How to prepare and maintain a DORA ICT third-party provider register?

published on 24 March 2025

Managing ICT providers is now a legal requirement for financial institutions under the EU Digital Operational Resilience Act (DORA), effective January 17, 2025. Here's a quick guide to help you comply:

  • What You Need to Do:
    • Create a register of all ICT providers, including critical and non-critical ones.
    • Document key details like provider identification, services, risks, contracts, and subcontractors.
    • Submit the register to the European Supervisory Authorities by April 30, 2025.
    • Update the register annually and whenever major changes occur.
  • Why It Matters:
    • Non-compliance risks fines up to 2% of global turnover or $5.45 million (€5 million) for critical providers.
    • Helps manage risks, improve oversight, and support regulatory audits.
  • How to Get Started:
    • Use structured templates to record provider details.
    • Automate data management with tools like DORApp to save time and ensure accuracy.
    • Regularly test exit plans and monitor provider performance.

How to Comply with the DORA Register of Information: A Step ...

DORA Register of Information

DORA ICT Register Rules

DORA requires organizations to maintain detailed records of ICT third-party providers. These records help manage risks and ensure compliance while supporting oversight and operational resilience.

Required Data Fields

For each ICT provider, you need to document the following:

Category Details to Include
Provider Identification Legal name, registration number, and contact details.
Service Information Description of ICT services provided, including whether they are critical or non-critical.
Risk Assessment Security measures in place and an evaluation of potential risks.
Contractual Details Contract references, service level agreements, and emergency response provisions.

Make sure the data is accurate and regularly reviewed to stay compliant.

Update and Report Schedule

To meet DORA's requirements, follow these timelines:

  1. Initial Submission Deadline
    Submit the complete ICT provider register to the European Supervisory Authorities by April 30, 2025.
  2. Annual Updates
    Review and update the register every year, especially when there are major changes in provider relationships.
  3. Documentation Standards
    Keep the register in a secure and easily accessible format to simplify audits and inspections.

Finding and Ranking ICT Providers

To comply with DORA mandates, it's crucial to build and rank a list of ICT providers. This ensures proper oversight and helps manage risks effectively.

Making a Provider List

Start by identifying all providers that are essential to your operations and data integrity. Include both direct providers and subcontractors to get a full view of your ICT supply chain.

Here’s a step-by-step approach:

  • Review Core Financial Operations: Focus on critical systems like transaction processing platforms, core banking software, cloud storage services, and security tools.
  • Document Service Categories: Use a structured format to capture details about each service.
Service Category Details
Core Systems Functions, volumes, and data types
Support Services Maintenance schedules and response times
Data Management Storage locations and backup facilities
Security Services Protection measures and incident response
  • Map Dependencies: Highlight the connections between services and note any subcontracted providers.

Once your list is complete, it’s time to evaluate and rank providers based on their importance to your operations.

Rating Provider Importance

To assess a provider's impact, consider these factors:

Assessment Criteria Evaluation Metrics
Systemic Impact Number of dependent entities and asset value
Service Criticality Effect on operations and alternative options
Data Sensitivity Types of data processed and security needs
Operational Integration Integration with critical systems

Key points to keep in mind include:

  • How many G-SIIs or O-SIIs depend on the provider
  • The complexity of switching providers
  • Dependencies through subcontractors
  • The provider's market position and availability of alternatives

The European Commission will introduce additional criteria for identifying critical ICT providers by July 17, 2024. Stay updated on these developments to ensure your evaluations remain compliant with regulatory requirements.

sbb-itb-107f699

Recording Provider Data

After ranking ICT providers, gather and document key details to create a DORA-compliant register.

Contract and Service Records

Start by recording contractual commitments before diving into risk-specific details. Capture all agreements with ICT providers, focusing on the following:

Contract Element Details to Include
Service Details Scope, delivery locations, performance metrics
Data Processing Storage locations, data types, protection measures
Operational Terms Service levels, reporting obligations, contingency plans
Compliance Requirements Audit rights, testing participation, security standards

Be sure to outline data protection measures (availability, integrity, confidentiality), recovery procedures, service locations, and required notice periods.

Risk and Subcontractor Data

Next, document risk profiles and subcontractor information to ensure a clear view of the supply chain.

Risk Category Details to Document
Risk Assessment Provider risk level, impact analysis, mitigation measures
Subcontractor Details Service chain mapping, compliance checks, audit rights
Security Measures Controls, incident response plans, testing results
Performance Monitoring KPIs, service level achievements, incident history

Key actions include:

  • Using DORA-specific questionnaires to assess provider compliance
  • Keeping a risk register to track and manage remediation efforts
  • Logging the complete subcontracting chain with associated audit rights
  • Noting any significant changes in subcontracting arrangements

Contracts should ensure your organization has the same rights of access, inspection, and audit across the entire subcontracting chain as with the primary ICT provider.

