{"id":10777,"date":"2025-07-18T06:00:00","date_gmt":"2025-07-18T06:00:00","guid":{"rendered":"https:\/\/eperi.com\/?p=10777"},"modified":"2025-09-24T09:38:46","modified_gmt":"2025-09-24T09:38:46","slug":"dora-oversight-guide","status":"publish","type":"post","link":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/","title":{"rendered":"DORA Oversight Guide: What financial organizations need to know now about encryption and key sovereignty"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10777\" class=\"elementor elementor-10777 elementor-10776\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-936024a e-flex e-con-boxed e-con e-parent\" data-id=\"936024a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf883d6 elementor-widget elementor-widget-tertiaryStage\" data-id=\"bf883d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tertiaryStage.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"tertiaryStage top_padding_56 \">\n\t\t\t<div>\n\t\t\t\t\t\t\t\t<h1 class=\"title_size_1 top_margin_12 teaserHeadline\">DORA Oversight Guide: What financial organizations need to know now about encryption and key sovereignty<\/h1>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"top_margin_40 teaser-wrapper\">\n\t\t\t\t<div class=\"style-element\">\n\t\t\t\t\t<div class=\"copy_medium\" style=\"width:100%; max-width:450px\">The new DORA Oversight Guide requires clear evidence of data and key sovereignty. Find out what financial companies can expect now - and how you can prepare yourself.<\/div>\n\t\t\t\t\t<div class=\"top_margin_24 stageLinks\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div style=\"position:absolute; top:0px; left:0px; background-color:#00B4B4; width:4px; height:24px; border-radius: 0 0 4px 0\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"teaserImage\">\n\t\t\t\t<div><img decoding=\"async\" src=\"https:\/\/eperi.com\/wp-content\/uploads\/2024\/04\/Graphic.png\" alt=\"\" class=\"default_image border_radius_24\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-066a4da e-flex e-con-boxed e-con e-parent\" data-id=\"066a4da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0841647 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0841647\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9805088 e-con-full e-flex e-con e-child\" data-id=\"9805088\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55df0c7 elementor-widget elementor-widget-post-info\" data-id=\"55df0c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-7065232 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/eperi.com\/en\/author\/ricardo-izzieperi-com\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-pen-nib\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t\t\t\tRicardo Izzi\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-432626c elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/eperi.com\/en\/2025\/07\/18\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar-alt\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>July 18, 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-391e0d6 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-tags\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/eperi.com\/en\/category\/blog-en\/\" class=\"elementor-post-info__terms-list-item\">blog<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d180988 elementor-widget elementor-widget-betterdocs-reading-time\" data-id=\"d180988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"betterdocs-reading-time.default\">\n\t\t\t\t\t<div class=\"reading-time betterdocs\">\n\t<p>\n\t\t<svg width=\"14\" viewBox=\"0 0 14 15\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t<mask id=\"mask0_6195_23752\" style=\"mask-type:alpha\" maskUnits=\"userSpaceOnUse\" x=\"0\" y=\"0\">\n\t\t\t<rect y=\"0.5\" width=\"14\" height=\"14\" fill=\"#D9D9D9\"\/>\n\t\t\t<\/mask>\n\t\t\t<g mask=\"url(#mask0_6195_23752)\">\n\t\t\t<path d=\"M8.92508 10.241L9.74175 9.42435L7.58341 7.26602V4.58268H6.41675V7.73268L8.92508 10.241ZM7.00008 13.3327C6.19314 13.3327 5.4348 13.1796 4.72508 12.8733C4.01536 12.5671 3.398 12.1514 2.873 11.6264C2.348 11.1014 1.93237 10.4841 1.62612 9.77435C1.31987 9.06463 1.16675 8.30629 1.16675 7.49935C1.16675 6.6924 1.31987 5.93407 1.62612 5.22435C1.93237 4.51463 2.348 3.89727 2.873 3.37227C3.398 2.84727 4.01536 2.43164 4.72508 2.12539C5.4348 1.81914 6.19314 1.66602 7.00008 1.66602C7.80703 1.66602 8.56536 1.81914 9.27508 2.12539C9.9848 2.43164 10.6022 2.84727 11.1272 3.37227C11.6522 3.89727 12.0678 4.51463 12.374 5.22435C12.6803 5.93407 12.8334 6.6924 12.8334 7.49935C12.8334 8.30629 12.6803 9.06463 12.374 9.77435C12.0678 10.4841 11.6522 11.1014 11.1272 11.6264C10.6022 12.1514 9.9848 12.5671 9.27508 12.8733C8.56536 13.1796 7.80703 13.3327 7.00008 13.3327ZM7.00008 12.166C8.29314 12.166 9.39418 11.7115 10.3032 10.8025C11.2122 9.89345 11.6667 8.7924 11.6667 7.49935C11.6667 6.20629 11.2122 5.10525 10.3032 4.19622C9.39418 3.2872 8.29314 2.83268 7.00008 2.83268C5.70703 2.83268 4.60598 3.2872 3.69696 