<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Digital compliance - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/digital-compliance/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/digital-compliance/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 14 May 2025 12:19:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Digital compliance - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/digital-compliance/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Evolution of the HDS Framework &#8211; Towards Enhanced Security and Sovereignty </title>
		<link>https://www.riskinsight-wavestone.com/en/2025/05/evolution-of-the-hds-framework-towards-enhanced-security-and-sovereignty/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/05/evolution-of-the-hds-framework-towards-enhanced-security-and-sovereignty/#respond</comments>
		
		<dc:creator><![CDATA[Perrine Viard]]></dc:creator>
		<pubDate>Wed, 14 May 2025 12:19:40 +0000</pubDate>
				<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Digital compliance]]></category>
		<category><![CDATA[HDS]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[règlementation]]></category>
		<category><![CDATA[regulation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25983</guid>

					<description><![CDATA[<p>The Health Data Host (HDS) certification is a French regulatory framework that governs the hosting of personal health data. Established by Decree No. 2018-137 of February 26, 2018, it is mandatory for any entity hosting health data to comply with...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/05/evolution-of-the-hds-framework-towards-enhanced-security-and-sovereignty/">Evolution of the HDS Framework &#8211; Towards Enhanced Security and Sovereignty </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">The Health Data Host (HDS) certification is a French regulatory framework that governs the hosting of personal health data. Established by Decree No. 2018-137 of February 26, 2018, it is mandatory for any entity hosting health data </span><span data-contrast="none">to comply with the certification</span><span data-contrast="auto">. It aims to ensure a high level of protection for this particularly sensitive data by imposing strict requirements regarding security, availability, and confidentiality.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In the context where the digital transformation of the healthcare sector is accelerating, the protection of health data is an increasingly critical issue. In 2021, our article &#8220;Health Data Host Certification: Two Years Already!&#8221; by Laurent Guille and Alexandra Cuillerdier, provided a promising initial assessment of the HDS framework. Faced with growing concerns related to data sovereignty and cybersecurity, a redesign was necessary. This evolution towards HDS v2, which came into effect in 2024, marks a turning point in the approach to health data hosting in France, strengthening the protection and sovereignty of health data in an ever-evolving digital context.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">HDS v1: a first structuring but perfectible framework</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Since its introduction in 2018, the HDS framework has helped structure and professionalize the health data hosting sector. However, this first version of the framework had certain limitations. In particular, the initial framework presented gray areas regarding data sovereignty, especially concerning the location and control of health data. Additionally, the rapid evolution of cyber threats and technologies required a substantial update of security requirements to maintain a level of protection adapted to current risks.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">Overhaul of the Technical and Security Framework</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">On the technical side, the new requirements of the ISO 27001:2023 standard are adopted within the new version of HDS. This update integrates security risk management adapted to new digital contexts, as well as new controls related to cybersecurity. The other normative references are rationalized. References to ISO 20000-1, ISO27017, and ISO27018 standards disappear in the HDS v2 framework, while 31 specific requirements are directly integrated into the framework, which also relies on the ISO/IEC-17021-1:2015 standard to govern conformity assessment. This new version also clarifies the articulation with the requirements of the SecNumCloud framework to facilitate obtaining HDS certification for hosts already qualified with SecNumCloud.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">A Major Strengthening of Digital Sovereignty</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">One of the most significant developments in HDS v2 concerns the strengthening of digital sovereignty. The new framework now requires that the physical hosting of health data be carried out exclusively within the territory of the European Economic Area (EEA). This requirement reinforces guarantees in terms of data protection and contributes to the emergence of an ecosystem of European players in the field of digital health.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This is complemented by enhanced transparency, which also becomes a central issue of the framework, with two major obligations:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Hosts must now publish on their website a map of any data transfers to countries outside the EEA, thus allowing data subjects and healthcare actors to have clear visibility on the journey of their data;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">In the case of remote access to data from a third country or submission to non-European legislation that does not ensure an adequate level of protection within the meaning of Article 45 of the GDPR, the host must inform its clients in the contract. In particular, it must specify the associated risks and detail the technical and legal measures implemented to limit them.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">Strengthening of Contractual Requirements</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Subcontracting supervision receives particular attention in HDS v2. The associated measures are reinforced, and hosts must now:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Precisely detail the certified hosting activities in their contracts;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Maintain complete transparency regarding their subcontracting chain;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Ensure that their subcontractors comply with the same requirements for data security and location;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Implement mechanisms to control and audit their subcontractors.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">These new contractual obligations aim to ensure better control of the value chain and greater transparency for data controllers.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">Practical Consequences for the Ecosystem</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">For health data hosts, these evolutions of the framework imply an adaptation of their infrastructures to guarantee the location of data within the EEA. They also require an upgrade of their security measures to meet the requirements of the 2023 version of the ISO 27001 standard and the review of contracts, both with their clients and with their subcontractors.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">Perspectives and Implementation</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">This new modernized version of the HDS framework addresses the growing challenges of security, sovereignty, and transparency. Its implementation is spread over approximately two years, with immediate application for new certifications from November 16, 2024, and a transition period until May 16, 2026, for hosts already certified under HDS v1.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In the longer term, several questions arise regarding the evolution of the framework. At a time when the NIS 2 directive already includes healthcare providers and the pharmaceutical industry among its essential sectors of activity, while classifying the manufacturing of medical devices and in vitro diagnostics in its important sectors, the emergence of HDS 2 raises a question: could European cooperation lead to an even more integrated framework for health data protection and harmonize practices across the continent?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/05/evolution-of-the-hds-framework-towards-enhanced-security-and-sovereignty/">Evolution of the HDS Framework &#8211; Towards Enhanced Security and Sovereignty </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/05/evolution-of-the-hds-framework-towards-enhanced-security-and-sovereignty/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Independent expertise of electronic voting systems</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/05/independent-expertise-of-electronic-voting-systems/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/05/independent-expertise-of-electronic-voting-systems/#respond</comments>
		
