bmad-plus 0.4.4 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +31 -0
  2. package/README.md +3 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +21 -8
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,441 @@
1
+ # DORA — Article-by-Article Reference
2
+
3
+ All 64 articles of Regulation (EU) 2022/2554 (Digital Operational Resilience Act).
4
+ Published: OJ L 333, 27 December 2022. Application date: 17 January 2025.
5
+
6
+ ---
7
+
8
+ ## Chapter I — General Provisions (Art. 1–4)
9
+
10
+ ### Art. 1 — Subject Matter
11
+ Establishes uniform requirements for the security of network and information systems
12
+ supporting business processes of financial entities, in particular:
13
+ - ICT risk management (Chapter II)
14
+ - ICT-related incident management, classification, and reporting (Chapter III)
15
+ - Digital operational resilience testing (Chapter IV)
16
+ - ICT third-party risk management (Chapter V)
17
+ - Information-sharing arrangements (Chapter VI)
18
+
19
+ **Key point:** DORA is a maximum harmonisation regulation — Member States cannot
20
+ impose stricter sector-specific ICT security requirements on in-scope entities.
21
+
22
+ ### Art. 2 — Scope
23
+ **Applies to:**
24
+ Credit institutions; payment institutions; account information service providers;
25
+ e-money institutions; investment firms; crypto-asset service providers (MiCA);
26
+ central securities depositories; central counterparties; trading venues; trade
27
+ repositories; managers of alternative investment funds; management companies;
28
+ data reporting service providers; insurance and reinsurance undertakings;
29
+ insurance intermediaries; institutions for occupational retirement provision;
30
+ credit rating agencies; administrators of critical benchmarks; crowdfunding service
31
+ providers; securitisation repositories.
32
+
33
+ **Excludes (Art. 2(3)–(4)):**
34
+ Certain small and medium-sized entities (with caveats); Postal Savings Banks;
35
+ credit unions; some small mutual institutions.
36
+
37
+ ### Art. 3 — Definitions
38
+ Key defined terms:
39
+ - **ICT risk** (Art. 3(2)): Any reasonably identifiable circumstance in relation to the
40
+ use of NIS that, if materialised, may compromise the security of NIS, tools, or
41
+ processes, or of the conduct of operations and processes, or of the provision of services
42
+ - **ICT-related incident** (Art. 3(8)): An unplanned event, or a series thereof, that has
43
+ an adverse and significant impact on the security of NIS
44
+ - **Major ICT-related incident** (Art. 3(10)): An ICT-related incident that has a high
45
+ adverse impact on in-scope entities
46
+ - **Cyber threat** (Art. 3(12)): A potential circumstance, event or action that could
47
+ damage, disrupt or adversely impact NIS, dependent users, or related services
48
+ - **Critical or important function** (Art. 3(22)): A function the disruption of which would
49
+ materially impair the financial performance, soundness, or continuity of service
50
+ - **ICT third-party service provider** (Art. 3(19)): An undertaking providing digital and
51
+ data services to financial entities
52
+ - **Critical ICT third-party service provider** (Art. 3(23)): An ICT TPSP designated
53
+ under Art. 31
54
+
55
+ ### Art. 4 — Proportionality
56
+ Financial entities apply the rules in a manner proportionate to their:
57
+ - Size and overall risk profile
58
+ - Nature, scale and complexity of their services, activities and operations
59
+
60
+ Micro-enterprises and certain entities may apply the simplified ICT risk management
61
+ framework under Art. 16.
62
+
63
+ ---
64
+
65
+ ## Chapter II — ICT Risk Management (Art. 5–16)
66
+
67
+ ### Art. 5 — Governance and Organisation
68
+ **(1)** Management body bears ultimate responsibility for managing ICT risk.
69
+ **(2)** Management body must:
70
+ - (a) Define ICT risk appetite
71
+ - (b) Approve and oversee ICT security policies
72
+ - (c) Approve the ICT risk management framework
73
+ - (d) Approve an adequate ICT budget
74
+ - (e) Ensure adequate ICT staffing and training
75
+ - (f) Approve and oversee major ICT projects
76
+ - (g) Ensure a crisis communication plan
77
+ - (h) Ensure adequate internal audit of ICT risk
78
+ **(4)** Senior management must implement the management body's decisions.
