bmad-plus 0.4.4 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +31 -0
- package/README.md +3 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +21 -8
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,441 @@
|
|
|
1
|
+
# DORA — Article-by-Article Reference
|
|
2
|
+
|
|
3
|
+
All 64 articles of Regulation (EU) 2022/2554 (Digital Operational Resilience Act).
|
|
4
|
+
Published: OJ L 333, 27 December 2022. Application date: 17 January 2025.
|
|
5
|
+
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
## Chapter I — General Provisions (Art. 1–4)
|
|
9
|
+
|
|
10
|
+
### Art. 1 — Subject Matter
|
|
11
|
+
Establishes uniform requirements for the security of network and information systems
|
|
12
|
+
supporting business processes of financial entities, in particular:
|
|
13
|
+
- ICT risk management (Chapter II)
|
|
14
|
+
- ICT-related incident management, classification, and reporting (Chapter III)
|
|
15
|
+
- Digital operational resilience testing (Chapter IV)
|
|
16
|
+
- ICT third-party risk management (Chapter V)
|
|
17
|
+
- Information-sharing arrangements (Chapter VI)
|
|
18
|
+
|
|
19
|
+
**Key point:** DORA is a maximum harmonisation regulation — Member States cannot
|
|
20
|
+
impose stricter sector-specific ICT security requirements on in-scope entities.
|
|
21
|
+
|
|
22
|
+
### Art. 2 — Scope
|
|
23
|
+
**Applies to:**
|
|
24
|
+
Credit institutions; payment institutions; account information service providers;
|
|
25
|
+
e-money institutions; investment firms; crypto-asset service providers (MiCA);
|
|
26
|
+
central securities depositories; central counterparties; trading venues; trade
|
|
27
|
+
repositories; managers of alternative investment funds; management companies;
|
|
28
|
+
data reporting service providers; insurance and reinsurance undertakings;
|
|
29
|
+
insurance intermediaries; institutions for occupational retirement provision;
|
|
30
|
+
credit rating agencies; administrators of critical benchmarks; crowdfunding service
|
|
31
|
+
providers; securitisation repositories.
|
|
32
|
+
|
|
33
|
+
**Excludes (Art. 2(3)–(4)):**
|
|
34
|
+
Certain small and medium-sized entities (with caveats); Postal Savings Banks;
|
|
35
|
+
credit unions; some small mutual institutions.
|
|
36
|
+
|
|
37
|
+
### Art. 3 — Definitions
|
|
38
|
+
Key defined terms:
|
|
39
|
+
- **ICT risk** (Art. 3(2)): Any reasonably identifiable circumstance in relation to the
|
|
40
|
+
use of NIS that, if materialised, may compromise the security of NIS, tools, or
|
|
41
|
+
processes, or of the conduct of operations and processes, or of the provision of services
|
|
42
|
+
- **ICT-related incident** (Art. 3(8)): An unplanned event, or a series thereof, that has
|
|
43
|
+
an adverse and significant impact on the security of NIS
|
|
44
|
+
- **Major ICT-related incident** (Art. 3(10)): An ICT-related incident that has a high
|
|
45
|
+
adverse impact on in-scope entities
|
|
46
|
+
- **Cyber threat** (Art. 3(12)): A potential circumstance, event or action that could
|
|
47
|
+
damage, disrupt or adversely impact NIS, dependent users, or related services
|
|
48
|
+
- **Critical or important function** (Art. 3(22)): A function the disruption of which would
|
|
49
|
+
materially impair the financial performance, soundness, or continuity of service
|
|
50
|
+
- **ICT third-party service provider** (Art. 3(19)): An undertaking providing digital and
|
|
51
|
+
data services to financial entities
|
|
52
|
+
- **Critical ICT third-party service provider** (Art. 3(23)): An ICT TPSP designated
|
|
53
|
+
under Art. 31
|
|
54
|
+
|
|
55
|
+
### Art. 4 — Proportionality
|
|
56
|
+
Financial entities apply the rules in a manner proportionate to their:
|
|
57
|
+
- Size and overall risk profile
|
|
58
|
+
- Nature, scale and complexity of their services, activities and operations
|
|
59
|
+
|
|
60
|
+
Micro-enterprises and certain entities may apply the simplified ICT risk management
|
|
61
|
+
framework under Art. 16.
