Review Your DORA (Digital Operational Resilience Act) Compliance Processes!
13/06/2024
DORA Compliance in the Financial Sector: Strengthen Your Processes!
As Barikat Cyber Security, we would like to share with you an important update that closely concerns the financial sector. The Digital Operational Resilience Act (DORA), enacted by the European Commission, entered into force on January 16, 2023. This law is of great importance especially for financial institutions operating in European Union member states and companies providing services to these institutions.
DORA applies to financial institutions operating in Turkey, representative offices, subsidiaries, and offices in European Union member states, and all entities that provide services to financial institutions in these countries. The deadline for financial institutions to comply with the law is January 17, 2025. By this date, the compliance status must be determined and deficiencies must be eliminated.
It is critical that companies subject to the decree, which are obliged to implement the law, complete their work by January 17, 2025, when audits and sanctions will begin to determine the compliance status and act on the identified deficiencies. Financial institutions may be fined if they do not comply with the regulation.
Basically;
DORA provides a new perspective for institutions in the financial sector in the European Union to be resistant to disruptions and threats in matters related to information and communication technologies (ICT), to protect themselves from these threats and to minimize their effects by providing a regulatory framework on digital operational resilience. offers.
The law sets standards on issues such as management of operational risks, cyber security measures, data management and reporting requirements. It also ensures that measures are taken to minimize the effects of interruptions and attacks on the systems of financial institutions.
DORA, a binding EU regulation regarding the digital operational flexibility of companies providing financial services in European Union (EU) countries, also addresses the potential risks that may be caused by third parties providing information and communication technologies to these companies.
In addition, compliance audits of organizations that must implement DORA will be carried out by auditors appointed by EBA. The audit service also has a financial obligation.
DORA's requirements can be grouped under 6 important headings;
1. Governance and organization: Governance and organization underpin digital resilience. Under this heading, responsibilities and roles regarding digital security and resilience need to be clearly defined. This includes appointing security leadership and establishing the security team. It also helps to establish security policies and procedures and determine the security standards of businesses.
2. IT risk management framework: IT risk management determines how organizations address cyber threats and risks. In this direction, Risk assessment should be made, risk reduction strategies should be determined, and strategies should be created for situations where some risks will be accepted.
3. ICT case management, classification and reporting: ICT case management; It includes identifying, managing and reporting cybersecurity incidents. However, case identification, classification and reporting processes should be established.
4. Digital operational resilience testing: Digital operational resilience testing determines the ability of organizations to react in crisis situations and ensure business continuity. In this context, scenarios and simulations should be developed, test results should be evaluated, and improvement plans should be created.
5. Third-party provider risk management: Organizations should analyze their relationships with third-party providers and determine strategies to manage the security risks of these providers. Additionally, steps such as third-party evaluations and review of contracts and agreements should be taken.
6. Information sharing: Information sharing determines how to manage the flow of information about security threats and events within and outside the organization. In this context, internal and external information sharing processes should be established and confidentiality and security principles should be considered.
Scope of DORA
It focuses on critical Information Technology (IT) services, covering institutions operating in the financial sector in European Union member countries as well as other institutions providing services in the financial sector.
Additionally, third party providers engaged to provide these services, particularly cloud computing service providers, are also discussed.
According to Article (2) of the Law; Located in the financial sector of the European Union; credit institutions, payment institutions, service providers, electronic money institutions, investment firms, crypto asset service providers, token issuers, central registry institutions, managers of alternative investment funds, data reporting service providers, insurance and reinsurance undertakings, insurance intermediaries, reinsurance intermediaries, credit It includes many sectors such as rating agencies and ICT third-party service providers.
Structure of DORA
DORA, which was put into effect by the European Commission on 13.03.2024, is grouped under 4 headings. There are different sections under each heading.
