{"id":18242,"date":"2024-06-26T14:31:57","date_gmt":"2024-06-26T14:31:57","guid":{"rendered":"https:\/\/acora.s.nomatter.dev\/?post_type=resources&#038;p=18242"},"modified":"2025-01-13T13:27:50","modified_gmt":"2025-01-13T13:27:50","slug":"be-dora-ready-dora-compliance-checklist","status":"publish","type":"resources","link":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/be-dora-ready-dora-compliance-checklist\/","title":{"rendered":"Be DORA Ready: DORA Compliance Checklist"},"content":{"rendered":"<h2><span class=\"ez-toc-section\" id=\"Be_DORA_Ready_DORA_Compliance_Checklist\"><\/span><b>Be DORA Ready: DORA Compliance Checklist<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">The enforcement date for the Digital Operational Resilience Act (DORA) regulation is fast approaching &#8211; January 17, 2025.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Financial institutions across the European Union must be prepared for the upcoming changes, using tools like a DORA compliance checklist, as the act seeks to improve the digital resilience of financial entities against cyber threats.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Does the industry need this? Absolutely. According to the <\/span><a href=\"https:\/\/www.ibm.com\/reports\/data-breach\"><span style=\"font-weight: 400;\">IBM Cost of a Data Breach Report 2023<\/span><\/a><span style=\"font-weight: 400;\">, financial institutions rank second in the global cyber attack damage statistics, with losses amounting to approximately $5.9 million per cyber attack in 2023. The average across all industries is $4.45 million. The report also shows that there were twice as many cyber attacks on financial institutions in 2023 compared to 2022.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n\r\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\r\n<div class=\"wp-block-button anchor\"><a class=\"wp-block-button__link wp-element-button\" href=\"#sla-beginning\">Read on to learn more<\/a><\/div>\r\n<\/div>\r\n<!-- \/wp:post-content -->\r\n<p>&nbsp;<\/p>\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"h-index\" class=\"wp-block-heading\">Index<\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:group {\"layout\":{\"type\":\"constrained\"}} -->\r\n<div class=\"wp-block-group\"><!-- wp:list {\"ordered\":true,\"type\":\"decimal\",\"style\":{\"spacing\":{\"padding\":{\"right\":\"var:preset|spacing|60\",\"left\":\"var:preset|spacing|60\"}}}} -->\r\n<ol style=\"padding-right: var(--wp--preset--spacing--60); padding-left: var(--wp--preset--spacing--60);\"><!-- wp:list-item -->\r\n<li><strong><a href=\"#introduction-to-dora\">Introduction to DORA<\/a><\/strong><\/li>\r\n<!-- \/wp:list-item -->\r\n\r\n<!-- wp:list-item -->\r\n<li><strong><a href=\"#gdpr-nis2\">Integrating GDPR and NIS2 Requirements<\/a><\/strong><\/li>\r\n<!-- \/wp:list-item -->\r\n\r\n<!-- wp:list-item -->\r\n<li><strong><a href=\"#compliance-timeline\">Compliance Timeline<\/a><\/strong><\/li>\r\n<!-- \/wp:list-item -->\r\n\r\n<!-- wp:list-item -->\r\n<li><strong><a href=\"#dora-requirements\">DORA Requirements<\/a><\/strong><\/li>\r\n<!-- \/wp:list-item -->\r\n\r\n<!-- wp:list-item -->\r\n<li><strong><a href=\"#crisis-management\">Crisis Management: Ensuring Preparedness and Resilience<\/a><\/strong><\/li>\r\n<!-- \/wp:list-item -->\r\n\r\n<!-- wp:list-item -->\r\n<li><strong><a href=\"#dora-checklist\">Your DORA Requirements Checklist<\/a><\/strong><\/li>\r\n<!-- \/wp:list-item -->\r\n\r\n<!-- wp:list-item -->\r\n<li><strong><a href=\"#consequences-of-non-compliance\">Consequences of Non-Compliance<\/a><\/strong><\/li>\r\n<!-- \/wp:list-item -->\r\n\r\n<!-- wp:list-item \/--><\/ol>\r\n<!-- \/wp:list --><\/div>\r\n<div>\u00a0<!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} -->\r\n<figure id=\"introduction-to-dora\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<!-- \/wp:image --><\/div>\r\n<h2><span class=\"ez-toc-section\" id=\"Introduction_to_DORA\"><\/span>Introduction to DORA<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">DORA is a regulatory framework established by the European Union (EU) to strengthen digital resilience in financial institutions. It aims at making these entities able to withstand, respond to, and recover from various IT-related disruptions and risks. It forms part of wider efforts to enhance cyber security, including <\/span><a href=\"https:\/\/acora.s.nomatter.dev\/our-services\/security-testing-compliance\/rdr-security-testing-compliance\/\"><span style=\"font-weight: 400;\">security testing<\/span><\/a><span style=\"font-weight: 400;\"> and sound operation within Europe&#8217;s finance sectors.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">DORA should also deal with the increasing complexity and interdependence of digital systems underpinning financial services. <\/span><span style=\"font-weight: 400;\">It helps ensure uniform standards among member states, guaranteeing high levels of protection and continuity of operations.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">The requirements are stringent. Financial institutions must re-engineer their internal processes and systems, creating a more resilient and secure environment. <\/span><span style=\"font-weight: 400;\">Overall objectives include establishing a solid framework that reduces risk and enhances trust and stability within an evolving digital threat landscape.