|
|
62
|
+
|
|
63
|
+
---
|
|
64
|
+
|
|
65
|
+
## Chapter II — ICT Risk Management (Art. 5–16)
|
|
66
|
+
|
|
67
|
+
### Art. 5 — Governance and Organisation
|
|
68
|
+
**(1)** Management body bears ultimate responsibility for managing ICT risk.
|
|
69
|
+
**(2)** Management body must:
|
|
70
|
+
- (a) Define ICT risk appetite
|
|
71
|
+
- (b) Approve and oversee ICT security policies
|
|
72
|
+
- (c) Approve the ICT risk management framework
|
|
73
|
+
- (d) Approve an adequate ICT budget
|
|
74
|
+
- (e) Ensure adequate ICT staffing and training
|
|
75
|
+
- (f) Approve and oversee major ICT projects
|
|
76
|
+
- (g) Ensure a crisis communication plan
|
|
77
|
+
- (h) Ensure adequate internal audit of ICT risk
|
|
78
|
+
**(4)** Senior management must implement the management body's decisions.
|
|
79
|
+
**(5)** At least one board member must report to the management body on ICT risk.
|
|
80
|
+
|
|
81
|
+
### Art. 6 — ICT Risk Management Framework
|
|
82
|
+
**(1)** Financial entities must maintain a robust and well-documented ICT RMF.
|
|
83
|
+
**(2)** The framework must include strategies, policies, procedures, IT protocols and tools.
|
|
84
|
+
**(3)** Must minimize impact of ICT risk by deploying appropriate mechanisms.
|
|
85
|
+
**(4)** Must document and periodically review the ICT risk management function.
|
|
86
|
+
**(5)** Must review the ICT RMF after major incidents and at least annually.
|
|
87
|
+
|
|
88
|
+
### Art. 7 — ICT Systems, Protocols and Tools
|
|
89
|
+
Financial entities must use ICT systems, protocols, and tools that are:
|
|
90
|
+
- **(a)** Appropriate to the magnitude of operations supporting critical functions
|
|
91
|
+
- **(b)** Reliable and capable of handling stress and peak loads
|
|
92
|
+
- **(c)** Technologically resilient (handle additional information processing needs)
|
|
93
|
+
- **(d)** Up to date with respect to security standards (patched, maintained)
|
|
94
|
+
|
|
95
|
+
### Art. 8 — Identification
|
|
96
|
+
**(1)** Identify and classify ICT supported functions, their ICT assets, and information assets.
|
|
97
|
+
**(2)** Identify all sources of ICT risk.
|
|
98
|
+
**(4)** Maintain an updated ICT asset inventory; map interdependencies; identify
|
|
99
|
+
single points of failure.
|
|
100
|
+
|
|
101
|
+
### Art. 9 — Protection and Prevention
|
|
102
|
+
**(2)** Implement appropriate controls:
|
|
103
|
+
- (a) Information security policies, procedures, and access controls
|
|
104
|
+
- (b) Network segmentation, as appropriate
|
|
105
|
+
- (c) Encryption and cryptography policies
|
|
106
|
+
- (d) ICT policies addressing third-party access
|
|
107
|
+
- (e) Change management procedures
|
|
108
|
+
**(4)** Implement:
|
|
109
|
+
- (a) Document management policies
|
|
110
|
+
- (b) ICT change management policies
|
|
111
|
+
- (c) Patch and software update policies
|
|
112
|
+
- (d) ICT project management policies
|
|
113
|
+
|
|
114
|
+
### Art. 10 — Detection
|
|
115
|
+
**(1)** Financial entities must have appropriate mechanisms to detect anomalous activities
|
|
116
|
+
including ICT network problems and ICT-related incidents.
|
|
117
|
+
**(2)** Multiple layers of control; thresholds and criteria for generating alerts.
|
|
118
|
+
|
|
119
|
+
### Art. 11 — Response and Recovery
|
|
120
|
+
**(1)** Implement an ICT business continuity policy addressing:
|
|
121
|
+
- (a) Activation and coordination triggers
|
|
122
|
+
- (b) Recovery priorities
|
|
123
|
+
- (c) Interim operating procedures
|
|
124
|
+
- (d) Assessment and decision procedures
|
|
125
|
+
**(2)** Conduct a business impact analysis (BIA) for critical functions; set RTO and RPO.
|
|
126
|
+
**(4)** As part of ICT business continuity policy: implement response and recovery plans.
|
|
127
|
+
**(6)** Test business continuity plans at least annually (including scenarios relevant
|
|
128
|
+
to the entity's risk profile).
