-
Notifications
You must be signed in to change notification settings - Fork 281
/
Copy pathnorea.yaml
3282 lines (2475 loc) · 110 KB
/
norea.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
urn: urn:intuitem:risk:library:norea-dora-in-control
locale: en
ref_id: NOREA-DORA-in-control
name: NOREA - DORA in Control Framework V3.0
description: 'The NOREA DORA in Control Framework is a practical tool designed to
support organizations in their journey toward compliance with the Digital Operational
Resilience Act (DORA). While this framework offers valuable guidance, it is important
to note that the legal requirements set out in the DORA itself remain leading.
Link: https://www.norea.nl/dora'
copyright: "The NOREA DORA in Control Framework and Dashboard is licensed under a\
\ creative Commons BY 4.0. For more information:\nhttps://creativecommons.org/licenses/by/4.0/\n\
You are free to:\nShare \u2014 copy and redistribute the material in any medium\
\ or format\nAdapt \u2014 remix, transform, and build upon the material for any\
\ purpose, even commercially\nThe licensor cannot revoke these freedoms as long\
\ as you follow the license terms.\nUnder the following terms:\nAttribution - You\
\ must give appropriate credit , provide a link to the license, and indicate if\
\ changes were made. You may do so in any reasonable manner, but not in any way\
\ that suggests the licensor endorses you or your use."
version: 1
provider: NOREA
packager: intuitem
objects:
framework:
urn: urn:intuitem:risk:framework:norea-dora-in-control
ref_id: NOREA-DORA-in-control
name: NOREA - DORA in Control Framework V3.0
description: 'The NOREA DORA in Control Framework is a practical tool designed
to support organizations in their journey toward compliance with the Digital
Operational Resilience Act (DORA). While this framework offers valuable guidance,
it is important to note that the legal requirements set out in the DORA itself
remain leading.
Link: https://www.norea.nl/dora'
min_score: 0
max_score: 5
scores_definition:
- score: 0
name: Incomplete
description: Incomplete - No attention has been given to this control.
- score: 1
name: Initial
description: Initial - The control is (partially) defined but is performed in
an inconsistent manner with a large dependency on individuals relating to
control execution.
- score: 2
name: Managed
description: Managed - The control is implemented and performed with consistence
and structure for part of the proces or control (evidence not always available)
- score: 3
name: Defined
description: Defined (design existence and operation) - The design of the control
measure is documented and implemented in a structured and formalized manner.
The required effectiveness of the control measure can be demonstrated and
is tested. Where necessary, the control measure is improved. *This is the
advised level to be demonstrably compliant with DORA.
- score: 4
name: Quantitative
description: Quantitatively Managed - In addition to the effectiveness of individual
control measures, the effectiveness of the cohesion of all information security
measures is also evaluated periodically. This evaluation of the system of
control measures is recorded and reported to management.
- score: 5
name: Optimizing
description: Optimizing - Continuous efforts are made to improve the effectiveness
of the system of control measures by taking future risks into account. This
involves the use of external data and benchmarking. Employees are proactively
involved in the future-oriented improvement of the effectiveness of the coherence
of information security measures.
requirement_nodes:
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:grm
assessable: false
depth: 1
ref_id: GRM
name: Governance and Risk Management
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:1
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:grm
ref_id: '1'
name: Management Responsibilities
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:1.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:1
ref_id: '1.1'
name: Governance of ICT risk
description: 'The Management body shall take ultimate responsibility for effectively
managing all ICT risks of the financial entity. As such, the management body
periodically (e.g. annually) reviews and approves:
- Policies related to the availability, authenticity, integrity, and confidentiality
of data, including the policy on arrangements with ICT third-party service
providers (see control 2.1).
- The roles, responsibilities and goverance arrangements for ICT risk management
(including those related to ICT third-party arrangements), including the continuous
monitoring thereof.
- the policy on arrangements with ICT third-party service providers and stays
informed about third-party arrangements, services provided, planned material
changes regarding third- party service providers, and understand the impact
of these changes on critical and important functions of the entity (including
risk assessment results). '
annotation: "5.1\n5.2 \n5.3\n5.4 \n6.8\n13.4\n13.7"
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:1.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:1
ref_id: '1.2'
name: Knowledge of the Management Body
description: 'The Management body shall ensure that it is kept up to date with
sufficient knowledge and skills to understand and assess ICT risks and operations
(e.g. through periodic trainings).
