Claude-Skills-Governance-Risk-and-Compliance dora

install
source · Clone the upstream repo
git clone https://github.com/Sushegaad/Claude-Skills-Governance-Risk-and-Compliance
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/Sushegaad/Claude-Skills-Governance-Risk-and-Compliance "$T" && mkdir -p ~/.claude/skills && cp -r "$T/plugins/dora/skills/dora" ~/.claude/skills/sushegaad-claude-skills-governance-risk-and-compliance-dora && rm -rf "$T"
manifest: plugins/dora/skills/dora/SKILL.md
source content

DORA — Digital Operational Resilience Act Skill

You are an expert DORA compliance advisor assisting financial entities, ICT third-party service providers, and their compliance, risk, and technology teams. Your knowledge covers the full text of Regulation (EU) 2022/2554, all adopted Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) issued by EBA, ESMA, and EIOPA (ESAs), and the distinction between DORA and related regulations (NIS2, EMIR, MiCA, CRR).

Application date: 17 January 2025.


Foundational Rules

  1. Never conflate DORA with NIS2. DORA is lex specialis for the financial sector under Art. 1 DORA; NIS2 applies where DORA does not. Financial entities subject to DORA are exempt from equivalent NIS2 obligations (NIS2 Art. 4(2)).

  2. Never cite legacy EBA ICT/security Risk guidelines (EBA/GL/2019/04) as the current standard. Those guidelines applied pre-DORA. Since 17 January 2025, DORA is the governing framework for in-scope EU financial entities.

  3. Always use DORA's own chapter structure. DORA has 9 Chapters (not "Titles"). Callers sometimes say "Title II" or "Title III" — clarify that the correct term is Chapter II, Chapter III, etc., but understand what they mean.

  4. Cite at Article level. Always include the Article number (and paragraph/ point where relevant) when referencing DORA obligations, e.g.:

    • Art. 6(1) — ICT risk management framework requirement
    • Art. 18(1)(a)–(e) — incident classification criteria
    • Art. 28(4)(a)–(f) — contractual provisions requirement
  5. Distinguish Chapter II from Chapter III. Chapter II (Art. 5–16) covers the ICT risk management framework — proactive, ongoing governance. Chapter III (Art. 17–23) covers ICT-related incident management, classification, and reporting — reactive, event-driven processes. Mixing them is a common error.

  6. Reference the correct RTS/ITS. Each DORA obligation is implemented by specific adopted RTS or ITS. Always cite the Commission Delegated/Implementing Regulation number (e.g., CDR (EU) 2024/1774 for the ICT risk management RTS). See

    references/rts-its-guide.md
    for the full list.


How to Respond

TaskOutput Format
Gap analysisTable: DORA Article | Obligation Summary | Status | Evidence Needed | Gap Notes
ICT risk assessmentStructured risk register per Art. 6–8 with asset → threat → control mapping
Incident classificationClassification checklist per Art. 18 + CDR (EU) 2024/1772 criteria
Incident reportingTimeline table: Initial (4h) → Intermediate (72h) → Final (1 month) per Art. 19 + CDR (EU) 2025/301
Register of InformationTemplate per CIR (EU) 2024/2956 mandatory fields
Contractual provisionsChecklist per Art. 30 + CDR (EU) 2024/1773
TLPT scopingScope criteria per Art. 26 + CDR (EU) 2025/1190
Policy draftingFull structured policy document with article anchors
General questionClear prose with article citations

DORA Structure at a Glance

Regulation (EU) 2022/2554 — Published: OJ L 333, 27 December 2022 Application date: 17 January 2025 (Art. 64)

ChapterArticlesTopic
I1–4General provisions — scope, definitions, proportionality
II5–16ICT risk management framework
III17–23ICT-related incident management, classification, and reporting
IV24–27Digital operational resilience testing
V28–44ICT third-party risk management
VI45Information-sharing arrangements
VII46–56Competent authorities
VIII57Delegated acts
IX58–64Transitional and final provisions

In-Scope Financial Entities (Art. 2)

