Biblioteca de prompts para el cumplimiento de DORA
Acerca de esta biblioteca de prompts
Esta biblioteca de prompts ayuda a las entidades financieras a cumplir con la Ley de Resiliencia Operativa Digital (DORA), el reglamento de la UE que establece requisitos integrales de gestión de riesgos de TIC para el sector financiero. Utilice estos prompts con ISMS Copilot para generar marcos, políticas y documentación que cumplan con DORA.
DORA se aplica a entidades de crédito, entidades de pago, empresas de servicios de inversión, proveedores de servicios de criptoactivos, empresas de seguros y proveedores de servicios de terceros de TIC críticos. Asegúrese de que DORA sea aplicable a su organización antes de implementar estos prompts.
Cómo utilizar estos prompts
Reemplace los [marcadores de posición entre corchetes] con los detalles específicos de su organización. Comience con prompts de definición de alcance y evaluación, y luego pase al desarrollo e implementación de políticas. Cargue evaluaciones de riesgos o políticas de TIC existentes para obtener resultados adaptados al contexto.
Evaluación de cumplimiento de DORA
Evaluación de aplicabilidad y alcance de DORA
Assess DORA applicability to our organization:
Organization type: [credit institution/payment firm/investment firm/crypto-asset service provider/insurance undertaking/ICT third-party provider]
EU presence: [EU-established/branch in EU/providing services to EU financial entities]
Activities: [describe financial services provided]
Determine:
- Which DORA chapters apply to us (ICT risk management, incident reporting, resilience testing, third-party risk, information sharing)
- Whether we qualify as critical ICT third-party provider
- Proportionality considerations (small, non-interconnected firm provisions)
- Key compliance deadlines and phase-in timelines
Provide a DORA scope statement and compliance roadmap. Análisis de brechas (gap analysis) frente a los pilares de DORA
Conduct a gap analysis of our current ICT risk management against DORA's five pillars:
Current state:
- ICT risk management: [describe current practices]
- Incident management: [current incident response and reporting]
- Resilience testing: [current testing activities]
- Third-party risk: [vendor management practices]
- Information sharing: [participation in threat intelligence]
For each DORA pillar, provide:
- Key regulatory requirements
- Our current compliance level (Compliant/Partial/Non-compliant)
- Specific gaps and missing controls
- Risk rating (Critical/High/Medium/Low)
- Remediation recommendations
- Estimated effort and timeline to compliance
Prioritize by deadline: January 2025 is the main compliance date. Marco de gestión de riesgos de TIC (Capítulo II)
Política de gestión de riesgos de TIC
Create a comprehensive ICT Risk Management Policy aligned with DORA Article 6:
Organization: [name and type]
ICT environment: [systems, infrastructure, critical services]
Policy sections:
- Governance structure (roles of management body, CIO/CISO, risk functions)
- ICT risk identification, classification, and assessment
- Protection and prevention measures
- Detection capabilities and monitoring
- Response and recovery procedures
- Learning and evolving (lessons learned, continuous improvement)
- Communication and reporting (to management body, supervisory authority)
- Integration with overall risk management
- Proportionality and risk-based approach
Ensure alignment with DORA Articles 5-16 and supervisory expectations. Inventario y clasificación de activos de TIC
Develop an ICT asset inventory and classification scheme per DORA Article 8:
Our ICT landscape:
- Applications: [list business-critical applications]
- Infrastructure: [data centers, cloud services, networks]
- Data repositories: [databases, data warehouses]
- Third-party services: [critical ICT providers]
For each asset category, provide:
- Inventory template (asset ID, description, owner, location)
- Classification criteria (criticality, confidentiality, availability requirements)
- Interdependencies and connections
- Business impact if unavailable
- Recovery time objectives (RTO)
- Supporting documentation requirements
Create a register template suitable for ongoing maintenance and supervisory review. Continuidad del negocio y recuperación ante desastres
Create ICT business continuity and disaster recovery plans meeting DORA Article 11:
Critical functions: [list regulated/critical business functions]
Dependencies: [ICT systems supporting each function]
Risk scenarios: [cyber attacks, system failures, provider outages]
For each critical function, develop:
- Impact analysis (RTO, RPO, criticality)
- Recovery strategies (failover, backup systems, manual workarounds)
- Activation criteria and decision-making
- Communication plan (internal, customers, authorities)
- Testing requirements (frequency, scope, scenarios)
- Plan maintenance and update procedures
Address DORA-specific requirements: severe ICT-related incidents, third-party provider failures, business continuity policy review by management body. DORA exige la aprobación del órgano de dirección y la revisión anual del marco de gestión de riesgos de TIC. Asegúrese de que la gobernanza y la supervisión estén documentadas en todas sus políticas y planes.
