{"id":1712,"date":"2024-08-09T23:58:09","date_gmt":"2024-08-09T23:58:09","guid":{"rendered":"https:\/\/global.craft.co\/?p=1712"},"modified":"2024-10-04T17:51:47","modified_gmt":"2024-10-04T17:51:47","slug":"understanding-the-digital-operational-resilience-act-dora","status":"publish","type":"post","link":"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/","title":{"rendered":"Understanding the Digital Operational Resilience Act (DORA)"},"content":{"rendered":"<h2>What is the Digital Operational Resilience Act?<\/h2>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.eiopa.europa.eu\/digital-operational-resilience-act-dora_en\">The Digital Operational Resilience Act (DORA)<\/a> is a new set of rules passed by the European Union that came into effect on January 16, 2023, with full application beginning on January 17, 2025, to strengthen the financial sector&#8217;s digital defenses, requiring banks, insurance firms, investment companies, and similar institutions to improve their digital security. This includes having good plans, training employees, testing systems regularly, and being transparent when problems arise. DORA aims to prevent widespread disruptions caused by cyberattacks, system failures, and other tech-related problems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The core themes of DORA are risk management, incident response and reporting, digital operational resilience testing, third-party risk management, and information sharing. These elements build a comprehensive strategy for assessing risks, handling incidents, testing defenses, ensuring vendor security, and collaborating through information sharing.<\/span><\/p>\n<h2>How will DORA affect businesses?<\/h2>\n<p><span style=\"font-weight: 400;\">With recent increased frequency and sophistication of cyberattacks, DORA aims to prevent severe consequences from cyber crime by setting strict <a href=\"https:\/\/global.craft.co\/solution\/supplier-risk-management\/\">risk management<\/a> standards across the board for financial institutions like banks, insurance firms, investment companies, and even crypto-asset service providers. This applies not only to the institutions themselves, but also to the tech companies they rely on for services like cloud and data management.\u00a0<\/span><\/p>\n<p>Penalties for noncompliance with DORA can be severe, including:<\/p>\n<p class=\"p1\"><b>1. Financial Penalties<\/b><\/p>\n<p class=\"p3\">Entities that fail to comply with DORA may face substantial fines. The amount can vary, but is typically proportionate to the gravity of the breach and the financial strength of the entity. Fines can be revenue-based, daily, cumulative, or a combination of various fine types depending on the violation. In some instances, fines may be reduced if the entity can demonstrate that it has taken steps to mitigate the impact of the breach or has cooperated fully with regulatory authorities during the investigation.<\/p>\n<p class=\"p1\"><b>2. Operational Restrictions<\/b><\/p>\n<p class=\"p3\">In cases of severe noncompliance, regulatory authorities may impose restrictions on the entity\u2019s operations. This could include limiting the scope of activities the entity is allowed to perform or suspending certain operations until compliance is achieved.<\/p>\n<p class=\"p1\"><b>3. Increased Supervision<\/b><\/p>\n<p class=\"p3\">Entities that fail to meet DORA\u2019s requirements may be subject to increased supervision by regulatory authorities. This could involve more frequent audits, mandatory reporting requirements, or other oversight measures designed to ensure future compliance.<\/p>\n<p class=\"p1\"><b>4. Reputational Damage<\/b><\/p>\n<p class=\"p3\">Noncompliance with DORA can lead to reputational damage, especially if breaches are made public. Regulatory authorities may disclose noncompliance to the public, damaging the entity\u2019s reputation and trustworthiness in the market.<\/p>\n<p class=\"p1\"><b>5. Legal Consequences<\/b><\/p>\n<p class=\"p3\">In some cases, noncompliance could lead to legal actions by affected parties, including customers, partners, or other stakeholders who may have suffered losses due to the entity\u2019s failure to meet DORA\u2019s standards.<\/p>\n<p class=\"p1\"><b>6. Regulatory Actions<\/b><\/p>\n<p class=\"p3\">Authorities have the power to impose various regulatory sanctions, including issuing warnings, mandating corrective actions, or even revoking licenses in extreme cases.<\/p>\n<h2>What are DORA&#8217;s key requirements?