{"id":335,"date":"2026-04-12T18:07:13","date_gmt":"2026-04-12T18:07:13","guid":{"rendered":"https:\/\/jdaadvisory.com\/?page_id=335"},"modified":"2026-04-15T08:51:06","modified_gmt":"2026-04-15T06:51:06","slug":"dora-mid-size-supplier-audit","status":"publish","type":"page","link":"https:\/\/jdaadvisory.com\/pl\/dora-mid-size-supplier-audit\/","title":{"rendered":"DORA Mid-Size Supplier Audit"},"content":{"rendered":"<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--1\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Mid-Size Supplier Audit &#8211; Ensure compliance and gain a competitive advantage.<\/h2>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">Our DORA audit offering ensures full regulatory compliance and strengthens information security within your organization &#8211; DORA Mid-Size Supplier Audit<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--2\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b6dcc875c3db8daa8dddcdf8abddc101cc093569.jpg\" alt=\"\" class=\"wp-image-352\" style=\"aspect-ratio:4\/3;object-fit:cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b6dcc875c3db8daa8dddcdf8abddc101cc093569.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b6dcc875c3db8daa8dddcdf8abddc101cc093569-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b6dcc875c3db8daa8dddcdf8abddc101cc093569-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b6dcc875c3db8daa8dddcdf8abddc101cc093569-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b6dcc875c3db8daa8dddcdf8abddc101cc093569-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Mid-Size Supplier Audit &#8211; Comprehensive compliance risk assessment.<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">A thorough analysis of supplier processes enables the identification and elimination of potential threats, ensuring operational stability.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--3\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a45dd1a31eec89f49b4a00c33fb648d82367d2ea.jpg\" alt=\"\" class=\"wp-image-354\" style=\"aspect-ratio:4\/3;object-fit:cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a45dd1a31eec89f49b4a00c33fb648d82367d2ea.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a45dd1a31eec89f49b4a00c33fb648d82367d2ea-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a45dd1a31eec89f49b4a00c33fb648d82367d2ea-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a45dd1a31eec89f49b4a00c33fb648d82367d2ea-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/a45dd1a31eec89f49b4a00c33fb648d82367d2ea-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Mid-Size Supplier Audit &#8211; Alignment with DORA regulatory requirements.<\/h3>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We help implement the necessary changes so your suppliers meet all legal requirements and industry security standards.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--4\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb.jpg\" alt=\"\" class=\"wp-image-355\" style=\"aspect-ratio:4\/3;object-fit:cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading ext-animate--on\">Business continuity management support.<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">Our recommendations enable effective planning and risk minimization across the supply chain, contributing to business stability.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--5\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide ext-is-logical-start ext-animate--on has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-6729bdbe wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading ext-animate--on\">Our DORA compliance audit offering<\/h4>\n\n\n\n<p class=\"has-text-align-left ext-animate--on\">Explore comprehensive supplier audits that ensure full compliance with DORA requirements while enhancing information security in your company.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--6\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h5 class=\"wp-block-heading ext-animate--on\">DORA Risk Assessment<\/h5>\n\n\n\n<p class=\"ext-animate--on\">We conduct a thorough risk analysis to identify potential security gaps in your suppliers\u2019 environments.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--7\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik04MCw0MGE0MCw0MCwwLDEsMCw0MCw0MEE0MCw0MCwwLDAsMCw4MCw0MFptMCw2NGEyNCwyNCwwLDEsMSwyNC0yNEEyNCwyNCwwLDAsMSw4MCwxMDRabTk2LDE2YTQwLDQwLDAsMSwwLTQwLTQwQTQwLDQwLDAsMCwwLDE3NiwxMjBabTAtNjRhMjQsMjQsMCwxLDEtMjQsMjRBMjQsMjQsMCwwLDEsMTc2LDU2Wk04MCwxMzZhNDAsNDAsMCwxLDAsNDAsNDBBNDAsNDAsMCwwLDAsODAsMTM2Wm0wLDY0YTI0LDI0LDAsMSwxLDI0LTI0QTI0LDI0LDAsMCwxLDgwLDIwMFptOTYtNjRhNDAsNDAsMCwxLDAsNDAsNDBBNDAsNDAsMCwwLDAsMTc2LDEzNlptMCw2NGEyNCwyNCwwLDEsMSwyNC0yNEEyNCwyNCwwLDAsMSwxNzYsMjAwWiI+PC9wYXRoPjwvc3ZnPg==\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h5 class=\"wp-block-heading ext-animate--on\">Security Procedures Verification<\/h5>\n\n\n\n<p class=\"ext-animate--on\">We verify the effectiveness of implemented security measures, ensuring compliance with the latest DORA standards.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--8\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h5 class=\"wp-block-heading ext-animate--on\">Compliance Report and Recommendations<\/h5>\n\n\n\n<p class=\"ext-animate--on\">We deliver detailed audit reports along with practical guidance to improve security processes.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--9\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">How the audit works<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">We present a detailed DORA audit process to help suppliers effectively meet regulatory and information security requirements.<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--10\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlpNMTQwLDgwdjk2YTgsOCwwLDAsMS0xNiwwVjk1bC0xMS41Niw3LjcxYTgsOCwwLDEsMS04Ljg4LTEzLjMybDI0LTE2QTgsOCwwLDAsMSwxNDAsODBaIj48L3BhdGg+PC9zdmc+\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-center ext-animate--on\">Stage One: Preparation<\/h5>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We analyze existing security procedures to define the audit scope and prepare the supplier for full DORA compliance.