bmad-plus 0.4.4 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +31 -0
- package/README.md +3 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +21 -8
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,297 @@
|
|
|
1
|
+
# DORA — Incident Management, Classification and Reporting Reference
|
|
2
|
+
|
|
3
|
+
Chapter III, Articles 17–23, Regulation (EU) 2022/2554.
|
|
4
|
+
Key implementing measures: CDR (EU) 2024/1772, CDR (EU) 2025/301, CIR (EU) 2025/302.
|
|
5
|
+
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
## Art. 17 — ICT-Related Incident Management Process
|
|
9
|
+
|
|
10
|
+
Financial entities must establish and implement a **documented ICT-related incident
|
|
11
|
+
management process** as part of their overall ICT risk management framework.
|
|
12
|
+
|
|
13
|
+
### Minimum elements (Art. 17(1)):
|
|
14
|
+
- **(a)** Procedures for detecting, managing, and notifying ICT-related incidents
|
|
15
|
+
- **(b)** Criteria and thresholds for classifying incidents as major (aligned
|
|
16
|
+
with CDR (EU) 2024/1772)
|
|
17
|
+
- **(c)** Escalation procedures — who is notified when, including senior management
|
|
18
|
+
and the board
|
|
19
|
+
- **(d)** Roles and responsibilities of ICT incident response staff
|
|
20
|
+
- **(e)** Communication procedures for internal escalation and external reporting
|
|
21
|
+
|
|
22
|
+
### Senior management involvement (Art. 17(3)):
|
|
23
|
+
- Major ICT-related incidents must be reported to **senior management**
|
|
24
|
+
- The management body (board) must be **informed** of major incidents
|
|
25
|
+
- The board must have oversight of the entity's exposure to ICT risks
|
|
26
|
+
|
|
27
|
+
### Customer communication (Art. 17(4)):
|
|
28
|
+
- Financial entities must promptly communicate to clients about major ICT incidents
|
|
29
|
+
that may affect their financial interests
|
|
30
|
+
- Must include details of measures taken and, where known, estimated recovery time
|
|
31
|
+
|
|
32
|
+
---
|
|
33
|
+
|
|
34
|
+
## Art. 18 — Classification of ICT-Related Incidents
|
|
35
|
+
|
|
36
|
+
### Step 1: Is the incident ICT-related?
|
|
37
|
+
|
|
38
|
+
An **ICT-related incident** is any unplanned event that compromises the security
|
|
39
|
+
of network and information systems, and has an adverse impact on the availability,
|
|
40
|
+
authenticity, integrity or confidentiality of data, or on the services provided
|
|
41
|
+
by the financial entity.
|
|
42
|
+
|
|
43
|
+
A **cyber threat** is any potential circumstance, event or action that could harm
|
|
44
|
+
systems, data, or services (even without having materialized yet).
|
|
45
|
+
|
|
46
|
+
### Step 2: Apply the classification criteria (Art. 18(1))
|
|
47
|
+
|
|
48
|
+
| Criterion | Description | Materiality threshold (CDR 2024/1772) |
|
|
49
|
+
|-----------|-------------|--------------------------------------|
|
|
50
|
+
| (a) Clients and transactions | Number of clients affected; value of impacted transactions | ≥ 10% of clients OR > 5,000 clients; value thresholds by entity type |
|
|
51
|
+
| (b) Reputational impact | Public media coverage; regulatory attention; reputational damage | Significant negative press coverage likely; regulatory inquiry expected |
|
|
52
|
+
| (c) Duration and geographic spread | Hours/days of disruption; number of Member States affected | ≥ 2 hours for critical services; multi-Member State impact |
|
|
53
|
+
| (d) Data losses | Loss of availability, authenticity, integrity or confidentiality | Any loss of client data integrity or confidentiality; availability loss ≥ 2h |
|
|
54
|
+
| (e) Criticality of services | Impact on critical or important functions | Critical function impacted |
|
|
55
|
+
| (f) Economic impact | Direct and indirect financial losses | To be set by ESAs per entity type and size |