		<dc:creator><![CDATA[Bilal Benseddiq]]></dc:creator>
		<pubDate>Wed, 17 May 2023 15:07:10 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Digital compliance]]></category>
		<category><![CDATA[E-vote]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20474</guid>

					<description><![CDATA[<p>Introduction Definition of electronic voting Electronic voting is a dematerialised, self-counting voting system in which voters use electronic devices to record their votes. The system can be used remotely via internet voting, or in person where voters can visit polling...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/05/independent-expertise-of-electronic-voting-systems/">Independent expertise of electronic voting systems</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: justify;">Introduction</h1>
<h2 style="text-align: justify;">Definition of electronic voting</h2>
<p style="text-align: justify;">Electronic voting is a <strong>dematerialised</strong>, <strong>self-counting </strong>voting system in which voters use electronic devices to record their votes.</p>
<p style="text-align: justify;">The system can be <strong>used remotely</strong> via <strong>internet voting</strong>, or in person where voters can visit polling stations equipped with voting machines.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">History of electronic voting in France</h2>
<h3 style="text-align: justify;">The first traces date back to&#8230;1969!</h3>
<p style="text-align: justify;">The French Minister of the Interior, Raymond Marcellin, had the use of 100% <strong>mechanical </strong>voting machines authorised<a href="#_edn1" name="_ednref1">[i]</a>. Due to major breakdown and the failure to reduce fraud, these machines fell into disuse, but the amendment made to the electoral code remained.</p>
<h3 style="text-align: justify;">Use in professional elections</h3>
<p style="text-align: justify;">In the <strong>2018 </strong>French public sector professional elections,<strong> 5.15 million public employees </strong>were asked to vote using an electronic voting solution.</p>
<p style="text-align: justify;">In <strong>2022</strong>, <strong>5.6 million public employees </strong>in the three branches of the civil service are called upon to vote for their union representatives in the representative bodies. The ballot took place from the 1<sup>st</sup> to the 8<sup>th</sup> of December 2022. This was precedent in several respects, including the generalisation of electronic voting in the civil service and the establishment of new bodies for social dialogue<a href="#_edn2" name="_ednref2">[ii]</a>.</p>
<h3 style="text-align: justify;">Experiments underway for voting by French citizens abroad</h3>
<p style="text-align: justify;">For the 2017 elections, the Ministry of Foreign Affairs and International Development had developed an <strong>online voting </strong>platform <strong>for French citizens living abroad to participate in the legislative elections</strong>.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Types of voting in French organisations</h2>
<p style="text-align: justify;">Since 2018 in the French <strong>private sector</strong>, it became compulsory for companies with more than 11 employees to hold elections for members of the staff delegation within the <strong>social and economic committees </strong>(<strong>CSE</strong>), by secret ballot<a href="#_edn3" name="_ednref3"></a></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In all cases, the employer should inform the workforce <strong>every four years </strong>(<em>unless the industry agreement provides for a shorter period of </em>between two and four years) by posting notices of the elections.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">How electronic voting works in the context of professional elections</h2>
<p> </p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-20476 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN1.png" alt="" width="945" height="543" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN1.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN1-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN1-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN1-768x441.png 768w" sizes="(max-width: 945px) 100vw, 945px" /></p>
<p> </p>
<p style="text-align: justify;">Prior to the vote, the employer must <strong>call the professional elections</strong> specifying the date, place, and voting method (paper, electronic, or hybrid).</p>
<p style="text-align: justify;">The organisation of elections is generally based on one or more <strong>centralised polling stations </strong>and regional polling stations, depending on the volume of votes and voters. The polling station members are <strong>trained</strong>, the solution is <strong>assessed, </strong>and <strong>test elections </strong>are held.</p>
<p style="text-align: justify;">Once the solution has been <strong>validated </strong>it goes into <strong>production</strong>, and<strong> the election can begin</strong>:</p>
<ol style="text-align: justify;">
<li>The <strong>electoral lists </strong>are drawn up and unions or employees can check and report any errors or omissions.</li>
<li>Candidates can <strong>campaign </strong>to the voters and present their program.</li>
<li>On the day of the <strong>opening of the vote</strong>, the solution is <strong>sealed </strong>using private encryption keys, where 1/3 is held by the corporate administration and 2/3 by the trade unions.</li>
<li>Voters then<strong> vote according to the </strong>designated <strong>timetable</strong>, the polling stations monitor the counting of votes and assist the voters, the supervision unit monitors the process and manages any incidents, and the provider company is mobilised if necessary.</li>
<li><strong>On the closing </strong>day of <strong>the elections</strong>, the integrity of the ballot box (urn) is checked, and the unsealing is carried out by the administration and the trade unions.</li>
<li>The <strong>counting of </strong>the votes is then carried out under the control of the centralising polling stations.</li>
<li>The <strong>results of </strong>the elections should be communicated to the voters, publicly displayed, and sent to the labour inspector (<em>“Inspecteur du travail”</em>).</li>
<li>The ballot box is <strong>sealed </strong>again, and the entire solution <em>(including copies of source and executable programs, voting materials, vote count, results and backup files and files that keep track of interventions on the system</em>) is<strong> archived under seal</strong> for a minimum of 2 years.</li>
<li>In the event of a <strong>dispute</strong>, an appeal may be lodged with the labour inspector or the district court.</li>
</ol>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">What are the opportunities and risks in electronic voting?</h1>
<h2 style="text-align: justify;">Opportunities</h2>
<h3 style="text-align: justify;">Ease of implementation of the ballot</h3>
<p style="text-align: justify;">Electronic voting is <strong>generally more efficient to implement than paper voting</strong>, requiring less manual work for preparation (printing of propaganda posters, logistics, etc.), counting and reporting of results. This leads to a reduction in costs and an improvement in the efficiency of the electoral process.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Reducing the carbon footprint</h3>
