{"id":75762,"date":"2026-04-17T13:32:31","date_gmt":"2026-04-17T11:32:31","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/arcad\/?p=75762"},"modified":"2026-04-17T13:32:31","modified_gmt":"2026-04-17T11:32:31","slug":"dora-regulation-application-security-at-arcad-software","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/","title":{"rendered":"DORA Regulation &#038; Application Security at ARCAD Software"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-margin-top:20px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><b>The Digital Operational Resilience Act(DORA)<\/b> is a set of regulations that aims to strengthen <b>the digital resilience of the financial sector<\/b> against IT risks.<\/p>\n<p>Adopted in December 2022, it entered into force in January 2023 and has been applicable since January 17, 2025, across the European Union.<\/p>\n<p>In this context, several requirements directly impact application development, management, and security. <b>The solutions offered by ARCAD Software <\/b>help address these requirements through several key areas.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" id=\"blog-content\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><script type=\"text\/javascript\">\n(function ($) {\n  function setInnerLinks(containerID, elementClass) {\n    var $container = $('#' + containerID);\n    if (!$container.length) return;\n\n    \/\/ Emplacement du sommaire (Avada) avec repli sur le container\n    var $host = $(\"#blog-content>.fusion-builder-row>.fusion-layout-column:first-child .fusion-column-wrapper\");\n    if (!$host.length) $host = $container;\n\n    \/\/ Cr\u00e9e le bloc sommaire une seule fois\n    var $summary = $host.find('.summary');\n    if (!$summary.length) {\n      $summary = $(\"<div class='summary'><\/div>\");\n      var host = window.location.hostname.toLowerCase();\nvar tocTitle =\n  host.endsWith('.fr') ? 'Sommaire' :\n  host.endsWith('.com') ? 'Summary' :\n  ((document.documentElement.lang || '').toLowerCase().startsWith('fr') ? 'Sommaire' : 'Summary');\n\n\/\/ Insertion du titre (en texte, pas en HTML)\n$summary.append($('<h2\/>', { text: tocTitle, class: 'exclude-summary', style: 'padding-left: 25px;' }));\n      $summary.append(\"<ol id='\" + containerID + \"_links'><\/ol>\");\n      $host.prepend($summary);\n    }\n    var $list = $('#' + containerID + '_links').empty();\n\n    \/\/ Helpers: enlever la num\u00e9rotation, slug, unicit\u00e9\n    function stripLeadingEnumeration(str) {\n      var s = (str || '').trim();\n\n      \/\/ Cas 1 : \"1) Titre\", \"1. Titre\", \"1 - Titre\", \"1 \u2014 Titre\", \"1: Titre\"\n      s = s.replace(\/^\\d+\\s*[).:\\-\u2013\u2014]\\s+\/, '');\n\n      \/\/ Cas 2 : \"1.2 Titre\", \"2.3.4 Titre\" (au moins un point dans le groupe)\n      s = s.replace(\/^\\d+(?:\\.\\d+)+\\s+\/, '');\n\n      \/\/ NB : on ne retire PAS un simple nombre suivi d\u2019un espace (ex: \"2025 Roadmap\")\n      return s.trim();\n    }\n    var slugCounts = {};\n    function toSlug(str) {\n      return (str || '')\n        .toLowerCase()\n        .normalize('NFD').replace(\/[\\u0300-\\u036f]\/g, '')\n        .replace(\/[^\\w\\s-]\/g, '')\n        .trim()\n        .replace(\/\\s+\/g, '-')\n        .replace(\/-+\/g, '-');\n    }\n    function uniqueId(base) {\n      var n = (slugCounts[base] || 0) + 1;\n      slugCounts[base] = n;\n      return n === 1 ? base : base + '-' + n;\n    }\n\n    \/\/ S\u00e9lectionne les titres\n    var selector = elementClass || 'h2:not(.exclude-summary)';\n    var $headings = $container.find(selector);\n\n    $headings.each(function () {\n      var $h = $(this);\n      if ($h.hasClass('exclude-summary')) return;\n\n      \/\/ Texte pour l'affichage dans l'OL : sans la num\u00e9rotation initiale\n      var rawText = $.trim($h.text());\n      var displayText = stripLeadingEnumeration(rawText);\n\n      \/\/ ID bas\u00e9 sur le texte nettoy\u00e9 pour un slug plus propre\n      if (!$h.attr('id')) {\n        var base = toSlug(displayText || 'section');\n        var id = uniqueId(base);\n        while (document.getElementById(id)) { id = uniqueId(base); }\n        $h.attr('id', id);\n      }\n      var id = $h.attr('id');\n\n      \/\/ Focusable quand on suit l\u2019ancre\n      if (!