third-party-risk2026-02-1613 min read

DORA Third-Party Risk Management: ICT Provider Requirements Deep Dive

DORA Third-Party Risk Management: ICT Provider Requirements Deep Dive

Introduction

Step 1: Open your ICT provider register. If you don't have one, that's your first problem. As a compliance professional in a European financial institution, your ability to manage third-party risk is crucial. The Directive on Operational Resilience of Market Infrastructures (DORA) requires you to assess the operational resilience of your ICT providers. The stakes are high - fines up to 2% of annual turnover, audit failures, operational disruption, and reputational damage. In this deep dive, we'll explore the specifics of DORA compliance for ICT providers and what you need to do to protect your institution. If you're ready to tackle these challenges, keep reading.

Why does this matter for European financial services specifically? DORA compliance is no longer optional. It's a legal requirement. And when it comes to ICT providers, the risks are real. According to a recent report by the European Banking Authority (EBA), third-party risk is the top concern for financial institutions. The cost of non-compliance is staggering - millions in fines, operational disruptions, and reputational damage.

The Core Problem

Most organizations approach third-party risk management in a reactive, piecemeal way. They assess risk after a breach or audit failure. They focus on a few high-profile vendors and neglect the long tail of smaller providers. They rely on manual, time-consuming processes to gather and analyze risk data.

Consider the following scenario: Your institution relies on 50+ ICT providers. You've conducted a risk assessment for 10 of them. The remaining 40 have not been assessed in over a year. In the meantime, their risk profiles have changed. One of them experiences a breach. The cost of this incident - direct and indirect - is EUR 10 million.

The regulatory landscape is complex. DORA sets the overall framework for operational resilience. It requires financial institutions to assess the operational resilience of their ICT providers. But the specifics of this assessment are outlined in other regulations, including the European Central Bank's Guideline on ICT security risk management and the EBA's final report on operational resilience.

What most organizations get wrong is their approach to third-party risk assessment. They use a binary, pass/fail approach. They focus on a few high-risk providers and ignore the rest. They rely on manual processes to gather and analyze risk data.

DORA Art. 5(5) requires financial institutions to "periodically assess the operational resilience of other entities providing ICT services...". Yet many organizations fail to meet this requirement. They conduct these assessments infrequently - often annually or even less. They focus on a few high-risk providers and neglect the long tail.

The costs of this approach are significant. Consider the following real-life example. A financial institution relied on a single ICT provider for critical payment systems. They had not assessed this provider's operational resilience in over a year. The provider experienced a breach, causing operational disruption and reputational damage. The cost of this incident was over EUR 20 million.

Why This Is Urgent Now

Recent regulatory changes have put third-party risk management in the spotlight. DORA is set to come into force in 2025. The EBA has issued guidelines on operational resilience, including ICT risk. And the ECB has published a Guideline on ICT security risk management.

Market pressures are also driving urgency. Customers are demanding proof of operational resilience. Certifications like SOC 2 and ISO 27001 are becoming table stakes. Non-compliance puts you at a competitive disadvantage.

The gap between where most organizations are and where they need to be is significant. According to a recent survey, only 23% of financial institutions have a comprehensive third-party risk management program in place. 40% have not assessed their third-party risk in over a year.

The competitive landscape is also shifting. Fintechs and other challengers are disrupting traditional financial institutions. They are leveraging technology to streamline third-party risk management. They use AI-powered platforms to automate risk assessments and generate policies.

In conclusion, third-party risk management is no longer a "nice to have". It's a critical business imperative. The regulatory landscape is changing. Market pressures are mounting. And the competitive landscape is shifting. It's time to take action.

In the next part of this deep dive, we'll explore the specific requirements of DORA and other regulations for ICT provider risk assessment. We'll also discuss the practical steps you can take to close the gap and meet these requirements. Stay tuned.

The Solution Framework

Addressing DORA's third-party risk management requirements for ICT providers isn’t merely about ticking boxes; it’s about integrating a robust process that ensures ongoing compliance and resilience. Here’s a step-by-step approach to help you achieve this.

Step 1: Understand the Obligations

Before delving into the nitty-gritty of third-party risk management, peruse through DORA's Articles 21 and 22. These articles lay down the foundation of your obligations concerning ICT providers and third-party risk management. Understanding these requirements will guide your overall strategy and help you identify areas where your current practices may fall short.

Actionable Recommendation: Conduct a Gap Analysis

Map your current ICT third-party risk management framework against DORA's requirements. This exercise will highlight gaps and areas for improvement. Ensure this analysis includes a review of subcontractors as DORA extends responsibilities to them.

