Skip to main content

DORA (EU Digital Operational Resilience Act) compliance for AI agents. 5-pillar audit, incident classification, Article 28 Register of Information, TLPT readiness. Regulation (EU) 2022/2554. By MEOK AI Labs.

Project description

DORA Compliance MCP

The only MCP server that automates DORA (Digital Operational Resilience Act) compliance for EU financial entities. Regulation (EU) 2022/2554 — enforcement live since 17 January 2025.

Built by MEOK AI Labs. Pairs with our EU AI Act, GDPR, ISO 42001, and NIST AI RMF MCPs for full-stack regulatory coverage.

What it does

Give any Claude / ChatGPT / Cursor / Cline agent the ability to:

  • Classify any financial entity's DORA applicability (20+ entity types in scope)
  • Audit all 5 DORA pillars — ICT risk management, incident management, resilience testing, third-party risk, information sharing
  • Classify ICT incidents against Commission Delegated Regulation (EU) 2024/1772 thresholds (4h / 72h / 1-month reporting)
  • Generate Article 28 Register of Information template — mandatory annual submission
  • Assess TLPT readiness (Threat-Led Penetration Testing under Article 26, TIBER-EU aligned)
  • Track enforcement deadlines and emit signed compliance certificates

Install

pip install dora-compliance-mcp

Use with Claude Desktop

Add to ~/Library/Application Support/Claude/claude_desktop_config.json:

{
  "mcpServers": {
    "dora": {
      "command": "dora-compliance-mcp"
    }
  }
}

Then ask Claude things like:

  • "Am I in scope for DORA? I run a UK-registered crypto exchange with EU customers."
  • "Audit pillar 4 (ICT third-party risk) against this contract with AWS."
  • "Classify this incident: 200,000 customers couldn't log in for 6 hours, we believe personal data was exposed."
  • "Generate my Article 28 Register of Information template."

Tiers

  • Free — 10 calls/day, pillar-by-pillar audits, incident classification
  • Pro (£49/mo) — unlimited calls, full 5-pillar sweep, signed certificates, Register of Information generator
  • Enterprise (£499/mo) — neural-net-backed gap detection, TLPT readiness, multi-entity audit, audit trail export
  • 48-hour written assessment (£5,000) — a senior compliance engineer delivers a full DORA gap report

Upgrade at meok.ai/pricing.

Why it matters

  • Enforcement LIVE since 17 January 2025 — first full reporting cycle running now
  • ~22,000 EU financial entities in scope (banks, insurance, fintech, crypto, investment firms, ICT providers to banks)
  • Penalties up to 1% of daily global turnover for Critical ICT Third-Party Providers (CTPPs)
  • First annual Register of Information submissions due 30 April 2026

If you supply ICT services to EU banks, you're now directly in scope via the CTPP designation process — even if you're not a financial entity yourself.

Legal basis

  • Regulation (EU) 2022/2554 (DORA)
  • Commission Delegated Regulation (EU) 2024/1772 — incident classification
  • Commission Implementing Regulation (EU) 2024/2956 — Register of Information template
  • ESAs Regulatory Technical Standards on TLPT (Article 26)

This is automated self-assessment tooling. It does not substitute for competent-authority review or legal counsel.

License

MIT. MEOK AI Labs, 2026.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dora_compliance_mcp-1.2.0.tar.gz (13.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dora_compliance_mcp-1.2.0-py3-none-any.whl (14.9 kB view details)

Uploaded Python 3

File details

Details for the file dora_compliance_mcp-1.2.0.tar.gz.

File metadata

  • Download URL: dora_compliance_mcp-1.2.0.tar.gz
  • Upload date:
  • Size: 13.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.9.6

File hashes

Hashes for dora_compliance_mcp-1.2.0.tar.gz
Algorithm Hash digest
SHA256 f7b70d52c4e63f6156bb08550e92434d829b98b4b3c270b4da79c86c5f0d89c2
MD5 fafd8b10a70f39dacf2e7f73a3a2234f
BLAKE2b-256 d0874e008ed7ac57d19ab9fbcacb0cd2f891c5a497dde92bd559dab384d13f5d

See more details on using hashes here.

File details

Details for the file dora_compliance_mcp-1.2.0-py3-none-any.whl.

File metadata

File hashes

Hashes for dora_compliance_mcp-1.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 13d20269fb481d44923582568269f276a53d4f675800e333e3258afb964eebdc
MD5 f11a68da0cb10bd1db740ed8325c48a5
BLAKE2b-256 35557d92a344ee62a573d131365076d9636b79ae897949f889d076741d77eeb0

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page