Compliance Dashboard
Real-time status of your DORA Pillar 1 obligations — Governance & ICT Risk Management.
DORA Article Compliance Status
Click an article to navigate to the relevant module.
Pillar 2 — Incident Status
| Incident | Severity | Status | Report Stage |
|---|---|---|---|
| Core Banking Unavailability INC-2026-001 |
Major | Contained | ⏳ Intermediate due |
| Third-Party Data Feed Latency INC-2026-003 |
Reviewing | Open | Classifying |
Pillar 4 — Third-Party Alerts
| Alert | Provider | Priority |
|---|---|---|
| Contract missing 3 mandatory clauses | IBM Core Banking | Critical |
| CTPP designation — contracts to review | Azure + IBM | High |
| Exit plan missing | IBM Core Banking | High |
| Subcontractor approval pending | IBM / Kyndryl (India) | Medium |
Recent Risks
Art. 9| Risk | Score | Status |
|---|---|---|
No risks registered yet. | ||
Framework Review Timeline
Art. 6 & 16Governance Register
Roles, responsibilities and accountability assignments for ICT risk governance — required under DORA Article 5.
Role & Responsibility Matrix
DORA Art. 5(2)(a–j)| Role | Name | Responsibility | DORA Article | Review Date | Status | |
|---|---|---|---|---|---|---|
| CISO | Sample: Anna Hansen | Owns ICT Risk Management Framework, reports to Board | Art. 5(4) | 2025-12-31 | ✓ Active | |
| Board / Management Body | Sample: Board of Directors | Defines, approves and oversees ICT risk strategy and tolerance | Art. 5(2) | 2025-12-31 | ✓ Active |
ICT Risk Framework
Three-level governance structure: Level 1 Policy sets strategic direction, Level 2 Guidelines provide domain-specific standards, and Level 3 ICT Routines define operational procedures — all mapped to RTS 2024/1774 requirements.
Annual Review & Board Approval Tracker
Art. 6(5) & Art. 16| Review Type | Trigger | Last Completed | Next Due | Status | Notes |
|---|
CIF Register
Identify and formally designate Critical or Important Functions (CIFs) — the foundation of proportional DORA compliance. CIF status determines asset classification, incident reporting thresholds, third-party oversight intensity, and resilience testing scope.
ICT Asset Register
Inventory of ICT systems, applications, data, and third-party services with criticality classification.
ICT Asset Inventory
DORA Art. 8(1–2)| Asset Name | Type | Business Function | Criticality | Owner | Third Party | |
|---|---|---|---|---|---|---|
| Core Banking System | Application | Payment Processing | Critical | CTO | — | |
| Customer Data Warehouse | Data | Reporting & Analytics | High | CTO | — | |
| Cloud Infrastructure (Azure) | Infrastructure | All Digital Services | Critical | CTO | Microsoft Azure |
Risk Register
All identified ICT risks with inherent scoring, treatment status, and owner accountability.
ICT Risk Inventory
DORA Art. 9 & 10| Risk ID | Risk Description | Category | L | I | Score | Owner | Treatment | |
|---|---|---|---|---|---|---|---|---|
| R-001 | Ransomware attack on core banking system | Cyber | 4 | 5 | 20 | CISO | Mitigate | |
| R-002 | Cloud provider outage affecting digital channels | Availability | 3 | 4 | 12 | CTO | Mitigate | |
| R-003 | Unauthorised access to customer PII | Data | 2 | 5 | 10 | CISO | Transfer |
Risk Heat Map
5×5 likelihood × impact matrix showing distribution of registered ICT risks.
ICT Risk Matrix
Art. 9Control Library
ICT controls mapped to DORA articles, with implementation status and evidence tracking.
Control Inventory
DORA Art. 9–10 & 12| Control ID | Control Name | DORA Article | Type | Owner | Status | Evidence | |
|---|---|---|---|---|---|---|---|
| C-001 | Multi-factor authentication (MFA) | Art. 10 | Preventive | CISO | ✓ Implemented | Policy v2.1 | |
| C-002 | Continuous vulnerability scanning | Art. 12 | Detective | CTO | ⏳ Partial | — | |
| C-003 | Encrypted backups with tested restoration | Art. 9 | Corrective | CTO | ✗ Not Implemented | — |
Board Report
Executive summary of ICT risk exposure and DORA compliance posture for management body reporting.
