Preparing for DORA: What you need to know

EU financial entities must comply with DORA requirements by 2025. Here’s what you need to know about these new, stringent security regulations.

The Digital Operational Resilience Act (DORA) is an EU regulation designed to improve the security of financial entities’ information and communication technology (ICT).

The legislation aims to ensure the European financial sector can withstand severe digital disruption, which might result from concerted nation-state attacks. While DORA comes into full force on January 17, 2025, organizations should take steps to prepare in advance.

This robust regulation covers over twenty different types of financial organizations and third parties that provide information technology services to financial organizations. Although it is only legally binding in the EU, DORA is so comprehensive and far-reaching that its effects will be felt across the global financial sector.

Critical DORA requirements, and their related technologies:

DORA regulations include detailed sections that cover the following:

  • Risk management: Chapter II, Section II, Articles 8, 9, 11, and 13 require financial institutions to create risk management frameworks and make specific provisions for the identification of risks, protection and prevention measures, response and recovery plans, and strategies for learning and evolving defenses.
  • Incident management and reporting: Chapter III, Section I, Article 18 requires institutions to classify incidents for reporting and determine their impact based on a range of criteria.
  • Operational resilience testing: Chapter IV, Section I, Articles 24-26 require financial institutions to implement digital operational resilience testing programs to assess their ability to withstand, respond to, and recover from incidents’ impacts.

Here are the key tools and processes to consider when preparing for compliance for these three elements of DORA legislation.

Create a risk management framework

Building a risk management framework will help you to continuously manage exposure with a structured program. Adopt a Continuous Exposure Management (CEM) platform to map the entire attack surface, identify and prioritize the highest-risk vulnerabilities and threats, and mobilize action to combat the highest-priority exposures.

A CEM solution is a foundational part of your risk management framework and delivers integrated attack surface management, network security policy management, and vulnerability and threat management.

Visualize the attack surface

Use a Cyber Asset Attack Surface Management (CAASM) tool to compile and maintain a complete inventory of every asset

The best solutions visualize the attack surface as a network model of the entire network, on-premise and in the cloud, including network routes and rules, firewall access, connections to the Internet, and partner networks.

Perform network risk assessments

Use a Network Security Policy Management (NSPM) solution to run risk assessments without directly impacting the live network. Adopt this approach to see the effects of network zoning or firewall access changes, run access and exposure analysis queries, and gain insights into security exposures and attack paths in a safe, sandboxed environment.

Prevent cyberattacks from spreading

Use the NSPM solution to analyze network routes and rules and instantly identify the relevant “kill switches” to isolate assets or network segments.
The best solutions will automatically shut down access automatically should certain triggers suggest that an attack is in progress.

Respond to security vulnerabilities

Prepare for compliance using a Vulnerability and Threat Management (VTM) solution. Use a good VTM solution to prioritize the vulnerabilities that matter most to your business based on severity, exploitability, business asset importance, and exposure across the network.

Since it is impossible to patch all vulnerabilities immediately, look for a VTM solution that prescribes alternative controls, such as a firewall change or the application of an IPS signature that mitigates the risk until a patch can be deployed.

Learn from risks and evolve defenses

With so many separate sources of threat intelligence and scanning data, it is a challenge to understand how risks are evolving in the wild.

Get to a single source of truth by aggregating the scan data and threat intelligence results. This way your team can instantly see when and where a new vulnerability or threat could impact organizational resilience and what the most significant risks are to your organization.

This approach also assesses exposure for those assets that are air-gapped or cannot be scanned regularly without negatively impacting network and business performance.

Manage and report incidents

A fundamental prerequisite to reporting incidents accurately is a comprehensive understanding of the estate’s assets and their importance to the business. Prepare for compliance by building an asset inventory that records:

  • Geographic location and ownership
  • Importance to the business expressed in both relative and absolute monetary terms
  • Compliance status
  • Technical metadata such as operating systems, patches, and any vulnerabilities

Consider using Cyber Risk Quantification (CRQ) to express the cyber security risk for a given asset in quantitative financial terms to help with reporting direct and indirect loss and economic impact.

Test operational resilience

Using network modeling and visualization makes it easier to test operational resilience on an as-needed basis by testing the model rather than the live network. Look for solutions that help you run attack simulations and analyze attack paths between any two points across the network to understand how security controls protect vital assets.

Using a VTM solution, analyze the organization’s ability to withstand attacks using a risk-based approach that combines factors such as:

  • CVE severity
  • Exploitability in the wild
  • Business asset importance
  • Exposure to attack across the network

Conclusion

Implementing compliance with DORA’s requirements for risk management, incident management and reporting, and operational resilience testing is a substantial undertaking.

Use a CEM platform (that combines attack surface management, network security policy management, and vulnerability and threat management solutions) to comply with DORA’s requirements and manage the organization’s operational cyber resilience.

Continuous Exposure Management technologies that enable you to meet DORA regulations:

  • Modeling and visualization
  • Attack surface management
  • Network security policy management
  • Vulnerability and threat management
  • Attack simulation
  • Attack path analysis
  • Cyber risk quantification

Learn how Skybox helps you comply with DORA’s risk management, incident management, and resilience testing requirements: