Skip to content

BAIT → DORA Mapping

BAIT ModuleDORA ArticleRTSChange Required
1. IT Strategy (AT 4.2)Art. 5Management personally responsible
2. IT Governance (AT 4.3.1)Art. 5–62024/1774Independent control function
3. Information Risk Management (BT 1)Art. 6–82024/1774Asset inventory extended
4. Information Security Management (BT 2)Art. 92024/1774Largely congruent
5. Operational IT Security (BT 3)Art. 9–102024/1774Automated detection
6. Identity/Access Management (BT 4)Art. 92024/1774MFA, PAM explicit
7. IT Projects/Application Development (BT 5)Art. 72024/1774SDLC security
8. IT Operations (BT 6)Art. 9, 112024/1774Capacity management
9. IT Emergency Management (BT 7)Art. 11–122024/1774RPO/RTO explicit
10. Outsourcing (AT 9)Art. 28–302024/1773, 2024/2956, 2025/532Significantly extended
11. IT Multi-Client Service Providers (BT 8)Art. 31–44Oversight frameworkIncorporated into CTPP

New Requirements Without BAIT Equivalent

DORADescription
Art. 14Communication plan, media spokesperson
Art. 18Standardised incident classification (6 criteria)
Art. 19–20Formalised reporting (4h/72h/1M, XML)
Art. 26–27TLPT (threat-led penetration testing)
Art. 28(3)Information register of all ICT third-party providers
Art. 31–44CTPP oversight framework
Art. 45Information sharing on cyber threats

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT