{"id":52344,"date":"2024-11-20T11:25:52","date_gmt":"2024-11-20T10:25:52","guid":{"rendered":"https:\/\/setterwalls.se\/?post_type=articles&#038;p=52344"},"modified":"2024-11-26T15:33:58","modified_gmt":"2024-11-26T14:33:58","slug":"what-about-the-little-guy-the-smes-practical-guide-to-dora","status":"publish","type":"articles","link":"https:\/\/setterwalls.se\/en\/article\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/","title":{"rendered":"What About the Little Guy? \u2013 the SME\u2019s Practical Guide to DORA"},"content":{"rendered":"    <section class=\"block text bg-white\">\n        <div class=\"container container-sm\">\n            <div class=\"row\">\n                <div class=\"col-12\">\n                    <div class=\"editor-content\">\n                                                <p><strong>You would be hard-pressed to find anyone in the FinTech industry who hadn\u2019t noticed the buzz around DORA. Part of the success behind DORA\u2019s awareness campaign can probably be ascribed to the ever-increasing number of cybersecurity incidents which have sent shockwaves throughout the industry. One can only speculate about just how many further incidents have occurred but which have never surfaced. Although cybersecurity has been prioritised by legacy enterprises over the last couple of years, many smaller businesses now struggle to fulfil the requirements set by DORA. If this sounds all too familiar, then this guide is designed for you.<\/strong><\/p>\n<h4>Background<\/h4>\n<p>Regulation (EU) 2022\/2554 of the European Parliament and of the Council of 14 December 2022 on digital operational resilience for the financial sector (\u201c<strong>DORA<\/strong>\u201d), is part of the EU\u2019s Digital Decade strategy. The Digital Decade strategy covers many important subjects, varying from AI to cybersecurity, where DORA makes out the blueprint for cybersecurity within the financial sector and is expected to affect more than 22,000 financial entities and information and communication technology (\u201c<strong>ICT<\/strong>\u201d) service providers in the EU.<\/p>\n<p>DORA entered into force on 16 January 2023 but will not apply until 17 January 2025, effectively giving the entities affected by the regulation two years in order to comply. However, the cybersecurity trend has existed within legacy enterprises, which typically are made up of larger banks, since long before 2023. Now, we see that such legacy enterprises already have come a long way in their DORA compliance. In contrast to this, a trend can be spotted where small and medium-sized enterprises (\u201c<strong>SMEs<\/strong>\u201d) \u2013 which generally are more streamlined, with nimble structures typically featuring low staff headcount and limited resources \u2013 oftentimes lack a clear strategy on how to tackle compliance when faced with a vast set of requirements.<\/p>\n<p>This practical outcome, where legacy enterprises are able to comply, but SMEs have a hard time keeping up, has long been anticipated and is in line with criticism typically levied towards DORA. Regardless of whether such criticism is justified or not, the fact remains that SMEs must comply with the requirements imposed by DORA, in the same way that legacy enterprises must comply.<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn1\" name=\"_ftnref1\">[1]<\/a>\u00a0This raises the fundamental question; how does an SME get started? In this article, we will explain the key takeaways from DORA and provide a plan as to how to get started, which is specifically tailored for an SME audience. The guide can also be used by service providers, effectively giving insights as to how DORA will affect their respective businesses.<\/p>\n<h4>Key takeaways from DORA<\/h4>\n<p>In essence, DORA can be summarised into the following five pillars, each of which vary significantly in their respective requirements: (1) ICT risk management framework; (2) Management and reporting of ICT-related incidents; (3) Digital operational resilience testing; (4) Management of ICT third-party risks; and (5) Information exchange arrangements.<\/p>\n<p>The DORA framework contains both practical and administrative elements. Some of the more practical elements involve the establishment of backup systems, mechanisms to promptly detect anomalous activities, and the implementation of a digital operational resilience testing programme. The more administrative elements include the drafting and regular review of a potentially quite extensive set of documentation.<\/p>\n<p>Although DORA is a new framework, some of the financial entities may already be familiar with the so-called EBA Guidelines.<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn2\" name=\"_ftnref2\">[2]<\/a>\u00a0At a first glance, the frameworks share several similarities, meaning that the entity, in practice, will not have to start from scratch. However, this also means that many SMEs \u2013 which have not been subject to the EBA Guidelines \u2013 may again find themselves working uphill with little to no prior experience with similar frameworks, such as the EBA Guidelines. Here, some words of comfort for the SMEs which have to start from scratch, is that DORA covers several additional, and sometimes new, aspects which go even further than the EBA Guidelines.