|
|
56
|
+
|
|
57
|
+
**Classification logic:** An incident is **major** if it meets or exceeds
|
|
58
|
+
**any single threshold** from CDR (EU) 2024/1772 (OR logic, not AND logic).
|
|
59
|
+
|
|
60
|
+
### Step 3: Major or non-major?
|
|
61
|
+
|
|
62
|
+
| Classification | Consequence |
|
|
63
|
+
|----------------|-------------|
|
|
64
|
+
| **Major ICT-related incident** | Three-stage regulatory reporting to competent authority (Art. 19) + internal escalation to board |
|
|
65
|
+
| **Non-major ICT-related incident** | Internal incident management process only; no regulatory reporting obligation |
|
|
66
|
+
| **Significant cyber threat** | Voluntary notification to competent authority under Art. 19(2) encouraged |
|
|
67
|
+
|
|
68
|
+
---
|
|
69
|
+
|
|
70
|
+
## Art. 19 — Reporting of Major ICT-Related Incidents
|
|
71
|
+
|
|
72
|
+
### Three-Stage Reporting Timeline
|
|
73
|
+
|
|
74
|
+
| Stage | Deadline | Trigger | Key Content |
|
|
75
|
+
|-------|----------|---------|-------------|
|
|
76
|
+
| **Initial notification** | Within **4 hours** of classification as major | From the moment the entity classifies the incident as major | Incident type; initial impact; functions affected; preliminary recovery estimate |
|
|
77
|
+
| **Intermediate report** | Within **72 hours** of classification | From the same moment as the 4h clock | Updated impact; root cause indications; measures taken; updated recovery estimate |
|
|
78
|
+
| **Final report** | Within **1 month** of the initial notification | One month after the initial report | Root cause analysis; full impact; lessons learned; measures implemented or planned |
|
|
79
|
+
|
|
80
|
+
**Time counting:** The clocks start when the incident is **classified as major**,
|
|
81
|
+
not when it is first detected. Entities must establish clear classification criteria
|
|
82
|
+
to avoid uncertainty about when the clock starts.
|
|
83
|
+
|
|
84
|
+
> **Critical interpretive point:** The 4-hour deadline runs from the moment of
|
|
85
|
+
> **classification as major** (CDR (EU) 2025/301, Art. 3), NOT from the moment of
|
|
86
|
+
> detection. However, entities must not use this to game the timeline — extended
|
|
87
|
+
> triage that delays classification is itself a supervisory risk. The obligation
|
|
88
|
+
> is to classify promptly and report within 4 hours of that classification.
|
|
89
|
+
> Competent authorities may scrutinise delayed classification as evidence of an
|
|
90
|
+
> inadequate incident management process (Art. 17(1)).
|
|
91
|
+
|
|
92
|
+
### How to Count the 4-Hour Deadline
|
|
93
|
+
|
|
94
|
+
1. **Detection:** ICT monitoring tools detect anomalous activity
|
|
95
|
+
2. **Triage:** Incident response team investigates — is this an ICT-related incident?
|
|
96
|
+
3. **Classification:** Against CDR 2024/1772 thresholds — major or non-major?
|
|
97
|
+
— Classification must be made **promptly**; triage should not extend beyond
|
|
98
|
+
what is operationally necessary to apply the thresholds
|
|
99
|
+
4. **Clock starts:** From the moment of classification as major
|
|
100
|
+
5. **Initial notification:** Must reach competent authority within 4 hours
|
|
101
|
+
|
|
102
|
+
**Practical implication:** If classification occurs at 22:00 on a Friday, the
|
|
103
|
+
initial notification must still be submitted by 02:00 Saturday. DORA does not
|
|
104
|
+
provide for weekend/business hours exceptions in the 4-hour initial notification.
|
|
105
|
+
|
|
106
|
+
### Reporting Channel
|
|
107
|
+
|
|
108
|
+
Reports are submitted to the **home Member State competent authority** using the
|
|
109
|
+
standard templates from **CIR (EU) 2025/302**. The competent authority is:
|
|
110
|
+
|
|
111
|
+
| Entity type | Competent authority |
|
|
112
|
+
|-------------|-------------------|
|
|
113
|
+
| Credit institutions | National banking supervisory authority (e.g., ECB/SSM for significant institutions; national NCA for less significant) |
|
|
114
|
+
| Investment firms | National securities market authority |
|
|
115
|
+
| Insurance undertakings | National insurance supervisor |
|
|
116
|
+
| Payment institutions / E-money institutions | National payment supervisor |
|
|
117
|
+
| Crypto-asset service providers | National authority per MiCA |
|
|
118
|
+
|
|
119
|
+
### Cross-Border Incidents
|
|
120
|
+
|
|
121
|
+
For entities operating in multiple Member States:
|
|
122
|
+
- Report to the **home state** competent authority (Art. 19(1))
|
|
123
|
+
- The home state authority is responsible for forwarding to host state authorities
|
|
124
|
+
where relevant (Art. 19(5))
|
|
125
|
+
- No obligation to report directly to host state authorities
|
|
126
|
+
|
|
127
|
+
### Voluntary Notification of Significant Cyber Threats (Art. 19(2))
|
|
128
|
+
|
|
129
|
+
Financial entities **may voluntarily notify** competent authorities of:
|
|
130
|
+
- Significant cyber threats that have not (yet) materialized into an incident
|
|
131
|
+
- Threats that the entity believes could be of relevance to the financial system
|
|
132
|
+
|
|
133
|
+
This is encouraged but not mandatory. CDR (EU) 2025/301 and CIR (EU) 2025/302
|
|
134
|
+
provide templates for voluntary notifications.
