DORA Compliance Workspace: From Gap Assessment to Full Regulatory Readiness in 12 Steps
A practical guide for compliance officers and GRC teams at EU financial entities on using Rakenne's DORA compliance workspace template to build a complete Digital Operational Resilience Act documentation set — with tool-assisted validation at every step.
DORA compliance is documentation-heavy. Financial entities subject to the Digital Operational Resilience Act must produce and maintain dozens of ICT-specific documents across five regulatory pillars — ICT risk management, incident reporting, resilience testing, third-party risk management, and information sharing. Each pillar has its own Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) that prescribe specific content, classification criteria, and reporting formats. Generic LLMs can draft text, but they cannot validate against specific RTS/ITS requirements, check cross-document consistency, or enforce DORA-specific classification criteria like the seven-factor major incident determination test.
Rakenne’s DORA compliance workspace template provides 12 specialized skills and over 40 validation tools that guide an LLM agent through the entire regulatory journey — from initial gap assessment to board-level reporting. Each skill enforces a structured workflow, loads DORA-specific references (articles, RTS, ITS), and uses deterministic tools to check the agent’s output — catching the kinds of errors that plain LLM drafting misses: missing RTS fields, inconsistent ICT provider classifications, incomplete incident reporting chains, and cross-pillar inconsistencies where one artifact contradicts another.
This guide walks through all 12 skills in sequence, shows real dialog excerpts and tool outputs from a live session, and explains what makes tool-assisted DORA documentation materially better than generic AI drafting.
Why plain LLMs fall short for DORA
A plain LLM like ChatGPT can draft ICT risk frameworks and incident procedures. Where it struggles is regulatory-grade validation:
| Concern | Plain LLM | Rakenne with DORA skills |
|---|---|---|
| RTS/ITS compliance | Can miss specific regulatory requirements | Validation tools check against RTS 2024/1774, 2024/1772, ITS 2025/302 |
| Information Register completeness | No awareness of ITS 2024/2956 field requirements | Validates all six ITS templates (B01-B06) field by field |
| Incident classification | No threshold awareness | Applies 7-criteria major incident determination per RTS 2024/1772 |
| Cross-document consistency | Each prompt is isolated | Skills read prior artifacts and validate alignment across pillars |
| Contractual provision review | Generic contract drafting | Art. 30 checklist with weak-language detection |
The difference is structural: skills give the agent a spec (workflow + references + structure) and tools (deterministic checks) to verify its own output. This is what turns a draft into a regulatory artifact that withstands supervisory scrutiny.
The 12-step DORA journey
The workspace template installs 12 skills that map to the five DORA pillars plus governance:
| Phase | Step | Skill | What gets validated |
|---|---|---|---|
| Assess & Plan | 1 | Gap Assessment | 5-pillar scoring, top gaps, remediation roadmap |
| Pillar 1 | 2 | ICT Risk Framework | Arts. 5-16, governance, proportionality |
| Pillar 1 | 3 | ICT BCP/DRP | RTO/RPO, switchover, backup policies |
| Pillar 1 | 4 | Policy Generator | 17 required policies, cross-references |
| Pillar 2 | 5 | Incident Classification | 7 criteria, 3-stage reporting |
| Pillar 3 | 6 | Resilience Testing | 12 test types, TLPT |
| Pillar 4 | 7 | Information Register | 6 ITS templates, concentration risk |
| Pillar 4 | 8 | Third-Party Policy | Art. 30, exit strategies |
| Pillar 4 | 9 | Contractual Provisions | Art. 30(2)/(3) clauses |
| Pillar 4 | 10 | Subcontracting Oversight | RTS 2025/0532 conditions |
| Pillar 5 | 11 | Information Sharing | Art. 45, TLP, STIX/TAXII |
| Governance | 12 | Board Reporting | Art. 5, periodic ICT risk report |
Each skill reads workspace files produced by earlier steps — the gap assessment shapes remediation priorities, the ICT risk framework feeds into the BCP/DRP, the information register feeds into contractual provisions, and so on. The entire chain is traceable across all five pillars.
Step 1: Gap Assessment — mapping the distance to compliance
Every DORA engagement starts with understanding where the entity stands today. The Gap Assessment skill evaluates the organization against all five DORA pillars, scoring current maturity, identifying the top compliance gaps, and producing a prioritized remediation roadmap. It reads any existing documentation — ISO 27001 policies, BCP plans, vendor contracts — and maps them against DORA-specific requirements.
