Information Security Templates

Digital Operational Resilience Act (DORA)

1. Governance and ICT Risk Management Framework

Operational Resilience Policy : Outlines the overall approach to operational resilience, covering how the organization will ensure continuity and safety of critical services.

ICT Risk Management Policy : Establishes guidelines for identifying, managing, and mitigating ICT risks.

Risk Appetite and Tolerance Policy : Defines acceptable levels of ICT risk for the organization, with emphasis on operational resilience and critical services.

Third-Party and Vendor Management Policy : Provides standards for assessing, monitoring, and managing risks associated with third-party ICT providers, including outsourcing.

2. ICT Security and Cybersecurity Policies

ICT Security Policy : Establishes the organization's stance on ICT security and covers general controls for protecting ICT systems and data.

Cybersecurity Policy : Focuses on identifying and mitigating cybersecurity threats, including controls and monitoring practices.

Access Control Policy : Defines roles, responsibilities, and standards for accessing systems and data, including user provisioning, authentication, and privileged access.

Data Protection Policy : Ensures data security and confidentiality, covering data encryption, data loss prevention, and data integrity.

Network Security Policy : Sets standards for securing network architecture, firewalls, VPNs, and other network controls.

Vulnerability Management and Patch Management Policy : Outlines processes for detecting, assessing, and remediating ICT vulnerabilities and implementing timely security patches.

Endpoint Security Policy : Establishes controls for securing endpoints, including employee devices, servers, and mobile devices.

3. Operational Resilience and Incident Management

Business Continuity Management (BCM) Policy : Details planning and testing of procedures to ensure continuity of critical operations and services during disruptions.

Disaster Recovery Policy : Provides for the recovery of ICT systems and data in the event of a disaster, including recovery time objectives (RTOs) and recovery point objectives (RPOs).

Incident Response Policy : Outlines procedures for responding to ICT incidents, including roles, responsibilities, and reporting requirements.

Crisis Management Policy : Defines processes for managing crises, such as a major ICT failure, data breach, or other large-scale disruption.

Communication Policy : Specifies how internal and external communications are handled in an incident, including customer, regulatory, and stakeholder communications.

4. Monitoring, Testing, and Reporting

Continuous Monitoring Policy : Details real-time or near-real-time monitoring of ICT systems for unusual activity, security incidents, and performance issues.

Penetration Testing and Vulnerability Assessment Policy : Establishes regular penetration testing and vulnerability assessments to identify and address ICT weaknesses.

Stress Testing and Scenario Analysis Policy : Provides guidance for conducting stress tests and scenario analysis to evaluate ICT system resilience under adverse conditions.

Internal Audit and Assurance Policy : Specifies requirements for regular audits to ensure compliance with ICT resilience and security policies.

Reporting and Documentation Policy : Covers internal and external reporting requirements, including reporting to senior management and regulators, incident documentation, and records management.

5. Third-Party and Supply Chain Management

Third-Party Risk Assessment Policy : Defines criteria and processes for assessing the risks of engaging third-party ICT providers.

Third-Party Resilience and Security Requirements Policy : Ensures that vendors and suppliers meet the organization's resilience and security standards.

Outsourcing Policy : Governs outsourced ICT activities, ensuring they are managed effectively and do not pose excessive risk to operational resilience.

Subcontractor Management Policy : Details oversight of subcontractors, requiring that they meet the same standards as primary third-party providers.

6. Regulatory Compliance and Reporting

Regulatory Compliance Policy : Establishes guidelines for complying with applicable regulations, including DORA and other relevant ICT and cybersecurity standards.

Regulatory Reporting Policy : Outlines the processes for reporting ICT incidents, outages, and security breaches to relevant regulatory authorities.

Data Localization and Cross-Border Data Transfer Policy : Ensures compliance with data residency requirements and governs cross-border data transfers.

7. Employee Awareness and Training

Training and Awareness Policy : Ensures all employees receive training on ICT security, operational resilience, and incident response.

Acceptable Use Policy : Defines acceptable use of ICT resources and systems, including security expectations for employees.

Phishing and Social Engineering Awareness Policy : Educates employees on how to identify and report phishing, social engineering, and other cyber threats.

8. ICT Change and Configuration Management

ICT Change Management Policy : Governs the approval, testing, and documentation of changes to ICT systems, ensuring changes do not negatively impact resilience.

Configuration Management Policy : Establishes processes for maintaining secure and stable ICT configurations, including baselining and configuration control.

Software Development and Deployment Policy : Ensures secure and resilient software development and deployment practices, including DevSecOps and secure coding standards.

9. Backup and Recovery Policies

Data Backup Policy : Establishes requirements for regular backups of critical data, including frequency, storage, and encryption.

Data Restoration and Testing Policy : Ensures backups are regularly tested to verify data integrity and recovery time objectives.

10. Policy Management and Oversight

Policy Management Policy : Outlines how policies are created, reviewed, updated, and communicated within the organization.

Risk and Control Self-Assessment (RCSA) Policy : Provides for periodic assessments to evaluate the effectiveness of ICT risk controls.

Oversight and Governance Policy : Defines roles and responsibilities for ICT risk management oversight, including the Board, senior management, and risk committees.

Back