bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,297 @@
1
+ # DORA — Incident Management, Classification and Reporting Reference
2
+
3
+ Chapter III, Articles 17–23, Regulation (EU) 2022/2554.
4
+ Key implementing measures: CDR (EU) 2024/1772, CDR (EU) 2025/301, CIR (EU) 2025/302.
5
+
6
+ ---
7
+
8
+ ## Art. 17 — ICT-Related Incident Management Process
9
+
10
+ Financial entities must establish and implement a **documented ICT-related incident
11
+ management process** as part of their overall ICT risk management framework.
12
+
13
+ ### Minimum elements (Art. 17(1)):
14
+ - **(a)** Procedures for detecting, managing, and notifying ICT-related incidents
15
+ - **(b)** Criteria and thresholds for classifying incidents as major (aligned
16
+ with CDR (EU) 2024/1772)
17
+ - **(c)** Escalation procedures — who is notified when, including senior management
18
+ and the board
19
+ - **(d)** Roles and responsibilities of ICT incident response staff
20
+ - **(e)** Communication procedures for internal escalation and external reporting
21
+
22
+ ### Senior management involvement (Art. 17(3)):
23
+ - Major ICT-related incidents must be reported to **senior management**
24
+ - The management body (board) must be **informed** of major incidents
25
+ - The board must have oversight of the entity's exposure to ICT risks
26
+
27
+ ### Customer communication (Art. 17(4)):
28
+ - Financial entities must promptly communicate to clients about major ICT incidents
29
+ that may affect their financial interests
30
+ - Must include details of measures taken and, where known, estimated recovery time
31
+
32
+ ---
33
+
34
+ ## Art. 18 — Classification of ICT-Related Incidents
35
+
36
+ ### Step 1: Is the incident ICT-related?
37
+
38
+ An **ICT-related incident** is any unplanned event that compromises the security
39
+ of network and information systems, and has an adverse impact on the availability,
40
+ authenticity, integrity or confidentiality of data, or on the services provided
41
+ by the financial entity.
42
+
43
+ A **cyber threat** is any potential circumstance, event or action that could harm
44
+ systems, data, or services (even without having materialized yet).
45
+
46
+ ### Step 2: Apply the classification criteria (Art. 18(1))
47
+
48
+ | Criterion | Description | Materiality threshold (CDR 2024/1772) |
49
+ |-----------|-------------|--------------------------------------|
50
+ | (a) Clients and transactions | Number of clients affected; value of impacted transactions | ≥ 10% of clients OR > 5,000 clients; value thresholds by entity type |
51
+ | (b) Reputational impact | Public media coverage; regulatory attention; reputational damage | Significant negative press coverage likely; regulatory inquiry expected |
52
+ | (c) Duration and geographic spread | Hours/days of disruption; number of Member States affected | ≥ 2 hours for critical services; multi-Member State impact |
53
+ | (d) Data losses | Loss of availability, authenticity, integrity or confidentiality | Any loss of client data integrity or confidentiality; availability loss ≥ 2h |
54
+ | (e) Criticality of services | Impact on critical or important functions | Critical function impacted |
55
+ | (f) Economic impact | Direct and indirect financial losses | To be set by ESAs per entity type and size |
56
+
57
+ **Classification logic:** An incident is **major** if it meets or exceeds
58
+ **any single threshold** from CDR (EU) 2024/1772 (OR logic, not AND logic).
59
+
60
+ ### Step 3: Major or non-major?