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--11\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlptMjUuNTYtOTIuNzRMMTIwLDE2OGgzMmE4LDgsMCwwLDEsMCwxNkgxMDRhOCw4LDAsMCwxLTYuNC0xMi44bDQzLjE3LTU3LjU2YTE2LDE2LDAsMSwwLTI3Ljg2LTE1LDgsOCwwLDAsMS0xNS4wOS01LjM0LDMyLDMyLDAsMSwxLDU1Ljc0LDI5LjkzWiI+PC9wYXRoPjwvc3ZnPg==\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-center ext-animate--on\">Stage Two: Assessment<\/h5>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We conduct a detailed assessment of systems and processes, identifying areas for improvement to meet DORA standards.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--12\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-center ext-animate--on\">Stage Three: Reporting<\/h5>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We provide a comprehensive report with recommendations to help the supplier fully align with DORA audit requirements.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/eur-lex.europa.eu\/search.html?scope=EURLEX&amp;text=DORA&amp;lang=en&amp;type=quick&amp;qid=1776232417704\">DORA Act<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-ffba7dca wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--13\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-group alignwide is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--14\">\n<div class=\"wp-block-group alignwide is-style-default ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-f611be13 wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.625), 20px);\"><strong>Methodology for Conducting a Mid\u2011Sized Supplier Audit According to DORA<\/strong><\/h4>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>1. Purpose of the Audit<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Provide recommendations to reduce outsourcing\u2011related risks.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Assess the supplier\u2019s compliance with DORA requirements relevant to ICT services of medium criticality.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evaluate the adequacy of ICT risk management, security controls, incident handling, and continuity arrangements.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify operational, contractual, and regulatory gaps.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\"><strong>2. Scope of the Audit<\/strong><\/h3>\n\n\n\n<p class=\"ext-animate--on\">The scope should be <strong>proportionate<\/strong> to the supplier\u2019s size, service criticality, and risk exposure.<\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>2.1 Mandatory DORA Areas<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Governance and accountability.<\/li>\n\n\n\n<li class=\"ext-animate--on\">ICT risk management.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Information security and cyber controls.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident management.<\/li>\n\n\n\n<li class=\"ext-animate--on\">ICT business continuity and backup processes.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Operational resilience testing (simplified).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Sub\u2011outsourcing management.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Contractual compliance with DORA.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>2.2 Typical Services Provided by Mid\u2011Sized Suppliers<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">IT operations and helpdesk.<\/li>\n\n\n\n<li class=\"ext-animate--on\">SaaS platforms of moderate importance.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Hosting, private cloud, or managed infrastructure.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Application maintenance and support.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Basic security services (monitoring, vulnerability scanning).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\"><strong>3. Audit Process<\/strong><\/h3>\n\n\n\n<p class=\"ext-animate--on\">The audit consists of <strong>five proportional stages<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 1 \u2014 Audit Preparation<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Define scope, depth, and audit criteria.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Collect essential documentation.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Key Activities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Review the outsourcing agreement and SLA.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Request documentation such as:\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Information security policy.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident management procedure.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Backup and recovery procedures.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk assessment (if available).<\/li>\n\n\n\n<li class=\"ext-animate--on\">List of subcontractors.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Penetration test reports (if applicable).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Business continuity plan (simplified).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Change management procedure.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 2 \u2014 Documentation Review<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Assess formal compliance with DORA.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify areas requiring deeper verification.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Key Activities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Map documentation to DORA requirements.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evaluate completeness, maturity, and proportionality.