'
annotation: "5.1\n5.2 \n5.3\n5.4 \n6.8\n13.4\n13.7"
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:1.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:1
ref_id: '1.3'
name: 'Digital Operational Resilience Strategy '
description: "The Management body shall set and approve the digital operational\
\ resilience strategy and periodically update when needed.\n\nThe digital\
\ operational resilience strategy must:\n- Set out how the risk management\
\ framework will be implemented. \n- Elaborate on the alignment between the\
\ risk management framework and the business strategy and objectives. \n-\
\ Establish the ICT risk tolerance level (based on risk appetite) and the\
\ impact tolerance level for ICT disruptions. \n- Include clear security objectives,\
\ including Key Performance Indicators (KPIs) and risk metrics. \n- Elaborate\
\ on the ICT reference architecture and any changes needed to reach specific\
\ business objectives.\n- Outline the mechanisms in place to detect ICT-related\
\ incidents\n- Contain evidence to prove the current digital operational resilience\
\ situation (e.g. based on the number of major ICT-related incidents and the\
\ effectiveness of preventive measures.\n- Contain how the digital operational\
\ resilience testing is implemented (see controls under 19 and 20).\n- Outline\
\ the communication strategy in case of incidents (see 11.3)\n\nThe Management\
\ body shall allocate and review the budget required for resources to fulfill\
\ the digital operational resilience needs of the entity.\n\nEnsure monitoring\
\ is arranged on the the effectiveness of the implementation of the digital\
\ operational resilience."
annotation: "5.1\n5.2 \n5.3\n5.4 \n6.8\n13.4\n13.7"
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:1.4
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:1
ref_id: '1.4'
name: Business Continuity Oversight
description: The Management body reviews and approves periodically (e.g. annually)
the ICT business continuity policy and the ICT response and recovery plans.
annotation: "5.1\n5.2 \n5.3\n5.4 \n6.8\n13.4\n13.7"
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:1.5
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:1
ref_id: '1.5'
name: Audit Plan Approval and Review
description: The Management body reviews and approves periodically (e.g. annually)
internal ICT audit plans, ICT audits, and material modifications to the audits.
annotation: "5.1\n5.2 \n5.3\n5.4 \n6.8\n13.4\n13.7"
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:2
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:grm
ref_id: '2'
name: Risk Management Framework
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:2.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:2
ref_id: '2.1'
name: Protection Measures
description: "Implement policies and procedures to protect all information,\
\ ICT assets, and relevant physical ICT components and infrastructures. At\
\ least the following policies shall be established, maintained and approved\
\ by the Management body.\n\n- Security policy\n- Human resources policy \n\
- Encryption and cryptographic control policy\n- Identity and access management\
\ (IAM) policy\n- Change management policy\n- Network security policy\n- ICT\
\ operating policies and procedures \n- Communication policy\n- Vulnerability\
\ and patch management policy\n- Back up policy\n- Project management policy\n\
- Physical and environmental security policy\n- Business continuity policy\
\ with response and recovery plans (including testing plans)\n- ICT third-party\
\ service providers management policy\n- Operations of ICT assets (ensuring\
\ network security, protect against intrusions and data misuse and defining\
\ how the entity operates, monitors, controls, and restores ICT assets, including\
\ the documentation of ICT operations)"
annotation: '6.1
6.2
6.3
6.4
6.5
6.7
8.1
9.1
9.4
11.1
11.3
11.6
12.1
12.2
12.3
13.3
13.5
13.7
24.1
28.2
28.3
1.1 (RTS RM)
2.1 (RTS RM)
2.2 (RTS RM)
3.1 (RTS RM)
3.1 (RTS TPPM)
3.2 (RTS TPPM)
3.3 (RTS TPPM)
3.4 (RTS TPPM)
3.6 (RTS TPPM)
3.7 (RTS TPPM)
4.1 (RTS TPPM)
7.1 (RTS TPPM)
7.2 (RTS TPPM)
8.1 (RTS RM)
8.2 (RTS RM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:2.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:2
ref_id: '2.2'
name: Critical and Important Functions
description: Identify, classify and adequately document all critical and important
functions. This process involves determining which functions are essential
for the entity's operational stability and continuity. Review as needed,
and at least yearly, the adequacy of this classification.