$h.attr('tabindex')) $h.attr('tabindex', '-1');\n\n      \/\/ Ajoute l\u2019item de la liste ordonn\u00e9e (le num\u00e9ro est fourni par <ol>)\n      $list.append(\"<li><a href='#\" + id + \"'>\" + displayText + \"<\/a><\/li>\");\n    });\n\n    \/\/ Scroll fluide avec offset si header fixe\n    var $header = $('.fusion-header, .fusion-header-wrapper, header, .site-header').first();\n    var isFixed = \/fixed|sticky\/.test(($header.css('position') || ''));\n    var offset = isFixed ? ($header.outerHeight() || 0) : 0;\n\n    \/\/ D\u00e9l\u00e9gation: un seul handler pour tous les liens\n    $list.off('click.toc').on('click.toc', 'a', function (e) {\n      e.preventDefault();\n      var targetId = $(this).attr('href'); \/\/ ex: #vs-code-settings-sync\n      var $t = $(targetId);\n      if (!$t.length) return;\n\n      var y = Math.max($t.offset().top - offset, 0);\n      $('html, body').animate({ scrollTop: y }, 400);\n\n      \/\/ Met \u00e0 jour l\u2019URL sans jump\n      if (history.replaceState) history.replaceState(null, '', targetId);\n    });\n  }\n\n  \/\/ Document ready\n  $(function () {\n    setInnerLinks('blog-content', 'h2:not(.exclude-summary)');\n  });\n\n  \/\/ Optionnel: exporter la fonction\n  window.setInnerLinks = setInnerLinks;\n})(jQuery);\n<\/script>\n\n\n<div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#437cb4;--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">1. Securing the Software Development Lifecycle (Secure SDLC)<\/h2><\/div><div class=\"fusion-text fusion-text-2\"><p>The DORA regulation requires financial institutions to implement <b>a robust framework for ICT risk management<\/b> to secure their applications and IT infrastructure.<\/p>\n<p><i>\u201cFinancial entities shall have a sound, comprehensive and well-documented ICT risk management framework as part of their overall risk management system [&#8230;]\u201d<\/i><\/p>\n<p><span style=\"background-color: rgba(0, 0, 0, 0);\">\u2014<a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022R2554\" target=\"_blank\" rel=\"noopener noreferrer\"> Article 6, Regulation (EU) 2022\/2554<\/a><\/span><\/p>\n<p>The requirements imposed by these regulations will lead organizations to <b>secure the entire software development lifecycle<\/b>, which will limit risks related to application changes and deployments.<\/p>\n<p>\u27a1\ufe0f <b style=\"color: #437cb4;\">ARCAD Contribution:<\/b><\/p>\n<p>Our <a href=\"\/arcad\/products\/arcad-for-devops\/\">DevOps solutions<\/a> automate and <b>secure application development<\/b>, <b>testing<\/b>, and <b>deployment processes<\/b>, while ensuring rigorous version and change management.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">2. Change Management and Traceability (Audit Trail)<\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p>In order to ensure transparency, IT governance, and regulatory compliance, DORA requires <b>organizations to precisely track changes<\/b> made to their IT systems.<\/p>\n<p>DORA also mandates strict control over system changes:<\/p>\n<p><i>\u201cFinancial entities shall [&#8230;] implement documented policies, procedures and controls for ICT change management [\u2026] in order to ensure that all changes are recorded, tested, assessed, approved, implemented and verified in a controlled manner.\u201d<\/i><\/p>\n<p><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022R2554\" target=\"_blank\" rel=\"noopener noreferrer\">\u2014 Article 9, Regulation (EU) 2022\/2554<\/a><\/p>\n<p>Organizations must notably:<\/p>\n<ul>\n<li>maintain a history of changes<\/li>\n<li>identify users who performed those changes<\/li>\n<li>document operations carried out on applications and IT environments<\/li>\n<li>ensure control and traceability of changes<\/li>\n<\/ul>\n<p>\u27a1\ufe0f <span style=\"color: #437cb4;\"><b>ARCAD Contribution:<\/b><\/span><\/p>\n<p>Our DevOps solutions provide a complete audit trail, enabling full tracking of all operations performed on applications, from development to production deployment.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Optimize your delivery cycle<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_2_5 2_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/arcad\/products\/arcad-for-devops\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Discover ARCAD for DevOps<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Discover ARCAD for DevOps<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">3. System Resilience and Robustness Testing<\/h2><\/div><div class=\"fusion-text fusion-text-5\"><p>The European DORA framework requires financial institutions to regularly test the robustness of their systems to ensure <b>digital operational resilience<\/b> against IT incidents.