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">DORA applies to most financial institutions, including <\/span><b>banks and credit unions<\/b><span style=\"font-weight: 400;\">, <\/span><b>insurance providers<\/b><span style=\"font-weight: 400;\">, <\/span><b>investment firms<\/b><span style=\"font-weight: 400;\">, <\/span><b>fintech companies<\/b><span style=\"font-weight: 400;\">, etc. If it&#8217;s a financial institution, chances are high that DORA applies to it. Third-party IT providers supporting these companies must also follow DORA compliance regulations. It&#8217;s the entire financial ecosystem.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">DORA complements existing EU cybersecurity regulations, such as the GDPR and NIS2 Directive &#8211; both the GDPR and <\/span><a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\"><span style=\"font-weight: 400;\">NIS2 Directive<\/span><\/a><span style=\"font-weight: 400;\"> are legal measures that boost cybersecurity in the EU.<\/span><\/p>\r\n<div>\u00a0<!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} -->\r\n<figure id=\"gdpr-nis2\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<!-- \/wp:image --><\/div>\r\n<h2><span class=\"ez-toc-section\" id=\"Integrating_GDPR_and_NIS2_requirements\"><\/span><b>Integrating GDPR and NIS2 requirements<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">It complements DORA by providing broader cybersecurity and data protection guidelines applicable across the EU. The GDPR focuses on protecting personal data and privacy so financial institutions can engage in responsible, transparent information management. NIS2, however, emphasises the robustness of cyber security areas and incident reporting for essential entities.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">To establish a cohesive, comprehensive cybersecurity approach, financial institutions must integrate their efforts to comply with DORA to ensure it aligns with GDPR and NIS2. It&#8217;ll ensure all aspects of data protection, cyber security, and operational resilience are covered, creating a holistic framework for digital threat management and regulatory compliance.<\/span><\/p>\r\n<div>\u00a0<!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} -->\r\n<figure id=\"compliance-timeline\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<!-- \/wp:image --><\/div>\r\n<h2><span class=\"ez-toc-section\" id=\"Compliance_Timeline\"><\/span><b>Compliance Timeline<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">On January 16, 2023, DORA officially became active. Organisations have two years to realign themselves with the new requirements, ensuring full DORA compliance by January 17, 2025. To this effect, European supervisory authorities have been developing regulatory technical standards (RTS), which provide comprehensive guidelines for compliance that our DORA checklist follows.<\/span><\/p>\r\n<div>\u00a0<!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} -->\r\n<figure id=\"dora-requirements\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<!-- \/wp:image --><\/div>\r\n<h2><span class=\"ez-toc-section\" id=\"DORA_Requirements\"><\/span><b>DORA Requirements<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">Within the regulatory technical standards are five essential pillars:<\/span><\/p>\r\n<h3><b>IT Risk Management<\/b><\/h3>\r\n<p><span style=\"font-weight: 400;\">Institutions must establish a comprehensive IT risk management framework\/s. These involve ongoing monitoring, identifying potential cyber threats, and deploying appropriate cyber security measures. Regular assessments and updates are essential for effective risk management purposes.<\/span><\/p>\r\n<h3><b>IT Incident Reporting<\/b><\/h3>\r\n<p><span style=\"font-weight: 400;\">Companies must promptly report any significant ICT-related incidents to their respective regulators. It aims to improve understanding of IT risks across the financial sector and promote a coordinated response mechanism for incidents.<\/span><\/p>\r\n<h3><b>Digital Operational Resilience Testing<\/b><\/h3>\r\n<p><span style=\"font-weight: 400;\">Entities must regularly test their digital operational resilience abilities against IT disruptions. That includes performing Threat-Led Penetration Testing (TLPT) that emulates cyberattacks and assesses how robustly the cyber security defences are designed.<\/span><\/p>\r\n<h3><b>IT Third-Party Risk Management<\/b><\/h3>\r\n<p><span style=\"font-weight: 400;\">Third-party IT service providers should be closely monitored with due diligence, following DORA regulations. To minimise the chances of their disruption and breaches, these providers should be subjected to proper risk management processes by finance firms.<\/span><\/p>\r\n<h3><b>Information and intelligence sharing<\/b><\/h3>\r\n<p><span style=\"font-weight: 400;\">Sharing information about cyber threats with different financial entities helps improve overall robustness within the industry. It&#8217;ll also assist in detecting threats more efficiently and addressing them more effectively. Cooperatively, this facilitates easy detection and protection against responding to or reacting to any attack.<\/span><\/p>\r\n<div>\u00a0<!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} -->\r\n<figure id=\"crisis-management\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<!