PricingDemo
Log InGet API Key

HATS / DORA Crosswalk

Document: H33-XWALK-DORA-001
Version: 1.0
Date: 2026-05-22
Framework: Regulation (EU) 2022/2554 (Digital Operational Resilience Act)
Applicability: Financial entities (credit institutions, payment institutions, investment firms, insurance undertakings, crypto-asset service providers)
Editor: Eric Beans, H33.ai, Inc.

1. Scope

This crosswalk maps HATS capabilities to the Digital Operational Resilience Act (DORA), which applies to financial entities in the EU from 17 January 2025. DORA establishes requirements for ICT risk management, ICT-related incident reporting, digital operational resilience testing, and ICT third-party risk management.

HATS capabilities are relevant to Chapters II (ICT Risk Management), III (ICT-Related Incident Management), IV (Digital Operational Resilience Testing), and V (Managing ICT Third-Party Risk). This crosswalk does not address governance and institutional provisions (Chapter I) or competent authorities (Chapter VI).

This crosswalk is a technical mapping. It does not constitute compliance with DORA or replace the oversight of the relevant national competent authority or European Supervisory Authority (ESA).

2. Chapter II -- ICT Risk Management

Article 5 -- Governance and Organisation

ArticleHATS CapabilityEvidence TypeVerification Method
Art. 5(2)(a) Management body bears ultimate responsibility for ICT risk managementGovernance ReplayICT risk management decision attestation receipts with management body approval bindingReplay governance decisions; verify management body identity in approval chain
Art. 5(6) Management body keeps up to date on ICT riskEvidence ChainsICT risk briefing attestation chain recording periodic updates to managementVerify briefing attestation frequency; confirm management acknowledgment is attested

Article 6 -- ICT Risk Management Framework

ArticleHATS CapabilityEvidence TypeVerification Method
Art. 6(1) Sound, comprehensive, and well-documented ICT risk management frameworkGovernance Replay + Evidence ChainsFramework documentation attestation chain with governance decision bindingTraverse documentation chain; replay framework adoption decisions; verify completeness
Art. 6(5) Review at least once a yearEvidence ChainsAnnual review attestation receipts with timestamp verificationVerify review attestation exists within each 12-month window; confirm management approval is attested
Art. 6(8) ICT risk management framework documented and reviewedContinuous AttestationFramework version attestation receipts at each modification pointVerify each framework version change has a corresponding attestation receipt

Article 8 -- Identification

ArticleHATS CapabilityEvidence TypeVerification Method
Art. 8(1) Identify, classify, and adequately document ICT assetsContinuous AttestationICT asset inventory attestation receipts at configurable intervalsVerify asset inventory attestation continuity; confirm classification fields are populated
Art. 8(4) Identify all sources of ICT riskEvidence Chains + Governance ReplayRisk source identification attestation chain with governance bindingTraverse risk identification chain; replay categorization decisions

Article 9 -- Protection and Prevention

ArticleHATS CapabilityEvidence TypeVerification Method
Art. 9(2) Policies, procedures, protocols, and tools for ICT securityContinuous AttestationSecurity control effectiveness attestation receiptsVerify control attestation continuity; confirm all documented controls have corresponding attestation
Art. 9(3)(b) Strong authentication mechanismsAgent AttestationAuthentication event attestation receipts with PQ key materialVerify authentication receipts demonstrate strong authentication with post-quantum cryptography
Art. 9(4)(c) Data-at-rest and in-transit encryptionEncrypted ComputationEncryption attestation receipts for data at rest and in transit; FHE computation receipts for data in useVerify encryption attestation covers all data states; confirm PQ key encapsulation for transit

Article 10 -- Detection

ArticleHATS CapabilityEvidence TypeVerification Method
Art. 10(1) Mechanisms to promptly detect anomalous activitiesContinuous AttestationReal-time attestation receipt stream enabling anomaly detection through deviation analysisVerify receipt stream granularity supports detection SLA; confirm no monitoring gaps
Art. 10(2) Multiple layers of control, including network perimeter and internal monitoringEvidence ChainsMulti-layer monitoring attestation chain spanning network, application, and data layersVerify attestation coverage spans all documented monitoring layers

