The DORA Regulation and its Regulatory Technical Standards (RTS)
A little less than a month before the one-year anniversary of the publication and subsequent entry into force of the DORA Regulation, little by little more details are becoming known about how the subjects bound by the Regulation must prepare themselves to comply with this standard and be able to adapt to its requirements before its applicability, marked as of January 17, 2025. Background Indeed, DORA, the new (or not so new) European Regulation on the digital operational resilience of the financial sector, was born with the idea of responding to the fundamental role in the provision of financial services that the use of information and communication technologies (ICT) has played, acquiring a primary importance in the execution of the typical functions of all financial institutions. DORA aims to achieve a high common level of digital operational resilience within EU financial institutions. The fact of increasing digitization in the financial sector, which leads to greater efficiency for institutions and greater convenience for customers, also implies a number of risks that financial institutions must manage, as this increased digitalization makes these institutions more vulnerable to cyber threats. In an attempt to respond, the DORA Regulation establishes uniform requirements relating to the security of the networks and information systems that underpin the business processes of financial entities. The requirements established by the Regulation can be divided into 6 main areas: 1. Governance of ICT within Financial Institutions. 2. ICT risk management. 3. Third party ICT risk management. 4. Incident management and reporting. 5. Operational resilience testing. 6. Information sharing. However, within all the requirements demanded in the articles of the Regulation, it is emphasized that some of these should be dealt with in a more specific way, which should be developed by the European Supervisory Authorities (ESAs) in a more precise way than the Regulation indicates. What mandate does DORA give to the ESAs regarding risk management? DORA specifically indicates that these ESAs, composed of the European Banking Authority (EBA), the European Insurance and Occupational Pensions Authority (EIOPA), and the European Securities and Markets Authority (ESMA), in consultation with the European Union for Cyber Security (ENISA), will develop common Regulatory Technical Standards (RTS) to specify other elements that are not in the Regulation but that obliged entities must also apply in their organization. This mandate granted to the ESAs by the competent authorities is developed in some articles of the Regulation, so that, focusing on the aspects related to risk management, Articles 15 and 16.3 of DORA, indicate in summary that: Articles 15. Increased harmonization of ICT-related risk management tools, methods, processes and policies The ESAs shall develop technical standards in order to: a) Specify other elements to be included in ICT security policies, procedures protocols and tools; b) Develop new components of access management rights controls; c) Further develop mechanisms to enable early detection of anomalous activity and criteria to trigger ICT incident detection and response processes; d) To further specify the components of the ICT business continuity policy; e) Specify in more detail the testing of ICT business continuity plans; f) Specify in more detail the components of ICT response and recovery plans; g) Further specify the content and format of the report on the review of the ICT risk management framework. These STRs should take into account the size and overall risk profile of the financial institution, as well as the nature, scale and complexity of its services, activities and operations. Article 16.3 Simplified framework for ICT risk management This article applies to certain smaller or less interconnected financial entities, and establishes requirements on: a) Elements to be included in the ICT-related risk management framework; b) Specify in more detail the elements in relation to systems, protocols and tools to minimize the consequences of ICT-related risk; c) Specify in more detail the components of ICT business continuity plans; d) Specify in more detail the standards for testing business continuity plans and ensuring the effectiveness of the controls in place; e) Further specify the content and format of the report on the review of the ICT risk management framework. These RTS will also have to take into account the size and overall risk profile of the financial institution, as well as the nature, scale and complexity of its services, activities and operations. Finally, both Article 15 and Article 16.3 establish January 17, 2024 as the deadline for the submission of these technical standards. Cyber Security Cyber Security strategies to protect the financial sector October 10, 2023 Current status of the Technical Regulatory Standards As we have just mentioned, the submission of the Technical Standards will be made shortly. Even so, the ESAs have been publishing drafts of these standards, which, after having been submitted for consultation, are awaiting their official and definitive presentation. In addition to the above, although in this article we have only referred to the RTS on risk management, it is also expected that other standards will be published to clarify other requirements established by the Regulation. In particular, the Standards to be presented no later than January 17, 2024 will be as follows: ICT Risk Framework. RTS on ICT Risk Management Framework (Art.15) and RTS on Simplified Risk Management Framework (Art.16.3). Classification and notification of ICT-related incidents. RTS on ICT incident classification criteria (Art.18.3) Third-party risk management. ITS for establishing information recording templates (Art.28.9) and RTS for specifying the policy on ICT services performed by third parties (Art.28.10). In summary, the Standards that are expected are those cited below, marking in blue those that will be presented at the beginning of 2024: DORA Compliance and Technical Standards However, after all the above, how should we comply with these Technical Standards? Or more precisely, do we comply only with the Standards, only with the Regulation, or with both? The AES and other competent authorities explicitly state that these Standards must be complied with in addition to the requirements of the Regulation, so all regulated entities must comply with both the obligations of the Regulation and the guidelines developed in the Technical Standards. As the ESAs specifically point out in the publication for consultation on the RTS, “the requirements set out in the standards are complementary to the requirements for the ICT risk management framework already set out in DORA and should therefore be read in conjunction with the related articles of DORA (articles 5-16)”. Conclusion One year after the publication of the Regulation, and with the imminent publication of the first Technical Standards by the ESAs, it will be possible to be in a position to undertake in a robust manner the different actions that each organization must carry out in order to comply with DORA. In this sense, the current moment invites to carry out this adaptation, since there is enough information to undertake it, and, in addition, there is enough time to carry out the necessary actions without the need to reach the date of application of the Regulation without being sufficiently prepared for its compliance. ◾From Govertis, part of Telefónica Tech, we offer the necessary solutions for the obliged entities, establishing the actions in time and form for the adequacy and compliance of DORA, and thus arrive prepared to the key day of application of the Regulation. Cyber Security AI of Things Generative AI as part of business strategy and leadership September 20, 2023
December 18, 2023