4.19622C2.78793 5.10525 2.33341 6.20629 2.33341 7.49935C2.33341 8.7924 2.78793 9.89345 3.69696 10.8025C4.60598 11.7115 5.70703 12.166 7.00008 12.166Z\" fill=\"#667085\"\/>\n\t\t\t<\/g>\n\t\t<\/svg>\n\t\t9 min\t<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffc66b5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ffc66b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3cc01c0 e-flex e-con-boxed e-con e-parent\" data-id=\"3cc01c0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8b4083c e-con-full e-flex e-con e-child\" data-id=\"8b4083c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bff4b87 elementor-widget elementor-widget-richText\" data-id=\"bff4b87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><p>On July 15, 2025, the European Supervisory Authorities (ESAs) published the first DORA Oversight Guide: a crucial document that specifies the future monitoring of critical ICT third-party service providers. At its heart: the establishment of so-called Joint Examination Teams (JETs) for the Europe-wide monitoring of cloud providers, software suppliers and other important third parties. <\/p><p>However, the guide contains far more than just organizational advice. In particular, Article 5.4.1 of the guide makes it clear that supervisory authorities will be able to make recommendations on subcontracting and encryption technologies in future - with serious consequences for all financial companies that use hyperscalers such as Microsoft, Amazon or Google. <\/p><p>Why is this relevant now? Because when DORA comes into force in January 2025, all affected organizations will have to prepare for a new level of control - and time is running out if they haven't already done so. <\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-675e23a elementor-widget elementor-widget-richText\" data-id=\"675e23a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>What does the DORA Oversight Guide say?<\/h2><p><br>The 74-page guideline describes in detail how the ESAs (EBA, ESMA and EIOPA) will exercise their supervisory powers over critical ICT service providers in future. A central mechanism: the Joint Examination Teams (JETs), which carry out cross-border audits, technical inspections and on-site visits. <\/p><p>The aim is to enforce uniform standards and ensure that providers of critical infrastructure do not jeopardize the risk and resilience profile of the financial sector.<\/p><p>Particularly relevant: ESA can make recommendations on critical safety measures, including:<\/p><ul><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Security requirements for subcontractors (subcontracting),<\/li><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Use of strong encryption,<\/li><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Proof of key sovereignty by the financial company itself.<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08d9ad9 elementor-widget elementor-widget-richText\" data-id=\"08d9ad9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>Article 5.4.1 - The key to key control<\/h2><p><br>Article 5.4.1 of the Oversight Guide is particularly important. It states that supervisory authorities may make recommendations that also concern cryptographic protection measures, particularly with regard to sub-service providers and outsourced IT environments. <\/p><p>In concrete terms, this means that if a financial company uses cloud services from Microsoft, AWS or Google, it must be able to prove that it has sovereignty over the encryption keys used at all times - even for redundant or outsourced systems.<\/p><p>This brings a point that has often been neglected into focus:<\/p><p><strong>Who controls your data and who holds the keys?<br><\/strong><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-149098f elementor-widget elementor-widget-richText\" data-id=\"149098f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>Why traditional cloud encryption is no longer enough<\/h2><p><br>Many financial companies already rely on encryption. However, keys are often stored in the cloud itself or managed by the provider. The problem:  <\/p><ul><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Data sovereignty is not fully guaranteed.<\/li><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>In the case of subcontracting (e.g. globally distributed data centers), there is no overview.<\/li><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>The supervisory authorities could view this as a deficiency, including compliance risks. <\/li><\/ul><p>The requirements of the DORA Oversight Guide demand a new level of transparency and control.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7785de elementor-widget elementor-widget-richText\" data-id=\"f7785de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>The solution: eperi sEcure - key sovereignty remains with you<\/h2><p><br>With eperi sEcure, you can rely on an encryption solution that is perfectly tailored to the requirements of DORA. The software encrypts your data before it reaches the cloud - client-side and format-preserving, so that it can be processed in the background. <\/p><p>What makes eperi sEcure special:<\/p><p>Key control remains completely with you: neither cloud providers nor third parties have access.<\/p><p>Compatible with Microsoft 365, Salesforce and other web applications.<\/p><p>Meets the strictest regulatory requirements - including DORA, NIS2, GDPR.<\/p><p>No loss of functionality - search functions, sorting and collaboration<\/p><p>With this architecture, you can prove to supervisory authorities that the cryptographic protection measures are fully under your control - exactly what Article 5.4.1 requires.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfbd3fe elementor-widget elementor-widget-richText\" data-id=\"cfbd3fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>Conclusion: If you hand over your keys, you also hand over control<\/h2><p><br>The new DORA Oversight Guide clearly shows that the supervisory authorities will be taking a close look at third-party ICT service providers in future. For financial companies, this means that only those who can demonstrate data sovereignty and key control will meet the requirements. <\/p><p>With eperi sEcure, you retain full control: technically, legally and organizationally. And create the conditions for a future-proof, resilient IT strategy in the financial environment. <\/p><p><a href=\"https:\/\/eperi.com\/en\/request-demo\/\">Find out more now<\/a>: How eperi sEcure helps to encrypt in compliance with DORA and keep your keys where they belong: with you.<\/p><p><strong>Would you like to read the DORA Oversight Guide for yourself?<\/strong><br><strong>\ud83d\udcc4 C <a href=\"https:\/\/www.eiopa.europa.eu\/document\/download\/f0d9c847-90ed-4cae-9873-136e405c28b3_en?filename=DORA%20Oversight%20Guide.pdf\" target=\"_blank\" rel=\"noopener\">lick here for the official ESA document (PDF)<\/a><\/strong><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-354db6f e-con-full e-flex e-con e-child\" data-id=\"354db6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30852985 elementor-widget elementor-widget-richText\" data-id=\"30852985\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>Did you like this article?<\/h2><p><br>Then like it now or share it with colleagues, business partners, and friends.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14e72c90 e-grid e-con-full e-con e-child\" data-id=\"14e72c90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-698776bf elementor-share-buttons--shape-rounded elementor-share-buttons--view-icon-text elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"698776bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_email\" role=\"button\" tabindex=\"0\" aria-label=\"Share on email\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Share on facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tFacebook\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tLinkedIn\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_x-twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on x-twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-x-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tX\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4de90b59 elementor-widget elementor-widget-shortcode\" data-id=\"4de90b59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div class=\"wpulike wpulike-default \" ><div class=\"wp_ulike_general_class wp_ulike_is_restricted\"><button type=\"button\"\n\t\t\t\t\taria-label=\"Like Button\"\n\t\t\t\t\tdata-ulike-id=\"10777\"\n\t\t\t\t\tdata-ulike-nonce=\"b4c8dd0d11\"\n\t\t\t\t\tdata-ulike-type=\"post\"\n\t\t\t\t\tdata-ulike-template=\"wpulike-default\"\n\t\t\t\t\tdata-ulike-display-likers=\"0\"\n\t\t\t\t\tdata-ulike-likers-style=\"default\"\n\t\t\t\t\tclass=\"wp_ulike_btn wp_ulike_put_image wp_post_btn_10777\"><\/button><span class=\"count-box wp_ulike_counter_up\" data-ulike-counter-value=\"0\"><\/span>\t\t\t<\/div><\/div>\n\t\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-59262833 e-flex e-con-boxed e-con e-parent\" data-id=\"59262833\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2b5cfda6 e-grid e-con-boxed e-con e-child\" data-id=\"2b5cfda6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-59c84c14 e-con-full e-flex e-con e-child\" data-id=\"59c84c14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-216912f0 elementor-widget elementor-widget-h2\" data-id=\"216912f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"h2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- <div style=\"background-color:red; color:white; display:inline; padding:0px 5px\">H2 Headline<\/div> -->\n        <h2 class=\"title_size_2 headline-color\">Insure against cyber risks<\/h2>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e268cf7 elementor-widget elementor-widget-richText\" data-id=\"e268cf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><p>Cyber attacks have long been part of everyday life - but anyone hoping for support from their cyber insurance in an emergency must now more than ever provide concrete proof of security. Encryption is no longer a \"nice to have\", but a prerequisite. In our white paper, you can find out what the current AVB Cyber 2024 requirements are, what insurers pay particular attention to and how you can demonstrably protect your data with eperi sEcure.  <\/p>\n<p>Prepare your company optimally - before a claim occurs. Download now free of charge and make an informed decision. <\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1897c014 elementor-widget elementor-widget-primaryButton\" data-id=\"1897c014\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"primaryButton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n                    <div class=\"button button_light_primary\">\n                                <a href=\"https:\/\/eperi.com\/en\/whitepaper-cyberversicherung\/\" class=\"button_link\" id=\"\">\n                    Inform now &amp; download free of charge                <\/a>\n            <\/div>\n        \n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11b24f34 elementor-widget elementor-widget-image\" data-id=\"11b24f34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<!-- <div style=\"background-color:red; color:white; display:inline; padding:0px 5px\">Image<\/div> -->\n\t\t<img decoding=\"async\" src=\"https:\/\/eperi.com\/wp-content\/uploads\/2025\/07\/Mockup-Cyberversicherung-Tablet-whitepaper-eperi.jpg\" alt=\"\" class=\"default_image border_radius_24\">\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The new DORA Oversight Guide sets out clear requirements for cloud encryption and key control. Article 5.4.1 shows: Anyone using hyperscalers must be able to prove that they retain sovereignty over their cryptographic keys &#8211; even with sub-service providers. The blog shows what counts now and how eperi sEcure helps to be on the safe side from a regulatory perspective.  <\/p>\n","protected":false},"author":6,"featured_media":2262,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[26],"tags":[],"class_list":["post-10777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DORA: Who holds your keys?<\/title>\n<meta name=\"description\" content=\"DORA requires key control for cloud use. What Article 5.4.1 means - and how eperi supports compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA: Who holds your keys?\" \/>\n<meta property=\"og:description\" content=\"DORA requires key control for cloud use. What Article 5.4.1 means - and how eperi supports compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"EPERI\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-18T06:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-24T09:38:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eperi.com\/wp-content\/uploads\/2024\/02\/Newsroom_Blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ricardo Izzi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ricardo Izzi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/\"},\"author\":{\"name\":\"Ricardo Izzi\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#\\\/schema\\\/person\\\/44a9b3a3f683b96f301707dfdd95fcff\"},\"headline\":\"DORA Oversight Guide: What financial organizations need to know now about encryption and key sovereignty\",\"datePublished\":\"2025-07-18T06:00:00+00:00\",\"dateModified\":\"2025-09-24T09:38:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/\"},\"wordCount\":867,\"publisher\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Newsroom_Blog.jpg\",\"articleSection\":[\"blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/\",\"url\":\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/\",\"name\":\"DORA: Who holds your keys?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Newsroom_Blog.jpg\",\"datePublished\":\"2025-07-18T06:00:00+00:00\",\"dateModified\":\"2025-09-24T09:38:46+00:00\",\"description\":\"DORA requires key control for cloud use. What Article 5.4.1 means - and how eperi supports compliance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Newsroom_Blog.jpg\",\"contentUrl\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Newsroom_Blog.jpg\",\"width\":1200,\"height\":800,\"caption\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eperi.com\\\/en\\\/blog-en\\\/dora-oversight-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/eperi.com\\\/en\\\/home-2\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA Oversight Guide: What financial organizations need to know now about encryption and key sovereignty\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/eperi.com\\\/de\\\/\",\"name\":\"EPERI\",\"description\":\"Empower your Data. Keep control.\",\"publisher\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eperi.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#organization\",\"name\":\"EPERI\",\"url\":\"https:\\\/\\\/eperi.