# Regulatory Technical Standards - DORA | ManageEngine Endpoint Central ## RTS on ICT risk management tools, methods, processes, and policies and the simplified ICT risk management framework **Regulatory Technical Standards on ICT risk management tools, methods, processes, and policies and the simplified ICT risk management framework** The European Supervisory Authorities (ESAs)—including the European Banking Authority (EBA), the European Insurance and Occupational Pensions Authority (EIOPA), and the European Securities and Markets Authority (ESMA)—are collaborating to develop the Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) to provide detailed guidance for implementing DORA's requirements. Released in two batches, the first RTS, now finalized and approved by the European Commission, focuses on ICT risk management tools, methods, processes, and policies, as well as the simplified ICT risk management framework. Endpoint Central supports the standards outlined in this RTS, providing organizations with seamless alignment to these requirements. | Article | Summary of the Article | How Endpoint Central helps | |---|---|---| | 2 | **General Elements of ICT Security Policies, Procedures, Protocols, and Tools**
**Integration with ICT Risk Management Framework**

Financial entities must ensure their ICT security policies, procedures, and tools are embedded within their ICT risk management framework, as required under DORA (Regulation (EU) 2022/2554). These measures should:

**ICT security policies must:**

**Include mechanisms to:**

**ICT security policies should:**

**Policies must:**

**They should account for material changes, such as:**
| Endpoint Central can leverage its endpoint security features such as Endpoint DLP, Browser security, Risk based Vulnerability and Patch management, Next-Gen Antivirus engine, Anti-Ransomware and mobile security capabilities.

In case of a malware attack, Endpoint Central can alert the SOC team and IT admins and enable them to quarantine the system safely.

Endpoint Central offers advanced [data leakage prevention capabilities](https://www.manageengine.com/endpoint-dlp/), enabling the detection and classification of personally identifiable information (PII).

It provides complete control over data flow within your IT environment by allowing administrators to configure policies for data transfers through cloud services and peripheral devices.

It also can containerize corporate and personal data and perform remote wipes if the device gets stolen. | | 3 | **ICT Risk Management**

**Risk Tolerance Approval**

**Risk Assessment Procedure**

**Risk Treatment Measures**

**Management of Residual Risks**
For remaining risks after treatment:

**Continuous Monitoring**
Monitor:

**Effectiveness of Risk Treatment**
| Endpoint Central delivers robust vulnerability management by offering continuous assessment and comprehensive visibility of threats through a centralized console. Beyond vulnerability assessment, it also includes built-in tools for remediating detected vulnerabilities.

For information systems, Endpoint Central enables [risk-based vulnerability management](https://www.manageengine.com/vulnerability-management/risk-based-vulnerability-management.html), allowing administrators to prioritize vulnerabilities using metrics such as CVSS scores, CVE impact types, patch availability, and more.

It also serves as a unified platform for IT operations and security teams to manage efficiently and secure endpoints. With [role-based access control](https://www.manageengine.com/products/desktop-central/role-based-administration.html), security tasks within the IT environment can be delegated to dedicated security specialists, ensuring streamlined and focused management. | *The remaining articles (4 through 39) continue in the same structured format, detailing each DORA RTS requirement and how Endpoint Central supports compliance across ICT asset management, encryption and cryptographic controls, vulnerability and patch management, access control, network security, incident management, ICT operations security, business continuity planning, and ICT project and change management, with corresponding feature mappings and relevant product links from ManageEngine Endpoint Central.*