61
+
62
+ | Classification | Consequence |
63
+ |----------------|-------------|
64
+ | **Major ICT-related incident** | Three-stage regulatory reporting to competent authority (Art. 19) + internal escalation to board |
65
+ | **Non-major ICT-related incident** | Internal incident management process only; no regulatory reporting obligation |
66
+ | **Significant cyber threat** | Voluntary notification to competent authority under Art. 19(2) encouraged |
67
+
68
+ ---
69
+
70
+ ## Art. 19 — Reporting of Major ICT-Related Incidents
71
+
72
+ ### Three-Stage Reporting Timeline
73
+
74
+ | Stage | Deadline | Trigger | Key Content |
75
+ |-------|----------|---------|-------------|
76
+ | **Initial notification** | Within **4 hours** of classification as major | From the moment the entity classifies the incident as major | Incident type; initial impact; functions affected; preliminary recovery estimate |
77
+ | **Intermediate report** | Within **72 hours** of classification | From the same moment as the 4h clock | Updated impact; root cause indications; measures taken; updated recovery estimate |
78
+ | **Final report** | Within **1 month** of the initial notification | One month after the initial report | Root cause analysis; full impact; lessons learned; measures implemented or planned |
79
+
80
+ **Time counting:** The clocks start when the incident is **classified as major**,
81
+ not when it is first detected. Entities must establish clear classification criteria
82
+ to avoid uncertainty about when the clock starts.
83
+
84
+ > **Critical interpretive point:** The 4-hour deadline runs from the moment of
85
+ > **classification as major** (CDR (EU) 2025/301, Art. 3), NOT from the moment of
86
+ > detection. However, entities must not use this to game the timeline — extended
87
+ > triage that delays classification is itself a supervisory risk. The obligation
88
+ > is to classify promptly and report within 4 hours of that classification.
89
+ > Competent authorities may scrutinise delayed classification as evidence of an
90
+ > inadequate incident management process (Art. 17(1)).
91
+
92
+ ### How to Count the 4-Hour Deadline
93
+
94
+ 1. **Detection:** ICT monitoring tools detect anomalous activity
95
+ 2. **Triage:** Incident response team investigates — is this an ICT-related incident?
96
+ 3. **Classification:** Against CDR 2024/1772 thresholds — major or non-major?
97
+ — Classification must be made **promptly**; triage should not extend beyond
98
+ what is operationally necessary to apply the thresholds
99
+ 4. **Clock starts:** From the moment of classification as major
100
+ 5. **Initial notification:** Must reach competent authority within 4 hours
101
+
102
+ **Practical implication:** If classification occurs at 22:00 on a Friday, the
103
+ initial notification must still be submitted by 02:00 Saturday. DORA does not
104
+ provide for weekend/business hours exceptions in the 4-hour initial notification.
105
+
106
+ ### Reporting Channel
107
+
108
+ Reports are submitted to the **home Member State competent authority** using the
109
+ standard templates from **CIR (EU) 2025/302**. The competent authority is:
110
+
111
+ | Entity type | Competent authority |
112
+ |-------------|-------------------|
113
+ | Credit institutions | National banking supervisory authority (e.g., ECB/SSM for significant institutions; national NCA for less significant) |
114
+ | Investment firms | National securities market authority |
115
+ | Insurance undertakings | National insurance supervisor |
116
+ | Payment institutions / E-money institutions | National payment supervisor |
117
+ | Crypto-asset service providers | National authority per MiCA |
118
+
119
+ ### Cross-Border Incidents
120
+
121
+ For entities operating in multiple Member States:
122
+ - Report to the **home state** competent authority (Art. 19(1))
123
+ - The home state authority is responsible for forwarding to host state authorities
124
+ where relevant (Art. 19(5))
125
+ - No obligation to report directly to host state authorities
126
+
127
+ ### Voluntary Notification of Significant Cyber Threats (Art. 19(2))
128
+
129
+ Financial entities **may voluntarily notify** competent authorities of:
130
+ - Significant cyber threats that have not (yet) materialized into an incident
131
+ - Threats that the entity believes could be of relevance to the financial system
132
+
133
+ This is encouraged but not mandatory. CDR (EU) 2025/301 and CIR (EU) 2025/302
134
+ provide templates for voluntary notifications.
