DORA2026-03-104 min read

DORA Article 45 Explained: Information Sharing Arrangements - Detailed Provisions

Introduction

The Digital Operational Resilience Act (DORA) aims to establish a robust framework for digital operational resilience across the financial sector. Article 45 of DORA is a critical component of this framework, focusing on the establishment of information sharing arrangements concerning cyber threats. This article is designed to enhance the preparedness and response capabilities of financial entities against cyber risks by facilitating the sharing of cyber threat information among relevant stakeholders.

In this article, we will delve into the details of Article 45, examining its key requirements, providing a guide for implementation, highlighting common pitfalls, and discussing how Matproof can assist with compliance.

Key Requirements

Article 45 of DORA stipulates the following key requirements for financial entities regarding information sharing arrangements:

  • Establishment of Information Sharing Arrangements: Financial entities must establish arrangements to share cyber threat information with each other and with relevant authorities.
  • Designation of a Contact Point: Each financial entity must designate a contact point that is responsible for coordinating the exchange of information.
  • Provision of Relevant Information: Financial entities must provide relevant cyber threat information, which includes indicators of compromise, threat intelligence, and details concerning the nature and impact of the threats.
  • Confidentiality and Sensitivity: Information shared must be handled with confidentiality and sensitivity, respecting data protection laws and privacy regulations.
  • Reporting Mechanisms: Financial entities must have mechanisms in place for reporting cyber incidents to the competent authorities within the stipulated timeframes.
  • Cooperation with Competent Authorities: Entities must cooperate with competent authorities, providing any additional information or assistance required for the investigation and management of cyber threats.

Implementation Guide

To comply with the provisions of Article 45, financial entities should undertake the following practical steps:

  1. Develop an Information Sharing Policy: Create a clear policy outlining the objectives, scope, and procedures for sharing cyber threat information.
  2. Identify and Designate a Contact Point: Appoint a dedicated individual or team responsible for managing the information sharing process.
  3. Establish Communication Channels: Set up secure communication channels with other financial entities and competent authorities for the exchange of cyber threat information.
  4. Train Staff: Conduct regular training sessions for all staff members to ensure they understand the importance of information sharing and their roles in the process.
  5. Implement Data Protection Measures: Ensure that all shared information is handled in accordance with data protection laws and regulations.
  6. Monitor and Review: Regularly monitor the effectiveness of the information sharing arrangements and update them as necessary to address any emerging threats or changes in the regulatory landscape.
  7. Document and Record Keeping: Maintain detailed records of all information sharing activities, including the nature of the information shared, the recipients, and any actions taken as a result.

Common Pitfalls

Here are some common pitfalls to avoid when implementing Article 45's requirements:

  • Lack of Clear Policy: Failing to develop a comprehensive policy can lead to confusion and inefficiencies in the information sharing process.
  • Inadequate Training: Staff members may not understand their roles or the importance of information sharing without proper training.
  • Poor Communication Channels: Insecure or unreliable communication channels can compromise the confidentiality and integrity of shared information.
  • Ignoring Data Protection Laws: Overlooking data protection laws and privacy regulations can result in legal and reputational risks.
  • Insufficient Monitoring and Review: Failing to regularly monitor and review the information sharing arrangements can lead to outdated or ineffective processes.

How Matproof Helps

Matproof's compliance management platform can automate tracking and evidence collection for Article 45 requirements, ensuring that your financial entity stays compliant with DORA's provisions. By leveraging Matproof, you can effectively manage information sharing arrangements, designate contact points, and maintain secure communication channels, all while adhering to data protection regulations.

Related Articles

For further insight into DORA and its various articles, consider exploring the following related articles:

DORA Article 45Information Sharing Arrangements - Detailed Provisionsdigital operational resilienceICT risk managementfinancial regulation

Ready to simplify compliance?

Get audit-ready in weeks, not months. See Matproof in action.

Request a demo