|
|
129
|
+
|
|
130
|
+
### Art. 12 — Backup Policies and Procedures
|
|
131
|
+
**(1)** Maintain backup policies specifying:
|
|
132
|
+
- Frequency of backups
|
|
133
|
+
- Type and location of backups
|
|
134
|
+
- Scope (which systems and data are covered)
|
|
135
|
+
**(2)** Restoration systems, maintained separately from the primary system, can be
|
|
136
|
+
activated without undue delay and interference.
|
|
137
|
+
**(3)** Test restorability of backup systems; restore time must align with RTO.
|
|
138
|
+
**(4)** ICT backup systems may be located in third-party cloud infrastructure.
|
|
139
|
+
|
|
140
|
+
### Art. 13 — Learning and Evolving
|
|
141
|
+
**(1)** Gather, analyse, and document findings from major ICT incidents and post-incident reviews.
|
|
142
|
+
**(2)** Monitor cyber threat intelligence from relevant sources.
|
|
143
|
+
**(3)** Integrate threat intelligence findings into risk assessment.
|
|
144
|
+
**(6)** Provide all staff with ICT security awareness training; specialist ICT
|
|
145
|
+
resilience training for relevant roles; training for board members on ICT risk.
|
|
146
|
+
|
|
147
|
+
### Art. 14 — Communication
|
|
148
|
+
**(1)** Implement crisis communication plans for major ICT incidents or cyber threats.
|
|
149
|
+
**(2)** Define internal escalation procedures; external communication to clients,
|
|
150
|
+
financial sector counterparts, and public authorities.
|
|
151
|
+
|
|
152
|
+
### Art. 15 — Further Harmonisation of ICT Risk Management Tools, Methods and Processes
|
|
153
|
+
ESAs to develop RTS on detailed elements of ICT RMF (→ CDR (EU) 2024/1774).
|
|
154
|
+
|
|
155
|
+
### Art. 16 — Simplified ICT Risk Management Framework
|
|
156
|
+
Small and less complex entities may apply simplified framework per CDR (EU) 2024/1774,
|
|
157
|
+
Chapter II. Simplified framework covers:
|
|
158
|
+
- **(a)** Key elements of ICT risk management
|
|
159
|
+
- **(b)** Simplified test requirements
|
|
160
|
+
- **(c)** Simplified reporting
|
|
161
|
+
|
|
162
|
+
---
|
|
163
|
+
|
|
164
|
+
## Chapter III — ICT-Related Incident Management, Classification, and Reporting (Art. 17–23)
|
|
165
|
+
|
|
166
|
+
### Art. 17 — ICT-Related Incident Management Process
|
|
167
|
+
**(1)** Establish documented incident management process with roles, criteria,
|
|
168
|
+
escalation paths.
|
|
169
|
+
**(3)** Report major incidents to senior management; board must be informed.
|
|
170
|
+
**(4)** Communicate with clients affected by major incidents without undue delay.
|
|
171
|
+
|
|
172
|
+
### Art. 18 — Classification of ICT-Related Incidents and Cyber Threats
|
|
173
|
+
**(1)** Classify incidents based on: clients affected; reputational impact; duration
|
|
174
|
+
and geographic spread; data losses; service criticality; economic impact.
|
|
175
|
+
**(3)** ESAs to develop RTS on classification → CDR (EU) 2024/1772.
|
|
176
|
+
|
|
177
|
+
### Art. 19 — Reporting of Major ICT-Related Incidents and Voluntary Notification
|
|
178
|
+
**(1)** Report major incidents to competent authority in three stages:
|
|
179
|
+
- Initial: within 4 hours of classification as major
|
|
180
|
+
- Intermediate: within 72 hours
|
|
181
|
+
- Final: within 1 month of initial notification
|
|
182
|
+
**(2)** Entities may voluntarily notify significant cyber threats.
|
|
183
|
+
**(5)** Home state authority coordinates with host state authorities.
|
|
184
|
+
|
|
185
|
+
### Art. 20 — Harmonisation of Reporting Content, Timelines and Templates
|
|
186
|
+
ESAs to develop RTS on content/timelines (→ CDR (EU) 2025/301) and ITS on templates
|
|
187
|
+
(→ CIR (EU) 2025/302).
