How to implement DORA?
9 simple steps with the support of RIG DORA
Act according to the plan that the DORA implementation tool will guide you through. RIG is your organisation’s DORA compliance and security management hub. It will organise your activities in 9 simple steps divided into stages, most of which you will do in the RIG itself.
STEP 1
STEP 2
STEP 3
See the many dimensions of compliance and risk in RIG
Explore coherent ICT risk management in compliance with DORA. Explore your organisation’s cybersecurity information in one tool, but from multiple angles – information security, business continuity, personal data.
Manage dynamically, assess, plan, analyse!
Pillars of the DORA Regulation
RIG DORA supports you in fulfilling each of the mandatory pillars of the regulation. You will achieve the 4 required areas in full with the tool and streamline the other 2.
FAQ
Do ICT incidents impact risk?
Yes, ICT incidents have a significant impact on risk in organisations. An increase in the number of incidents increases the probability of events occurring. In addition, each individual ICT incident, regardless of its nature, can increase overall operational and strategic risk.
How do ICT incidents affect risk?
Incidents can lead to business interruptions, which can disrupt an organisation’s daily operations. These interruptions can generate financial losses and affect the ability to meet obligations to customers.
- The loss or breach of personal data can lead to serious legal and financial consequences, including fines imposed by regulators for breaches of regulations such as the GDPR.
- ICT incidents can negatively impact an organisation’s reputation. Customers and partners may lose trust, which can lead to a loss of customers and a decline in brand value.
- Following an incident, organisations often have to incur significant costs for investigations, repairing systems and implementing new security features, adding to the financial burden.
- ICT incidents can expose new security vulnerabilities, which in turn can lead to increased risk in the future if the organisation does not take appropriate action to patch them.
Consequently, identifying and managing the risks associated with ICT incidents is a key element of any organisation’s security strategy.
How to include vulnerabilities in risk assessment?
In RIG DORA and in RIG NIS, you can include vulnerabilities in your risk assessments by connecting via API to penetration testing tools.
Which method of risk assessment is compliant with the DORA regulation?
DORA does not force one specific risk assessment methodology, but requires it to focus on the value and criticality of assets held and the impact of their loss on business functions. RIG DORA operates within the RED INTO GREEN application, which has an Asset Based Approach risk assessment methodology that is compliant with DORA, as well as GDPR and NIS2.
Does the RIG DORA Module have special functionalities related to the implementation of the DORA regulation?
Yes, the DORA regulation requires risk assessments in the IS and BC domains, so similarly, the RIG DORA module has the relevant functionalities to select the domains. With these, risk assessments can be carried out in individual IS and BC domains.
DORA requires the maintenance of a register of information on contracts with ICT providers and this functionality of the RIG DORA module will be available from September 2024.
When implementing the DORA regulation, should risk knowledge be made available to all involved?
Access to up-to-date knowledge is key to ensuring an organisation’s security. Tools that provide a view of the organisation in terms of its assets, processes, vulnerabilities and security are helpful. The RIG DORA Module gives an overview of all the information mentioned at general and specific levels and allows all analyses, plans and reports to be updated in an automated manner.
Do ICT providers need to have a different approach to implementing DORA than financial entities?
ICT providers must consider GDPR compliance and must prepare themselves to complete surveys provided to them by financial institutions. ICT providers do not need to create a register of their sub-suppliers, but critical or essential functions ICT providers must demonstrate information about their suppliers and sub-suppliers.
What if you need to prepare for a re-audit in future years and take care of the data update requirements?
What if you need to prepare for a re-audit in future years and take care of data update requirements?
In the case of data updates, working manually, you will need to check all assets, processes, vulnerabilities and security each time. With RIG DORA, all you have to do is create a report and check the current state with it. It is not necessary to map the organisation from the beginning. Once you have verified the changes, simply enter them into the system and generate a new report.
Does the RIG DORA Module meet specific local requirements?
Depending on the market, we provide detailed information on request.