5X Platform: Comprehensive DORA Compliance Assessment and Roadmap

This document provides an in-depth analysis of 5X's current compliance status with the Digital Operational Resilience Act (DORA) and outlines our strategy for achieving full compliance by mid-2025. As a provider of critical Information and Communications Technology(ICT) services to financial entities, we are committed to meeting DORA's stringent standards for digital operational resilience.
This document details our current strengths, areas for enhancement, and a clear roadmap towards full DORA compliance. This assessment is structured around the following key areas of DORA:
ICT risk management, incident management and reporting
Digital operational resilience testing
Third-party risk management
Information sharing
Data protection
Business continuity
Cloud computing.
For each area, we provide a detailed analysis of our current status and specific enhancements planned to meet DORA requirements.

Data Residency

At 5X, we have a unique approach to data management that provides a significant advantage in terms of DORA compliance and overall data security:
Customer Data Residency: All primary customer data remains within the customer's own data warehouse (e.g., Snowflake, Google BigQuery). This means that 5X does not directly store or process our clients' sensitive financial data.
Metadata Processing: 5X only processes metadata, such as usernames, emails, and connection details to data warehouses. This minimizes our data footprint and significantly reduces the risk profile of our service.
Flexible Infrastructure: Our platform is designed to accommodate various data residency requirements. While our primary infrastructure is hosted in AWS US East 1 (North Virginia), we can deploy to additional regions upon request to meet specific regulatory or customer needs.
This approach offers several benefits in the context of DORA compliance:
Reduced Risk Exposure: By not directly handling sensitive financial data, we minimize the risk of data breaches and the associated regulatory implications.
Enhanced Data Protection: Customers maintain control over their data, aligning with DORA's emphasis on data protection and sovereignty.
Simplified Compliance: Our model simplifies compliance with data localization requirements, as customer data remains in their chosen locations.
Transparency: Clear separation between customer data and our processed metadata enhances transparency and auditability.

Current DORA Compliance Status and Enhancement Areas

The following section provides a comprehensive overview of 5X's current alignment with DORA requirements across key operational areas. For each area, we detail our existing strengths and identify specific enhancements needed to achieve full DORA compliance, offering a clear picture of our compliance journey.

1. ICT Risk Management Framework

Current Compliance:

✅ Comprehensive risk assessment and management processes
Annual risk assessments covering threats and changes to service commitments
Documented risk management program including threat identification, risk rating, and mitigation strategies
Clear risk tolerance levels established and reviewed annually
✅ Established control environment
Defined organizational structure with assigned roles and responsibilities
Regular review and updates of information security policies and procedures
Management oversight of risk management activities

Enhancement Areas:

Develop ICT-specific risk management strategies aligned with financial sector requirements
Enhance risk assessment methodology to include DORA-specific risk scenarios
Implement more granular risk reporting mechanisms for financial sector-specific ICT risks
Establish a dedicated ICT risk management function with direct reporting to senior management
Develop comprehensive ICT asset management processes, including dependencies and interconnections

2. ICT-Related Incident Management, Classification, and Reporting

Current Compliance:

✅ Established incident response procedures
Documented incident response policies and procedures
Incident logging, tracking, and communication processes in place
Defined roles and responsibilities for incident management
Clearly defined root cause analysis processes and documentation
✅ Monitoring and detection capabilities
Use of intrusion detection systems for continuous monitoring
Log management tools to identify potential security events
Regular vulnerability scans and security assessments

Enhancement Areas:

Adapt incident classification and severity thresholds to align with DORA's major incident criteria
Implement automated reporting mechanisms to meet DORA's strict timeframes (e.g., initial notification within 4 hours)
Develop financial sector-specific incident scenarios and response playbooks
Establish formal communication channels with relevant financial supervisory authorities for incident reporting

3. Digital Operational Resilience Testing

Current Compliance:

✅ Regular security testing
Quarterly vulnerability scans on external-facing systems
Annual penetration testing with remediation plans for identified vulnerabilities
Continuous monitoring and patch management processes
✅ Testing documentation and review
Documented results of security tests and assessments
Management review of testing outcomes and remediation actions

Enhancement Areas:

Implement a formal Threat-Led Penetration Testing (TLPT) program as per DORA requirements
Enhance scenario-based testing to include financial sector-specific attack vectors
Establish partnerships with DORA-accredited testing providers
Develop a comprehensive resilience testing strategy covering all critical ICT systems and processes
Implement advanced testing methodologies, including simulations of large-scale cyber attacks