79
+ **(5)** At least one board member must report to the management body on ICT risk.
80
+
81
+ ### Art. 6 — ICT Risk Management Framework
82
+ **(1)** Financial entities must maintain a robust and well-documented ICT RMF.
83
+ **(2)** The framework must include strategies, policies, procedures, IT protocols and tools.
84
+ **(3)** Must minimize impact of ICT risk by deploying appropriate mechanisms.
85
+ **(4)** Must document and periodically review the ICT risk management function.
86
+ **(5)** Must review the ICT RMF after major incidents and at least annually.
87
+
88
+ ### Art. 7 — ICT Systems, Protocols and Tools
89
+ Financial entities must use ICT systems, protocols, and tools that are:
90
+ - **(a)** Appropriate to the magnitude of operations supporting critical functions
91
+ - **(b)** Reliable and capable of handling stress and peak loads
92
+ - **(c)** Technologically resilient (handle additional information processing needs)
93
+ - **(d)** Up to date with respect to security standards (patched, maintained)
94
+
95
+ ### Art. 8 — Identification
96
+ **(1)** Identify and classify ICT supported functions, their ICT assets, and information assets.
97
+ **(2)** Identify all sources of ICT risk.
98
+ **(4)** Maintain an updated ICT asset inventory; map interdependencies; identify
99
+ single points of failure.
100
+
101
+ ### Art. 9 — Protection and Prevention
102
+ **(2)** Implement appropriate controls:
103
+ - (a) Information security policies, procedures, and access controls
104
+ - (b) Network segmentation, as appropriate
105
+ - (c) Encryption and cryptography policies
106
+ - (d) ICT policies addressing third-party access
107
+ - (e) Change management procedures
108
+ **(4)** Implement:
109
+ - (a) Document management policies
110
+ - (b) ICT change management policies
111
+ - (c) Patch and software update policies
112
+ - (d) ICT project management policies
113
+
114
+ ### Art. 10 — Detection
115
+ **(1)** Financial entities must have appropriate mechanisms to detect anomalous activities
116
+ including ICT network problems and ICT-related incidents.
117
+ **(2)** Multiple layers of control; thresholds and criteria for generating alerts.
118
+
119
+ ### Art. 11 — Response and Recovery
120
+ **(1)** Implement an ICT business continuity policy addressing:
121
+ - (a) Activation and coordination triggers
122
+ - (b) Recovery priorities
123
+ - (c) Interim operating procedures
124
+ - (d) Assessment and decision procedures
125
+ **(2)** Conduct a business impact analysis (BIA) for critical functions; set RTO and RPO.
126
+ **(4)** As part of ICT business continuity policy: implement response and recovery plans.
127
+ **(6)** Test business continuity plans at least annually (including scenarios relevant
128
+ to the entity's risk profile).
129
+
130
+ ### Art. 12 — Backup Policies and Procedures
131
+ **(1)** Maintain backup policies specifying:
132
+ - Frequency of backups
133
+ - Type and location of backups
134
+ - Scope (which systems and data are covered)
135
+ **(2)** Restoration systems, maintained separately from the primary system, can be
136
+ activated without undue delay and interference.
137
+ **(3)** Test restorability of backup systems; restore time must align with RTO.
138
+ **(4)** ICT backup systems may be located in third-party cloud infrastructure.
139
+
140
+ ### Art. 13 — Learning and Evolving
141
+ **(1)** Gather, analyse, and document findings from major ICT incidents and post-incident reviews.
142
+ **(2)** Monitor cyber threat intelligence from relevant sources.
143
+ **(3)** Integrate threat intelligence findings into risk assessment.
144
+ **(6)** Provide all staff with ICT security awareness training; specialist ICT
145
+ resilience training for relevant roles; training for board members on ICT risk.
146
+
147
+ ### Art. 14 — Communication
148
+ **(1)** Implement crisis communication plans for major ICT incidents or cyber threats.
