+DORA Ch. I General provisions
---+DORA Ch. I Art. 1 Subject matter
------+DORA Ch. I Art. 1 1.
------+DORA Ch. I Art. 1 2.
------+DORA Ch. I Art. 1 3.
---+DORA Ch. I Art. 2 Scope
------+DORA Ch. I Art. 2 1.
------+DORA Ch. I Art. 2 2.
------+DORA Ch. I Art. 2 3.
------+DORA Ch. I Art. 2 4.
---+DORA Ch. I Art. 3 Definitions
------+DORA Ch. I Art. 3 1. digital operational resilience
------+DORA Ch. I Art. 3 2.
------+DORA Ch. I Art. 3 3.
------+DORA Ch. I Art. 3 4.
------+DORA Ch. I Art. 3 5.
------+DORA Ch. I Art. 3 6.
------+DORA Ch. I Art. 3 7.
------+DORA Ch. I Art. 3 8.
------+DORA Ch. I Art. 3 9. operational or security payment-related incident
------+DORA Ch. I Art. 3 10. major ICT-related incident
------+DORA Ch. I Art. 3 11. major operational or security payment-related incident
------+DORA Ch. I Art. 3 12.
------+DORA Ch. I Art. 3 13.
------+DORA Ch. I Art. 3 14. cyber-attack
------+DORA Ch. I Art. 3 15. threat intelligence
------+DORA Ch. I Art. 3 16.
------+DORA Ch. I Art. 3 17. threat-led penetration testing (TLPT)
------+DORA Ch. I Art. 3 18. ICT third-party risk
------+DORA Ch. I Art. 3 19.
------+DORA Ch. I Art. 3 20.
------+DORA Ch. I Art. 3 21.
------+DORA Ch. I Art. 3 22. critical or important function
------+DORA Ch. I Art. 3 23. critical ICT third-party service provider
------+DORA Ch. I Art. 3 24. ICT third-party service provider established in a third country
------+DORA Ch. I Art. 3 25.
------+DORA Ch. I Art. 3 26.
------+DORA Ch. I Art. 3 27.
------+DORA Ch. I Art. 3 28. ICT subcontractor established in a third country
------+DORA Ch. I Art. 3 29.
------+DORA Ch. I Art. 3 30.
------+DORA Ch. I Art. 3 31.
------+DORA Ch. I Art. 3 32.
------+DORA Ch. I Art. 3 33.
------+DORA Ch. I Art. 3 34.
------+DORA Ch. I Art. 3 35.
------+DORA Ch. I Art. 3 36.
------+DORA Ch. I Art. 3 37.
------+DORA Ch. I Art. 3 38.
------+DORA Ch. I Art. 3 39.
------+DORA Ch. I Art. 3 40.
------+DORA Ch. I Art. 3 41.
------+DORA Ch. I Art. 3 42.
------+DORA Ch. I Art. 3 43.
------+DORA Ch. I Art. 3 44.
------+DORA Ch. I Art. 3 45.
------+DORA Ch. I Art. 3 46.
------+DORA Ch. I Art. 3 47.
------+DORA Ch. I Art. 3 48.
------+DORA Ch. I Art. 3 49.
------+DORA Ch. I Art. 3 50.
------+DORA Ch. I Art. 3 51.
------+DORA Ch. I Art. 3 52.
------+DORA Ch. I Art. 3 53.
------+DORA Ch. I Art. 3 54.
------+DORA Ch. I Art. 3 55. crypto-asset service provider
------+DORA Ch. I Art. 3 56. issuer of asset-referenced tokens
------+DORA Ch. I Art. 3 57.
------+DORA Ch. I Art. 3 58.
------+DORA Ch. I Art. 3 59.
------+DORA Ch. I Art. 3 60.
------+DORA Ch. I Art. 3 61.
------+DORA Ch. I Art. 3 62.
------+DORA Ch. I Art. 3 63.
------+DORA Ch. I Art. 3 64.
------+DORA Ch. I Art. 3 65.
---+DORA Ch. I Art. 4 Proportionality principle
------+DORA Ch. I Art. 4 1.
------+DORA Ch. I Art. 4 2.
------+DORA Ch. I Art. 4 3.
---+DORA Ch. II ICT risk management
------+DORA Ch. II Sec. I Art. 5 Governance and organisation
---------+DORA Ch. II Sec. I Art. 5 1.
---------+DORA Ch. II Sec. I Art. 5 2.
---------+DORA Ch. II Sec. I Art. 5 3.
---------+DORA Ch. II Sec. I Art. 5 4.
------+DORA Ch. II Sec. II Art. 6 ICT risk management framework
---------+DORA Ch. II Sec. II Art. 6 1.
---------+DORA Ch. II Sec. II Art. 6 2.
---------+DORA Ch. II Sec. II Art. 6 3.
---------+DORA Ch. II Sec. II Art. 6 4.
---------+DORA Ch. II Sec. II Art. 6 5.
---------+DORA Ch. II Sec. II Art. 6 6.
---------+DORA Ch. II Sec. II Art. 6 7.
---------+DORA Ch. II Sec. II Art. 6 8.
---------+DORA Ch. II Sec. II Art. 6 9.
---------+DORA Ch. II Sec. II Art. 6 10.
------+DORA Ch. II Sec. II Art. 7 ICT systems, protocols and tools
------+DORA Ch. II Sec. II Art. 8 Identification
---------+DORA Ch. II Sec. II Art. 8 1.
---------+DORA Ch. II Sec. II Art. 8 2.
---------+DORA Ch. II Sec. II Art. 8 3.
---------+DORA Ch. II Sec. II Art. 8 4.
---------+DORA Ch. II Sec. II Art. 8 5.
---------+DORA Ch. II Sec. II Art. 8 6.
---------+DORA Ch. II Sec. II Art. 8 7.
------+DORA Ch. II Sec. II Art. 9 Protection and prevention
---------+DORA Ch. II Sec. II Art. 9 1.
---------+DORA Ch. II Sec. II Art. 9 2.
---------+DORA Ch. II Sec. II Art. 9 3.
