# Regulatory Technical Standards - DORA | ManageEngine Endpoint Central
## RTS on ICT risk management tools, methods, processes, and policies and the simplified ICT risk management framework
**Regulatory Technical Standards on ICT risk management tools, methods, processes, and policies and the simplified ICT risk management framework**
The European Supervisory Authorities (ESAs)—including the European Banking Authority (EBA), the European Insurance and Occupational Pensions Authority (EIOPA), and the European Securities and Markets Authority (ESMA)—are collaborating to develop the Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) to provide detailed guidance for implementing DORA's requirements. Released in two batches, the first RTS, now finalized and approved by the European Commission, focuses on ICT risk management tools, methods, processes, and policies, as well as the simplified ICT risk management framework.
Endpoint Central supports the standards outlined in this RTS, providing organizations with seamless alignment to these requirements.
| Article | Summary of the Article | How Endpoint Central helps |
|---|---|---|
| 2 | **General Elements of ICT Security Policies, Procedures, Protocols, and Tools**
**Integration with ICT Risk Management Framework**
Financial entities must ensure their ICT security policies, procedures, and tools are embedded within their ICT risk management framework, as required under DORA (Regulation (EU) 2022/2554). These measures should:
- Ensure network security
- Safeguard against intrusions and data misuse.
- Maintain data availability, authenticity, integrity, and confidentiality, including encryption.
- Enable accurate and timely data transmission without disruptions.
- Alignment with the Digital Operational Resilience Strategy
**ICT security policies must:**
- Align with the financial entity’s information security objectives, as outlined in its digital operational resilience strategy under DORA.
- Specify the date of formal approval by the management body.
**Include mechanisms to:**
- Monitor implementation.
- Record and manage exceptions while ensuring operational resilience.
- Responsibilities and Compliance
**ICT security policies should:**
- Clearly define responsibilities at all staff levels.
- Specify consequences for non-compliance (if not covered by other internal policies).
- Detail required documentation and its maintenance.
- Define segregation of duties using models like the three lines of defense to prevent conflicts of interest.
- Best Practices, Standards, and Roles
**Policies must:**
- Consider leading practices and standards, as defined in relevant EU regulations.
- Identify clear roles and responsibilities for developing, implementing, and maintaining ICT security measures.
- Adaptability and Periodic Review
- Policies must be reviewed periodically as per DORA requirements.
**They should account for material changes, such as:**
- Shifts in activities or processes.
- Changes in the cyber threat landscape.
- Updates to legal obligations.
| Endpoint Central can leverage its endpoint security features such as Endpoint DLP, Browser security, Risk based Vulnerability and Patch management, Next-Gen Antivirus engine, Anti-Ransomware and mobile security capabilities.
In case of a malware attack, Endpoint Central can alert the SOC team and IT admins and enable them to quarantine the system safely.
Endpoint Central offers advanced [data leakage prevention capabilities](https://www.manageengine.com/endpoint-dlp/), enabling the detection and classification of personally identifiable information (PII).
It provides complete control over data flow within your IT environment by allowing administrators to configure policies for data transfers through cloud services and peripheral devices.
It also can containerize corporate and personal data and perform remote wipes if the device gets stolen. |
| 3 | **ICT Risk Management**
**Risk Tolerance Approval**
- Include approval of the ICT risk tolerance level as defined under DORA.
**Risk Assessment Procedure**
- Establish methods to assess ICT risks by identifying:
- Vulnerabilities and threats affecting business functions, ICT systems, and assets.
- Indicators to measure the likelihood and impact of these vulnerabilities and threats.
**Risk Treatment Measures**
- Define processes to identify, implement, and document measures to address ICT risks, ensuring they remain within approved tolerance levels.
**Management of Residual Risks**
For remaining risks after treatment:
- Identify and document these residual risks.
- Assign roles for accepting residual risks that exceed tolerance levels and for reviewing them annually.
- Maintain an inventory with justifications for accepted residual risks.
- Annually review accepted residual risks to assess changes, mitigation options, and whether the reasons for acceptance are still valid.
**Continuous Monitoring**
Monitor:
- Changes in the ICT risk and cyber threat landscape.
- Internal and external vulnerabilities.
- ICT risks to promptly detect changes affecting the entity’s risk profile.
- Adaptability to Strategic Changes
- Ensure processes account for changes in the financial entity's business strategy or digital operational resilience strategy.
**Effectiveness of Risk Treatment**
- Monitor the effectiveness of ICT risk treatment measures.
- Assess whether the entity's risk tolerance levels have been met.
- Identify and implement corrective actions where necessary.
| Endpoint Central delivers robust vulnerability management by offering continuous assessment and comprehensive visibility of threats through a centralized console. Beyond vulnerability assessment, it also includes built-in tools for remediating detected vulnerabilities.
For information systems, Endpoint Central enables [risk-based vulnerability management](https://www.manageengine.com/vulnerability-management/risk-based-vulnerability-management.html), allowing administrators to prioritize vulnerabilities using metrics such as CVSS scores, CVE impact types, patch availability, and more.
It also serves as a unified platform for IT operations and security teams to manage efficiently and secure endpoints. With [role-based access control](https://www.manageengine.com/products/desktop-central/role-based-administration.html), security tasks within the IT environment can be delegated to dedicated security specialists, ensuring streamlined and focused management. |
*The remaining articles (4 through 39) continue in the same structured format, detailing each DORA RTS requirement and how Endpoint Central supports compliance across ICT asset management, encryption and cryptographic controls, vulnerability and patch management, access control, network security, incident management, ICT operations security, business continuity planning, and ICT project and change management, with corresponding feature mappings and relevant product links from ManageEngine Endpoint Central.*