Skip to content

DORA Regulation

18 rules checking EU Digital Operational Resilience Act (2022/2554) compliance for financial entities. DORA establishes uniform requirements for the security of network and information systems supporting business processes in the financial sector.

Rule IDSeverityDORA ReferenceCategorySummary
DORA-NET-001HIGHArt. 9(3)(a)Insecure ProtocolsUnencrypted protocol detected
DORA-NET-002CRITICALArt. 7(1)Deprecated ProtocolsDeprecated or broken protocol detected
DORA-NET-010CRITICALArt. 9(4)(b), Art. 9(4)(c)Overly PermissiveAny-to-any unrestricted traffic
DORA-NET-011CRITICALArt. 9(4)(c)Overly PermissiveOverly broad source address
DORA-NET-012CRITICALArt. 9(4)(c)Overly PermissiveOverly broad destination address
DORA-NET-013CRITICALArt. 9(4)(c)Overly PermissiveAll ports or wide port range allowed
DORA-NET-014HIGHArt. 9(2)Overly PermissiveAll protocols (ANY) allowed
DORA-NET-020CRITICALArt. 9(4)(c)Network SegmentationDirect internet-to-internal access
DORA-NET-021CRITICALArt. 9(4)(c)Database ExposureDatabase ports exposed from broad source
DORA-NET-030CRITICALArt. 9(4)(c)Remote AccessRemote admin from external without VPN
DORA-NET-031HIGHArt. 9(4)(c)Administrative AccessAdmin protocols from broad sources
DORA-NET-032HIGHArt. 9(4)(c), Art. 28(5)Third-Party ICTThird-party ICT access from overly broad source
DORA-NET-033CRITICALArt. 9(4)(c)Financial MessagingFinancial messaging infrastructure ports exposed
DORA-NET-034CRITICALArt. 9(4)(c)Container ExposureContainer/orchestration APIs exposed
DORA-NET-035CRITICALArt. 9(4)(c)Risky Service ExposureHigh-risk service from broad source
DORA-NET-036MEDIUMArt. 9(2)DNS and Covert ChannelsDNS as covert channel from internal segment
DORA-NET-037CRITICALArt. 9(4)(b)ICS/SCADA IsolationICS/SCADA protocols crossing zone boundaries
DORA-NET-038MEDIUMArt. 9(2)Rule DocumentationNo application name or business justification