DORA Article 28 — Mapping Controls to Evidence
This mapping links DORA Article 28 obligations to concrete technical and organizational controls, and the evidence auditors expect to verify. It is designed to eliminate ambiguity between regulatory text, implementation, and audit verification. 1. ICT Third-Party Identification Article 28 Requirement Financial entities shall identify and maintain an inventory of all ICT third-party service providers. Controls … Read more