Skip to main content

DORA (EU Digital Operational Resilience Act) compliance for AI agents. 5-pillar audit, incident classification, Article 28 Register of Information, TLPT readiness. Regulation (EU) 2022/2554. By MEOK AI Labs.

Project description

DORA Compliance MCP

The only MCP server that automates DORA (Digital Operational Resilience Act) compliance for EU financial entities. Regulation (EU) 2022/2554 — enforcement live since 17 January 2025.

Built by MEOK AI Labs. Pairs with our EU AI Act, GDPR, ISO 42001, and NIST AI RMF MCPs for full-stack regulatory coverage.

What it does

Give any Claude / ChatGPT / Cursor / Cline agent the ability to:

  • Classify any financial entity's DORA applicability (20+ entity types in scope)
  • Audit all 5 DORA pillars — ICT risk management, incident management, resilience testing, third-party risk, information sharing
  • Classify ICT incidents against Commission Delegated Regulation (EU) 2024/1772 thresholds (4h / 72h / 1-month reporting)
  • Generate Article 28 Register of Information template — mandatory annual submission
  • Assess TLPT readiness (Threat-Led Penetration Testing under Article 26, TIBER-EU aligned)
  • Track enforcement deadlines and emit signed compliance certificates

Install

pip install dora-compliance-mcp

Use with Claude Desktop

Add to ~/Library/Application Support/Claude/claude_desktop_config.json:

{
  "mcpServers": {
    "dora": {
      "command": "dora-compliance-mcp"
    }
  }
}

Then ask Claude things like:

  • "Am I in scope for DORA? I run a UK-registered crypto exchange with EU customers."
  • "Audit pillar 4 (ICT third-party risk) against this contract with AWS."
  • "Classify this incident: 200,000 customers couldn't log in for 6 hours, we believe personal data was exposed."
  • "Generate my Article 28 Register of Information template."

Tiers

  • Free — 10 calls/day, pillar-by-pillar audits, incident classification
  • Pro (£49/mo) — unlimited calls, full 5-pillar sweep, signed certificates, Register of Information generator
  • Enterprise (£499/mo) — neural-net-backed gap detection, TLPT readiness, multi-entity audit, audit trail export
  • 48-hour written assessment (£5,000) — a senior compliance engineer delivers a full DORA gap report

Upgrade at meok.ai/pricing.

Why it matters

  • Enforcement LIVE since 17 January 2025 — first full reporting cycle running now
  • ~22,000 EU financial entities in scope (banks, insurance, fintech, crypto, investment firms, ICT providers to banks)
  • Penalties up to 1% of daily global turnover for Critical ICT Third-Party Providers (CTPPs)
  • First annual Register of Information submissions due 30 April 2026

If you supply ICT services to EU banks, you're now directly in scope via the CTPP designation process — even if you're not a financial entity yourself.

Legal basis

  • Regulation (EU) 2022/2554 (DORA)
  • Commission Delegated Regulation (EU) 2024/1772 — incident classification
  • Commission Implementing Regulation (EU) 2024/2956 — Register of Information template
  • ESAs Regulatory Technical Standards on TLPT (Article 26)

This is automated self-assessment tooling. It does not substitute for competent-authority review or legal counsel.

License

MIT. MEOK AI Labs, 2026.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dora_compliance_mcp-1.0.0.tar.gz (12.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dora_compliance_mcp-1.0.0-py3-none-any.whl (13.9 kB view details)

Uploaded Python 3

File details

Details for the file dora_compliance_mcp-1.0.0.tar.gz.

File metadata

  • Download URL: dora_compliance_mcp-1.0.0.tar.gz
  • Upload date:
  • Size: 12.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.15

File hashes

Hashes for dora_compliance_mcp-1.0.0.tar.gz
Algorithm Hash digest
SHA256 a813a1875ee6da952a2793c4362be3e0a1274aa96c83c3cd5b8f92574c4cf06c
MD5 4afb7fefba2a4063c19e6472e8587a7d
BLAKE2b-256 9b9510101d85860c15335454cde33c6bce01ede28320e9d8749284cc8c1c187f

See more details on using hashes here.

File details

Details for the file dora_compliance_mcp-1.0.0-py3-none-any.whl.

File metadata

File hashes

Hashes for dora_compliance_mcp-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 f8e4b1885f7e6ecbce551637d2da0926e775ae20295aea7e64684ed942e2545d
MD5 db9635dcea9b5b1f78bff7b267a5b5cb
BLAKE2b-256 ddb5808340caa6a0c46d5a417d8a9aaa77ea4e33e114a53ce8e4c00aebc8755d

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page