<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn3\" name=\"_ftnref3\">[3]<\/a><\/p>\n<p>When navigating DORA, it is important to remember that Article 4 contains a proportionality principle which states that the size, overall risk profile, and the nature, scale and complexity of the services, activities and operations shall be considered in various sections of DORA. Basically, this means that the competent authorities will likely not expect the same level of results from an SME as they would from a legacy enterprise. Finally, it should also be mentioned that some articles in DORA contain specific exceptions for financial entities meeting the definition of a microenterprise.<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn4\" name=\"_ftnref4\">[4]<\/a><\/p>\n<h4>The SME\u2019s \u201cstep-by-step\u201d plan<\/h4>\n<p>There are several different ways and various strategies to deploy, as to how to take on the requirements imposed by DORA. In the following, we will provide one way on how to efficiently establish a foothold, and also give you some key insights along the way.<\/p>\n<p><strong><em>Step one \u2013 Find out if, and to what extent, DORA is applicable<\/em><\/strong><\/p>\n<p>Step one may almost come across as redundant, but it is worth having an extra look as to\u00a0<em>if<\/em>, and\u00a0<em>to what extent<\/em>, DORA is in fact applicable to your company. In Article 2(1), a list with over 20 different entities falling under the scope of DORA can be found. Here, it should be noted that ICT third-party service providers<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn5\" name=\"_ftnref5\">[5]<\/a>\u00a0(hereinafter \u201c<strong>Providers<\/strong>\u201d) are not subject to the same requirements under DORA as a financial entity, meaning that DORA will only have an indirect effect on such Providers. This indirect effect will mainly occur through the contractual arrangements between the Provider and the financial entity.<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn6\" name=\"_ftnref6\">[6]<\/a><\/p>\n<p>Under certain specific circumstances, DORA does not apply to managers of alternative investment funds. Furthermore, DORA also contains an exception whereby certain financial entities \u2013 which fall under the scope of DORA \u2013 are exempted from the \u201cfull version\u201d, meaning that such entities can enjoy a lighter and more agile version of DORA. With this being said, the exceptions are both few and quite narrow, meaning that many financial entities are likely to be subject to the full and complete version of DORA. Finally, so called\u00a0<em>microenterprise<\/em>s are also subject to fewer and\/or lighter requirements under DORA.<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn7\" name=\"_ftnref7\">[7]<\/a><\/p>\n<p><strong><em>Step two \u2013 Gather the team<\/em><\/strong><\/p>\n<p>In practice, DORA will involve many different areas and functions in your company, making it impossible for only a selected few individuals to tackle the challenge themselves. Considering this, it is crucial to gather a broad team with varying expertise in order to achieve all of the requirements under DORA. Naturally, many of the requirements will involve stakeholders within the security field, which is precisely why a few extra sets of hands are recommended in order to avoid an unnecessarily high burden for a few individuals, as well as to avoid the creation of any avoidable bottlenecks in the project.<\/p>\n<p><strong><em>Step three \u2013 Start doing a GAP analysis<\/em><\/strong><\/p>\n<p>Once the team is set, it is time to take the first steps towards compliance. Here, the financial entity may choose several different routes in order to reach compliance, where one quite straightforward way is to start with a GAP analysis.<\/p>\n<p>If the financial entity chooses to start with this approach, the GAP analysis should contain all of the specific requirements under DORA, where mapping out such requirements can be a daunting and very time-consuming task. However, mapping out the requirements is essential in order to avoid any requirements falling between the cracks. To note also that the exercise itself also provides valuable insights in regards to what is to be expected, and which functions, documents and routines are already in place (and which are not). In addition to the GAP analysis having a quality control function, it can also have the dual purpose of being a working document. By adding supplementary columns \u2013 e.g. columns covering who is being assigned the specific requirement, progress, and deadlines \u2013 an overview in a format which the stakeholders should already be quite familiar with can be achieved.<\/p>\n<p>After the GAP analysis document has been drafted, each team member should be assigned with a specific set of tasks. The stakeholder should then proceed with mapping out which documentation, procedures and similar are already in place, or if additional work is required. Most likely, the result of the GAP analysis will probably differ across various financial entities, whereby some may find that they have certain necessary documentation and routines already in place, whereas others may find themselves a little bit further behind.<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn8\" name=\"_ftnref8\">[8]<\/a><\/p>\n<p>When conducting the initial GAP analysis, it is important to keep in mind that the underlying purpose \u2013 at this stage \u2013 is to simply perform a status-check over\u00a0<em>what<\/em>\u00a0<em>is in place<\/em>\u00a0and\u00a0<em>what is lacking<\/em>.