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify missing or outdated elements.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Prepare interview questions based on gaps.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Stage 3 \u2014 Operational Interviews<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Validate how processes work in practice.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Assess competence and ownership.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Typical Interviewees<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Head of IT \/ CTO.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Security Officer or responsible person.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident Manager.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Backup\/Operations Manager.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Service Delivery Manager.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Focus Areas<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">How controls are implemented day\u2011to\u2011day.<\/li>\n\n\n\n<li class=\"ext-animate--on\">How incidents are detected, escalated, and reported.<\/li>\n\n\n\n<li class=\"ext-animate--on\">How access rights are managed.<\/li>\n\n\n\n<li class=\"ext-animate--on\">How backups are verified.<\/li>\n\n\n\n<li class=\"ext-animate--on\">How changes are approved and documented.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Stage 4 \u2014 Operational Testing and Verification<\/strong><\/h5>\n\n\n\n<p class=\"ext-animate--on\">Testing is <strong>lighter<\/strong> than for critical suppliers but still essential.<\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Examples of Tests<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Verify backup execution logs and at least one restore test.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Review incident logs for the last 12 months.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Check access rights for key systems (sample\u2011based).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Verify MFA enforcement.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Review patching cadence and vulnerability scan results.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Check segregation of environments (dev\/test\/prod).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Review monitoring alerts and escalation paths.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Validate subcontractor list and approval process.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Stage 5 \u2014 Reporting and Risk Assessment<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Deliverables<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Executive summary.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Compliance assessment against DORA.<\/li>\n\n\n\n<li class=\"ext-animate--on\">List of findings (major, minor, observations).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk rating (low\/medium\/high).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Recommended remediation actions.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Contractual improvement suggestions (if needed).<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Evaluation Criteria<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Ability to support resilience and continuity.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Proportionality to service criticality.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Maturity of processes.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence of operational discipline.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\">Checklist for a Mid\u2011Sized Supplier Audit According to DORA<\/h3>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>1. Governance &amp; Accountability<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Supplier has a designated person responsible for ICT security.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Roles and responsibilities are documented.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Security policies are approved and reviewed periodically.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Management receives reports on incidents and risks.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>2. ICT Risk Management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Supplier performs ICT risk assessments.<\/li>\n\n\n\n<li class=\"ext-animate--on\">A risk register exists and is updated at least annually.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risks relevant to the outsourced service are identified.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Mitigation measures are documented and implemented.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>3. Information Security &amp; Cybersecurity<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">MFA is implemented for administrative and remote access.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Access rights follow least\u2011privilege and role\u2011based principles.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Joiner\u2011mover\u2011leaver process is documented and followed.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Logging and basic monitoring are in place.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Antivirus\/EDR is deployed and monitored.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Vulnerability management process exists.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Patching is performed regularly and documented.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Network segmentation or environment separation is implemented.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>4. Incident Management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Incident management procedure exists and is followed.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incidents are classified by severity.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident register is maintained.