<p style="text-align: justify;">Electronic voting greatly reduces the dependence on paper printing for electoral lists, propaganda documents, and especially ballot papers. It also drastically reduces travel depending on the geographical organisation of the company.</p>
<p style="text-align: justify;">According to a study by Kercia<a href="#_edn4" name="_ednref4">[iv]</a>, the carbon footprint of a postal vote is more than twice that of an electronic vote.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Maximising participation and elected bodies with a broader electoral base</h3>
<p style="text-align: justify;">Electronic voting allows for greater <strong>voter participation.</strong></p>
<p style="text-align: justify;">A study conducted in Switzerland in 2011 showed that turnout <strong>increased by 2.2%</strong><a href="#_edn5" name="_ednref5">[v]</a> in cantons that implemented e-voting compared to those that did not use this method. Similarly, a study in Estonia in 2014 found that the use of e-voting <strong>increased voter turnout by 3-4%</strong><a href="#_edn6" name="_ednref6">[vi]</a><strong>.</strong></p>
<p style="text-align: justify;">Voters can vote remotely <strong>without having to physically travel </strong>to the polling station. This can increase voter turnout, especially in the context of the widespread use of remote work post-COVID-19.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Agreements with a stronger democratic basis</h3>
<p style="text-align: justify;">E-voting can help to <strong>strengthen social dialogue </strong>due to wider outreach and greater accessibility for voter participation. The results of elections are more convincing by increasing the participation in the polls.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Risks</h2>
<h3 style="text-align: justify;">Alteration of results</h3>
<p style="text-align: justify;">Electronic voting systems can be vulnerable to attacks such as the <strong>usurpation </strong>of voter <strong>accounts</strong>, <strong>multiple votes by the same voter in the same election</strong>, or the <strong>compromise of ballots</strong>.</p>
<h3 style="text-align: justify;">Protection of personal data</h3>
<p style="text-align: justify;">The implementation of e-voting platforms should consider the <strong>risk of excessive collection of sensitive personal data </strong>such as voters&#8217; political opinions.</p>
<p style="text-align: justify;">Voters&#8217; personal information may also be stored on vulnerable servers, exposing this data to the <strong>risk of compromised voting secrecy or data leakage</strong>.</p>
<h3 style="text-align: justify;">Transparency of voting operations</h3>
<p style="text-align: justify;">It can be difficult for each stakeholder to understand how votes are recorded and how the results are tabulated, leading to <strong>mistrust of the solution and the election</strong> <strong>results.</strong></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">These risks must be considered and mitigated in order to drastically reduce the probability of occurrence and/or their impact on the smooth running of the elections.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">How to comply with the regulations?</h1>
<h2 style="text-align: justify;">CNIL deliberation 2019-053 of 25 April 2019</h2>
<p> </p>
<p><img decoding="async" class="aligncenter wp-image-20478 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN2.png" alt="" width="601" height="357" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN2.png 601w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN2-322x191.png 322w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN2-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN2-120x70.png 120w" sizes="(max-width: 601px) 100vw, 601px" /></p>
<p> </p>
<p style="text-align: justify;">The <strong>CNIL</strong> (<em>National Commission for Information Technology and Civil Liberties</em>)<strong> deliberation n°2019-053 of 25 April 2019</strong><a href="#_edn7" name="_ednref7">[vii]</a> simplifies and clarifies the texts of 2010 and 2018. The process is as follows:</p>
<ol style="text-align: justify;">
<li>Choice of <strong>security level </strong>(1, 2 or 3) according to a questionnaire provided by the CNIL<a href="#_edn8" name="_ednref8">[viii]</a>.</li>
<li>Implementation of a <strong>test voting platform </strong>(iso-production) prior to the elections, with support from the independent expert in the event of questions relating to the conformity of the technical and organisational choices to be made.</li>
<li><strong>Independent assessment of the </strong>solution to evaluate the compliance of the solution with the security objectives: depending on the defined risk level, the security objectives are more or less strict. These are cumulative, e.g., if a risk level of 3 is defined, the objectives of levels 1, 2 and 3 must be met.</li>
</ol>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Decree 2011-595 (public sector)</h2>
<p style="text-align: justify;">A regulation has been added to the CNIL deliberation 2019-053 for the <strong>public service </strong>and certain parastatal sector companies<a href="#_edn9" name="_ednref9">[ix]</a> :</p>
<p> </p>
<p><img decoding="async" class="aligncenter wp-image-20480 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN3.png" alt="" width="601" height="415" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN3.png 601w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN3-277x191.png 277w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/EN3-56x39.png 56w" sizes="(max-width: 601px) 100vw, 601px" /></p>
<p> </p>
<p style="text-align: justify;">In addition to the CNIL security objectives, <strong>18 articles </strong>composing this decree must be respected and checked by the independent expert. The control points include for example:</p>
<ul style="text-align: justify;">
<li><em>“At least 2/3 of the keys are allocated to the list delegates and at least 1 key is allocated to the president of the polling station or his representative.”</em></li>
<li><em>“The sealing is carried out by the combination of at least 2 encryption keys, including the one of the president of the polling station or his representative and the one of at least one list delegate” </em></li>
<li><em>“A process ensures that the voters’ list is only modified by the addition of a ballot electronical paper, which is issued by an authenticated voter casting the vote.”</em></li>
<li><em>&#8220;Each voter shall be provided at least fifteen days before the first day of the election with a means of authentication enabling him or her to participate in the election &#8211; the confidentiality of this means of authentication shall be guaranteed”</em></li>
<li><em>&#8220;A process ensures that the electronic ballot box (urn) is only modified by the vote of an authenticated voter”</em></li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Independent expertise</h2>
<h3 style="text-align: justify;">Obligation</h3>
<p style="text-align: center;"><em>&#8220;<strong>Any data controller </strong>implementing an electronic voting system, in particular via the Internet, <strong>must have its solution assessed by an independent expert</strong>, whether the voting solution is managed internally or provided by a service provider.&#8221; &#8211; CNIL Deliberation 2019-053</em></p>
<h3 style="text-align: justify;">Modalities</h3>
<h4 style="text-align: justify;">When?</h4>
<p style="text-align: justify;">This expertise must be carried out:</p>
<ul style="text-align: justify;">
<li><strong>Prior to the implementation of </strong>the electronic voting system</li>
<li>In the event of a design <strong>change to </strong>the existing electronic voting system</li>
<li>For <strong>every new election </strong>using the electronic voting system, even if it has already been audited</li>
</ul>
<h4 style="text-align: justify;">By whom?</h4>
<p style="text-align: justify;">By an independent expert, who must:</p>
<ul style="text-align: justify;">
<li>Be an IT (Information Technology) <strong>specialist in security</strong></li>
<li><strong>Not having an interest in the company </strong>that created the voting solution or in the organisation responsible for processing</li>
<li>If possible,<strong> have experience </strong>in analysing voting systems, having assessed the voting systems of at least two different providers.</li>