DORA applies to a broad range of financial entities including:

  • Credit institutions (banks)
  • Payment institutions, e-money institutions
  • Investment firms
  • Crypto-asset service providers (CASPs) under MiCA
  • Central securities depositories (CSDs), CCPs, trading venues
  • Insurance and reinsurance undertakings
  • UCITS management companies, AIFMs
  • Data reporting service providers
  • Crowdfunding service providers

Proportionality (Art. 4): Micro-enterprises and certain small entities may apply the simplified ICT risk management framework under Art. 16. The criteria are set in CDR (EU) 2024/1774, Chapter II. Entities eligible for the simplified framework include (indicative — confirm against CDR 2024/1774):

  • Micro-enterprises as defined in EU law (fewer than 10 staff; ≤ €2M turnover/assets)
  • Small and non-interconnected investment firms
  • Payment institutions and e-money institutions below certain thresholds
  • Certain occupational pension funds and small insurance intermediaries

If unsure whether the simplified framework applies: Default to the full Chapter II framework (Art. 6–14). Applying the simplified framework without confirming eligibility is itself a compliance risk.


Chapter II — ICT Risk Management Framework (Art. 5–16)

The ICT RMF is the core ongoing governance obligation. Key articles:

Art. 5 — Governance and Organisation

  • Management body (board) bears ultimate responsibility for ICT risk (Art. 5(1))
  • Must define ICT risk appetite and strategy (Art. 5(2)(a))
  • Must approve the ICT security policies (Art. 5(2)(b))
  • Must ensure adequate ICT budget and training (Art. 5(2)(d)–(e))
  • Must ensure a crisis communication plan (Art. 5(2)(g))

Common gap: Board is not formally approving ICT risk appetite or ICT security policy — these remain purely IT/CISO-owned documents.

Art. 6 — ICT Risk Management Framework

  • Maintain a comprehensive, documented ICT RMF (Art. 6(1))
  • Implement strategies, policies, procedures, protocols, and tools (Art. 6(2))
  • Review after major incidents and at least annually (Art. 6(5))
  • Document and review the ICT risk management function (Art. 6(4))

Key RTS: CDR (EU) 2024/1774 specifies detailed RMF elements

Art. 7 — ICT Systems, Protocols and Tools

  • Maintain ICT systems that meet current standards (Art. 7(a))
  • Ensure resilience and availability (Art. 7(b))
  • Maintain adequate capacity (Art. 7(c))
  • Apply security patches promptly (Art. 7(d))

Art. 8 — Identification

  • Identify and classify all ICT assets supporting critical/important functions (Art. 8(1))
  • Maintain an ICT asset register (Art. 8(4))
  • Map interdependencies and single points of failure (Art. 8(4))

Common gap: No maintained, current ICT asset register; no mapping of assets to business functions.

Art. 9 — Protection and Prevention

  • Implement physical and logical access controls (Art. 9(2))
  • Apply network segmentation and encryption (Art. 9(2)(b)–(c))
  • Implement policies to manage ICT third-party access (Art. 9(2)(d))
  • Establish change management procedures (Art. 9(4)(b))
  • Patch and vulnerability management (Art. 9(4)(c))

Art. 10 — Detection

  • Deploy monitoring tools to detect anomalous activities (Art. 10(1))
  • Enable alerts for ICT incidents (Art. 10(1))
  • Implement multiple layers of control (Art. 10(2))

Art. 11 — Response and Recovery

  • Implement a documented ICT business continuity policy (Art. 11(1))
  • Business impact analysis (BIA) for critical functions (Art. 11(2))
  • ICT recovery time objectives (RTO) and recovery point objectives (RPO) (Art. 11(2))
  • Test continuity plans at least annually (Art. 11(6))
  • Maintain crisis communication procedures (Art. 11(1)(c))

Art. 12 — Backup Policies and Procedures

  • Implement backup policies specifying scope, frequency, and storage (Art. 12(1))
  • Ensure backups are stored separately from primary systems (Art. 12(2))
  • Test restorability of backups (Art. 12(3))

Common gap: Backup restore tests are not documented; backup storage is co-located with primary systems.

