EU-DORA
Regulation (EU) 2022/2554 — Digital Operational Resilience Act
- Ch. I — General Provisions
- Art. 1. Subject matter (8)
- Art. 2. Scope (4)
- Art. 3. Definitions ref
- Art. 4. Proportionality principle (3)
- Ch. II — ICT Risk Management
- Art. 5. Governance and organisation (37)
- Art. 6. ICT risk management framework (23)
- Art. 7. ICT systems, protocols and tools (4)
- Art. 8. Identification (10)
- Art. 9. Protection and prevention (17)
- Art. 10. Detection (7)
- Art. 11. Response and recovery (23)
- Art. 12. Backup policies and procedures, restoration and recovery procedures and methods (19)
- Art. 13. Learning and evolving (16)
- Art. 14. Communication (4)
- Art. 15. Further harmonisation of ICT risk management tools, methods, processes and policies (10)
- Art. 16. Simplified ICT risk management framework (13)
- Ch. III — ICT-Related Incident Management, Classification and Reporting
- Art. 17. ICT-related incident management process (9)
- Art. 18. Classification of ICT-related incidents and cyber threats (7)
- Art. 19. Reporting of major ICT-related incidents and voluntary notification of significant cyber threats (18)
- Art. 20. Harmonisation of reporting content and templates (7)
- Art. 21. Centralisation of reporting of major ICT-related incidents (9)
- Art. 22. Supervisory feedback (6)
- Art. 23. Operational or security payment-related incidents concerning credit institutions, payment institutions, account information service providers, and electronic money institutions (2)
- Ch. IV — Digital Operational Resilience Testing
- Art. 24. General requirements for the performance of digital operational resilience testing (8)
- Art. 25. Testing of ICT tools and systems (3)
- Art. 26. Advanced testing of ICT tools, systems and processes based on TLPT (14)
- Art. 27. Requirements for testers for the carrying out of TLPT (9)
- Ch. V — Managing ICT Third-Party Risk
- Art. 28. General principles (26)
- Art. 29. Preliminary assessment of ICT concentration risk at entity level (7)
- Art. 30. Key contractual provisions (24)
- Art. 31. Designation of critical ICT third-party service providers (16)
- Art. 32. Structure of the Oversight Framework (11)
- Art. 33. Tasks of the Lead Overseer (18)
- Art. 34. Operational coordination between Lead Overseers (4)
- Art. 35. Powers of the Lead Overseer (19)
- Art. 36. Exercise of the powers of the Lead Overseer outside the Union (15)
- Art. 37. Request for information (15)
- Art. 38. General investigations (10)
- Art. 39. Inspections (8)
- Art. 40. Ongoing oversight (7)
- Art. 41. Harmonisation of conditions enabling the conduct of the oversight activities (5)
- Art. 42. Follow-up by competent authorities (14)
- Art. 43. Oversight fees (3)
- Art. 44. International cooperation (2)
- Ch. VI — Information-Sharing Arrangements
- Art. 45. Information-sharing arrangements on cyber threat information and intelligence (3)
- Ch. VII — Competent Authorities
- Art. 46. Competent authorities (17)
- Art. 47. Cooperation with structures and authorities established by Directive (EU) 2022/2555 (7)
- Art. 48. Cooperation between authorities (2)
- Art. 49. Financial cross-sector exercises, communication and cooperation (5)
- Art. 50. Administrative penalties and remedial measures (14)
- Art. 51. Exercise of the power to impose administrative penalties and remedial measures (9)
- Art. 52. Criminal penalties (2)
- Art. 53. Notification duties (2)
- Art. 54. Publication of administrative penalties (8)
- Art. 55. Professional secrecy (4)
- Art. 56. Data Protection (3)
- Ch. VIII — Delegated Acts
- Art. 57. Exercise of the delegation (3)
- Ch. IX — Transitional and Final Provisions
- Art. 58. Review clause (7)
- Art. 59. Amendments to Regulation (EC) No 1060/2009 (5)
- Art. 60. Amendments to Regulation (EU) No 648/2012 (7)
- Art. 61. Amendments to Regulation (EU) No 909/2014 (6)
- Art. 62. Amendments to Regulation (EU) No 600/2014 (3)
- Art. 63. Amendment to Regulation (EU) 2016/1011 (4)