</ul>
<h4 style="text-align: justify;">Why?</h4>
<p style="text-align: justify;">To ensure <strong>compliance with the fundamental principles </strong>governing electoral operations:</p>
<ul style="text-align: justify;">
<li>The secrecy of the ballot</li>
<li>The personal and free nature of voting</li>
<li>The sincerity of the electoral operations</li>
<li>Effective monitoring of the vote by the electoral commission</li>
<li>A posteriori control by the election judge</li>
</ul>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Typical working approach</h3>
<p style="text-align: justify;">Our vision of independent expertise is illustrated by the main steps described in this chapter.</p>
<h4 style="text-align: justify;">Initialisation and framing</h4>
<p style="text-align: justify;">To initiate the mission, a kick-off meeting is organised with the project contacts.</p>
<p style="text-align: justify;">The purpose of this meeting is to introduce the <strong>teams</strong>, define the <strong>milestones</strong> and project <strong>schedule</strong>, specify the service <strong>monitoring </strong>procedures, the <strong>communication </strong>procedures between the parties (encryption of exchanges, etc.), collect the existing <strong>documentation</strong>, and set up the <strong>committee procedure</strong>.</p>
<h4 style="text-align: justify;">Audit of the solution and expert support</h4>
<p style="text-align: justify;">This central phase of the assessment is based on a theoretical and practical analysis:</p>
<ul style="text-align: justify;">
<li><strong>Control of project documentation and </strong>specifications
<ul>
<li>From the &#8220;paper&#8221; phase onwards, it is necessary to ensure that all the points of compliance are present and in line with the regulations in force: <em>technologies used and updates of the latter, hosting of the solution, physical security, architecture and high availability, partitioning between ballots, sealing and encryption techniques, means of compiling, correlating, communicating and deleting electoral lists, voter authentication scheme, etc.</em></li>
</ul>
</li>
<li><strong>Support in expertise and safety advice</strong>
<ul>
<li>This involves providing ad hoc expertise on subjects relating to the legal and regulatory framework during the design and implementation phase of the solution and processes (g., <em>choice of authentication factors, process for storing sealing keys, etc</em><em>.</em>).</li>
</ul>
</li>
<li><strong>Technical audit of the solution</strong>
<ul>
<li><strong>Architecture review </strong>to check the compliance of physical and logical partitioning, security of flows, hosting, high availability, etc.</li>
<li><strong>Audit of the organisation and processes </strong>such as sealing, authentication communication, archiving, etc.</li>
<li><strong>Technical configuration review of the key servers of </strong>the solution</li>
<li>Audit of the <strong>source code </strong>and <strong>encryption mechanisms</strong> of the solution based, among other security frameworks, on the RGS<a href="#_edn10" name="_ednref10">[x]</a> (<em>Référentiel Général de Sécurité</em>)</li>
<li><strong>Black-box and grey-box penetration testing </strong>of voting portals and the supervision back-office</li>
</ul>
</li>
</ul>
<h4 style="text-align: justify;">Observation of test elections</h4>
<p style="text-align: justify;">This phase aims to simulate an election to check the correct application of the protocol and the processes verified beforehand on field:</p>
<ul style="text-align: justify;">
<li>Validation of the compliance<strong> monitoring </strong>process
<ul>
<li>In this step, the aim is to verify that the technique used for the verification of the non-alteration of the system (fingerprinting) works.</li>
</ul>
</li>
<li><strong>Checks on the solution on field</strong>
<ul>
<li>It is a matter of ensuring, in vivo, that all the points mentioned in terms of security and regulations are in place, for example through the analysis of application and system logs, or &#8220;random&#8221; checks: presence of temporary files containing sensitive information, capacity to collect data, etc.</li>
</ul>
</li>
<li><strong>Expertise support during the voting process and assistance in adapting procedures in case of unforeseen events</strong></li>
</ul>
<p style="text-align: justify;"> </p>
<h4 style="text-align: justify;">Accompaniment during the actual election</h4>
<p style="text-align: justify;">The same checks as during the test elections are carried out, and specifically:</p>
<ul style="text-align: justify;">
<li>System <strong>integrity check</strong>: Fingerprinting of essential system components (libraries, code, encryption libraries, etc.) and comparison of the fingerprints with those obtained beforehand.</li>
<li>Compliance with the <strong>regulatory framework</strong>: sealing process, access, and use of encryption/decryption keys, counting process, etc.</li>
</ul>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">What are the pitfalls and how can they be avoided?</h1>
<h2 style="text-align: justify;">Limited access to systems</h2>
<p style="text-align: justify;">The <strong>high expertise market </strong>context of voting solutions may make vendors <strong>reluctant to share confidential information </strong>about their technology, such as <strong>source code</strong>, in the interests of <strong>industrial secrecy, which </strong>may limit the ability of experts to assess system compliance.</p>
<p style="text-align: justify;">In order to avoid this pitfall, it is essential to implement <strong>regular communication </strong>and <strong>full transparency </strong>of the actions of the independent expert. <strong>Guarantees </strong>must be provided for the protection of the confidentiality of the data collected and processed via <strong>processes and an IS certified by SMSI or II 901</strong><a href="#_edn11" name="_ednref11">[xi]</a> (French norm for “<em>Restricted Distribution”</em> classified information).</p>
<p style="text-align: justify;">Furthermore, we recommend that independent experts are <strong>flexible in their organisation, for </strong>example by agreeing to consult the source code exclusively on the provider&#8217;s premises.</p>
<p style="text-align: justify;">Finally, it should be recalled that CNIL deliberation 2019-053 requires the service provider to make available &#8220;the source code corresponding to the version of the software actually implemented &#8221; to the independent expert.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Distrust of trade unions and voters</h2>
<p style="text-align: justify;">Trade unions and voters can legitimately question <strong>the independence of </strong>the expert and the <strong>guarantees provided by the expertise</strong>, leading to <strong>mistrust of </strong>the electronic voting solution.</p>
<p style="text-align: justify;">These fears are well-founded and must be <strong>addressed </strong>through <strong>transparency and the </strong>provision of <strong>factual </strong>and <strong>verifiable evidence </strong>for each observation reported during the assessment.</p>
<p style="text-align: justify;">Furthermore, no findings should be ambiguous, conditional, or omitted.</p>
<p style="text-align: justify;">Finally, it is essential to present the <strong>limits </strong>of the expertise exercise, and the logical impossibility of providing a 100% guarantee that the system cannot be attacked.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Interpretation of the regulations</h2>
<p style="text-align: justify;">The available <strong>regulations </strong>are not always <strong>clear </strong>and explicit, including</p>
<ul style="text-align: justify;">
<li><strong>Non-standard architectures </strong>are not subject to specific rules
<ul>
<li><em>Ex: An architecture based on an IS straddling the SaaS (Software as a Service) solution publisher and the employer&#8217;s IS</em></li>
</ul>
</li>
<li>Some <strong>terms </strong>may be <strong>ambiguous</strong>
<ul>
<li><em>g.: &#8220;A voter&#8217;s vote must be an atomic operation&#8221; &#8211; atomicity being a functional rather than a technical notion, e.g., Internet communication protocols do not allow the entire ballot to be contained in a single network packet</em></li>