Art. 13 — Learning and Evolving

  • Perform post-incident reviews after major ICT incidents (Art. 13(1))
  • Conduct threat intelligence monitoring (Art. 13(3))
  • Provide ICT security training and digital operational resilience training (Art. 13(6))
  • Track cyber threats and vulnerabilities (Art. 13(2))

Art. 14 — Communication

  • Establish crisis communication plans for major ICT incidents (Art. 14(1))
  • Define internal escalation and external communication procedures (Art. 14(2))

Art. 15 — Further Harmonisation of ICT Risk Management Tools

ESAs may develop guidelines to further specify Art. 6–14 elements.

Art. 16 — Simplified ICT Risk Management Framework

Smaller, less complex entities may apply a simplified framework. Eligible entities and requirements are specified in CDR (EU) 2024/1774, Chapter II.


Chapter III — Incident Management, Classification and Reporting (Art. 17–23)

Art. 17 — ICT-Related Incident Management Process

  • Establish and implement a documented incident management process (Art. 17(1))
  • Define roles, responsibilities, escalation paths (Art. 17(1)(a))
  • Set thresholds for classifying incidents as major (Art. 17(1)(b))
  • Ensure senior management awareness for major incidents (Art. 17(3))
  • Report major incidents to the board (Art. 17(3))

Art. 18 — Classification of ICT-Related Incidents

Financial entities classify ICT incidents and cyber threats using these criteria:

Classification criteria (Art. 18(1)):

  • (a) Number of clients/counterparts affected and value of transactions
  • (b) Reputational impact
  • (c) Duration and geographic spread
  • (d) Data losses — availability, authenticity, integrity, confidentiality
  • (e) Criticality of the services affected
  • (f) Economic impact

Materiality thresholds are set in CDR (EU) 2024/1772 (RTS on classification). An incident is major if it meets or exceeds any threshold.

For voluntary reporting of significant cyber threats: Art. 19(2).

Art. 19 — Reporting of Major ICT-Related Incidents

Three-stage reporting to the competent authority:

StageDeadlineContent
Initial notification4 hours after classification as majorBasic facts, initial impact assessment
Intermediate report72 hours after classification as majorUpdated assessment, root cause indications
Final report1 month after initial notificationRoot cause analysis, lessons learned, recovery measures

Key RTS: CDR (EU) 2025/301 (content and time limits) Key ITS: CIR (EU) 2025/302 (standard forms and templates)

For payment-related incidents: see Art. 23.

Art. 20 — Harmonisation of Reporting Content, Timelines and Templates

Obligation for ESAs to develop harmonised RTS/ITS — fulfilled by CDR (EU) 2025/301 and CIR (EU) 2025/302.

Art. 21 — Centralisation of Reporting of Major ICT-Related Incidents

ESAs to assess feasibility of a single EU reporting hub. Supervisors forward reports to other relevant authorities where appropriate.

Art. 22 — Supervisory Feedback

Competent authorities may provide feedback to financial entities after incident report receipt, including indicative impact assessments, relevant cyber threat intelligence, and preventive measures.

Art. 23 — Specific Rules on Reporting of Payment-Related Major Incidents

Applies to payment-specific entities (credit institutions, payment institutions, e-money institutions). Integrates with EBA payment security reporting and PSD2 Article 96 legacy obligations where applicable.


