Understanding the Fourth Chapter of DORA

The fourth chapter of the Digital Operational Resilience Act (DORA) is designed to ensure that financial entities can withstand, respond to, and recover from all types of ICT-related disruptions and threats. Chapter 4 of DORA, titled “Information and Communication Technology (ICT) Risk Management,” is particularly critical as it lays out detailed requirements for the ICT risk management framework that financial entities must implement.

Overview

Chapter 4 of DORA mandates that financial entities establish and maintain robust ICT risk management frameworks. These frameworks should be integrated into the overall risk management system of the entity and should address all ICT-related risks comprehensively. The chapter outlines several key components that these frameworks must encompass:

  1. Governance and Organisational Structure
  2. ICT Risk Management Process
  3. Information Security Requirements
  4. ICT Incident Management, Classification, and Reporting
  5. Digital Operational Resilience Testing
  6. Management of ICT Third-Party Risk

Each of these components is designed to ensure a comprehensive approach to managing ICT risks, emphasising both preventative and reactive measures.

 

Governance and Organisational Structure

Implication: Financial entities must have a clear governance and organisational framework where ICT risk management is integrated at all levels in the organisation. This includes assigning specific roles and responsibilities for ICT risk management.

CRMG Recommendation: Effective governance and organisational structure are interdependent. A well-defined organisational structure supports good governance by providing assurance that roles and responsibilities have been clarified, ensuring accountability, and providing the most effective environment for effective decision-making.

 

ICT Risk Management Process

Implication: Entities need to identify, assess, monitor, and manage ICT risks continuously. This requires a systematic process that is well-documented and regularly reviewed.

CRMG Recommendation: Implementing a consistent approach to ICT risk management throughout the organisation, especially one that directly links threats to controls, will enable the organisation to understand, prioritise and address the relevant ICT risks.

 

Information Security Requirements

Implication: Ensuring the confidentiality, integrity, and availability of information and ICT systems is crucial. This includes implementing robust cyber security measures and maintaining a secure ICT environment.

CRMG Recommendation:  By focusing on these three attributes of information when implementing cyber security measures, organisations are in a better position to protect their data from unauthorised access, fraud, and also ensure it is available when required.

 

ICT Incident Management, Classification, and Reporting

Implication: Financial entities must have procedures to detect, manage, and report ICT incidents promptly. This includes classifying incidents based on their severity and impact.

CRMG Recommendation: Detecting potential incidents early, and prioritising responses so that the most critical incidents receive immediate attention are techniques that will help organisations utilise their resources to deal with ICT incidents as efficiently as possible.

 

Digital Operational Resilience Testing

Implication: Entities are required to perform regular resilience testing to ensure their ICT systems can survive various types of disruptions. This includes vulnerability assessments, penetration testing, and other forms of resilience testing.

CRMG Recommendation:  Regular resilience testing includes a wide range of techniques such as Disaster Recovery Testing, Load Testing, Failover Testing and Incident Response Testing. Threat-Led Penetration Testing (TLPT) is a particular area of focus under DORA as certain financial entities are required to conduct TLPT at least every three years to ensure their ICT systems can withstand sophisticated cyber threats.

 

Management of ICT Third-Party Risk

Implication: Managing risks associated with third-party ICT service providers is critical. Financial entities must ensure that their third-party providers adhere to the same high standards of ICT risk management as their own.

CRMG Recommendation: Third parties and the contracting financial entity must work very closely together to ensure the requirements of DORA are met and that all information for the Lead Overseer is available when they conduct off-site investigations, on-site inspections, and continuous monitoring.

 

By mandating standardised procedures and regular assessments, DORA aims to enhance the overall resilience of the financial sector against digital threats. Chapter 4 of DORA provides a comprehensive framework for managing ICT risks in the financial sector.

The practical implications and recommendations discussed in this article aim to guide financial entities in implementing effective ICT risk management frameworks, ensuring not only compliance with DORA but also the security and stability of their operations in an increasingly digital world.

Meet Our Leadership Team.

At CRMG, our senior leadership team brings a rich history and deep expertise in cyber security. Spearheaded by consultants who are influential figures in the industry, our leaders are highly networked and well-established, with backgrounds in the ‘Big- Four’ firms.

LEARN MORE

Simon Rycroft

CO-FOUNDER AND CEO

Former Head of Consulting at the ISF. On a journey to bring accessible risk management to growing enterprises.

Nick Frost

CO-FOUNDER AND CHIEF PRODUCT OFFICER

Former Group Head of Information Risk, PwC. Motivated by the need to implement cyber risk principles for the real world!

Dan Rycroft

DELIVERY DIRECTOR

Former Head of Delivery, Cyber Security at DXC. Delivers risk-based cyber security programmes with maximum efficiency.

Matt Brett

DELIVERY LEAD – CYBER RISK SOLUTIONS

Former Portfolio Director, Tech Security & Risk, GSK. Specialises in implementing efficient, pragmatic cyber risk solutions.

Martin Tully

DELIVERY LEAD – GOVERNANCE AND COMPLIANCE

Twenty years’ experience in delivering fit-for-purpose cyber governance initiatives.

Louis Head

CONSULTANT – GOVERNANCE AND COMPLIANCE

An expert in everything ISMS-related, and how compliance works in practice.

Guy Asch

COMMERCIAL DIRECTOR

A seasoned Commercial Director, driving P&L business leadership through innovative strategies.

Ryan Hides

DELIVERY LEAD – THIRD PARTY RISK MANAGEMENT

Project Management and Six Sigma expertise. Specialises in turning effective third party risk management into a scalable reality.

Sarrah Ahmed

HEAD OF MARKETING

Bringing over 17+ years of marketing expertise, passionate about crafting innovative marketing campaigns.