You: Europa Capital Partners is a mid-sized investment firm under BaFin supervision, 200 employees, headquartered in Frankfurt with operations in Germany, Netherlands, and Luxembourg. We use AWS for cloud infrastructure, Salesforce for CRM, Bloomberg Terminal for market data, and have 15 ICT third-party providers. We hold ISO 27001 certification but have no DORA-specific documentation yet. Run the gap assessment.
Agent: I’ve analyzed Europa Capital Partners against all five DORA pillars. Let me run the pillar maturity scoring and gap detection tools.
5-pillar maturity assessment:
- Pillar 1 (ICT Risk Management): Partial — ISO 27001 risk register exists but lacks DORA-specific ICT risk taxonomy per Art. 6(8). No ICT asset classification per RTS 2024/1774 Art. 3.
- Pillar 2 (Incident Reporting): Minimal — incident management procedure exists from ISO 27001 but does not implement the 7-criteria major incident classification per RTS 2024/1772 or the 3-stage reporting timeline.
- Pillar 3 (Resilience Testing): Minimal — penetration tests are performed annually but no DORA-aligned testing program with the 12 test types per Art. 25, and no TLPT assessment.
- Pillar 4 (Third-Party Risk): Weak — vendor list exists but no information register per ITS 2024/2956, no Art. 30 contractual provision review, no exit strategies.
- Pillar 5 (Information Sharing): None — no threat intelligence sharing arrangements.
Top 5 gaps (by regulatory risk):
- Information Register — ITS 2024/2956 requires submission to BaFin; no register exists
- Incident classification framework — missing 7-criteria test and 3-stage reporting
- ICT third-party contractual provisions — Art. 30 clauses not present in current contracts
- ICT risk management framework — needs DORA-specific governance structure per Arts. 5-6
- Resilience testing program — no structured program covering all 12 test types
I’ve generated the remediation roadmap with three phases: Immediate (Q2 2026), Short-term (Q3 2026), and Medium-term (Q4 2026), prioritized by regulatory deadline and supervisory visibility.
The gap assessment becomes the anchor for the entire engagement — it determines which skills to prioritize and feeds into the remediation timeline. Because Europa Capital Partners already holds ISO 27001, several artifacts can be adapted rather than built from scratch. The gap assessment identifies exactly which ones and what DORA-specific additions they need.
Step 2: ICT Risk Framework — the governance backbone
DORA Articles 5 through 16 define the most comprehensive ICT risk management requirements in EU financial regulation. The ICT Risk Framework skill builds the governance structure, ICT risk management policy, and supporting procedures — accounting for proportionality based on the entity’s size, risk profile, and complexity of ICT services.
You: Build the ICT risk management framework for Europa Capital Partners. We need the governance structure, ICT risk management policy, and the supporting procedures per Arts. 5-16.
Agent: I’ve drafted the ICT risk management framework based on the gap assessment and your ISO 27001 baseline. Let me validate against DORA requirements.
Art. 5 governance check: PASS. The framework assigns ICT risk management responsibility to the management body (Board of Directors) with a dedicated ICT Risk Committee chaired by the CRO. Art. 5(2) requirements for management body training are included — annual ICT risk training for all board members with documented attendance.
Art. 6-16 coverage check: 11 of 12 article requirements fully covered. One WARNING: Art. 11(3) requires a communication plan for ICT-related incidents that distinguishes between internal staff notification, external client notification, and competent authority reporting. The current draft covers internal and authority notification but needs explicit client communication procedures. I’ve added a client notification section with severity-based triggers.
Proportionality assessment: PASS. Europa Capital Partners is classified as a mid-sized investment firm (not a microenterprise under Art. 16). The framework applies the standard requirements without the simplified regime. The proportionality section documents the rationale — 200 employees, cross-border operations, 15 ICT third-party dependencies, critical function reliance on AWS and Bloomberg.
ISO 27001 mapping: I’ve cross-referenced the DORA framework against your existing ISO 27001 controls. 34 of the 93 Annex A controls map directly to DORA requirements — these can be referenced rather than duplicated. 18 DORA-specific requirements have no ISO 27001 equivalent and need new documentation.