<\/p>\n<p><i>\u201cFinancial entities [&#8230;] shall establish procedures and policies to prioritise, classify and remedy all issues revealed throughout the performance of the tests [which are part of the ICT Risk Managmeent framework] and shall establish internal validation methodologies to ascertain that all identified weaknesses, deficiencies or gaps are fully addressed.&#8221;<\/i><\/p>\n<p>\u2014 <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022R2554\" target=\"_blank\" rel=\"noopener noreferrer\">Article 24, Regulation (EU) 2022\/2554<\/a><\/p>\n<p>\u27a1\ufe0f <span style=\"color: #437cb4;\"><b>ARCAD Contribution:<\/b><\/span><\/p>\n<p>Our <a href=\"\/arcad\/products\/arcad-for-devops\/\">DevOps solutions<\/a> facilitate test automation within the development lifecycle, enabling:<\/p>\n<ul>\n<li>secure production releases<\/li>\n<li>reduced risks related to application changes<\/li>\n<li>improved application quality and stability<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">4. Identification of Critical Systems and Application Mapping<\/h2><\/div><div class=\"fusion-text fusion-text-6\"><p>DORA requires organizations to <b>identify their critical systems<\/b> and <b>understand dependencies<\/b> between applications and IT infrastructure.<\/p>\n<p><i>\u201cFinancial entities shall [&#8230;] map the configuration of the information assets and ICT assets and the links and interdependencies between the different information assets and ICT assets.&#8221;<\/i><\/p>\n<p>\u2014 <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022R2554\" target=\"_blank\" rel=\"noopener noreferrer\">Article 8 Regulation (EU) 2022\/2554<\/a><\/p>\n<p>This capability is essential to assess the potential impact of an incident or a change across the entire information system.<\/p>\n<p>\u27a1\ufe0f <span style=\"color: #437cb4;\"><b>ARCAD Contribution:<\/b><\/span><\/p>\n<p><span data-contrast=\"auto\">Our <\/span><b><span data-contrast=\"auto\"><a href=\"\/discover\/\">DISCOVER<\/a><\/span><\/b> solution enables:<\/p>\n<ul>\n<li>analysis of programs and databases<\/li>\n<li>mapping of application dependencies<\/li>\n<li>identification of potential impacts of changes across the entire information system<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Document your legacy applications using AI<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/discover\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Discover DISCOVER<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Discover DISCOVER<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">5. Deployment Control and Rollback Capability<\/h2><\/div><div class=\"fusion-text fusion-text-8\"><p>The European DORA regulations also require financial institutions to <b>ensure the continuity and resilience of their IT systems<\/b>, particularly in the event of incidents or errors during application changes.<\/p>\n<p><i>\u201cFinancial entities shall set up backup systems that can be activated in accordance with the backup policies and procedures, as well as restoration and recovery procedures and methods.&#8221;<\/i><\/p>\n<p>\u2014 <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022R2554\" target=\"_blank\" rel=\"noopener noreferrer\">Article 12, Regulation (EU) 2022\/2554<\/a><\/p>\n<p>In this context, organizations should be able to <b>control software deployments<\/b>, <b>secure production releases<\/b>, and <b>quickly restore a stable version<\/b> in case of issues to ensure service continuity.<\/p>\n<p>\u27a1\ufe0f <span style=\"color: #437cb4;\"><b>ARCAD Contribution:<\/b><\/span><\/p>\n<p>The <a href=\"\/drops\/\">DROPS<\/a> solution, which is a <b>platform engineering<\/b> tool, automates and secures application deployments while ensuring service continuity. <span style=\"background-color: rgba(0, 0, 0, 0);\">DROPS enables <b>version management<\/b> and <b>rapid rollback<\/b> to a stable version in case of error, minimizing the impact of incidents. <\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-4 fusion_builder_column_inner_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Orchestrate your cross-platform deployments<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-5 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/drops\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Discover DROPS<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Discover DROPS<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">6. Code Quality and Early Vulnerability Detection<\/h2><\/div><div class=\"fusion-text fusion-text-10\"><p>The DORA framework requires financial institutions to<b> identify weaknesses in their systems <\/b>to strengthen digital resilience.