</ul>
</li>
</ul>
<p style="text-align: justify;">The application of <strong>security standards and frameworks </strong>(such as RGS), direct consultation with the <strong>CNIL</strong>, and the implementation of a <strong>solution that responds to the risk </strong>in substance are all ways of remedying this pitfall.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Conclusion and recommendations</h1>
<p style="text-align: justify;">To make <strong>the most of the independent expertise </strong>and to <strong>factualise </strong>it, we recommend <strong>combining the regulatory compliance approach with a risk-oriented approach</strong>, based on the technical audit (penetration tests, configuration reviews, etc.) in a logic of practical and <strong>pragmatic securing </strong>of the solution <strong>within the regulatory framework</strong>.</p>
<p style="text-align: justify;">This exercise can only be carried out effectively and efficiently if <strong>all </strong>project <strong>stakeholders, </strong>including the publisher and trade unions, are <strong>involved </strong>and <strong>made aware of the project </strong>as early as the design phase.</p>
<p style="text-align: justify;">Finally, it is necessary to bear in mind that e-voting is a constantly <strong>evolving technology</strong>. It is likely that new methods and technologies will emerge in the future, leading to an <strong>evolution of the regulations</strong>. Therefore, <strong>technical and regulatory monitoring </strong>is and will remain an essential subject for election organisers, publishers, and independent expertise companies alike.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em>For any information or quotation </em><em>request</em><em> on the subject of the independent expertise of electronic voting systems, we invite you to contact us via the following form: </em><a href="https://www.wavestone.com/fr/contact/">https://www.wavestone.com/fr/contact<em>/</em></a></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><strong>We wish you every success in organising your professional elections!</strong></p>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;"><a href="#_ednref1" name="_edn1">[i]</a><a href="https://www.legifrance.gouv.fr/jorf/id/JORFTEXT000000511691/"> https://www.legifrance.gouv.fr/jorf/id/JORFTEXT000000511691/ </a></p>
<p style="text-align: justify;"><a href="#_ednref2" name="_edn2">[ii]</a><a href="https://www.economie.gouv.fr/elections-professionnelles-2022-quelques-minutes-pour-quatre-annees">h ttps://www.economie.gouv.fr/elections-professionnelles-2022-quelques-minutes-pour-quatre-annees </a></p>
<p style="text-align: justify;"><a href="#_ednref3" name="_edn3">[iii]</a><a href="https://fr.wikipedia.org/wiki/Comit%C3%A9_social_et_%C3%A9conomique"> https://fr.wikipedia.org/wiki/Comit%C3%A9_social_et_%C3%A9conomique </a></p>
<p style="text-align: justify;"><a href="#_ednref4" name="_edn4">[iv]</a><a href="https://www.kercia.com/vote-electronique">h ttps://www.kercia.com/vote-electronique </a></p>
<p style="text-align: justify;"><a href="#_ednref5" name="_edn5">[v]</a><a href="https://www.admin.ch/gov/fr/accueil/documentation/communiques.msg-id-37639.html">h ttps://www.admin.ch/gov/fr/accueil/documentation/communiques.msg-id-37639.html </a></p>
<p style="text-align: justify;"><a href="#_ednref6" name="_edn6">[vi]</a><a href="https://www.smartmatic.com/fr/actualites/article/lestonie-atteint-des-taux-records-de-vote-par-internet-grace-a-une-nouvelle-technologie/">h ttps://www.smartmatic.com/fr/actualites/article/lestonie-atteint-des-taux-records-de-vote-par-internet-grace-a-une-nouvelle-technologie/ </a></p>
<p style="text-align: justify;"><a href="#_ednref7" name="_edn7">[vii]</a><a href="https://www.legifrance.gouv.fr/jorf/id/JORFTEXT000038661239"> https://www.legifrance.gouv.fr/jorf/id/JORFTEXT000038661239 </a></p>
<p style="text-align: justify;"><a href="#_ednref8" name="_edn8">[viii]</a><a href="https://www.cnil.fr/fr/securite-des-systemes-de-vote-par-internet-la-cnil-actualise-sa-recommandation-de-2010"> https://www.cnil.fr/fr/securite-des-systemes-de-vote-par-internet-la-cnil-actualise-sa-recommandation-de-2010 </a></p>
<p style="text-align: justify;"><a href="#_ednref9" name="_edn9">[ix]</a><a href="https://www.legifrance.gouv.fr/loda/id/JORFTEXT000024079803/"> https://www.legifrance.gouv.fr/loda/id/JORFTEXT000024079803/ </a></p>
<p style="text-align: justify;"><a href="#_ednref10" name="_edn10">[x]</a><a href="https://www.ssi.gouv.fr/entreprise/reglementation/confiance-numerique/le-referentiel-general-de-securite-rgs/"> https://www.ssi.gouv.fr/entreprise/reglementation/confiance-numerique/le-referentiel-general-de-securite-rgs/ </a></p>
<p style="text-align: justify;"><a href="#_ednref11" name="_edn11">[xi]</a><a href="https://www.ssi.gouv.fr/guide/recommandations-pour-les-architectures-des-systemes-dinformation-sensibles-ou-diffusion-restreinte/"> https://www.ssi.gouv.fr/guide/recommandations-pour-les-architectures-des-systemes-dinformation-sensibles-ou-diffusion-restreinte/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/05/independent-expertise-of-electronic-voting-systems/">Independent expertise of electronic voting systems</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/05/independent-expertise-of-electronic-voting-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Decrypting DORA: what does it mean for Resilience of financial organisations?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/12/decrypting-dora-what-does-it-mean-for-resilience-of-financial-organisations/</link>
		
		<dc:creator><![CDATA[m@THIEU]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 14:51:32 +0000</pubDate>
				<category><![CDATA[Cyber for Financial Services]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[Digital compliance]]></category>
		<category><![CDATA[DORA]]></category>
		<category><![CDATA[Financial regulation]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Operational Resilience]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14837</guid>

					<description><![CDATA[<p>With the release of the Digital Operational Resilience Act (DORA), the European Union is taking a strong stand to strengthen the financial sector’s resilience to ICT-related major incidents. With prescriptive requirements on both financial entities and critical ICT services provider, and an aggressive timeline...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/decrypting-dora-what-does-it-mean-for-resilience-of-financial-organisations/">Decrypting DORA: what does it mean for Resilience of financial organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><span data-contrast="auto">With the release of the Digital Operational Resilience Act (DORA), the European Union is taking a strong stan</span><span data-contrast="auto">d</span><span data-contrast="auto"> to strengthen</span><span data-contrast="auto"> the financial sector’s</span><span data-contrast="auto"> resilience to ICT</span><span data-contrast="auto">-related</span><span data-contrast="auto"> major incidents. With prescriptive requirements on both financial entities and critical ICT services provider, and an aggressive timeline for compliance (estimated at the end of 2022), organisations must start planning now. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">Why Digital Operational Resilience Act (DORA)?</h2>