149
+ **(2)** Define internal escalation procedures; external communication to clients,
150
+ financial sector counterparts, and public authorities.
151
+
152
+ ### Art. 15 — Further Harmonisation of ICT Risk Management Tools, Methods and Processes
153
+ ESAs to develop RTS on detailed elements of ICT RMF (→ CDR (EU) 2024/1774).
154
+
155
+ ### Art. 16 — Simplified ICT Risk Management Framework
156
+ Small and less complex entities may apply simplified framework per CDR (EU) 2024/1774,
157
+ Chapter II. Simplified framework covers:
158
+ - **(a)** Key elements of ICT risk management
159
+ - **(b)** Simplified test requirements
160
+ - **(c)** Simplified reporting
161
+
162
+ ---
163
+
164
+ ## Chapter III — ICT-Related Incident Management, Classification, and Reporting (Art. 17–23)
165
+
166
+ ### Art. 17 — ICT-Related Incident Management Process
167
+ **(1)** Establish documented incident management process with roles, criteria,
168
+ escalation paths.
169
+ **(3)** Report major incidents to senior management; board must be informed.
170
+ **(4)** Communicate with clients affected by major incidents without undue delay.
171
+
172
+ ### Art. 18 — Classification of ICT-Related Incidents and Cyber Threats
173
+ **(1)** Classify incidents based on: clients affected; reputational impact; duration
174
+ and geographic spread; data losses; service criticality; economic impact.
175
+ **(3)** ESAs to develop RTS on classification → CDR (EU) 2024/1772.
176
+
177
+ ### Art. 19 — Reporting of Major ICT-Related Incidents and Voluntary Notification
178
+ **(1)** Report major incidents to competent authority in three stages:
179
+ - Initial: within 4 hours of classification as major
180
+ - Intermediate: within 72 hours
181
+ - Final: within 1 month of initial notification
182
+ **(2)** Entities may voluntarily notify significant cyber threats.
183
+ **(5)** Home state authority coordinates with host state authorities.
184
+
185
+ ### Art. 20 — Harmonisation of Reporting Content, Timelines and Templates
186
+ ESAs to develop RTS on content/timelines (→ CDR (EU) 2025/301) and ITS on templates
187
+ (→ CIR (EU) 2025/302).
188
+
189
+ ### Art. 21 — Centralisation of Reporting
190
+ ESAs to assess feasibility of single EU reporting hub. Authorities share incident
191
+ information with relevant bodies.
192
+
193
+ ### Art. 22 — Supervisory Feedback
194
+ Competent authorities may provide feedback after incident reports: indicative
195
+ impact assessment, relevant threat intelligence, preventive measures.
196
+
197
+ ### Art. 23 — Specific Rules on Reporting of Payment-Related Major Incidents
198
+ Applies to credit institutions, payment institutions, and e-money institutions.
199
+ Payment-specific reporting integrated with DORA templates. Supersedes pre-DORA
200
+ PSD2 Art. 96 reporting for incidents meeting DORA major thresholds.
201
+
202
+ ---
203
+
204
+ ## Chapter IV — Digital Operational Resilience Testing (Art. 24–27)
205
+
206
+ ### Art. 24 — General Requirements for Digital Operational Resilience Testing
207
+ **(1)** All financial entities must conduct a testing programme for critical ICT
208
+ systems at least annually.
209
+ **(4)** Tests conducted by independent internal or external parties.
210
+
211
+ ### Art. 25 — Testing of ICT Tools and Systems
212
+ Basic testing types: vulnerability assessments and scans; network security
213
+ assessments; source code reviews; performance tests; end-to-end tests;
214
+ scenario-based compatibility tests.
215
+
216
+ ### Art. 26 — Advanced Testing of ICT Tools, Systems and Processes Based on TLPT
217
+ **(1)** TLPT at least once every 3 years.
218
+ **(2)** Live production systems in scope.
219
+ **(3)** Scope covers critical or important functions.
220
+ **(4)** Threat intelligence required to develop scenarios.
221
+ **(5)** Mutual recognition of TLPT results across EU jurisdictions.
