{"id":330,"date":"2026-04-12T17:56:12","date_gmt":"2026-04-12T17:56:12","guid":{"rendered":"https:\/\/jdaadvisory.com\/?page_id=330"},"modified":"2026-04-15T08:18:02","modified_gmt":"2026-04-15T06:18:02","slug":"dora-critical-supplier-audit","status":"publish","type":"page","link":"https:\/\/jdaadvisory.com\/pl\/dora-critical-supplier-audit\/","title":{"rendered":"DORA Critical Supplier Audit"},"content":{"rendered":"<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--1\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Critical Supplier Audit &#8211; Ensure full compliance with the DORA regulation and gain a competitive advantage.<\/h2>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">Our audit services ensure security, ISO compliance, and business stability in line with the DORA regulation &#8211; DORA Critical Supplier Audit<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--2\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg\" alt=\"\" class=\"wp-image-336\" style=\"aspect-ratio:4\/3;object-fit:cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Critical Supplier Audit &#8211; Comprehensive DORA compliance risk assessment.<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We analyze processes and systems, identify gaps, and recommend actions to protect your organization from sanctions and operational disruptions.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--3\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/4ffa6d48d206243032442d5a74915da535fab5c1.jpg\" alt=\"\" class=\"wp-image-337\" style=\"aspect-ratio:4\/3;object-fit:cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/4ffa6d48d206243032442d5a74915da535fab5c1.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/4ffa6d48d206243032442d5a74915da535fab5c1-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/4ffa6d48d206243032442d5a74915da535fab5c1-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/4ffa6d48d206243032442d5a74915da535fab5c1-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/4ffa6d48d206243032442d5a74915da535fab5c1-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Critical Supplier Audit -ISO 27001 and ISO 22301 certification and implementation.<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We support the effective implementation of information security and business continuity standards to meet DORA and NIS-2 requirements.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--4\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/87e59d5f5c733897abfe7d13ef8354c311e2f86e.jpg\" alt=\"\" class=\"wp-image-338\" style=\"aspect-ratio:4\/3;object-fit:cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/87e59d5f5c733897abfe7d13ef8354c311e2f86e.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/87e59d5f5c733897abfe7d13ef8354c311e2f86e-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/87e59d5f5c733897abfe7d13ef8354c311e2f86e-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/87e59d5f5c733897abfe7d13ef8354c311e2f86e-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/87e59d5f5c733897abfe7d13ef8354c311e2f86e-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading ext-animate--on\">Compliance monitoring and reporting.<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">Regular audits and reports help you continuously monitor compliance and respond quickly to evolving regulatory challenges.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--5\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-text-align-center ext-animate--on\">Our DORA-compliant audit offering for suppliers<\/h2>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">Discover our comprehensive audit services that help meet DORA requirements as well as ISO 27001, ISO 22301, and NIS-2 standards.<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--6\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Compliance Audit<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We conduct detailed analyses to ensure your organization meets all DORA regulatory requirements.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--7\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">ISO 27001 Audit<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We offer specialized information security audits in line with ISO 27001, enhancing data protection.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--8\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik04MCw0MGE0MCw0MCwwLDEsMCw0MCw0MEE0MCw0MCwwLDAsMCw4MCw0MFptMCw2NGEyNCwyNCwwLDEsMSwyNC0yNEEyNCwyNCwwLDAsMSw4MCwxMDRabTk2LDE2YTQwLDQwLDAsMSwwLTQwLTQwQTQwLDQwLDAsMCwwLDE3NiwxMjBabTAtNjRhMjQsMjQsMCwxLDEtMjQsMjRBMjQsMjQsMCwwLDEsMTc2LDU2Wk04MCwxMzZhNDAsNDAsMCwxLDAsNDAsNDBBNDAsNDAsMCwwLDAsODAsMTM2Wm0wLDY0YTI0LDI0LDAsMSwxLDI0LTI0QTI0LDI0LDAsMCwxLDgwLDIwMFptMTM2LTI0YTgsOCwwLDAsMS04LDhIMTg0djI0YTgsOCwwLDAsMS0xNiwwVjE4NEgxNDRhOCw4LDAsMCwxLDAtMTZoMjRWMTQ0YTgsOCwwLDAsMSwxNiwwdjI0aDI0QTgsOCwwLDAsMSwyMTYsMTc2WiI+PC9wYXRoPjwvc3ZnPg==\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">ISO 22301 Audit<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We focus on business continuity, tailoring solutions to your company\u2019s needs.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--9\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-text-align-center ext-animate--on\">How We Conduct a DORA Audit<\/h2>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">We present a detailed DORA compliance audit process to help you understand each stage and maximize implementation effectiveness.