<\/h2>\n<h3>ICT Risk Management and Governance<\/h3>\n<p><span style=\"font-weight: 400;\">DORA places a significant responsibility on management to stay informed about Information Communication and Technology (ICT) risks and create robust risk management frameworks. This means top executives and board members can be held accountable if their firm doesn&#8217;t meet DORA&#8217;s requirements. Firms must be proactive, documenting their systems and regularly assessing their risk profiles.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Under DORA, businesses must analyze their entire technology landscape. This involves identifying critical functions and assets, understanding their interconnections, and documenting their dependencies on each other and external providers. It&#8217;s like drawing up a battle plan for the digital world, identifying weaknesses and strengths.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Consider a bank relying on a cloud provider to store sensitive customer data. DORA requires the bank to assess the cloud service&#8217;s security and document potential risks, holding both the bank and the cloud provider responsible for maintaining high-security standards.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DORA mandates business impact analysis to play out &#8220;what if&#8221; scenarios, including service disruptions, cyberattacks, or natural disasters. Through these simulations, institutions determine their risk appetite, strengthen their digital infrastructure, and create robust business continuity plans.<\/span><\/p>\n<h3>Incident Response and Reporting<\/h3>\n<p><span style=\"font-weight: 400;\">If a major incident occurs, firms must be transparent with regulators and affected parties. They must file detailed reports outlining what happened, how they are addressing it, and how they&#8217;ll prevent it from happening again. There&#8217;s a clear structure for reporting serious incidents: an initial notification, updates on the resolution process, and a final, detailed analysis identifying root causes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Incident reporting could become complex across different countries and authorities. However, the European Supervisory Authorities (ESAs) are streamlining the process. They aim to establish common templates and explore a centralized EU reporting hub. This simplification will speed up response times and coordination across the financial landscape.<\/span><\/p>\n<h3>Digital Operational Resilience Testing<\/h3>\n<p><span style=\"font-weight: 400;\">DORA requires financial institutions to prove their defenses are strong through regular testing of their systems. This helps identify vulnerabilities and ensure protection measures are effective. These tests include vulnerability assessments, incident scenario simulations, and threat-led penetration testing (TLPT), essentially simulated cyberattacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The test results are reviewed by authorities, meaning firms must address weaknesses. This demonstrates a commitment to continuous improvement in their resilience.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Testing is an ongoing process. Each year, institutions must conduct basic tests to identify vulnerabilities early on. However, institutions critical to the financial system undergo a full TLPT simulation every three years. This testing also involves their key tech providers, ensuring everyone is on the same page regarding security. This strengthens the overall security posture.<\/span><\/p>\n<h3>Third-Party Risk Management<\/h3>\n<p><span style=\"font-weight: 400;\">DORA emphasizes third-party risk management, explicitly addressing the tech providers serving financial institutions. This is because a secure system is only as strong as its weakest external link. Financial institutions must proactively mitigate the risks posed by these third-party service providers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Financial institutions must ensure that any provider handling critical or important functions meet DORA&#8217;s strict security and operational requirements. This is because the institutions remain responsible even if the problem originates with an outside vendor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For instance, if a financial institution contracts a company for data processing, they can&#8217;t assume the processor&#8217;s security is adequate. DORA mandates strict contract agreements covering exit strategies, regular audits, security requirements, and performance benchmarks. These measures shift the responsibility for strong security from a &#8220;hope for the best&#8221; approach to a legally binding and supervised reality.