<p style="text-align: justify;"><span data-contrast="auto">DORA is p</span><span data-contrast="auto">art of </span><span data-contrast="auto">an </span><span data-contrast="auto">EU-wide “Digital Finance Package”, aimed at </span><span data-contrast="auto">making sure the financial sector can </span><span data-contrast="auto">levera</span><span data-contrast="auto">ge</span><span data-contrast="auto"> opportunities brought by technology</span><span data-contrast="auto"> and innovation</span><span data-contrast="auto"> whilst mitigating </span><span data-contrast="auto">the </span><span data-contrast="auto">new risks</span><span data-contrast="auto"> associated.</span><span data-contrast="auto"> </span><span data-contrast="auto">This package involves regulation on crypto assets, blockchain technology, and digital operational resilience. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">With </span><span data-contrast="auto">the Digital Operational Resilience Act</span><span data-contrast="auto">, the EU aims to make sure financial organisations mitigate the risks arising from increasing reliance on ICT systems and third parties for critical operations</span><span data-contrast="auto">. Organisations</span><span data-contrast="auto"> need to be able </span><span data-contrast="auto">to </span><span data-contrast="auto">“</span><span data-contrast="auto">withstand, respond and recover</span><span data-contrast="auto">”</span><span data-contrast="auto"> from </span><span data-contrast="auto">the </span><span data-contrast="auto">impacts of ICT incidents</span><span data-contrast="auto">, thereby continuing to deliver </span><span data-contrast="auto">critical and important functions </span><span data-contrast="auto">and minimising</span><span data-contrast="auto"> disruption for customers and for the financial system.</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">This means establishing </span><span data-contrast="auto">robust </span><span data-contrast="auto">measures and controls on systems</span><span data-contrast="auto">, </span><span data-contrast="auto">tools</span><span data-contrast="auto"> and third parties,</span><span data-contrast="auto"> </span><span data-contrast="auto">having the right continuity plans in place, and testing their effectiveness. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This global, large scope regulation </span><span data-contrast="auto">is coming in</span><span data-contrast="auto"> to rationalise an increasingly fragmented regulatory landscape on the topic</span><span data-contrast="auto">, with a number of </span><span data-contrast="auto">local regulatory initiatives </span><span data-contrast="auto">in member states </span><span data-contrast="auto">and smaller scope EU guidelines </span><span data-contrast="auto">on related topics (e.g. testing requirements, </span><span data-contrast="auto">management of ICT third party dependencies</span><span data-contrast="auto">, cyber resilience</span><span data-contrast="auto">)</span><span data-contrast="auto">.</span><span data-contrast="auto"> Setting up a global regulatory framework will </span><span data-contrast="auto">ensure</span><span data-contrast="auto"> there are no overlaps or gaps in regulation and </span><span data-contrast="auto">maintain good conditions for</span><span data-contrast="auto"> </span><span data-contrast="auto">competition in the single market.</span><span data-contrast="auto"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">DORA </span><span data-contrast="auto">also </span><span data-contrast="auto">fits into </span><span data-contrast="auto">a </span><a href="https://uk.wavestone.com/en/insight/navigating-through-the-resilience-frameworks-how-to-identify-the-right-frameworks-to-use/"><span data-contrast="none">worldwide </span><span data-contrast="none">trend </span><span data-contrast="none">in regulation on resilience</span><span data-contrast="none"> for the financial sector</span></a><span data-contrast="auto">, </span><span data-contrast="auto">pioneered by the </span><a href="https://www.bankofengland.co.uk/prudential-regulation/publication/2018/building-the-uk-financial-sectors-operational-resilience-discussion-paper"><span data-contrast="none">Bank of England</span><span data-contrast="none">’s </span><span data-contrast="none">(FCA and PRA) </span><span data-contrast="none">consultation papers</span></a><span data-contrast="auto"> on operational resilience and impact tolerances, and </span><span data-contrast="auto">followed</span><span data-contrast="auto"> by</span><span data-contrast="auto"> principle-based papers </span><span data-contrast="auto">on operational resilience </span><span data-contrast="auto">from the </span><a href="https://www.bis.org/bcbs/publ/d509.htm"><span data-contrast="none">Bank of International Settlements</span><span data-contrast="none"> (BIS)</span></a><span data-contrast="auto"> and the </span><a href="https://www.federalreserve.gov/newsevents/pressreleases/bcreg20201030a.htm"><span data-contrast="none">Federal Reserve</span></a><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">DORA in a nutshell: what does it change?</h2>
<p style="text-align: justify;"><span data-contrast="auto">Contrary to the FCA/PRA</span><span data-contrast="auto">, the Federal Reserve</span><span data-contrast="auto"> and the BIS, </span><span data-contrast="auto">DORA focuses on </span><span data-contrast="auto">solely </span><span data-contrast="auto">resilience to I</span><span data-contrast="auto">CT-related incidents and </span><span data-contrast="auto">introduces very specific and prescriptive requirements. It is not just a set of guidelines but rather criteria, templates and </span><span data-contrast="auto">instructions that will shape how financial organisations manage ICT risk. It demonstrates that EU regulators want to be very hands-on </span><span data-contrast="auto">on</span><span data-contrast="auto"> th</span><span data-contrast="auto">e</span><span data-contrast="auto"> topic, with a lot of reporting, communication and assessments that need to happen frequently</span><span data-contrast="auto">,</span><span data-contrast="auto"> enabled by standardised MI and reporting. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">DORA</span><span data-contrast="auto"> </span><span data-contrast="auto">introduces requirements</span><span data-contrast="auto"> across </span><span data-contrast="auto">five pillars: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">ICT risk management</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">ICT incident reporting</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Digital Operational resilience testing</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">ICT third-party risk management </span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Information and intelligence sharing</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<figure id="post-14838 media-14838" class="align-none" style="text-align: justify;"><img loading="lazy" decoding="async" class=" wp-image-14838 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/Image-1-1.png" alt="" width="539" height="568" /></figure>
<p style="text-align: justify;"><span data-contrast="auto">S</span><span data-contrast="auto">ome of the requirements are straight-forward and largely built on what is already being done in organisations</span><span data-contrast="auto"> (</span><span data-contrast="auto">for example, </span><span data-contrast="auto">the risk management framework that needs to be developed is similar to </span><span data-contrast="auto">industry standard</span><span data-contrast="auto">s like</span><span data-contrast="auto"> NIST</span><span data-contrast="auto">)</span><span data-contrast="auto">; but some are also challenging and will mean organisations need to launch some work to be compliant. </span><span data-contrast="auto">We have summarised the</span><span data-contrast="auto"> requirements and the</span><span data-contrast="auto">se key challenges</span><span data-contrast="auto"> </span><span data-contrast="auto">to start addressing now </span><span data-contrast="auto">for each of the 5 pillars</span><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">1. ICT risk management</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><b><span data-contrast="auto"> </span></b><span data-contrast="auto">E</span><span data-contrast="auto">nsure</span><span data-contrast="auto"> specific measures </span><span data-contrast="auto">and controls </span><span data-contrast="auto">are in place to limit the disruption</span><span data-contrast="auto"> to the market and to consumers</span><span data-contrast="auto"> caused by incidents</span><span data-contrast="auto">,</span><span data-contrast="auto"> and ensure accountability of the management body</span><span data-contrast="auto"> on ICT risk management</span><span data-contrast="auto">. </span><b><span data-contrast="auto"> </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key</span></b><b><span data-contrast="auto"> requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">Firms will need to follow </span><span data-contrast="auto">governance </span><span data-contrast="auto">principles </span><span data-contrast="auto">around ICT risk, with </span><span data-contrast="auto">a