For the purposes of adequately protecting ICT systems and with a view to organising response measures, financial entities shall continuously monitor and control the security and functioning of ICT systems and tools and shall minimise the impact of ICT risk on ICT systems through the deployment of appropriate ICT security tools, policies and procedures.
Comprehensive security policy covering access controls, encryption, network security, patch management, and security monitoring as required by DORA Article 9.
ict-security-policyStructured JSON register of deployed ICT security controls, their implementation status, effectiveness ratings, and mapping to regulatory requirements.
ict-security-controlsfs-ict-security-controlsDORA-Art9-P1assessment_dateimplemented_controls{
"properties": {
"assessment_date": {
"format": "date",
"type": "string"
},
"effective_controls": {
"minimum": 0,
"type": "integer"
},
"has_access_controls": {
"type": "boolean"
},
"has_encryption": {
"type": "boolean"
},
"has_network_security": {
"type": "boolean"
},
"has_patch_management": {
"type": "boolean"
},
"implemented_controls": {
"minimum": 0,
"type": "integer"
},
"last_effectiveness_review": {
"format": "date",
"type": "string"
},
"total_controls": {
"minimum": 0,
"type": "integer"
}
},
"required": [
"assessment_date",
"total_controls",
"implemented_controls",
"has_access_controls",
"has_encryption"
],
"type": "object"
}