|
|
188
|
+
|
|
189
|
+
### Art. 21 — Centralisation of Reporting
|
|
190
|
+
ESAs to assess feasibility of single EU reporting hub. Authorities share incident
|
|
191
|
+
information with relevant bodies.
|
|
192
|
+
|
|
193
|
+
### Art. 22 — Supervisory Feedback
|
|
194
|
+
Competent authorities may provide feedback after incident reports: indicative
|
|
195
|
+
impact assessment, relevant threat intelligence, preventive measures.
|
|
196
|
+
|
|
197
|
+
### Art. 23 — Specific Rules on Reporting of Payment-Related Major Incidents
|
|
198
|
+
Applies to credit institutions, payment institutions, and e-money institutions.
|
|
199
|
+
Payment-specific reporting integrated with DORA templates. Supersedes pre-DORA
|
|
200
|
+
PSD2 Art. 96 reporting for incidents meeting DORA major thresholds.
|
|
201
|
+
|
|
202
|
+
---
|
|
203
|
+
|
|
204
|
+
## Chapter IV — Digital Operational Resilience Testing (Art. 24–27)
|
|
205
|
+
|
|
206
|
+
### Art. 24 — General Requirements for Digital Operational Resilience Testing
|
|
207
|
+
**(1)** All financial entities must conduct a testing programme for critical ICT
|
|
208
|
+
systems at least annually.
|
|
209
|
+
**(4)** Tests conducted by independent internal or external parties.
|
|
210
|
+
|
|
211
|
+
### Art. 25 — Testing of ICT Tools and Systems
|
|
212
|
+
Basic testing types: vulnerability assessments and scans; network security
|
|
213
|
+
assessments; source code reviews; performance tests; end-to-end tests;
|
|
214
|
+
scenario-based compatibility tests.
|
|
215
|
+
|
|
216
|
+
### Art. 26 — Advanced Testing of ICT Tools, Systems and Processes Based on TLPT
|
|
217
|
+
**(1)** TLPT at least once every 3 years.
|
|
218
|
+
**(2)** Live production systems in scope.
|
|
219
|
+
**(3)** Scope covers critical or important functions.
|
|
220
|
+
**(4)** Threat intelligence required to develop scenarios.
|
|
221
|
+
**(5)** Mutual recognition of TLPT results across EU jurisdictions.
|
|
222
|
+
**(6)** External testers; no conflict of interest.
|
|
223
|
+
**(7)** Competent authority may mandate TLPT on specific systems.
|
|
224
|
+
**(8)** Applicability criteria (size, risk, systemic importance) — set in CDR
|
|
225
|
+
(EU) 2025/1190.