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In 2019, the EBA established the<\/span><a href=\"https:\/\/www.eba.europa.eu\/regulation-and-policy\/internal-governance\/guidelines-on-ict-and-security-risk-management\"> <span style=\"font-weight: 400;\">Guidelines on ICT and security risk management<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/www.eba.europa.eu\/regulation-and-policy\/internal-governance\/guidelines-on-outsourcing-arrangements\"> <span style=\"font-weight: 400;\">Guidelines on outsourcing arrangements<\/span><\/a><span style=\"font-weight: 400;\">. Building on these, the MFSA released its Guidance on Technology Arrangements, ICT and Security Risk Management, and Outsourcing Arrangements in December 2020.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DORA empowers regulators to take action if necessary. They can force firms to terminate agreements with non-compliant tech companies, reinforcing that cybersecurity is not optional but the law.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Research shows that financial companies could spend up to 3% of their payroll on regulatory compliance. While this seems significant, compare it to the cost of major security breaches and reputational damage. The upfront investment in compliance is more appealing.<\/span><\/p>\n<h3>Information Sharing<\/h3>\n<p><span style=\"font-weight: 400;\">While not mandatory, DORA encourages financial services firms to collaborate and share threat intelligence. This means firms are encouraged to share information about cyber threats they&#8217;ve faced and the mitigation strategies they\u2019ve used. This fosters a collective defense effort, making everyone smarter and more effective.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, sharing sensitive information requires clear ground rules. Any intelligence sharing must comply with existing regulations for personal data protection. This ensures sensitive data remains protected even in collaborative environments.<\/span><\/p>\n<h3>Training and Staff Awareness<\/h3>\n<p><span style=\"font-weight: 400;\">Employees are often an organization&#8217;s most significant vulnerability regarding cyber threats. DORA emphasizes ongoing training and awareness programs for all staff members. These programs educate employees about cybersecurity threats, security procedures, and how to react during an technology incident.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many resources are available for staff training in data protection, cyber security, and compliance frameworks like GDPR, ISO 27001, PCI DSS, and CCPA. Training methods include classroom sessions, in-house training, live online courses,<\/span><a href=\"https:\/\/www.itgovernanceusa.com\/distance-learning\"> <span style=\"font-weight: 400;\">self-paced online training<\/span><\/a><span style=\"font-weight: 400;\">, and<\/span><a href=\"https:\/\/www.itgovernanceusa.com\/itg-elearning\"> <span style=\"font-weight: 400;\">e-learning programs<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2 class=\"p1\">How Craft Can Help<\/h2>\n<p><span style=\"font-weight: 400;\">Craft\u2019s<\/span><a href=\"https:\/\/global.craft.co\/solution\/supplier-risk-management\/\"> <span style=\"font-weight: 400;\">supplier risk management solutions<\/span><\/a><span style=\"font-weight: 400;\"> are designed to streamline compliance and enhance reporting. With our platform:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Identify risky suppliers<\/b><span style=\"font-weight: 400;\"> with in-depth company profiles and easily scalable due diligence<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Continuously monitor your supplier network<\/b><span style=\"font-weight: 400;\"> for changes and potential violations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Document your efforts<\/b><span style=\"font-weight: 400;\"> for proof of compliance<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Collaborate and share information<\/b><span style=\"font-weight: 400;\"> across teams for faster risk mitigation.<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/global.craft.co\/solution\/supplier-risk-management\/\"><b>Learn More<\/b><\/a><\/p>\n<h2>Conclusion<\/h2>\n<p><span style=\"font-weight: 400;\">DORA significantly impacts financial companies and technology firms. It represents a crucial shift in the European financial industry&#8217;s mindset regarding cybersecurity. Robust security measures are no longer optional but a legally mandated, centrally supervised, crucial aspect of business in today&#8217;s digital world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For an overview of regulations affecting the global supply chain, visit our <\/span><a href=\"https:\/\/global.craft.co\/compliance-hub\/\"><span style=\"font-weight: 400;\">compliance hub<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is the Digital Operational Resilience Act? The Digital Operational Resilience Act (DORA) is a new set of rules passed by the European Union that came into effect on January 16, 2023, with full application beginning on January 17, 2025, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/pt-sidebar.