Delinea Whitepaper Dora Requirements
Delinea Whitepaper Dora Requirements
WHITEPAPER
WHITEPAPER
Mapping DORA Requirements to
Delinea Privileged Access Management
The financial sector is a critical component of the financial services companies seeking to improve security
European economy, providing essential services such as and compliance as well as needed consistency to the
banking, insurance, and investment management. It’s also State members to form national requirements.
a magnet for cyberattacks.
The Digital Operational Resilience Act (DORA), also
The European Parliament acknowledged that firms known as Regulation (EU) 2022/2554), aims to ensure the
operating in the financial services industry are 300 operational resilience of all entities that provide critical
times as likely as other companies to be targeted by financial services in the EU by establishing a harmonized
cybercriminals. Especially as cyberattacks become more set of rules and requirements.
sophisticated, budgets tighten, and business pressures
In this whitepaper, you’ll learn how DORA impacts the
mount, financial institutions struggle to prioritize
European financial sector, including specific security
cybersecurity controls that protect their complex,
controls you must have in place. You’ll also see how
interconnected networks and ensure business continuity.
Privileged Access Management (PAM) best practices and
To that end, the European Commission recognized the solutions, including Delinea’s PAM solutions, meet the
need for an overarching Act that would provide clarity to requirements of DORA.
2
WHITEPAPER
Mapping DORA Requirements to
Delinea Privileged Access Management
i. https://www.europarl.europa.eu/doceo/document/A-8-2017-0176_EN.html
ii. https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022R2554#d1e2289-1-1
3
WHITEPAPER
Mapping DORA Requirements to
Delinea Privileged Access Management
You must abide by DORA if you are a: DORA doesn’t apply to managers of alternative investment
funds, insurance and reinsurance undertakings, or
• credit institution;
institutions for occupational retirement provision which
• payment institution;
operate pension schemes which together do not have more
• account information service provider; than 15 members in total.
• electronic money institution;
PAM is critical to meet DORA requirements. Privileged
• investment firm;
Access Management (PAM) plays a vital role in protecting
• crypto-asset service provider; sensitive data and critical systems.
• central securities depository; It ensures that only authorised individuals and applications
can access critical systems and sensitive information by
• central counterparty;
enforcing strong authentication measures. This helps
• trading venue;
prevent unauthorized access and potential data breaches.
• trade repository;
PAM enables granular access control, allowing
• manager of alternative investment funds;
administrators to define and manage privileges based
• management company;
on job roles and responsibilities, limiting the risk of
• data reporting service provider; data exposure. A secure vault facilitates the secure
• securitisation repository;
4
WHITEPAPER
Mapping DORA Requirements to
Delinea Privileged Access Management
In the chart below, learn how Delinea’s PAM solutions helps you meet the requirements of DORA.
Governance & Financial entities are required to The framework covers ICT risk across the endpoints.
organization establish internal governance and Servers play a crucial role within the IT infrastructure
Article 5 – 1-2 control framework to manage ICT of every financial institution as they hold critical
risk. information.
This framework should be Therefore, management must have an easy way to audit
documented and reviewed at them and produce accurate reports.
least once a year and be subject
to regular internal audit including To follow the best practices a vault should be used as a
a formal follow-up process. basis for governance and reporting purposes.
The management body is Delinea’s vault governs the usage of secrets across
responsible for defining, the organization. It records all actions a user takes
approving, overseeing, and on a password, like creating, updating, and sharing
implementing this framework. passwords.
This includes actions such as: In a situation when an employee leaves the
organization, admins can easily assess and control
• Setting and approving the vulnerability risk by using the User Audit Report feature.
digital operational resilience Admins can set up custom reports that will be delivered
strategy automatically.
5
WHITEPAPER
Mapping DORA Requirements to
Delinea Privileged Access Management
ICT risk The framework should Appropriate protection of ICT assets and information from
management include policies that will damage or unauthorized access requires the implementation
framework protect from damage of several actions impacting user, admin accounts,
Article 6 – and unauthorized access workstations and servers.
1,2,5,6,7 or usage all information
and ICT assets including: Firstly, companies must implement policies governing credentials
software, hardware, servers, so that access to sensitive information is restricted.
physical components and
infrastructures, such as
Using Delinea’s PAM vault, admins can specify who can access
premises, data centres, and
which systems, under what conditions, and what types of actions
sensitive designated areas.
they can take once they have access. To avoid standing access,
the principle of least privilege can be followed to allow privileged
Companies should monitor users to have only the access they need for a limited time.
and control the security and
functioning of ICT systems.
Vault controls access to privileged credentials, automatically
rotating passwords and facilitating login sessions for privileged
users without revealing the password.
6
WHITEPAPER
Mapping DORA Requirements to
Delinea Privileged Access Management
Access/ Financial entities must Usernames and passwords alone are not sufficient for
authentication ensure that data is protected protecting important resources. If a user’s credentials are
Article 9 – 1,3,4 from risks arising from data compromised, it is crucial to detect such events and prevent
management, including poor attackers from moving laterally within the systems.
administration, processing-
related risks, unauthorized In the context of Privileged Access Management (PAM),
access and human error. authorization controls guarantee that only authorized users,
whether on-premise or in the cloud, can access sensitive IT assets
and data.
7
WHITEPAPER
Mapping DORA Requirements to
Delinea Privileged Access Management
Policies Financial entities must Delinea protects access to backups by restricting access to
Article 9 – 4 implement policies managing: privileged accounts.
Protection & Financial entities must Delinea Privileged Behavior Analytics uses advanced machine
prevention establish robust mechanisms to learning to analyse activity on privileged accounts in real-
Article 10 – 1,2,3 proactively detect and identify time to detect anomalies and provide threat scoring and
anomalous activities. configurable alerts.
Response Financial entities must implement Delinea granularly defines privileged access so that only a
and recovery policies to ensure business defined set of users can access, modify, or delete back-up
and backup continuity of the critical systems and files, even under certain conditions.
Article 11 – 1,2 functions and quick response
Article 12 - 1 mechanisms. With Delinea, credentials for back-up systems are protected
in a vault. High Availability and replication ensure that
They should have backup credentials are always accessible to designated backup
systems in place that can admins even if core systems are down.
be activated according to
established policies and
procedures.
8
WHITEPAPER
Mapping DORA Requirements to
Delinea Privileged Access Management
Learning Financial institutions must be Assessing the usefulness of the new technologies, IT
and evolving equipped with the capabilities security teams can start with the Delinea maturity model
Article 13 - 1,7 and personnel to gather which provides a framework to adopt Privileged Access
information on vulnerabilities, Management.
cyber threats, ICT-related
incidents, and cyberattacks.
Next Steps Talk with an expert about how Delinea PAM can help you
meet the requirements of DORA.
Contact Delinea
9
Delinea is a leading provider of Privileged Access Management (PAM) solutions for the modern,
hybrid enterprise. The Delinea Platform seamlessly extends PAM by providing authorization for
all identities, controlling access to an organization’s most critical hybrid cloud infrastructure
and sensitive data to help reduce risk, ensure compliance, and simplify security. Delinea
removes complexity and defines the boundaries of access for thousands of customers
worldwide. Our customers range from small businesses to the world’s largest financial
institutions, intelligence agencies, and critical infrastructure companies. delinea.com
© Delinea DORA-WP-0623-EN