- Art. 64. Entry into force and application (1)
Risk Management Obligations
51Chapter I — General Provisions
Article 1. Subject matter
2 obligations
EU-DORA-1-01
Risk Management
Implement ICT risk management requirements
Financial entities must implement and maintain information and communication technology (ICT) risk management systems an
EU-DORA-1-06
Risk Management
Implement sound management of ICT third-party risk
Financial entities must implement measures for the sound management of ICT third-party risk in accordance with this Regu
Chapter II — ICT Risk Management
Article 5. Governance and organisation
1 obligation
Article 6. ICT risk management framework
3 obligations
EU-DORA-6-01
Risk Management
Establish comprehensive ICT risk management framework
Financial entities must have a sound, comprehensive and well-documented ICT risk management framework as part of their o
EU-DORA-6-03
Risk Management
Deploy appropriate ICT risk mitigation measures
Financial entities must minimise the impact of ICT risk by deploying appropriate strategies, policies, procedures, ICT p
EU-DORA-6-16
Risk Management
Establish ICT risk tolerance level and analyze impact tolerance
The digital operational resilience strategy must establish the risk tolerance level for ICT risk in accordance with the
Article 8. Identification
4 obligations
EU-DORA-8-03
Risk Management
Continuously identify all sources of ICT risk
Financial entities must continuously identify all sources of ICT risk, particularly the risk exposure to and from other
EU-DORA-8-04
Risk Management
Review risk scenarios annually
Financial entities must review on a regular basis, and at least yearly, the risk scenarios impacting them.
EU-DORA-8-05
Risk Management
Perform risk assessment upon major changes (non-microenterprises)
Financial entities other than microenterprises must perform a risk assessment upon each major change in the network and
EU-DORA-8-10
Risk Management
Conduct annual ICT risk assessment on legacy systems (non-microenterprises)
Financial entities other than microenterprises must conduct on a regular basis, and at least yearly, a specific ICT risk
Article 9. Protection and prevention
2 obligations
EU-DORA-9-02
Risk Management
Minimize ICT risk impact through deployment of security measures
Financial entities must minimize the impact of ICT risk on ICT systems through the deployment of appropriate ICT securit
EU-DORA-9-07
Risk Management
Minimize risk of data corruption, loss, unauthorized access and technical flaws
Financial entities must minimize the risk of corruption or loss of data, unauthorized access and technical flaws that ma
Article 13. Learning and evolving
2 obligations
EU-DORA-13-08
Risk Management
Incorporate Lessons into ICT Risk Assessment Process
Financial entities must continuously incorporate lessons derived from digital operational resilience testing (Articles 2
EU-DORA-13-09
Risk Management
Review ICT Risk Management Framework Components
Financial entities must use findings from lessons learned to form the basis for appropriate reviews of relevant componen
Article 16. Simplified ICT risk management framework
5 obligations
EU-DORA-16-01
Risk Management
Implement documented ICT risk management framework
Put in place and maintain a sound and documented ICT risk management framework that details the mechanisms and measures
EU-DORA-16-03
Risk Management
Minimize ICT risk through sound, resilient systems
Minimize the impact of ICT risk through the use of sound, resilient and updated ICT systems, protocols and tools which a
EU-DORA-16-04
Risk Management
Enable prompt identification and handling of ICT risks and incidents
Allow sources of ICT risk and anomalies in the network and information systems to be promptly identified and detected an
EU-DORA-16-05
Risk Management
Identify key ICT third-party service provider dependencies
Identify key dependencies on ICT third-party service providers to understand and manage external risks.