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Root cause analysis is performed for major incidents.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Client is notified within agreed timelines.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence of incident response exercises exists.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>5. Business Continuity &amp; Backups<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Backup policy and schedule exist.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Backups are encrypted.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Restore tests are performed and documented.<\/li>\n\n\n\n<li class=\"ext-animate--on\">A simplified business continuity plan exists.<\/li>\n\n\n\n<li class=\"ext-animate--on\">RTO\/RPO values are defined and realistic.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier can continue operations during disruptions.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>6. Operational Resilience Testing<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Penetration tests are conducted (if relevant).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Vulnerability scans are performed regularly.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Table\u2011top exercises for incident response are conducted.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Test results are documented and shared upon request.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>7. Sub\u2011Outsourcing Management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Supplier maintains a list of subcontractors.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Subcontractors are assessed for ICT risk.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Contracts with subcontractors include security requirements.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Client approval is required for material sub\u2011outsourcing.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>8. Contractual Compliance with DORA<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Contract includes:\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">SLA and KPI definitions.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident reporting obligations.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Right to audit.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Right to inspect.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Data location requirements.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Sub\u2011outsourcing conditions.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Termination rights.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li class=\"ext-animate--on\">Responsibilities and liabilities are clearly defined.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>9. Data Protection<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Data is encrypted in transit.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Data is encrypted at rest (if applicable).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Access to client data is restricted and logged.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier complies with GDPR requirements.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>10. Monitoring &amp; Reporting<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Performance metrics are tracked and documented.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier provides SLA reports.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier reports incidents promptly.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Regular service review meetings are held.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--15\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center ext-animate--on is-layout-flex wp-container-core-columns-is-layout-174606dc wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading ext-animate--on\">Secure your supply chain compliance today.<\/h2>\n\n\n\n<p class=\"ext-animate--on\" style=\"margin-top:1.5rem\">Discover how our DORA audit can help your company meet information security requirements and avoid legal risk. Contact us to start the compliance assessment process.<\/p>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-ext-preset--button--natural-1--button-1 ext-animate--on is-style-ext-preset--button--natural-1--button-1--16\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/jdaadvisory.com\/pl\/contact\/\">Check details<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image is-style-ext-preset--image--natural-1--image-1--content-right ext-animate--on is-style-ext-preset--image--natural-1--image-1--content-right--17\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb.jpg\" alt=\"\" class=\"wp-image-355\" style=\"aspect-ratio:4\/3;object-fit:cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/97843b2a7a292072061a02fee6f6a5de358452bb-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>DORA Mid-Size Supplier Audit &#8211; Ensure compliance and gain a competitive advantage. Our DORA audit offering ensures full regulatory compliance and strengthens information security within your organization &#8211; DORA Mid-Size Supplier Audit DORA Mid-Size Supplier Audit &#8211; Comprehensive compliance risk assessment. A thorough analysis of supplier processes enables the identification and elimination of potential threats, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-with-title","meta":{"footnotes":""},"class_list":["post-335","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DORA Mid-Size Supplier Audit - JDA Advisory<\/title>\n<meta name=\"description\" content=\"DORA Mid-Size Supplier Audit \u2013 proportional ICT supplier assessment, checklists, audit methodology and RTS\/ITS compliance for mid-size.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jdaadvisory.com\/pl\/dora-mid-size-supplier-audit\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA Mid-Size Supplier Audit - JDA Advisory\" \/>\n<meta property=\"og:description\" content=\"DORA Mid-Size Supplier Audit \u2013 proportional ICT supplier assessment, checklists, audit methodology and RTS\/ITS compliance for mid-size.