Product
September 11th, 2024

Leveraging Coder's Cloud Development Environment for Compliance with the Digital Operational Resilience Act (DORA)

author avatar
Tim Quinlan
Sr Technical Marketing Manager

SHARE

Operational resilience is a necessity in today’s digital-first landscape. With increasing cybersecurity threats, regulatory bodies are stepping up efforts to protect critical sectors from disruptions. The European Union's Digital Operational Resilience Act (DORA) sets new standards for financial institutions to safeguard against Information and Communication Technology (ICT) disruptions and cyber risks. As companies gear up for DORA compliance on January 17th, 2025, Cloud Development Environments (CDE) help organizations meet these stringent requirements.

In this blog, we’ll explore how Coder's CDE helps financial organizations align their software development practices with DORA regulations and boosts their overall digital resilience.

Understanding DORA

DORA establishes a unified regulatory framework for the financial sector to manage operational resilience. It imposes strict requirements on:

  1. Risk Management: Financial entities must have solid IT risk management frameworks.
  2. Incident Reporting: Companies must implement efficient and standardized processes for reporting ICT-related incidents.
  3. Digital Operational Resilience Testing: Periodic testing of ICT systems is mandatory to assess operational resilience.
  4. Third-Party Risk Management: Entities must ensure that third-party ICT service providers comply with these regulations.
  5. Information Sharing: To mitigate cyber threats, a framework for secure information sharing between financial institutions is emphasized.

The Role of Coder's Cloud Development Environment in DORA Compliance

Coder offers several capabilities to help financial entities align with DORA requirements. Here's how:

1. Enhanced Security and Risk Management

DORA places a significant emphasis on risk management; securing the development process is critical. Coder is designed with enterprise-grade security at its core, allowing companies to enforce security policies across the entire development pipeline. Some of its attributes that contribute to compliance include:

  • Declarative Workspaces and Open Standards: Reduce the risk of introducing vulnerabilities into the software supply chain. Build development runtimes from existing secured registries and repositories.
  • Centralized Storage: Store intellectual property on enterprise storage systems, reducing risk of code exfiltration via compromised, lost, or stolen devices.
  • Role Based Access Control: Granular RBAC ensures only authenticated users can access the system and only authorized users can administer the system.
  • Identity Provider Integration: Eliminate extraneous account definitions and authenticate/authorize CDE users with existing centralized enterprise IDP.

2. Automated Incident Reporting

DORA mandates financial institutions have robust processes for incident reporting. Coder makes it easy to track the root cause of incidents, report them effectively, and implement corrective actions with the following features:

  • Audit Logging: All system activity (logins, template updates, workspace creations, workspace starts/stops, etc.) are logged. Coder’s use of open standards eases aggregation to centralized logging systems.
  • Cloud and Platform Agnostic: Run developer environments on infrastructure that is already certified to meet your organization's security standards and is observed by existing enterprise systems.

3. Digital Operational Resilience Testing

One of the core requirements of DORA is conducting regular resilience testing to ensure systems can withstand operational risks. Coder’s declarative nature and use of open standards make it easy to reproduce environments that are representative of production:

  • Reproducible Environments: Kubernetes-based Coder deployments are declared with a Helm chart making it easy to build representative testing environments. Workspaces are declared with Terraform templates making it easy to promote templates from testing to production.
  • Version-Controlled Workspaces: Each workspace template is version-controlled in the Coder control plane, easing promotion and reversion of workspace definitions.
  • Scaling: Coder includes an easy-to-use scale testing feature and documentation for scaling to thousands of users.

4. Third-Party Risk Management

Third-party service providers such as contractors and consultants are commonplace in today’s business environment. DORA requires financial institutions to assess and manage risks associated with these third parties. Coder allows companies to define strict controls and policies for their third-party developers and service providers.

Through its centralized environment, financial institutions can standardize security practices across internal teams and third-party developers, ensuring that everyone follows the same security protocols:

  • Browser-Only Mode: This is the easiest and most secure way to deploy tooling to developers. It enables only browser-based IDEs and ensures that all connections are proxied through the Coder control plane, significantly reducing the risk of mass file copy code exfiltration.
  • VDI Alternative: Combine Coder’s Browser-Only feature with a secure browser, such as Island, for a secure VDI alternative. This eliminates copy/paste code exfiltration (in addition to browser-only protections). This combination also secures full Windows desktop workspaces over web-based RDP clients, opening the option of using Coder for almost any workload.
  • Workspace Proxy: Deploy workspaces in-region wherever the developers are while retaining one centralized control plane. This feature eliminates issues with lag when using browser-based workspaces at a global scale.

5. Information Sharing and Collaboration

DORA promotes a collaborative approach, encouraging institutions to share information about vulnerabilities and incidents. Coder’s use of open standards eases integration with tools, helping companies to securely share critical information with partners or regulatory bodies as mandated by DORA.

  • Use of Existing Observability Systems: Coder’s cloud- and platform-agnostic approach allows organizations to run their CDE on the providers and platforms they are already monitoring and observing.
  • Open Source, Open Standards: 100% Open Source ethos and reliance on open standards ensures organizations are never locked in to proprietary technologies or information formats.

Conclusion

The Digital Operational Resilience Act sets high standards for ensuring the digital resilience of financial institutions, and compliance with this regulation is essential for businesses operating within the EU. Coder positions organizations to meet these demands by offering enhanced security, efficient risk management, incident reporting, and the tools necessary for ongoing testing and third-party risk management.

By adopting Coder, companies can not only streamline their development processes but also ensure that their digital products and operations are resilient, secure, and compliant with the evolving regulatory landscape. As financial institutions continue to navigate the complexities of DORA, solutions like Coder provide the agility, security, and transparency necessary for maintaining operational continuity in an increasingly digital world.

Are you ready to take the next step toward DORA compliance? Explore how Coder's CDE can support your organization today.

RELATED ARTICLES

Enjoy what you read?

Subscribe to our newsletter

By signing up, you agree to our Privacy Policy and Terms of service.