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cropped-cropped-LogoEperi.png\",\"contentUrl\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cropped-cropped-LogoEperi.png\",\"width\":512,\"height\":512,\"caption\":\"EPERI\"},\"image\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#\\\/schema\\\/person\\\/44a9b3a3f683b96f301707dfdd95fcff\",\"name\":\"Ricardo Izzi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g\",\"caption\":\"Ricardo Izzi\"},\"url\":\"https:\\\/\\\/eperi.com\\\/en\\\/author\\\/ricardo-izzieperi-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DORA: Who holds your keys?","description":"DORA requires key control for cloud use. What Article 5.4.1 means - and how eperi supports compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/","og_locale":"en_US","og_type":"article","og_title":"DORA: Who holds your keys?","og_description":"DORA requires key control for cloud use. What Article 5.4.1 means - and how eperi supports compliance.","og_url":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/","og_site_name":"EPERI","article_published_time":"2025-07-18T06:00:00+00:00","article_modified_time":"2025-09-24T09:38:46+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/eperi.com\/wp-content\/uploads\/2024\/02\/Newsroom_Blog.jpg","type":"image\/jpeg"}],"author":"Ricardo Izzi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ricardo Izzi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/#article","isPartOf":{"@id":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/"},"author":{"name":"Ricardo Izzi","@id":"https:\/\/eperi.com\/de\/#\/schema\/person\/44a9b3a3f683b96f301707dfdd95fcff"},"headline":"DORA Oversight Guide: What financial organizations need to know now about encryption and key sovereignty","datePublished":"2025-07-18T06:00:00+00:00","dateModified":"2025-09-24T09:38:46+00:00","mainEntityOfPage":{"@id":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/"},"wordCount":867,"publisher":{"@id":"https:\/\/eperi.com\/de\/#organization"},"image":{"@id":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2024\/02\/Newsroom_Blog.jpg","articleSection":["blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/","url":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/","name":"DORA: Who holds your keys?","isPartOf":{"@id":"https:\/\/eperi.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/#primaryimage"},"image":{"@id":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2024\/02\/Newsroom_Blog.jpg","datePublished":"2025-07-18T06:00:00+00:00","dateModified":"2025-09-24T09:38:46+00:00","description":"DORA requires key control for cloud use. What Article 5.4.1 means - and how eperi supports compliance.","breadcrumb":{"@id":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/#primaryimage","url":"https:\/\/eperi.com\/wp-content\/uploads\/2024\/02\/Newsroom_Blog.jpg","contentUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2024\/02\/Newsroom_Blog.jpg","width":1200,"height":800,"caption":""},{"@type":"BreadcrumbList","@id":"https:\/\/eperi.com\/en\/blog-en\/dora-oversight-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/eperi.com\/en\/home-2\/"},{"@type":"ListItem","position":2,"name":"DORA Oversight Guide: What financial organizations need to know now about encryption and key sovereignty"}]},{"@type":"WebSite","@id":"https:\/\/eperi.com\/de\/#website","url":"https:\/\/eperi.com\/de\/","name":"EPERI","description":"Empower your Data. Keep control.","publisher":{"@id":"https:\/\/eperi.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eperi.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eperi.com\/de\/#organization","name":"EPERI","url":"https:\/\/eperi.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eperi.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/eperi.com\/wp-content\/uploads\/2024\/07\/cropped-cropped-LogoEperi.png","contentUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2024\/07\/cropped-cropped-LogoEperi.png","width":512,"height":512,"caption":"EPERI"},"image":{"@id":"https:\/\/eperi.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eperi.com\/de\/#\/schema\/person\/44a9b3a3f683b96f301707dfdd95fcff","name":"Ricardo Izzi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g","caption":"Ricardo Izzi"},"url":"https:\/\/eperi.com\/en\/author\/ricardo-izzieperi-com\/"}]}},"_links":{"self":[{"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/posts\/10777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/comments?post=10777"}],"version-history":[{"count":12,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/posts\/10777\/revisions"}],"predecessor-version":[{"id":12091,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/posts\/10777\/revisions\/12091"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/media\/2262"}],"wp:attachment":[{"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/media?parent=10777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/categories?post=10777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/tags?post=10777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}