Skip to main content

Mapping Controls to DORA Articles

The table below serves as a comprehensive guide that aligns specific operational controls with the corresponding articles of the Digital Operational Resilience Act (DORA). The table is organized by the categories of controls listed in the Control table section. Each control is mapped to the DORA article(s) that it addresses.

Reference document is available on eur-lex.europa.eu.

CategoryControl nameDORA Article
Data Backup and RecoveryEstablish a regular backup schedule for critical dataArticle 12 - Backup policies and procedures, restoration and recovery procedures and methods
Data Backup and RecoveryStore backups in multiple locations (offsite and/or cloud-based storage)Article 12 - Backup policies and procedures, restoration and recovery procedures and methods
Data Backup and RecoveryImplement a versioning system to track and restore previous versions of dataArticle 12 - Backup policies and procedures, restoration and recovery procedures and methods
Data Backup and RecoveryEncrypt backups to protect sensitive dataArticle 9 - Protection and prevention
Data Backup and RecoveryTest backup and recovery processes periodically to ensure data integrityArticle 25 - Testing of ICT tools and systems
Network redundancy and failoverImplement redundant network connections to prevent single points of failureArticle 7 - ICT systems, protocols and tools
Network redundancy and failoverUse load balancers to distribute traffic evenly across resourcesArticle 7 - ICT systems, protocols and tools
Network redundancy and failoverEmploy network failover solutions (e.g., redundant routers, switches)Article 7 - ICT systems, protocols and tools
Network redundancy and failoverMonitor network performance and latency to detect potential issuesArticle 10 - Detection
Network redundancy and failoverTest network redundancy and failover processes to ensure proper functioningArticle 25 - Testing of ICT tools and systems
Infrastructure monitoring and alertingImplement a Monitoring System to Track the Health and Performance of Cloud InfrastructureArticle 10 - Detection
Infrastructure monitoring and alertingSet Up Alerts for Critical Events and Performance ThresholdsArticle 10 - Detection
Infrastructure monitoring and alertingMonitor Resource Usage to Identify Potential Bottlenecks and Capacity IssuesArticle 10 - Detection
Infrastructure monitoring and alertingEstablish a Centralized Logging System to Collect and Analyze Logs from Various ComponentsArticle 13 - Learning and evolving
Infrastructure monitoring and alertingRegularly Review Monitoring Data to Identify Trends and Improve Infrastructure ResilienceArticle 13 - Learning and evolving
Incident response planningDevelop a formal incident response plan, including roles and responsibilitiesArticle 11 - Response and recovery
Incident response planningEstablish a communication plan for internal and external stakeholders during incidentsArticle 14 - Communication
Incident response planningPerform regular incident response drills to test and refine the planArticle 11 - Response and recovery
Incident response planningDocument lessons learned from incidents and update the incident response plan accordinglyArticle 13 - Learning and evolving
Incident response planningProvide training for staff on incident response processes and best practicesArticle 13 - Learning and evolving
Capacity planning and scalingRegularly assess infrastructure capacity and plan for growthArticle 9 - Protection and prevention
Capacity planning and scalingImplement auto-scaling strategies to handle fluctuating workloadsArticle 9 - Protection and prevention
Capacity planning and scalingUse load testing to identify capacity limits and potential bottlenecksArticle 9 - Protection and prevention
Capacity planning and scalingMonitor resource usage to anticipate and address potential capacity issuesArticle 9 - Protection and prevention
Capacity planning and scalingReview and update capacity plans based on changing business requirements and growthArticle 9 - Protection and prevention
Security and access controlsImplement strong authentication and authorization mechanismsArticle 9 - Protection and prevention
Security and access controlsRegularly review and update user access permissionsArticle 9 - Protection and prevention
Enable encryption for data at rest and in transitApply security patches and updates promptlyArticle 7 - ICT systems, protocols and tools
Enable encryption for data at rest and in transitConduct regular vulnerability assessments and penetration testingArticle 25 - Testing of ICT tools and systems
Application resiliency and fault toleranceDesign applications to be stateless and horizontally scalableArticle 7 - ICT systems, protocols and tools
Application resiliency and fault toleranceImplement circuit breakers and retries to handle transient faultsArticle 7 - ICT systems, protocols and tools
Application resiliency and fault toleranceUse health checks and load balancing to distribute traffic among instancesArticle 7 - ICT systems, protocols and tools
Application resiliency and fault toleranceIsolate application components to limit the impact of failuresArticle 7 - ICT systems, protocols and tools
Application resiliency and fault toleranceMonitor application performance and error rates to identify potential issuesArticle 10 - Detection
Data center and geographic redundancyDeploy infrastructure across multiple data centers or availability zonesArticle 12 - Backup policies and procedures, restoration and recovery procedures and methods
Data center and geographic redundancyUse geo-replication to store data redundantly across different regionsArticle 12 - Backup policies and procedures, restoration and recovery procedures and methods
Data center and geographic redundancyImplement global load balancing to distribute traffic across data centersArticle 7 - ICT systems, protocols and tools
Data center and geographic redundancyTest failover processes between data centers to ensure smooth recoveryArticle 25 - Testing of ICT tools and systems
Data center and geographic redundancyRegularly review and update data center redundancy strategies based on evolving needsArticle 13 - Learning and evolving
Regular resilience testing and validationConduct regular disaster recovery and failover testsArticle 25 - Testing of ICT tools and systems
Regular resilience testing and validationUse chaos engineering techniques to simulate failures and test system resilienceArticle 25 - Testing of ICT tools and systems
Regular resilience testing and validationTest backup and recovery processes to validate data integrityArticle 12 - Backup policies and procedures, restoration and recovery procedures and methods
Regular resilience testing and validationPerform load and stress tests to identify capacity limits and potential bottlenecksArticle 25 - Testing of ICT tools and systems
Regular resilience testing and validationUse the results of testing to inform updates and improvements to infrastructure resilienceArticle 13 - Learning and evolving
Documentation and Knowledge SharingDocument architecture, processes, and best practices for cloud resilienceArticle 13 - Learning and evolving
Documentation and Knowledge SharingMaintain a centralized knowledge base for easy access to documentationArticle 13 - Learning and evolving
Documentation and Knowledge SharingRegularly review and update documentation to reflect changes and improvementsArticle 13 - Learning and evolving
Documentation and Knowledge SharingEncourage knowledge sharing and collaboration among team membersArticle 13 - Learning and evolving
Documentation and Knowledge SharingProvide training and resources to help staff stay informed about resilienceArticle 13 - Learning and evolving