<\/p>\n<p><i>\u201cFinancial entities [&#8230;] shall establish procedures and policies to prioritise, classify and remedy all issues revealed throughout the performance of the tests [which are part of the ICT Risk Management framework] and shall establish internal validation methodologies to ascertain that all identified weaknesses, deficiencies or gaps are fully addressed.\u201d<\/i><\/p>\n<p>\u2014<a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022R2554\" target=\"_blank\" rel=\"noopener noreferrer\"> Article 24, Regulation (EU) 2022\/2554<\/a><\/p>\n<p><b>Code quality<\/b> and <span style=\"color: #4a4e57;\"><b>early vulnerability<\/b><\/span><span style=\"color: #4a4e57;\"><b> detection<\/b> <\/span>help reduce costs and risks, improve application maintainability, and secure development processes, particularly when onboarding new developers.<\/p>\n<p>\u27a1\ufe0f <span style=\"color: #437cb4;\"><b>ARCAD Contribution:<\/b><\/span><\/p>\n<p>The<a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\"> ARCAD CodeChecker<\/a> solution automatically analyzes code to detect vulnerabilities, errors, and poor practices. <span style=\"background-color: rgba(0, 0, 0, 0);\">It improves code quality and contributes to strengthening IT system resilience in line with DORA requirements. <\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-6 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:57%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.3684210526316%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.3684210526316%;--awb-width-medium:57%;--awb-order-medium:0;--awb-spacing-right-medium:3.3684210526316%;--awb-spacing-left-medium:3.3684210526316%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Protect your code against vulnerabilities<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-7 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:42%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.5714285714286%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.5714285714286%;--awb-width-medium:42%;--awb-order-medium:0;--awb-spacing-right-medium:4.5714285714286%;--awb-spacing-left-medium:4.5714285714286%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-4 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Discover ARCAD CodeChecker<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Discover ARCAD CodeChecker<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">Conclusion<\/h2><\/div><div class=\"fusion-text fusion-text-12\"><p><b>DORA<\/b> strengthens requirements related to<b> IT system security<\/b>, <b>change traceability<\/b>, and <b>digital resilience<\/b> in the financial sector.<\/p>\n<p>With its solutions, ARCAD Software supports organizations in:<\/p>\n<ul>\n<li>securing the software development lifecycle<\/li>\n<li>ensuring application change traceability<\/li>\n<li>automating testing and deployments<\/li>\n<li>mapping systems and understanding application dependencies<\/li>\n<\/ul>\n<p>These solutions contribute to improving <b>digital operational resilience and compliance with DORA requirements.<\/b><\/p>\n<p>Furthermore, test environment management and data protection remain key challenges in achieving DORA compliance. <b>Data anonymization<\/b>, notably with <a href=\"\/dot\/\">DOT Anonymizer<\/a>, helps reduce risks while facilitating testing and development.<\/p>\n<p>\ud83d\udc49 To learn more, check out <a href=\"\/dot\/resources\/blog-en\/dora-the-digital-operational-resilience-act-regulation\/\">our dedicated article. <\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The DORA regulation strengthens security, traceability, and resilience requirements for IT systems. Learn how ARCAD helps you comply.<\/p>\n","protected":false},"author":16,"featured_media":75424,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[219,46],"tags":[616,369],"class_list":["post-75762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-news-events","tag-blog-en","tag-ibm-i-modernization"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The DORA Regulation &amp; Application Security<\/title>\n<meta name=\"description\" content=\"The DORA regulation strengthens security, traceability, and resilience requirements for IT systems. Learn how ARCAD helps you comply.