The ICT risk framework becomes the governance backbone for everything that follows. Every subsequent skill references the governance structure, risk appetite, and classification criteria defined here. The ISO 27001 mapping ensures Europa Capital Partners leverages existing documentation rather than rebuilding from scratch.
Step 3: ICT BCP/DRP — continuity under DORA’s stricter lens
DORA imposes ICT continuity requirements that go beyond traditional BCP/DRP. Articles 11 and 12 require specific response and recovery plans with defined switchover mechanisms, RTO/RPO targets aligned to critical function classifications, and backup policies that meet prescriptive standards. The ICT BCP/DRP skill builds these artifacts and validates them against DORA’s specific requirements.
You: Create the ICT business continuity and disaster recovery plans. Our critical functions are trade execution (Bloomberg + AWS), client portfolio management (Salesforce + AWS), and regulatory reporting. Maximum tolerable downtime for trade execution is 2 hours.
Agent: I’ve drafted the ICT BCP and DRP based on the ICT risk framework and your critical function classifications. Let me validate.
RTO/RPO validation: PASS. Trade execution: RTO 2 hours, RPO 15 minutes (aligned to your stated tolerance and Art. 11(1) requirements). Client portfolio management: RTO 4 hours, RPO 1 hour. Regulatory reporting: RTO 8 hours, RPO 4 hours. All targets are documented with justification based on business impact analysis.
Switchover mechanism check: PASS. The DRP includes switchover procedures for each critical function — AWS multi-AZ failover for compute, cross-region replication for data stores, Bloomberg Terminal redundancy via backup site in Netherlands office. Art. 11(4) requirement for switchover testing is addressed with quarterly failover drills.
Backup policy check: WARNING. Art. 12(1) requires backup scope, frequency, and restoration procedures to be defined for each ICT system supporting critical functions. The current draft covers AWS infrastructure backups but does not document Salesforce backup procedures. Salesforce data is backed up via a third-party tool (OwnBackup) but this is not referenced. I’ve added the Salesforce backup section with daily export frequency and 30-day retention.
Art. 11(6) crisis communication check: PASS. The BCP includes an ICT crisis communication plan with defined roles (Crisis Manager, ICT Lead, Comms Lead), escalation paths, and notification templates for BaFin, ESMA, and affected clients.
The BCP/DRP feeds directly into the resilience testing program — tests must validate that switchover mechanisms and recovery procedures actually work within stated RTO/RPO targets.
Step 4: Policy Generator — 17 DORA-required policies
DORA and its supporting RTS require financial entities to maintain a specific set of ICT policies — from the overarching ICT risk management policy (Art. 6) to granular policies on encryption, access control, ICT change management, and capacity planning. The Policy Generator skill creates all 17 required policies tailored to the entity’s context, cross-referenced against the ICT risk framework and existing ISO 27001 documentation.
You: Generate the full set of DORA-required ICT policies for Europa Capital Partners.
Agent: I’ve identified 17 required ICT policies based on DORA Articles 6-16 and RTS 2024/1774. Let me generate them in batches and validate each.
Batch 1 — Core policies (5 policies generated):
- POL-DORA-001: ICT Risk Management Policy (Art. 6)
- POL-DORA-002: ICT Security Policy (Art. 9)
- POL-DORA-003: ICT Access Control Policy (Art. 9(4)(c))
- POL-DORA-004: ICT Change Management Policy (Art. 9(4)(e))
- POL-DORA-005: Encryption and Cryptographic Controls Policy (Art. 9(4)(d))
Mandatory topic coverage check: PASS for all 5 policies. Each policy includes scope, objectives, roles and responsibilities, specific DORA article references, implementation controls, monitoring requirements, and review schedule. POL-DORA-001 cross-references the ICT risk framework governance structure.
Cross-reference validation: PASS. All 5 policies reference the relevant sections of the ICT risk management framework (Step 2) and map to corresponding ISO 27001 controls. No orphaned references found.
Batch 2 — Operational policies (6 policies): ICT Asset Management, Network Security, ICT Project Management, Capacity and Performance Management, Data and System Security, Vulnerability Management. All passed validation.
Batch 3 — Specialized policies (6 policies): ICT Incident Management, Business Continuity, Physical Security, Awareness and Training, Logging and Monitoring, Third-Party ICT Risk. All passed validation.
