configuration assessment
  • Access control testing
  • Encryption verification

Third-Party Risk Management

Article 28-30 Requirements

RequirementDescription
Due diligencePre-contract assessment
Risk assessmentOngoing monitoring
ContractsSpecific clauses required
Exit strategyDocumented transition plans

Critical Provider Oversight

For critical ICT service providers:

  • Dedicated oversight function
  • Enhanced due diligence
  • Concentration risk assessment
  • Subcontracting controls

CyberOrigen Features

  1. Go to GRCVendors
  2. Classify ICT providers
  3. Track security questionnaires
  4. Monitor contract terms
  5. Document exit strategies

Information Sharing

Article 45 Requirements

Entities should participate in:

  • Threat intelligence sharing
  • Vulnerability disclosure
  • Incident information exchange

CyberOrigen Integration

  • MISP threat intelligence
  • Vulnerability correlation
  • Industry benchmarking

Control Mapping

DORA maps to other frameworks:

DORA ArticleISO 27001NIST CSF
Art. 7 IdentificationA.8.8ID.AM
Art. 8 ProtectionA.8.24PR.DS
Art. 9 DetectionA.8.16DE.CM
Art. 10 ResponseA.5.24RS.MI
Art. 28 Third-PartyA.5.21ID.SC

Evidence Collection

Automated Evidence

  • Vulnerability scan reports
  • Configuration assessments
  • Incident detection logs
  • Access control audits

Manual Evidence

  • ICT risk management policy
  • Incident response procedures
  • Third-party contracts
  • Testing reports
  • Board reporting

Reporting Requirements

To Competent Authority

  • Major incident notification (initial)
  • Incident report (intermediate)
  • Final report (within 1 month)

To Management Body

  • Regular ICT risk reports
  • Incident summaries
  • Testing results
  • Third-party assessments

Timeline

DateMilestone
Jan 2023DORA entered into force
Jan 2025DORA becomes applicable
OngoingRegulatory technical standards

Common Gaps

RequirementGapSolution
Art. 5No ICT frameworkDocumented framework
Art. 9Limited detectionMonitoring implementation
Art. 14No testing programTesting schedule
Art. 28Weak vendor oversightVendor risk program

Resources

Agentic AI-Powered Security & Compliance