Skip to main content

RISE 2026 DORA Mapping

The table below aligns the RISE 2026 operational controls with the corresponding articles of the Digital Operational Resilience Act (DORA). The mapping uses the same section and control titles as the control table so teams can move directly between benchmark guidance, internal assessments, and DORA evidence collection.

Reference text is available on eur-lex.europa.eu.

CategoryControl nameDORA Article
Governance and Risk ManagementDefine a formal resilience governance model with clear accountabilityArticle 5 - Governance and organisation; Article 6 - ICT risk management framework
Governance and Risk ManagementPerform regular resilience risk assessments and maintain a risk registerArticle 6 - ICT risk management framework
Governance and Risk ManagementDefine resilience objectives and tolerances for critical servicesArticle 6 - ICT risk management framework
Governance and Risk ManagementEstablish exception management and compensating controls for unmet requirementsArticle 6 - ICT risk management framework
Governance and Risk ManagementReport resilience posture and remediation progress to leadership regularlyArticle 5 - Governance and organisation; Article 6 - ICT risk management framework
Third-Party and SaaS ResilienceMaintain an inventory of critical third-party and SaaS dependenciesArticle 28 - General principles
Third-Party and SaaS ResilienceAssess concentration risk and exit readiness for critical providersArticle 28 - General principles; Article 29 - Preliminary assessment of ICT concentration risk at entity level
Third-Party and SaaS ResilienceDefine minimum resilience and security requirements for suppliersArticle 30 - Key contractual provisions
Third-Party and SaaS ResilienceMonitor supplier performance, incidents, and contractual recovery commitmentsArticle 28 - General principles; Article 30 - Key contractual provisions
Third-Party and SaaS ResilienceTest contingency plans for third-party and SaaS disruptionArticle 11 - Response and recovery; Article 28 - General principles
Data Backup and RecoveryEstablish a regular backup schedule for critical dataArticle 12 - Backup policies and procedures, restoration and recovery procedures and methods
Data Backup and RecoveryStore backups in multiple locations (offsite and/or cloud-based storage)Article 12 - Backup policies and procedures, restoration and recovery procedures and methods
Data Backup and RecoveryImplement a versioning system to track and restore previous versions of dataArticle 12 - Backup policies and procedures, restoration and recovery procedures and methods
Data Backup and RecoveryEncrypt backups to protect sensitive dataArticle 9 - Protection and prevention
Data Backup and RecoveryTest backup and recovery processes periodically to ensure data integrityArticle 25 - Testing of ICT tools and systems
Network redundancy and failoverImplement redundant network connections to prevent single points of failureArticle 7 - ICT systems, protocols and tools
Network redundancy and failoverUse load balancers to distribute traffic evenly across resourcesArticle 7 - ICT systems, protocols and tools
Network redundancy and failoverEmploy network failover solutions (e.g., redundant routers, switches)Article 7 - ICT systems, protocols and tools
Network redundancy and failoverMonitor network performance and latency to detect potential issuesArticle 10 - Detection
Network redundancy and failoverTest network redundancy and failover processes to ensure proper functioningArticle 25 - Testing of ICT tools and systems
Infrastructure monitoring and alertingImplement a monitoring system to track the health and performance of cloud infrastructureArticle 10 - Detection
Infrastructure monitoring and alertingSet up alerts for critical events and performance thresholdsArticle 10 - Detection
Infrastructure monitoring and alertingMonitor resource usage to identify potential bottlenecks and capacity issuesArticle 10 - Detection
Infrastructure monitoring and alertingEstablish a centralized logging system to collect and analyze logs from various componentsArticle 13 - Learning and evolving
Infrastructure monitoring and alertingRegularly review monitoring data to identify trends and improve infrastructure resilienceArticle 13 - Learning and evolving
Incident response planningDevelop a formal incident response plan, including roles and responsibilitiesArticle 11 - Response and recovery
Incident response planningEstablish a communication plan for internal and external stakeholders during incidentsArticle 11 - Response and recovery
Incident response planningPerform regular incident response drills to test and refine the planArticle 25 - Testing of ICT tools and systems
Incident response planningDocument lessons learned from incidents and update the incident response plan accordinglyArticle 13 - Learning and evolving
Incident response planningProvide training for staff on incident response processes and best practicesArticle 13 - Learning and evolving
Business Continuity and Crisis ManagementPerform business impact analysis for critical services and processesArticle 11 - Response and recovery
Business Continuity and Crisis ManagementDefine business continuity plans and manual workaround proceduresArticle 11 - Response and recovery
Business Continuity and Crisis ManagementEstablish a crisis management structure for severe disruptionsArticle 11 - Response and recovery
Business Continuity and Crisis ManagementExercise continuity and crisis scenarios with business and technical stakeholdersArticle 11 - Response and recovery; Article 25 - Testing of ICT tools and systems
Business Continuity and Crisis ManagementReview continuity assumptions and recovery priorities after major changeArticle 13 - Learning and evolving
Capacity planning and scalingRegularly assess infrastructure capacity and plan for growthArticle 7 - ICT systems, protocols and tools
