compliance

Digital Operational Resilience Act (DORA)

DORA requirements put a strong focus on ongoing resilience, third-party dependency transparency,
and structured incident readiness.

How ThingsRecon Supports
DORA Compliance

Mapping all internet-facing and third-party assets in real time
Prioritising risks based 
on exposure and 
business proximity
Providing context-rich 
reporting for internal 
and regulatory reviews
Offering non-intrusive, agentless scanning that integrates into 
existing workflows
Digital Operational Resilience Act (DORA)

Meeting DORA Requirements
with ThingsRecon

Align ICT risk management and third-party oversight with regulatory standards, while gaining clarity and control across your digital supply chain.

DORA
Requirement

Article 8(4): Identify all information andICT assets and map their configurationand interdependencies.

Article 8(6): Maintain inventories,update them periodically, andwhenever any major changes occur.

What ThingsRecon
delivers

Automated Asset Discovery and SupplyChain Mapping continuously identifydomains, IPs, APIs, certificates, andconnections, including third-party andforgotten infrastructure.

DORA
Requirement

Article 8: Continuously identify allsources of ICT risk.    Article 9: Continuously monitor andcontrol ICT security and functioning. 
  

Article 10:
Have mechanisms topromptly detect anomalous activities.

What ThingsRecon
delivers

Continuous external discovery of both yourown attack surface and your connectedvendors, including shadow IT andunmanaged assets, helps maintain real-timevisibility into exposure to identify anomalies.

DORA
Requirement

Article 28: Maintain a register of allcontractual arrangements with ICTthird-party service providers.

Article 30:
Ensure contractual rightsfor monitoring, auditing, andobtaining information from providers.

What ThingsRecon
delivers

Supply chain discovery gives actionablevisibility into vendor and supplier risk, withDigital Proximity scoring to understand howdeeply each is integrated and what impactthey could have.

DORA
Requirement

Article 18: Classification of ICTrelated incidents and cyber threats.  

Article 24:
A risk-based approach
to conducting digital operationalresilience testing.

What ThingsRecon
delivers

Risk scoring engine with 100+ cyber hygieneindicators, including missing ormisconfigured HTTP headers, weak oroutdated SSL/TLS protocols, insecure forms,to support evidence-based prioritisation andmitigation efforts.

DORA
Requirement

Article 17: Track, log, and classifyICT-related incidents. Identify,document, and address root causesto prevent recurrence. Put in placeearly warning indicators.

What ThingsRecon
delivers

Contextual risk reports and remediation recommendations show which assets,vendors, or misconfigurations are most critical,helping you act before incidents happen.

DORA
Requirement

Article 19: Reporting of major 
ICT-related incidents and voluntarynotification of significant cyber threats.

Article 20: Standardized 
reporting templates.

What ThingsRecon
delivers

Reporting insights that plug into GRC, SIEM,or EASM workflows to streamlinedocumentation, support audits, and board orexecutive reporting.

DORA
Requirement

Articles 28 30: Understand the 
location of service providers and theirsubcontractors.

Article 29: Assess ICT concentration risk.

What ThingsRecon
delivers

Geo located scanning and global points of presence help respect data residency requirements and support compliance with specific sovereignty needs.

Lorem ipsum dolor sit

Lorem ipsum
dolor sit
amet