Gestión de incidentes relacionados con las TIC (Capítulo III)
Procedimiento de clasificación y notificación de incidentes
Develop an ICT incident classification and reporting procedure per DORA Articles 17-20:
Incident categories we may face:
- Cyber attacks: [ransomware, DDoS, data breaches]
- System outages: [application failures, infrastructure downtime]
- Data integrity issues: [data corruption, unauthorized changes]
- Third-party failures: [critical provider outages]
Create:
- Incident classification scheme (major incidents requiring supervisory notification)
- Materiality thresholds aligned with RTS (clients affected, duration, data impact, reputational damage, financial losses)
- Initial notification timeline (4 hours for major incidents in some jurisdictions)
- Intermediate and final report timelines
- Root cause analysis requirements
- Integration with existing incident response (CSIRT, SOC)
Template notification reports for competent authorities using prescribed formats. Procedimientos de respuesta y recuperación ante incidentes
Create ICT incident response procedures aligned with DORA Article 17:
Response team structure:
- Incident commander: [role]
- Technical team: [security, operations, applications]
- Communications: [internal, external, regulatory]
- Legal and compliance: [DPO, legal counsel, compliance]
Procedure elements:
- Detection and alerting mechanisms
- Initial assessment and classification
- Containment and eradication steps
- Recovery and restoration
- Evidence preservation (forensics)
- Communication protocols (supervisory authority, clients, media)
- Post-incident review and lessons learned
- Integration with GDPR breach notification (if applicable)
Address DORA-specific elements: voluntary incident reporting to CSIRT network, cross-border cooperation with other authorities. Pruebas de resiliencia operativa digital (Capítulo IV)
Programa de pruebas de resiliencia
Design a digital operational resilience testing program per DORA Articles 24-26:
Our risk profile:
- Organization type: [if significant/critical financial entity]
- ICT complexity: [systems, outsourcing level]
- Threat landscape: [relevant cyber threats]
Testing program components:
1. Basic testing (all entities):
- Vulnerability assessments: [frequency, scope, tools]
- Open source analysis: [threat intelligence, vulnerability databases]
- Network security assessments: [external/internal penetration testing]
- Gap analyses: [control assessments]
- Physical security reviews: [data centers, offices]
- Questionnaires and scanning: [security posture reviews]
- Source code review: [critical applications]
- Scenario-based testing: [business continuity, disaster recovery]
- Compatibility testing: [software upgrades, patches]
- Performance testing: [capacity, stress testing]
2. Advanced testing (for significant entities):
- Threat-Led Penetration Testing (TLPT): Red team exercises simulating real attacks
- TLPT scope, frequency (every 3 years), and methodology
- Use of TIBER-EU or equivalent framework
- Internal vs. external testers
- White team coordination and safeguards
Create testing schedule, scope definitions, and deliverable requirements. Las empresas más pequeñas y no interconectadas se benefician de las disposiciones de proporcionalidad. Adapte su programa de pruebas a su tamaño, perfil de riesgo y complejidad en lugar de implementar todos los elementos.