222
+ **(6)** External testers; no conflict of interest.
223
+ **(7)** Competent authority may mandate TLPT on specific systems.
224
+ **(8)** Applicability criteria (size, risk, systemic importance) — set in CDR
225
+ (EU) 2025/1190.
226
+ **(11)** ESAs to develop RTS → CDR (EU) 2025/1190.
227
+
228
+ ### Art. 27 — Requirements for Testers Carrying Out TLPT
229
+ **(1)** Testers must demonstrate methodology capability and technical expertise.
230
+ **(2)** Must hold relevant professional certifications.
231
+ **(3)** No conflicts of interest with the tested entity.
232
+ **(4)** Competent authority maintains list of qualified testers.
233
+ **(9)** ESAs to develop RTS → CDR (EU) 2025/1190.
234
+
235
+ ---
236
+
237
+ ## Chapter V — ICT Third-Party Risk Management (Art. 28–44)
238
+
239
+ ### Section I — Key Principles (Art. 28–30)
240
+
241
+ ### Art. 28 — General Principles for Managing ICT Third-Party Risk
242
+ **(1)** Adopt, review, and update an ICT third-party risk policy.
243
+ **(2)** All ICT service arrangements recorded in the Register of Information.
244
+ **(3)** Submit RoI at least annually to competent authority.
245
+ **(4)** Pre-contractual due diligence for critical/important function arrangements.
246
+ **(5)** Ongoing monitoring of TPSP performance and risk.
247
+ **(6)** Assess ICT concentration risk — single TPSP for multiple critical functions.
248
+ **(7)** Exit strategy for each critical arrangement.
249
+ **(9)** ITS on RoI templates → CIR (EU) 2024/2956.
250
+ **(10)** RTS on third-party risk policy → CDR (EU) 2024/1773.
251
+
252
+ ### Art. 29 — Preliminary Assessment of ICT Concentration Risk at Entity Level
253
+ **(1)** Assess entity-level concentration when entering new arrangements.
254
+ **(2)** Assess risk that entire ICT services become unavailable.
255
+ **(3)** Assess prior to entering arrangements for critical functions.
256
+
257
+ ### Art. 30 — Key Contractual Provisions
258
+ **(2)** Mandatory provisions for critical/important function contracts:
259
+ (a) service description; (b) data locations; (c) data protection; (d) availability/
260
+ security; (e) audit and access rights; (f) termination rights; (g) reporting;
261
+ (h) data portability; (i) sub-contracting.
262
+ **(3)** Lighter provisions for non-critical arrangements.
263
+ **(5)** RTS on detailed provisions → CDR (EU) 2024/1773, CDR (EU) 2025/532.
264
+
265
+ ### Section II — Oversight Framework for Critical ICT TPSPs (Art. 31–44)
266
+
267
+ ### Art. 31 — Designation of Critical ICT Third-Party Service Providers
268
+ ESAs designate critical ICT TPSPs based on CDR (EU) 2024/1502 criteria.
269
+ Non-EU CTPPs must designate EU legal representative (Art. 31(11)).
270
+
271
+ ### Art. 32 — Structure of the Oversight Framework
272
+ Lead Overseer (EBA/ESMA/EIOPA) per CTPSP. Joint Oversight Network (JON).
273
+ JETs per CDR (EU) 2025/420.
274
+
275
+ ### Art. 33 — Information Requests
276
+ Lead Overseer may require CTPPs to provide all relevant information and documentation.
277
+
278
+ ### Art. 34 — General Investigations
279
+ Lead Overseer may conduct general investigations including interviews and document reviews.
280
+
281
+ ### Art. 35 — Inspections
282
+ Lead Overseer may conduct on-site inspections; CTPPs must cooperate.
283
+
284
+ ### Art. 36 — Oversight Recommendations
285
+ Lead Overseer issues recommendations on significant findings; CTPSP has 6 weeks to respond.
286
+
287
+ ### Art. 37 — Follow-Up of Oversight Recommendations
288
+ If CTPSP fails to implement recommendations: escalated follow-up; public disclosure
289
+ of non-compliance possible.