135
+
136
+ ---
137
+
138
+ ## Art. 20 — Harmonisation of Reporting Content, Timelines and Templates
139
+
140
+ ESAs adopted two measures:
141
+
142
+ - **CDR (EU) 2025/301:** Specifies the mandatory content of each report stage
143
+ and the exact time limits
144
+ - **CIR (EU) 2025/302:** Provides the standard forms and electronic templates
145
+
146
+ ### Content Requirements per Stage (CDR (EU) 2025/301)
147
+
148
+ **Initial notification (4h report):**
149
+ - Unique incident reference number
150
+ - Reporting entity details (LEI, entity name, entity type)
151
+ - Date and time of incident detection
152
+ - Date and time of classification as major
153
+ - Nature of the incident (cyber attack, system failure, third-party failure, etc.)
154
+ - Affected ICT systems and functions
155
+ - Initial client impact estimate
156
+ - Initial financial impact estimate
157
+ - Measures immediately taken
158
+
159
+ **Intermediate report (72h report):**
160
+ - Updated version of all initial notification fields
161
+ - Updated root cause assessment (hypothesis or confirmed)
162
+ - Updated client and financial impact
163
+ - Response and recovery measures taken since initial notification
164
+ - Revised recovery time estimate
165
+ - Whether the incident is contained or ongoing
166
+
167
+ **Final report (1-month report):**
168
+ - Confirmed root cause analysis
169
+ - Final client and financial impact assessment
170
+ - Total duration of the incident (from detection to resolution)
171
+ - Complete timeline of events
172
+ - Description of all response and recovery measures implemented
173
+ - Preventive measures adopted or planned
174
+ - Lessons learned
175
+ - Whether the incident was caused by an ICT third-party service provider
176
+ (and if so, identification of the TPSP where permitted)
177
+
178
+ ---
179
+
180
+ ## Art. 21 — Centralisation of Reporting
181
+
182
+ - ESAs are tasked with assessing the feasibility of a **single EU reporting hub**
183
+ for major ICT incident reports
184
+ - Pending a centralised hub, financial entities report to their national competent
185
+ authority which coordinates with other authorities
186
+ - Supervisors share incident report information with other relevant authorities
187
+ (e.g., ECB, ENISA, CERT-EU) where appropriate under Art. 21(3)
188
+
189
+ ---
190
+
191
+ ## Art. 22 — Supervisory Feedback
192
+
193
+ After receiving a major incident report (any stage), competent authorities:
194
+ - May provide **feedback** to the financial entity, including:
195
+ - Indicative impact assessment of the incident for the financial system
196
+ - Relevant anonymised cyber threat intelligence from other entities
197
+ - Suggested preventive measures or recommendations
198
+ - This is at the supervisor's discretion; financial entities cannot compel
199
+ supervisory feedback
200
+
201
+ ---
202
+
203
+ ## Art. 23 — Payment-Related Major Incidents
204
+
205
+ **Applies to:**
206
+ - Credit institutions (for payment services)
207
+ - Payment institutions
208
+ - E-money institutions
209
+ - Account information service providers
210
+
211
+ **Integration with PSD2:** Art. 23 DORA replaces the pre-DORA payment incident
212
+ reporting obligation under PSD2 Art. 96 for incidents that qualify as **major**
213
+ under DORA. For non-major payment incidents that would previously have triggered
214
+ PSD2 Art. 96 reporting: PSD2 obligations may still apply for those incidents below
215
+ the DORA major threshold — consult your national competent authority on whether
216
+ PSD2 reporting continues for sub-threshold payment incidents.
217
+
218
+ **Dual-licensed entities:** Credit institutions that also hold payment institution
219
+ authorisation must clarify with their competent authority whether payment-related
220
+ major incidents require reporting to both the banking supervisor (as competent
221
+ authority under DORA) and the payment supervisor. In most Member States, the
222
+ banking supervisor is the single point of receipt and distributes to other
223
+ authorities as needed — but this should be confirmed before an incident occurs.
224
+
225
+ **Reporting to payment authorities:** For payment-related major incidents, the
226
+ entity reports to its **home payment supervisor** using the DORA templates, which
227
+ include payment-specific fields per CIR (EU) 2025/302 — the ITS provides a
228
+ dedicated payment-incident reporting template aligned with legacy PSD2 Art. 96
229
+ reporting formats.