<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--10\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlpNMTQwLDgwdjk2YTgsOCwwLDAsMS0xNiwwVjk1bC0xMS41Niw3LjcxYTgsOCwwLDEsMS04Ljg4LTEzLjMybDI0LTE2QTgsOCwwLDAsMSwxNDAsODBaIj48L3BhdGg+PC9zdmc+\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step One: Current State Analysis<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We assess current procedures and systems to identify areas requiring adjustment in line with DORA requirements.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--11\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlptMjUuNTYtOTIuNzRMMTIwLDE2OGgzMmE4LDgsMCwwLDEsMCwxNkgxMDRhOCw4LDAsMCwxLTYuNC0xMi44bDQzLjE3LTU3LjU2YTE2LDE2LDAsMSwwLTI3Ljg2LTE1LDgsOCwwLDAsMS0xNS4wOS01LjM0LDMyLDMyLDAsMSwxLDU1Ljc0LDI5LjkzWiI+PC9wYXRoPjwvc3ZnPg==\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step Two: Implementation of Recommendations<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We implement recommended solutions, aligning processes with ISO 27001, ISO 22301, DORA, and NIS-2 requirements.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--12\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step Three: Verification and Reporting<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We conduct a final audit to confirm compliance and prepare a detailed report with recommendations for the future.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--13\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Audit Methodology for Critical Supplier<\/h2>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">JDA Advisory base DORA Critical Supplier Audit Methodology, with an extensive checklist, compliant with EBA\/ESMA\/EIOPA RTS\/ITS and market practice for banks, fintechs, insurers, and ICT.<\/p>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/eur-lex.europa.eu\/search.html?scope=EURLEX&amp;text=DORA&amp;lang=en&amp;type=quick&amp;qid=1776232417704\">DORA Act<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\"><strong>Critical Supplier Audit Methodology according to DORA<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>1. <\/strong>Audit objective<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Identification of gaps, risks, and recommendations for the financial institution. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Assessment of the critical supplier&#8217;s compliance with DORA requirements (Articles 28\u201330, RTS\/ITS). <\/li>\n\n\n\n<li class=\"ext-animate--on\">Verification of the adequacy of ICT controls, cybersecurity, business continuity, and risk management. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Assessment of the supplier&#8217;s ability to ensure the operational resilience of critical services.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\"><strong>2. Audit scope<\/strong><\/h3>\n\n\n\n<p class=\"ext-animate--on\">The scope should include at least:<\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>2.1. Mandatory areas according to DORA<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Governance and accountability structure. <\/li>\n\n\n\n<li class=\"ext-animate--on\">ICT risk management. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Cybersecurity and information protection. <\/li>\n\n\n\n<li class=\"ext-animate--on\">ICT incident management. Business continuity and contingency planning. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Operational resilience testing. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Subcontractor management (sub-outsourcing). <\/li>\n\n\n\n<li class=\"ext-animate--on\">Contract compliance with DORA requirements. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Reporting and communication with regulated clients.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>2.2. Critical services covered by the audit<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Data processing services. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Production systems. Hosting \/ cloud \/ infrastructure. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Software (SaaS\/PaaS\/IaaS). <\/li>\n\n\n\n<li class=\"ext-animate--on\">Maintenance and support. <\/li>\n\n\n\n<li class=\"ext-animate--on\">SOC\/NOC services. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Security services (IAM, SIEM, EDR, WAF, DLP).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\"><strong>3. Audit model<\/strong><\/h3>\n\n\n\n<p class=\"ext-animate--on\">The audit is conducted in 6 stages:<\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 1 \u2014 Audit preparation<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\">Objective<\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Defining the scope, criticality, and objectives of the audit. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Collecting documentation from the supplier.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Key activities<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Contract and SLA analysis. <\/li>\n\n\n\n<li class=\"ext-animate--on\">DPIA\/TRA\/RAA analysis (if applicable). <\/li>\n\n\n\n<li class=\"ext-animate--on\">Service architecture analysis.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Sending a list of documents to the supplier:\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Security policies. <\/li>\n\n\n\n<li class=\"ext-animate--on\">ICT procedures. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident logs. <\/li>\n\n\n\n<li class=\"ext-animate--on\">DR\/BCP plans. SOC 2 \/ ISO 27001 \/ ISAE 3402 reports. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Penetration test reports. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Subcontractor register.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 2 \u2013 Documentation Analysis<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objective<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Assessment of formal compliance with DORA. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Identification of areas requiring in-depth verification.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Key activities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Mapping documentation to DORA requirements. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Assessing completeness and currency. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Assessing ICT process maturity.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 3 \u2013 Interviews and Workshops<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\">Objective<\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Verification of practical process performance. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Assessment of competencies and responsibilities.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Scope of interviews<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">CTO \/ Head of IT.<\/li>\n\n\n\n<li class=\"ext-animate--on\">CISO \/ Security Manager.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Business Continuity Manager. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident Manager. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Subcontractor Manager. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Quality\/Service Manager.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 4 \u2013 Operational Testing and Verification<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\">Objective<\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Checking the actual operation of the control.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Sample tests<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">ICT incident test (table-top). <\/li>\n\n\n\n<li class=\"ext-animate--on\">Verification of logs and security alerts. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Verification of backups (restore test). <\/li>\n\n\n\n<li class=\"ext-animate--on\">Verification of RTO\/RPO. Verification of access control (IAM). <\/li>\n\n\n\n<li class=\"ext-animate--on\">Verification of environment segregation. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Verification of patch management. Verification of monitoring and SIEM. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Verification of change management processes.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Step 5 &#8211; Compliance and Risk Assessment<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\">Objective<\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">DORA compliance assessment. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier risk assessment (risk scoring). <\/li>\n\n\n\n<li class=\"ext-animate--on\">Identification of gaps and recommendations.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Results<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Risk map. Maturity assessment. List of non-compliances. Recommendations and recovery plan.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 6 \u2014 Final report<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Report Elements<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Contract\/SLA requirements. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Executive summary. <\/li>\n\n\n\n<li class=\"ext-animate--on\">DORA compliance assessment. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier risk assessment. <\/li>\n\n\n\n<li class=\"ext-animate--on\">List of non-compliances (major\/minor\/observations). <\/li>\n\n\n\n<li class=\"ext-animate--on\">Recommendations and priorities. <\/li>\n\n\n\n<li class=\"ext-animate--on\">Required corrective actions.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\">DORA CRITICAL SUPPLIER AUDIT CHECKLIST<\/h3>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>1. Governance and responsibility<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Does the provider have a formal ICT security management system? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are roles and responsibilities clearly defined? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there a CISO function? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there an ICT risk committee? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there a reporting process to the board?<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>2.  ICT<\/strong> risk management<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Is there a formal risk assessment methodology? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Does the provider conduct regular risk reviews? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there an ICT risk register? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are risks mapped to the services provided to the client? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are there risk mitigation plans?<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>3. Cybersecurity<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Is there an information security policy? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there an identity management system (IAM)? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are MFA, least privilege, and role-based access used? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there security monitoring (SIEM\/SOC)? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there endpoint protection (EDR\/XDR)? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there network protection (WAF, IDS\/IPS)? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there a vulnerability management process? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there a patch management process?<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>4.  