290
+
291
+ ### Art. 38 — Oversight Fees
292
+ Annual oversight fees for CTPPs per CDR (EU) 2024/1505.
293
+
294
+ ### Art. 39 — Rights of Defence
295
+ CTPPs have right to be heard before formal findings are issued; access to documents.
296
+
297
+ ### Art. 40 — Cooperation Between Competent Authorities
298
+ Competent authorities of financial entities that use a CTPSP exchange relevant
299
+ information with the Lead Overseer — including supervisory findings, complaints,
300
+ and material changes reported by the financial entity concerning the CTPSP.
301
+ Financial entities must cooperate with their own competent authority in providing
302
+ information about their CTPSP arrangements; the authority in turn shares that
303
+ information with the Lead Overseer.
304
+
305
+ > **Note on entity obligations:** Art. 40 primarily governs inter-authority
306
+ > information flows. Financial entities' direct cooperation obligation with the
307
+ > Lead Overseer arises from Art. 28(3) (RoI submission) and the Lead Overseer's
308
+ > powers under Art. 33–35, not Art. 40 itself.
309
+
310
+ ### Art. 41 — Cooperation Between Competent Authorities and Lead Overseers
311
+ Exchange of information; coordination mechanisms; JON information sharing.
312
+ RTS on harmonisation → CDR (EU) 2025/295.
313
+
314
+ ### Art. 42 — Liability of Financial Entities
315
+ Designation of a CTPSP does not affect the financial entity's own responsibility
316
+ for DORA compliance. Entities cannot outsource their regulatory obligations to
317
+ a CTPSP.
318
+
319
+ ### Art. 43 — Oversight Fees
320
+ Lead Overseer collects fees; methodology per CDR (EU) 2024/1505.
321
+
322
+ ### Art. 44 — International Cooperation
323
+ ESAs may conclude administrative arrangements with third-country regulatory
324
+ authorities on information exchange for oversight of CTPPs with a global footprint.
325
+
326
+ ---
327
+
328
+ ## Chapter VI — Information-Sharing Arrangements (Art. 45)
329
+
330
+ ### Art. 45 — Information-Sharing Arrangements on Cyber Threat Information and Intelligence
331
+ **(1)** Financial entities may voluntarily participate in cyber threat intelligence
332
+ sharing arrangements with other financial entities.
333
+ **(1)** Must protect confidential information; must comply with competition rules.
334
+ **(3)** ESAs may develop guidelines on information sharing.
335
+
336
+ Participation in information sharing arrangements does not reduce DORA obligations
337
+ but may assist in threat intelligence requirements under Art. 13(2)–(3).
338
+
339
+ ---
340
+
341
+ ## Chapter VII — Competent Authorities (Art. 46–56)
342
+
343
+ ### Art. 46 — Competent Authorities
344
+ Each Member State designates competent authorities for each financial entity type.
345
+ Multiple authorities may be designated (e.g., ECB for SSM banks + national NCA).
346
+
347
+ ### Art. 47 — Cooperation with Structures Established by NIS 2 Directive
348
+ Competent authorities under DORA cooperate with bodies established under NIS2.
349
+ This includes information sharing with national CSIRTs and ENISA.
350
+
351
+ ### Art. 48 — Cooperation Between Competent Authorities
352
+ Mutual assistance; supervisory convergence across Member States.
353
+
354
+ ### Art. 49 — Cross-Sectoral Exercises
355
+ Competent authorities may participate in cross-sectoral crisis simulations with
356
+ other regulatory bodies and public authorities.
357
+
358
+ ### Art. 50 — Administrative Penalties and Remedial Measures
359
+ Competent authorities must have supervisory powers including:
360
+ - Issuance of orders to cease non-compliant conduct
361
+ - Imposition of administrative penalties
362
+ - Suspension of ICT service arrangements that pose systemic risk
363
+
364
+ ### Art. 51 — Exercise of the Power to Impose Administrative Penalties
365
+ Member States must determine effective, proportionate, and dissuasive penalties.
366
+ Penalties can apply to both the legal entity and natural persons in management.