<\/p>\n<p><strong><em>Step four \u2013 Map out your ICT<\/em><\/strong><\/p>\n<p>In parallel with the GAP analysis, you should also start with the mapping of your existing ICT. The mapping of the ICT is, again, a potentially daunting task which will be time-consuming and require input from large parts of the organisation. Some other difficulties regarding the mapping are that it is spread out across DORA.<\/p>\n<p>One extensive Article covering such mapping requirements is Article 8. Under this Article, a financial entity shall for example identify, classify, and document all (i) ICT supported business functions, roles and responsibilities; (ii) the information assets<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn9\" name=\"_ftnref9\">[9]<\/a>\u00a0and ICT assets<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn10\" name=\"_ftnref10\">[10]<\/a>\u00a0supporting those functions; and (iii) their roles and dependencies in relation to ICT risk<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn11\" name=\"_ftnref11\">[11]<\/a>. However, several additional mapping requirements apply under Article 8, such as:<\/p>\n<ul>\n<li>cyber threats<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn12\" name=\"_ftnref12\">[12]<\/a>\u00a0and ICT vulnerabilities<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn13\" name=\"_ftnref13\">[13]<\/a>;<\/li>\n<li>network resources and hardware equipment (including those on remote sites) and the mapping of those considered critical;<\/li>\n<li>the configuration of the information assets and ICT assets and their links and interdependencies;<\/li>\n<li>processes that are dependent on Providers and interconnections with Providers that provide services that support critical or important functions.<\/li>\n<\/ul>\n<p>In contrast to Article 8, which covers a very broad angle, Article 28(3) instead covers the requirement of a register of information in relation to all contractual arrangements on the use of ICT services from Providers, bearing some resemblance with the registers under GDPR.<\/p>\n<p><strong><em>Step five \u2013 Start with the low-hanging (and important) fruit<\/em><\/strong><\/p>\n<p>By this stage, you should have gained a strategic overview and already be well on your way forward. As with every project, it is important to keep moving forward and to not get too tied up in the starting pits. Here, an effective strategy could be to start with the low-hanging fruit and trust your instincts. If you already know some of the pressure points in your company\u2019s DORA compliance, then trusting your instincts with those specific problems could be a good starting point. Afterall, you know the strengths and weaknesses of your company best.<\/p>\n<p><strong><em>Step six \u2013 Start re-negotiating the ICT agreements<\/em><\/strong><\/p>\n<p>As stated earlier, the \u201cDORA-effect\u201d will inevitably spill over to the Providers, having an indirect effect on the Providers.<\/p>\n<p>As for now, most legacy enterprises have started negotiating their respective agreements with the Providers, but more financial entities are expected to start doing so during the upcoming months. In order to position yourself at the front of the queue, now is a good idea to be proactive and reach out to your Provider.<\/p>\n<p>The process between the financial entity and the Provider can vary and be handled differently. Many Providers will likely have their own template covering the requirements under DORA. This is due to the fact that Providers will most likely have to re-negotiate a large number of agreements, making bespoke agreements in different templates (or accepting the financial entity\u2019s own template) which is somewhat of an administrative impossibility.<\/p>\n<p>If you are not in a position to insist upon having your own template, it is especially important that you make sure that the Provider\u2019s template contains all of the key contractual provisions outlined in DORA.<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn14\" name=\"_ftnref14\">[14]<\/a><\/p>\n<p>As an ending note regarding the agreements, financial entities may, among other requirements, only enter into contractual arrangements with Providers that comply with appropriate information security standards, with the bar set even higher if the arrangement is subject to \u201ccritical or important functions\u201d. A good indicator as to whether the Provider fulfills such requirements could be that the Provider holds an ISO 270001 certification, but other factors are relevant too. Keep in mind that you are ultimately responsible for complying with all of the requirements under DORA, and not the Provider. As a consequence, it important that you properly evaluate not only the ICT agreement with the Provider, but also the Provider itself.<\/p>\n<h4>Ending notes<\/h4>\n<p>At a first glance, DORA compliance will most likely come across as a daunting task with its vast set of requirements involving many different functions, and where there are few available templates for compliance at this stage.<\/p>\n<p>Here, our best advice going forward is to take a look at the bigger picture,\u00a0<em>what is important?<\/em>\u00a0The answer probably lies in the name of the regulation, digital operational\u00a0<em>resilience<\/em>\u00a0for the financial sector. The regulations concern identifying exposure, risk and deficiencies, and then working to resolve these issues, and to improve overall resilience; or as stated in the preamble, \u201c<em>observing basic cyber hygiene<\/em>\u201d.<a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftn15\" name=\"_ftnref15\">[15]<\/a>\u00a0Once the GAP analysis and mapping of ICT has been conducted, the initial haze often lifts.