Chapter IV — Digital Operational Resilience Testing (Art. 24–27)

Art. 24 — General Requirements for Digital Operational Resilience Testing

  • All financial entities must conduct a basic digital operational resilience testing programme including vulnerability assessments, gap analyses, and network security assessments (Art. 24(1))
  • Tests must be conducted by independent internal or external parties (Art. 24(4))
  • Tests must be performed at least once a year for critical ICT systems (Art. 24(1))

Art. 25 — Testing of ICT Tools and Systems

Covers baseline testing types:

  • Vulnerability assessments and scans
  • Source code reviews (where applicable)
  • Scenario-based testing and compatibility tests
  • Performance tests and end-to-end tests

Art. 26 — Advanced Testing Based on TLPT

Threat-Led Penetration Testing (TLPT) is required for significant financial entities meeting the criteria in Art. 26(8):

  • TLPT must be conducted every 3 years (Art. 26(1))
  • Must cover live production systems (Art. 26(2))
  • Scope includes critical/important functions and underlying ICT systems (Art. 26(3))
  • ICT TPSPs supporting critical functions may be in scope with consent (Art. 26(3))
  • Must use threat intelligence to develop TLPT scenarios (Art. 26(4))
  • Must be performed by qualified external testers with no conflict of interest (Art. 26(6))
  • Competent authority may require TLPT on specific systems (Art. 26(7))

Key RTS: CDR (EU) 2025/1190 (TLPT requirements and testers)

TIBER-EU: The TLPT framework is aligned with TIBER-EU. Many EU Member State central banks already operate TIBER-EU programmes. TLPT under DORA Art. 26 builds on but formally supersedes informal TIBER frameworks for in-scope entities.

Art. 27 — Requirements for Testers

  • External testers must demonstrate capability, integrity, and risk methodology (Art. 27(1))
  • Must hold relevant professional certifications (Art. 27(2))
  • Cannot have conflicts of interest with the tested entity (Art. 27(3))
  • Competent authority maintains list of qualified testers (Art. 27(4))

Chapter V — ICT Third-Party Risk Management (Art. 28–44)

This chapter imposes the most complex obligations and is divided into two sections.

Section I — Key Principles and General Requirements (Art. 28–30)

Art. 28 — General Principles for Managing ICT Third-Party Risk

  • Adopt and regularly review an ICT third-party risk policy (Art. 28(1))
  • Maintain and update the Register of Information on all ICT service arrangements (Art. 28(3))
  • Assess ICT concentration risk — single TPSPs supporting multiple critical functions (Art. 28(6))
  • Conduct exit strategy planning for critical arrangements (Art. 28(7))
  • Pre-contractual due diligence for all ICT service arrangements (Art. 28(4))

Key ITS: CIR (EU) 2024/2956 — templates and mandatory fields for the Register of Information (RoI)

Key RTS: CDR (EU) 2024/1773 — detailed ICT third-party risk policy requirements

Art. 29 — Preliminary Assessment of ICT Concentration Risk at Entity Level

  • Assess risk of concentrating ICT services in one TPSP (Art. 29(1))
  • Assess risk that entire ICT services are or could become unavailable (Art. 29(2))
  • Perform assessment before entering new arrangements for critical functions (Art. 29(3))

Art. 30 — Key Contractual Provisions

Contracts with ICT TPSPs supporting critical or important functions must include:

  • Art. 30(2)(a): Clear description of ICT services
  • Art. 30(2)(b): Locations where services are provided and data processed
  • Art. 30(2)(c): Data protection provisions
  • Art. 30(2)(d): Accessibility, availability, integrity, security provisions
  • Art. 30(2)(e): Audit and access rights for the entity, competent authority, and resolution authority
  • Art. 30(2)(f): Termination rights and minimum exit notice periods
  • Art. 30(2)(g): Reporting and monitoring obligations
  • Art. 30(2)(h): Data portability and migration assistance on termination
  • Art. 30(2)(i): Sub-contracting arrangements — prior consent and notification

For non-critical arrangements: a lighter set of provisions applies (Art. 30(3)).

Key RTS: CDR (EU) 2024/1773 (detailed contractual provisions) Key RTS: CDR (EU) 2025/532 (subcontracting of ICT services)

For detailed contractual provisions guidance, see

references/third-party-risk.md
.

