Digital Operational Resilience Act (DORA)
DORA requirements put a strong focus on ongoing resilience, third-party dependency transparency,
and structured incident readiness.

How ThingsRecon Supports
Meeting DORA Requirements
with ThingsRecon
Align ICT risk management and third-party oversight with regulatory standards, while gaining clarity and control across your digital supply chain.
Requirement
Article 8(4): Identify all information andICT assets and map their configurationand interdependencies.
Article 8(6): Maintain inventories,update them periodically, andwhenever any major changes occur.
delivers
Automated Asset Discovery and SupplyChain Mapping continuously identifydomains, IPs, APIs, certificates, andconnections, including third-party andforgotten infrastructure.
Requirement
Article 8: Continuously identify allsources of ICT risk. Article 9: Continuously monitor andcontrol ICT security and functioning.
Article 10: Have mechanisms topromptly detect anomalous activities.
delivers
Continuous external discovery of both yourown attack surface and your connectedvendors, including shadow IT andunmanaged assets, helps maintain real-timevisibility into exposure to identify anomalies.
Requirement
Article 28: Maintain a register of allcontractual arrangements with ICTthird-party service providers.
Article 30: Ensure contractual rightsfor monitoring, auditing, andobtaining information from providers.
delivers
Supply chain discovery gives actionablevisibility into vendor and supplier risk, withDigital Proximity scoring to understand howdeeply each is integrated and what impactthey could have.
Requirement
Article 18: Classification of ICTrelated incidents and cyber threats.
Article 24: A risk-based approach
to conducting digital operationalresilience testing.
delivers
Risk scoring engine with 100+ cyber hygieneindicators, including missing ormisconfigured HTTP headers, weak oroutdated SSL/TLS protocols, insecure forms,to support evidence-based prioritisation andmitigation efforts.
Requirement
Article 17: Track, log, and classifyICT-related incidents. Identify,document, and address root causesto prevent recurrence. Put in placeearly warning indicators.
delivers
Contextual risk reports and remediation recommendations show which assets,vendors, or misconfigurations are most critical,helping you act before incidents happen.
Requirement
Article 19: Reporting of major
ICT-related incidents and voluntarynotification of significant cyber threats.
Article 20: Standardized
reporting templates.
delivers
Reporting insights that plug into GRC, SIEM,or EASM workflows to streamlinedocumentation, support audits, and board orexecutive reporting.
Requirement
Articles 28 30: Understand the
location of service providers and theirsubcontractors.
Article 29: Assess ICT concentration risk.
delivers
Geo located scanning and global points of presence help respect data residency requirements and support compliance with specific sovereignty needs.