Our Cyber Security and Privacy team is continuously following the latest developments on the Digital Operational Resilience Act, or “DORA”. Since its first draft developed by the European Commission in September 2020 - which we covered in a previous article - numerous important changes have been made to the Act’s official text, published on 24 June 2022.
The EU’s aim with DORA is that of strengthening the financial sector’s resilience to ICT-related incidents and introduces very specific and prescriptive requirements that will be homogenous across EU member states. This act provides a very detailed set of criteria, templates and instructions that will shape how financial organisations manage ICT and cyber risks, carry out resilience testing, undergo cyber incident reporting and response, and develop cyber threat information sharing processes. Such requirements have been presented within five main pillars, each of which addressing a core ICT and cyber security issue within the financial sector.
Financial entities (e.g., credit institutions, insurance organisations, payment processors) and ICT third party service providers (e.g., cloud providers, software providers, data analytics services, data centres) to the financial sector.
The implementation timeline has moved to two years after publication of the DORA act within the Official Journal of the EU. Therefore, financial entities will be expected to be compliant to DORA by early 2025 Q1.
The essence of DORA is divided across 5 core pillars that address various aspects or domains within ICT and cyber security, providing a comprehensive digital resiliency framework for the relevant entities. A summary of the key new changes are provided below:
New responsibilities for the board of directors, as they must now:
Develop and approve the Digital Operational Resilience Strategy (DORS)
Put in place policies to protect the confidentiality, integrity, and availability of all data
Ensure communication, cooperation, and coordination by implementing an ICT governance framework
Ensure the use of ICT solutions to prevent breaches of confidentiality, impairment of integrity, and lack of availability and loss of data.
New requirements for the Digital Operational Resilience Strategy (DORS):
Must include key performance indicators and key risk metrics.
Shall include a communication strategy for disclosure of ICT incidents.
Must detail how the financial entity will implement digital operational resilience testing.
New requirements for the design and construction of the ICT risk framework:
Stricter requirements for independence and avoidance of conflicts of interests for the second line of defence.
Digital Operational Resilience training to all staff and senior management shall now be customised and cover ICT third-party service providers.
The Information Security policy should now consider control objectives for the protection of customers’ data confidentiality, integrity and availability.
Expansion of the ICT risk management scope:
Financial entities must now conduct a comprehensive Business Impact analysis (BIA) mapping business functions, processes, third-party dependencies and high-value assets.
All information assets will need to be assessed. Previously only ICT assets were within scope.
Inventories and assessments must now be updated periodically and every time any major change occurs.
Stricter requirements for Business Continuity Management (BCM):
ICT Business Continuity Plans and the ICT response and Recovery Plans yearly testing shall now cover all supporting functions.
Testing of backup and restoration procedures shall now be undertaken on a periodic basis.
Central securities depositories shall now directly maintain at least one secondary processing site.