4. ICT Third-Party Risk Management

Current Compliance:

✅ Vendor management program
Critical third-party vendor inventory maintained
Annual review of critical third-party vendors
Due diligence processes for vendor selection
✅ Contractual safeguards
Written agreements with vendors including confidentiality and privacy commitments
Right-to-audit clauses for critical service providers

Enhancement Areas:

Develop more granular risk assessment criteria for financial sector ICT services
Enhance monitoring and reporting mechanisms to meet DORA's oversight requirements
Implement more rigorous testing of exit plans and transition arrangements
Establish processes for continuous monitoring of critical ICT third-party providers
Develop comprehensive sub-outsourcing policies and controls

5. Information and Intelligence Sharing

Current Compliance:

✅ Established communication channels
Procedures for notifying customers of critical system changes
External-facing support system for reporting issues and concerns

Enhancement Areas:

Establish formal processes for sharing information with financial supervisory authorities
Develop mechanisms for secure and timely sharing of incident-related information with affected clients
Expand participation in financial sector-specific threat intelligence sharing platforms
Implement secure communication channels for sharing sensitive information
Develop policies and procedures for responsible disclosure of vulnerabilities

6. Data Protection and Processing

Current Compliance:

✅ Strong data protection measures
Data classification policy to ensure proper security of confidential data
Encryption of sensitive customer data at rest
Access controls and monitoring for systems processing customer metadata
✅ Data minimization and purpose limitation
Processing limited to metadata; customer data remains in their own data warehouses
Clear data handling and processing activities documented
✅ Flexible data residency options
Primary infrastructure in AWS US East 1, with ability to deploy to other regions as needed
Customer data remains in client-controlled environments, enhancing data sovereignty

Enhancement Areas:

Enhance data protection impact assessments to specifically address financial sector risks
Implement more granular data lineage tracking for financial transaction-related metadata
Develop specific data protection measures for financial data processing
Enhance data breach notification processes to align with DORA requirements

7. Business Continuity Management

Current Compliance:

✅ Documented business continuity plan
Annual testing of the business continuity plan
Defined recovery time objectives (RTOs) and recovery point objectives (RPOs)
Detailed communication plans for various disruption scenarios
✅ Backup and recovery processes
Regular backups of critical data
Documented and tested recovery procedures

Enhancement Areas:

Enhance business continuity plans to specifically address ICT-related disruptions
Establish alternate sites and redundant systems for critical ICT services
Enhance resilience of critical ICT systems to meet DORA's stringent uptime requirements

8. Cloud Computing and Outsourcing

Current Compliance:

✅ Cloud service provider management
Due diligence processes for cloud service provider selection - 5X currently uses AWS as the cloud provider.
Monitoring of cloud service provider performance and compliance

Enhancement Areas:

Implement stronger controls for data portability and interoperability
Develop comprehensive exit strategies for cloud services
Enhance monitoring and auditing capabilities for cloud-based services

Roadmap to Full Compliance

Timeline
Milestone
Key Actions
Q3-Q4 2024
Comprehensive Gap Analysis and Planning
Conduct detailed DORA readiness assessment across all areas Develop comprehensive DORA compliance project plan
Q1 2025
Implementation of Enhanced Measures
Implement TLPT program Enhance incident reporting and business continuity mechanisms Develop financial sector-specific risk assessment criteria
Q2 2025
Internal Audit and Adjustments
Conduct thorough internal audit of all DORA-related controls Perform comprehensive tabletop exercises to test new processes Make final adjustments based on audit findings
Q2-Q3 2025
External Verification and Documentation
Engage external auditors for DORA compliance verification Prepare comprehensive compliance documentation Conduct extensive staff training on new DORA-compliant processes
There are no rows in this table


5X is fully committed to achieving comprehensive DORA compliance by Q2 2025. While our current SOC2 Type II certification and GDPR compliance provide a strong foundation, we recognize the enhancements required to fully meet DORA's specific requirements for critical ICT third-party providers in the financial sector.
We maintain a proactive stance on regulatory compliance and are dedicated to transparency throughout our DORA compliance journey. Our compliance team is available to provide further details or discuss specific compliance aspects. For any compliance-related inquiries, please contact us at .
This document will be regularly updated to reflect our progress and any relevant regulatory developments.
Last Updated: October 7th, 2024
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.