Simplify DORA Third-Party Assessments
The Digital Operational Resilience Act (DORA) is designed to ensure that the European financial sector is able to maintain resilience during severe operational disruptions.
DORA sets uniform requirements for the security of network and information systems of companies and organizations operating in the financial sector such as banks, insurance companies, and investment firms.
DORA creates a regulatory framework for digital operational resilience whereby all firms must confirm that they can withstand, respond to, and recover from a wide range of ICT disruptions and cyber threats. It also applies to critical third parties that provide ICT (Information Communication Technologies) services to the financial services industry, such as cloud platforms or data analytics services.
Assess risks related to ICT third-party providers, including operational risks, concentration risks, and systemic risks.
Ensure that third-party vendor contracts include rights and obligations that can be continuously assessed.
Maintain a register of all ICT third-party providers and services.
Develop recovery and contingency plans in case of large-scale cyberattacks or outages.
Conduct comprehensive due diligence before entering into contracts with third-party ICT service providers.
Monitor concentration risks related to ICT third-party providers.
Test ICT third-party providers’ operational resilience capabilities.
Ensure that subcontractors are subject to the same standards of due diligence, monitoring, and risk management.
The DORA Third-Party Compliance Checklist
This comprehensive checklist examines key articles in DORA Chapter V: Managing of ICT Third-Party Risk and provides guidance for meeting the requirements.
Mapping Prevalent Capabilities to Requirements in DORA Chapter V: Managing of ICT Third-Party Risk
Chapter V, Section I, Articles 28-30 include the practices to meet the regulatory oversight requirements.
NOTE: This is not a comprehensive list of DORA requirements. For a full view of DORA requirements, please see the complete Act and consult your organization’s audit team or external auditor.
Chapter V: Managing of ICT Third Party Risk | |
---|---|
Section I: Key Principles for a Sound Management of ICT Third-Party Risk |
DORA Requirement | Corresponding Third-Party Risk Management Best Practice |
---|---|
Article 28: General Principles |
|
28 (1). Financial entities shall manage ICT third party risk as an integral component of ICT risk within their ICT risk management framework as (a) financial entities that have in place (b) financial entities’ management of ICT third party (i) the nature, scale, complexity and importance of ICT-related dependencies, (ii) the risks arising from contractual 28 (2). As part of their ICT risk management framework, financial entities, other than entities referred to in Article 16(1), first subparagraph, and other than micro-enterprises, shall adopt, and regularly review, a strategy on ICT third-party risk, taking into account the multi-vendor strategy referred to in Article 6(9), where applicable. The strategy on ICT third-party risk shall include a policy on the use of ICT services supporting critical or important functions provided by ICT third-party service providers and shall apply on an individual basis and, where relevant, on a sub-consolidated and consolidated basis. The management body shall, on the basis of an assessment of the overall risk profile of the financial entity and the scale and complexity of the business services, regularly review the risks identified in respect to contractual arrangements on the use of ICT services sup-porting critical or important functions. |
Prevalent collaborates with your team on defining and implementing TPRM strategies, processes and solutions in the context of your overall risk management approach; selecting risk assessment questionnaires and frameworks; and optimizing your program to address the entire third-party risk lifecycle – from sourcing and due diligence to termination and offboarding. As part of this process, Prevalent helps you define:
|
28 (3). As part of their ICT risk management framework, financial entities shall maintain and update at entity level, and at sub-consolidated and consolidated levels, a register of information in relation to all contractual arrangements on the use of ICT services provided by ICT third-party service providers. |
With Prevalent, you can build a centralized third-party inventory by importing suppliers via a spreadsheet template or through an API connection to an existing procurement solution. Teams throughout the enterprise can populate key supplier details with a centralized intake form and associated work-flow tasks. This is available to everyone via email invitation, without requiring any training or solution expertise. As part of this process, Prevalent creates comprehensive supplier profiles that contain all documentary evidence related to the third party, plus demographics, 4th-parties, ESG scores, recent business and reputational insights, data breach history, and recent financial performance. This adds needed context for audit processes. As well, Prevalent quantifies inherent risks for all suppliers to effectively tier suppliers, set appropriate levels of further diligence, and determine the scope of ongoing assessments. Criteria used to calculate inherent risk for supplier tiering include:
Part of the tiering process is identifying fourth-party and Nth-party suppliers in your supplier ecosystem as critical dependencies can impact tiering decisions. With Prevalent, you can conduct a questionnaire-based assessment of your suppliers or passively scan the supplier’s public-facing infrastructure. The resulting relationship map depicts extended dependencies that could expose your organization to risk. |
28 (5). Financial entities may only enter into contractual arrangements with ICT third-party service providers that comply with appropriate information security standards. When those contractual arrangements concern critical or important functions, financial entities shall, prior to concluding the arrangements, take due consideration of the use, by ICT third-party service providers, of the most up-to-date and highest quality information security standards. 28 (6). In exercising access, inspection and audit rights over the ICT third-party service provider, financial entities shall, on the basis of a risk-based approach, pre-determine the frequency of audits and inspections as well as the areas to be audited through adhering to commonly accepted audit standards in line with any supervisory instruction on the use and incorporation of such audit standards. |