ICT<\/strong> <strong>incident management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Is there a formal incident management procedure? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are incidents classified according to criticality? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Does the supplier report incidents to the customer in a timely manner? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there an incident log? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is post-mortem\/RCA performed?<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>5. Business continuity and operational resilience<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Is there a BCP\/DRP? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are plans tested at least annually? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Does testing include cyber scenarios? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are there RTOs\/RPOs for critical services? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are there backups? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are recovery tests documented?<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>6. Operational resilience tests<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Does the provider perform penetration testing? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Does the provider perform red team\/purple team testing? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Does the provider perform table-top testing? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are test results shared with the client?<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>7. Subcontractor management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Does the supplier maintain a register of subcontractors? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are subcontractors assessed for ICT risk? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Are subcontractors in compliance with DORA? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there a process for approving new subcontractors? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there monitoring of subcontractors?<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>8. Compliance of contracts with DORA<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Does the contract include the required DORA elements:\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">SLA and KPI <\/li>\n\n\n\n<li class=\"ext-animate--on\">RTO\/RPO Right to Audit <\/li>\n\n\n\n<li class=\"ext-animate--on\">Right to Inspect <\/li>\n\n\n\n<li class=\"ext-animate--on\">Right to Terminate <\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident Reporting Requirements <\/li>\n\n\n\n<li class=\"ext-animate--on\">Subcontractor Requirements <\/li>\n\n\n\n<li class=\"ext-animate--on\">Data Localization Requirements<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li class=\"ext-animate--on\">Does the contract specify the supplier&#8217;s liability?<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>9. Data protection and privacy<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Does the provider comply with GDPR requirements? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Does the provider have data deletion procedures? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is data encrypted at rest and in transit? <\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there access control for customer data?<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>10. Monitoring and reporting<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Are there monthly\/quarterly service reviews? Does the provider provide regular SLA reports? Does the provider report incidents in real time?<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--14\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill-element is-style-ext-preset--media-text--natural-1--card-1 ext-animate--on has-tertiary-background-color has-background is-style-ext-preset--media-text--natural-1--card-1--15\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg\" alt=\"\" class=\"wp-image-336 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group alignwide ext-animate--on is-vertical is-layout-flex wp-container-core-group-is-layout-53474e87 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-812d5580 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h2 class=\"wp-block-heading ext-animate--on\">Start your DORA audit with JDA Advisory today.<\/h2>\n\n\n\n<p class=\"ext-animate--on\">Leverage JDA Advisory\u2019s expertise to ensure DORA compliance and enhance your organization\u2019s security. Learn how our audits and implementations meet ISO 27001, ISO 22301, and NIS-2 requirements and secure the future of your business.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-ext-preset--button--natural-1--button-1 ext-animate--on is-style-ext-preset--button--natural-1--button-1--16\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/jdaadvisory.com\/pl\/contact\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>DORA Critical Supplier Audit &#8211; Ensure full compliance with the DORA regulation and gain a competitive advantage. Our audit services ensure security, ISO compliance, and business stability in line with the DORA regulation &#8211; DORA Critical Supplier Audit DORA Critical Supplier Audit &#8211; Comprehensive DORA compliance risk assessment. We analyze processes and systems, identify gaps, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-with-title","meta":{"footnotes":""},"class_list":["post-330","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DORA Critical Supplier Audit - JDA Advisory<\/title>\n<meta name=\"description\" content=\"DORA Critical Supplier Audit comprehensive ICT supplier assessment, RTS\/ITS compliance, ready-made checklists and audit methodology for ICT.