EU-DORA-16-06
Risk Management
Ensure business continuity for critical or important functions
Ensure the continuity of critical or important functions, through business continuity plans and response and recovery me
Chapter III — ICT-Related Incident Management, Classification and Reporting
Article 19. Reporting of major ICT-related incidents and voluntary notification of significant cyber threats
1 obligation
Article 21. Centralisation of reporting of major ICT-related incidents
1 obligation
Article 22. Supervisory feedback
1 obligation
Chapter IV — Digital Operational Resilience Testing
Article 24. General requirements for the performance of digital operational resilience testing
1 obligation
Article 26. Advanced testing of ICT tools, systems and processes based on TLPT
1 obligation
Chapter V — Managing ICT Third-Party Risk
Article 28. General principles
4 obligations
EU-DORA-28-01
Risk Management
Manage ICT third-party risk as integral component of ICT risk management
Financial entities must manage ICT third-party risk as an integral component of ICT risk within their ICT risk managemen
EU-DORA-28-03
Risk Management
Implement ICT third-party risk management proportionally
Financial entities must implement ICT third-party risk management in accordance with the principle of proportionality, c
EU-DORA-28-14
Risk Management
Identify and assess all relevant risks including concentration risk
Before entering into contractual arrangements for ICT services, financial entities must identify and assess all relevant
EU-DORA-28-16
Risk Management
Identify and assess conflicts of interest from contractual arrangement
Before entering into contractual arrangements for ICT services, financial entities must identify and assess conflicts of
Article 29. Preliminary assessment of ICT concentration risk at entity level
7 obligations
EU-DORA-29-01
Risk Management
Assess non-substitutable ICT provider risk
When performing identification and assessment of risks under Article 28(4)(c), financial entities must consider whether
EU-DORA-29-02
Risk Management
Assess concentration risk from multiple arrangements
When performing identification and assessment of risks under Article 28(4)(c), financial entities must consider whether
EU-DORA-29-03
Risk Management
Weigh benefits and costs of alternative solutions
Financial entities must weigh the benefits and costs of alternative solutions, such as using different ICT third-party s
EU-DORA-29-04
Risk Management
Assess subcontracting benefits and risks
Where contractual arrangements for ICT services supporting critical or important functions include the possibility that
EU-DORA-29-05
Risk Management
Consider insolvency law provisions and data recovery constraints
Where contractual arrangements concern ICT services supporting critical or important functions, financial entities must
EU-DORA-29-06
Risk Management
Consider data protection compliance and law enforcement for third country providers
Where contractual arrangements for ICT services supporting critical or important functions are concluded with an ICT thi
EU-DORA-29-07
Risk Management
Assess impact of subcontracting chains on monitoring and supervision
Where contractual arrangements for ICT services supporting critical or important functions provide for subcontracting, f
Article 30. Key contractual provisions
2 obligations
EU-DORA-30-13
Risk Management
Require business contingency plans and ICT security measures
For critical or important functions, contracts must require the ICT third-party service provider to implement and test b
EU-DORA-30-19
Risk Management
Establish exit strategies with mandatory transition period
For critical or important functions, contracts must include exit strategies with a mandatory adequate transition period
Article 33. Tasks of the Lead Overseer
8 obligations
EU-DORA-33-03
Risk Management
Assess risk management rules and procedures of critical ICT third-party providers
The Lead Overseer must assess whether each critical ICT third-party service provider has comprehensive, sound and effect
EU-DORA-33-04
Risk Management
Focus assessment on ICT services supporting critical or important functions
The assessment must primarily focus on ICT services provided by the critical ICT third-party service provider that suppo
EU-DORA-33-05
Risk Management
Extend assessment to non-critical functions when necessary
When necessary to address all relevant risks, the assessment must be extended to ICT services supporting functions other
EU-DORA-33-06
Risk Management
Assess ICT requirements for service security and quality
The assessment must cover ICT requirements to ensure security, availability, continuity, scalability and quality of serv
EU-DORA-33-07
Risk Management
Assess physical security measures
The assessment must cover physical security contributing to ICT security, including security of premises, facilities, an
EU-DORA-33-08
Risk Management
Assess risk management processes
The assessment must cover risk management processes, including ICT risk management policies, ICT business continuity pol
EU-DORA-33-09
Risk Management
Assess governance arrangements
The assessment must cover governance arrangements, including organizational structure with clear, transparent and consis
EU-DORA-33-12
Risk Management
Assess ICT systems testing
The assessment must cover the testing of ICT systems, infrastructure and controls.
Article 42. Follow-up by competent authorities
1 obligation
Chapter VI — Information-Sharing Arrangements
Chapter VII — Competent Authorities
Chapter VIII — Delegated Acts
Chapter IX — Transitional and Final Provisions
Article 59. Amendments to Regulation (EC) No 1060/2009
1 obligation
Article 60. Amendments to Regulation (EU) No 648/2012
1 obligation
Article 61. Amendments to Regulation (EU) No 909/2014
2 obligations
EU-DORA-61-01
Risk Management
ICT operational risk identification and minimization
A CSD shall identify sources of operational risk, both internal and external, and minimise their impact through deployme
EU-DORA-61-04
Risk Management
Third-party risk identification and management
A CSD shall identify, monitor and manage the risks that key participants in the securities settlement systems it operate
Article 63. Amendment to Regulation (EU) 2016/1011
1 obligation