Policy completeness check: PASS. All 17 required policies are generated. Each has document metadata (ID, version, owner, approval authority, effective date, next review date) and is tailored to Europa Capital Partners — referencing AWS, Bloomberg, Salesforce, and BaFin-specific requirements.
Each policy is organization-specific. The ICT Access Control Policy references Okta and AWS IAM roles actually in use at Europa Capital Partners, not generic placeholders. The Encryption Policy references AWS KMS key management procedures. This is what makes tool-assisted policy generation different from downloading a template pack — every policy is internally consistent with the entity’s actual ICT landscape.
Step 5: Incident Classification — the 7-criteria test
DORA Article 18 and RTS 2024/1772 introduce a specific incident classification framework that financial entities must implement. A major ICT-related incident is determined by evaluating seven criteria with defined thresholds — and entities must report in three stages (initial, intermediate, final) within prescribed timelines. The Incident Classification skill builds the classification framework, scoring model, and reporting procedures.
You: Build the incident classification framework for Europa Capital Partners. We need the 7-criteria major incident determination and the 3-stage reporting procedures.
Agent: I’ve drafted the incident classification framework based on RTS 2024/1772. Let me validate the criteria and reporting chain.
7-criteria completeness check: PASS. All seven criteria are implemented with DORA-specific thresholds:
- Clients affected — threshold: >10% of clients or >100 clients
- Transactions affected — threshold: >10% of daily transaction volume
- Data loss — any confirmed data breach involving client data
- Impact on critical functions — any disruption to trade execution or portfolio management
- Duration — incident exceeding 2 hours for critical functions
- Geographical spread — affecting operations in more than one Member State
- Economic impact — estimated direct cost exceeding EUR 100,000
The scoring model implements the RTS 2024/1772 determination logic: an incident is classified as major if it meets the threshold for criterion 4 (critical function impact) plus at least one other criterion, OR if it meets the thresholds for at least three criteria simultaneously.
3-stage reporting check: PASS. The reporting procedure defines:
- Initial notification: within 4 hours of classifying as major, to BaFin via the ESMA reporting template
- Intermediate report: within 72 hours, with updated impact assessment and containment measures
- Final report: within 1 month of resolution, with root cause analysis, remediation actions, and cost estimate
Reporting template validation: PASS. All three reporting templates include the mandatory fields per ITS 2025/302 — incident reference, classification rationale, affected services, client impact, and recovery status.
The incident classification framework is one of the most technically specific DORA requirements. A plain LLM might list the seven criteria, but it would not enforce the correct determination logic (criterion 4 plus one, or any three) or validate that reporting templates include all ITS-mandated fields. The tools enforce these mechanical checks so the compliance team can focus on judgment calls — like setting appropriate thresholds for Europa Capital Partners’ specific transaction volumes.
Step 6: Resilience Testing — 12 test types plus TLPT
DORA Article 25 requires a comprehensive digital operational resilience testing program covering specific test types. For significant financial entities, Article 26 additionally mandates Threat-Led Penetration Testing (TLPT) at least every three years. The Resilience Testing skill designs the testing program, maps test types to critical functions, and validates coverage.
You: Design the resilience testing program for Europa Capital Partners. We need coverage of all required test types and a TLPT assessment.
Agent: I’ve drafted the digital operational resilience testing program based on Art. 25 requirements and Europa Capital Partners’ critical function profile. Let me validate coverage.
Test type coverage check: PASS. All 12 required test types are included in the annual testing program:
- Vulnerability assessments (quarterly)
- Network security assessments (semi-annual)
- Open source analysis (continuous via dependency scanning)
- Gap analyses (annual, aligned with DORA gap assessment)
- Physical security reviews (annual)
- Source code reviews (per release cycle)
- Scenario-based tests (semi-annual)
- Compatibility testing (per major change)
- Performance testing (quarterly)
- End-to-end testing (semi-annual)
- Penetration testing (annual)
- Switchover and failover testing (semi-annual, aligned with BCP/DRP)
Critical function mapping: Each test type is mapped to the critical functions it validates — trade execution, portfolio management, and regulatory reporting. Penetration testing and scenario-based tests cover all three; switchover testing focuses on trade execution and portfolio management where RTO targets are strictest.