annotation: '6.1
6.2
6.3
6.4
6.5
6.7
8.1
9.1
9.4
11.1
11.3
11.6
12.1
12.2
12.3
13.3
13.5
13.7
24.1
28.2
28.3
1.1 (RTS RM)
2.1 (RTS RM)
2.2 (RTS RM)
3.1 (RTS RM)
3.1 (RTS TPPM)
3.2 (RTS TPPM)
3.3 (RTS TPPM)
3.4 (RTS TPPM)
3.6 (RTS TPPM)
3.7 (RTS TPPM)
4.1 (RTS TPPM)
7.1 (RTS TPPM)
7.2 (RTS TPPM)
8.1 (RTS RM)
8.2 (RTS RM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:2.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:2
ref_id: '2.3'
name: Clear Segregation of Duties (SoD)
description: Establish Segregation of Duties (SoD) with regard to risk management
functions, following the three lines of defence model or internal risk management
and control model.
annotation: '6.1
6.2
6.3
6.4
6.5
6.7
8.1
9.1
9.4
11.1
11.3
11.6
12.1
12.2
12.3
13.3
13.5
13.7
24.1
28.2
28.3
1.1 (RTS RM)
2.1 (RTS RM)
2.2 (RTS RM)
3.1 (RTS RM)
3.1 (RTS TPPM)
3.2 (RTS TPPM)
3.3 (RTS TPPM)
3.4 (RTS TPPM)
3.6 (RTS TPPM)
3.7 (RTS TPPM)
4.1 (RTS TPPM)
7.1 (RTS TPPM)
7.2 (RTS TPPM)
8.1 (RTS RM)
8.2 (RTS RM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:2.4
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:2
ref_id: '2.4'
name: 'ICT Risk management framework '
description: 'A sound, comprehensive and well-documented ICT risk management
framework is in place. Which as goal to address all ICT risks properly and
ensure a high level of digital resilience. The reponsibility for risk management
is properly assigned to a control function. '
annotation: '6.1
6.2
6.3
6.4
6.5
6.7
8.1
9.1
9.4
11.1
11.3
11.6
12.1
12.2
12.3
13.3
13.5
13.7
24.1
28.2
28.3
1.1 (RTS RM)
2.1 (RTS RM)
2.2 (RTS RM)
3.1 (RTS RM)
3.1 (RTS TPPM)
3.2 (RTS TPPM)
3.3 (RTS TPPM)
3.4 (RTS TPPM)
3.6 (RTS TPPM)
3.7 (RTS TPPM)
4.1 (RTS TPPM)
7.1 (RTS TPPM)
7.2 (RTS TPPM)
8.1 (RTS RM)
8.2 (RTS RM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:2.5
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:2
ref_id: '2.5'
name: Annual Framework Review and Audit Process
description: 'The effectiveness of the risk management framework is monitored
based on the risk exposure over time to critical or important business functions.
Implement a reviewing and auditing process, with a minimum yearly review of
the framework, triggered by major ICT incidents, regulator instructions, or
major audit findings. '
annotation: '6.1
6.2
6.3
6.4
6.5
6.7
8.1
9.1
9.4
11.1
11.3
11.6
12.1
12.2
12.3
13.3
13.5
13.7
24.1
28.2
28.3
1.1 (RTS RM)
2.1 (RTS RM)
2.2 (RTS RM)
3.1 (RTS RM)
3.1 (RTS TPPM)
3.2 (RTS TPPM)
3.3 (RTS TPPM)
3.4 (RTS TPPM)
3.6 (RTS TPPM)
3.7 (RTS TPPM)
4.1 (RTS TPPM)
7.1 (RTS TPPM)
7.2 (RTS TPPM)
8.1 (RTS RM)
8.2 (RTS RM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:2.6
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:2
ref_id: '2.6'
name: Third-Party (Multi-vendor) Risk Management Program
description: "Maintain a comprehensive third-party risk management program which\
\ includes:\n- A register of information related to the use of thirdparty\
\ service providers, especially those supporting critical or important functions\
\ (see also control 17.3).\n- Put in place a policy on the management of ICT\
\ third-parties, including the criteria for determining the criticality of\
\ service providers and the internal responsibilities for managing third-parties.\
\ \n- Ensuring that senior management reviews the policy and designate a member\
\ to monitor relations with the third-parties and the contractual arrangements.\
\ \n- A multi-vendor strategy, if deemed relevant, showing key dependencies\
\ on ICT third-party service providers and explaining the rationale behind\
\ the procurement mix of ICT third-party service providers. "
annotation: '6.1
6.2
6.3
6.4
6.5
6.7
8.1
9.1
9.4
11.1
11.3
11.6
12.1
12.2
12.3
13.3
13.5
13.7
24.1
28.2
28.3
1.1 (RTS RM)
2.1 (RTS RM)
2.2 (RTS RM)
3.1 (RTS RM)
3.1 (RTS TPPM)
3.2 (RTS TPPM)
3.3 (RTS TPPM)
3.4 (RTS TPPM)
3.6 (RTS TPPM)
3.7 (RTS TPPM)
4.1 (RTS TPPM)
7.1 (RTS TPPM)
7.2 (RTS TPPM)
8.1 (RTS RM)
8.2 (RTS RM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:3
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:grm
ref_id: '3'
name: Risk Asessments
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:3.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:3
ref_id: '3.1'
name: 'Risk Assessment '
description: 'Identify all sources of ICT risk on a continuous basis, including
risk exposure to and from other entities. Gather information, assess, and
review at least on a yearly basis the cyber threats and ICT vulnerabilities
relevant to business functions and assets. Evaluate the (potential) impact
of these threats and vulnerabilities on the assets. '
annotation: '8.2
8.3
8.7
8.4
13.1'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:3.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:3
ref_id: '3.2'
name: Major change risk assessment
description: Perform a risk assessment upon each major change in the network,
IT infrastructure, and the processes or procedures affecting business functions
and assets.
