DORA ICT Risk Management Requirements
ICT risk management forms the foundation of DORA compliance. Chapter II of the regulation requires financial entities to establish, maintain, and continuously improve a comprehensive framework for identifying, protecting against, detecting, responding to, and recovering from ICT-related disruptions.
This is not simply a documentation exercise. DORA requires that ICT risk management be embedded into organizational governance, with the management body taking direct responsibility for approving and overseeing the framework.
Key Takeaways
| Point | Summary |
|---|---|
| Comprehensive framework | Must cover identification, protection, detection, response, and recovery |
| Management accountability | Board-level approval and oversight required |
| Continuous improvement | Regular reviews and updates mandatory |
| Documentation | Policies, procedures, and records must be maintained |
| Proportionality | Implementation scales with size and risk profile |
Quick Answer: DORA requires financial entities to implement a documented ICT risk management framework covering asset identification, protection measures, detection capabilities, incident response, and recovery planning. The management body must approve the framework, allocate adequate resources, and undergo regular ICT risk training. The framework must be reviewed at least annually and following major incidents.
Governance and Organization
Management Body Responsibilities
DORA places explicit obligations on the management body (board of directors, executive management, or equivalent):
| Responsibility | Description |
|---|---|
| Framework ownership | Define, approve, oversee, and be accountable for the ICT risk management framework |
| Resource allocation | Ensure adequate ICT budget and staffing |
| Training | Undergo training to understand and assess ICT risks |
| Policy approval | Approve policies for ICT services supporting critical functions |
| Continuity oversight | Approve business continuity arrangements |
| Review | Regularly review ICT audit findings and incident reports |
This represents a significant shift from treating ICT risk as a technical matter delegated to IT departments.
ICT Risk Management Function
Non-microenterprises must establish an ICT risk management function that is:
- Independent from operational ICT functions
- Adequately staffed and resourced
- Capable of reporting directly to senior management
The function is responsible for:
- Monitoring ICT risk exposure
- Advising on risk mitigation measures
- Reporting to the management body
- Coordinating incident response
Smaller entities may combine this function with other control functions, provided independence is maintained for ICT-related matters.
The ICT Risk Management Framework
Core Components
DORA Article 6 requires the framework to include:
| Component | Description |
|---|---|
| Strategies | High-level direction for managing ICT risk |
| Policies | Rules governing ICT security and operations |
| Procedures | Operational processes implementing policies |
| Tools and protocols | Technical and organizational measures |
| Review mechanisms | Processes for evaluating framework effectiveness |
Documentation Requirements
Financial entities must maintain comprehensive documentation:
- ICT risk management strategy
- ICT security policy (at least annually reviewed)
- Information security procedures
- ICT asset inventory
- Risk assessments
- Business impact analyses
- Business continuity plans
- Incident response procedures
All documentation must be kept current and accessible to supervisory authorities upon request.
Identification
The first function of the framework is identifying and documenting all ICT assets and risks.
ICT Asset Inventory
Financial entities must identify, classify, and document:
| Asset Category | Examples |
|---|---|
| Hardware | Servers, network equipment, workstations, mobile devices |
| Software | Operating systems, applications, databases, middleware |
| Network components | Firewalls, routers, switches, load balancers |
| Data | Customer data, transaction records, configuration data |
| ICT services | Cloud services, outsourced functions, third-party integrations |
The inventory must distinguish between assets supporting critical or important functions and those supporting non-critical functions.
Risk Identification
Financial entities must identify ICT risks arising from:
- Known vulnerabilities in systems and infrastructure
- Cyber threats relevant to the entity and sector
- Dependencies on ICT third-party service providers
- Concentration risks in technology supply chains
- Single points of failure in critical systems
Business Impact Analysis
Entities must assess the potential impact of ICT disruptions on:
- Business continuity
- Financial losses
- Reputational damage
- Regulatory compliance
- Client services
This analysis informs recovery time objectives and priorities.
Protection and Prevention
The framework must include measures to protect ICT systems and prevent incidents.
Technical Measures
| Measure | Description |
|---|---|
| Access control | Role-based access, least privilege, regular access reviews |
| Authentication | Strong authentication, multi-factor for privileged and remote access |
| Encryption | Data protection at rest and in transit |
| Network security | Segmentation, firewalls, intrusion prevention |
| Endpoint protection | Anti-malware, endpoint detection and response |
| Patch management | Timely application of security updates |
| Secure configuration | Hardening standards for systems and applications |
Organizational Measures
| Measure | Description |
|---|---|
| Security awareness | Regular training for all staff |
| Acceptable use policies | Clear rules for system and data usage |
| Change management | Controlled process for system changes |
| Personnel security | Background checks, confidentiality agreements |
| Physical security | Protection of data centers and equipment |
ICT Security Policies
Financial entities must establish policies covering:
- Information security (overall framework)
- Network security (architecture and controls)
- Cryptography (encryption standards and key management)
- ICT project management (security in development)
- ICT operations (day-to-day security practices)
- Data management (classification and handling)
- Logical access (authentication and authorization)
- Physical security (facilities and equipment)
- Vendor security (third-party requirements)
Detection
Financial entities must implement capabilities to detect ICT-related incidents and anomalies.
