DORA implementation

DORA implementation

Key elements of DORA according to BaFin

Governance and organisation

Area/TopicDORA RequirementDifference to BAIT/VAIT
StrategyMandatory DOR StrategyBAIT/VAIT require IT Strategy; DORA introduces a separate ICT-resilience-focused strategy
GovernanceICT governance integrated into enterprise-wide risk mgmt.BAIT/VAIT focus on information security governance
RolesICT risk control function + ICT third-party monitoring functionBAIT/VAIT only require ISO; no explicit third-party monitoring role
Management BodyStrong, explicit, prescriptive responsibilities and required ICT competenceBAIT/VAIT are less detailed; no explicit training requirement
PoliciesMandatory approval of multiple ICT-specific policiesBAIT/VAIT do not mandate policy approval at board level

Information risk and information security management

Area/TopicDORA RequirementDifference to BAIT/VAIT
Information Security IntegrationFully embedded in ICT risk managementBoard-level approval and oversight
Security PoliciesExplicit and mandatory policiesMust be risk-aligned and documented
Classification & HandlingFormal info classification schemeApplies to entire lifecycle
IAMStrong MFA, privilege mgmt, SoDAutomated processes expected for larger firms
DLP & Safe Data HandlingPrevent leakage; environment separationProductive data in test systems only with strict controls
Logging & MonitoringComprehensive logs; SIEM-level detectionLogs must be integrity-protected
CryptographyStrong encryption & key mgmtLegacy algorithms discouraged

IT operations

Area/TopicDORA RequirementDifference to BAIT/VAIT
Operational stabilityUpdated, reliable, technologically resilient ICT systems; stress-phase abilitySignificantly stronger; stress-phase capability new
Legacy systemsAnnual + event-driven risk assessmentsNew mandatory frequency
System & info classificationFull ICT system + information inventory with dependenciesHolistic model, new scope
Change managementAll changes in scope, no thresholdMajor expansion, largest impact
BackupsPolicy + segregated systems + reconciliationStronger than previous requirements
RestorationCIA+A protection ensured during restoreNew legal requirement
TestingMandatory, scenario-basedMore extensive than BAIT/VAIT

ICT business continuity management

Area/TopicDORA RequirementDifference to BAIT/VAIT
Core documentFormal ICT business continuity policyNo explicit ICT BCM policy term
PlansICT BCM plans + ICT response & recovery plansIT contingency / continuity plans
ScenariosClimate, insider, political instability, data-location risks, power outages explicitly requiredGeneric disruption scenarios
GovernanceManagement body approves & oversees ICT BCM; annual review & testingBoard role less explicit
TestingAnnual + event-driven; includes crisis communication plansAnnual/regular, no explicit crisis-comms testing
Crisis functionDedicated crisis management function for ICT incidentsNot explicitly required

ICT project management and application development

Area/TopicDORA RequirementDifference to BAIT/VAIT
Project methodologyMinimum mandatory elementsHigh-level governance
DocumentationLess documentation requiredExtensive
Secure developmentHighly prescriptive (secure coding, environments)General
Source-code testingMandatory SAST/DAST for internet-facing systemsNot explicitly required
Third-party codeMandatory anomaly testingNot explicitly required
EUC toolsFully includedSeparate regime
Change managementAll changesOnly significant changes
Separation of dutiesMandatoryRequired
Testing requirementsDetailed, structured, mandatoryLess specific

ICT third-party risk management

Area/TopicDORA RequirementDifference to BAIT/VAIT
ScopeICT third-party regime for all ICT services supporting business operationsBAIT/VAIT mainly cover outsourcing; many ICT vendors previously out of scope
Outsourcing LinkICT TPRM supplements MaRisk/MaGo outsourcing rulesBefore: only sectoral outsourcing; no parallel EU ICT layer
Critical / Important FunctionsClassification of ICT services for critical or important functions (CIF)BAIT/VAIT work with material outsourcing; CIF is a new ICT-specific lens
Contractual ContentDetailed minimum clauses for all ICT contracts + extra set for CIFBAIT/VAIT clauses more generic, less ICT-specific and less prescriptive
SubcontractingRTS SUB with rules for chains, notice, objection and terminationSub-outsourcing only broadly addressed; no ICT-specific chain rules
Risk Analysis & Due DiligenceStandardised, expanded risk & provider assessment, incl. concentrationExisting due diligence narrower, no harmonised ICT risk catalogue
Exit & ConcentrationTested exit plans and explicit ICT concentration risk managementExit often waived intra-group; concentration not as central and detailed
Governance & RegisterBoard-approved ICT TPRM policy, monitoring role and information registerNo specific ICT-TPRM policy/role; no ICT-wide register requirement

