DORA:
Digital Operational Resilience Act
What is DORA
Technical requirements in DORA
One of the most prominent parts of DORA is the technical requirements placed on financial actors and their IT infrastructure. These requirements are intended to ensure a robust and secure digital environment that can handle today's increasingly sophisticated cyber threats.
Risk management
One of DORA's most important requirements is that all financial actors must have comprehensive systems to manage risks linked to their ICT infrastructure. Companies must identify critical functions and assets, ensure these are protected with appropriate security systems, and monitor to quickly detect anomalies or cyber threats. This includes both technical solutions such as intrusion detection systems and processes to continuously review and update protection against new threats.
Incident management and reporting
DORA also introduces requirements for companies to effectively manage and report cyber incidents. Companies need to be able to classify each incident according to specific criteria set by the EU regulatory authorities (ESA) and deliver multiple reports – from initial to final. This reporting structure helps create transparency and coordination at EU level, and ensures that cyber incidents are dealt with in a consistent manner.
Regular security tests
To ensure IT systems are resilient against cyber threats, DORA requires all financial firms to carry out regular testing of their systems. These include annual testing to identify vulnerabilities and, for some larger players, comprehensive penetration testing (TLPT) every three years. Through these tests, real attacks are simulated to ensure that the systems are resistant to attacks. Vulnerabilities discovered during testing must be addressed immediately.
Third Party Providers
Another important part of DORAs is the management of ICT services from third-party providers. The regulations require companies to carefully review and monitor their external suppliers to ensure that they too maintain the same high security standards. This applies not only to cloud providers, who were previously a particular focus point, but to all providers of IT services. The agreements with these providers must include detailed information about service levels, data storage and security measures.
Data Protection and Privacy
To meet the technical requirements of DORA, encryption plays a central role. Encryption is one of the most effective methods of protecting sensitive information, and DORA emphasizes the need to use strong encryption both for data at rest and in transit. By encrypting customer data, financial transactions and other critical information, companies can reduce the risk of data breaches and ensure that even if the data were to be accessed by unauthorized persons, it is unusable without the right encryption key.
In addition to encryption, companies under DORA must ensure the integrity and availability of data, whether internal information or customer data. Technical solutions are required to prevent data loss and ensure that only authorized personnel have access to critical systems. Here, the use of multi-factor authentication (MFA) and other security tools can help further strengthen protection.