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The DORA Regulation &amp; Application Security\" \/>\n<meta property=\"og:description\" content=\"The DORA regulation strengthens security, traceability, and resilience requirements for IT systems. Learn how ARCAD helps you comply.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-17T11:32:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/56072f2a9491143460e3cadf23b9d730\"},\"headline\":\"DORA Regulation &#038; Application Security at ARCAD Software\",\"datePublished\":\"2026-04-17T11:32:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/\"},\"wordCount\":5699,\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/banner-blog-article-dora-devops.png\",\"keywords\":[\"blog\",\"IBM i Modernization\"],\"articleSection\":[\"Blog\",\"News &amp; Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/\",\"name\":\"The DORA Regulation & Application Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/banner-blog-article-dora-devops.png\",\"datePublished\":\"2026-04-17T11:32:31+00:00\",\"description\":\"The DORA regulation strengthens security, traceability, and resilience requirements for IT systems. Learn how ARCAD helps you comply.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/banner-blog-article-dora-devops.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/banner-blog-article-dora-devops.png\",\"width\":940,\"height\":350,\"caption\":\"Banner Blog article r\u00e8glement DORA et produits ARCAD for DevOps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/dora-regulation-application-security-at-arcad-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA Regulation &#038; Application Security at ARCAD Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/56072f2a9491143460e3cadf23b9d730\",\"name\":\"Myriam Goutte\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/author\\\/myriam-goutte\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The DORA Regulation & Application Security","description":"The DORA regulation strengthens security, traceability, and resilience requirements for IT systems. Learn how ARCAD helps you comply.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/","og_locale":"en_US","og_type":"article","og_title":"The DORA Regulation & Application Security","og_description":"The DORA regulation strengthens security, traceability, and resilience requirements for IT systems. Learn how ARCAD helps you comply.","og_url":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_published_time":"2026-04-17T11:32:31+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png","type":"image\/png"}],"author":"Myriam Goutte","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/56072f2a9491143460e3cadf23b9d730"},"headline":"DORA Regulation &#038; Application Security at ARCAD Software","datePublished":"2026-04-17T11:32:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/"},"wordCount":5699,"publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png","keywords":["blog","IBM i Modernization"],"articleSection":["Blog","News &amp; Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/","name":"The DORA Regulation & Application Security","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png","datePublished":"2026-04-17T11:32:31+00:00","description":"The DORA regulation strengthens security, traceability, and resilience requirements for IT systems. Learn how ARCAD helps you comply.","breadcrumb":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png","width":940,"height":350,"caption":"Banner Blog article r\u00e8glement DORA et produits ARCAD for DevOps"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/dora-regulation-application-security-at-arcad-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"DORA Regulation &#038; Application Security at ARCAD Software"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/56072f2a9491143460e3cadf23b9d730","name":"Myriam Goutte","url":"https:\/\/www.arcadsoftware.com\/arcad\/author\/myriam-goutte\/"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/75762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/comments?post=75762"}],"version-history":[{"count":3,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/75762\/revisions"}],"predecessor-version":[{"id":75800,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/75762\/revisions\/75800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media\/75424"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media?parent=75762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/categories?post=75762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/tags?post=75762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}