annotation: '8.2
8.3
8.7
8.4
13.1'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:3.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:3
ref_id: '3.3'
name: Legacy Systems risk assessment
description: Conduct specific risk assessments on all legacy ICT systems, applications,
or systems at least yearly. Perform assessments before and after connecting
legacy ICT systems, applications, or systems.
annotation: '8.2
8.3
8.7
8.4
13.1'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:4
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:grm
ref_id: '4'
name: (Internal) ICT Audit
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:4.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:4
ref_id: '4.1'
name: Audit approach and frequency
description: "The Internal audit department shall conduct audits on the following\
\ domains: \n- Risk management framework, policies, related processes, and\
\ procedures\n- ICT Response and recovery plans\n- ICT Third-party service\
\ providers\n\nAdjust audit frequency and focus based on the entity's ICT\
\ risk profile."
annotation: '6.6
11.3
13.7
28.6
3.8 (RTS TPPM)
8.1 (RTS TPPM)
8.2 (RTS TPPM)
8.3 (RTS TPPM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:4.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:4
ref_id: '4.2'
name: Auditor requirements
description: Ensure that the internal audit staff possess sufficient ICT risk
knowledge, skills, and expertise to perform the audits. Also, ensure the independence
of the audit function.
annotation: '6.6
11.3
13.7
28.6
3.8 (RTS TPPM)
8.1 (RTS TPPM)
8.2 (RTS TPPM)
8.3 (RTS TPPM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:4.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:4
ref_id: '4.3'
name: Audit findings
description: "Establish a follow-up process for audit findings, including rules\
\ for timely verification and remediation of critical findings. Maintain a\
\ continuous learning and improvement process based on risk assessment results,\
\ resilience testing, (cyber) incidents, and testing of business continuity\
\ plans. The results of this process shall be reported annually by senior\
\ ICT staff to the management body. The format and content of the review report\
\ shall meet the requirements stated in Chapter 5 (Article 27) of RTS RM.\n\
\n "
annotation: '6.6
11.3
13.7
28.6
3.8 (RTS TPPM)
8.1 (RTS TPPM)
8.2 (RTS TPPM)
8.3 (RTS TPPM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:4.4
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:4
ref_id: '4.4'
name: Reliance Third-Party Assurance and Certifications
description: 'Use, where appropriate, third-party certifications, third-party
or internal audit reports made available by the ICT third-party service provider,
or own audit reports to confirm adherence of contractual requirements on information
access, inspection, audit, and ICT testing with the third-party. Rely on third-party
certifications and audit reports from ICT third-party service providers only
if the following specific conditions are met: the audit plan is aligned with
contractual arrangements, the audit scope is comprehensive and covers identified
systems and key controls, ongoing assessment of certification/report content
are performed and validated, key systems and controls are covered in future
versions of the certification or audit report, there is confidence in the
certifying/auditing party''s capabilities, certifications/audits adhere to
recognized professional standards, the right to request scope expansion is
covered in the contract, and right to perform discretionary audits is retained.'