focus on </span><span data-contrast="auto">accountability of the management body</span><span data-contrast="auto">. They will need to i</span><span data-contrast="auto">denti</span><span data-contrast="auto">fy their</span><span data-contrast="auto"> risk tolerance for ICT risk, based on</span><span data-contrast="auto"> the</span><span data-contrast="auto"> risk appetite of the organisation and the impact tolerance of ICT disruptions</span><span data-contrast="auto">. They will also need to </span><span data-contrast="auto">have a risk management framework in place that </span><span data-contrast="auto">includes identification of critical and important functions</span><span data-contrast="auto">, risks associated </span><span data-contrast="auto">and </span><span data-contrast="auto">a mapping of the</span><span data-contrast="auto"> ICT assets that underpin them</span><span data-contrast="auto">;</span><span data-contrast="auto"> </span><span data-contrast="auto">as well as </span><span data-contrast="auto">specific</span><span data-contrast="auto"> protectio</span><span data-contrast="auto">n, </span><span data-contrast="auto">prevention</span><span data-contrast="auto">, detection, response and recovery</span><span data-contrast="auto"> </span><span data-contrast="auto">plans and </span><span data-contrast="auto">capabilities</span><span data-contrast="auto">, continuous improvement processes and metrics, and a crisis communication strateg</span><span data-contrast="auto">y</span><span data-contrast="auto"> with clear roles and responsibilities</span><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">: </span></b><span data-contrast="auto">As part of the continuous improvement processes,</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">DORA introduces compulsory training on digital operational resilience for the management body but also for the whole staff, as part of their general training package. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">2. ICT incident reporting</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><span data-contrast="auto"> Harmonise and centralise reporting of incidents to enable the regulator to react fast to avoid </span><span data-contrast="auto">spreading of the impact, and to promote collective improvement and</span><span data-contrast="auto"> firms’</span><span data-contrast="auto"> knowledge of </span><span data-contrast="auto">current </span><span data-contrast="auto">threats to the market</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">DORA introduces a standard incident classification methodology with a set of </span><span data-contrast="auto">specific </span><span data-contrast="auto">criteria</span><span data-contrast="auto"> </span><span data-contrast="auto">(</span><span data-contrast="auto">number of users</span><span data-contrast="auto"> affected</span><span data-contrast="auto">, duration, </span><span data-contrast="auto">geographical spread</span><span data-contrast="auto">, data loss, severity of impact on ICT systems, criticality of services affected, economic impact) with thresholds </span><span data-contrast="auto">that are yet to be published. </span><span data-contrast="auto">Following this methodology, incidents classified as m</span><span data-contrast="auto">ajor will have to be reported to the regulator within the same business day, following a certain template. </span><span data-contrast="auto">Follow-up reporting will also be required after a week, and after a month. </span><span data-contrast="auto">These reports will all be anonymised, compiled, and released regularly to the whole community. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">F</span><span data-contrast="auto">irms will need to change their incident classification </span><span data-contrast="auto">methodology</span><span data-contrast="auto"> to fit with the requirements. They will also need to set up the right processes</span><span data-contrast="auto"> and channels</span><span data-contrast="auto"> to be able to notify the regulator fast in case a major incident occurs. Based on what gets classified as “major”, this might happen frequently. </span><span data-contrast="auto">To help organisations prepare, w</span><span data-contrast="auto">e anticipate that the incident classification methodology will align with the </span><a href="https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy"><span data-contrast="none">ENISA Reference Incident Classification Taxonomy</span></a><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">3. Digital Operational Resilience testing</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><span data-contrast="auto"> </span><span data-contrast="auto">Ensure that </span><span data-contrast="auto">financial entities t</span><span data-contrast="auto">est the efficiency of the risk </span><span data-contrast="auto">management framework and measures in place</span><span data-contrast="auto"> to respond </span><span data-contrast="auto">to </span><span data-contrast="auto">and recove</span><span data-contrast="auto">r from</span><span data-contrast="auto"> </span><span data-contrast="auto">a wide range of</span><span data-contrast="auto"> ICT</span><span data-contrast="auto"> incident </span><span data-contrast="auto">scenario</span><span data-contrast="auto">s</span><span data-contrast="auto">,</span><span data-contrast="auto"> with minimal disruption to critical and important functions</span><span data-contrast="auto">, in a way that is proportionate to their size and criticality for the market.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">With DORA, all firms must put in place a c</span><span data-contrast="auto">omprehensive testing programme, </span><span data-contrast="auto">including a range of assessments, tests, methodologies, practices and tools</span><span data-contrast="auto">, </span><span data-contrast="auto">with a focus on technical testing</span><span data-contrast="auto">.</span><span data-contrast="auto"> The most critical firms</span><span data-contrast="auto"> will also have to organise a l</span><span data-contrast="auto">arge-scale threat-led live </span><span data-contrast="auto">penetration </span><span data-contrast="auto">test</span><span data-contrast="auto"> every 3 years</span><span data-contrast="auto"> (red team</span><span data-contrast="auto"> type exercise</span><span data-contrast="auto">)</span><span data-contrast="auto">, </span><span data-contrast="auto">performed by independent testers</span><span data-contrast="auto">, </span><span data-contrast="auto">covering critical functions and services and involving EU</span><span data-contrast="auto">-based</span><span data-contrast="auto"> ICT </span><span data-contrast="auto">third parties</span><span data-contrast="auto">. </span><span data-contrast="auto">The scenario will have to be agreed by the regulator in advance and </span><span data-contrast="auto">firms will receive a compliance certificate upon </span><span data-contrast="auto">completion of the test</span><span data-contrast="auto">. </span><span data-contrast="auto">More guidance for these tests, as well as the criteria which defines a critical firm,</span><span data-contrast="auto"> will be published in 2021.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">It is likely that c</span><span data-contrast="auto">ritical firms will need to organise this threat-led penetration test by </span><span data-contrast="auto">the end of </span><span data-contrast="auto">2024 and this type of test</span><span data-contrast="auto"> requires a lot of preparation. </span><span data-contrast="auto">The fact that it needs to involve critical ICT third parties will also mean they need to be involved in the preparation. </span><span data-contrast="auto">Firms </span><span data-contrast="auto">that believe they will be in scope </span><span data-contrast="auto">(</span><span data-contrast="auto">might be</span><span data-contrast="auto"> </span><span data-contrast="auto">firms already in the scope of NIS regulation) </span><span data-contrast="auto">should start thinking about the scenario as soon as possible to enable validation with the regulator at least 2 years before the deadline. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">4. ICT third party risk management</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><b><span data-contrast="auto"> </span></b><span data-contrast="auto">Ensure that financial organisations have an appropriate level of control</span><span data-contrast="auto">s</span><span data-contrast="auto"> and monitoring </span><span data-contrast="auto">of </span><span data-contrast="auto">their ICT third parties, especially the ones that underpin critical</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">functions</span><span data-contrast="auto">; and set up specific oversight on providers that are critical to the market as a whole. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements: </span></b><span data-contrast="auto">With this regulation, the EU </span><span data-contrast="auto">introduces </span><span data-contrast="auto">requirements on both financial organisations and critical ICT providers.</span><b><span data-contrast="auto"> </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="9" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span data-contrast="auto">Financial organisations</span></b><span data-contrast="auto"> will need to have a defined multi-vendor ICT third-party risk strategy and policy owned by a member of the management body.</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">They will need to compile a standard register of information that contains the full view of all their ICT third-party providers, the services they provide and the functions </span><span data-contrast="auto">they</span><span data-contrast="auto"> underpin</span><span data-contrast="auto">; and report on changes to this register to the regulator once a year. They will need to </span><span data-contrast="auto">assess ICT service providers according to certain criteria before entering a contract (e.g. security level, </span><span data-contrast="auto">concentration risk, sub-outsourcing risks), and they will need to plan for an exit strategy in case of failure of a provider. </span><span data-contrast="auto">DORA also contains guidelines for contract contents </span><span data-contrast="auto">and reasons for termination of contract, which has to be linked to a risk or evidence of non-compliance at the provider level. </span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="9" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Under a new Oversight Framework,</span><b><span data-contrast="auto"> critical providers </span></b><span data-contrast="auto">will </span><span data-contrast="auto">be the subject of a</span><span data-contrast="auto">nnual a</span><span data-contrast="auto">ss</span><span data-contrast="auto">essments against resilience requirements such as availability, continuity, data integrity, physical security, risk management processes, governance, reporting, </span><span data-contrast="auto">portability, testing… These assessments will be performed directly by the regulator </span><span data-contrast="auto">and will result in penalties for non-compliance. </span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">: </span></b><span data-contrast="auto">Collating information on </span><span data-contrast="auto">all ICT vendors</span><span data-contrast="auto"> (not only the most critical)</span><span data-contrast="auto">,</span><span data-contrast="auto"> with the</span><span data-contrast="auto"> services provided and functions they underpin</span><span data-contrast="auto"> for the register of information</span><span data-contrast="auto"> will be a </span><span data-contrast="auto">very </span><span data-contrast="auto">big task for large financial organisations that</span><span data-contrast="auto"> </span><span data-contrast="auto">typically </span><span data-contrast="auto">rely on</span><span data-contrast="auto"> </span><span data-contrast="auto">thousands of</span><span data-contrast="auto"> big and</span><span data-contrast="auto"> small providers</span><span data-contrast="auto"> and legacy contract management systems</span><span data-contrast="auto"> that make it difficult to mine data from</span><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">5. Information and intelligence sharing</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><b><span data-contrast="auto"> </span></b><span data-contrast="auto">Promote sharing of information and intelligence on cyber threats between financial organisations to enable them to be better prepared. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">DORA introduces guidelines on setting up information sharing arrangements between firms for cyber threats</span><span data-contrast="auto">, including confidentiality requirements and the need to notify the regulator. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">We do not see any particular challenge in this space as many organisations already have such agreements in place. </span><span data-contrast="auto">It will be an opportunity to make local initiatives</span><span data-contrast="auto">, </span><span data-contrast="auto">networks</span><span data-contrast="auto"> or</span><span data-contrast="auto"> associations</span><span data-contrast="auto"> visible and</span><span data-contrast="auto"> </span><span data-contrast="auto">encourage more companies to become part of them. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 style="text-align: justify;">What happens next?</h2>
<p style="text-align: justify;"><span data-contrast="auto">DORA is currently going through the EU legislative process an</span><span data-contrast="auto">d it is expected to take 6-</span><span data-contrast="auto">12</span><span data-contrast="auto"> months before it becomes law. </span><span data-contrast="auto">A</span><span data-contrast="auto"> few questionable topics might lead to some debates and slow down the process, especially on third-party management</span><span data-contrast="auto">: </span><span data-contrast="auto">restrictive criteria for organisations to terminate contracts, banned non-EU based critical third parties, penalty system and financing of the Oversight framework by the critical providers</span><span data-contrast="auto">. </span><span data-contrast="auto">There are also details that still need to be published to clarify some of the requirements</span><span data-contrast="auto"> (e.g. templates, criticality criteria and thresholds…), which might also create some debates. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Once DORA is passed, firms </span><span data-contrast="auto">should</span><span data-contrast="auto"> have one year to get into compliance </span><span data-contrast="auto">with most of the requirements (i.e. probably by the end of 2022</span><span data-contrast="auto"> – but this one-year deadline is short and we anticipate it may shift to 18 months following market feedback</span><span data-contrast="auto">) and 3 years to organise a large-scale penetration test if required (i.e. probably by the end of 2024). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">In order to be ready, </span></b><b><span data-contrast="auto">we recommend organisations</span></b><b><span data-contrast="auto"> take the following steps in 2021: </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li style="text-align: justify;" data-leveltext="⁄" data-font="Tahoma" data-listid="10" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">P</span></b><b><span data-contrast="auto">erform a maturity assessment against the </span></b><b><span data-contrast="auto">DORA requirements, with associated gap analysis and mitigation plan to reach compliance by the end of 2022</span></b><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="⁄" data-font="Tahoma" data-listid="10" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Begin thinking about a scenario for the large-scale penetration test, aiming to get it validated by the regulator by mid-2022</span></b><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="⁄" data-font="Tahoma" data-listid="10" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Start </span></b><b><span data-contrast="auto">work on consolidation of the register of information for all ICT third party providers</span></b><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/decrypting-dora-what-does-it-mean-for-resilience-of-financial-organisations/">Decrypting DORA: what does it mean for Resilience of financial organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