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22,57,56],"class_list":["post-1712","post","type-post","status-publish","format-standard","hentry","category-financial","category-quick-guides","category-regulatory-compliance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3 (Yoast SEO v25.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding the Digital Operational Resilience Act (DORA) | Craft.co<\/title>\n<meta name=\"description\" content=\"Learn about the Digital Operational Resilience Act (DORA), a new EU regulation designed to strengthen the digital security of financial institutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding the Digital Operational Resilience Act (DORA)\" \/>\n<meta property=\"og:description\" content=\"Learn about the Digital Operational Resilience Act (DORA), a new EU regulation designed to strengthen the digital security of financial institutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/\" \/>\n<meta property=\"og:site_name\" content=\"Craft.co\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/craftdotco\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-09T23:58:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-04T17:51:47+00:00\" \/>\n<meta name=\"author\" content=\"Jen McHam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@craftdotco\" \/>\n<meta name=\"twitter:site\" content=\"@craftdotco\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jen McHam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/\"},\"author\":{\"name\":\"Jen McHam\",\"@id\":\"https:\/\/global.craft.co\/#\/schema\/person\/ea3a11be7bf2e6e4c89582f016aafbf6\"},\"headline\":\"Understanding the Digital Operational Resilience Act (DORA)\",\"datePublished\":\"2024-08-09T23:58:09+00:00\",\"dateModified\":\"2024-10-04T17:51:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/\"},\"wordCount\":1421,\"publisher\":{\"@id\":\"https:\/\/global.craft.co\/#organization\"},\"articleSection\":[\"Financial\",\"Quick Guides\",\"Regulatory &amp; Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/\",\"url\":\"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/\",\"name\":\"Understanding the Digital Operational Resilience Act (DORA) | Craft.co\",\"isPartOf\":{\"@id\":\"https:\/\/global.craft.co\/#website\"},\"datePublished\":\"2024-08-09T23:58:09+00:00\",\"dateModified\":\"2024-10-04T17:51:47+00:00\",\"description\":\"Learn about the Digital Operational Resilience Act (DORA), a new EU regulation designed to strengthen the digital security of financial institutions.\",\"breadcrumb\":{\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/global.craft.co\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding the Digital Operational Resilience Act (DORA)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/global.craft.co\/#website\",\"url\":\"https:\/\/global.craft.co\/\",\"name\":\"Craft\",\"description\":\"Your path to supply chain resilience\",\"publisher\":{\"@id\":\"https:\/\/global.craft.co\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/global.craft.co\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/global.craft.co\/#organization\",\"name\":\"Craft\",\"url\":\"https:\/\/global.craft.co\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/global.craft.co\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/global.craft.co\/wp-content\/uploads\/2023\/12\/Craft_logo_positive_RGB.svg\",\"contentUrl\":\"https:\/\/global.craft.co\/wp-content\/uploads\/2023\/12\/Craft_logo_positive_RGB.svg\",\"caption\":\"Craft\"},\"image\":{\"@id\":\"https:\/\/global.craft.co\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/craftdotco\",\"https:\/\/x.com\/craftdotco\",\"https:\/\/www.linkedin.com\/company\/craft-machine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/global.craft.co\/#\/schema\/person\/ea3a11be7bf2e6e4c89582f016aafbf6\",\"name\":\"Jen McHam\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/global.craft.co\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fb877ff91f393d023051ec7ab5755677e9e4f9cd3d2722240ee0192972b72c02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fb877ff91f393d023051ec7ab5755677e9e4f9cd3d2722240ee0192972b72c02?s=96&d=mm&r=g\",\"caption\":\"Jen