Key Terms
- Digital operational resilience
- The ability of a financial entity to build, assure and review its operational integrity and reliability by ensuring, directly or indirectly through the use of ICT third-party service providers, the full range of ICT-related capabilities needed to address the security of network and information systems [Art. 3(1)].
- ICT risk
- Any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology-dependent tool or process, of operations and processes, or of the provision of services, thereby adversely affecting the integrity or availability of data, software or any other component of ICT services and infrastructures, or causing a breach of confidentiality or damage to physical ICT infrastructure [Art. 3(5)].
- ICT-related incident
- A single event or a series of linked events unplanned by the financial entity that compromises the security of the network and information systems, and has an adverse impact on the availability, authenticity, integrity or confidentiality of data, or on the services provided by the financial entity [Art. 3(8)].
- Critical ICT third-party service provider
- An ICT third-party service provider designated as critical by the ESAs through the Joint Committee, based on criteria including the systemic impact a failure or operational disruption of the provider could have on financial entities it serves [Art. 31].
- Threat-led penetration testing (TLPT)
- A framework for mimicking the tactics, techniques and procedures of real-life threat actors, designed to provide a controlled, bespoke, intelligence-led test of the financial entity's critical live production systems, based on the TIBER-EU framework [Art. 3(17), Art. 26].
- ICT third-party risk
- An ICT risk that may arise for a financial entity in relation to its use of ICT services provided by ICT third-party service providers or by subcontractors of the latter, including through outsourcing arrangements [Art. 3(18)].
- Lead Overseer
- The European Supervisory Authority (EBA, ESMA or EIOPA) appointed to conduct the oversight of a critical ICT third-party service provider, with powers to request information, conduct investigations and on-site inspections, and impose periodic penalty payments [Art. 31(1)(b), Art. 35].
- Critical or important function
- A function the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or whose discontinued, defective or failed performance would materially impair the continuing compliance of a financial entity with its authorisation conditions and obligations [Art. 3(22)].
Frequently Asked Questions
Which entities does DORA apply to?
How does DORA relate to NIS2?
What must be reported as a major ICT-related incident?
What is the incident reporting timeline under DORA?
What is threat-led penetration testing (TLPT) and who must perform it?
What contractual requirements does DORA impose on ICT outsourcing?
Are microenterprises subject to all DORA requirements?
Assessment Factors & Checklist
PremiumQuestions for Your Lawyer
PremiumConclusion & Summary
PremiumDetailed analysis with source links.
Schalten Sie die KI-Analyse frei — mit markierten Fundstellen und direkten Links zu EUR-Lex. 7 Tage kostenlos testen.
Keine Kreditkarte heute. Kündigung jederzeit.