🀝 RTS on Third-Party Risk Management

Commission Delegated Regulation (EU) 2024/1773 & 2025/532

Digital Operational Resilience Act (DORA)

RTS Contractual Policies: Commission Delegated Regulation (EU) 2024/1773

Adoption Date: March 13, 2024

RTS Subcontracting: Commission Delegated Regulation (EU) 2025/532

Adoption Date: March 24, 2025

Application Date: January 17, 2025

Official Source: EUR-Lex

πŸ“‹ Executive Summary

Objective: These two RTS establish the complete framework for managing risks related to third-party ICT service providers, covering:

Fundamental Principle: Financial entities ALWAYS remain responsible for regulatory compliance, even when they outsource ICT functions to third parties.

🎯 Scope of Application

What is an "ICT third-party service provider"?

DORA Definition: Any company providing ICT services, including:

ICT Services vs. Non-ICT Services

Service Type Subject to DORA? Examples
ICT Services YES - DORA applicable β€’ Cloud computing
β€’ Software licensing
β€’ Infrastructure management
β€’ Cybersecurity services
Business services with ICT component PARTIAL - Analysis required β€’ Business Process Outsourcing (BPO) with IT support
β€’ Consulting with IT deliverables
β€’ Audit with software tools
Pure business services NO - Out of scope β€’ Strategic consulting
β€’ Legal services
β€’ Cleaning, physical security
β€’ Non-IT training

πŸ“ RTS 2024/1773: Mandatory Contractual Clauses

⚠️ ABSOLUTE OBLIGATION: All contracts with ICT providers supporting critical or important functions MUST include the following clauses. Their absence renders the contract non-compliant with DORA.

1. Complete Service Description (Article 3)

Mandatory clause:

πŸ’‘ Practical example (Cloud Computing):

"The Provider supplies cloud infrastructure services (IaaS) to host the Bank's core banking application. Virtual servers are located in the Provider's datacenters in Paris (France) and Frankfurt (Germany). The guaranteed SLA is 99.95% monthly availability, with API response time <100ms for 95% of requests. This service supports the Bank's critical function 'Banking Transaction Processing'."

2. Access and Audit Rights (Article 4)

Mandatory clause:

⚠️ WARNING - Audit refusal: If a provider refuses to include these clauses, the contract CANNOT be signed for critical or important functions.

Example contractual wording:

"The Provider grants the Client and any third party appointed by the Client (including external auditors and supervisory authorities), full access to the Provider's premises, systems, data and personnel, upon 30 calendar days' notice, to conduct compliance, security and operational audits. In case of major security incident or suspected non-compliance, the Client may demand immediate audit without notice. The Provider commits to cooperate fully and provide all required documents, logs and information within 48 hours."

3. Data Location and Sovereignty (Article 5)

Mandatory clause:

πŸ’‘ Special case: Sovereign Cloud vs. Cloud Hyperscalers

Cloud Type Advantages Constraints
EU Sovereign Cloud
(OVH, Scaleway, T-Systems)
β€’ 100% data in EU
β€’ EU law applicable
β€’ Native DORA compliance
β€’ Sometimes limited features
β€’ Often higher cost
Hyperscalers
(AWS, Azure, GCP)
β€’ Advanced services
β€’ Global network
β€’ Economies of scale
β€’ Complex DORA clause negotiation
β€’ Risk of law conflicts (US CLOUD Act)
β€’ Possible direct ESA supervision

4. Security and Data Protection (Article 6)

Mandatory clause:

πŸ“œ Certifications to require from provider:

  • βœ… ISO 27001: Security management system certification
  • βœ… SOC 2 Type II: Operational controls audit over 6-12 months
  • βœ… PCI-DSS: If processing card data
  • βœ… HDS (France): If hosting health data
  • βœ… C5 (Germany): BSI Cloud Security Standard

5. Incident Notification (Article 7)

Mandatory clause:

⚠️ IMPORTANT: Provider-to-client notification timelines (2h) are SHORTER than DORA client-to-supervisor timelines (4h), allowing the client to analyze and classify the incident before regulatory notification.

6. Termination and Exit Rights (Article 8-9)

Mandatory clause:

πŸ’‘ Exit Plan checklist:

Element Required Details
Data inventory Exhaustive list of all stored data, format, volume
Extraction procedure Technical export method (API, DB dumps, file transfer)
Export format Open and documented formats (CSV, JSON, XML, SQL)
Timeline Detailed transition schedule over X weeks/months
Migration tests Export testing procedure before production
Support Provider resources dedicated to transition
Data destruction GDPR-compliant secure destruction certificate

7. Subcontracting (Article 10) - Link to RTS 2025/532

Mandatory clause:

⚠️ See RTS 2025/532 below for complete subcontracting details

8. Risk Concentration (Article 11)

Mandatory clause:

πŸ’‘ Managing concentration risk:

  • πŸ“Š Multi-cloud strategy: Distribute workloads across multiple clouds
  • πŸ”„ Portability: Cloud-agnostic application architecture
  • 🎯 Limitation per provider: Internal rule (e.g., max 30% of services from single supplier)
  • πŸ“‹ Dependency mapping: Complete ICT supply chain cartography

πŸ”„ RTS 2025/532: Subcontracting Rules

Objective: Strictly regulate cascading subcontracting to avoid loss of control and ensure ICT supply chain traceability.