|
|
135
|
+
|
|
136
|
+
---
|
|
137
|
+
|
|
138
|
+
## Art. 20 — Harmonisation of Reporting Content, Timelines and Templates
|
|
139
|
+
|
|
140
|
+
ESAs adopted two measures:
|
|
141
|
+
|
|
142
|
+
- **CDR (EU) 2025/301:** Specifies the mandatory content of each report stage
|
|
143
|
+
and the exact time limits
|
|
144
|
+
- **CIR (EU) 2025/302:** Provides the standard forms and electronic templates
|
|
145
|
+
|
|
146
|
+
### Content Requirements per Stage (CDR (EU) 2025/301)
|
|
147
|
+
|
|
148
|
+
**Initial notification (4h report):**
|
|
149
|
+
- Unique incident reference number
|
|
150
|
+
- Reporting entity details (LEI, entity name, entity type)
|
|
151
|
+
- Date and time of incident detection
|
|
152
|
+
- Date and time of classification as major
|
|
153
|
+
- Nature of the incident (cyber attack, system failure, third-party failure, etc.)
|
|
154
|
+
- Affected ICT systems and functions
|
|
155
|
+
- Initial client impact estimate
|
|
156
|
+
- Initial financial impact estimate
|
|
157
|
+
- Measures immediately taken
|
|
158
|
+
|
|
159
|
+
**Intermediate report (72h report):**
|
|
160
|
+
- Updated version of all initial notification fields
|
|
161
|
+
- Updated root cause assessment (hypothesis or confirmed)
|
|
162
|
+
- Updated client and financial impact
|
|
163
|
+
- Response and recovery measures taken since initial notification
|
|
164
|
+
- Revised recovery time estimate
|
|
165
|
+
- Whether the incident is contained or ongoing
|
|
166
|
+
|
|
167
|
+
**Final report (1-month report):**
|
|
168
|
+
- Confirmed root cause analysis
|
|
169
|
+
- Final client and financial impact assessment
|
|
170
|
+
- Total duration of the incident (from detection to resolution)
|
|
171
|
+
- Complete timeline of events
|
|
172
|
+
- Description of all response and recovery measures implemented
|
|
173
|
+
- Preventive measures adopted or planned
|
|
174
|
+
- Lessons learned
|
|
175
|
+
- Whether the incident was caused by an ICT third-party service provider
|
|
176
|
+
(and if so, identification of the TPSP where permitted)
|
|
177
|
+
|
|
178
|
+
---
|
|
179
|
+
|
|
180
|
+
## Art. 21 — Centralisation of Reporting
|
|
181
|
+
|
|
182
|
+
- ESAs are tasked with assessing the feasibility of a **single EU reporting hub**
|
|
183
|
+
for major ICT incident reports
|
|
184
|
+
- Pending a centralised hub, financial entities report to their national competent
|
|
185
|
+
authority which coordinates with other authorities
|
|
186
|
+
- Supervisors share incident report information with other relevant authorities
|
|
187
|
+
(e.g., ECB, ENISA, CERT-EU) where appropriate under Art. 21(3)
|
|
188
|
+
|
|
189
|
+
---
|
|
190
|
+
|
|
191
|
+
## Art. 22 — Supervisory Feedback
|
|
192
|
+
|
|
193
|
+
After receiving a major incident report (any stage), competent authorities:
|
|
194
|
+
- May provide **feedback** to the financial entity, including:
|
|
195
|
+
- Indicative impact assessment of the incident for the financial system
|
|
196
|
+
- Relevant anonymised cyber threat intelligence from other entities
|
|
197
|
+
- Suggested preventive measures or recommendations
|
|
198
|
+
- This is at the supervisor's discretion; financial entities cannot compel
|
|
199
|
+
supervisory feedback
|
|
200
|
+
|
|
201
|
+
---
|
|
202
|
+
|
|
203
|
+
## Art. 23 — Payment-Related Major Incidents
|
|
204
|
+
|
|
205
|
+
**Applies to:**
|
|
206
|
+
- Credit institutions (for payment services)
|
|
207
|
+
- Payment institutions
|
|
208
|
+
- E-money institutions
|
|
209
|
+
- Account information service providers
|
|
210
|
+
|
|
211
|
+
**Integration with PSD2:** Art. 23 DORA replaces the pre-DORA payment incident
|
|
212
|
+
reporting obligation under PSD2 Art. 96 for incidents that qualify as **major**
|
|
213
|
+
under DORA. For non-major payment incidents that would previously have triggered
|
|
214
|
+
PSD2 Art. 96 reporting: PSD2 obligations may still apply for those incidents below
|
|
215
|
+
the DORA major threshold — consult your national competent authority on whether
|
|
216
|
+
PSD2 reporting continues for sub-threshold payment incidents.
|
|
217
|
+
|
|
218
|
+
**Dual-licensed entities:** Credit institutions that also hold payment institution
|
|
219
|
+
authorisation must clarify with their competent authority whether payment-related
|
|
220
|
+
major incidents require reporting to both the banking supervisor (as competent
|
|
221
|
+
authority under DORA) and the payment supervisor. In most Member States, the
|
|
222
|
+
banking supervisor is the single point of receipt and distributes to other
|
|
223
|
+
authorities as needed — but this should be confirmed before an incident occurs.
|
|
224
|
+
|
|
225
|
+
**Reporting to payment authorities:** For payment-related major incidents, the
|
|
226
|
+
entity reports to its **home payment supervisor** using the DORA templates, which
|
|
227
|
+
include payment-specific fields per CIR (EU) 2025/302 — the ITS provides a
|
|
228
|
+
dedicated payment-incident reporting template aligned with legacy PSD2 Art. 96
|
|
229
|
+
reporting formats.