-- \/wp:image --><\/div>\r\n<h2><span class=\"ez-toc-section\" id=\"Crisis_Management_Ensuring_Preparedness_and_Resilience\"><\/span><b>Crisis Management: Ensuring Preparedness and Resilience<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">As the enforcement date for the Digital Operational Resilience Act (DORA) approaches, financial institutions must not only comply with regulatory requirements but also be prepared for potential crises that could disrupt their operations. Effective crisis management is a critical component of digital resilience, enabling organisations to respond to and recover from cyber attacks or other operational disruptions swiftly and efficiently.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">A robust crisis management plan includes clear procedures for handling:<\/span><\/p>\r\n<ul>\r\n<li><span style=\"font-weight: 400;\">Public Relations (PR) and communication<\/span><\/li>\r\n<li><span style=\"font-weight: 400;\">IT investigations<\/span><\/li>\r\n<li><span style=\"font-weight: 400;\">Client and supplier notifications<\/span><\/li>\r\n<li><span style=\"font-weight: 400;\">Regulatory notifications<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">Organisations must be prepared to face regulators, legal challenges, the press, customers, suppliers, and possibly the general public, depending on their industry.<\/span><\/p>\r\n<h3><b>Leveraging Crisis Management Platforms<\/b><\/h3>\r\n<p><span style=\"font-weight: 400;\">To modernise the approach to crisis management, Acora, in partnership with <\/span><a href=\"https:\/\/www.immersivelabs.com\/\"><span style=\"font-weight: 400;\">Immersive Labs<\/span><\/a><span style=\"font-weight: 400;\">, offers a comprehensive platform that manages all elements of a crisis simulation. This platform enables businesses to conduct engaging and contextualised crisis management sessions with executive teams, ensuring that everyone understands their roles and responsibilities.<\/span><\/p>\r\n<h3><b>Key Features of the Platform:<\/b><\/h3>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">All-in-One Management: Integrates various aspects of crisis response into a single platform.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Role Clarification: Helps executives understand their specific roles during a crisis.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Voting Mechanism: Encourages participation and decision-making across the team, exposing different responses to the same problem.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scenario-Based Training: Utilizes real-world scenarios to prepare teams for various types of cyber incidents, including data breaches and ransomware attacks.<\/span><\/li>\r\n<\/ul>\r\n<h3><b>Benefits of Crisis Management Simulations<\/b><\/h3>\r\n<p><span style=\"font-weight: 400;\">Running regular crisis management simulations provides several benefits:<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enhanced Preparedness: Teams become familiar with their roles and can respond more effectively during a real crisis.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Improved Decision-Making: Simulations highlight the importance of quick and informed decision-making in stressful situations.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Operational Stability: By refining incident response plans, businesses can minimise downtime and maintain operational continuity during disruptions.<\/span><\/li>\r\n<\/ul>\r\n<h3><b>Example Scenarios:<\/b><\/h3>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data breaches involving sensitive information<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cyber attacks targeting critical infrastructure during peak business periods<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Phishing attacks leading to unauthorised transactions<\/span><\/li>\r\n<\/ul>\r\n<div>\u00a0<!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} -->\r\n<figure id=\"dora-checklist\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<!-- \/wp:image --><\/div>\r\n<h2><span class=\"ez-toc-section\" id=\"Your_DORA_Requirements_Checklist\"><\/span><b>Your DORA Requirements Checklist<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">To aid your understanding of the intricate provisions of DORA, this is a comprehensive DORA compliance checklist you can use to ensure compliance:<\/span><\/p>\r\n<p><b>Delineate Scope and Applicability<\/b><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Find out whether your organisation falls under the scope of DORA (remember, most financial institutions do). You can find that information here.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Evaluate which third-party IT service providers are critical and must be complied with.<\/span><\/li>\r\n<\/ul>\r\n<h3><b>Undertake a Gap Analysis<\/b><\/h3>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conduct a systemic maturity assessment against DORA requirements to find gaps in your current information and communication technology systems and processes.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Assess the risks linked to third-party suppliers.<\/span><\/li>\r\n<\/ul>\r\n<h3><b>Create a Road Map for Remediation<\/b><\/h3>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Establishing a detailed plan to address identified gaps and prioritising actions based on risk and feasibility.