ICT asset identification and dependency mapping form the foundation of DORA compliance. Article 8 of EU Regulation 2022/2554 requires financial entities to identify, classify, and adequately document all ICT assets and their interdependencies. Without a complete and accurate asset inventory, every other DORA requirement - from risk assessment to incident reporting - operates on incomplete information.

What DORA requires for ICT asset management

Article 8 sets out specific requirements across several dimensions. Financial entities must identify and document all information assets and ICT assets, including those on remote sites. They must classify these assets according to their criticality and map all dependencies between assets, systems, processes, and ICT third-party providers.

Article 8.7 adds a specific obligation around legacy ICT systems: entities must carry out a specific risk assessment for any ICT system that is no longer supported by its provider or that uses outdated technology.

The four layers of ICT asset mapping

Effective asset mapping under DORA requires thinking in four interconnected layers:

1. Business functions

Start by identifying your critical or important business functions. Under DORA, these are functions whose disruption would materially impair the entity's financial performance, soundness, or continuity. Examples include payment processing, trading operations, client account management, regulatory reporting, and core banking operations.

2. Information assets

Map the data and information that each business function relies on. This includes customer data, transaction records, market data feeds, regulatory filings, and internal operational data. Understanding data flows is essential for assessing impact if an ICT asset fails.

3. ICT assets

Document the technology components that store, process, or transmit information assets. This layer includes:

4. Dependencies

This is the most complex but arguably the most valuable layer. Map how assets depend on each other and on external providers. A single cloud provider outage might cascade through dozens of applications. A DNS failure could disable all external-facing services. Dependency mapping reveals these hidden chains of risk.

Step-by-step approach to asset inventory

  1. Scope definition - Define the boundary of your inventory. All ICT assets that support financial services operations are in scope, including those managed by third parties on your behalf.
  2. Discovery - Use automated discovery tools where possible to identify assets on your network. Supplement with manual input for cloud services, SaaS applications, and assets managed by third parties.
  3. Classification - Assign each asset a criticality level based on the business functions it supports. An asset that underpins a critical function inherits that criticality.
  4. Dependency mapping - Document upstream and downstream dependencies for each asset. What does it depend on? What depends on it? Include third-party dependencies.
  5. Ownership assignment - Assign a responsible owner for each asset. Under DORA, management bodies have ultimate accountability, but day-to-day ownership should be clearly delegated.
  6. Documentation - Record all information in a structured, auditable format. This feeds into your ICT risk management framework and your Register of Information.

Dependency mapping best practices

Dependency mapping is where most organisations struggle. A few practical recommendations:

Legacy system considerations

Article 8.7 requires specific attention to legacy ICT systems. For each system identified as legacy (end-of-life, unsupported, or running outdated technology), entities must:

Annual review requirement

DORA requires the ICT asset inventory and dependency map to be reviewed at least annually, or after significant changes to the ICT environment. Treat this as a living document, not a one-time exercise.

How DoraLytics helps

DoraLytics is purpose-built for ICT asset and dependency mapping under DORA. The platform provides a structured register where you can classify assets, assign criticality, and map dependencies visually. Dependency chains are displayed as interactive graphs, making it easy to identify concentration risks and single points of failure. The asset register integrates directly with the Third-Party Risk Management and Register of Information modules, so data flows automatically across your compliance workflow.

Further reading

Want to simplify your DORA compliance?

See how DoraLytics can help you map ICT assets and dependencies with purpose-built tools for DORA Article 8.

Explore DoraLytics