{"id":348,"date":"2026-04-12T18:20:44","date_gmt":"2026-04-12T18:20:44","guid":{"rendered":"https:\/\/jdaadvisory.com\/?page_id=348"},"modified":"2026-04-15T08:55:41","modified_gmt":"2026-04-15T06:55:41","slug":"dora-small-supplier-audit","status":"publish","type":"page","link":"https:\/\/jdaadvisory.com\/en\/dora-small-supplier-audit\/","title":{"rendered":"DORA Small Supplier Audit"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--1\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Small Supplier Audit  -Ensure compliance and operational security.<\/h2>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">Discover our DORA-compliant supplier audits, ensuring reliability and protection for your company &#8211; DORA Small Supplier Audit<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--2\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Small Supplier Audit &#8211; Comprehensive DORA compliance analysis.<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We thoroughly verify whether suppliers meet DORA requirements, minimizing risk and strengthening your operational security.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--3\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Small Supplier Audit &#8211; Supplier risk and resilience assessment.<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We identify weaknesses in the supply chain, helping prevent disruptions and ensure business continuity.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--4\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Improvement recommendations and corrective actions.<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We provide practical guidance to enhance security and compliance standards in supplier relationships.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--5\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Ensuring full compliance with DORA regulations for your company.<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">We outline the challenges of supplier audits and how our services guarantee security and operational compliance.<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--6\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-center ext-animate--on\">Comprehensive supplier compliance assessment<\/h5>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We thoroughly analyze supplier policies and procedures to quickly identify and eliminate compliance risks.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--7\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-center ext-animate--on\">Identification and mitigation of operational risks<\/h5>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">Our audits help remove barriers, improving the stability and security of the supply chain.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--8\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-center ext-animate--on\">Optimization of supplier management processes<\/h5>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We support the transformation of high-risk areas into efficient and secure solutions, enhancing the quality of cooperation.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--9\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide ext-is-logical-start ext-animate--on has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-6729bdbe wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading ext-animate--on\">How we conduct a supplier audit<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We present a detailed process for auditing supplier compliance with DORA regulations to ensure full transparency and secure cooperation.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--10\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlpNMTQwLDgwdjk2YTgsOCwwLDAsMS0xNiwwVjk1bC0xMS41Niw3LjcxYTgsOCwwLDEsMS04Ljg4LTEzLjMybDI0LTE2QTgsOCwwLDAsMSwxNDAsODBaIj48L3BhdGg+PC9zdmc+\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\">Step one: Documentation review<\/h5>\n\n\n\n<p class=\"ext-animate--on\">We thoroughly review submitted documents, assessing compliance with legal requirements and security standards.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--11\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlptMjUuNTYtOTIuNzRMMTIwLDE2OGgzMmE4LDgsMCwwLDEsMCwxNkgxMDRhOCw4LDAsMCwxLTYuNC0xMi44bDQzLjE3LTU3LjU2YTE2LDE2LDAsMSwwLTI3Ljg2LTE1LDgsOCwwLDAsMS0xNS4wOS01LjM0LDMyLDMyLDAsMSwxLDU1Ljc0LDI5LjkzWiI+PC9wYXRoPjwvc3ZnPg==\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\">Step two: Operational verification<\/h5>\n\n\n\n<p class=\"ext-animate--on\">We assess the practical aspects of the supplier\u2019s operations to confirm process stability and compliance.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--12\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\">Step three: Report and recommendations<\/h5>\n\n\n\n<p class=\"ext-animate--on\">We provide a detailed audit report and outline corrective and improvement actions for your company.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/eur-lex.europa.eu\/search.html?scope=EURLEX&amp;text=DORA&amp;lang=en&amp;type=quick&amp;qid=1776232417704\">DORA Act<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--13\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide ext-is-logical-start ext-animate--on has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-6729bdbe wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading ext-animate--on\">Explore our supplier audit services.<\/h4>\n\n\n\n<p class=\"has-text-align-left ext-animate--on\">See how our audits ensure compliance with DORA regulations and enhance your company\u2019s operational security.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-87beb0d0 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-media-text is-stacked-on-mobile is-image-fill-element is-style-ext-preset--media-text--natural-1--card-1 ext-animate--on has-background-background-color has-background is-style-ext-preset--media-text--natural-1--card-1--14\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg\" alt=\"\" class=\"wp-image-365 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-9a7b35d3 wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<h5 class=\"wp-block-heading ext-animate--on\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.86), 24px);\">DORA compliance analysis<\/h5>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\">We thoroughly assess whether the supplier meets DORA regulatory requirements.