+DORA Ch. II Sec. II Art. 6 6.

1. Overview

DORA Ch. II Sec. II Art. 6 6.

6.   The ICT risk management framework of financial entities, other than microenterprises, shall be subject to internal audit by auditors on a regular basis in line with the financial entities’ audit plan. Those auditors shall possess sufficient knowledge, skills and expertise in ICT risk, as well as appropriate independence. The frequency and focus of ICT audits shall be commensurate to the ICT risk of the financial entity.
Summary Regulation

1.1 References

1.2 Identified Requirements

1.3 Related Standards

2. Identified Requirements

Requirements
Source Requirement

3. Related Standards

Standards
Source Requirement
NOREA Audit approach and frequency

The Internal audit department shall conduct audits on the following domains:

  • Risk management framework, policies, related processes, and procedures
  • ICT Response and recovery plans
  • ICT Third-party service providers

Adjust audit frequency and focus based on the entity's ICT risk profile.

NOREA Auditor requirements

Ensure that the internal audit staff possess sufficient ICT risk knowledge, skills, and expertise to perform the audits. Also, ensure the independence of the audit function.

NOREA Audit findings

Establish a follow-up process for audit findings, including rules for timely verification and remediation of critical findings. Maintain a continuous learning and improvement process based on risk assessment results, resilience testing, (cyber) incidents, and testing of business continuity plans. The results of this process shall be reported to the management body and is input for the yearly “Report on the ICT risk management framework review” as stated in Chapter 5 (Article 27) of RTS RM.

NOREA Reliance Third-Party Assurance and Certifications

Use, where appropriate, third-party certifications, third-party or internal audit reports made available by the ICT third-party service provider, or own audit reports to confirm adherence of contractual requirements on information access, inspection, audit, and ICT testing with the third-party. Rely on third-party certifications and audit reports from ICT third-party service providers only if the following specific conditions are met: the audit plan is aligned with contractual arrangements, the audit scope is comprehensive and covers identified systems and key controls, ongoing assessment of certification/report content are performed and validated, key systems and controls are covered in future versions of the certification or audit report, there is confidence in the certifying/auditing party's capabilities, certifications/audits adhere to recognized professional standards, the right to request scope expansion is covered in the contract, and right to perform discretionary audits is retained.

Impressum