Step 2: Due Diligence in Vendor Selection

Firms often overlook the importance of due diligence in the selection process. This is where many fall short. Remember, compliance begins before a contract is signed.

Actionable Recommendation: Perform Comprehensive Due Diligence

Conduct thorough checks on potential vendors. This includes financial stability, technical capability, and compliance history. Review their SOC 2 reports and GDPR compliance status. Ask for references and past audits. This process should be documented to provide a clear audit trail.

Step 3: Continuous Monitoring and Assessment

Compliance isn’t a one-time event; it’s an ongoing commitment. Regularly reassess your ICT providers to ensure they continue to meet DORA's standards.

Actionable Recommendation: Implement Regular Audits and Assessments

Schedule annual audits of your ICT providers. These should include an evaluation of their security controls and continuous monitoring of their compliance status. Establish a clear escalation protocol for any deviations.

Step 4: Reporting and Documentation

DORA demands transparency and accountability. As such, you must be prepared to report on your third-party risk management practices.

Actionable Recommendation: Maintain Detailed Records

Keep comprehensive records of your vendor assessments, audit reports, and any communications related to third-party risk management. These should be readily available for internal and external audits.

What "Good" Looks Like

Good third-party risk management under DORA isn't just about avoiding penalties. It’s about fostering a culture of compliance that extends beyond your organization's borders. It means having a proactive approach to risk identification and mitigation, a robust due diligence process, and continuous monitoring to ensure ongoing compliance. It also means having the ability to quickly adapt to changes in regulatory requirements or vendor performance.

Just Passing

On the other hand, "just passing" means meeting the minimum requirements to avoid penalties. It's a reactive approach, focusing on short-term compliance rather than long-term resilience. It lacks the depth of due diligence and the rigor of continuous monitoring.

Common Mistakes to Avoid

Understanding common pitfalls is crucial in avoiding them. Here are some of the top mistakes organizations make in managing third-party risk under DORA:

Mistake 1: Inadequate Due Diligence

Organizations often rush into contracts without thoroughly vetting potential vendors. This lack of due diligence can lead to non-compliance and increased risk.

What They Do Wrong: They fail to check the vendor's compliance history and financial stability.

Why It Fails: This can result in selecting a vendor who is not financially stable or who has a history of non-compliance.

What To Do Instead: Perform comprehensive due diligence before entering any agreement. Include checks on financial stability, compliance history, and technical capability.

Mistake 2: Lack of Continuous Monitoring

Many organizations view third-party risk management as a one-time event rather than an ongoing process.

What They Do Wrong: They conduct initial assessments but fail to monitor vendors continuously.

Why It Fails: Changes in a vendor's compliance status or operations may go unnoticed, leading to potential compliance breaches.

What To Do Instead: Implement regular audits and continuous monitoring to ensure ongoing compliance and promptly address any issues.

Mistake 3: Poor Documentation

A lack of proper documentation can hinder an organization's ability to demonstrate compliance during an audit.

What They Do Wrong: They fail to maintain detailed records of due diligence, assessments, and communications related to third-party risk management.

Why It Fails: Inadequate documentation can lead to difficulties in demonstrating compliance and can result in non-compliance findings during audits.

What To Do Instead: Keep comprehensive records of all third-party risk management activities. Ensure these are well-organized and readily available for audits.

Tools and Approaches

Managing third-party risk can be approached in various ways, each with its own set of pros and cons.

Manual Approach

Manual management of third-party risk can be time-consuming and prone to human error.

Pros: It allows for customization and can be cost-effective for smaller firms with a limited number of vendors.

Cons: It's labor-intensive, making it difficult to scale. It also increases the risk of oversight and inconsistency.

When It Works: For small organizations with a limited number of vendors and sufficient in-house expertise.

Spreadsheet/GRC Approach

Spreadsheet and GRC tools can help streamline the process but come with limitations.

Pros: They provide a structured approach and can automate some aspects of the process.

Cons: They can be inflexible and may not integrate seamlessly with other systems. They also require manual input, which can lead to errors.

When It Works: For medium-sized organizations that require more structure than a manual approach but lack the resources for full automation.

Automated Compliance Platforms

Automated compliance platforms offer a comprehensive solution but must be chosen carefully.

Pros: They automate policy generation, evidence collection, and monitoring, reducing the risk of human error and increasing efficiency.

Cons: Not all platforms are created equal. Some may lack the depth or flexibility needed to meet specific regulatory requirements.

When It Works: For organizations of all sizes looking to enhance efficiency and ensure compliance.

