{"id":5199,"date":"2024-06-12T09:34:59","date_gmt":"2024-06-12T09:34:59","guid":{"rendered":"https:\/\/locaterisk.com\/?p=5199"},"modified":"2025-08-08T07:24:21","modified_gmt":"2025-08-08T07:24:21","slug":"dora-digital-operational-resilience-act","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/dora-digital-operational-resilience-act\/","title":{"rendered":"DORA: Digital Operational Resilience Act"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">DORA: Digital Operational Resilience Act - challenges and opportunities<\/h1>\r\n            <p class=\"paragraph\">The Digital Operational Resilience Act (DORA) will add to the plethora of regulations for the IT of financial companies from January 2025. As BaFin's existing regulatory requirements (BAIT, ZAIT, KAIT, VAIT; XAIT for short), among others, served as a template for this, many companies should be well prepared. For everyone else, there is plenty of need for action.<br><br>The financial sector is confronted with a range of regulatory requirements that are tailored by BaFin to the respective business area. The EU's Digital Operational Resilience Act (DORA) now supplements these existing national requirements and creates a uniform framework.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act-1024x683.png\" alt=\"\" class=\"wp-image-5239\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act-1024x683.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act-300x200.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act-768x512.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act-18x12.png 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">From January 2025, the Digital Operational Resilience Act (DORA) will come into force and bring comprehensive changes for IT security in the financial sector.<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Who is affected by DORA?<\/h3>\n\n\n\n<p>In contrast to XAIT, DORA is not designed to be sector-specific, but cross-sectoral. This means that the regulation affects insurance companies as well as capital management companies, banks and investment funds, etc. Specifically, this includes (scope of application Article 2 (1) DORA):<br><\/p>\n\n\n\n<p>Credit institutions<br>Payment institutions<br>Account information service provider<br>Electronic money institutions<br>Investment firms<br>Provider of crypto services<br>Central securities depository<br>Central counterparties<br>Trading venues<br>Trade repository<br>Alternative investment fund manager<br>Management companies<br>Data provision services<br>Insurance and reinsurance companies<br>Insurance intermediaries, reinsurance intermediaries and insurance intermediaries in secondary employment<br>Company pension schemes<br>Rating agencies<br>Administrators of critical reference values<br>Swarm financing service provider<br>Securitization register<br>ICT service provider<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br><strong>What are the overarching objectives of DORA?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reduction of fragmentation:<\/strong> <br>DORA aims to eliminate existing regulatory differences and create a uniform standard.<\/li>\n\n\n\n<li><strong>Strengthening digital resilience: <\/strong><br>Establishment of stricter standards for the management of information and communication technology (ICT) as well as their development and implementation.<\/li>\n\n\n\n<li><strong>Harmonization of regulations:<\/strong> <br>Creation of a uniform regulatory framework for IT security in the financial sector that enables cross-border recognition of audit results.<\/li>\n\n\n\n<li><strong>Risk management:<\/strong> <br>Financial institutions need to implement effective risk management procedures to identify, classify and manage ICT risks.<\/li>\n\n\n\n<li><strong>Incident Reporting: <\/strong><br>The regulation obliges financial institutions to report serious ICT incidents to the competent authorities.<\/li>\n\n\n\n<li><strong>Increase transparency: <\/strong><br>Access to ICT incidents enables companies and authorities to better counter future threats.<\/li>\n\n\n\n<li><strong>Eliminate redundancies:<\/strong> <br>At European level, reporting obligations are simplified and redundant information is minimized.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><br><strong>Challenges<\/strong><\/h3>\n\n\n\n<p>DORA is intended to ensure a high level of security and resilience of the financial sector in the EU and can be roughly summarized in the following four chapters:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. ICT risk management (Art. 5-16)<\/strong><\/h3>\n\n\n\n<p>Financial institutions must have a comprehensive, well-documented set of rules for ICT risk management. This includes strategies, policies, procedures, ICT protocols and tools for identifying, classifying, assessing, monitoring and mitigating ICT risks. The management body of the financial company (e.g. the management board of a bank) is responsible for the strategy and control of ICT risk management.<\/p>\n\n\n\n<p><strong><strong>Requirements and need for implementation:<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Planning and provision of resources and appropriate budget<\/li>\n\n\n\n<li>Adjustment of the regulations once a year and after serious incidents<\/li>\n\n\n\n<li>Regular review through internal audits<\/li>\n\n\n\n<li>Ensuring the independence of risk management, controls and audits by separating functions<\/li>\n\n\n\n<li>Information security guideline with rules to protect the availability, authenticity, integrity and confidentiality of data<\/li>\n\n\n\n<li>ICT systems must always be up to date<\/li>\n<\/ul>\n\n\n\n<p><strong>This is how LocateRisk can provide support:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identification and classification of IT assets<\/li>\n\n\n\n<li>Carrying out the annual IT risk assessment<\/li>\n\n\n\n<li>Carrying out an incident-related review at any time<\/li>\n\n\n\n<li>Continuous monitoring of the security of IT systems<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. ICT incident reporting (Art. 17-23)<\/strong><\/h3>\n\n\n\n<p>In the event of significant ICT-related incidents, rapid, comprehensive reporting is required. DORA defines precise requirements and deadlines for such reports. Companies must have processes in place for dealing with IT incidents to ensure rapid detection and resolution.