News
The Digital Operational Resilience Act (DORA)
The Digital Operational Resilience Act (Regulation (EU) 2022/2554) solves an important problem in the EU financial regulation, as it “aims to consolidate and upgrade ICT risk requirements as part of the operational risk requirements that have, up to this point, been addressed separately in various Union legal acts. While those acts covered the main categories of financial risk (e.g. credit risk, market risk, counterparty credit risk and liquidity risk, market conduct risk), they did not comprehensively tackle, at the time of their adoption, all components of operational resilience.”
What are the key components of DORA?
Essentially, DORA is divided into five key pillars, as summarised below:
1. ICT Risk Management
DORA establishes a set of requirements on the ICT risk management framework to be imposed on the in-scope entities, including amongst others:
- having in place an internal governance and control framework that guarantees effective ICT risk management;
- implementing a comprehensive ICT risk management framework, subject to yearly review and internal audit;
- ensuring that their ICT is up to date, reliable, properly designed, and technically stable; and
- implementing disaster and recovery policies to ensure a prompt recovery after and ICT-related incident.
2. ICT-Related Incident Reporting
DORA also requires in-scope entities to:
- implement procedures to ensure consistent monitoring, management and following-up of ICT-related incidents so as to prevent incidents from occurring;
- classify the incident in relation to the criteria specified in the Regulation and developed further by the European Supervisory Authorities (ESAs), such as the European Banking Authority (EBA), the European Securities and Markets Authority (ESMA) and the European Insurance and Occupational Pensions Authority (EIOPA);
- document ICT-related incidents, and report any incidents deemed as ‘major’ to the relevant authority – reporting deadlines are to be determined by the ESAs; and
- submit reports on ICT-related incidents to their users and clients.
3. Resilience Testing
In-scope entities will have to test their digital operational resilience at least every year, taking into account their size, business and risk profiles. Throughout the performance of the tests, entities must establish procedures to be able to classify and remedy all revealed issues. Any identified weaknesses, gaps or deficiencies must be quickly eliminated or mitigated with the application of counteractive measures.
The ESAs will elaborate on testing methodologies. In the interim, entities can use the European Central Bank’s (ECB) Threat Intelligence-Based Ethical Red-Teaming framework as a guide. Entities identified as being of particular systemic standing (in accordance with a framework to be developed by the ESAs) will have to conduct Threat Led Penetration Testing (TLTP), also known as a Red/Purple Team Assessment, to address higher levels of risk exposure.
4. ICT Third-Party Risk Management
ICT third-party risk needs to be managed by entities as an integral part of their ICT risk management framework. ‘Critical’ ICT third-party service providers, which are to be designated by the ESAs, are also subject to a Union Oversight Framework, whereby each critical ICT service provider will be designated a Lead Overseer (either EBA, ESMA or EIOPA).
DORA requires in-scope entities to, amongst others:
- have in place contractual arrangements for the use of ICT services and make specific risk-management related assessments before entering into new contractual arrangements;
- maintain an updated information register on all contractual arrangements for the use of ICT services provided by third-party service providers;
- report at least every year to the respective competent authorities on the number and type of contractual arrangements and the categories of ICT third-party service providers; and
- inform the respective competent authorities about any intended contractual arrangement for the use of ICT services supporting critical or important functions.
5. Information Sharing between Financial Entities
Financial entities are encouraged to exchange amongst themselves cyber threat information and intelligence, in accordance with applicable legislation, in order to enhance their digital operational resilience; raise awareness on ICT risks and minimise the spreading of ICT threats; and support each other’s defensive techniques, mitigation, response and recovery stages.
Who are the In-Scope Entities?
