GRCA Planeth
You are not logged in
Login
Change Design (current Design: automatic)
Change Design (current Design: light)
Change Design (current Design: dark)
Start
Sources
›
REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
›
Regulation - DORA Ch. I General provisions
+DORA Ch. I General provisions
---+DORA Ch. I Art. 1 Subject matter
------+DORA Ch. I Art. 1 1.
------+DORA Ch. I Art. 1 2.
------+DORA Ch. I Art. 1 3.
---+DORA Ch. I Art. 2 Scope
------+DORA Ch. I Art. 2 1.
------+DORA Ch. I Art. 2 2.
------+DORA Ch. I Art. 2 3.
------+DORA Ch. I Art. 2 4.
---+DORA Ch. I Art. 3 Definitions
------+DORA Ch. I Art. 3 1. digital operational resilience
------+DORA Ch. I Art. 3 2.
------+DORA Ch. I Art. 3 3.
------+DORA Ch. I Art. 3 4.
------+DORA Ch. I Art. 3 5.
------+DORA Ch. I Art. 3 6.
------+DORA Ch. I Art. 3 7.
------+DORA Ch. I Art. 3 8.
------+DORA Ch. I Art. 3 9. operational or security payment-related incident
------+DORA Ch. I Art. 3 10. major ICT-related incident
------+DORA Ch. I Art. 3 11. major operational or security payment-related incident
------+DORA Ch. I Art. 3 12.
------+DORA Ch. I Art. 3 13.
------+DORA Ch. I Art. 3 14. cyber-attack
------+DORA Ch. I Art. 3 15. threat intelligence
------+DORA Ch. I Art. 3 16.
------+DORA Ch. I Art. 3 17. threat-led penetration testing (TLPT)
------+DORA Ch. I Art. 3 18. ICT third-party risk
------+DORA Ch. I Art. 3 19.
------+DORA Ch. I Art. 3 20.
------+DORA Ch. I Art. 3 21.
------+DORA Ch. I Art. 3 22. critical or important function
------+DORA Ch. I Art. 3 23. critical ICT third-party service provider
------+DORA Ch. I Art. 3 24. ICT third-party service provider established in a third country
------+DORA Ch. I Art. 3 25.
------+DORA Ch. I Art. 3 26.
------+DORA Ch. I Art. 3 27.
------+DORA Ch. I Art. 3 28. ICT subcontractor established in a third country
------+DORA Ch. I Art. 3 29.
------+DORA Ch. I Art. 3 30.
------+DORA Ch. I Art. 3 31.
------+DORA Ch. I Art. 3 32.
------+DORA Ch. I Art. 3 33.
------+DORA Ch. I Art. 3 34.
------+DORA Ch. I Art. 3 35.
------+DORA Ch. I Art. 3 36.
------+DORA Ch. I Art. 3 37.
------+DORA Ch. I Art. 3 38.
------+DORA Ch. I Art. 3 39.
------+DORA Ch. I Art. 3 40.
------+DORA Ch. I Art. 3 41.
------+DORA Ch. I Art. 3 42.
------+DORA Ch. I Art. 3 43.
------+DORA Ch. I Art. 3 44.
------+DORA Ch. I Art. 3 45.
------+DORA Ch. I Art. 3 46.
------+DORA Ch. I Art. 3 47.
------+DORA Ch. I Art. 3 48.
------+DORA Ch. I Art. 3 49.
------+DORA Ch. I Art. 3 50.
------+DORA Ch. I Art. 3 51.
------+DORA Ch. I Art. 3 52.
------+DORA Ch. I Art. 3 53.
------+DORA Ch. I Art. 3 54.
------+DORA Ch. I Art. 3 55. crypto-asset service provider
------+DORA Ch. I Art. 3 56. issuer of asset-referenced tokens
------+DORA Ch. I Art. 3 57.
------+DORA Ch. I Art. 3 58.
------+DORA Ch. I Art. 3 59.
------+DORA Ch. I Art. 3 60.
------+DORA Ch. I Art. 3 61.
------+DORA Ch. I Art. 3 62.
------+DORA Ch. I Art. 3 63.
------+DORA Ch. I Art. 3 64.
------+DORA Ch. I Art. 3 65.
---+DORA Ch. I Art. 4 Proportionality principle
------+DORA Ch. I Art. 4 1.
------+DORA Ch. I Art. 4 2.
------+DORA Ch. I Art. 4 3.
---+DORA Ch. II ICT risk management
------+DORA Ch. II Sec. I Art. 5 Governance and organisation
---------+DORA Ch. II Sec. I Art. 5 1.
---------+DORA Ch. II Sec. I Art. 5 2.
---------+DORA Ch. II Sec. I Art. 5 3.
---------+DORA Ch. II Sec. I Art. 5 4.
------+DORA Ch. II Sec. II Art. 6 ICT risk management framework
---------+DORA Ch. II Sec. II Art. 6 1.
---------+DORA Ch. II Sec. II Art. 6 2.
---------+DORA Ch. II Sec. II Art. 6 3.
---------+DORA Ch. II Sec. II Art. 6 4.
---------+DORA Ch. II Sec. II Art. 6 5.
---------+DORA Ch. II Sec. II Art. 6 6.
---------+DORA Ch. II Sec. II Art. 6 7.
---------+DORA Ch. II Sec. II Art. 6 8.
---------+DORA Ch. II Sec. II Art. 6 9.
---------+DORA Ch. II Sec. II Art. 6 10.
------+DORA Ch. II Sec. II Art. 7 ICT systems, protocols and tools
------+DORA Ch. II Sec. II Art. 8 Identification
---------+DORA Ch. II Sec. II Art. 8 1.
---------+DORA Ch. II Sec. II Art. 8 2.
---------+DORA Ch. II Sec. II Art. 8 3.