Elements to Assess Before Authorizing Subcontracting (Article 3)

Assessment Criterion Questions to Ask Risk Level
1. Subcontractor competencies β€’ Does it have required technical expertise?
β€’ Does it hold certifications (ISO, SOC2)?
β€’ Similar client references?
βœ… Valid certifications
⚠️ Limited experience
🚫 No references
2. Financial stability β€’ Healthy financial situation?
β€’ Profitability history?
β€’ Bankruptcy risk?
βœ… Strong finances
⚠️ Recent losses
🚫 Financial difficulties
3. Security and compliance β€’ Adequate security measures?
β€’ GDPR compliance?
β€’ Incident history?
βœ… ISO 27001 + SOC2
⚠️ Minor past incidents
🚫 Recent breaches
4. Geographic location β€’ Data remains in EU/EEA?
β€’ Compatible applicable laws?
β€’ Geopolitical stability?
βœ… EU/EEA only
⚠️ Country with Adequacy Decision
🚫 High-risk jurisdictions
5. Subcontracted service criticality β€’ Impact if subcontractor fails?
β€’ Alternatives available?
β€’ Replacement time?
βœ… Non-critical service
⚠️ Important service
🚫 Critical service without plan B
6. Risk concentration β€’ What % of our activity via this subcontractor?
β€’ How many financial entities use it?
β€’ Systemic risk?
βœ… Sufficient diversification
⚠️ Moderate dependency
🚫 Critical dependency

Subcontracting Validation Process

  1. D0: Provider notifies intent to subcontract (structured form)
  2. D0 to D7: Financial entity requests additional information if necessary
  3. D7 to D21: Internal risk analysis:
    • Assessment per RTS 2025/532 criteria
    • Due diligence on subcontractor
    • Risk Management + Compliance + IT opinion
  4. D21 to D30: Formal decision:
    • βœ… Approval (with or without conditions)
    • 🚫 Motivated refusal
    • ⏸️ Request for additional information (resets timeline)
  5. Post-approval: Addition to subcontractor register + continuous monitoring

Subcontracting Limits

⚠️ PROHIBITIONS:

Example subcontracting chain:

πŸ“Š ICT Provider Register (ITS 2024/2956)

DORA Obligation: All financial entities must maintain an exhaustive register of all their third-party ICT providers.

Information to Record for Each Provider:

Category Required Data
Identification β€’ Full legal name
β€’ LEI code (if applicable)
β€’ Registered office address
β€’ Country of registration
Service Provided β€’ Detailed ICT service description
β€’ Supported business function(s)
β€’ Classification: critical / important / standard
β€’ Contract start date
β€’ End / renewal date
Data Location β€’ Countries where data is stored
β€’ Countries where data is processed
β€’ Datacenter locations
β€’ Backup locations
Subcontracting β€’ List of authorized subcontractors
β€’ Subcontracted services
β€’ Subcontracting level (1, 2)
Compliance β€’ Certifications (ISO 27001, SOC2, etc.)
β€’ Last audit date
β€’ Last audit result
β€’ Incidents occurred (last 12 months)

⏰ Register Reporting Obligations:

βœ… Compliance Checklist

Phase Actions Priority Deadline
Phase 1: Inventory ☐ Inventory ALL current ICT providers
☐ Classify by criticality (critical/important/standard)
☐ Identify non-DORA compliant contracts
URGENT Immediate
Phase 2: Contract Analysis ☐ Legal review of each contract
☐ Gap analysis vs. RTS 2024/1773 clauses
☐ Prioritize renegotiations (critical functions first)
URGENT Q1 2025
Phase 3: Renegotiation ☐ Contact each provider
☐ Negotiate contract amendments
☐ Obtain signatures on compliant contracts
☐ Plan B if refusal (change provider)
HIGH Q2-Q3 2025
Phase 4: Register ☐ Create computerized register
☐ Fill all required data
☐ Validate with Compliance/Risk
☐ Submit to authorities (April 30, 2025)
URGENT April 30, 2025
Phase 5: Continuous Monitoring ☐ Due diligence process for new providers
☐ Annual review of each provider
☐ Subcontracting notification management
☐ Register update (quarterly)
ONGOING Permanent

πŸ’‘ Negotiation Strategies with Providers

Tactics by Provider Type

1. Hyperscalers (AWS, Azure, Google Cloud, etc.)

Challenge: Standardized contracts, limited flexibility

Strategies:

2. Niche Providers / SMEs

Challenge: Lack of resources for complex compliance

Strategies:

What to Do if a Provider Refuses?

  1. Hierarchical escalation: C-level on both sides
  2. Authority notification: Inform supervisor of blockage
  3. Migration plan: Prepare provider change
    • Timeline: 6-18 months depending on criticality
    • Budget: Anticipate migration costs
    • Operational risk: Manage transition without interruption
  4. Last option: Maintain service but downgrade it (change from "critical" to "important" by modifying architecture)

πŸ“š Resources and Templates