Gestión de riesgos de terceros de TIC (Capítulo V)
Marco de gestión de riesgos de terceros de TIC
Create an ICT third-party risk management framework per DORA Articles 28-30:
Our third-party landscape:
- Critical ICT providers: [cloud, data centers, payment processors, software vendors]
- Supporting providers: [less critical services]
- Contractual arrangements: [describe current contracts]
Framework elements:
1. Third-party risk strategy (Article 28):
- Risk assessment criteria and methodology
- Due diligence requirements (pre-contract, ongoing)
- Concentration risk management (over-reliance on single providers)
- Subcontracting and fourth-party risk
- Exit strategies and transition planning
2. Key contractual provisions (Article 30):
- Service level agreements (availability, performance)
- Access, audit, and inspection rights
- Data security and location requirements
- Incident notification obligations
- Termination rights and assistance
- Subcontracting restrictions and notifications
3. Register of information (Article 28):
- Inventory of ICT third-party arrangements
- Criticality classification (critical/important vs. supporting)
- Data processed and locations
- Contractual terms summary
- Risk ratings and controls
Ensure compliance with EBA/ESMA/EIOPA guidelines on outsourcing. Evaluación de proveedores de servicios de terceros de TIC críticos
Assess whether our ICT service providers qualify as "critical" under DORA and implications:
Our key providers:
[List major ICT providers and services they deliver]
For each provider, analyze:
- Criticality to our operations (essential function, systemic importance)
- Substitutability (availability of alternatives, switching costs)
- Number of financial entities they serve
- Whether they meet critical third-party provider thresholds
If provider is designated as critical:
- Additional oversight by Lead Overseer
- Required cooperation with oversight activities
- Enhanced contractual provisions
- Incident reporting obligations
- Resilience and testing requirements
Develop strategy for managing critical provider relationships under enhanced oversight regime. Intercambio de información (Capítulo V)
Participación en el intercambio de información sobre ciberamenazas
Establish participation in information sharing arrangements per DORA Article 45:
Information sharing opportunities:
- Financial sector ISACs (Information Sharing and Analysis Centers)
- National cybersecurity authorities and CSIRTs
- Industry peer groups
- Threat intelligence platforms
Participation framework:
- Information types to share (threat indicators, vulnerabilities, incidents, defensive measures)
- Information types to receive (threat intelligence, attack patterns, mitigation advice)
- Confidentiality and anonymization requirements
- Legal protections for sharing (GDPR compliance, liability protections)
- Operational procedures (how to share, with whom, when)
- Internal approval processes
- Feedback loops and lessons learned
Address DORA provisions: voluntary participation, liability protections, confidentiality, GDPR exemptions for cybersecurity purposes. Gobernanza y rendición de cuentas
Supervisión de riesgos de TIC por parte del órgano de dirección
Define management body responsibilities for ICT risk per DORA Article 5:
Our governance structure:
- Management body composition: [board of directors, executive committee]
- ICT risk function: [CIO, CISO, IT risk team]
- Reporting lines: [how ICT risk reaches management body]
Management body responsibilities:
- Approval of ICT risk management framework
- Approval of digital operational resilience strategy
- Oversight of ICT risk exposure and risk appetite
- Allocation of resources and budget for ICT risk
- Approval of ICT business continuity and disaster recovery plans
- Review of resilience testing results and findings
- Oversight of third-party ICT risk
- Approval of major ICT changes and projects
Create:
- Terms of reference for ICT risk oversight (board committee or full board)
- Reporting templates (ICT risk dashboard, incident summaries, testing results)
- Meeting frequency and agenda items
- Training requirements for non-executive directors on ICT risk
Ensure management body understanding and active oversight, not just rubber-stamping. Documentación y evidencia de cumplimiento de DORA
Develop comprehensive DORA compliance documentation for supervisory review:
Documentation requirements across DORA chapters:
Chapter II (ICT risk management):
- ICT risk management framework and policy
- ICT asset inventory and classification
- Business impact analyses
- ICT business continuity and disaster recovery plans
- Backup and restoration procedures
- Change management procedures
- Patch management procedures
Chapter III (Incident management):
- Incident response procedures
- Incident classification methodology
- Incident register and notification records
- Root cause analyses and lessons learned
Chapter IV (Testing):
- Resilience testing program and schedule
- Testing results and findings
- Remediation plans and evidence
- TLPT reports (if applicable)
Chapter V (Third-party risk):
- Third-party risk management policy
- Register of ICT third-party arrangements
- Due diligence assessments
- Contracts with key provisions
- Exit plans
Governance:
- Management body minutes (ICT risk discussions and approvals)
- ICT risk reporting to management body
- Training records for management body
Create a DORA compliance repository structure and evidence collection plan for ongoing supervisory inspections. DORA enfatiza la resiliencia continua, no el cumplimiento puntual. Integre el monitoreo, las pruebas y la mejora continua en su marco de trabajo desde el primer día.
Mejores prácticas para el cumplimiento de DORA
Integración con marcos de trabajo existentes
Map DORA requirements to our existing compliance frameworks to avoid duplication:
Existing frameworks:
- ISO 27001: [if certified or implementing]
- NIS2: [if in scope as essential/important entity]
- GDPR: [data protection and breach notification]
- SOC 2: [if providing services to US customers]
- PCI DSS: [if processing card data]
For each DORA requirement, identify:
- Overlaps with existing controls
- Gaps requiring new controls
- Opportunities for integrated compliance (e.g., unified testing program)
- Conflicting requirements requiring reconciliation
- Shared evidence and documentation
Create an integrated compliance framework leveraging existing investments while meeting DORA-specific requirements (e.g., management body oversight, incident reporting timelines, TLPT). DORA se basa en estándares existentes como ISO 27001, pero añade requisitos específicos para el sector financiero. Utilice los marcos existentes como base y añada los elementos específicos de DORA por encima.