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-media-text is-stacked-on-mobile is-image-fill-element is-style-ext-preset--media-text--natural-1--card-1 ext-animate--on has-background-background-color has-background is-style-ext-preset--media-text--natural-1--card-1--15\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a12e5ce63f014d0f400b6fda83e785e595761d26.jpg\" alt=\"\" class=\"wp-image-366 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a12e5ce63f014d0f400b6fda83e785e595761d26.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a12e5ce63f014d0f400b6fda83e785e595761d26-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a12e5ce63f014d0f400b6fda83e785e595761d26-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a12e5ce63f014d0f400b6fda83e785e595761d26-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a12e5ce63f014d0f400b6fda83e785e595761d26-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-9a7b35d3 wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<h5 class=\"wp-block-heading ext-animate--on\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.86), 24px);\">Supplier risk assessment<\/h5>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\">We identify potential operational and security threats.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-e12f0bcd wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-media-text is-stacked-on-mobile is-image-fill-element is-style-ext-preset--media-text--natural-1--card-1 ext-animate--on has-background-background-color has-background is-style-ext-preset--media-text--natural-1--card-1--16\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1138\" height=\"1440\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8aa80b184afc2577576dc8b24bfa346253f9bbae.jpg\" alt=\"\" class=\"wp-image-367 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8aa80b184afc2577576dc8b24bfa346253f9bbae.jpg 1138w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8aa80b184afc2577576dc8b24bfa346253f9bbae-237x300.jpg 237w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8aa80b184afc2577576dc8b24bfa346253f9bbae-809x1024.jpg 809w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8aa80b184afc2577576dc8b24bfa346253f9bbae-768x972.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8aa80b184afc2577576dc8b24bfa346253f9bbae-9x12.jpg 9w\" sizes=\"auto, (max-width: 1138px) 100vw, 1138px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-9a7b35d3 wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<h5 class=\"wp-block-heading ext-animate--on\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.86), 24px);\">Verification of security procedures<\/h5>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\">We verify the effectiveness of the supplier\u2019s safeguards and policies.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-media-text is-stacked-on-mobile is-image-fill-element is-style-ext-preset--media-text--natural-1--card-1 ext-animate--on has-background-background-color has-background is-style-ext-preset--media-text--natural-1--card-1--17\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b043865fcce1ce92d391037fe6d5b3c8a40e868e.jpg\" alt=\"\" class=\"wp-image-368 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b043865fcce1ce92d391037fe6d5b3c8a40e868e.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b043865fcce1ce92d391037fe6d5b3c8a40e868e-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b043865fcce1ce92d391037fe6d5b3c8a40e868e-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b043865fcce1ce92d391037fe6d5b3c8a40e868e-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b043865fcce1ce92d391037fe6d5b3c8a40e868e-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-9a7b35d3 wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<h5 class=\"wp-block-heading ext-animate--on\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.86), 24px);\">Report and recommendations<\/h5>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\">We prepare a detailed report along with improvement recommendations.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\">Methodology&nbsp;for&nbsp;Conducting&nbsp;a&nbsp;Small&nbsp;Supplier&nbsp;Audit&nbsp;According&nbsp;to&nbsp;DORA<\/h4>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>1. Purpose of the Audit<\/strong><\/h4>\n\n\n\n<p class=\"ext-animate--on\">A small\u2011supplier audit aims to:<\/p>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Verify that the supplier meets <strong>minimum DORA\u2011aligned ICT and security requirements<\/strong>.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Ensure the supplier can support <strong>operational resilience<\/strong> appropriate to its size.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify <strong>gaps, risks, and required improvements<\/strong>.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Confirm that contractual arrangements meet <strong>DORA outsourcing obligations<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p class=\"ext-animate--on\">This methodology is suitable for:<\/p>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Freelance\/contractor\u2011based ICT support<\/li>\n\n\n\n<li class=\"ext-animate--on\">Micro\u2011SaaS providers<\/li>\n\n\n\n<li class=\"ext-animate--on\">Small software houses<\/li>\n\n\n\n<li class=\"ext-animate--on\">Niche ICT service providers<\/li>\n\n\n\n<li class=\"ext-animate--on\">Small hosting\/managed service providers<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>2. Scope of the Audit<\/strong><\/h4>\n\n\n\n<p class=\"ext-animate--on\">The scope focuses on <strong>essential controls<\/strong>, not enterprise\u2011grade frameworks.