230
+
231
+ ---
232
+
233
+ ## Incident Management Policy — Minimum Required Elements
234
+
235
+ A DORA-compliant incident management policy (Art. 17(1)) must include:
236
+
237
+ 1. **Scope:** What constitutes an ICT-related incident for this entity
238
+ 2. **Detection procedures:** How incidents are identified (monitoring tools, alerts,
239
+ staff reports, third-party notifications)
240
+ 3. **Triage and classification:** Step-by-step process to assess against CDR
241
+ 2024/1772 criteria; who makes the major/non-major determination
242
+ 4. **Escalation matrix:**
243
+ - Level 1 (non-major): ICT operations team
244
+ - Level 2 (potential major): CISO and incident commander
245
+ - Level 3 (confirmed major): Senior management (CEO/CRO) and board notification
246
+ 5. **Reporting obligations:** Who is responsible for filing the 4h/72h/1-month
247
+ reports; templates to use; competent authority contact details
248
+ 6. **Client communication:** Timing, channel, and content of client notifications
249
+ 7. **Post-incident review:** Trigger criteria; who conducts the review; output
250
+ requirements (lessons learned, preventive measures)
251
+ 8. **Testing:** How and when the incident management process is tested (tabletop
252
+ exercises, simulations)
253
+ 9. **Record retention:** How long incident records are retained (minimum
254
+ recommended: 5 years)
255
+
256
+ ---
257
+
258
+ ## Incident Classification Decision Tree
259
+
260
+ ```
261
+ Is the event an ICT-related incident?
262
+ (Unplanned event compromising NIS with adverse impact on operations/data)
263
+
264
+ ├─ NO → Standard IT issue; handle via normal IT operations; no DORA reporting
265
+
266
+ └─ YES → Apply CDR 2024/1772 classification criteria
267
+
268
+ ├─ Does it meet or exceed ANY threshold in CDR 2024/1772?
269
+ │ (clients affected / transaction value / service duration /
270
+ │ data loss / critical function impact / economic impact)
271
+
272
+ ├─ NO → Non-major incident
273
+ │ → Internal incident management process only
274
+ │ → No Art. 19 regulatory reporting
275
+ │ → Document in incident log
276
+
277
+ └─ YES → Major ICT-related incident
278
+ → Escalate to senior management immediately
279
+ → Notify board (Art. 17(3))
280
+ → Initial report to competent authority within 4 HOURS
281
+ → Intermediate report within 72 HOURS
282
+ → Final report within 1 MONTH
283
+ → Notify affected clients (Art. 17(4))
284
+ ```
285
+
286
+ ---
287
+
288
+ ## Common Classification Mistakes
289
+
290
+ | Mistake | Correct Approach |
291
+ |---------|-----------------|
292
+ | Waiting for root cause before classifying | Classify as major the moment any threshold is met; root cause analysis follows |
293
+ | Treating the 4h clock as a business hours deadline | The 4h deadline runs 24/7/365 |
294
+ | Not classifying a third-party outage as a DORA incident | If a TPSP outage causes an ICT-related incident for the financial entity, the entity must classify and report — it is not the TPSP's obligation to report on the entity's behalf |
295
+ | Only reporting when the incident is resolved | DORA requires reporting while the incident is ongoing; the intermediate and final reports update as information becomes available |
296
+ | Treating a significant cyber threat as non-reportable | Voluntary notification under Art. 19(2) is encouraged |
297
+ | Confusing Art. 17 (process) with Art. 18 (classification) | Art. 17 = the ongoing process; Art. 18 = how to classify a specific event |
@@ -0,0 +1,306 @@
1
+ # DORA — Adopted RTS and ITS Reference Guide
2
+
3
+ All Level 2 measures adopted under Regulation (EU) 2022/2554 (DORA).
4
+ Last updated: April 2026.
