Ensure DORA Compliance and App Resiliency With Datadog | Datadog

Ensure DORA compliance and app resiliency with Datadog

Author Addie Beach
Author Lauren Smith
Author Rajat Luthra

Published: October 21, 2024

Reliable access to financial data is critical for organizations and individual consumers alike. As a result, resiliency is key for financial institutions responsible for managing this information. While cloud computing can strengthen your app’s resiliency, it can also open up new security risks and require more complex continuity planning.

To address these concerns, the Digital Operational Resilience Act (DORA) provides a universal set of binding regulations on data risk management that apply to any organization doing business in the EU as well as any company providing services to these organizations. Under this act, organizations are assessed on their risk management, business continuity planning, incident response and recovery, and cybersecurity measures.

Because DORA touches on so many aspects of digital preparedness, it can be challenging to make sure that every part of your stack is in compliance. Datadog monitors your entire system—including over 800 third-party integrations—and provides you with powerful, AI-enriched data correlation. This helps you evaluate potential risks within your system and maintain DORA compliance, so you can easily:

Patch vulnerabilities and detect threats to your data

DORA requires you to have a deep understanding of risk within your own system and your third-party services. In your system, you can achieve this by looking for vulnerabilities and developing a solid risk management plan, which often involves minimizing human error or malpractice through standardized best practices, quality assurance testing, and regular system audits. To analyze and mitigate risks from outside services, however, you need end-to-end visibility into potential weak points and proactive handling of unusual activity within your vendor portfolio.

With Datadog’s security features, you can easily access your app’s history of leaks and attacks, spot weaknesses with real-time threat detection, and use automated workflows to prevent future incidents. Datadog Security products also enable you to continuously scan your entire system, covering your containers, hosts, serverless functions, and APIs, to identify potential vulnerabilities, attacks, and identity risks. Additionally, the Datadog platform itself uses encryption and secure data handling practices to help you comply with DORA’s data protection requirements.

Let’s say you’re concerned about vulnerabilities in your AWS Lambda functions that handle financial transactions, especially within the third-party libraries that are used in concert with these functions. By enabling the Datadog AWS integration and Cloud Security Management, you can immediately begin collecting security data from your cloud environment. Potential risks in your serverless functions, containers, hosts, and their associated libraries—including misconfigurations and identity risks—are automatically cataloged in Application Security Management and Cloud Security Management. You can view these risks here and here, with the severity and number of impacted resources clearly identified for each issue. By clicking into a vulnerability, you can then access suggested remediation steps and context from the rest of your stack.

A list of vulnerabilities within your libraries, displayed in the Application Security Management Vulnerability Explorer.
A list of vulnerabilities in the Cloud Security Management Vulnerability Explorer.

Implement robust business continuity

Of course, security incidents aren’t the only form of risk that threaten your system. Performance issues such as hardware failures or external outages and errors can also affect your customer’s ability to access their financial data. Business continuity planning prepares you for these issues by helping you determine which parts of your system are mission critical, what plans are in place to handle disruptions to these areas, and what kind of backups or workarounds are in place to ensure minimal user impact. DORA requires you to perform in-depth business continuity planning and monitoring to make sure that these issues have minimal impact on your customers, as well as to spot and remediate smaller issues before they snowball into larger incidents.

Datadog Infrastructure Monitoring helps you evaluate the current and historical health of your hosts, containers, network devices, and serverless resources, so you can stay on top of developing issues and ensure that your backup systems are online. You can also use Application Performance Monitoring (APM) to identify performance, reliability, and security issues within your app, tracing them from the service level all the way down to individual lines of code. Crucially, APM enables you to map out dependencies throughout your app, showing you routes through which critical services may be impacted.

Let’s say you receive an alert that a database used for storing customer authentication information is experiencing a sudden spike in errors. By viewing the Service Map and selecting this database, you’re able to identify downstream services impacted, which include several other services crucial for login functionality. You can also see upstream services that may be contributing to the issue. This enables you to not just assess the scope of the incident and potentially reach a solution faster, but also better understand how and where you should be adding backups or workarounds to ensure better continuity of service in the future.

The Service Map filtered to an authentication service.

Respond, remediate, and report

In addition to ensuring that your system can respond to disruptions effectively, DORA requires you to have a clear plan for reporting these events to authorities. DORA mandates that organizations provide accurate accounts of an entire incident at three different points: an initial notification when the incident is detected, an update as the incident is being remediated, and an analysis once the incident is finished. Accurate reporting helps authorities ensure that your organization has an effective plan for dealing with issues and enables consumers to better assess their own risk. Datadog Incident Management accelerates both your incident response and reporting efforts by giving you a single place to triage, organize, and document incidents.

Continuing the example from before, let’s say that the issues with your authentication database are preventing users from accessing their banking information. You decide to declare an incident to help you triage the issue and organize the relevant responders. Once the issue is resolved, you can easily link the postmortem to the incident overview page, which itself contains a record of when the incident started, who responded to it and how, and the number of customers who were impacted. This page then serves as a place to collect all incident activity and reporting for fast communication.

DORA compliance often overlaps with other financial responsibility requirements, such as GDPR and CCPA. Cloud Security Management provides compliance frameworks that help you quickly evaluate how your security posture matches up against industry standards, so you can generate reports that identify critical security misconfigurations and other rule failures in your environments. Additionally, Sensitive Data Scanner prevents data leaks by proactively identifying and redacting sensitive data in your logs, traces, and events. Alongside Audit Trail, which gives you a more granular record of system activity, this can help you stay in compliance with additional regulations that apply to financial data.

An overview of issues captured by Sensitive Data Scanner.

Maintain DORA compliance with Datadog

By meeting DORA requirements, you can ensure that your websites and apps are resilient enough to handle disruptions of any size, helping your customers quickly access critical financial information whenever they need it. Datadog provides a number of features that help you mitigate risk across your entire stack, from your internal infrastructure and code to your third-party services.

You can use our documentation to get started with Datadog Security, Infrastructure Monitoring, APM, Audit Trail, and Sensitive Data Scanner. If you’re not yet a Datadog user, you can try out these features by signing up for a 14-day .