|
|
230
|
+
|
|
231
|
+
---
|
|
232
|
+
|
|
233
|
+
## Incident Management Policy — Minimum Required Elements
|
|
234
|
+
|
|
235
|
+
A DORA-compliant incident management policy (Art. 17(1)) must include:
|
|
236
|
+
|
|
237
|
+
1. **Scope:** What constitutes an ICT-related incident for this entity
|
|
238
|
+
2. **Detection procedures:** How incidents are identified (monitoring tools, alerts,
|
|
239
|
+
staff reports, third-party notifications)
|
|
240
|
+
3. **Triage and classification:** Step-by-step process to assess against CDR
|
|
241
|
+
2024/1772 criteria; who makes the major/non-major determination
|
|
242
|
+
4. **Escalation matrix:**
|
|
243
|
+
- Level 1 (non-major): ICT operations team
|
|
244
|
+
- Level 2 (potential major): CISO and incident commander
|
|
245
|
+
- Level 3 (confirmed major): Senior management (CEO/CRO) and board notification
|
|
246
|
+
5. **Reporting obligations:** Who is responsible for filing the 4h/72h/1-month
|
|
247
|
+
reports; templates to use; competent authority contact details
|
|
248
|
+
6. **Client communication:** Timing, channel, and content of client notifications
|
|
249
|
+
7. **Post-incident review:** Trigger criteria; who conducts the review; output
|
|
250
|
+
requirements (lessons learned, preventive measures)
|
|
251
|
+
8. **Testing:** How and when the incident management process is tested (tabletop
|
|
252
|
+
exercises, simulations)
|
|
253
|
+
9. **Record retention:** How long incident records are retained (minimum
|
|
254
|
+
recommended: 5 years)
|
|
255
|
+
|
|
256
|
+
---
|
|
257
|
+
|
|
258
|
+
## Incident Classification Decision Tree
|
|
259
|
+
|
|
260
|
+
```
|
|
261
|
+
Is the event an ICT-related incident?
|
|
262
|
+
(Unplanned event compromising NIS with adverse impact on operations/data)
|
|
263
|
+
│
|
|
264
|
+
├─ NO → Standard IT issue; handle via normal IT operations; no DORA reporting
|
|
265
|
+
│
|
|
266
|
+
└─ YES → Apply CDR 2024/1772 classification criteria
|
|
267
|
+
│
|
|
268
|
+
├─ Does it meet or exceed ANY threshold in CDR 2024/1772?
|
|
269
|
+
│ (clients affected / transaction value / service duration /
|
|
270
|
+
│ data loss / critical function impact / economic impact)
|
|
271
|
+
│
|
|
272
|
+
├─ NO → Non-major incident
|
|
273
|
+
│ → Internal incident management process only
|
|
274
|
+
│ → No Art. 19 regulatory reporting
|
|
275
|
+
│ → Document in incident log
|
|
276
|
+
│
|
|
277
|
+
└─ YES → Major ICT-related incident
|
|
278
|
+
→ Escalate to senior management immediately
|
|
279
|
+
→ Notify board (Art. 17(3))
|
|
280
|
+
→ Initial report to competent authority within 4 HOURS
|
|
281
|
+
→ Intermediate report within 72 HOURS
|
|
282
|
+
→ Final report within 1 MONTH
|
|
283
|
+
→ Notify affected clients (Art. 17(4))
|
|
284
|
+
```
|
|
285
|
+
|
|
286
|
+
---
|
|
287
|
+
|
|
288
|
+
## Common Classification Mistakes
|
|
289
|
+
|
|
290
|
+
| Mistake | Correct Approach |
|
|
291
|
+
|---------|-----------------|
|
|
292
|
+
| Waiting for root cause before classifying | Classify as major the moment any threshold is met; root cause analysis follows |
|
|
293
|
+
| Treating the 4h clock as a business hours deadline | The 4h deadline runs 24/7/365 |
|
|
294
|
+
| Not classifying a third-party outage as a DORA incident | If a TPSP outage causes an ICT-related incident for the financial entity, the entity must classify and report — it is not the TPSP's obligation to report on the entity's behalf |
|
|
295
|
+
| Only reporting when the incident is resolved | DORA requires reporting while the incident is ongoing; the intermediate and final reports update as information becomes available |
|
|
296
|
+
| Treating a significant cyber threat as non-reportable | Voluntary notification under Art. 19(2) is encouraged |
|
|
297
|
+
| Confusing Art. 17 (process) with Art. 18 (classification) | Art. 17 = the ongoing process; Art. 18 = how to classify a specific event |
|
|
@@ -0,0 +1,306 @@
|
|
|
1
|
+
# DORA — Adopted RTS and ITS Reference Guide
|
|
2
|
+
|
|
3
|
+
All Level 2 measures adopted under Regulation (EU) 2022/2554 (DORA).
|
|
4
|
+
Last updated: April 2026.