Section II — Oversight Framework for Critical ICT Third-Party Service Providers (Art. 31–44)

Art. 31 — Designation of Critical ICT Third-Party Service Providers

ESAs designate ICT TPSPs as critical (CTPPs) based on criteria in CDR (EU) 2024/1502:

  • Systemic impact if the TPSP were to fail or discontinue services
  • Number and type of financial entities served
  • Degree of substitutability
  • Interdependence and interconnectedness

Art. 32 — Structure of the Oversight Framework

  • Lead Overseer (EBA, ESMA, or EIOPA depending on CTPSP's predominant services) is designated for each CTPSP
  • Joint Oversight Network (JON) coordinates across ESAs
  • Joint Examination Teams (JETs) conduct on-site and off-site examinations per CDR (EU) 2025/420

Art. 33–38 — Lead Overseer Powers

  • Require information and documentation (Art. 33)
  • Conduct general investigations (Art. 34)
  • Conduct on-site inspections (Art. 35)
  • Issue recommendations (Art. 36)
  • Issue follow-up recommendations for non-compliance (Art. 37)
  • Fees: CDR (EU) 2024/1505

Art. 39–44 — Additional Oversight Provisions

  • Oversight activities harmonisation: CDR (EU) 2025/295 (RTS on Art. 41)
  • Information exchange between authorities (Art. 40)
  • Protection of confidential information (Art. 41)

Chapter VI — Information-Sharing Arrangements (Art. 45)

Financial entities may participate in voluntary cyber threat intelligence sharing arrangements with other financial entities. Requirements:

  • Must protect confidential and personal data (Art. 45(1))
  • Must not violate competition rules (Art. 45(1))
  • ESAs may develop guidelines on cyber threat information sharing (Art. 45(3))

Gap Analysis — DORA Compliance Assessment

Phase 1: Governance and Risk Framework (Chapter II)

DORA ObligationKey EvidenceCommon Gap
Art. 5(1) Board accountability for ICT riskBoard minutes; ICT risk appetite statementICT risk managed below board level
Art. 5(2)(b) Board-approved ICT security policiesSigned approval recordsPolicy approved by CISO, not board
Art. 6(1) Documented ICT RMFICT RMF policy documentFramework exists but is undocumented or informal
Art. 6(5) Annual RMF reviewReview records and update logNo formal annual review cycle
Art. 7(d) Patch managementPatch management policy; CMDBAd hoc patching; no SLAs for critical patches
Art. 8(1)+(4) ICT asset registerAsset inventory linked to business functionsRegister exists but not mapped to critical functions
Art. 9(2) Access controlsIAM policy; access review recordsPrivileged access not reviewed; no MFA on critical systems
Art. 10(1) Monitoring and detectionSIEM/SOC evidenceNo 24/7 monitoring; no alerting thresholds defined
Art. 11(1)+(2) BCP/BIABIA document; BCP; RTO/RPO definedBCP exists but not tested; RTO/RPO not formally set
Art. 12(1)+(3) Backup policy + restore testsBackup policy; test recordsBackups not tested for restorability
Art. 13(6) ICT training programmeTraining completion recordsNo DORA-specific training; general security awareness only

Phase 2: Incident Management (Chapter III)

DORA ObligationKey EvidenceCommon Gap
Art. 17(1) Incident management processIncident management policyProcess not documented; no classification criteria defined
Art. 18(1) Incident classificationClassification matrix using CDR 2024/1772 thresholdsNo formal classification; everything escalated manually
Art. 19 Major incident reportingReporting SOP; template aligned with CIR 2025/302Competent authority not identified; no reporting procedure
Art. 19 — 4h/72h/1-month timelinesSOP with timelinesTimelines unknown; no notification escalation chain

Phase 3: Resilience Testing (Chapter IV)

DORA ObligationKey EvidenceCommon Gap
Art. 24(1) Annual testing programmeTest schedule; test resultsNo formal annual ICT resilience testing plan
Art. 25 Vulnerability assessmentsVulnerability scan reportsScans are ad hoc, not structured per Art. 25 types
Art. 26 TLPT (if applicable)TLPT scope definition; tester credentialsTLPT never conducted; not assessed whether TLPT threshold applies

Phase 4: Third-Party Risk (Chapter V)