|
|
226
|
+
**(11)** ESAs to develop RTS → CDR (EU) 2025/1190.
|
|
227
|
+
|
|
228
|
+
### Art. 27 — Requirements for Testers Carrying Out TLPT
|
|
229
|
+
**(1)** Testers must demonstrate methodology capability and technical expertise.
|
|
230
|
+
**(2)** Must hold relevant professional certifications.
|
|
231
|
+
**(3)** No conflicts of interest with the tested entity.
|
|
232
|
+
**(4)** Competent authority maintains list of qualified testers.
|
|
233
|
+
**(9)** ESAs to develop RTS → CDR (EU) 2025/1190.
|
|
234
|
+
|
|
235
|
+
---
|
|
236
|
+
|
|
237
|
+
## Chapter V — ICT Third-Party Risk Management (Art. 28–44)
|
|
238
|
+
|
|
239
|
+
### Section I — Key Principles (Art. 28–30)
|
|
240
|
+
|
|
241
|
+
### Art. 28 — General Principles for Managing ICT Third-Party Risk
|
|
242
|
+
**(1)** Adopt, review, and update an ICT third-party risk policy.
|
|
243
|
+
**(2)** All ICT service arrangements recorded in the Register of Information.
|
|
244
|
+
**(3)** Submit RoI at least annually to competent authority.
|
|
245
|
+
**(4)** Pre-contractual due diligence for critical/important function arrangements.
|
|
246
|
+
**(5)** Ongoing monitoring of TPSP performance and risk.
|
|
247
|
+
**(6)** Assess ICT concentration risk — single TPSP for multiple critical functions.
|
|
248
|
+
**(7)** Exit strategy for each critical arrangement.
|
|
249
|
+
**(9)** ITS on RoI templates → CIR (EU) 2024/2956.
|
|
250
|
+
**(10)** RTS on third-party risk policy → CDR (EU) 2024/1773.
|
|
251
|
+
|
|
252
|
+
### Art. 29 — Preliminary Assessment of ICT Concentration Risk at Entity Level
|
|
253
|
+
**(1)** Assess entity-level concentration when entering new arrangements.
|
|
254
|
+
**(2)** Assess risk that entire ICT services become unavailable.
|
|
255
|
+
**(3)** Assess prior to entering arrangements for critical functions.
|
|
256
|
+
|
|
257
|
+
### Art. 30 — Key Contractual Provisions
|
|
258
|
+
**(2)** Mandatory provisions for critical/important function contracts:
|
|
259
|
+
(a) service description; (b) data locations; (c) data protection; (d) availability/
|
|
260
|
+
security; (e) audit and access rights; (f) termination rights; (g) reporting;
|
|
261
|
+
(h) data portability; (i) sub-contracting.
|
|
262
|
+
**(3)** Lighter provisions for non-critical arrangements.
|
|
263
|
+
**(5)** RTS on detailed provisions → CDR (EU) 2024/1773, CDR (EU) 2025/532.
|
|
264
|
+
|
|
265
|
+
### Section II — Oversight Framework for Critical ICT TPSPs (Art. 31–44)
|
|
266
|
+
|
|
267
|
+
### Art. 31 — Designation of Critical ICT Third-Party Service Providers
|
|
268
|
+
ESAs designate critical ICT TPSPs based on CDR (EU) 2024/1502 criteria.
|
|
269
|
+
Non-EU CTPPs must designate EU legal representative (Art. 31(11)).
|
|
270
|
+
|
|
271
|
+
### Art. 32 — Structure of the Oversight Framework
|
|
272
|
+
Lead Overseer (EBA/ESMA/EIOPA) per CTPSP. Joint Oversight Network (JON).
|
|
273
|
+
JETs per CDR (EU) 2025/420.
|
|
274
|
+
|
|
275
|
+
### Art. 33 — Information Requests
|
|
276
|
+
Lead Overseer may require CTPPs to provide all relevant information and documentation.
|
|
277
|
+
|
|
278
|
+
### Art. 34 — General Investigations
|
|
279
|
+
Lead Overseer may conduct general investigations including interviews and document reviews.
|
|
280
|
+
|
|
281
|
+
### Art. 35 — Inspections
|
|
282
|
+
Lead Overseer may conduct on-site inspections; CTPPs must cooperate.
|
|
283
|
+
|
|
284
|
+
### Art. 36 — Oversight Recommendations
|
|
285
|
+
Lead Overseer issues recommendations on significant findings; CTPSP has 6 weeks to respond.
|
|
286
|
+
|
|
287
|
+
### Art. 37 — Follow-Up of Oversight Recommendations
|
|
288
|
+
If CTPSP fails to implement recommendations: escalated follow-up; public disclosure
|
|
289
|
+
of non-compliance possible.
|
|
290
|
+
|
|
291
|
+
### Art. 38 — Oversight Fees
|
|
292
|
+
Annual oversight fees for CTPPs per CDR (EU) 2024/1505.
|
|
293
|
+
|
|
294
|
+
### Art. 39 — Rights of Defence
|
|
295
|
+
CTPPs have right to be heard before formal findings are issued; access to documents.
|
|
296
|
+
|
|
297
|
+
### Art. 40 — Cooperation Between Competent Authorities
|
|
298
|
+
Competent authorities of financial entities that use a CTPSP exchange relevant
|
|
299
|
+
information with the Lead Overseer — including supervisory findings, complaints,
|
|
300
|
+
and material changes reported by the financial entity concerning the CTPSP.
|
|
301
|
+
Financial entities must cooperate with their own competent authority in providing
|
|
302
|
+
information about their CTPSP arrangements; the authority in turn shares that
|
|
303
|
+
information with the Lead Overseer.
|
|
304
|
+
|
|
305
|
+
> **Note on entity obligations:** Art. 40 primarily governs inter-authority
|
|
306
|
+
> information flows. Financial entities' direct cooperation obligation with the
|
|
307
|
+
> Lead Overseer arises from Art. 28(3) (RoI submission) and the Lead Overseer's
|
|
308
|
+
> powers under Art. 33–35, not Art. 40 itself.
|
|
309
|
+
|
|
310
|
+
### Art. 41 — Cooperation Between Competent Authorities and Lead Overseers
|
|
311
|
+
Exchange of information; coordination mechanisms; JON information sharing.