3. Chapter III -- ICT-Related Incident Management

ArticleHATS CapabilityEvidence TypeVerification Method
Art. 17(1) ICT-related incident management processEvidence Chains + Governance ReplayIncident lifecycle evidence chain from detection through resolution with governance decision attestationTraverse complete incident chain; replay response decisions; verify causal linkage between events
Art. 17(2) Indicators for early warningContinuous AttestationEarly warning indicator attestation receipts at configurable thresholdsVerify indicator monitoring attestation; confirm threshold breach events generate receipts within SLA
Art. 17(3)(a) Classification of incidentsGovernance ReplayIncident classification decision attestation receipts with criteria bindingReplay classification decisions; verify criteria applied match documented classification methodology
Art. 19(1) Major ICT-related incident reporting to competent authorityIndependent VerificationIncident report attestation receipts verifiable by competent authoritiesCompetent authority verifies report receipts using H33 public keys; confirms report timestamps

4. Chapter IV -- Digital Operational Resilience Testing

ArticleHATS CapabilityEvidence TypeVerification Method
Art. 24(1) Sound and comprehensive digital operational resilience testing programmeEvidence ChainsResilience test execution attestation chain recording test methodology, inputs, and resultsVerify test attestation chain completeness; confirm test scope covers documented ICT systems
Art. 24(6) Prioritise, classify, and remedy all issues revealed during testingGovernance Replay + Evidence ChainsFinding-to-remediation attestation chain with governance decision bindingTraverse finding-remediation chain; replay prioritization decisions; verify remediation receipt for each finding
Art. 25(1) Vulnerability assessments and scans, open source software analysisContinuous AttestationVulnerability assessment attestation receipts at required frequencyVerify assessment attestation frequency meets DORA requirements; confirm no assessment gaps
Art. 26(1) Threat-led penetration testing (TLPT) at least every 3 yearsEvidence ChainsTLPT execution attestation chain recording scope, methodology, and findingsVerify TLPT attestation exists within each 3-year window; confirm scope matches critical ICT systems

5. Chapter V -- ICT Third-Party Risk

ArticleHATS CapabilityEvidence TypeVerification Method
Art. 28(2) Contractual arrangements with ICT third-party providersEvidence ChainsThird-party service attestation chain recording service level and security control attestationsVerify third-party attestation chain covers contractual obligations; confirm continuity
Art. 28(5) ICT concentration risk assessmentGovernance ReplayConcentration risk assessment decision attestation receiptsReplay concentration risk decisions; verify assessment methodology binding
Art. 30(2)(b) Service level descriptions including quantitative and qualitative targetsContinuous AttestationService level measurement attestation receipts at contractual frequencyVerify SLA measurement attestation continuity; confirm measurements against contractual targets
Art. 30(3)(a) Full descriptions of functions and services providedIndependent VerificationService description attestation receipts verifiable by the financial entityFinancial entity verifies service description receipts; confirms alignment with contractual scope

6. Coverage Notes

HATS provides technical evidence relevant to all five substantive chapters of DORA (Chapters II-V and the overarching Chapter I governance requirements). The strongest coverage is in ICT risk management (Chapter II) and incident management (Chapter III), where HATS evidence chains and continuous attestation directly produce the records and audit trails required by the regulation.

DORA obligations that fall outside the scope of HATS technical capabilities include: contractual arrangement negotiation (organizational), information sharing arrangements (Article 45), and direct engagement with ESA oversight frameworks. HATS-generated evidence can support these processes but does not replace the organizational and contractual measures required.

For financial entities using AI systems, the combination of HATS agent attestation (per-action AI governance) and the EU AI Act crosswalk provides a unified evidence framework spanning both DORA operational resilience and EU AI Act high-risk AI system requirements.