TLPT assessment: Based on Europa Capital Partners’ profile — mid-sized investment firm, AUM of EUR 2.8 billion, cross-border operations in three Member States — BaFin may designate the entity for TLPT under Art. 26. I’ve included a TLPT readiness section with: TIBER-EU framework alignment, scope definition (AWS infrastructure + Bloomberg integration + Salesforce), red team requirements, control team composition, and a 3-year cycle plan.
The testing program schedule integrates with the ICT change management policy — any significant ICT change triggers ad-hoc testing requirements beyond the regular schedule.
The testing program feeds back into the ICT risk framework — test results update the risk register, and any failed tests trigger the incident classification workflow if they reveal vulnerabilities in critical functions.
Step 7: Information Register — the 6 ITS templates
DORA Article 28(3) and ITS 2024/2956 require financial entities to maintain a comprehensive register of all ICT third-party service arrangements and report it to their competent authority. The register follows six prescribed templates (B01-B06) with specific fields that must be populated for each arrangement. The Information Register skill builds the register and validates field-by-field completeness.
You: Build the information register for Europa Capital Partners. We have 15 ICT third-party providers. Start with our critical providers: AWS, Salesforce, and Bloomberg.
Agent: I’ve initiated the information register with the three critical providers. Let me populate all six ITS templates and validate field-by-field.
Template B01 (Entity-level information): PASS. Europa Capital Partners entity details populated — LEI, BaFin registration number, entity type (investment firm), consolidation level, and Member State operations (DE, NL, LU).
Template B02 (Contractual arrangements): 3 arrangements populated. Each includes contract reference, start date, renewal terms, notice period, governing law, and whether the arrangement supports a critical or important function. AWS and Bloomberg flagged as supporting critical functions; Salesforce flagged as supporting an important function.
Template B03 (ICT third-party provider details): PASS. Provider details for AWS (LEI, headquarters: US, EU presence: Frankfurt region), Bloomberg (LEI, headquarters: US, EU presence: London), and Salesforce (LEI, headquarters: US, EU presence: Frankfurt). All mandatory fields populated.
Template B04 (ICT services): PASS. Detailed ICT service descriptions for each arrangement — AWS: IaaS (compute, storage, networking), Bloomberg: SaaS (market data, trading), Salesforce: SaaS (CRM, portfolio tracking). Service type classification per ITS taxonomy applied.
Template B05 (Subcontracting chains): WARNING. AWS subcontracting chain is documented (AWS uses subprocessors for specific services). Bloomberg and Salesforce subcontracting information is incomplete — I’ve flagged these for information requests to the providers. Art. 29(2) requires the entity to identify the full subcontracting chain for critical function providers.
Template B06 (Concentration risk): Concentration risk analysis completed. WARNING: Europa Capital Partners has significant concentration on AWS — three critical functions depend on AWS infrastructure, all in the eu-central-1 region. The concentration risk assessment recommends documenting the risk acceptance rationale and defining multi-cloud contingency triggers.
Overall register completeness: 92%. Two gaps require provider outreach (Bloomberg and Salesforce subcontracting chains).
Here’s a sample from the information register the agent produced:
| Template | Provider | Completeness | Flags |
|---|---|---|---|
| B01 | Europa Capital Partners | 100% | – |
| B02 | AWS | 100% | Critical function |
| B02 | Bloomberg | 100% | Critical function |
| B02 | Salesforce | 100% | Important function |
| B03 | AWS | 100% | US-headquartered, EU presence |
| B05 | AWS | 100% | Subcontracting chain documented |
| B05 | Bloomberg | 60% | Subcontracting data needed |
| B05 | Salesforce | 60% | Subcontracting data needed |
| B06 | All providers | 100% | AWS concentration risk flagged |
The information register is one of the most operationally demanding DORA requirements. Entities must submit it to their competent authority on an annual basis and update it when material changes occur. The skill validates every field against the ITS specification — a plain LLM would not know that Template B03 requires an LEI, or that Template B06 must include concentration risk metrics. The field-by-field validation prevents submission errors that could trigger supervisory follow-up.
Step 8: Third-Party Policy — managing ICT provider risk
DORA Article 28 establishes a comprehensive third-party ICT risk management framework. The Third-Party Policy skill generates the overarching policy governing how the entity selects, assesses, monitors, and exits ICT third-party relationships — with mandatory exit strategies for critical providers.
You: Create the ICT third-party risk management policy for Europa Capital Partners.
Agent: I’ve drafted the third-party ICT risk management policy based on Art. 28-30 and the information register. Let me validate.