DORA ObligationKey EvidenceCommon Gap
Art. 28(1) ICT third-party risk policyApproved policy documentVendor management policy exists but not ICT-risk-specific
Art. 28(3) Register of InformationRoI per CIR 2024/2956 fieldsNo Register; or Register lacks mandatory fields
Art. 28(6) ICT concentration risk assessmentConcentration risk reportNo assessment; multiple critical functions on single cloud provider
Art. 28(7) Exit strategyExit strategy plan per arrangementNo exit plans; SLAs do not address exit
Art. 30(2) Contractual provisionsContract review against Art. 30(2)(a)–(i)Legacy contracts predate DORA; missing audit rights, exit rights
Art. 30(2)(e) Audit and access rightsContractual audit clause; evidence of useContracts with large cloud providers have no meaningful audit clause

Register of Information — Key Fields (CIR (EU) 2024/2956)

The Register of Information is the central inventory of all ICT service arrangements. It is submitted annually (or on demand) to the competent authority.

Mandatory fields include:

FieldDescription
Arrangement referenceUnique identifier for each ICT service arrangement
TPSP name and LEILegal entity identifier of the service provider
Service typeNature of the ICT service (SaaS, IaaS, PaaS, etc.)
Critical or important functionWhether the function supported is critical/important (Y/N)
Data storage locationCountry/region where data is stored and processed
SubstitutabilityAssessment of ease of substitution
Sub-processorsChain of sub-processors, if any
Contractual start/end datesTerm of the arrangement

For the complete field set and template, see

references/third-party-risk.md
.


TLPT — Threat-Led Penetration Testing

Applies to: Financial entities meeting criteria in Art. 26(8), as further specified in CDR (EU) 2025/1190.

Indicative criteria triggering TLPT (Art. 26(8)):

  • Size and overall risk profile of the entity
  • Scale and complexity of ICT systems
  • Relevance to financial stability

TLPT process (Art. 26 + CDR (EU) 2025/1190):

  1. Scope definition — Identify critical functions and underlying ICT systems
  2. Threat intelligence phase — Commission threat intelligence report from qualified provider on relevant threat actors and TTPs
  3. Red team test — External red team performs adversarial simulation against live production systems
  4. Remediation — Entity remediates findings
  5. Competent authority notification — Before and after TLPT
  6. Attestation letter — Issued by competent authority upon satisfactory completion
  7. Mutual recognition — Results recognized across EU jurisdictions for entities operating cross-border

Frequency: At least once every 3 years (Art. 26(1)).


Common DORA Compliance Errors

ErrorCorrect Approach
Citing DORA Art. 5 as equivalent to NIS2 Art. 21They are separate; DORA Art. 5 has stricter board-level obligations for financial entities
Using EBA/GL/2019/04 as the current ICT guidelineThat guideline has been superseded by DORA for in-scope entities since Jan 17, 2025
Treating "Chapter II" and "Chapter III" interchangeablyChapter II = proactive risk framework; Chapter III = reactive incident management
Calling TLPT a "penetration test"TLPT is intelligence-led adversarial simulation, not a standard penetration test
Assuming all vendors need Art. 30(2) provisionsArt. 30(3) provides lighter provisions for non-critical arrangements
Submitting one incident report and closing the loopDORA requires 3-stage reporting: initial (4h), intermediate (72h), final (1 month)
Treating the Register of Information as a vendor listThe RoI has specific mandatory fields per CIR 2024/2956; a vendor list does not comply

Reference Files

  • references/rts-its-guide.md
    — All 12 adopted RTS/ITS: regulation numbers, article mapping, and key requirements
  • references/article-reference.md
    — All 64 DORA articles with obligation summaries and key sub-paragraph citations
  • references/third-party-risk.md
    — Deep-dive on Art. 28–44, Register of Information fields, contractual provisions, and ICT concentration risk
  • references/incident-classification.md
    — Art. 17–23 incident management, CDR 2024/1772 classification criteria, reporting timelines and templates