The law is generally as follows;
1. TITLE 1 GENERAL PRINCIPLES
1.1. Article 1: General risk profile and complexity
2. FURTHER HARMONIZATION OF IT RISK MANAGEMENT TOOLS, METHODS, PROCESSES AND POLICIES IN ACCORDANCE WITH ARTICLE 15 OF THE REGULATION TITLE 2
2.1 Bölüm 1 BT GÜVENLİK POLİTİKALARI, PROTOKOLLERİ, PROTOKOLLERİ VE ARAÇLARI
Section 1
Article 2 General elements of IT security policies, procedures, protocols and tools
Section 2
Article 3 IT risk management
Section 3 ICT ASSET MANAGEMENT
Article 4 IT asset management policy
Article 5 IT asset management procedure
Section 4 ENCRYPTION AND CRYPTOGRAPHY
Article 6 Encryption and cryptographic controls
Article 7 Cryptographic key management
Section 5 ICT OPERATIONS SECURITY
Article 8 Policies and procedures for IT operations
Article 9 Capacity and performance management
Article 10 Vulnerability and patch management
Article 11 Data and system security
Article 12 Logging
Section 6 NETWORK SECURITY
Article 13 Network security management
Article 14 Secure transfer of information
Section 7 IT PROJECT AND CHANGE MANAGEMENT
Article 15 IT Project Management
Article 16 Acquisition, development and maintenance of IT systems
Article 17 IT change management
Section 8
Article 18 Physical and environmental security
2.2 Chapter 2 HUMAN RESOURCES POLICY AND ACCESS CONTROL
Article 19 Human resources policy
Article 20 Identity management
Article 21 Access control
2.3 Chapter 3 DETECTION AND RESPONSE TO IT-RELATED INCIDENTS
Article 22 IT incident management policy
Article 23 Detection of abnormal activities and criteria for detection and response to ICT-related incidents
2.4 Chapter 4 IT BUSINESS CONTINUITY MANAGEMENT
Article 24 Components of IT business continuity policy
Article 25 Testing of IT business continuity plans
Article 26 IT response and recovery plans
2.5 Chapter 5 IT RISK MANAGEMENT FRAMEWORK REVIEW REPORT
Article 27 Format and content of the report on the review of the IT risk management framework
3. SIMPLIFIED IT RISK MANAGEMENT FRAMEWORK FOR FINANCIAL INSTITUTIONS SPECIFIED IN ARTICLE 16(1) OF THE REGULATION TITLE 3
3.1. Chapter 1 SIMPLIFIED ICT RISK MANAGEMENT FRAMEWORK
Article 28 Governance and organization
Article 29 Information security policy and measures
Article 30 Classification of information assets and IT assets
Article 31 IT risk management
Article 32 Physical and environmental security
3.2 Chapter 2 OTHER SYSTEM, PROTOCOL AND TOOL ELEMENTS TO MINIMIZE THE IMPACT OF IT RISK
Article 33 Access control
Article 34 Security of IT operations
Article 35 Data, system and network security
Article 36 IT security testing
Article 37 Acquisition, development and maintenance of IT systems
Article 38 IT project and change management
3.3 Chapter 3 IT BUSINESS CONTINUITY MANAGEMENT
Article 39 Components of IT business continuity policy
Article 40 Testing of IT business continuity plans
3.4 Chapter 4 REPORT ON THE REVIEW OF THE SIMPLIFIED IT RISK MANAGEMENT FRAMEWORK
Article 41 Format and content of the report on the review of the simplified ICT risk management framework
4. TITLE 4 FINAL PROVISIONS
Article 42 Entry into force
“This Regulation shall enter into force on the twentieth day following its publication in the Official Journal of the European Union. This Regulation is fully binding and directly applicable in all Member States.”
What Should Financial Companies Do?
Turkish Finance companies that have offices in European Union countries or provide services to EU countries are required to complete their work for compliance with DORA within the scope of IT by January 17, 2025. Considering the similarity of DORA articles with the ISO 27001 standard; If ISO 27001 ISMS is not operated, the studies will need to be carried out by meeting DORA's requirements. If ISO 27001 ISMS is operated, the existing studies will need to be reviewed and compared with DORA's requirements and the missing points will need to be completed. Although the presence of ISO 27001 within the company facilitates DORA processes, studies can also be carried out independently of ISO 27001.
How Can We Help as Barikat?
As Barikat Cyber Security, we support organizations operating in the financial sector in their compliance processes with the Digital Operational Resilience Act (DORA). We support you in reviewing your organization's current work within the scope of DORA and carrying out the necessary work to comply with the requirements of the law. We also strengthen your operational resilience by increasing the maturity of critical processes such as cyber security and supplier risk management.
As Barikat, we are at your side with our experienced staff to improve your processes in DORA compliance studies. Contact us to review your existing processes and get more detailed information about DORA.
Source: https://www.eiopa.europa.eu/digital-operational-resilience-act-dora_en
More information