DORA Compliance Overview
Meridian Financial Group - Compliance program, KPIs and risk indicators
Compliance by Area
On TrackRisk Summary
Recent Activity
CIF Process - Critical/Important Functions
Identification, mapping and governance of critical functions per DORA Art. 3(1)(22)
CIF Wizard — Function Mapping
Map critical and important functions to applications using a guided 5-step wizard
Existing CIF Functions
Demo dataNew CIF Mapping
ICT Service & System Inventory
Inventory, classification and risk assessment of all ICT assets per DORA Art. 5–8
Function Mapping
ICT Asset Classification
Data classification levels and criticality tiers for all ICT assets per DORA Art. 9(2)
Data Classification
Third-Party ICT Providers
Risk assessment and oversight of third-party providers per DORA Ch. V
ICT Risk Matrix
Risk assessment and mapping per DORA Art. 6 - probability × impact
DORA Timeline
Key milestones and deadlines for the compliance program
Incident Management
Classification, response and reporting per DORA Ch. III
Board Decisions & Approvals
Board-level oversight and approval of DORA governance documents per Art. 5(2)
Approval Requirements
Decision Log
Art. 5(2)(f)Upcoming Reviews
Decision Log
Structured DORA design decisions with feasibility assessment and implementation tracking
Decision Log
D-001 — D-006DORA Document Library
All governance documents, policies and procedures - organized by category
DORA Compliance Checklist
Requirements by chapter - check off as you meet them, progress shown in real time
Compliance Action Tracker
Track remediation items across DORA chapters - connect your tools for two-way sync