Monitoring Requirements
| Capability | Description |
|---|---|
| Security monitoring | Continuous monitoring of security events |
| Anomaly detection | Identification of unusual patterns or behaviors |
| Log management | Collection, retention, and analysis of system logs |
| Threat detection | Identification of potential cyber attacks |
| Performance monitoring | Detection of system degradation |
Alert and Escalation
The framework must define:
- Alert thresholds and triggers
- Escalation procedures
- On-call arrangements
- Communication channels
Response and Recovery
Incident Response
Financial entities must establish incident response capabilities including:
| Element | Description |
|---|---|
| Response plans | Documented procedures for different incident types |
| Roles and responsibilities | Clear assignment of response duties |
| Communication procedures | Internal and external communication protocols |
| Containment measures | Actions to limit incident impact |
| Evidence preservation | Procedures for forensic evidence handling |
| Reporting procedures | Alignment with DORA incident reporting requirements |
ICT Business Continuity
DORA requires comprehensive business continuity arrangements:
| Element | Description |
|---|---|
| Business continuity policy | Management-approved policy covering ICT continuity |
| Business impact analysis | Assessment of critical function dependencies |
| Recovery objectives | RTO and RPO for critical functions |
| Continuity plans | Documented procedures for maintaining operations |
| Recovery plans | Procedures for restoring normal operations |
| Crisis management | Governance structure for major disruptions |
ICT Disaster Recovery
Disaster recovery capabilities must include:
| Element | Description |
|---|---|
| Backup procedures | Regular, tested backups with secure storage |
| Recovery procedures | Documented restoration processes |
| Alternative processing | Capability to operate from secondary sites |
| Testing | Regular testing of recovery capabilities |
| Plan maintenance | Updates following changes or test results |
Recovery Time Objectives
For critical or important functions, entities must define:
- Recovery Time Objective (RTO): Maximum acceptable downtime
- Recovery Point Objective (RPO): Maximum acceptable data loss
These objectives must be realistic, tested, and aligned with business requirements and risk appetite.
Learning and Evolving
Review and Improvement
The ICT risk management framework must be:
- Reviewed at least annually
- Updated following significant incidents
- Improved based on lessons learned
- Aligned with evolving threats and technologies
Post-Incident Analysis
Following major incidents, entities must conduct:
- Root cause analysis
- Impact assessment
- Control effectiveness evaluation
- Improvement identification
- Implementation tracking
Lessons learned must feed back into the framework, improving future resilience.
Simplified Framework for Smaller Entities
Certain smaller entities (small investment firms, payment institutions meeting exemption criteria, small pension funds) may implement a simplified ICT risk management framework. This simplified version:
- Maintains core elements but with reduced documentation
- Focuses on proportionate measures
- Still requires appropriate governance
Microenterprises benefit from additional flexibility but must still address ICT risks appropriately.
Common Questions
How does DORA's ICT risk management compare to ISO 27001?
ISO 27001 provides excellent coverage for many DORA ICT risk management requirements. Key differences include DORA's explicit management body accountability requirements, specific business continuity expectations, and integration with incident reporting obligations. ISO 27001 certification provides a strong foundation but may need supplementation for full DORA compliance.
What documentation is required?
At minimum: ICT risk management strategy, information security policy, ICT security procedures, asset inventory, risk assessments, business impact analyses, business continuity plans, disaster recovery plans, and incident response procedures. Proportionality applies to the depth and formality of documentation.
How often must we review the framework?
The framework must be reviewed at least annually. Additional reviews are required following significant changes (organizational, technological, or threat landscape) and after major incidents.
Can we outsource ICT risk management?
You can use external expertise to support ICT risk management, but accountability remains with the financial entity. The management body cannot delegate its oversight responsibilities.
How Bastion Helps
Bastion supports financial entities in building and maintaining DORA-compliant ICT risk management frameworks:
- Framework development: Design and documentation of comprehensive ICT risk management frameworks
- Gap assessment: Evaluation of existing frameworks against DORA requirements
- Policy development: Creation of required policies and procedures
- Risk assessment: ICT risk identification and assessment support
- Implementation support: Assistance with control implementation
- Review and improvement: Annual reviews and continuous improvement guidance
Ready to build your DORA-compliant ICT risk management framework? Talk to our team
Sources
- DORA Chapter II - ICT risk management requirements
- DORA Article 5-16 - Detailed provisions on governance, identification, protection, detection, response, and recovery
- ESA RTS on ICT Risk Management - Technical standards for ICT risk management framework