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jdaadvisory.com\/pl\/dora-mid-size-supplier-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"JDA Advisory\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T06:51:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b6dcc875c3db8daa8dddcdf8abddc101cc093569.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AdvisoryJd65783\" \/>\n<meta name=\"twitter:label1\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-mid-size-supplier-audit\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-mid-size-supplier-audit\\\/\",\"name\":\"DORA Mid-Size Supplier Audit - JDA Advisory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-mid-size-supplier-audit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-mid-size-supplier-audit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/b6dcc875c3db8daa8dddcdf8abddc101cc093569.jpg\",\"datePublished\":\"2026-04-12T18:07:13+00:00\",\"dateModified\":\"2026-04-15T06:51:06+00:00\",\"description\":\"DORA Mid-Size Supplier Audit \u2013 proportional ICT supplier assessment, checklists, audit methodology and RTS\\\/ITS compliance for mid-size.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-mid-size-supplier-audit\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jdaadvisory.com\\\/dora-mid-size-supplier-audit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-mid-size-supplier-audit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/b6dcc875c3db8daa8dddcdf8abddc101cc093569.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/b6dcc875c3db8daa8dddcdf8abddc101cc093569.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/dora-mid-size-supplier-audit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/jdaadvisory.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA Mid-Size Supplier Audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"name\":\"JDA Advisory\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\",\"name\":\"JDA Advisory\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"width\":1024,\"height\":1024,\"caption\":\"JDA Advisory\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/AdvisoryJd65783\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DORA Mid-Size Supplier Audit - JDA Advisory","description":"DORA Mid-Size Supplier Audit \u2013 proportional ICT supplier assessment, checklists, audit methodology and RTS\/ITS compliance for mid-size.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jdaadvisory.com\/pl\/dora-mid-size-supplier-audit\/","og_locale":"pl_PL","og_type":"article","og_title":"DORA Mid-Size Supplier Audit - JDA Advisory","og_description":"DORA Mid-Size Supplier Audit \u2013 proportional ICT supplier assessment, checklists, audit methodology and RTS\/ITS compliance for mid-size.","og_url":"https:\/\/jdaadvisory.com\/pl\/dora-mid-size-supplier-audit\/","og_site_name":"JDA Advisory","article_modified_time":"2026-04-15T06:51:06+00:00","og_image":[{"width":1440,"height":960,"url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b6dcc875c3db8daa8dddcdf8abddc101cc093569.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@AdvisoryJd65783","twitter_misc":{"Szacowany czas czytania":"9 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jdaadvisory.com\/dora-mid-size-supplier-audit\/","url":"https:\/\/jdaadvisory.com\/dora-mid-size-supplier-audit\/","name":"DORA Mid-Size Supplier Audit - JDA Advisory","isPartOf":{"@id":"https:\/\/jdaadvisory.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jdaadvisory.com\/dora-mid-size-supplier-audit\/#primaryimage"},"image":{"@id":"https:\/\/jdaadvisory.com\/dora-mid-size-supplier-audit\/#primaryimage"},"thumbnailUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b6dcc875c3db8daa8dddcdf8abddc101cc093569.jpg","datePublished":"2026-04-12T18:07:13+00:00","dateModified":"2026-04-15T06:51:06+00:00","description":"DORA Mid-Size Supplier Audit \u2013 proportional ICT supplier assessment, checklists, audit methodology and RTS\/ITS compliance for mid-size.","breadcrumb":{"@id":"https:\/\/jdaadvisory.com\/dora-mid-size-supplier-audit\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jdaadvisory.com\/dora-mid-size-supplier-audit\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/jdaadvisory.com\/dora-mid-size-supplier-audit\/#primaryimage","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b6dcc875c3db8daa8dddcdf8abddc101cc093569.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/b6dcc875c3db8daa8dddcdf8abddc101cc093569.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/jdaadvisory.com\/dora-mid-size-supplier-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/jdaadvisory.com\/"},{"@type":"ListItem","position":2,"name":"DORA Mid-Size Supplier Audit"}]},{"@type":"WebSite","@id":"https:\/\/jdaadvisory.com\/en\/#website","url":"https:\/\/jdaadvisory.com\/en\/","name":"JDA Advisory","description":"","publisher":{"@id":"https:\/\/jdaadvisory.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jdaadvisory.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/jdaadvisory.com\/en\/#organization","name":"JDA Advisory","url":"https:\/\/jdaadvisory.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","width":1024,"height":1024,"caption":"JDA Advisory"},"image":{"@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/AdvisoryJd65783"]}]}},"_links":{"self":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages\/335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/comments?post=335"}],"version-history":[{"count":9,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages\/335\/revisions"}],"predecessor-version":[{"id":546,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages\/335\/revisions\/546"}],"wp:attachment":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/media?parent=335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}