McHam\"},\"url\":\"https:\/\/global.craft.co\/blog\/author\/jenmcham\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding the Digital Operational Resilience Act (DORA) | Craft.co","description":"Learn about the Digital Operational Resilience Act (DORA), a new EU regulation designed to strengthen the digital security of financial institutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/","og_locale":"en_US","og_type":"article","og_title":"Understanding the Digital Operational Resilience Act (DORA)","og_description":"Learn about the Digital Operational Resilience Act (DORA), a new EU regulation designed to strengthen the digital security of financial institutions.","og_url":"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/","og_site_name":"Craft.co","article_publisher":"https:\/\/www.facebook.com\/craftdotco","article_published_time":"2024-08-09T23:58:09+00:00","article_modified_time":"2024-10-04T17:51:47+00:00","author":"Jen McHam","twitter_card":"summary_large_image","twitter_creator":"@craftdotco","twitter_site":"@craftdotco","twitter_misc":{"Written by":"Jen McHam","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/#article","isPartOf":{"@id":"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/"},"author":{"name":"Jen McHam","@id":"https:\/\/global.craft.co\/#\/schema\/person\/ea3a11be7bf2e6e4c89582f016aafbf6"},"headline":"Understanding the Digital Operational Resilience Act (DORA)","datePublished":"2024-08-09T23:58:09+00:00","dateModified":"2024-10-04T17:51:47+00:00","mainEntityOfPage":{"@id":"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/"},"wordCount":1421,"publisher":{"@id":"https:\/\/global.craft.co\/#organization"},"articleSection":["Financial","Quick Guides","Regulatory &amp; Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/","url":"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/","name":"Understanding the Digital Operational Resilience Act (DORA) | Craft.co","isPartOf":{"@id":"https:\/\/global.craft.co\/#website"},"datePublished":"2024-08-09T23:58:09+00:00","dateModified":"2024-10-04T17:51:47+00:00","description":"Learn about the Digital Operational Resilience Act (DORA), a new EU regulation designed to strengthen the digital security of financial institutions.","breadcrumb":{"@id":"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/global.craft.co\/blog\/understanding-the-digital-operational-resilience-act-dora\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/global.craft.co\/"},{"@type":"ListItem","position":2,"name":"Understanding the Digital Operational Resilience Act (DORA)"}]},{"@type":"WebSite","@id":"https:\/\/global.craft.co\/#website","url":"https:\/\/global.craft.co\/","name":"Craft","description":"Your path to supply chain resilience","publisher":{"@id":"https:\/\/global.craft.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/global.craft.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/global.craft.co\/#organization","name":"Craft","url":"https:\/\/global.craft.co\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/global.craft.co\/#\/schema\/logo\/image\/","url":"https:\/\/global.craft.co\/wp-content\/uploads\/2023\/12\/Craft_logo_positive_RGB.svg","contentUrl":"https:\/\/global.craft.co\/wp-content\/uploads\/2023\/12\/Craft_logo_positive_RGB.svg","caption":"Craft"},"image":{"@id":"https:\/\/global.craft.co\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/craftdotco","https:\/\/x.com\/craftdotco","https:\/\/www.linkedin.com\/company\/craft-machine\/"]},{"@type":"Person","@id":"https:\/\/global.craft.co\/#\/schema\/person\/ea3a11be7bf2e6e4c89582f016aafbf6","name":"Jen McHam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/global.craft.co\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fb877ff91f393d023051ec7ab5755677e9e4f9cd3d2722240ee0192972b72c02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb877ff91f393d023051ec7ab5755677e9e4f9cd3d2722240ee0192972b72c02?s=96&d=mm&r=g","caption":"Jen McHam"},"url":"https:\/\/global.craft.co\/blog\/author\/jenmcham\/"}]}},"_links":{"self":[{"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/posts\/1712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/comments?post=1712"}],"version-history":[{"count":0,"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/posts\/1712\/revisions"}],"wp:attachment":[{"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/media?parent=1712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/global.craft.co\/wp-json\/wp\/v2\/categories?post=1712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}