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Set realistic timelines for implementing remediation activities.<\/span><\/li>\r\n<\/ul>\r\n<h3><b>Deploying IT Risk Management Frameworks<\/b><\/h3>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Establish strong IT risk management policies, procedures, and standards.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitor and examine cyber threats and vulnerabilities continuously for changes in patterns or intensity over time or space.<\/span><\/li>\r\n<\/ul>\r\n<h3><b>Establish Procedures for Reporting Incidents<\/b><\/h3>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Develop protocols for immediate reporting to the relevant authorities of significant cyber incidents.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Availability of clear communication paths for incident response<\/span><\/li>\r\n<\/ul>\r\n<h3><b>Conduct Regular Resilience Testing<\/b><\/h3>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement a Three-Layer Protection System (TLPT) to test your IT systems against simulated cyber attacks.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regularly test and review results to enhance defences.<\/span><\/li>\r\n<\/ul>\r\n<h3><b>Third-Party Risk Management<\/b><\/h3>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensure that stringent oversight is implemented, including due diligence on third-party providers of IT services.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">These providers have to adhere to DORA&#8217;s risk management requirements.<\/span><\/li>\r\n<\/ul>\r\n<h3><b>Promote Information Sharing<\/b><\/h3>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Participate in industry initiatives aimed at sharing cyberspace-related threat information.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Establish internal procedures to share essential financial-related information with other financial institutions.<\/span><\/li>\r\n<\/ul>\r\n<h3><b>Educate Your Board<\/b><\/h3>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The board members and senior executives must understand their roles under DORA.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Continuous training on IT risks and digital operational resilience strategies is necessary.<\/span><\/li>\r\n<\/ul>\r\n<h3><b>Continuous Monitoring and Improvement<\/b><\/h3>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regularly updating IT risk management frameworks.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Periodic assessments are essential to ensure continued conformity with DORA requirements.<\/span><\/li>\r\n<\/ul>\r\n<div>\u00a0<!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} -->\r\n<figure id=\"consequences-of-non-compliance\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<!-- \/wp:image --><\/div>\r\n<h2><span class=\"ez-toc-section\" id=\"Consequences_of_Non-Compliance\"><\/span><b>Consequences of Non-Compliance<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">Breaking DORA rules can result in huge fines, revoked permission to operate, and public reprimands that institutions can avoid with the DORA checklist. Financial penalties could be a serious deal, with potential fines amounting to as much as 1% of the average daily worldwide turnover of the previous year, which was $3,117 billion in April 2023. And &#8211; non-compliance leads to reputational damage, loss of customer trust, and increased exposure to cyber risks.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">The consequences of failing to meet DORA compliance requirements go beyond immediate financial losses. Regulatory authorities may continuously examine these institutions, diverting their attention and resources from core business operations. The result? Legal challenges and the possibility of civil litigation only add to the costs and complexities associated with non-compliance.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Ignoring DORA also strains partners&#8217; relationships, including stakeholders, who depend on robust cybersecurity practices in a financially interconnected ecosystem.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Complying with DORA is paramount for EU-based financial entities. It protects against regulatory penalties and enhances its overall security posture. Financial institutions can finally be resilient to emerging IT threats in the finance sector. Do you feel DORA ready with our DORA complaint checklist?<\/span><\/p>\r\n<!-- \/wp:group -->","protected":false},"author":24,"featured_media":18244,"template":"single-resources-gated-content.blade.php","resources_categories":[246],"service-category":[],"service-type":[],"insight-format":[365],"class_list":["post-18242","resources","type-resources","status-publish","has-post-thumbnail","hentry","resources_categories-business-change","insight-format-e-book"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DORA Compliance Checklist | Be DORA Ready | Acora<\/title>\n<meta name=\"description\" content=\"Prepare for DORA compliance! Use our checklist to ensure your financial institution meets the DORA requirements by 2025.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Be DORA Ready: DORA Compliance Checklist\" \/>\n<meta property=\"og:description\" content=\"Prepare for DORA compliance! Use our checklist to ensure your financial institution meets the DORA requirements by 2025.