|
|
5
|
+
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
## Overview
|
|
9
|
+
|
|
10
|
+
DORA empowers the European Supervisory Authorities (EBA, ESMA, EIOPA — collectively
|
|
11
|
+
the ESAs) to develop binding Regulatory Technical Standards (RTS) and Implementing
|
|
12
|
+
Technical Standards (ITS) under Articles 15, 16, 18, 20, 26, 28, 29, 30, 31, 32,
|
|
13
|
+
41, and 43. All key standards were adopted before the DORA application date of
|
|
14
|
+
17 January 2025.
|
|
15
|
+
|
|
16
|
+
---
|
|
17
|
+
|
|
18
|
+
## Complete List of Adopted RTS and ITS
|
|
19
|
+
|
|
20
|
+
### 1. CDR (EU) 2024/1772 — RTS on ICT Incident Classification
|
|
21
|
+
|
|
22
|
+
| Field | Detail |
|
|
23
|
+
|-------|--------|
|
|
24
|
+
| Full title | Commission Delegated Regulation (EU) 2024/1772 of 13 March 2024 |
|
|
25
|
+
| DORA basis | Art. 18(3) — classification criteria and materiality thresholds |
|
|
26
|
+
| Published | OJ L, 25 June 2024 |
|
|
27
|
+
| Applies from | 17 January 2025 |
|
|
28
|
+
|
|
29
|
+
**Key content:**
|
|
30
|
+
- Defines materiality thresholds for each Art. 18(1) criterion (clients affected,
|
|
31
|
+
transaction value, data loss, service unavailability, geographic spread)
|
|
32
|
+
- An incident is classified as **major** if any single threshold is met (OR logic)
|
|
33
|
+
- Sets minimum thresholds for "significant cyber threats" that may trigger voluntary
|
|
34
|
+
reporting under Art. 19(2)
|
|
35
|
+
- Includes specific rules for payment-related incidents (Art. 23)
|
|
36
|
+
|
|
37
|
+
**Thresholds (indicative — consult the CDR for exact values):**
|
|
38
|
+
- Client impact: ≥ 10% of clients (or >5,000 clients for large entities)
|
|
39
|
+
- Transaction value: depending on institution type and size
|
|
40
|
+
- Service unavailability: ≥ 2 hours for critical services
|
|
41
|
+
- Data integrity/confidentiality: any breach affecting core banking data
|
|
42
|
+
|
|
43
|
+
---
|
|
44
|
+
|
|
45
|
+
### 2. CDR (EU) 2024/1773 — RTS on ICT Third-Party Risk Policy
|
|
46
|
+
|
|
47
|
+
| Field | Detail |
|
|
48
|
+
|-------|--------|
|
|
49
|
+
| Full title | Commission Delegated Regulation (EU) 2024/1773 of 13 March 2024 |
|
|
50
|
+
| DORA basis | Art. 28(10) — content of the ICT third-party risk policy; Art. 30(5) — contractual provisions |
|
|
51
|
+
| Published | OJ L, 25 June 2024 |
|
|
52
|
+
| Applies from | 17 January 2025 |
|
|
53
|
+
|
|
54
|
+
**Key content:**
|
|
55
|
+
- Minimum elements of the ICT third-party risk policy (Art. 28(1) policy)
|
|
56
|
+
- Criteria for distinguishing critical/important functions from non-critical
|
|
57
|
+
- Due diligence requirements before entering ICT service arrangements
|
|
58
|
+
- Detailed requirements for contractual provisions under Art. 30(2):
|
|
59
|
+
- Service level descriptions and measurable KPIs
|
|
60
|
+
- Provisions on data location, portability, and return on exit
|
|
61
|
+
- Audit and access rights (the auditor clause must be specific and exercisable)
|
|
62
|
+
- Exit strategy and minimum notice period requirements
|
|
63
|
+
- Sub-contracting provisions and prior consent requirements
|
|
64
|
+
|
|
65
|
+
---
|
|
66
|
+
|
|
67
|
+
### 3. CDR (EU) 2024/1774 — RTS on ICT Risk Management Framework
|
|
68
|
+
|
|
69
|
+
| Field | Detail |
|
|
70
|
+
|-------|--------|
|
|
71
|
+
| Full title | Commission Delegated Regulation (EU) 2024/1774 of 13 March 2024 |
|
|
72
|
+
| DORA basis | Art. 15 — elements of ICT RMF; Art. 16(3) — simplified framework |
|
|
73
|
+
| Published | OJ L, 25 June 2024 |
|
|
74
|
+
| Applies from | 17 January 2025 |
|
|
75
|
+
|
|
76
|
+
**Key content:**
|
|
77
|
+
- Chapter I: Detailed elements of the ICT risk management framework (Art. 6–14):
|
|
78
|
+
- ICT risk strategy requirements
|
|
79
|
+
- Minimum content of ICT security policies
|
|
80
|
+
- ICT asset identification and classification requirements
|
|
81
|
+
- Protection and prevention controls (logical and physical)
|
|
82
|
+
- Detection, response, recovery, and backup policy requirements
|
|
83
|
+
- Learning and communication requirements
|
|
84
|
+
- Chapter II: Simplified ICT risk management framework (Art. 16):
|
|
85
|
+
- Entity types eligible for the simplified framework
|
|
86
|
+
- Minimum requirements for simplified framework entities
|
|
87
|
+
- How to document the simplified framework
|
|
88
|
+
|
|
89
|
+
---
|
|
90
|
+
|
|
91
|
+
### 4. CDR (EU) 2025/301 — RTS on Major Incident Reporting
|
|
92
|
+
|
|
93
|
+
| Field | Detail |
|
|
94
|
+
|-------|--------|
|
|
95
|
+
| Full title | Commission Delegated Regulation (EU) 2025/301 of 18 October 2024 |
|
|
96
|
+
| DORA basis | Art. 20(3) — content, timelines, and format of incident reports |
|
|
97
|
+
| Published | OJ L, 14 February 2025 |
|
|
98
|
+
| Applies from | 17 January 2025 (retroactively applicable) |
|
|
99
|
+
|
|
100
|
+
**Key content:**
|
|
101
|
+
- Mandatory content of each reporting stage:
|
|
102
|
+
- **Initial notification (within 4 hours):** Incident reference, entity details,
|
|
103
|
+
initial classification rationale, estimated client impact, nature of incident
|
|
104
|
+
- **Intermediate report (within 72 hours):** Updated impact assessment, root cause
|
|
105
|
+
indicators, response actions taken, recovery time estimate
|
|
106
|
+
- **Final report (within 1 month):** Root cause analysis, full impact assessment,
|
|
107
|
+
lessons learned, preventive measures implemented or planned
|
|
108
|
+
- Rules on how to count the 4-hour and 72-hour timelines from classification
|
|
109
|
+
- Provisions for voluntary reporting of significant cyber threats (Art. 19(2))
|
|
110
|
+
|
|
111
|
+
---
|
|
112
|
+
|
|
113
|
+
### 5. CIR (EU) 2025/302 — ITS on Incident Reporting Templates
|
|
114
|
+
|
|
115
|
+
| Field | Detail |
|
|
116
|
+
|-------|--------|
|
|
117
|
+
| Full title | Commission Implementing Regulation (EU) 2025/302 of 18 October 2024 |
|
|
118
|
+
| DORA basis | Art. 20(4) — standard forms and templates for incident reports |
|
|
119
|
+
| Published | OJ L, 14 February 2025 |
|
|
120
|
+
| Applies from | 17 January 2025 (retroactively applicable) |
|
|
121
|
+
|
|
122
|
+
**Key content:**
|
|
123
|
+
- Standard templates for all three reporting stages (initial, intermediate, final)
|
|
124
|
+
- **Dedicated payment-incident template** per Art. 23 for credit institutions,
|
|
125
|
+
payment institutions, and e-money institutions — aligned with legacy PSD2 Art. 96
|
|
126
|
+
reporting fields
|
|
127
|
+
- Separate template for voluntary cyber threat notifications (Art. 19(2))
|
|
128
|
+
- Electronic submission format requirements
|
|
129
|
+
- Competent authority designation — which authority receives reports for each
|
|
130
|
+
entity type (home state supervisor as a general rule)
|
|
131
|
+
|
|
132
|
+
---
|
|
133
|
+
|
|
134
|
+
### 6. CIR (EU) 2024/2956 — ITS on Register of Information
|
|
135
|
+
|
|
136
|
+
| Field | Detail |
|
|
137
|
+
|-------|--------|
|
|
138
|
+
| Full title | Commission Implementing Regulation (EU) 2024/2956 of 20 September 2024 |
|
|
139
|
+
| DORA basis | Art. 28(9) — templates for the Register of Information |
|
|
140
|
+
| Published | OJ L, 11 December 2024 |
|
|
141
|
+
| Applies from | 17 January 2025 |
|
|
142
|
+
|
|
143
|
+
**Key content — mandatory Register fields:**
|
|
144
|
+
|
|
145
|
+
The Register of Information (RoI) must capture, for each ICT service arrangement:
|
|
146
|
+
|
|
147
|
+
| Field Group | Key Fields |
|
|
148
|
+
|-------------|-----------|
|
|
149
|
+
| Entity information | LEI of reporting entity, entity name, entity type |
|
|
150
|
+
| TPSP identification | TPSP LEI, TPSP name, country of establishment |
|
|
151
|
+
| Arrangement details | Unique arrangement reference, arrangement type |
|
|
152
|
+
| Function classification | Critical or important function (Y/N), function description |
|
|
153
|
+
| ICT service description | Type of service (IaaS/PaaS/SaaS/other), specific service description |
|
|
154
|
+
| Data | Types of data processed, storage location (country/region) |
|
|
155
|
+
| Sub-processors | Chain of sub-processors (name, LEI, country) |
|
|
156
|
+
| Contractual terms | Contract start date, contract end date, notice period |
|
|
157
|
+
| Substitutability | Assessment of ease of substitution (high/medium/low) |
|
|
158
|
+
| Exit strategy | Reference to exit strategy document |
|
|
159
|
+
|
|
160
|
+
**Annual submission:** The RoI is submitted to the competent authority at least
|
|
161
|
+
annually (or upon request). The ESAs aggregate submissions for the oversight framework.