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jdaadvisory.com\/pl\/dora-critical-supplier-audit\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA Critical Supplier Audit - JDA Advisory\" \/>\n<meta property=\"og:description\" content=\"DORA Critical Supplier Audit comprehensive ICT supplier assessment, RTS\/ITS compliance, ready-made checklists and audit methodology for ICT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jdaadvisory.com\/pl\/dora-critical-supplier-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"JDA Advisory\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T06:18:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AdvisoryJd65783\" \/>\n<meta name=\"twitter:label1\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-critical-supplier-audit\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-critical-supplier-audit\\\/\",\"name\":\"DORA Critical Supplier Audit - JDA Advisory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-critical-supplier-audit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-critical-supplier-audit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg\",\"datePublished\":\"2026-04-12T17:56:12+00:00\",\"dateModified\":\"2026-04-15T06:18:02+00:00\",\"description\":\"DORA Critical Supplier Audit comprehensive ICT supplier assessment, RTS\\\/ITS compliance, ready-made checklists and audit methodology for ICT.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-critical-supplier-audit\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jdaadvisory.com\\\/dora-critical-supplier-audit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-critical-supplier-audit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-critical-supplier-audit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/jdaadvisory.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA Critical Supplier Audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"name\":\"JDA Advisory\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\",\"name\":\"JDA Advisory\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"width\":1024,\"height\":1024,\"caption\":\"JDA Advisory\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/AdvisoryJd65783\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DORA Critical Supplier Audit - JDA Advisory","description":"DORA Critical Supplier Audit comprehensive ICT supplier assessment, RTS\/ITS compliance, ready-made checklists and audit methodology for ICT.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jdaadvisory.com\/pl\/dora-critical-supplier-audit\/","og_locale":"pl_PL","og_type":"article","og_title":"DORA Critical Supplier Audit - JDA Advisory","og_description":"DORA Critical Supplier Audit comprehensive ICT supplier assessment, RTS\/ITS compliance, ready-made checklists and audit methodology for ICT.","og_url":"https:\/\/jdaadvisory.com\/pl\/dora-critical-supplier-audit\/","og_site_name":"JDA Advisory","article_modified_time":"2026-04-15T06:18:02+00:00","og_image":[{"width":1440,"height":960,"url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@AdvisoryJd65783","twitter_misc":{"Szacowany czas czytania":"9 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jdaadvisory.com\/dora-critical-supplier-audit\/","url":"https:\/\/jdaadvisory.com\/dora-critical-supplier-audit\/","name":"DORA Critical Supplier Audit - JDA Advisory","isPartOf":{"@id":"https:\/\/jdaadvisory.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jdaadvisory.com\/dora-critical-supplier-audit\/#primaryimage"},"image":{"@id":"https:\/\/jdaadvisory.com\/dora-critical-supplier-audit\/#primaryimage"},"thumbnailUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg","datePublished":"2026-04-12T17:56:12+00:00","dateModified":"2026-04-15T06:18:02+00:00","description":"DORA Critical Supplier Audit comprehensive ICT supplier assessment, RTS\/ITS compliance, ready-made checklists and audit methodology for ICT.","breadcrumb":{"@id":"https:\/\/jdaadvisory.com\/dora-critical-supplier-audit\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jdaadvisory.com\/dora-critical-supplier-audit\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/jdaadvisory.com\/dora-critical-supplier-audit\/#primaryimage","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/bf59b14faf61a7f07c71517ef63f0aeb28aa8225.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/jdaadvisory.com\/dora-critical-supplier-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/jdaadvisory.com\/"},{"@type":"ListItem","position":2,"name":"DORA Critical Supplier Audit"}]},{"@type":"WebSite","@id":"https:\/\/jdaadvisory.com\/en\/#website","url":"https:\/\/jdaadvisory.com\/en\/","name":"JDA Advisory","description":"","publisher":{"@id":"https:\/\/jdaadvisory.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jdaadvisory.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/jdaadvisory.com\/en\/#organization","name":"JDA Advisory","url":"https:\/\/jdaadvisory.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","width":1024,"height":1024,"caption":"JDA Advisory"},"image":{"@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/AdvisoryJd65783"]}]}},"_links":{"self":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages\/330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":6,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages\/330\/revisions"}],"predecessor-version":[{"id":536,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages\/330\/revisions\/536"}],"wp:attachment":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/media?parent=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}