<\/p>\n\n\n\n<p><strong>Goals:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensuring rapid detection and response to IT incidents<\/li>\n\n\n\n<li>Fast reporting to authorities and customers\/consumers<\/li>\n\n\n\n<li>Promoting the exchange of information on new threats<\/li>\n<\/ul>\n\n\n\n<p><strong>Requirements and need for implementation:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Classification of ICT incidents according to specific criteria<\/li>\n\n\n\n<li>Immediate reporting of serious IT incidents to the authorities within set deadlines<\/li>\n\n\n\n<li>Creation of crisis communication plans<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. test of digital, operational resilience\/digital resilience testing (Articles 24-27)<\/strong><\/h3>\n\n\n\n<p>DORA requires financial companies to conduct comprehensive testing programs to assess their preparedness for cyber risks and to identify potential vulnerabilities.<\/p>\n\n\n\n<p><strong>Goals:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Objective control of the effectiveness of IT risk management<\/li>\n\n\n\n<li>Initiation and verification of continuous improvement of the protective measure<\/li>\n<\/ul>\n\n\n\n<p><strong><strong>Requirements and need for implementation:<\/strong><\/strong><br>The basic annual tests include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vulnerability assessments and scans<\/li>\n\n\n\n<li>Open source analyses<\/li>\n\n\n\n<li>Network security assessments<\/li>\n\n\n\n<li>GAP analyses<\/li>\n\n\n\n<li>Physical security checks<\/li>\n\n\n\n<li>Questionnaires and scans of software solutions<\/li>\n\n\n\n<li>Source code checks<\/li>\n\n\n\n<li>Compatibility tests<\/li>\n\n\n\n<li>Performance tests<\/li>\n\n\n\n<li>End-to-end tests<\/li>\n\n\n\n<li>Penetration tests and more<\/li>\n<\/ul>\n\n\n\n<p>Mandatory tests every three years:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Threat-oriented penetration tests by qualified and reputable testers<\/li>\n<\/ul>\n\n\n\n<p><strong>How LocateRisk can provide support<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vulnerability assessments<\/li>\n\n\n\n<li>Performance tests<\/li>\n\n\n\n<li>GAP analyses<\/li>\n\n\n\n<li>Testing the network security<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. third party ICT risk management\/management of third party ICT risks (Articles 28-44)<\/strong><\/h3>\n\n\n\n<p>In addition to their own IT security, financial companies must also minimize the risks in their business relationships with external service providers. This includes a risk management strategy for third parties such as cloud service providers, software providers, data analysis services and data centers as well as providers of payment services and payment processing.<br><br><strong>Goals:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduce the risk of attacks via the supply chain<\/li>\n\n\n\n<li>Minimize the potential consequences of the failure of individual service providers<\/li>\n<\/ul>\n\n\n\n<p><strong><strong>Requirements and need for implementation:<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Even before the contract is concluded:<\/strong><br>Assessment of the criticality or importance of the outsourced services and the suitability of the third-party ICT service provider based on a comprehensive analysis<\/li>\n\n\n\n<li><strong>Contractual regulations:<\/strong><br>Contracts with third-party ICT providers must contain clear and unambiguous agreements on aspects of operational resilience, including service level agreements (SLAs), availability requirements, security standards and contingency planning.<\/li>\n\n\n\n<li><strong>Monitoring and testing:<\/strong><br>Financial companies are required to continuously monitor the activities of third-party ICT providers and regularly test the effectiveness of security measures and resilience strategies.<\/li>\n\n\n\n<li><strong>Exit strategy:<\/strong><br>A clear exit strategy in the event that the service of a third-party ICT provider is terminated or no longer meets the required standards must be in place to ensure the continuity of business processes and protect against excessive dependence on individual providers.<\/li>\n<\/ul>\n\n\n\n<p><strong>How LocateRisk can provide support<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>On-demand assessment of new business partners<\/li>\n\n\n\n<li>Automated audit of IT and GDPR compliance<\/li>\n\n\n\n<li>Provider, partner and supplier monitoring at freely selectable intervals<\/li>\n\n\n\n<li>Supplier assessment by means of a digital questionnaire\/Self Assessment Questionnaire (SAQ)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><\/h3>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>DORA brings considerable challenges, but also opportunities for the financial industry. By harmonizing regulations and introducing stricter standards for digital resilience, the aim is to achieve a uniform level of security in the EU. The new requirements are comprehensive and require companies to prepare and implement them thoroughly. The support of specialized providers such as LocateRisk can help to meet these new regulatory requirements and strengthen digital resilience.