5
+
6
+ ---
7
+
8
+ ## Overview
9
+
10
+ DORA empowers the European Supervisory Authorities (EBA, ESMA, EIOPA — collectively
11
+ the ESAs) to develop binding Regulatory Technical Standards (RTS) and Implementing
12
+ Technical Standards (ITS) under Articles 15, 16, 18, 20, 26, 28, 29, 30, 31, 32,
13
+ 41, and 43. All key standards were adopted before the DORA application date of
14
+ 17 January 2025.
15
+
16
+ ---
17
+
18
+ ## Complete List of Adopted RTS and ITS
19
+
20
+ ### 1. CDR (EU) 2024/1772 — RTS on ICT Incident Classification
21
+
22
+ | Field | Detail |
23
+ |-------|--------|
24
+ | Full title | Commission Delegated Regulation (EU) 2024/1772 of 13 March 2024 |
25
+ | DORA basis | Art. 18(3) — classification criteria and materiality thresholds |
26
+ | Published | OJ L, 25 June 2024 |
27
+ | Applies from | 17 January 2025 |
28
+
29
+ **Key content:**
30
+ - Defines materiality thresholds for each Art. 18(1) criterion (clients affected,
31
+ transaction value, data loss, service unavailability, geographic spread)
32
+ - An incident is classified as **major** if any single threshold is met (OR logic)
33
+ - Sets minimum thresholds for "significant cyber threats" that may trigger voluntary
34
+ reporting under Art. 19(2)
35
+ - Includes specific rules for payment-related incidents (Art. 23)
36
+
37
+ **Thresholds (indicative — consult the CDR for exact values):**
38
+ - Client impact: ≥ 10% of clients (or >5,000 clients for large entities)
39
+ - Transaction value: depending on institution type and size
40
+ - Service unavailability: ≥ 2 hours for critical services
41
+ - Data integrity/confidentiality: any breach affecting core banking data
42
+
43
+ ---
44
+
45
+ ### 2. CDR (EU) 2024/1773 — RTS on ICT Third-Party Risk Policy
46
+
47
+ | Field | Detail |
48
+ |-------|--------|
49
+ | Full title | Commission Delegated Regulation (EU) 2024/1773 of 13 March 2024 |
50
+ | DORA basis | Art. 28(10) — content of the ICT third-party risk policy; Art. 30(5) — contractual provisions |
51
+ | Published | OJ L, 25 June 2024 |
52
+ | Applies from | 17 January 2025 |
53
+
54
+ **Key content:**
55
+ - Minimum elements of the ICT third-party risk policy (Art. 28(1) policy)
56
+ - Criteria for distinguishing critical/important functions from non-critical
57
+ - Due diligence requirements before entering ICT service arrangements
58
+ - Detailed requirements for contractual provisions under Art. 30(2):
59
+ - Service level descriptions and measurable KPIs
60
+ - Provisions on data location, portability, and return on exit
61
+ - Audit and access rights (the auditor clause must be specific and exercisable)
62
+ - Exit strategy and minimum notice period requirements
63
+ - Sub-contracting provisions and prior consent requirements
64
+
65
+ ---
66
+
67
+ ### 3. CDR (EU) 2024/1774 — RTS on ICT Risk Management Framework
68
+
69
+ | Field | Detail |
70
+ |-------|--------|
71
+ | Full title | Commission Delegated Regulation (EU) 2024/1774 of 13 March 2024 |
72
+ | DORA basis | Art. 15 — elements of ICT RMF; Art. 16(3) — simplified framework |
73
+ | Published | OJ L, 25 June 2024 |
74
+ | Applies from | 17 January 2025 |
75
+
76
+ **Key content:**
77
+ - Chapter I: Detailed elements of the ICT risk management framework (Art. 6–14):
78
+ - ICT risk strategy requirements
79
+ - Minimum content of ICT security policies
80
+ - ICT asset identification and classification requirements
81
+ - Protection and prevention controls (logical and physical)
82
+ - Detection, response, recovery, and backup policy requirements
83
+ - Learning and communication requirements
84
+ - Chapter II: Simplified ICT risk management framework (Art. 16):
85
+ - Entity types eligible for the simplified framework
86
+ - Minimum requirements for simplified framework entities
87