---------+DORA Ch. II Sec. II Art. 9 4.
------+DORA Ch. II Sec. II Art. 10 Detection
---------+DORA Ch. II Sec. II Art. 10 1.
---------+DORA Ch. II Sec. II Art. 10 2.
---------+DORA Ch. II Sec. II Art. 10 3.
---------+DORA Ch. II Sec. II Art. 10 4.
------+DORA Ch. II Sec. II Art. 11 Response and recovery
---------+DORA Ch. II Sec. II Art. 11 1.
---------+DORA Ch. II Sec. II Art. 11 2.
---------+DORA Ch. II Sec. II Art. 11 3.
---------+DORA Ch. II Sec. II Art. 11 4.
---------+DORA Ch. II Sec. II Art. 11 5.
---------+DORA Ch. II Sec. II Art. 11 6.
---------+DORA Ch. II Sec. II Art. 11 7.
---------+DORA Ch. II Sec. II Art. 11 8.
---------+DORA Ch. II Sec. II Art. 11 9.
---------+DORA Ch. II Sec. II Art. 11 10.
---------+DORA Ch. II Sec. II Art. 11 11.
------+DORA Ch. II Sec. II Art. 12 Backup policies and procedures, restoration and recovery procedures and methods
---------+DORA Ch. II Sec. II Art. 12 1.
---------+DORA Ch. II Sec. II Art. 12 2.
---------+DORA Ch. II Sec. II Art. 12 3.
---------+DORA Ch. II Sec. II Art. 12 4.
---------+DORA Ch. II Sec. II Art. 12 5.
---------+DORA Ch. II Sec. II Art. 12 6.
---------+DORA Ch. II Sec. II Art. 12 7.
------+DORA Ch. II Sec. II Art. 13 Learning and evolving
---------+DORA Ch. II Sec. II Art. 13 1.
---------+DORA Ch. II Sec. II Art. 13 2.
---------+DORA Ch. II Sec. II Art. 13 3.
---------+DORA Ch. II Sec. II Art. 13 4.
---------+DORA Ch. II Sec. II Art. 13 5.
---------+DORA Ch. II Sec. II Art. 13 6.
---------+DORA Ch. II Sec. II Art. 13 7.
------+DORA Ch. II Sec. II Art. 14 Communication
---------+DORA Ch. II Sec. II Art. 14 1.
---------+DORA Ch. II Sec. II Art. 14 2.
---------+DORA Ch. II Sec. II Art. 14 3.
------+DORA Ch. II Sec. II Art. 15 Further harmonisation of ICT risk management tools, methods, processes and policies
------+DORA Ch. II Sec. II Art. 16 Simplified ICT risk management framework
---------+DORA Ch. II Sec. II Art. 16 1.
---------+DORA Ch. II Sec. II Art. 16 2.
---------+DORA Ch. II Sec. II Art. 16 3.
------+DORA Ch. III ICT-related incident management, classification and reporting
---------+DORA Ch. III Art. 17 ICT-related incident management process
------------+DORA Ch. III Art. 17 1.
------------+DORA Ch. III Art. 17 2.
------------+DORA Ch. III Art. 17 3.
---------+DORA Ch. III Art. 18 Classification of ICT-related incidents and cyber threats
------------+DORA Ch. III Art. 18 1.
------------+DORA Ch. III Art. 18 2.
------------+DORA Ch. III Art. 18 3.
------------+DORA Ch. III Art. 18 4.
---------+DORA Ch. III Art. 19 Reporting of major ICT-related incidents and voluntary notification of significant cyber threats
------------+DORA Ch. III Art. 19 1.
------------+DORA Ch. III Art. 19 2.
------------+DORA Ch. III Art. 19 3.
------------+DORA Ch. III Art. 19 4.
------------+DORA Ch. III Art. 19 5.
------------+DORA Ch. III Art. 19 6.
------------+DORA Ch. III Art. 19 7.
------------+DORA Ch. III Art. 19 8.
---------+DORA Ch. III Art. 20 Harmonisation of reporting content and templates
---------+DORA Ch. III Art. 21 Centralisation of reporting of major ICT-related incidents
------------+DORA Ch. III Art. 21 1.
------------+DORA Ch. III Art. 21 2.
------------+DORA Ch. III Art. 21 3.
---------+DORA Ch. III Art. 22 Supervisory feedback
------------+DORA Ch. III Art. 22 1.
------------+DORA Ch. III Art. 22 2.
---------+DORA Ch. III Art. 23 Operational or security payment-related incidents concerning credit institutions, payment institutions, account information service providers, and electronic money institutions

1. Overview

DORA Ch. I General provisions

General provisions
Summary Regulation
DORA Ch. I Art. 1 Subject matter Subject matter
DORA Ch. I Art. 2 Scope Scope
DORA Ch. I Art. 3 Definitions DefinitionsFor the purposes of this Regulation, the following definitions shall apply:
DORA Ch. I Art. 4 Proportionality principle Proportionality principle
DORA Ch. II ICT risk management ICT risk management

1.1 References

1.2 Identified Requirements

1.3 Related Standards

2. Identified Requirements

Requirements
Source Requirement

3. Related Standards

Standards
Source Requirement
Impressum