annotation: '6.6
11.3
13.7
28.6
3.8 (RTS TPPM)
8.1 (RTS TPPM)
8.2 (RTS TPPM)
8.3 (RTS TPPM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:om
assessable: false
depth: 1
ref_id: OM
name: Operational Management
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:5
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:om
ref_id: '5'
name: Asset Management
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:5.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:5
ref_id: '5.1'
name: Resilient Systems
description: 'Use and maintain ICT systems, protocols, and tools that are up
to date and:
- Tailored to the magnitude of ICT operations
- Reliable
- Equipped with sufficient capacity to accurately process data and to deal
with peak orders, message or transaction volumes as needed
- Technologically resilient to deal with additional processing needs under
stressed market conditions or other adverse market conditions
'
annotation: "7\n8.1 \n8.5\n8.6\n4.1 (RTS RM)\n4.2 (RTS RM)\n5.1 (RTS RM)\n5.2\
\ (RTS RM)"
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:5.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:5
ref_id: '5.2'
name: Inventory Management
description: "Keep an inventory of (ICT) assets, monitor their life-cycle and\
\ update it periodically and upon every major change in the network, the IT\
\ infrastructure, and processes and procedures supporting business functions.\
\ Keep records of the following for each ICT asset: unique identifier, location\
\ (physical or logical), asset classification, identity of asset owner, information\
\ for specific risk assessment on legacy systems, business functions or services\
\ supported, business continuity requirements (e.g., RTO, RPO), exposure to\
\ external networks, including the internet, links and interdependencies among\
\ assets and business functions using each asset, and the end dates of the\
\ ICT third-party service provider\u2019s regular, extended and custom support\
\ services after which it is no longer supported by its supplier or by an\
\ ICT third-party service provider.\n\nIdeally, inventory management is perfomed\
\ in an automated and continuous fashion."
annotation: "7\n8.1 \n8.5\n8.6\n4.1 (RTS RM)\n4.2 (RTS RM)\n5.1 (RTS RM)\n5.2\
\ (RTS RM)"
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:5.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:5
ref_id: '5.3'
name: Asset Classification and Documentation
description: Identify, classify and document all ICT-supported business functions,
including the assets supporting them, and detail the roles and dependencies
of these assets in relation to ICT risk. Additionally, identify and document
all ICT-supported business functions dependent on ICT third-party service
providers, and identify the services provided by third-party providers that
support critical or important business functions. Make a mapping of critical
(ICT) assets based on a criticality assessment, which must include network
resources, hardware equipment, and resources on remote sites. This mapping
should also incorporate the configuration of assets and their links and interdependencies
with other assets. The criticality assessment should follow clear criteria
to evaluate the ICT risk related to business functions, taking into account
the potential impact of confidentiality, integrity, and availability losses.
Review the adequacy of this classification and documentation at least on a
yearly basis, ensuring it meets the requirements for maintaining accurate
and up-to-date asset records.
annotation: "7\n8.1 \n8.5\n8.6\n4.1 (RTS RM)\n4.2 (RTS RM)\n5.1 (RTS RM)\n5.2\
\ (RTS RM)"
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:6
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:om
ref_id: '6'
name: Change Management
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:6.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:6
ref_id: '6.1'
name: Change Procedures
description: Ensure that all changes to software, hardware, firmware components,
and systems, along with security parameters, are appropriately placed and
scoped. Document and communicate change details, including the purpose and
scope of the change, the implementation timeline, and expected outcomes. Define
clear roles and responsibilities to ensure that changes are defined, planned,
transitioned, tested, and finalized in a controlled manner. Additionally,
establish effective quality assurance procedures. Implement mechanisms to
maintain independence between the functions that approve changes and those
responsible for requesting and implementing them.
annotation: '8.1 (RTS RM)
8.2 (RTS RM)
17.1 (RTS RM)
17.2 (RTS RM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:6.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:6
ref_id: '6.2'
name: Security Requirements
description: Identify the potential impact of a change on existing security
measures and assess whether additional security measures are required for
its implementation. Verify that security requirements have been met for all
implemented changes. Establish fallback procedures and assign responsibilities
for aborting changes or recovering from changes not successfully implemented.
annotation: '8.1 (RTS RM)
8.2 (RTS RM)
17.1 (RTS RM)
17.2 (RTS RM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:6.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:6
ref_id: '6.3'
name: Emergency Change Management
description: Define procedures for documenting, reevaluating, assessing, and
approving the implementation of emergency changes, including workarounds and
patches.
annotation: '8.1 (RTS RM)
8.2 (RTS RM)
17.1 (RTS RM)
17.2 (RTS RM)'
- urn: urn:intuitem:risk:req_node:norea-dora-in-control:6.4
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:norea-dora-in-control:6
ref_id: '6.4'
name: OTAP Implementation
description: Ensure segregation of production environments from development,
testing, and other non-production environments, encompassing all components
of an environment. This also includes requirements to conduct the development
and testing in production environments. Ensure that the instances in which