+ - How to document the simplified framework
88
+
89
+ ---
90
+
91
+ ### 4. CDR (EU) 2025/301 — RTS on Major Incident Reporting
92
+
93
+ | Field | Detail |
94
+ |-------|--------|
95
+ | Full title | Commission Delegated Regulation (EU) 2025/301 of 18 October 2024 |
96
+ | DORA basis | Art. 20(3) — content, timelines, and format of incident reports |
97
+ | Published | OJ L, 14 February 2025 |
98
+ | Applies from | 17 January 2025 (retroactively applicable) |
99
+
100
+ **Key content:**
101
+ - Mandatory content of each reporting stage:
102
+ - **Initial notification (within 4 hours):** Incident reference, entity details,
103
+ initial classification rationale, estimated client impact, nature of incident
104
+ - **Intermediate report (within 72 hours):** Updated impact assessment, root cause
105
+ indicators, response actions taken, recovery time estimate
106
+ - **Final report (within 1 month):** Root cause analysis, full impact assessment,
107
+ lessons learned, preventive measures implemented or planned
108
+ - Rules on how to count the 4-hour and 72-hour timelines from classification
109
+ - Provisions for voluntary reporting of significant cyber threats (Art. 19(2))
110
+
111
+ ---
112
+
113
+ ### 5. CIR (EU) 2025/302 — ITS on Incident Reporting Templates
114
+
115
+ | Field | Detail |
116
+ |-------|--------|
117
+ | Full title | Commission Implementing Regulation (EU) 2025/302 of 18 October 2024 |
118
+ | DORA basis | Art. 20(4) — standard forms and templates for incident reports |
119
+ | Published | OJ L, 14 February 2025 |
120
+ | Applies from | 17 January 2025 (retroactively applicable) |
121
+
122
+ **Key content:**
123
+ - Standard templates for all three reporting stages (initial, intermediate, final)
124
+ - **Dedicated payment-incident template** per Art. 23 for credit institutions,
125
+ payment institutions, and e-money institutions — aligned with legacy PSD2 Art. 96
126
+ reporting fields
127
+ - Separate template for voluntary cyber threat notifications (Art. 19(2))
128
+ - Electronic submission format requirements
129
+ - Competent authority designation — which authority receives reports for each
130
+ entity type (home state supervisor as a general rule)
131
+
132
+ ---
133
+
134
+ ### 6. CIR (EU) 2024/2956 — ITS on Register of Information
135
+
136
+ | Field | Detail |
137
+ |-------|--------|
138
+ | Full title | Commission Implementing Regulation (EU) 2024/2956 of 20 September 2024 |
139
+ | DORA basis | Art. 28(9) — templates for the Register of Information |
140
+ | Published | OJ L, 11 December 2024 |
141
+ | Applies from | 17 January 2025 |
142
+
143
+ **Key content — mandatory Register fields:**
144
+
145
+ The Register of Information (RoI) must capture, for each ICT service arrangement:
146
+
147
+ | Field Group | Key Fields |
148
+ |-------------|-----------|
149
+ | Entity information | LEI of reporting entity, entity name, entity type |
150
+ | TPSP identification | TPSP LEI, TPSP name, country of establishment |
151
+ | Arrangement details | Unique arrangement reference, arrangement type |
152
+ | Function classification | Critical or important function (Y/N), function description |
153
+ | ICT service description | Type of service (IaaS/PaaS/SaaS/other), specific service description |
154
+ | Data | Types of data processed, storage location (country/region) |
155
+ | Sub-processors | Chain of sub-processors (name, LEI, country) |
156
+ | Contractual terms | Contract start date, contract end date, notice period |
157
+ | Substitutability | Assessment of ease of substitution (high/medium/low) |
158
+ | Exit strategy | Reference to exit strategy document |
159
+
160
+ **Annual submission:** The RoI is submitted to the competent authority at least
161
+ annually (or upon request). The ESAs aggregate submissions for the oversight framework.