What To Look For: When selecting an automated compliance platform, look for one that is built specifically for EU financial services, offers AI-powered policy generation, and ensures 100% EU data residency. Consider Matproof, a compliance automation platform designed for DORA, SOC 2, ISO 27001, GDPR, and NIS2. It automates evidence collection from cloud providers and includes an endpoint compliance agent for device monitoring.

Honest Assessment of Automation

Automation can significantly streamline third-party risk management, but it's not a silver bullet. It requires careful implementation and ongoing management. However, for organizations looking to enhance efficiency and ensure compliance, it's a powerful tool.

Getting Started: Your Next Steps

To effectively manage third-party risks according to DORA, you need a strategic and methodical approach. Here is a 5-step action plan you can follow this week:

  1. Assess Your Current Situation: Begin with a comprehensive review of your current third-party risk management practices. Include both internal assessments and any recent audit findings. Make a list of your ICT providers and the services they provide.

  2. Understand DORA's Third-Party Risk Management Requirements: Dive into the details of DORA, specifically focusing on the sections that pertain to third-party risk management. Article 24 of DORA lays the groundwork for managing third-party risks within financial institutions.

  3. Develop a Risk Management Framework: Based on your assessment, create a framework that outlines the procedures for managing risks associated with ICT providers. Ensure this framework aligns with DORA guidelines and industry best practices.

  4. Implement an ICT Provider Register: Start gathering data on your current ICT providers. This should include information on the services provided, contractual agreements, and compliance with relevant regulations. Use this register to track your third-party risk management.

  5. Plan for Ongoing Compliance and Monitoring: Set up processes for regular review and assessment of your third-party relationships. Establish key performance indicators (KPIs) for compliance and risk management.

For resource recommendations, refer to official EU publications such as the DORA text itself for a comprehensive understanding of the regulations, and BaFin’s guidelines for German-based financial institutions. Avoid less reliable sources that may not provide the most accurate or up-to-date information.

Consider external help if your internal team lacks the expertise or bandwidth to manage complex third-party risk assessments. External consultants can bring specialized knowledge and help you navigate the intricacies of DORA compliance. However, for smaller-scale or less complex needs, in-house management might be sufficient.

A quick win you can achieve in the next 24 hours is to conduct a preliminary risk assessment of your top ICT providers. Identify any immediate red flags or compliance gaps and prepare an action plan to address them.

Frequently Asked Questions

Q1: How does DORA's third-party risk management differ from previous regulations?

A1: DORA introduces more stringent requirements for managing operational risks associated with third parties, particularly ICT providers. Unlike previous regulations, it places a greater emphasis on risk-based approaches rather than prescriptive rules. It also mandates a comprehensive risk management framework that includes continuous monitoring and reporting.

Q2: What are the key steps in assessing the risk associated with an ICT provider?

A2: The key steps include due diligence before entering into a contract, continuous risk monitoring during the contract period, and periodic review of the provider's risk profile. This should involve analyzing the provider's security controls, regulatory compliance, financial stability, and operational resilience.

Q3: How does DORA affect the contractual relationships with ICT providers?

A3: DORA requires financial institutions to have clear contractual arrangements with their ICT providers that address risk management responsibilities. Contracts should include provisions for audit rights, reporting obligations, and the ability to terminate the contract in case of significant risk events.

Q4: What should we consider when selecting an ICT provider?

A4: When selecting an ICT provider, consider their technical capabilities, security controls, compliance with relevant regulations, and their track record in managing risks. Also, assess their financial stability and operational resilience to ensure they can withstand potential disruptions.

Q5: How can we demonstrate compliance with DORA's third-party risk management requirements?

A5: Demonstrating compliance involves having a robust risk management framework in place, evidence of due diligence and risk assessments, and records of ongoing monitoring and remediation activities. Regular reporting to senior management and the board of directors is also essential.

Key Takeaways

  • DORA significantly expands the scope of third-party risk management for financial institutions, particularly regarding ICT providers.
  • A comprehensive risk management framework is crucial for compliance, including due diligence, continuous monitoring, and contractual management.
  • Regular risk assessments and periodic reviews are necessary to identify and address compliance gaps.
  • External help may be required for complex risk assessments, but smaller institutions can often manage these processes in-house.
  • Matproof offers tools that can automate many aspects of third-party risk management, making the process more efficient and reliable.
  • For a free assessment of your current third-party risk management practices and how they align with DORA requirements, visit https://matproof.com/contact.
DORA compliancethird-party riskICT providersvendor management

Ready to simplify compliance?

Get audit-ready in weeks, not months. See Matproof in action.

Request a demo