Leverage a standardized risk assessment in the Prevalent Platform, such as one based on ISO 27001 to determine adherence to key third-party risk management principles. Workflow automations, task management, and automated evidence review capabilities to evaluate risk scores simplifies the process. Complement periodic questionnaire-based risk assessments with continuous tracking and analysis of external threats to third parties with Prevalent. As part of this, Prevalent monitors the Internet and dark web for cyber threats and vulnerabilities. Monitoring sources include:
All monitoring data should is correlated with assessment results and centralized in a unified risk register for each supplier, streamlining risk review, reporting, remediation, and response initiatives, and simplifying audits. |
28 (7). Financial entities shall ensure that contractual arrangements on the use of ICT services may be terminated in any of the following circumstances: (a) significant breach by the ICT third-party service provider of applicable laws, regulations or contractual terms; (b) circumstances identified throughout the monitoring of ICT third-party risk that are deemed capable of altering the performance of the functions provided through the contractual arrangement, including material changes that affect the arrangement or the situation of the ICT third-party service provider; (c) ICT third-party service provider’s evidenced weaknesses pertaining to its overall ICT risk management and in particular in the way it ensures the availability, authenticity, integrity and, confidentiality, of data, whether personal or otherwise sensitive data, or non-personal data; (d) where the competent authority can no longer effectively supervise the financial entity as a result of the conditions of, or circumstances related to, the respective contractual arrangement. 28 (8). For ICT services supporting critical or important functions, financial entities shall put in place exit strategies. The exit strategies shall take into account risks that may emerge at the level of ICT third-party service providers, in particular a possible failure on their part, a deterioration of the quality of the ICT services provided, any business disruption due to inappropriate or failed provision of ICT services or any material risk arising in relation to the appropriate and continuous deployment of the respective ICT service, or the termination of contractual arrangements with ICT third-party service providers under any of the circumstances listed in paragraph 7. (a) disruption to their business activities, (b) limiting compliance with regulatory requirements, (c) detriment to the continuity and quality of services provided to clients. Exit plans shall be comprehensive, documented and, in accordance with the criteria set out in Article 4(2), shall be sufficiently tested and reviewed periodically. |
With Prevalent, you can automate contract assessments and offboarding procedures to reduce your organization’s risk of post-contract exposure.
|
28 (9) and 28 (10) are specific provisions for supervisory authorities and the Joint Committee. |
|
Article 29: Preliminary Assessment of ICT Concentration Risk at Entity Level |
|
29 (1). When performing the identification and assessment of risks referred to in Article 28(4), point (c), financial entities shall also take into account whether the envisaged conclusion of a contractual arrangement in relation to ICT services supporting critical or important functions would lead to any of the following: (a) contracting an ICT third-party service provider that is not easily substitutable; or (b) having in place multiple contractual arrangements in relation to the provision of ICT services supporting critical or important functions with the same ICT third-party service provider or with closely connected ICT third-party service providers. Financial entities shall weigh the benefits and costs of alternative solutions, such as the use of different ICT third-party service providers, taking into account if and how envisaged solutions match the business needs and objectives set out in their digital resilience strategy. |
If an alternate third party is required due to non-compliance, higher risk score, or excessive and concentrated use, Prevalent provides networks of completed third-party risk assessments standardized on a common industry framework to determine a suitable replacement. Our on-demand risk assessment libraries feature access to tens of thousands of completed and verified assessments and supporting evidence and can serve as a repository of potential new third parties that have already been vetted against stringent ICT security guidelines. |
29 (2). Where the contractual arrangements on the use of ICT services supporting critical or important functions include the possibility that an ICT third-party service provider further subcontracts ICT services supporting a critical or important function to other ICT third-party service providers, financial entities shall weigh benefits and risks that may arise in connection with such subcontracting, in particular in the case of an ICT subcontractor established in a third-country. Where contractual arrangements concern ICT services supporting critical or important functions, financial entities shall duly consider the insolvency law provisions that would apply in the event of the ICT third-party service provider’s bankruptcy as well as any constraint that may arise in respect to the urgent recovery of the financial entity’s data. Where contractual arrangements on the use of ICT services supporting critical or important functions are concluded with an ICT third-party service provider established in a third country, financial entities shall, in addition to the considerations referred to in the second subparagraph, also consider the compliance with Union data protection rules and the effective enforcement of the law in that third country. Where the contractual arrangements on the use of ICT services supporting critical or important functions provide for subcontracting, financial entities shall assess whether and how potentially long or complex chains of subcontracting may impact their ability to fully monitor the contracted functions and the ability of the competent authority to effectively supervise the financial entity in that respect. |
With Prevalent, you can identify fourth-party and Nth-party subcontracting relationships in your third-party ecosystem. Conduct a questionnaire-based assessment of your suppliers or passively scan the supplier’s public-facing infrastructure. The resulting relationship map depicts extended dependencies and information flows that could expose your organization to risk. |