<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref1\" name=\"_ftn1\">[1]<\/a>\u00a0Please note that some financial entities are exempted or subject to a lighter version of DORA, see\u00a0<em>Step one \u2013 Find out if, and to what extent, DORA is applicable<\/em>.<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref2\" name=\"_ftn2\">[2]<\/a> EBA Guidelines on ICT risk and security risk management EBA\/GL\/2019\/04.<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref3\" name=\"_ftn3\">[3]<\/a> This is especially apparent when comparing the sheer number of pages, where the EBA Guidelines makes up for 29 pages, compared to DORA\u2019s 79 pages.<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref4\" name=\"_ftn4\">[4]<\/a>\u00a0\u201cMicroenterprise\u201d means a financial entity, other than a trading venue, a central counterparty, a trade repository or a central securities depository, which employs fewer than 10 persons and has an annual turnover and\/or annual balance sheet total that does not exceed EUR 2 million, DORA, Article 3, point (60).<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref5\" name=\"_ftn5\">[5]<\/a>\u00a0Where an\u00a0<em>ICT third-party service provider<\/em>\u00a0is \u201can undertaking providing ICT services\u201d, and\u00a0<em>ICT services<\/em>\u00a0means \u201cdigital and data services provided through ICT systems to one or more internal or external users on an ongoing basis, including hardware as a service and hardware services which includes the provision of technical support via software or firmware updates by the hardware provider, excluding traditional analogue telephone services, DORA, Article 3, points (19) and (21).<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref6\" name=\"_ftn6\">[6]<\/a>\u00a0It should be noted that a limited number of Providers will also be classified as critical Providers, meaning that the critical Provider, to a certain extent, will be subject to some requirements under DORA.<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref7\" name=\"_ftn7\">[7]<\/a>\u00a0According to Article 3(60) DORA, a microenterprise means a \u201cfinancial entity, other than a trading venue, a central counterparty, a trade repository or a central securities depository, which employs fewer than 10 persons and has an annual turnover and\/or annual balance sheet total that does not exceed EUR 2 million\u201d.<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref8\" name=\"_ftn8\">[8]<\/a>\u00a0By way of example, a financial entity which has been subject to the EBA Guidelines should, in theory, already have certain documentation and procedures in place.<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref9\" name=\"_ftn9\">[9]<\/a>\u00a0\u201cInformation asset\u201d means a collection of information, either tangible or intangible, that is worth protecting, DORA, Article 3, point (6).<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref10\" name=\"_ftn10\">[10]<\/a>\u00a0\u201cICT asset\u201d means a software or hardware asset in the network and information systems used by the financial entity, DORA, Article 3, point (7).<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref11\" name=\"_ftn11\">[11]<\/a>\u00a0\u201cICT risk\u201d means any reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment, DORA, Article 3, point (5).<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref12\" name=\"_ftn12\">[12]<\/a>\u00a0\u201cCyber threat\u201d means any potential circumstance, event or action that could damage, disrupt or otherwise adversely impact network and information systems, the users of such systems and other persons, Regulation (EU) 2019\/881, Article 2, point (8).<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref13\" name=\"_ftn13\">[13]<\/a>\u00a0\u201dVulnerability\u201d means a weakness, susceptibility or flaw of an asset, system, process or control that can be exploited, DORA, Article 2, point (16).<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref14\" name=\"_ftn14\">[14]<\/a>\u00a0The key contractual provisions can be found in DORA, Article 30, where Recital (71) and (72) offers a summary.<\/p>\n<p><a href=\"https:\/\/setterwalls.se\/artikel\/what-about-the-little-guy-the-smes-practical-guide-to-dora\/#_ftnref15\" name=\"_ftn15\">[15]<\/a>\u00a0DORA, Recital 13.<\/p>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":52309,"template":"","meta":{"_acf_changed":true,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":""},"article_category":[1056],"class_list":["post-52344","articles","type-articles","status-publish","has-post-thumbnail","hentry","article_category-fintech-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/setterwalls.se\/en\/wp-json\/wp\/v2\/articles\/52344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/setterwalls.se\/en\/wp-json\/wp\/v2\/articles"}],"about":[{"href":"https:\/\/setterwalls.se\/en\/wp-json\/wp\/v2\/types\/articles"}],"author":[{"embeddable":true,"href":"https:\/\/setterwalls.se\/en\/wp-json\/wp\/v2\/users\/11"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/setterwalls.se\/en\/wp-json\/wp\/v2\/media\/52309"}],"wp:attachment":[{"href":"https:\/\/setterwalls.se\/en\/wp-json\/wp\/v2\/media?parent=52344"}],"wp:term":[{"taxonomy":"article_category","embeddable":true,"href":"https:\/\/setterwalls.se\/en\/wp-json\/wp\/v2\/article_category?post=52344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}