|
|
312
|
+
RTS on harmonisation → CDR (EU) 2025/295.
|
|
313
|
+
|
|
314
|
+
### Art. 42 — Liability of Financial Entities
|
|
315
|
+
Designation of a CTPSP does not affect the financial entity's own responsibility
|
|
316
|
+
for DORA compliance. Entities cannot outsource their regulatory obligations to
|
|
317
|
+
a CTPSP.
|
|
318
|
+
|
|
319
|
+
### Art. 43 — Oversight Fees
|
|
320
|
+
Lead Overseer collects fees; methodology per CDR (EU) 2024/1505.
|
|
321
|
+
|
|
322
|
+
### Art. 44 — International Cooperation
|
|
323
|
+
ESAs may conclude administrative arrangements with third-country regulatory
|
|
324
|
+
authorities on information exchange for oversight of CTPPs with a global footprint.
|
|
325
|
+
|
|
326
|
+
---
|
|
327
|
+
|
|
328
|
+
## Chapter VI — Information-Sharing Arrangements (Art. 45)
|
|
329
|
+
|
|
330
|
+
### Art. 45 — Information-Sharing Arrangements on Cyber Threat Information and Intelligence
|
|
331
|
+
**(1)** Financial entities may voluntarily participate in cyber threat intelligence
|
|
332
|
+
sharing arrangements with other financial entities.
|
|
333
|
+
**(1)** Must protect confidential information; must comply with competition rules.
|
|
334
|
+
**(3)** ESAs may develop guidelines on information sharing.
|
|
335
|
+
|
|
336
|
+
Participation in information sharing arrangements does not reduce DORA obligations
|
|
337
|
+
but may assist in threat intelligence requirements under Art. 13(2)–(3).
|
|
338
|
+
|
|
339
|
+
---
|
|
340
|
+
|
|
341
|
+
## Chapter VII — Competent Authorities (Art. 46–56)
|
|
342
|
+
|
|
343
|
+
### Art. 46 — Competent Authorities
|
|
344
|
+
Each Member State designates competent authorities for each financial entity type.
|
|
345
|
+
Multiple authorities may be designated (e.g., ECB for SSM banks + national NCA).
|
|
346
|
+
|
|
347
|
+
### Art. 47 — Cooperation with Structures Established by NIS 2 Directive
|
|
348
|
+
Competent authorities under DORA cooperate with bodies established under NIS2.
|
|
349
|
+
This includes information sharing with national CSIRTs and ENISA.
|
|
350
|
+
|
|
351
|
+
### Art. 48 — Cooperation Between Competent Authorities
|
|
352
|
+
Mutual assistance; supervisory convergence across Member States.
|
|
353
|
+
|
|
354
|
+
### Art. 49 — Cross-Sectoral Exercises
|
|
355
|
+
Competent authorities may participate in cross-sectoral crisis simulations with
|
|
356
|
+
other regulatory bodies and public authorities.
|
|
357
|
+
|
|
358
|
+
### Art. 50 — Administrative Penalties and Remedial Measures
|
|
359
|
+
Competent authorities must have supervisory powers including:
|
|
360
|
+
- Issuance of orders to cease non-compliant conduct
|
|
361
|
+
- Imposition of administrative penalties
|
|
362
|
+
- Suspension of ICT service arrangements that pose systemic risk
|
|
363
|
+
|
|
364
|
+
### Art. 51 — Exercise of the Power to Impose Administrative Penalties
|
|
365
|
+
Member States must determine effective, proportionate, and dissuasive penalties.
|
|
366
|
+
Penalties can apply to both the legal entity and natural persons in management.
|
|
367
|
+
|
|
368
|
+
### Art. 52 — Criminal Penalties
|
|
369
|
+
Member States may provide for criminal penalties for DORA violations.
|
|
370
|
+
|
|
371
|
+
### Art. 53 — Notification and Publication
|
|
372
|
+
Competent authorities publish information on penalties and measures imposed
|
|
373
|
+
(naming and shaming regime).
|
|
374
|
+
|
|
375
|
+
### Art. 54 — EBA Lead for Banking
|
|
376
|
+
EBA acts as lead for banking-sector CTPPs; coordinates with ESMA and EIOPA.
|
|
377
|
+
|
|
378
|
+
### Art. 55 — ESMA Lead for Capital Markets
|
|
379
|
+
ESMA acts as lead for capital markets CTPPs.