Article 30: Key Contractual Provisions |
|
30 (1). The rights and obligations of the financial entity and of the ICT third-party service provider shall be clearly allocated and set out in writing. The full contract shall include the service level agreements and be documented in one written document which shall be available to the parties on paper, or in a document with another downloadable, durable and accessible format. 30 (2). The contractual arrangements on the use of ICT services shall include at least the following elements: (a) a clear and complete description of all functions and ICT services to be provided by the ICT third-party service provider, indicating whether subcontracting of an ICT service supporting a critical or important function, or material parts thereof, is permitted and, when that is the case, the conditions applying to such subcontracting; (b) the locations, namely the regions or countries, where the contracted or subcontracted functions and ICT services are to be provided and where data is to be processed, including the storage location, and the requirement for the ICT third-party service provider to notify the financial entity in advance if it envisages changing such locations; (c) provisions on availability, authenticity, integrity and confidentiality in relation to the protection of data, including personal data; (d) provisions on ensuring access, recovery and return in an easily accessible format of personal and non-personal data processed by the financial entity in the event of the insolvency, resolution or discontinuation of the business operations of the ICT third-party service provider, or in the event of the termination of the contractual arrangements; (e) service level descriptions, including updates and revisions thereof; (f) the obligation of the ICT third-party service provider to provide assistance to the financial entity at no additional cost, or at a cost that is determined ex-ante, when an ICT incident that is related to the ICT service provided to the financial entity occurs; (h) termination rights and related minimum notice periods for the termination of the contractual arrangements, in accordance with the expectations of competent authorities and resolution authorities; (i) the conditions for the participation of ICT third-party service providers in the financial entities’ ICT security awareness programs and digital operational resilience training in accordance with Article 13(6). 30 (3). The contractual arrangements on the use of ICT services supporting critical or important functions shall include, in addition to the elements referred to in paragraph 2, at least the following: (a) full service level descriptions, including updates and revisions thereof with precise quantitative and qualitative performance targets within the agreed service levels to allow effective monitoring by the financial entity of ICT services and enable appropriate corrective actions to be taken, without undue delay, when agreed service levels are not met; (b) notice periods and reporting obligations of the ICT third-party service provider to the financial entity, including notification of any development that might have a material impact on the ICT third-party service provider’s ability to effectively provide the ICT services supporting critical or important functions in line with agreed service levels; (c) requirements for the ICT third-party service provider to implement and test business contingency plans and to have in place ICT security measures, tools and policies that provide an appropriate level of security for the provision of services by the financial entity in line with its regulatory framework; (d) the obligation of the ICT third-party service provider to participate and fully cooperate in the financial entity’s TLPT as referred to in Articles 26 and 27; (e) the right to monitor, on an ongoing basis, the ICT third-party service provider’s performance, which entails the following: (i) unrestricted rights of access, inspection and audit by the financial entity, or an appointed third party, and by the competent authority, and the right to take copies of relevant documentation on-site if they are critical to the operations of the ICT third-party service provider, the effective exercise of which is not impeded or limited by other contractual arrangements or implementation policies; (ii) the right to agree on alternative assurance levels if other clients’ rights are affected; (iii) the obligation of the ICT third-party service provider to fully cooperate during the onsite inspections and audits performed by the competent authorities, the Lead Overseer, financial entity or an appointed third party; and (iv) the obligation to provide details on the scope, procedures to be followed and frequency of such inspections and audits; (f) exit strategies, in particular the establishment of a mandatory adequate transition period: (i) during which the ICT third-party service provider will continue providing the respective functions, or ICT services, with a view to reducing the risk of disruption at the financial entity or to ensure its effective resolution and restructuring; 30 (4). When negotiating contractual arrangements, financial entities and ICT third-party service providers shall consider the use of standard contractual clauses developed by public authorities for specific services. |
Prevalent centralizes the distribution, discussion, retention and review of vendor contracts to automate the contract lifecycle and ensure key clauses are enforced. Key capabilities include:
Continually evaluate the effectiveness of your TPRM program according to changing business needs and priorities by measuring third-party vendor key performance indicators (KPIs) and key risk indicators (KRIs) through the relationship lifecycle with the Prevalent Platform. With this capability, you can ensure that clear responsibilities and right-to-audit clauses are articulated in the vendor contract, and SLAs tracked and managed accordingly. |
30 (5). Includes specific provisions for supervisory authorities and the Joint Committee. |
The EBA Guidelines set out the internal governance arrangements that credit, payment, and electronic money institutions...
Mitigate privacy risks and comply with GDPR requirements by assessing third-party data protection controls with these...
With compliance mandated by January 2025, now is the time for organizations to examine their third-party...