There are a wide range of entities that fall within the scope of DORA, as summarised below:
FINANCIAL ENTITIES
- Credit institutions
- Payment institutions
- Account information service providers
- Electronic money institutions
- Investment firms
- Cryptoasset service providers
- Central securities depositories
- Central counterparties
- Trading venues
- Trade repositories
- AIFMs
- Management companies
- Data reporting service providers
- Insurance and reinsurance undertakings
- Insurance intermediaries, reinsurance intermediaries and ancillary insurance intermediaries
- Institutions for occupational retirement provision
- Credit rating agencies
- Administrators of critical benchmarks
- Crowdfunding service providers
- Securitization repositories
ICT THIRD-PARTY SERVICE PROVIDERS
- An undertaking providing ICT services, i.e. digital and data services provided through the ICT systems through one or more internal or external users on an ongoing basis, including hardware as a service and hardware services which include technical support via software or firmware updates by the hardware provider, excluding traditional analogue telephone services
- Critical ICT third-party service provider
Adoption, Applicability and Enforcement
DORA entered into force on 16 January 2023 and shall apply as from 17 January 2025 in its entirety and directly applicable in all Member States. The ESAs have already started preparing for its implementation, whereas in-scope entities will only have a limited time to implement it which, in view of DORA’s technical and operational complexity, is expected to be a challenge.
The Malta Financial Services Authority (MFSA), will take the role of compliance oversight and enforce the regulation as required. As to enforcement, DORA does not provide for fines or other sanctions for non-compliance and Member States are required to stipulate appropriate sanctions and remedies for breaches of the Regulation to ensure that they are effectively implemented in their national law, which remains to be seen.
Article provided by INPLP member: Gege Gatt and Franklin Cachia (Malta IT Law Association, Malta)
Discover more about the INPLP and the INPLP-Members
Dr. Tobias Höllwarth (Managing Director INPLP)
News Archiv
- Alle zeigen
- November 2024
- Oktober 2024
- September 2024
- August 2024
- Juli 2024
- Juni 2024
- Mai 2024
- April 2024
- März 2024
- Februar 2024
- Jänner 2024
- Dezember 2023
- November 2023
- Oktober 2023
- September 2023
- August 2023
- Juli 2023
- Juni 2023
- Mai 2023
- April 2023
- März 2023
- Februar 2023
- Jänner 2023
- Dezember 2022
- November 2022
- Oktober 2022
- September 2022
- August 2022
- Juli 2022
- Mai 2022
- April 2022
- März 2022
- Februar 2022
- November 2021
- September 2021
- Juli 2021
- Mai 2021
- April 2021
- Dezember 2020
- November 2020
- Oktober 2020
- Juni 2020
- März 2020
- Dezember 2019
- Oktober 2019
- September 2019
- August 2019
- Juli 2019
- Juni 2019
- Mai 2019
- April 2019
- März 2019
- Februar 2019
- Jänner 2019
- Dezember 2018
- November 2018
- Oktober 2018
- September 2018
- August 2018
- Juli 2018
- Juni 2018
- Mai 2018
- April 2018
- März 2018
- Februar 2018
- Dezember 2017
- November 2017
- Oktober 2017
- September 2017
- August 2017
- Juli 2017
- Juni 2017
- Mai 2017
- April 2017
- März 2017
- Februar 2017
- November 2016
- Oktober 2016
- September 2016
- Juli 2016
- Juni 2016
- Mai 2016
- April 2016
- März 2016
- Februar 2016
- Jänner 2016
- Dezember 2015
- November 2015
- Oktober 2015
- September 2015
- August 2015
- Juli 2015
- Juni 2015
- Mai 2015
- April 2015
- März 2015
- Februar 2015
- Jänner 2015
- Dezember 2014
- November 2014
- Oktober 2014
- September 2014
- August 2014
- Juli 2014
- Juni 2014
- Mai 2014
- April 2014
- März 2014
- Februar 2014
- Jänner 2014
- Dezember 2013
- November 2013
- Oktober 2013
- September 2013
- August 2013
- Juli 2013
- Juni 2013
- Mai 2013
- April 2013
- März 2013
- Februar 2013
- Jänner 2013
- Dezember 2012
- November 2012
- Oktober 2012
- September 2012
- August 2012
- Juli 2012
- Juni 2012
- Mai 2012
- April 2012
- März 2012
- Februar 2012
- Jänner 2012
- Dezember 2011
- November 2011
- Oktober 2011
- September 2011
- Juli 2011
- Juni 2011
- Mai 2011
- April 2011
- März 2011
- Februar 2011
- Jänner 2011
- November 2010
- Oktober 2010
- September 2010
- Juli 2010