Capacity planning and scalingImplement auto-scaling strategies to handle fluctuating workloadsArticle 7 - ICT systems, protocols and tools
Capacity planning and scalingUse load testing to identify capacity limits and potential bottlenecksArticle 25 - Testing of ICT tools and systems
Capacity planning and scalingMonitor resource usage to anticipate and address potential capacity issuesArticle 10 - Detection
Capacity planning and scalingReview and update capacity plans based on changing business requirements and growthArticle 13 - Learning and evolving
Identity, Secrets, and Administrative AccessCentralize and harden privileged identity administrationArticle 9 - Protection and prevention
Identity, Secrets, and Administrative AccessUse short-lived credentials and just-in-time access for privileged operationsArticle 9 - Protection and prevention
Identity, Secrets, and Administrative AccessManage secrets with controlled storage, rotation, and access policiesArticle 9 - Protection and prevention
Identity, Secrets, and Administrative AccessProtect and test emergency access and break-glass proceduresArticle 9 - Protection and prevention; Article 11 - Response and recovery
Identity, Secrets, and Administrative AccessGovern machine identities and service credentials across workloadsArticle 9 - Protection and prevention
Security and access controlsImplement strong authentication and authorization mechanismsArticle 9 - Protection and prevention
Security and access controlsRegularly review and update user access permissionsArticle 9 - Protection and prevention
Security and access controlsEnable encryption for data at rest and in transitArticle 9 - Protection and prevention
Security and access controlsApply security patches and updates promptlyArticle 9 - Protection and prevention
Security and access controlsConduct regular vulnerability assessments and penetration testingArticle 25 - Testing of ICT tools and systems
Software Delivery and Supply Chain ResilienceProtect source code, build systems, and deployment pipelines from unauthorized changeArticle 9 - Protection and prevention
Software Delivery and Supply Chain ResilienceMaintain traceability and integrity for build artifacts and releasesArticle 7 - ICT systems, protocols and tools; Article 9 - Protection and prevention
Software Delivery and Supply Chain ResilienceControl dependency and base image risk through continuous inventory and update processesArticle 9 - Protection and prevention
Software Delivery and Supply Chain ResilienceDesign deployments for safe rollback and progressive releaseArticle 7 - ICT systems, protocols and tools; Article 11 - Response and recovery
Software Delivery and Supply Chain ResilienceTest CI/CD recovery and release continuity during platform disruptionArticle 11 - Response and recovery; Article 25 - Testing of ICT tools and systems
Application resiliency and fault toleranceDesign applications to be stateless and horizontally scalableArticle 7 - ICT systems, protocols and tools
Application resiliency and fault toleranceImplement circuit breakers and retries to handle transient faultsArticle 7 - ICT systems, protocols and tools
Application resiliency and fault toleranceUse health checks and load balancing to distribute traffic among instancesArticle 7 - ICT systems, protocols and tools
Application resiliency and fault toleranceIsolate application components to limit the impact of failuresArticle 7 - ICT systems, protocols and tools
Application resiliency and fault toleranceMonitor application performance and error rates to identify potential issuesArticle 10 - Detection
Data center and geographic redundancyDeploy infrastructure across multiple data centers or availability zonesArticle 12 - Backup policies and procedures, restoration and recovery procedures and methods
Data center and geographic redundancyUse geo-replication to store data redundantly across different regionsArticle 12 - Backup policies and procedures, restoration and recovery procedures and methods
Data center and geographic redundancyImplement global load balancing to distribute traffic across data centersArticle 7 - ICT systems, protocols and tools
Data center and geographic redundancyTest failover processes between data centers to ensure smooth recoveryArticle 25 - Testing of ICT tools and systems
Data center and geographic redundancyRegularly review and update data center redundancy strategies based on evolving needsArticle 13 - Learning and evolving
Regular resilience testing and validationConduct regular disaster recovery and failover testsArticle 25 - Testing of ICT tools and systems
Regular resilience testing and validationUse chaos engineering techniques to simulate failures and test system resilienceArticle 25 - Testing of ICT tools and systems
Regular resilience testing and validationTest backup and recovery processes to validate data integrityArticle 12 - Backup policies and procedures, restoration and recovery procedures and methods
Regular resilience testing and validationPerform load and stress tests to identify capacity limits and potential bottlenecksArticle 25 - Testing of ICT tools and systems
Regular resilience testing and validationUse the results of testing to inform updates and improvements to infrastructure resilienceArticle 13 - Learning and evolving
Documentation and Knowledge SharingDocument architecture, processes, and best practices for cloud resilienceArticle 13 - Learning and evolving
Documentation and Knowledge SharingMaintain a centralized knowledge base for easy access to documentationArticle 13 - Learning and evolving
Documentation and Knowledge SharingRegularly review and update documentation to reflect changes and improvementsArticle 13 - Learning and evolving
Documentation and Knowledge SharingEncourage knowledge sharing and collaboration among team membersArticle 13 - Learning and evolving
Documentation and Knowledge SharingProvide training and resources to help staff stay informed about resilienceArticle 13 - Learning and evolving