Alerting & Incident Response: From Anomaly to Final Report
TL;DR Effective alerting is more than just a few emails at 80% CPU: It requires clean metrics, clear …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
With Regulation (EU) 2022/2554, the EU is establishing a unified, binding framework for the digital operational resilience of financial institutions for the first time. DORA targets nearly all actors in the financial sector: credit institutions, payment service providers, insurers, investment firms, market infrastructures, and—most importantly—critical ICT third-party providers.
Formally, DORA has been in force since January 16, 2023. However, the crucial date for you is January 17, 2025, when the application obligation begins. From this date, supervisors and auditors will specifically ask how you manage ICT risks, report incidents, test your digital resilience, and manage your ICT third parties.
DORA does not view digital resilience as purely a technical task. It combines:
This creates what has long been missing in the European financial sector: a coherent standard instead of a patchwork of national regulations. For technically responsible executives, this is an opportunity to finally place security, resilience, and regulatory compliance on a unified foundation.
With NIS2, the EU has established a horizontal minimum standard for cybersecurity in critical and important sectors—from healthcare to energy to digital infrastructures. DORA is the lex specialis for the financial sector.
Key points in the relationship between DORA and NIS2:
Scope
NIS2 addresses a wide range of critical sectors. DORA focuses exclusively on financial entities and their ICT third-party providers.
Level of Detail
NIS2 defines general requirements for risk management, incident reporting, and business continuity. DORA goes significantly deeper: specific requirements for financial supervision, reporting channels, digital resilience testing (including TLPT), and third-party risk.
Application in Case of Conflict
For financial institutions: Where DORA defines specific requirements, DORA takes precedence over NIS2. However, NIS2 remains relevant as a background framework—especially where DORA deliberately remains open or refers to other standards.
In practice, this means: If your institution has already started NIS2 preparations, many components (e.g., incident processes, BCP, basic ICT security measures) are reusable. DORA complements and sharpens these components for the financial context, especially in testing and third-party areas.
DORA structures the requirements into five central pillars. For technically responsible individuals, it is worthwhile to plan and report precisely within these pillars.
DORA makes it clear: Responsibility lies with the board. ICT risk management must:
From a technical perspective, this means that topics such as asset transparency, network segmentation, access management, backup strategy, and monitoring are no longer just “best practice” but regulatory obligations—including traceable documentation.
Previously, reporting obligations for ICT incidents were fragmented: data protection, supervision, national CERTs—often with different thresholds and formats. DORA harmonizes for the financial sector:
For your organization, this means: A consistent incident management process that brings together technical, operational, and regulatory requirements becomes mandatory. The interfaces between SOC, IT, compliance, and legal must be defined and practiced.
DORA requires a graduated testing program that matches the size and criticality of your institution. This includes:
The systematic nature is crucial: Tests must be planned, documented, evaluated, and linked to clear actions and re-tests. “Once-a-year penetration test” will no longer meet the requirements.
Outsourcing does not mitigate responsibility—DORA explicitly emphasizes this. Core elements are:
This makes ICT third-party management a central component of ICT governance, not just a procurement issue.
A novelty is the direct EU oversight of ICT third-party providers classified as “critical,” such as large cloud or infrastructure service providers:
For financial institutions, this strengthens their position: Requirements for transparency, auditability, and exit capability can no longer be dismissed as “non-negotiable.”
For large banks, market infrastructures, and other systemically important actors, Threat-Led Penetration Testing (TLPT) is a central component of DORA. Many institutions face a new quality of testing here.
TLPT is based on the TIBER-EU methodology of the ECB and aims to simulate real attackers as closely as possible. Core elements:
This shifts the focus from purely technical vulnerability scans to holistic resilience tests: Can attackers move laterally? Are they detected? How quickly is the response? Do the response processes work?
A practical TLPT typically follows several phases:
Scoping and Governance
Determining the scope, critical functions, involved stakeholders, and governance structure. Supervision is also involved early on.
Threat Intelligence
Gathering and analyzing current threat information for your specific profile: business model, technology stack, geographical presence.
Test Planning and Scenario Design
Deriving specific attack paths and scenarios, aligned with risk appetite and regulatory requirements.
Conducting the Red-Team Test
Carrying out the simulated attacks over a defined period, closely accompanied by a “White Team” circle ensuring security and abort criteria.
Evaluation, Remediation, and Re-Test
Detailed reports, technical and procedural measures, prioritization by risk—and, if necessary, re-tests to verify effectiveness.
For cloud-native environments, this means: Container orchestration, service meshes, secrets management, and CI/CD pipelines become part of the test object. Without a clear understanding of architecture and assets, TLPTs become unnecessarily complex and risky.
The management of ICT third parties is one of the areas most affected by DORA. A mere contract and procurement dossier is no longer sufficient.
DORA requires a central register of all ICT services, which must include at least:
This register forms the basis for:
Technically responsible executives should ensure that this register is closely linked to existing CMDBs, architecture overviews, and cloud accounts, rather than building an isolated Excel landscape.
Due diligence does not end with the signing of the contract. A continuous process is required:
TL;DR Effective alerting is more than just a few emails at 80% CPU: It requires clean metrics, clear …
TL;DR The EU has established a coherent framework with GDPR, NIS‑2, DORA, CRA, Data Act, and the …
TL;DR Starting point is a multi-tenant Django SaaS application, which is taken from the first line …