162
+
163
+ ---
164
+
165
+ ### 7. CDR (EU) 2025/1190 — RTS on TLPT
166
+
167
+ | Field | Detail |
168
+ |-------|--------|
169
+ | Full title | Commission Delegated Regulation (EU) 2025/1190 of 28 February 2025 |
170
+ | DORA basis | Art. 26(11) and Art. 27(9) — TLPT requirements, tester qualifications |
171
+ | Published | OJ L, 18 June 2025 |
172
+ | Applies from | 8 July 2025 |
173
+
174
+ **Key content:**
175
+ - Criteria for identifying financial entities required to conduct TLPT (Art. 26(8))
176
+ - Scope determination: which functions and ICT systems must be included
177
+ - Role of competent authority in approving TLPT scope and methodology
178
+ - Requirements for the **threat intelligence phase**: accreditation of threat
179
+ intelligence providers
180
+ - Requirements for **red team testing**: methodology, documentation, attestation
181
+ - **Mutual recognition:** TLPT results recognized across EU jurisdictions for
182
+ entities operating cross-border — only one test needed (Art. 26(5))
183
+ - Tester qualification requirements per Art. 27:
184
+ - Independence from the tested entity
185
+ - Relevant professional certification
186
+ - Risk methodology capability
187
+ - **TIBER-EU alignment:** The CDR aligns TLPT with the TIBER-EU framework;
188
+ TIBER-EU tests conducted under the TIBER-EU framework may satisfy DORA
189
+ TLPT requirements where conditions are met
190
+
191
+ ---
192
+
193
+ ### 8. CDR (EU) 2025/532 — RTS on Subcontracting of ICT Services
194
+
195
+ | Field | Detail |
196
+ |-------|--------|
197
+ | Full title | Commission Delegated Regulation (EU) 2025/532 |
198
+ | DORA basis | Art. 30(5) — subcontracting provisions |
199
+ | Applies from | 17 January 2025 |
200
+
201
+ **Key content:**
202
+ - When a TPSP subcontracts ICT services supporting critical/important functions,
203
+ the financial entity must ensure the contract includes:
204
+ - Prior written consent of the financial entity for sub-contracting chains
205
+ - Equivalent contractual provisions at sub-processor level
206
+ - Right to audit the sub-processor (directly or via the TPSP)
207
+ - Conditions under which financial entities may apply pre-approved sub-contracting
208
+ arrangements (framework sub-contracting clauses)
209
+ - Notification requirements for changes in sub-processors
210
+
211
+ ---
212
+
213
+ ### 9. CDR (EU) 2024/1502 — Designation Criteria for Critical ICT TPSPs
214
+
215
+ | Field | Detail |
216
+ |-------|--------|
217
+ | Full title | Commission Delegated Regulation (EU) 2024/1502 of 22 February 2024 |
218
+ | DORA basis | Art. 31(6) — criteria for designation of critical ICT TPSPs |
219
+ | Published | OJ L, 5 June 2024 |
220
+ | Applies from | 17 January 2025 |
221
+
222
+ **Key content — designation criteria:**
223
+ - **Systemic impact:** Would failure or discontinuation of the TPSP's services
224
+ cause systemic disruption to the financial system?
225
+ - **Scale:** Number and types of financial entities served; proportion of their
226
+ ICT needs
227
+ - **Substitutability:** How easily could another TPSP replace the service?
228
+ (Low substitutability → higher probability of designation)
229
+ - **Interconnectedness:** Does the TPSP's failure trigger cascading effects?
230
+ - **Concentration risk:** Does a large portion of EU financial entities rely
231
+ on this single TPSP for critical functions?
232
+
233
+ **Designation process:** ESAs assess all ICT TPSPs that provide services to
234
+ EU financial entities and publish a list of designated CTPPs. TPSPs not
235
+ established in the EU that provide services to EU financial entities must
236
+ designate an EU legal representative (Art. 31(11)).