<br><br>This article focuses on the four chapters mentioned and does not cover the entire regulation. Detailed information on DORA can be found on the website of BaFin Federal Financial Supervisory Authority at <a href=\"https:\/\/www.bafin.de\/DE\/Aufsicht\/DORA\/DORA_node.html;jsessionid=EC87600ACD07D74E9F521A1EEB490682.internet992\" target=\"_blank\" rel=\"noreferrer noopener\">DORA - Digital Operational Resilience Act<\/a><\/p>\n\n\n\n<p><br><br><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2><br>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"dora-digital-operational-resilience-act\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>What DORA means, who it affects and where exactly LocateRisk can provide support. <\/p>","protected":false},"author":8,"featured_media":5248,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[61,60,36,62],"class_list":["post-5199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-digital-operational-resilience-act","tag-dora","tag-eu-richtlinie","tag-finance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DORA: Digital Operational Resilience Act - LocateRisk<\/title>\n<meta name=\"description\" content=\"Erfahren Sie, was DORA bedeutet, wen es betrifft und wo genau LocateRisk unterst\u00fctzen kann.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/dora-digital-operational-resilience-act\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA: Digital Operational Resilience Act - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie, was DORA bedeutet, wen es betrifft und wo genau LocateRisk unterst\u00fctzen kann.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/dora-digital-operational-resilience-act\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-12T09:34:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:24:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"632\" \/>\n\t<meta property=\"og:image:height\" content=\"632\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"DORA: Digital Operational Resilience Act\",\"datePublished\":\"2024-06-12T09:34:59+00:00\",\"dateModified\":\"2025-08-08T07:24:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/\"},\"wordCount\":1111,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DORA-2.png\",\"keywords\":[\"Digital Operational Resilience Act\",\"DORA\",\"EU-Richtlinie\",\"Finance\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/\",\"name\":\"DORA: Digital Operational Resilience Act - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DORA-2.png\",\"datePublished\":\"2024-06-12T09:34:59+00:00\",\"dateModified\":\"2025-08-08T07:24:21+00:00\",\"description\":\"Erfahren Sie, was DORA bedeutet, wen es betrifft und wo genau LocateRisk unterst\u00fctzen kann.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DORA-2.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DORA-2.png\",\"width\":632,\"height\":632,\"caption\":\"Bild zu DORA: Digital Operational Resilience Act\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA: Digital Operational Resilience Act\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DORA: Digital Operational Resilience Act - LocateRisk","description":"Find out what DORA means, who it affects and where exactly LocateRisk can provide support.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/dora-digital-operational-resilience-act\/","og_locale":"en_US","og_type":"article","og_title":"DORA: Digital Operational Resilience Act - LocateRisk","og_description":"Erfahren Sie, was DORA bedeutet, wen es betrifft und wo genau LocateRisk unterst\u00fctzen kann.","og_url":"https:\/\/locaterisk.com\/en\/dora-digital-operational-resilience-act\/","og_site_name":"LocateRisk","article_published_time":"2024-06-12T09:34:59+00:00","article_modified_time":"2025-08-08T07:24:21+00:00","og_image":[{"width":632,"height":632,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kristina Breuer","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"DORA: Digital Operational Resilience Act","datePublished":"2024-06-12T09:34:59+00:00","dateModified":"2025-08-08T07:24:21+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/"},"wordCount":1111,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png","keywords":["Digital Operational Resilience Act","DORA","EU-Richtlinie","Finance"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/","url":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/","name":"DORA: Digital Operational Resilience Act - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png","datePublished":"2024-06-12T09:34:59+00:00","dateModified":"2025-08-08T07:24:21+00:00","description":"Find out what DORA means, who it affects and where exactly LocateRisk can provide support.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png","width":632,"height":632,"caption":"Bild zu DORA: Digital Operational Resilience Act"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"DORA: Digital Operational Resilience Act"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/5199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=5199"}],"version-history":[{"count":36,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/5199\/revisions"}],"predecessor-version":[{"id":6295,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/5199\/revisions\/6295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/5248"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=5199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=5199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=5199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}