Art. 28 completeness check: PASS. The policy covers all required elements: pre-contractual due diligence process, ongoing monitoring framework, risk assessment methodology for ICT providers, critical function dependency mapping, and concentration risk management.
Exit strategy validation: PASS. Exit strategies are documented for all three critical providers:
- AWS: multi-cloud migration plan with 6-month transition timeline, data portability procedures, and interim DR capability on Azure
- Bloomberg: alternative market data providers identified (Refinitiv, FactSet), 3-month parallel-run plan
- Salesforce: CRM data export procedures, alternative platforms assessed, 4-month migration timeline
Each exit strategy includes the Art. 28(8) requirements: transition plan, decommissioning schedule, data retrieval, continued compliance during transition, and minimum notice periods.
Concentration risk assessment: WARNING. The policy documents AWS concentration risk but the risk acceptance has not been formally approved by the management body. Art. 28(4) requires explicit management body approval for concentration risk acceptance. I’ve added an approval section with a board resolution template.
The third-party policy feeds directly into the contractual provisions review (Step 9) and the subcontracting oversight framework (Step 10).
Step 9: Contractual Provisions — Art. 30 clause-by-clause review
DORA Article 30 prescribes specific contractual provisions that must be present in ICT third-party agreements — with stricter requirements for providers supporting critical or important functions (Art. 30(3)). The Contractual Provisions skill reviews existing contracts against these requirements and generates clause language for gaps.
You: Review our existing AWS, Bloomberg, and Salesforce contracts against Art. 30 requirements.
Agent: I’ve analyzed the three contracts against Art. 30(2) general provisions and Art. 30(3) critical function provisions. Let me run the clause-by-clause checker.
AWS contract review (critical function provider — Art. 30(2) + 30(3) apply):
- Art. 30(2)(a) service descriptions: PASS — clear, detailed SLA with service levels
- Art. 30(2)(b) data processing locations: WARNING — contract specifies EU region but does not explicitly list all data processing and storage locations as required
- Art. 30(2)(e) right of access and audit: PASS — included via AWS Artifact compliance program
- Art. 30(3)(a) full service level descriptions: PASS
- Art. 30(3)(b) notice periods and reporting obligations: WARNING — incident notification clause says “promptly” rather than specifying the timeframe aligned with your 4-hour initial reporting obligation
- Art. 30(3)(d) exit provisions: PASS — data portability and transition assistance included
Weak language detection: 3 instances found across all contracts:
- AWS: “commercially reasonable efforts” for incident notification — recommend replacing with “within 2 hours of detection”
- Bloomberg: “best endeavours to maintain availability” — recommend replacing with specific uptime SLA (99.9%)
- Salesforce: “may provide” audit access — recommend replacing with “shall provide” audit access upon 30 days notice
I’ve generated amendment language for each weak clause with DORA-aligned replacements. All amendments reference the specific Art. 30 paragraph they satisfy.
The weak-language detection is a capability that would be nearly impossible with a plain LLM working from a single prompt. The tool scans for hedging language (“commercially reasonable”, “best endeavours”, “may provide”) and flags it with specific replacement language that satisfies the relevant Art. 30 paragraph. This is the kind of mechanical review that saves legal teams hours of line-by-line contract analysis.
Step 10: Subcontracting Oversight — tracking the chain
DORA Article 29 and RTS 2025/0532 establish conditions for ICT third-party providers that subcontract critical or important functions. Financial entities must maintain visibility into the subcontracting chain, assess concentration risks at the subcontractor level, and ensure contractual provisions flow down. The Subcontracting Oversight skill builds the oversight framework and validates compliance with the RTS conditions.
You: Build the subcontracting oversight framework for Europa Capital Partners’ critical ICT providers.
Agent: I’ve drafted the subcontracting oversight framework based on Art. 29 and RTS 2025/0532. Let me validate against the conditions.
RTS condition checker: 5 of 6 conditions PASS:
- Prior notification requirement for material subcontracting — PASS, contractual clause requires 60-day advance notice
- Objection right — PASS, Europa Capital Partners retains contractual right to object to subcontracting of critical function components
- Subcontractor assessment — PASS, framework requires risk assessment of proposed subcontractors before approval
- Audit rights extension — PASS, audit provisions flow down to subcontractors per Art. 30(3)(e)
- Termination trigger — PASS, material unauthorized subcontracting is an exit trigger per the third-party policy
- Subcontracting chain documentation — WARNING, Bloomberg and Salesforce subcontracting chains are incomplete (flagged in Step 7). Until provider responses are received, the oversight framework cannot fully validate chain-level concentration risk.