237
+
238
+ ---
239
+
240
+ ### 10. CDR (EU) 2024/1505 — Oversight Fees for Critical ICT TPSPs
241
+
242
+ | Field | Detail |
243
+ |-------|--------|
244
+ | Full title | Commission Delegated Regulation (EU) 2024/1505 of 22 February 2024 |
245
+ | DORA basis | Art. 43(2) — methodology for calculating oversight fees |
246
+ | Published | OJ L, 5 June 2024 |
247
+ | Applies from | 17 January 2025 |
248
+
249
+ **Key content:**
250
+ - Fee methodology: annual oversight fee for designated CTPPs
251
+ - Based on: total worldwide annual net turnover of the CTPSP
252
+ - Fee caps and floors to ensure proportionality
253
+ - Fee collection process via Lead Overseer
254
+
255
+ ---
256
+
257
+ ### 11. CDR (EU) 2025/295 — RTS on Oversight Activities Harmonisation
258
+
259
+ | Field | Detail |
260
+ |-------|--------|
261
+ | Full title | Commission Delegated Regulation (EU) 2025/295 |
262
+ | DORA basis | Art. 41(7) — harmonisation of oversight activities |
263
+ | Applies from | 17 January 2025 |
264
+
265
+ **Key content:**
266
+ - How Lead Overseers coordinate with Joint Oversight Network (JON)
267
+ - Information sharing between ESAs and national competent authorities
268
+ - Procedures for issuing oversight recommendations
269
+ - Follow-up process for non-compliance with recommendations
270
+
271
+ ---
272
+
273
+ ### 12. CDR (EU) 2025/420 — RTS on Joint Examination Teams (JETs)
274
+
275
+ | Field | Detail |
276
+ |-------|--------|
277
+ | Full title | Commission Delegated Regulation (EU) 2025/420 |
278
+ | DORA basis | Art. 32 — structure and operation of Joint Examination Teams |
279
+ | Applies from | 17 January 2025 |
280
+
281
+ **Key content:**
282
+ - Composition of JETs: lead overseer staff + national competent authority experts
283
+ - JET mandate: on-site and off-site examination of designated CTPPs
284
+ - Coordination between JET lead and national experts
285
+ - Reporting of JET findings to Lead Overseer
286
+
287
+ ---
288
+
289
+ ## Quick Reference: DORA Article → RTS/ITS
290
+
291
+ | DORA Article | Obligation | Implementing Measure |
292
+ |-------------|-----------|---------------------|
293
+ | Art. 15 | ICT RMF detailed elements | CDR (EU) 2024/1774 |
294
+ | Art. 16(3) | Simplified RMF | CDR (EU) 2024/1774 (Ch. II) |
295
+ | Art. 18(3) | Incident classification thresholds | CDR (EU) 2024/1772 |
296
+ | Art. 20(3) | Incident reporting content + timelines | CDR (EU) 2025/301 |
297
+ | Art. 20(4) | Incident reporting templates | CIR (EU) 2025/302 |
298
+ | Art. 26(11) | TLPT requirements | CDR (EU) 2025/1190 |
299
+ | Art. 27(9) | Tester qualifications | CDR (EU) 2025/1190 |
300
+ | Art. 28(9) | Register of Information templates | CIR (EU) 2024/2956 |
301
+ | Art. 28(10) + 30(5) | ICT third-party risk policy + contracts | CDR (EU) 2024/1773 |
302
+ | Art. 30(5) | Subcontracting provisions | CDR (EU) 2025/532 |
303
+ | Art. 31(6) | Critical TPSP designation criteria | CDR (EU) 2024/1502 |
304
+ | Art. 32 | Joint Examination Teams (JETs) | CDR (EU) 2025/420 |
305
+ | Art. 41(7) | Oversight activities harmonisation | CDR (EU) 2025/295 |
306
+ | Art. 43(2) | Oversight fees for CTPPs | CDR (EU) 2024/1505 |