Compute
High-performance, scalable computing resources for your critical workloads. Orchestrate your cloud-native applications with our modern container solutions.
Discover the Compute offer
Virtual machines
VM Instances
An on-demand, flexible and secure virtual machine solution on a shared infrastructure.
Dedicated servers
OpenSource IaaS
Open source virtualised infrastructure in a trusted SecNumCloud-qualified cloud environment for complete technological sovereignty.
VMWare IaaS
Your VMware virtual machines in a trusted SecNumCloud-qualified and HDS-certified cloud environment.
Bare Metal
Dedicated, fully customisable servers for total autonomy over your sovereign infrastructure.
Containers
PaaS OpenShift
The unified platform for creating, modernising and deploying your large-scale applications in a sovereign cloud.
Managed Kubernetes
Managed container orchestration solution offering security, resilience and advanced automation on sovereign infrastructure.
Storage
Adaptable, high-performance storage solutions for all your needs. Optimise your data with our highly available block and object solutions.
Discover our Storage offer
Storage
Block storage
The adaptable block storage solution for optimum storage performance in a sovereign cloud.
Object storage
The scalable, cost-effective storage solution for your unstructured data in a sovereign cloud.
Backup
Backup solutions
Differentiated backup solutions tailored to your challenges and environments
Network
Advanced network solutions to connect and secure your infrastructures. Deploy your private networks automatically and securely.
Discover the Network offer
Network
Virtual Private Cloud
Deploy and manage your private networks 100% automatically and securely.
Private Backbone
Take full control of your network with extended Layer 2 connectivity, designed for hybrid architectures and bespoke configurations.
Firewall
Managed Firewall
Advanced security solutions for complete insulation and enhanced protection
Accommodation Dry
Housing - Dedicated space
Secure hosting for your equipment in a dedicated or shared environment, depending on your needs.
Security
Advanced security solutions to protect your critical infrastructures. Control access and defend against online threats.
Discover the Security offer
Security
Anti DDoS
The shield against online attacks
Bastion host
Transparent, centralised access control for robust protection of your infrastructure
Managed KMS
Sovereign cryptographic key management, with HSM hardware root of trust, to protect your most sensitive data on SecNumCloud infrastructure.
Managed SIEM
A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).
AI
Artificial intelligence solutions to transform your data into insights and accelerate your business processes.
Discover the AI offer
AI
LLMaaS
Access cutting-edge language models on a sovereign, SecNumCloud-qualified and HDS-certified infrastructure for high-performance, secure AI applications.
GPU
NVIDIA GPU instances to accelerate your artificial intelligence and high-performance computing in a sovereign cloud.
Data
Data solutions to manage, analyse and exploit your critical data.
Discover the Data offer
Databases
Managed MariaDB
A fully managed MariaDB relational database and PITR backup on SecNumCloud sovereign infrastructure.
Managed PostGreSQL
The fully managed relational database solution on SecNumCloud sovereign infrastructure
Big Data
Managed Kafka
The open-source distributed platform for streaming data in real time
Managed File System
A managed, sovereign, high-availability distributed file system, accessible via NFS and SMB on the SecNumCloud infrastructure.
Management & Governance
Coaching and support services to help you with your cloud transformation.
Find out about our support services
Support
Support levels
Discover the 3 levels of support available to help you meet your challenges.
Professional services
From design to optimisation, Cloud Temple is with you every step of the way.
Governance
Console - API - Terraform Provider
A single interface for viewing and managing your products and services
Observability
Infrastructure metrics available in market standards
Toutes nos fiches > Understanding the Digital Operational Resilience Act in 5 minutes
Published on 11/29/2024

DORA, in plain English
THE FACTS

The Digital Operational Resilience Act is a regulation
which aims to strengthen the resilience
the financial sector's digital operations within
of the European Union, establishing a framework
uniform approach to risk management
Information and Communication Technologies
(ICT).
It will be directly applicable in all Member States
members of the EU from 17 January 2025, without
require national transposition.

THE CONTEXT

Faced with the growing dangers posed by the digitalisation of the
financial sector, the European Commission has launched
the DORA initiative in September 2020. This is part of a
global strategy to strengthen digital finance
in Europe, responding to the growing vulnerability of
digital systems.
DORA is a "lex specialis" which specifies, completes and
premium over NIS 2 for the financial sector for the management of
information technology risks. It must
come into force in January 2025.

THE PILLARSWHAT IMPACT WILL THIS HAVE ON THE PLAYERS INVOLVED?
Risk management
ICT
DORA requires entities to establish a robust ICT risk management framework,
encompassing asset identification, threat protection, risk management
incident detection and response processes. Companies must
demonstrate their mastery of digital risks and have strategies in place to
management.
Resilience tests
operational digital
DORA makes regular resilience testing compulsory
including vulnerability analyses, analysis of the impact of the
penetration tests, crisis simulations and recovery tests. These
assessments are intended to confirm the ability of entities to continue their
critical activities during major disruptions.
Incident management
and reporting
DORA calls for improved incident management with procedures for
detection and classification according to severity. The entities must
rapidly report major incidents to the authorities and share information with
information on threats with other players, thereby promoting a more effective
improved sector responsiveness.
Risk management
third parties and suppliers
ICT services
In the face of dependence on ICT providers and cloud services, DORA is establishing a
strict management of third-party risks. This includes prior assessment
detailed safety contracts, continuous surveillance
performance and exit strategies for critical suppliers.
ANALYSIS
Giuliano Ippoliti, Director of Compliance at Cloud Temple

"Inspired by the management principles of the ISO 27001 standard and complementing the NIS 2 directive, the DORA regulation focuses on the operational resilience of the entire financial sector in the face of digital disruption, particularly in the event of a cyber crisis. It emphasises the importance of organisations developing a proactive capacity to anticipate, respond and adapt, in order to ensure business continuity."

WHO HAS TO COMPLY WITH DORA?

DORA applies to 21 types of entity
financial institutions such as
credit institutions, investment firms and insurers,
fund managers and investment
crypto-assets.
The regulations also extend to
critical third-party suppliers of ICT services to
these entities, such as service providers
cloud and cybersecurity platforms
data analysis or even
infrastructure and network providers
reviews.


Receive the latest cloud news
Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.