<\/p>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>2.1 Mandatory DORA Areas (Simplified for Small Suppliers)<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Governance &amp; accountability<\/li>\n\n\n\n<li class=\"ext-animate--on\">Basic ICT risk management<\/li>\n\n\n\n<li class=\"ext-animate--on\">Information security fundamentals<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident management<\/li>\n\n\n\n<li class=\"ext-animate--on\">Backup &amp; recovery<\/li>\n\n\n\n<li class=\"ext-animate--on\">Basic resilience testing<\/li>\n\n\n\n<li class=\"ext-animate--on\">Sub\u2011outsourcing transparency<\/li>\n\n\n\n<li class=\"ext-animate--on\">Contractual compliance with DORA<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>2.2 Typical Services Covered<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Security scanning or monitoring (basic)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Small SaaS modules<\/li>\n\n\n\n<li class=\"ext-animate--on\">Application development &amp; maintenance<\/li>\n\n\n\n<li class=\"ext-animate--on\">Basic hosting or infrastructure<\/li>\n\n\n\n<li class=\"ext-animate--on\">IT support services<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\"><strong>3. Audit Process (Proportionate Approach)<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 1 \u2014 Preparation<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Define a minimal but sufficient audit scope.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Request only essential documents.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Documents to Request<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Security policy (even short)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident handling procedure (1\u20132 pages acceptable)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Backup procedure or description<\/li>\n\n\n\n<li class=\"ext-animate--on\">List of subcontractors<\/li>\n\n\n\n<li class=\"ext-animate--on\">SLA and contract<\/li>\n\n\n\n<li class=\"ext-animate--on\">Any available test reports (optional)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Access control overview (how accounts are created\/removed)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 2 \u2014 Documentation Review<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Assess whether the supplier has <em>basic<\/em> controls in place.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify missing or unclear areas.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Key Activities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Check if policies exist and are followed.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Verify that responsibilities are assigned.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Confirm that basic security measures are documented.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify gaps requiring interview clarification.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 3 \u2014 Interviews<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Validate that processes work in practice.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Understand how the supplier manages ICT risks with limited resources.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Typical Interviewees<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Owner \/ CEO (common in small companies)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Lead developer or IT administrator<\/li>\n\n\n\n<li class=\"ext-animate--on\">Person responsible for security (may be part\u2011time)<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Focus Areas<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">How incidents are detected and escalated<\/li>\n\n\n\n<li class=\"ext-animate--on\">How access rights are managed<\/li>\n\n\n\n<li class=\"ext-animate--on\">How backups are performed and tested<\/li>\n\n\n\n<li class=\"ext-animate--on\">How updates and patches are applied<\/li>\n\n\n\n<li class=\"ext-animate--on\">How subcontractors are controlled<\/li>\n\n\n\n<li class=\"ext-animate--on\">How data is protected<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 4 \u2014 Operational Verification<\/strong><\/h4>\n\n\n\n<p class=\"ext-animate--on\">Testing is <strong>lightweight<\/strong>, focusing on evidence rather than formal processes.<\/p>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Examples of Proportionate Tests<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Review backup logs or screenshots<\/li>\n\n\n\n<li class=\"ext-animate--on\">Check MFA activation on key systems<\/li>\n\n\n\n<li class=\"ext-animate--on\">Review a sample of access rights<\/li>\n\n\n\n<li class=\"ext-animate--on\">Verify patching on a sample system<\/li>\n\n\n\n<li class=\"ext-animate--on\">Review incident log (even if informal)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Confirm subcontractor list accuracy<\/li>\n\n\n\n<li class=\"ext-animate--on\">Check encryption settings (basic)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 5 \u2014 Reporting<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Deliverables<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Short, clear report (2\u20135 pages)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Summary of compliance with DORA<\/li>\n\n\n\n<li class=\"ext-animate--on\">Key findings and risks<\/li>\n\n\n\n<li class=\"ext-animate--on\">Practical recommendations<\/li>\n\n\n\n<li class=\"ext-animate--on\">Contractual improvement suggestions<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Evaluation Criteria<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Clarity and completeness of documentation<\/li>\n\n\n\n<li class=\"ext-animate--on\">Proportionality to supplier size<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence of basic security hygiene<\/li>\n\n\n\n<li class=\"ext-animate--on\">Ability to support resilience of the outsourced service<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\">Checklist for a Small Supplier Audit According to DORA<\/h3>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>1. Governance &amp; Accountability<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">A responsible person for ICT\/security is designated<\/li>\n\n\n\n<li class=\"ext-animate--on\">Basic security policy exists<\/li>\n\n\n\n<li class=\"ext-animate--on\">Roles and responsibilities are clear<\/li>\n\n\n\n<li class=\"ext-animate--on\">Management is aware of ICT risks<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>2. ICT Risk Management (Simplified)<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Supplier identifies key ICT risks<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risks relevant to the service are understood<\/li>\n\n\n\n<li class=\"ext-animate--on\">Basic mitigation measures exist (MFA, backups, patching)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk review occurs at least annually<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>3. Information Security Basics<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">MFA enabled for administrative access<\/li>\n\n\n\n<li class=\"ext-animate--on\">Access rights follow least\u2011privilege principles<\/li>\n\n\n\n<li class=\"ext-animate--on\">Joiner\/leaver process exists (even simple)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Antivirus\/EDR installed<\/li>\n\n\n\n<li class=\"ext-animate--on\">Basic logging enabled<\/li>\n\n\n\n<li class=\"ext-animate--on\">Patching performed regularly<\/li>\n\n\n\n<li class=\"ext-animate--on\">Development and production environments separated (if applicable)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>4. Incident Management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Simple incident procedure exists<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incidents are logged (spreadsheet acceptable)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Severity levels defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">Client notified promptly when relevant<\/li>\n\n\n\n<li class=\"ext-animate--on\">Lessons learned documented for major incidents<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>5. Backups &amp; Continuity<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Backups performed regularly<\/li>\n\n\n\n<li class=\"ext-animate--on\">Backups encrypted<\/li>\n\n\n\n<li class=\"ext-animate--on\">Restore tests performed at least annually<\/li>\n\n\n\n<li class=\"ext-animate--on\">Simple continuity plan exists (1\u20132 pages)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier can operate during short disruptions<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>6. Operational Resilience Testing (Basic)<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Vulnerability scans or simple security tests performed<\/li>\n\n\n\n<li class=\"ext-animate--on\">Penetration tests (optional, depending on service)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Table\u2011top incident exercises (even informal)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Test results documented<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>7. Sub\u2011Outsourcing<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Supplier maintains a list of subcontractors<\/li>\n\n\n\n<li class=\"ext-animate--on\">Subcontractors assessed for basic security<\/li>\n\n\n\n<li class=\"ext-animate--on\">Client approval required for material sub\u2011outsourcing<\/li>\n\n\n\n<li class=\"ext-animate--on\">Contracts include minimal security clauses<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>8. Contractual Compliance with DORA<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Contract includes:\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">SLA and KPIs<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident reporting obligations<\/li>\n\n\n\n<li class=\"ext-animate--on\">Right to audit<\/li>\n\n\n\n<li class=\"ext-animate--on\">Right to inspect<\/li>\n\n\n\n<li class=\"ext-animate--on\">Data location requirements<\/li>\n\n\n\n<li class=\"ext-animate--on\">Sub\u2011outsourcing conditions<\/li>\n\n\n\n<li class=\"ext-animate--on\">Termination rights<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li class=\"ext-animate--on\">Responsibilities and liabilities clearly defined<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>9. Data Protection<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Data encrypted in transit<\/li>\n\n\n\n<li class=\"ext-animate--on\">Data encrypted at rest (if applicable)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Access to client data restricted<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier complies with GDPR<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>10. Monitoring &amp; Reporting<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Performance metrics tracked<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier provides SLA or performance reports<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier reports incidents promptly<\/li>\n\n\n\n<li class=\"ext-animate--on\">Regular service review meetings occur<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-18437aeb wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--18\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-right:0;padding-bottom:var(--wp--preset--spacing--70);padding-left:0\">\n<div class=\"wp-block-group alignwide is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--19\">\n<div class=\"wp-block-cover alignwide is-style-ext-preset--cover--natural-1--cover-overlay-1 ext-animate--on is-style-ext-preset--cover--natural-1--cover-overlay-1--20\" style=\"padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--30)\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" class=\"wp-block-cover__image-background wp-image-365\" alt=\"\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-80 has-background-dim\" style=\"background-color:#010101\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-container-core-cover-is-layout-1c074333 wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-group alignwide ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-f3b35183 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h2 class=\"wp-block-heading has-text-align-center ext-animate--on has-x-large-font-size\" style=\"margin-bottom:24px\">Protect your company with a supplier audit today.<\/h2>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.417), 18px);\">Leverage our expertise in DORA-compliant supplier audits to strengthen security and meet regulatory requirements. Learn how we can help you assess and optimize your business partners.