Concentration risk at subcontractor level: The analysis identified that AWS’s subprocessors for EU data center operations are concentrated in a single entity. This is documented as an accepted risk with quarterly review triggers. I’ve added this to the information register under Template B05.
Step 11: Information Sharing — threat intelligence under Art. 45
DORA Article 45 encourages financial entities to participate in threat intelligence sharing arrangements. The Information Sharing skill builds the governance framework, data classification protocols, and technical integration plan for sharing cyber threat intelligence with peers, ISACs, and competent authorities.
You: Set up the information sharing framework for Europa Capital Partners. We want to participate in FS-ISAC Europe and share threat intelligence with peer firms in our industry group.
Agent: I’ve drafted the information sharing framework based on Art. 45 requirements. Let me validate the governance and technical components.
Art. 45 compliance check: PASS. The framework covers all required elements:
- Governance: Board-approved participation policy, designated information sharing officer (CISO), legal review of participation agreements
- Scope: Threat indicators, TTPs, security alerts — explicitly excluding client data, proprietary trading strategies, and commercially sensitive information
- Classification: Traffic Light Protocol (TLP) applied — TLP:RED for internal-only indicators, TLP:AMBER for trusted community, TLP:GREEN for sector-wide sharing, TLP:WHITE for public
Technical integration check: PASS. The framework specifies STIX 2.1 format for structured threat intelligence and TAXII 2.1 for automated exchange. Integration plan includes: FS-ISAC Europe membership enrollment, TAXII client configuration for automated indicator ingestion, and manual sharing procedures for ad-hoc intelligence via the information sharing officer.
Data protection safeguard check: PASS. The framework includes anonymization procedures for any shared data that could indirectly identify clients, GDPR-compliant data sharing agreements with peer firms, and retention limits (90 days for raw indicators, 1 year for aggregated threat reports).
The information sharing framework is often the last pillar addressed in DORA programs because it is permissive rather than mandatory — Art. 45 says entities “may” participate. However, supervisory authorities increasingly view active information sharing as evidence of mature ICT risk management. The skill ensures that when Europa Capital Partners does participate, the governance and technical foundations meet regulatory expectations.
Step 12: Board Reporting — Art. 5 periodic ICT risk report
DORA Article 5(6) requires the management body to receive periodic reports on ICT risk. The Board Reporting skill compiles a comprehensive ICT risk report from all upstream artifacts — risk framework status, incident statistics, testing results, third-party risk posture, and compliance progress — into a format suitable for board-level consumption.
You: Generate the quarterly ICT risk report for the board of Europa Capital Partners.
Agent: I’ve compiled the board ICT risk report from all workspace artifacts. Let me validate completeness and formatting.
Art. 5 reporting requirements check: PASS. The report covers all mandatory elements:
- ICT risk posture summary: 23 identified ICT risks, 19 treated, 4 accepted with documented rationale
- Incident summary: 2 ICT incidents in Q1 2026, neither classified as major under the 7-criteria framework
- Resilience testing status: 7 of 12 test types completed in Q1, 2 findings remediated, 1 open
- Third-party risk dashboard: 15 providers monitored, AWS concentration risk flagged, 2 subcontracting chain gaps under investigation
- DORA compliance progress: 9 of 12 workspace steps complete, estimated full compliance by Q3 2026
Board readability check: PASS. The report uses executive-level language with traffic-light risk indicators (Red/Amber/Green), trend arrows for quarter-over-quarter comparison, and a single-page summary dashboard. Technical details are in appendices referenced but not inlined.
Cross-artifact consistency check: PASS. All figures in the board report trace to source artifacts — incident counts match the incident register, risk counts match the risk framework, testing status matches the resilience testing schedule. No unsourced claims.
The board report is the capstone of the DORA compliance program. It demonstrates to supervisory authorities that the management body exercises active oversight of ICT risk per Art. 5 — not as a formality, but as an informed governance practice supported by consistent, traceable data across all five pillars.