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/be-dora-ready-dora-compliance-checklist\/\" \/>\n<meta property=\"og:site_name\" content=\"Acora NL Test\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-13T13:27:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/06\/Be-Dora-Ready-Guide-Acora.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/be-dora-ready-dora-compliance-checklist\\\/\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/be-dora-ready-dora-compliance-checklist\\\/\",\"name\":\"DORA Compliance Checklist | Be DORA Ready | Acora\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/be-dora-ready-dora-compliance-checklist\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/be-dora-ready-dora-compliance-checklist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/06\\\/Be-Dora-Ready-Guide-Acora.jpg\",\"datePublished\":\"2024-06-26T14:31:57+00:00\",\"dateModified\":\"2025-01-13T13:27:50+00:00\",\"description\":\"Prepare for DORA compliance! Use our checklist to ensure your financial institution meets the DORA requirements by 2025.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/be-dora-ready-dora-compliance-checklist\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/be-dora-ready-dora-compliance-checklist\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/be-dora-ready-dora-compliance-checklist\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/06\\\/Be-Dora-Ready-Guide-Acora.jpg\",\"contentUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/06\\\/Be-Dora-Ready-Guide-Acora.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Be Dora Ready Guide Acora\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/be-dora-ready-dora-compliance-checklist\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Be DORA Ready: DORA Compliance Checklist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\",\"name\":\"Acora NL Test\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DORA Compliance Checklist | Be DORA Ready | Acora","description":"Prepare for DORA compliance! Use our checklist to ensure your financial institution meets the DORA requirements by 2025.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Be DORA Ready: DORA Compliance Checklist","og_description":"Prepare for DORA compliance! Use our checklist to ensure your financial institution meets the DORA requirements by 2025.","og_url":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/be-dora-ready-dora-compliance-checklist\/","og_site_name":"Acora NL Test","article_modified_time":"2025-01-13T13:27:50+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/06\/Be-Dora-Ready-Guide-Acora.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/be-dora-ready-dora-compliance-checklist\/","url":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/be-dora-ready-dora-compliance-checklist\/","name":"DORA Compliance Checklist | Be DORA Ready | Acora","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/be-dora-ready-dora-compliance-checklist\/#primaryimage"},"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/be-dora-ready-dora-compliance-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/06\/Be-Dora-Ready-Guide-Acora.jpg","datePublished":"2024-06-26T14:31:57+00:00","dateModified":"2025-01-13T13:27:50+00:00","description":"Prepare for DORA compliance! Use our checklist to ensure your financial institution meets the DORA requirements by 2025.","breadcrumb":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/be-dora-ready-dora-compliance-checklist\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acora.s.nomatter.dev\/nltest\/insights\/be-dora-ready-dora-compliance-checklist\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/be-dora-ready-dora-compliance-checklist\/#primaryimage","url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/06\/Be-Dora-Ready-Guide-Acora.jpg","contentUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/06\/Be-Dora-Ready-Guide-Acora.jpg","width":1920,"height":1080,"caption":"Be Dora Ready Guide Acora"},{"@type":"BreadcrumbList","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/be-dora-ready-dora-compliance-checklist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acora.s.nomatter.dev\/nltest\/"},{"@type":"ListItem","position":2,"name":"Be DORA Ready: DORA Compliance Checklist"}]},{"@type":"WebSite","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website","url":"https:\/\/acora.s.nomatter.dev\/nltest\/","name":"Acora NL Test","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acora.s.nomatter.dev\/nltest\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/resources\/18242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/types\/resources"}],"author":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/users\/24"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/media\/18244"}],"wp:attachment":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/media?parent=18242"}],"wp:term":[{"taxonomy":"resources_categories","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/resources_categories?post=18242"},{"taxonomy":"service-category","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/service-category?post=18242"},{"taxonomy":"service-type","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/service-type?post=18242"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/insight-format?post=18242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}