DORA Compliance
Overview: DORA Conformity of imc Express
The Digital Operational Resilience Act (DORA) establishes comprehensive requirements for the digital operational resilience of financial institutions. imc Express meets the essential DORA pillars through its robust security architecture and established compliance practices.
1. ICT Risk Management Framework
ISO 27001 Certification as Foundation
- Implemented: Complete Information Security Management System (ISMS)
- Compliance Relevance: Meets DORA requirements for structured ICT risk management
- Evidence: Certified development team with continuous security training
Defined Security Processes
- Security Incident Management: Structured processes according to ISO 27001 for handling security events
- Risk Assessment: Regular identification and evaluation of ICT risks
- Governance: Clear responsibilities and escalation paths implemented
2. ICT-Related Incident Management
Incident Response Framework
- Structured Approach: Defined processes for security events within the ISO 27001 framework
- Stakeholder Communication: Established procedures for informing all stakeholders
- Preventive Measures: Systematic analysis to prevent future incidents
Audit Logging and Traceability
- Comprehensive Audit Log: Chronological recording of all system activities
- Categorized Events: Detailed logging of authentication, user and project management
- Compliance Support: Complete traceability for regulatory requirements
3. Digital Operational Resilience Testing
Regular Penetration Testing
- External Expertise: Conducted by independent security experts
- Vulnerability Assessment: Systematic identification of vulnerabilities
- Continuous Improvement: Regular testing to strengthen defense mechanisms
Automated Security Checks
- Code Analysis: Automatic review of entire source code for security vulnerabilities
- Dependency Scanning: Continuous monitoring of all dependencies for known vulnerabilities
- Container Security: Automatic verification of all container images before deployment
4. ICT Third-Party Risk Management
Secure Cloud Infrastructure
- AWS Frankfurt: Hosting in EU region with highest security standards
- Certified Infrastructure: AWS compliance with international standards (ISO, SOC)
- Encrypted Data Transmission: All third-party interfaces TLS encrypted
Documented Data Flows
- Transparent Architecture: Complete documentation of all data processing procedures
- Subcontractor Management: Secure and encrypted connections to all partners
- Risk Assessment: Regular evaluation of third-party risks
5. Operational Resilience
High Availability Architecture
- Kubernetes Cluster: Automatic failover mechanisms and load distribution
- Multi-Zone Deployment: Distribution across multiple availability zones in Frankfurt
- Scalability: Automatic resource adjustment during load spikes
Business Continuity Management
- Automated Backups: Frequent and routine data backups
- Disaster Recovery: Established procedures for rapid recovery
- Continuous Monitoring: 24/7 monitoring of critical systems
DDoS Protection and Network Security
- AWS Shield: Professional protection against Denial-of-Service attacks
- Web Application Firewall (WAF): Protection against cyber attacks like SQL injection
- Intrusion Detection: Containerized security architecture with native Kubernetes tools
6. Data Protection and Encryption
End-to-End Encryption
- Data in Transit: TLS 1.3 with AES-256-GCM encryption
- Data at Rest: AES-256 encryption for all stored data
- Key Management: Automatic key rotation every 12 months
GDPR Compliance
- Privacy by Design: Integrated data protection measures in system architecture
- User Rights: Complete support for all GDPR user rights
- Staff Training: Regular GDPR training for the entire development team
7. Continuous Improvement
Agile Security Development
- DevSecOps: Security as integral part of the development process
- Continuous Monitoring: Permanent monitoring and improvement of security measures
- Feedback Integration: Systematic incorporation of security feedback into new releases
Proactive Threat Intelligence
- OWASP Compliance: Consideration of all OWASP standards and best practices
- Vulnerability Management: Proactive identification and remediation of security vulnerabilities
- Security Updates: Immediate provision of hotfixes for critical security issues