367
+
368
+ ### Art. 52 — Criminal Penalties
369
+ Member States may provide for criminal penalties for DORA violations.
370
+
371
+ ### Art. 53 — Notification and Publication
372
+ Competent authorities publish information on penalties and measures imposed
373
+ (naming and shaming regime).
374
+
375
+ ### Art. 54 — EBA Lead for Banking
376
+ EBA acts as lead for banking-sector CTPPs; coordinates with ESMA and EIOPA.
377
+
378
+ ### Art. 55 — ESMA Lead for Capital Markets
379
+ ESMA acts as lead for capital markets CTPPs.
380
+
381
+ ### Art. 56 — EIOPA Lead for Insurance and Pensions
382
+ EIOPA acts as lead for insurance, reinsurance, and pension fund CTPPs.
383
+
384
+ ---
385
+
386
+ ## Chapter VIII — Delegated Acts (Art. 57)
387
+
388
+ ### Art. 57 — Exercise of the Delegation
389
+ Empowers the Commission to adopt delegated regulations (the RTS/ITS listed in
390
+ the rts-its-guide.md reference file). Delegation runs for 5 years from
391
+ 17 January 2025, renewable.
392
+
393
+ ---
394
+
395
+ ## Chapter IX — Transitional and Final Provisions (Art. 58–64)
396
+
397
+ ### Art. 58 — Transitional Provisions for Competent Authorities
398
+ Procedures for handling pending supervisory cases at the time of DORA application.
399
+
400
+ ### Art. 59 — Amendments to MiCA (Regulation (EU) 2023/1114)
401
+ DORA imposes ICT risk obligations on CASPs as defined in MiCA; Art. 59 makes
402
+ consequential amendments to align MiCA with DORA.
403
+
404
+ ### Art. 60 — Amendments to EMIR (Regulation (EU) 648/2012)
405
+ Consequential amendments for CCPs and trade repositories.
406
+
407
+ ### Art. 61 — Amendments to MiFIR (Regulation (EU) 600/2014)
408
+ Consequential amendments for trading venues and data reporting service providers.
409
+
410
+ ### Art. 62 — Amendments to AIFMD (Directive 2011/61/EU)
411
+ Consequential amendments for AIFMs.
412
+
413
+ ### Art. 63 — Entry into Force
414
+ DORA entered into force on 16 January 2023 (20 days after OJ publication on
415
+ 27 December 2022).
416
+
417
+ ### Art. 64 — Application
418
+ DORA **applies from 17 January 2025** — 24 months after entry into force.
419
+
420
+ ---
421
+
422
+ ## Key DORA Cross-References
423
+
424
+ | Topic | Primary Article | Key RTS/ITS |
425
+ |-------|---------------|-------------|
426
+ | Board responsibility for ICT risk | Art. 5 | CDR 2024/1774 |
427
+ | ICT risk management framework | Art. 6 | CDR 2024/1774 |
428
+ | ICT asset register | Art. 8(4) | CDR 2024/1774 |
429
+ | Incident classification | Art. 18 | CDR 2024/1772 |
430
+ | Major incident reporting timelines | Art. 19 | CDR 2025/301 |
431
+ | Incident reporting templates | Art. 20 | CIR 2025/302 |
432
+ | TLPT requirements | Art. 26 | CDR 2025/1190 |
433
+ | TLPT tester qualifications | Art. 27 | CDR 2025/1190 |
434
+ | ICT third-party risk policy | Art. 28(1) | CDR 2024/1773 |
435
+ | Register of Information | Art. 28(3)+(9) | CIR 2024/2956 |
436
+ | Concentration risk | Art. 28(6)+29 | CDR 2024/1773 |
437
+ | Contractual provisions | Art. 30(2) | CDR 2024/1773, CDR 2025/532 |
438
+ | Critical TPSP designation | Art. 31 | CDR 2024/1502 |
439
+ | CTPSP oversight fees | Art. 43 | CDR 2024/1505 |
440
+ | Oversight harmonisation | Art. 41 | CDR 2025/295 |
441
+ | Joint Examination Teams | Art. 32 | CDR 2025/420 |