DORA Pillar 1 Compliance Overview
| Article | Requirement | Module | Readiness | Gap Summary |
|---|---|---|---|---|
| Art. 5 | Management body accountability for ICT risk | Governance Register | ⏳ Partial | Roles defined; training log incomplete |
| Art. 6 | ICT Risk Management Framework | ICT Risk Framework | ⏳ Partial | BCP/DRP component missing |
| Art. 8 | ICT asset identification and classification | Asset Register | ✓ Good | Critical assets catalogued |
| Art. 9 | ICT risk identification and treatment | Risk Register | ⏳ Partial | 1 critical risk open, treatment in progress |
| Art. 10 | ICT protection and prevention controls | Control Library | ✗ Gap | C-003 backup control not implemented |
| Art. 16 | Annual ICT Risk Framework review | Framework Review | ⏳ Scheduled | Due Dec 2025 — not started |
Recommended Actions
| # | Action | Owner | Priority | Deadline |
|---|---|---|---|---|
| 1 | Implement C-003: Encrypted backup with tested restoration | CTO | Critical | 2025-03-31 |
| 2 | Complete BCP/DRP ICT component in Framework | CISO | High | 2025-04-30 |
| 3 | Finalize ICT Risk Tolerance Statement (Art. 6) | CISO | Medium | 2025-05-31 |
| 4 | Schedule and complete Board training on DORA | DORA Manager | Medium | 2025-06-30 |
Testing Programme
All ICT systems supporting Critical or Important Functions must be tested at least annually. Scope is driven directly by the CIF Register — gaps are flagged automatically when a CIF function has no test record in the rolling 12-month window.
CIF Function Coverage Matrix
Art. 24(1) — annual testing obligationEach row is a CIF function from the CIF Register. Columns show the 7 test types required under Art. 25. Tested ≤12mo Scheduled Gap
| CIF Function | Vuln Scan | Source Code | Network Sec | Scenario Test | Pen Test | Gap Analysis | Physical Sec | Score |
|---|
Test Register
Art. 25 — testing programme| Test ID | Type | CIF Function | Tester | Planned | Completed | Status | Findings |
|---|
TLPT Tracker
Advanced operational resilience testing for significant entities. Mandatory every 3 years on live production systems supporting CIFs. RTS 2025/1190 in force 8 July 2025 — first TLPT deadline before 17 January 2028.
TLPT 8-Phase Lifecycle — TIBER-EU Framework
RTS 2025/1190 · Art. 26(3)TLPT Scope — CIF-Linked Systems
Art. 26(2) — live production only| System | CIF Function | Env | In Scope |
|---|
3rd-Party Cooperation Tracker
Art. 30(3)(d) — contractual obligation| Provider | Service | Contract Clause | Status |
|---|
Provider Register
Master register of all ICT third-party service providers. Pre-seeded from CIF Register third-party links — no double entry. CIF-supporting providers are flagged for enhanced due diligence and mandatory contractual provisions under Art. 30.
Provider Register
Art. 28(3) · ITS 2024/2956| Provider | Country | Type | CIF Support | CTPP | Risk Rating | Contract | Exit Plan |
|---|
Contract Register
All ICT contractual arrangements with providers supporting Critical or Important Functions must contain 8 mandatory clauses per Art. 30. The compliance checker below scores each contract and flags gaps that must be remediated.
Art. 30 — 8 Mandatory Contractual Clauses (CIF-Supporting Arrangements)
DORA Art. 30 · RTS 2024/1773Contract Compliance Checker
Art. 30 — mandatory provisions| Contract | Provider | CIF? | C1 | C2 | C3 | C4 | C5 | C6 | C7 | C8 | Score | Status |
|---|
Register of Information
Regulatory submission register of all ICT contractual arrangements with third-party providers. Submitted annually to the national competent authority (first deadline: 30 April 2025). Used by ESAs to designate Critical Third-Party Providers (CTPPs).
ITS 2024/2956 — Register Template Structure
Commission Implementing Regulation (EU) 2024/2956| RT Field | Provider (LEI) | Service | CIF Function | Data Location | Subcontractors | Est. Annual Cost | CTPP |
|---|
CTPP Watch List — ESA Designation Status
Art. 31 — first CTPP list: 18 November 2025| Provider | Services to FE | ESA Lead Overseer | Designation Date | Status | Action Required |
|---|---|---|---|---|---|
| CloudCore AS | IaaS / Cloud Infrastructure | EBA | 18 Nov 2025 | ⚠ CTPP Designated | Review contracts; update governance; board escalation |
| PolicySoft Ltd | Core Policy Admin SaaS | — | — | Not designated | Monitor; include in next RoI submission |
| PayHub Nordic | Payment processing gateway | — | — | Not designated | Monitor; TLPT clause gap must be resolved |
| DataVault GmbH | Data warehouse / analytics | — | — | ⏳ Under assessment | ESA assessment ongoing — watch for designation |