<\/p>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-ext-preset--button--natural-1--button-1 ext-animate--on is-style-ext-preset--button--natural-1--button-1--21\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/jdaadvisory.com\/en\/contact\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>DORA Small Supplier Audit -Ensure compliance and operational security. Discover our DORA-compliant supplier audits, ensuring reliability and protection for your company &#8211; DORA Small Supplier Audit DORA Small Supplier Audit &#8211; Comprehensive DORA compliance analysis. We thoroughly verify whether suppliers meet DORA requirements, minimizing risk and strengthening your operational security. DORA Small Supplier Audit &#8211; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-with-title","meta":{"footnotes":""},"class_list":["post-348","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DORA Small Supplier Audit - JDA Advisory<\/title>\n<meta name=\"description\" content=\"DORA Small Supplier Audit \u2013 proportionate audit of small ICT suppliers, checklists, methodology and RTS\/ITS compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jdaadvisory.com\/en\/dora-small-supplier-audit\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA Small Supplier Audit - JDA Advisory\" \/>\n<meta property=\"og:description\" content=\"DORA Small Supplier Audit \u2013 proportionate audit of small ICT suppliers, checklists, methodology and RTS\/ITS compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jdaadvisory.com\/en\/dora-small-supplier-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"JDA Advisory\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T06:55:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AdvisoryJd65783\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-small-supplier-audit\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-small-supplier-audit\\\/\",\"name\":\"DORA Small Supplier Audit - JDA Advisory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-small-supplier-audit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-small-supplier-audit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg\",\"datePublished\":\"2026-04-12T18:20:44+00:00\",\"dateModified\":\"2026-04-15T06:55:41+00:00\",\"description\":\"DORA Small Supplier Audit \u2013 proportionate audit of small ICT suppliers, checklists, methodology and RTS\\\/ITS compliance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-small-supplier-audit\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jdaadvisory.com\\\/dora-small-supplier-audit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-small-supplier-audit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-small-supplier-audit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/jdaadvisory.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA Small Supplier Audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"name\":\"JDA Advisory\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\",\"name\":\"JDA Advisory\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"width\":1024,\"height\":1024,\"caption\":\"JDA Advisory\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/AdvisoryJd65783\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DORA Small Supplier Audit - JDA Advisory","description":"DORA Small Supplier Audit \u2013 proportionate audit of small ICT suppliers, checklists, methodology and RTS\/ITS compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jdaadvisory.com\/en\/dora-small-supplier-audit\/","og_locale":"en_GB","og_type":"article","og_title":"DORA Small Supplier Audit - JDA Advisory","og_description":"DORA Small Supplier Audit \u2013 proportionate audit of small ICT suppliers, checklists, methodology and RTS\/ITS compliance.","og_url":"https:\/\/jdaadvisory.com\/en\/dora-small-supplier-audit\/","og_site_name":"JDA Advisory","article_modified_time":"2026-04-15T06:55:41+00:00","og_image":[{"url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@AdvisoryJd65783","twitter_misc":{"Estimated reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jdaadvisory.com\/dora-small-supplier-audit\/","url":"https:\/\/jdaadvisory.com\/dora-small-supplier-audit\/","name":"DORA Small Supplier Audit - JDA Advisory","isPartOf":{"@id":"https:\/\/jdaadvisory.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jdaadvisory.com\/dora-small-supplier-audit\/#primaryimage"},"image":{"@id":"https:\/\/jdaadvisory.com\/dora-small-supplier-audit\/#primaryimage"},"thumbnailUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg","datePublished":"2026-04-12T18:20:44+00:00","dateModified":"2026-04-15T06:55:41+00:00","description":"DORA Small Supplier Audit \u2013 proportionate audit of small ICT suppliers, checklists, methodology and RTS\/ITS compliance.","breadcrumb":{"@id":"https:\/\/jdaadvisory.com\/dora-small-supplier-audit\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jdaadvisory.com\/dora-small-supplier-audit\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jdaadvisory.com\/dora-small-supplier-audit\/#primaryimage","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/19b60f1cab2a3b773af0bcb56f8437d10a8ed638.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/jdaadvisory.com\/dora-small-supplier-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/jdaadvisory.com\/"},{"@type":"ListItem","position":2,"name":"DORA Small Supplier Audit"}]},{"@type":"WebSite","@id":"https:\/\/jdaadvisory.com\/en\/#website","url":"https:\/\/jdaadvisory.com\/en\/","name":"JDA Advisory","description":"","publisher":{"@id":"https:\/\/jdaadvisory.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jdaadvisory.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/jdaadvisory.com\/en\/#organization","name":"JDA Advisory","url":"https:\/\/jdaadvisory.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","width":1024,"height":1024,"caption":"JDA Advisory"},"image":{"@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/AdvisoryJd65783"]}]}},"_links":{"self":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/comments?post=348"}],"version-history":[{"count":8,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/348\/revisions"}],"predecessor-version":[{"id":550,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/348\/revisions\/550"}],"wp:attachment":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/media?parent=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}