Skip to content

ICT risk and resilience operations

DORA execution in Modulos covers the full ICT resilience cycle: identify, protect, detect, respond, recover, and report.

Organization-level governance requirements (OFF-16)

RequirementTopicRegulation reference
ORF-307ICT systems capacity and resilience governanceArt. 7
ORF-308ICT function, asset, and dependency inventory governanceArt. 8(1), 8(4)-(6)
ORF-309Continuous ICT risk identification and assessment governanceArt. 8(2), 8(3), 8(7)
ORF-310ICT protection and prevention policy governanceArt. 9(1)-(4)
ORF-311ICT anomaly detection and alert-threshold governanceArt. 10(1)-(3)
ORF-312ICT continuity, response, recovery, and crisis governanceArt. 11(1)-(8)
ORF-313Backup, restoration, and recovery-objective governanceArt. 12(1)-(7)
ORF-314Post-incident learning and resilience-training governanceArt. 13(1)-(7)
ORF-315Crisis communication and disclosure governanceArt. 14(1)-(3)
ORF-316ICT incident management and classification governanceArt. 17(1)-(3), 18(1)-(4)
ORF-317Major incident reporting and client-notification governanceArt. 19(1)-(5), 20, 23

AI-system execution requirements (MFF-16)

RequirementTopicRegulation reference
MRF-276AI system ICT capacity and resilience implementationArt. 7
MRF-277AI system asset inventory and dependency mapping executionArt. 8(1), 8(4)-(6)
MRF-278AI system continuous ICT risk and vulnerability assessmentArt. 8(2), 8(3), 8(7)
MRF-279AI system protection and prevention control executionArt. 9(1)-(4)
MRF-280AI system anomaly detection and alert-threshold executionArt. 10(1)-(3)
MRF-281AI system response, recovery, and continuity executionArt. 11(1)-(8)
MRF-282AI system backup and restoration executionArt. 12(1)-(7)
MRF-283AI system post-incident learning and training executionArt. 13(2)-(6)
MRF-284AI system crisis communication and disclosure executionArt. 14(1)-(3), 19(3)
MRF-285AI system incident logging and classification executionArt. 17(1)-(3), 18(1)-(4)
MRF-286AI system staged major incident reporting executionArt. 19(1)-(5), 20, 23

Execution checkpoints

  • critical service and dependency inventories are current and reviewable
  • anomaly thresholds and escalation paths are documented and tested
  • continuity and restoration evidence includes test frequency and outcomes
  • major-incident classification and staging logic is reproducible

Disclaimer

This page is for general informational purposes and does not constitute legal advice.