For critical or important functions, include:

  • Detailed service-level descriptions
  • Business contingency plans
  • Security measure details
  • Penetration testing participation requirements
  • Documentation of unrestricted access and audit rights

Software Tools for Register Management

Automated tools simplify managing data and documentation for ICT providers, making it easier to meet DORA requirements.

DORApp Features

DORApp is designed to handle ICT provider management with automation, ensuring compliance with DORA. Here's what it offers:

Feature Category Capabilities
Provider Management Automatic discovery, classification, and mapping of relationships
Risk Assessment Pre-built DORA-aligned questionnaires, risk scoring, and gap analysis
Documentation Contract management, audit trails, and automated report generation
Compliance Monitoring Real-time updates, automated checks, and alignment with regulatory standards

The platform significantly reduces setup time - from 8 hours to just 1.5 hours for 10 ICT services. This improvement is thanks to automated data transfers and integrated relationship mapping, which ensure updates to provider information are instantly reflected across all related records.

"We created the DORA Register because we believe that error-free management of ICT suppliers and constant access to up-to-date reports and contracts ensure compliance with DORA." - DORA Register of Information

These features make the setup process both efficient and straightforward.

Register Setup Guide

Here's how to set up your ICT provider register using DORApp:

  1. Initial Configuration
    Start by setting up security measures like two-factor authentication and user roles. Tailor access permissions to fit your organization's structure.
  2. Provider Import
    Use the automated import tool to transfer existing provider data. The system enriches entries with public data, such as LEI information, to improve accuracy.
  3. Classification Setup
    Follow DORA-specific criteria from RTS 85, which includes 19 ICT service categories, to correctly classify providers. The platform offers guidance throughout.
  4. Monitoring Configuration
    Configure automated alerts and checks for important tasks like contract renewals, compliance document updates, and risk assessments.

The system keeps detailed audit trails and generates DORA-compliant reports with just one click. Regular updates ensure the platform stays aligned with changing DORA regulations, so you won't have to track them manually.

Register Updates and Monitoring

Keeping your ICT third-party provider register up to date is crucial for meeting DORA compliance. A structured schedule helps ensure everything stays on track.

Regular Update Process

Having a clear process in place ensures provider details and risk assessments meet DORA's standards.

Update Type Frequency Key Actions
Provider Data Review Every 6 months Check contact details, services, and contracts.
Risk Assessment Annual Assess provider performance and new risks.
Exit Plan Testing Annual Test and refine transition procedures.

Tools like DORApp can help by automating notifications for reviews and flagging changes in provider status. These updates ensure you're always prepared for audits.

Audit Preparation

Comprehensive documentation is essential for a smooth audit process. Here’s what to focus on:

  • Documentation Management: Keep records of provider interactions, service updates, incidents, and performance metrics. Tools like DORApp can track changes and approvals to maintain a clear audit trail.
  • Contract Oversight: Pay close attention to resilience requirements, SLAs, and security measures.

    "DORA sets high expectations for contracts between financial institutions and ICT service providers. Agreements must clearly define resilience requirements, including service-level agreements (SLAs), security measures, and accountability clauses."

  • Testing and Validation: Regularly test provider resilience, document the outcomes, and update exit plans as needed.

Reporting tools can simplify audit preparation by generating documentation that proves compliance. With real-time monitoring, you can quickly provide accurate information to auditors about your provider relationships.

Summary

A DORA-compliant ICT third-party provider register plays a key role in maintaining operational resilience and meeting regulatory requirements. With the average cost of data breaches estimated at $4.8 million in 2024, managing providers effectively is critical. A well-maintained register keeps track of provider contracts, evaluates risks regularly, and includes clear exit strategies. Using automated tools can make these tasks much easier.

DORApp offers features that simplify compliance efforts:

Feature Benefit
Automated Monitoring Tracks compliance in real-time
Data Enrichment Ensures accurate provider information
Audit Trail Simplifies regulatory reporting
Secure Storage Maintains data compliance standards

Failing to comply with DORA could result in penalties of up to 2% of annual global turnover. Keep your register up-to-date by:

  • Reporting ICT incidents promptly
  • Performing annual resilience tests
  • Engaging in threat intelligence sharing
  • Maintaining continuous monitoring systems

Related posts

Read more