LinkedIn Tag
Upcoming Webinar: Q&A with a QSA - PCI DSS 6.4.3 & 11.6.1 (cside x MegaplanIT)

cside: DORA Compliance Made Simple

The Digital Operational Resilience Act (DORA) is EU legislation designed specifically for the financial sector. Its goal is to ensure that firms protect their ICT systems against disruptions, cyberattacks, and supplier failures. And since so many financial services run in the user's browser, server-side security alone is not enough. You need client-side visibility and control. cside delivers both and adds audit-ready reporting on top.

A screenshot of cside's compliance dashboard

DORA in a Nutshell

DORA requires financial institutions to withstand disruptions, cyberattacks, and supplier issues. Service delivery and financial markets cannot be at risk. Disruptions, attacks, or supplier failures can trigger a chain reaction. That's why DORA establishes a framework for ICT-risk management and incident reporting.

DORA sets rules for ICT risk management. That puts real responsibility on companies. They must test systems regularly and prove resilience; they remain accountable for oversight and recovery. Threat-Led Penetration Testing (TLPT) is mandatory every three years for 'significant entities'. Financial institutions must also control their IT providers. If things go wrong, incidents must be reported. DORA isn't just a suggestion. Non-compliance can lead to heavy sanctions for critical ICT providers: up to 1% of the average daily worldwide turnover per day, for six months.

What DORA Means for You

If your business operates in the financial sector or services financial institutions in the EU, you must comply with DORA.

This includes third-party risks. All ICT systems supporting service delivery must meet requirements. A register of ICT providers is required, and contracts must include audit rights, access to relevant documentation, detailed performance monitoring, and exit plans. Major incidents must be reported under timelines set in the regulatory technical standards (RTS).

How cside Facilitates DORA Compliance

These days a lot of the online action takes place in the customer's browser. That comes with increased risks like malware or man-in-the-browser attacks, maintaining script integrity and session protection or data breaches. Even though DORA doesn't prescribe specific client-side controls, they are needed to fulfill risk-management and testing obligations.

Understanding DORA requirements

Articles 6 to 9, 15, 24 to 26 ICT Risk Management and Integrity

Controls often run in the browser along with third-party scripts. You need to catch tampering (XSS, injection, session abuse) in real time. cside enforces approved paths before execution to strengthen protection and prevention. Annual testing and TLPT, for significant entities, are supported with logs and change records.

Articles 28 to 30 Third-party Risks and Contracts

Only approved service providers under appropriate contracts shall receive data. We continuously monitor third-party scripts and destinations, mapped to a provider register. On the other hand, you get exportable, time-stamped logs and destination maps for audits and reporting.

Articles 17 to 19 Incident Management and Reporting

We provide alerts on new endpoints, extraction attempts, or changes on critical pages in real-time. Everything is timestamped so you can assess and disclose to the authority under RTS timelines.

Articles 17 to 19, 28 to 30 Incident Forensics and Supervisor Reporting

Forensics can make a difference when an incident happens. We record what ran and where data went so your team can reconstruct events. You can keep evidence for long-term retention and inspection.

Article 5 Board Accountability and Oversight

Governing what you can't see is impossible. Cside can block unauthorized browser code that can change data. You can inspect what scripts ran, the fields that were touched, and where data is sent, with exportable logs for oversight and accountability.

Real World Example

The Scenario

A customer logs into his online bank account. A compromised third-party analytics script quietly tries to exfiltrate data. Under DORA, this incident violates confidentiality and integrity and must be logged. If criteria for a major incident are met, it must be reported.

With cside

cside immediately blocks the script before it can run, prevents the transfer and sends alerts with detailed logs.

The Result

No data leaves the browser, immediate alerts with detailed evidence and ready for reporting.

Leading companies trust cside

Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo
Your Compliance Partner

Built for security teams who need visibility inside the browser, cside delivers proven defense against modern client-side attacks while supporting major compliance frameworks. Your trusted partner for regulatory compliance in the browser. We are your trusted partner for securing the last mile of the web.

Visit our Trust Center
GDPR certification logo GDPR
SOC 2 certification logo SOC 2
PCI DSS certification logo PCI DSS

We're one message away

As your partner for web security, we want you to be able to reach us easily. Every customer gets 1:1 access to our team over Slack and Microsoft Teams. We respond in minutes, whether you have a feature request, questions, or ideas.

Shared Slack or Microsoft Teams channel for every customer
Direct access to our security experts
Easy conversational support
Response times in minutes, not days

Get in touch for a personal demo

*This page describes product capabilities and how they may support your compliance program. It is not legal advice. Requirements vary by organization and jurisdiction.