Operational information security

AreaDORA RequirementDifference to BAIT/VAIT
Network securityLegally binding minimum network security controlsGood practice framework
DetectionComprehensive, correlated, multi-layer detection tools (SIEM-equivalent)General expectation
Alert managementAlerts must route to ICT securityNot formally regulated
Vulnerability mgmt.Mandatory structured vulnerability lifecycle (ID → Assess → Remediate → Verify)General controls
LoggingMandatory integrity-protected logging for all critical eventsStrong expectation
CoverageFull-environment coverage (on-prem, cloud, hybrid)Risk-based
GovernanceDirect integration with ICT risk mgmt. + board oversightCISO involvement

Identity and access management

Area/TopicDORA RequirementDifference to BAIT/VAIT
ScopeSeparate identity management (Art. 20) and access management (Art. 21)BAIT/VAIT bundle IAM; split is not made explicit
Identity ManagementFormal identity management guidelines and proceduresIdentity aspects implicit, not a standalone regulated topic
Unique IDs & LifecycleUnique IDs for all users (incl. third-party staff) + full lifecycle processPersonal accounts expected, but uniqueness & lifecycle less explicit
Access PrinciplesCombination of need-to-use, least privilege and need-to-knowNeed-to-use principle is new; others already in BAIT/VAIT
Recertification6-monthly recert for CIF-related rights; annual for all othersBAIT/VAIT require “regular” review, but no fixed cycles or CIF link
Third-Party AccessThird-party staff fully covered by same IAM rules as internal usersExternal users controlled, but not framed as equal IAM population
Privileged & Emergency AccessAd-hoc, need-to-use-only privileged access; strong auth; PAM encouragedStrong admin controls exist, but PAM-like tooling becomes clear expectation

Annex: Minimum contractual clauses

Area/TopicDORA RequirementDifference to BAIT/VAIT
Form & StructureWritten, consolidated ICT contract incl. SLAs; formal documentation of amendmentsBAIT/VAIT require written outsourcing contracts but no unified ICT contract format
Service DescriptionClear, complete description of all ICT services incl. updates and revisionsBAIT/VAIT require service description, but less detailed and not ICT-specific
LocationsExplicit countries/regions of processing, storage, and service provision; advance notice of changesLocation clauses expected, but not mandatory at this level of specificity
Security ObjectivesContract must embed availability, integrity, confidentiality, authenticity requirementsSecurity clauses required, but DORA standardises and expands minimum scope
Data Access & ReturnGuaranteed access, recovery, return and deletion of data incl. insolvency scenariosBAIT/VAIT require reversibility, but without DORA’s insolvency-specific clarity
Incident SupportMandatory support in ICT incidents at no or pre-agreed costIncident handling covered, but not formally defined as a contractual minimum
Cooperation with AuthoritiesProvider must fully cooperate with competent authoritiesRegulatory cooperation clauses exist, but not ICT-specific or uniformly required
TrainingProvider participation in ICT and resilience trainingNo equivalent requirement for provider training participation
CIF-Specific SLAsPrecise quantitative and qualitative SLA targets for critical/important functionsSLAs required, but no CIF-layered SLA precision in BAIT/VAIT
CIF ReportingEnhanced reporting obligations on performance and risk developmentsReporting obligations exist, but less structured and not ICT-specific
CIF Business ContinuityProvider must have and test BCM plans aligned with the entity’s needsBCM expected generally, but not mandated as a contractual CIF obligation
CIF Security MeasuresProvider must implement ICT security measures matching regulatory expectationsSecurity required, but DORA formalises the minimum set
TLPT ParticipationProvider must support/participate in TLPT for CIFNo TLPT participation requirement
Monitoring & AuditStrong, unrestricted audit & information rights, incl. pooled auditsAudit rights required for outsourcing, but not uniformly across ICT services
Exit & TransitionMandatory, tested exit support incl. orderly migration and transition periodsExit required only for material outsourcing; intra-group relief exists
KPIs & PenaltiesDefined KPIs, corrective actions and contractual penalties for CIFPerformance monitoring exists, but no KPI/penalty specificity
SubcontractingStrict controls for subcontracting chains, notice periods, objection rightsSub-outsourcing addressed, but far less detailed and not ICT-specific

Source: BaFin, Supervisory statement: Guidance notes on the implementation of DORA for ICT risk management and ICT third-party risk management

https://www.bafin.de/SharedDocs/Downloads/EN/Anlage/dl_2024_07_08_Aufsichtsmitteilung_Umsetzungshinweise_DORA_en.html