|
|
162
|
+
|
|
163
|
+
---
|
|
164
|
+
|
|
165
|
+
### 7. CDR (EU) 2025/1190 — RTS on TLPT
|
|
166
|
+
|
|
167
|
+
| Field | Detail |
|
|
168
|
+
|-------|--------|
|
|
169
|
+
| Full title | Commission Delegated Regulation (EU) 2025/1190 of 28 February 2025 |
|
|
170
|
+
| DORA basis | Art. 26(11) and Art. 27(9) — TLPT requirements, tester qualifications |
|
|
171
|
+
| Published | OJ L, 18 June 2025 |
|
|
172
|
+
| Applies from | 8 July 2025 |
|
|
173
|
+
|
|
174
|
+
**Key content:**
|
|
175
|
+
- Criteria for identifying financial entities required to conduct TLPT (Art. 26(8))
|
|
176
|
+
- Scope determination: which functions and ICT systems must be included
|
|
177
|
+
- Role of competent authority in approving TLPT scope and methodology
|
|
178
|
+
- Requirements for the **threat intelligence phase**: accreditation of threat
|
|
179
|
+
intelligence providers
|
|
180
|
+
- Requirements for **red team testing**: methodology, documentation, attestation
|
|
181
|
+
- **Mutual recognition:** TLPT results recognized across EU jurisdictions for
|
|
182
|
+
entities operating cross-border — only one test needed (Art. 26(5))
|
|
183
|
+
- Tester qualification requirements per Art. 27:
|
|
184
|
+
- Independence from the tested entity
|
|
185
|
+
- Relevant professional certification
|
|
186
|
+
- Risk methodology capability
|
|
187
|
+
- **TIBER-EU alignment:** The CDR aligns TLPT with the TIBER-EU framework;
|
|
188
|
+
TIBER-EU tests conducted under the TIBER-EU framework may satisfy DORA
|
|
189
|
+
TLPT requirements where conditions are met
|
|
190
|
+
|
|
191
|
+
---
|
|
192
|
+
|
|
193
|
+
### 8. CDR (EU) 2025/532 — RTS on Subcontracting of ICT Services
|
|
194
|
+
|
|
195
|
+
| Field | Detail |
|
|
196
|
+
|-------|--------|
|
|
197
|
+
| Full title | Commission Delegated Regulation (EU) 2025/532 |
|
|
198
|
+
| DORA basis | Art. 30(5) — subcontracting provisions |
|
|
199
|
+
| Applies from | 17 January 2025 |
|
|
200
|
+
|
|
201
|
+
**Key content:**
|
|
202
|
+
- When a TPSP subcontracts ICT services supporting critical/important functions,
|
|
203
|
+
the financial entity must ensure the contract includes:
|
|
204
|
+
- Prior written consent of the financial entity for sub-contracting chains
|
|
205
|
+
- Equivalent contractual provisions at sub-processor level
|
|
206
|
+
- Right to audit the sub-processor (directly or via the TPSP)
|
|
207
|
+
- Conditions under which financial entities may apply pre-approved sub-contracting
|
|
208
|
+
arrangements (framework sub-contracting clauses)
|
|
209
|
+
- Notification requirements for changes in sub-processors
|
|
210
|
+
|
|
211
|
+
---
|
|
212
|
+
|
|
213
|
+
### 9. CDR (EU) 2024/1502 — Designation Criteria for Critical ICT TPSPs
|
|
214
|
+
|
|
215
|
+
| Field | Detail |
|
|
216
|
+
|-------|--------|
|
|
217
|
+
| Full title | Commission Delegated Regulation (EU) 2024/1502 of 22 February 2024 |
|
|
218
|
+
| DORA basis | Art. 31(6) — criteria for designation of critical ICT TPSPs |
|
|
219
|
+
| Published | OJ L, 5 June 2024 |
|
|
220
|
+
| Applies from | 17 January 2025 |
|
|
221
|
+
|
|
222
|
+
**Key content — designation criteria:**
|
|
223
|
+
- **Systemic impact:** Would failure or discontinuation of the TPSP's services
|
|
224
|
+
cause systemic disruption to the financial system?
|
|
225
|
+
- **Scale:** Number and types of financial entities served; proportion of their
|
|
226
|
+
ICT needs
|
|
227
|
+
- **Substitutability:** How easily could another TPSP replace the service?
|
|
228
|
+
(Low substitutability → higher probability of designation)
|
|
229
|
+
- **Interconnectedness:** Does the TPSP's failure trigger cascading effects?
|
|
230
|
+
- **Concentration risk:** Does a large portion of EU financial entities rely
|
|
231
|
+
on this single TPSP for critical functions?
|
|
232
|
+
|
|
233
|
+
**Designation process:** ESAs assess all ICT TPSPs that provide services to
|
|
234
|
+
EU financial entities and publish a list of designated CTPPs. TPSPs not
|
|
235
|
+
established in the EU that provide services to EU financial entities must
|
|
236
|
+
designate an EU legal representative (Art. 31(11)).