Cross-pillar traceability: the supervisor’s perspective
DORA supervisors don’t evaluate documents in isolation — they trace chains across pillars. “Show me the risk that led to this contractual provision. Show me the test that validated your recovery procedure. Show me how this incident was classified and reported.” If one link in the chain breaks, it signals inadequate ICT risk management.
Rakenne’s cross-pillar traceability tools enforce these links automatically. Each tool runs inside the skill that produces the downstream document, checking it against upstream artifacts. Here is what happens when you run the DORA traceability dashboard after completing all 12 steps:
You: Run the traceability dashboard to check overall DORA compliance consistency.
Agent: I’ve scanned the workspace and checked all cross-pillar traceability links. Here are the results.
Pillar completion:
- Pillar 1 (ICT Risk Management): 3/3 skills complete — framework, BCP/DRP, policies
- Pillar 2 (Incident Reporting): 1/1 skill complete — classification framework with 7-criteria test and 3-stage reporting
- Pillar 3 (Resilience Testing): 1/1 skill complete — 12 test types mapped, TLPT assessed
- Pillar 4 (Third-Party Risk): 4/4 skills complete — register, policy, contractual provisions, subcontracting
- Pillar 5 (Information Sharing): 1/1 skill complete — Art. 45 framework with TLP and STIX/TAXII
- Governance: 1/1 skill complete — board reporting
Cross-pillar links: 10 of 12 links are fully consistent. 2 warnings found:
- Information Register → Contractual Provisions: 2 of 15 providers (Bloomberg, Salesforce) have incomplete subcontracting chain data in Template B05 — contractual amendments should include mandatory subcontracting disclosure clauses.
- Resilience Testing → BCP/DRP: The semi-annual switchover test for Bloomberg Terminal failover has not been scheduled yet — the testing program references it but no test date is assigned.
Regulatory readiness: 94% — address 2 warnings before the next supervisory review cycle.
Effort comparison: traditional consulting vs. tool-assisted
Based on typical DORA compliance program effort for a mid-sized EU financial entity:
| Task | Traditional consulting | Rakenne |
|---|---|---|
| Gap assessment | 2-3 weeks | 1 session (~2 hours) |
| ICT risk framework | 4-6 weeks | 2-3 sessions |
| Information register | 3-4 weeks per arrangement | 1 session per batch |
| Full DORA program | 6-12 months | 4-8 weeks |
The heaviest documentation activities — information register population, contractual provision review, and policy generation — are exactly where the validation tools add the most value. They do not replace compliance officer judgment on risk appetite or proportionality decisions. They eliminate the mechanical errors and omissions that consume review cycles: missing ITS fields, inconsistent provider classifications, weak contractual language, and orphaned cross-references between pillars.
Getting started
- Create a new project in Rakenne and select the DORA Compliance workspace template
- All 12 skills and validation tools are automatically installed
- Start with the Gap Assessment — provide your entity’s details, existing certifications, and ICT landscape, and let the agent score your current posture across all five pillars
- Follow the 12-step sequence through the pillar structure, or jump to specific skills based on your gap assessment priorities
- Use the traceability dashboard to track progress and identify cross-pillar inconsistencies
Each skill is independent but reads artifacts from earlier steps. You can run them in any order, but the recommended sequence ensures each skill has the context it needs from prior outputs — the ICT risk framework informs the BCP/DRP, the information register feeds into contractual provisions, and the board report aggregates everything.
Summary
The DORA compliance workspace template turns a complex, multi-pillar regulatory program into a structured, validated process. The 12 skills cover all five DORA pillars plus governance, and the 40+ validation tools enforce the same checks a senior regulatory compliance consultant would apply — consistently, automatically, and traceably.
What sets this apart from any other approach — templates, generic AI, or even dedicated RegTech platforms — is the cross-pillar traceability web. Automated checks verify that ICT risks trace to contractual provisions, contractual provisions trace to the information register, incident classification criteria align with reporting procedures, resilience tests validate recovery targets, and board reports reference accurate source data. When a link breaks, the agent detects it, explains why, and fixes it — before a supervisor ever sees the gap.
The result is not a set of generic regulatory templates. It is a set of internally consistent, entity-specific, article-aligned artifacts that reference each other, link risks to providers to contracts to tests to reports, and flag gaps before a supervisory review does.
Try it yourself
Open a workspace with the skills described in this article and start drafting in minutes.
Get Started Free — No Sign-Up