Governance and organization
The financial entity's management body is ultimately responsible for establishing the organization and governance structure to effectively manage ICT risk. DORA outlines a set of responsibilities and requirements that the management body must fulfill, one of which is for them to enhance and sustain their understanding of ICT risk.
ICT risk management framework
All financial entities must recognize and assess their ICT risk landscape and have a framework for managing ICT risk that governs and directs all activities related to ICT risk management. Financial entities (except for microenterprises) must guarantee an adequate level of separation and autonomy among their ICT risk management functions, control functions, and internal audit functions, based on either the three lines of defence model or an internal risk management and control model.
ICT-related incident management, classification and reporting
Financial entities must set up an ICT-related incident management process and develop the necessary abilities to supervise, manage and track such incidents. Significant incidents must be reported to the appropriate competent authority.
The classification of incidents must adhere to the criteria stipulated in the regulation, including the scope of the incident's geographical impact, the criticality of the affected services, and the duration of the incident.
Digital operational resilience testing
Under DORA, a digital operational resilience testing program that is proportionate and risk-based must be set up. The program should include various tests, including open-source analyses, vulnerability assessments and scans, gap analyses, as well as network security assessments. Critical ICT systems and applications are required to undergo yearly testing, and certain financial entities must conduct advanced threat-led penetration testing at least once every three years.
Managing ICT third-party risk
As the ICT third-party risk management is an essential part of the ICT risk management framework, financial institutions are required to establish a strategy for managing this risk and periodically evaluate this risk. They must also keep a record of all contractual agreements with ICT third-party service providers in a dedicated Register of Information.
In addition, DORA brings requirements concerning new ICT service procurement, termination and incorporation of certain contractual provisions into agreements with ICT third-party service providers. It mandates financial entities to conduct ICT concentration risk assessments before making contractual agreements.
Information-sharing arrangements
Financial institutions are permitted to exchange cyber threat information and intelligence with one another provided that the sharing of information takes place within trusted communities, bolsters the digital operational resilience of financial entities, and is conducted in compliance with relevant legislation.