|
|
237
|
+
|
|
238
|
+
---
|
|
239
|
+
|
|
240
|
+
### 10. CDR (EU) 2024/1505 — Oversight Fees for Critical ICT TPSPs
|
|
241
|
+
|
|
242
|
+
| Field | Detail |
|
|
243
|
+
|-------|--------|
|
|
244
|
+
| Full title | Commission Delegated Regulation (EU) 2024/1505 of 22 February 2024 |
|
|
245
|
+
| DORA basis | Art. 43(2) — methodology for calculating oversight fees |
|
|
246
|
+
| Published | OJ L, 5 June 2024 |
|
|
247
|
+
| Applies from | 17 January 2025 |
|
|
248
|
+
|
|
249
|
+
**Key content:**
|
|
250
|
+
- Fee methodology: annual oversight fee for designated CTPPs
|
|
251
|
+
- Based on: total worldwide annual net turnover of the CTPSP
|
|
252
|
+
- Fee caps and floors to ensure proportionality
|
|
253
|
+
- Fee collection process via Lead Overseer
|
|
254
|
+
|
|
255
|
+
---
|
|
256
|
+
|
|
257
|
+
### 11. CDR (EU) 2025/295 — RTS on Oversight Activities Harmonisation
|
|
258
|
+
|
|
259
|
+
| Field | Detail |
|
|
260
|
+
|-------|--------|
|
|
261
|
+
| Full title | Commission Delegated Regulation (EU) 2025/295 |
|
|
262
|
+
| DORA basis | Art. 41(7) — harmonisation of oversight activities |
|
|
263
|
+
| Applies from | 17 January 2025 |
|
|
264
|
+
|
|
265
|
+
**Key content:**
|
|
266
|
+
- How Lead Overseers coordinate with Joint Oversight Network (JON)
|
|
267
|
+
- Information sharing between ESAs and national competent authorities
|
|
268
|
+
- Procedures for issuing oversight recommendations
|
|
269
|
+
- Follow-up process for non-compliance with recommendations
|
|
270
|
+
|
|
271
|
+
---
|
|
272
|
+
|
|
273
|
+
### 12. CDR (EU) 2025/420 — RTS on Joint Examination Teams (JETs)
|
|
274
|
+
|
|
275
|
+
| Field | Detail |
|
|
276
|
+
|-------|--------|
|
|
277
|
+
| Full title | Commission Delegated Regulation (EU) 2025/420 |
|
|
278
|
+
| DORA basis | Art. 32 — structure and operation of Joint Examination Teams |
|
|
279
|
+
| Applies from | 17 January 2025 |
|
|
280
|
+
|
|
281
|
+
**Key content:**
|
|
282
|
+
- Composition of JETs: lead overseer staff + national competent authority experts
|
|
283
|
+
- JET mandate: on-site and off-site examination of designated CTPPs
|
|
284
|
+
- Coordination between JET lead and national experts
|
|
285
|
+
- Reporting of JET findings to Lead Overseer
|
|
286
|
+
|
|
287
|
+
---
|
|
288
|
+
|
|
289
|
+
## Quick Reference: DORA Article → RTS/ITS
|
|
290
|
+
|
|
291
|
+
| DORA Article | Obligation | Implementing Measure |
|
|
292
|
+
|-------------|-----------|---------------------|
|
|
293
|
+
| Art. 15 | ICT RMF detailed elements | CDR (EU) 2024/1774 |
|
|
294
|
+
| Art. 16(3) | Simplified RMF | CDR (EU) 2024/1774 (Ch. II) |
|
|
295
|
+
| Art. 18(3) | Incident classification thresholds | CDR (EU) 2024/1772 |
|
|
296
|
+
| Art. 20(3) | Incident reporting content + timelines | CDR (EU) 2025/301 |
|
|
297
|
+
| Art. 20(4) | Incident reporting templates | CIR (EU) 2025/302 |
|
|
298
|
+
| Art. 26(11) | TLPT requirements | CDR (EU) 2025/1190 |
|
|
299
|
+
| Art. 27(9) | Tester qualifications | CDR (EU) 2025/1190 |
|
|
300
|
+
| Art. 28(9) | Register of Information templates | CIR (EU) 2024/2956 |
|
|
301
|
+
| Art. 28(10) + 30(5) | ICT third-party risk policy + contracts | CDR (EU) 2024/1773 |
|
|
302
|
+
| Art. 30(5) | Subcontracting provisions | CDR (EU) 2025/532 |
|
|
303
|
+
| Art. 31(6) | Critical TPSP designation criteria | CDR (EU) 2024/1502 |
|
|
304
|
+
| Art. 32 | Joint Examination Teams (JETs) | CDR (EU) 2025/420 |
|
|
305
|
+
| Art. 41(7) | Oversight activities harmonisation | CDR (EU) 2025/295 |
|
|
306
|
+
| Art. 43(2) | Oversight fees for CTPPs | CDR (EU) 2024/1505 |
|