|
|
380
|
+
|
|
381
|
+
### Art. 56 — EIOPA Lead for Insurance and Pensions
|
|
382
|
+
EIOPA acts as lead for insurance, reinsurance, and pension fund CTPPs.
|
|
383
|
+
|
|
384
|
+
---
|
|
385
|
+
|
|
386
|
+
## Chapter VIII — Delegated Acts (Art. 57)
|
|
387
|
+
|
|
388
|
+
### Art. 57 — Exercise of the Delegation
|
|
389
|
+
Empowers the Commission to adopt delegated regulations (the RTS/ITS listed in
|
|
390
|
+
the rts-its-guide.md reference file). Delegation runs for 5 years from
|
|
391
|
+
17 January 2025, renewable.
|
|
392
|
+
|
|
393
|
+
---
|
|
394
|
+
|
|
395
|
+
## Chapter IX — Transitional and Final Provisions (Art. 58–64)
|
|
396
|
+
|
|
397
|
+
### Art. 58 — Transitional Provisions for Competent Authorities
|
|
398
|
+
Procedures for handling pending supervisory cases at the time of DORA application.
|
|
399
|
+
|
|
400
|
+
### Art. 59 — Amendments to MiCA (Regulation (EU) 2023/1114)
|
|
401
|
+
DORA imposes ICT risk obligations on CASPs as defined in MiCA; Art. 59 makes
|
|
402
|
+
consequential amendments to align MiCA with DORA.
|
|
403
|
+
|
|
404
|
+
### Art. 60 — Amendments to EMIR (Regulation (EU) 648/2012)
|
|
405
|
+
Consequential amendments for CCPs and trade repositories.
|
|
406
|
+
|
|
407
|
+
### Art. 61 — Amendments to MiFIR (Regulation (EU) 600/2014)
|
|
408
|
+
Consequential amendments for trading venues and data reporting service providers.
|
|
409
|
+
|
|
410
|
+
### Art. 62 — Amendments to AIFMD (Directive 2011/61/EU)
|
|
411
|
+
Consequential amendments for AIFMs.
|
|
412
|
+
|
|
413
|
+
### Art. 63 — Entry into Force
|
|
414
|
+
DORA entered into force on 16 January 2023 (20 days after OJ publication on
|
|
415
|
+
27 December 2022).
|
|
416
|
+
|
|
417
|
+
### Art. 64 — Application
|
|
418
|
+
DORA **applies from 17 January 2025** — 24 months after entry into force.
|
|
419
|
+
|
|
420
|
+
---
|
|
421
|
+
|
|
422
|
+
## Key DORA Cross-References
|
|
423
|
+
|
|
424
|
+
| Topic | Primary Article | Key RTS/ITS |
|
|
425
|
+
|-------|---------------|-------------|
|
|
426
|
+
| Board responsibility for ICT risk | Art. 5 | CDR 2024/1774 |
|
|
427
|
+
| ICT risk management framework | Art. 6 | CDR 2024/1774 |
|
|
428
|
+
| ICT asset register | Art. 8(4) | CDR 2024/1774 |
|
|
429
|
+
| Incident classification | Art. 18 | CDR 2024/1772 |
|
|
430
|
+
| Major incident reporting timelines | Art. 19 | CDR 2025/301 |
|
|
431
|
+
| Incident reporting templates | Art. 20 | CIR 2025/302 |
|
|
432
|
+
| TLPT requirements | Art. 26 | CDR 2025/1190 |
|
|
433
|
+
| TLPT tester qualifications | Art. 27 | CDR 2025/1190 |
|
|
434
|
+
| ICT third-party risk policy | Art. 28(1) | CDR 2024/1773 |
|
|
435
|
+
| Register of Information | Art. 28(3)+(9) | CIR 2024/2956 |
|
|
436
|
+
| Concentration risk | Art. 28(6)+29 | CDR 2024/1773 |
|
|
437
|
+
| Contractual provisions | Art. 30(2) | CDR 2024/1773, CDR 2025/532 |
|
|
438
|
+
| Critical TPSP designation | Art. 31 | CDR 2024/1502 |
|
|
439
|
+
| CTPSP oversight fees | Art. 43 | CDR 2024/1505 |
|
|
440
|
+
| Oversight harmonisation | Art. 41 | CDR 2025/295 |
|
|
441
|
+
| Joint Examination Teams | Art. 32 | CDR 2025/420 |
|