---------+DORA Ch. II Sec. II Art. 8 4.
---------+DORA Ch. II Sec. II Art. 8 5.
---------+DORA Ch. II Sec. II Art. 8 6.
---------+DORA Ch. II Sec. II Art. 8 7.
------+DORA Ch. II Sec. II Art. 9 Protection and prevention
---------+DORA Ch. II Sec. II Art. 9 1.
---------+DORA Ch. II Sec. II Art. 9 2.
---------+DORA Ch. II Sec. II Art. 9 3.
---------+DORA Ch. II Sec. II Art. 9 4.
------+DORA Ch. II Sec. II Art. 10 Detection
---------+DORA Ch. II Sec. II Art. 10 1.
---------+DORA Ch. II Sec. II Art. 10 2.
---------+DORA Ch. II Sec. II Art. 10 3.
---------+DORA Ch. II Sec. II Art. 10 4.
------+DORA Ch. II Sec. II Art. 11 Response and recovery
---------+DORA Ch. II Sec. II Art. 11 1.
---------+DORA Ch. II Sec. II Art. 11 2.
---------+DORA Ch. II Sec. II Art. 11 3.
---------+DORA Ch. II Sec. II Art. 11 4.
---------+DORA Ch. II Sec. II Art. 11 5.
---------+DORA Ch. II Sec. II Art. 11 6.
---------+DORA Ch. II Sec. II Art. 11 7.
---------+DORA Ch. II Sec. II Art. 11 8.
---------+DORA Ch. II Sec. II Art. 11 9.
---------+DORA Ch. II Sec. II Art. 11 10.
---------+DORA Ch. II Sec. II Art. 11 11.
------+DORA Ch. II Sec. II Art. 12 Backup policies and procedures, restoration and recovery procedures and methods
---------+DORA Ch. II Sec. II Art. 12 1.
---------+DORA Ch. II Sec. II Art. 12 2.
---------+DORA Ch. II Sec. II Art. 12 3.
---------+DORA Ch. II Sec. II Art. 12 4.
---------+DORA Ch. II Sec. II Art. 12 5.
---------+DORA Ch. II Sec. II Art. 12 6.
---------+DORA Ch. II Sec. II Art. 12 7.
------+DORA Ch. II Sec. II Art. 13 Learning and evolving
---------+DORA Ch. II Sec. II Art. 13 1.
---------+DORA Ch. II Sec. II Art. 13 2.
---------+DORA Ch. II Sec. II Art. 13 3.
---------+DORA Ch. II Sec. II Art. 13 4.
---------+DORA Ch. II Sec. II Art. 13 5.
---------+DORA Ch. II Sec. II Art. 13 6.
---------+DORA Ch. II Sec. II Art. 13 7.
------+DORA Ch. II Sec. II Art. 14 Communication
---------+DORA Ch. II Sec. II Art. 14 1.
---------+DORA Ch. II Sec. II Art. 14 2.
---------+DORA Ch. II Sec. II Art. 14 3.
------+DORA Ch. II Sec. II Art. 15 Further harmonisation of ICT risk management tools, methods, processes and policies
------+DORA Ch. II Sec. II Art. 16 Simplified ICT risk management framework
---------+DORA Ch. II Sec. II Art. 16 1.
---------+DORA Ch. II Sec. II Art. 16 2.
---------+DORA Ch. II Sec. II Art. 16 3.
------+DORA Ch. III ICT-related incident management, classification and reporting
---------+DORA Ch. III Art. 17 ICT-related incident management process
------------+DORA Ch. III Art. 17 1.
------------+DORA Ch. III Art. 17 2.
------------+DORA Ch. III Art. 17 3.
---------+DORA Ch. III Art. 18 Classification of ICT-related incidents and cyber threats
------------+DORA Ch. III Art. 18 1.
------------+DORA Ch. III Art. 18 2.
------------+DORA Ch. III Art. 18 3.
------------+DORA Ch. III Art. 18 4.
---------+DORA Ch. III Art. 19 Reporting of major ICT-related incidents and voluntary notification of significant cyber threats
------------+DORA Ch. III Art. 19 1.
------------+DORA Ch. III Art. 19 2.
------------+DORA Ch. III Art. 19 3.
------------+DORA Ch. III Art. 19 4.
------------+DORA Ch. III Art. 19 5.
------------+DORA Ch. III Art. 19 6.
------------+DORA Ch. III Art. 19 7.
------------+DORA Ch. III Art. 19 8.
---------+DORA Ch. III Art. 20 Harmonisation of reporting content and templates
---------+DORA Ch. III Art. 21 Centralisation of reporting of major ICT-related incidents
------------+DORA Ch. III Art. 21 1.
------------+DORA Ch. III Art. 21 2.
------------+DORA Ch. III Art. 21 3.
---------+DORA Ch. III Art. 22 Supervisory feedback
------------+DORA Ch. III Art. 22 1.
------------+DORA Ch. III Art. 22 2.
---------+DORA Ch. III Art. 23 Operational or security payment-related incidents concerning credit institutions, payment institutions, account information service providers, and electronic money institutions
1. Overview
DORA Ch. I General provisions
General provisions
Summary
Regulation
DORA Ch. I Art. 1 Subject matter
Subject matter
DORA Ch. I Art. 2 Scope
Scope
DORA Ch. I Art. 3 Definitions
DefinitionsFor the purposes of this Regulation, the following definitions shall apply:
DORA Ch. I Art. 4 Proportionality principle
Proportionality principle
DORA Ch. II ICT risk management
ICT risk management
1.1 References
1.2 Identified Requirements
1.3 Related Standards
2. Identified Requirements
Requirements
Source
Requirement
3. Related Standards
Standards
Source
Requirement
DORA
-
DORA
Impressum