DORA Implementation Checklist 1.1
DORA Implementation Checklist 1.1
1.1, 21.10.2024
Company: Date:
2.3. Committees Establish a Risk committee, Audit GIG: 230 f), 45, 60,
39
committee and other necessary
committee (e.g., Cybersecurity, Business
Continuity, Privacy). Collect agendas of
committee meetings and their main
results and conclusions.
management
(3.2.2)
3.3. Digital Plan and Design the ICT RMF. Establish a DORA: art.5.2d,
operational Digital operational resilience strategy, 6.8, 13.4, 8.1
resilience align it with the ICT strategy. RTS on ICT risk
strategy management
framework /
Commission
Delegated
Regulation (EU)
2024/1774
Guidelines on ICT
Risk Assessment
under the SREP
Guidelines on ICT
and security risk
management
Identification
3.5. Roles and Document roles and responsibilities. DORA: art.8.1,
responsibiliti 8.6
es
3.6. Asset Define asset management policy. DORA: art.8.1,
inventory Identify, classify and adequately 8.4, 8.6
document all ICT supported business Guidelines on
functions, the information assets and ICT necessary services
assets supporting those functions.
Annually review and update.
3.7. External Identify and document all processes that DORA: 8.5, 8.6
services are dependent on ICT third-party service RTS to specify
providers. elements when sub-
contracting critical
or important
functions
3.8. ICT Risk Conduct ICT Risk identification and DORA: art.8.2,
assessment assessment. 8.3, 18.2, 13.3
3.9. ICT risk Annually conduct a specific ICT risk DORA: art.8.7
assessment assessment on all legacy ICT systems
on legacy ICT and, in any case before and after
systems connecting technologies, applications or
systems.
Protection and prevention
3.10. ICT Design, procure and implement ICT DORA: art.7,
security security policies, procedures, protocols 9.2, 9.3, 9.4
and tools that aim to ensure the
resilience, continuity and availability of
ICT systems.
Document a Statement of Applicability
(SoA), if needed.
3.11. Monitor Organise continuously monitoring and DORA: art.9.1
and control control of the security and functioning of
ICT systems.
Detection
6.3. Notifying the Be ready to report at least yearly to the DORA: art.28.3
authority competent authorities on the number of
about service new arrangements on the use of ICT
providers services, the categories of ICT third-party
service providers, the type of contractual
arrangements and the ICT services and
functions which are being provided. Be
ready to provide the full register.
Inform the competent authority in a
timely manner about any planned
contractual arrangement on the use of
ICT services supporting critical or
important functions as well as when a
function has become critical or
important.
6.4. Contractual Ensure that the contractual agreements DORA: art.28.3-
agreements contain the necessary provisions. Create 28.8, 29, 30
templates and checklists. Integrate RTS to specify
checks into the purchasing process. elements when sub-
Review the current contracts. contracting critical
or important
functions
6.5. Exit Prepare exit strategies for ICT services DORA: art.28.8
strategies supporting critical or important function.
6.6. Due Integrate an extended Due Diligence DORA: art.28.4,
Diligence procedure into the purchasing process. 28.5, 29.1
Identify and assess risks.
6.7. Third-party Regularly review the risks identified in DORA: art.28.2
risk review respect to contractual arrangements on
by the the use of ICT services supporting critical
management or important functions.
body
6.8. Monitoring of Monitor, on an ongoing basis, the ICT RTS to specify the
policy on ICT
the third- party service provider’s
services
contractual performance.
arrangement
s
7. Information-sharing arrangements
7.1. Threat Exchange cyber threat information and DORA: art.45,
information intelligence with other financial entities, 19.2
exchange authorities and CSIRTs, on a voluntary
basis.
Document information-sharing
arrangements if needed.
Notify the competent authorities of the
participation in the information-sharing
arrangements (e.g., membership).
8. Final tasks
8.1. ICT RMF Annually review the ICT RMF. Be ready to DORA: art.6.5,
review submit a report to the competent 13.4, 13.5
authority upon its request.
Statuses:
In progress (MI) In progress (PI)
Not Applicable To Do [Minimally implemented, [Partially Implemented, Done
30%] 70%]