Skip to content
The Algorithm
The Algorithm/Knowledge Base/DDoS Protection Requirements Under DORA, FFIEC, and NHS Standards
Operational Resilience

DDoS Protection Requirements Under DORA, FFIEC, and NHS Standards

DDoS protection for regulated systems is an operational resilience obligation — not just a performance concern — with DORA, FFIEC, and NHS frameworks each requiring documented capacity thresholds, tested mitigation capabilities, and defined recovery time objectives.

What You Need to Know

Distributed Denial of Service (DDoS) protection is increasingly treated as a mandatory operational resilience control rather than an optional infrastructure consideration in regulated industries. DORA Article 12(1)(e) requires that ICT security management include "protection and prevention measures against intrusions and data misuse, including mechanisms to handle DDoS attacks." DORA Article 11 (ICT business continuity) requires firms to test resilience of critical systems, which supervisory authorities interpret as including DDoS scenario testing. The FFIEC Cybersecurity Assessment Tool and FFIEC Business Continuity Management Booklet (2019) specifically list DDoS resilience as a component of business continuity planning for financial institutions, and the OCC has cited DDoS preparedness in supervisory guidance following the 2012–2013 Izz ad-Din al-Qassam Cyber Fighters attacks on US banks. NHS Digital (now NHS England) Security Operations guidance requires healthcare organizations to implement DDoS protection for internet-facing patient-facing services, particularly following the WannaCry incident of 2017 which disrupted NHS services.

Technical DDoS protection for regulated environments operates across three defensive layers. Layer 3/4 volumetric protection: BGP-based upstream scrubbing from a DDoS mitigation provider (Cloudflare, Akamai, Imperva, AWS Shield Advanced) that absorbs volumetric attacks (UDP floods, ICMP floods, SYN floods) before traffic reaches the organization's network. Scrubbing center capacity must be measured in terabits per second (Tbps) to mitigate modern amplification attacks; AWS Shield Advanced provides automatic detection and mitigation with SLA-backed availability for protected resources. Layer 7 application-layer protection: Web Application Firewall (WAF) rules targeting HTTP-based DDoS vectors (slowloris, HTTP flood, API abuse) that volumetric scrubbing does not mitigate. Layer 7 protection requires behavioral analysis and rate limiting rather than simple IP blocking. Rate limiting and API throttling: application-level controls that cap request rates per source IP, authenticated user, or API key — directly reducing the effectiveness of low-volume application-layer attacks.

Regulated firms must document their DDoS protection architecture in their ICT business continuity plan (DORA Article 11) and test it periodically. DDoS simulation testing — injecting controlled high-volume synthetic traffic against production or replica environments — must be authorized by DDoS mitigation providers and conducted under strict safeguards to avoid collateral impact. DORA TLPT exercises for financial entities may include DDoS scenarios as part of the availability testing scope. A nuanced operational consideration is the DDoS mitigation provider's own resilience: concentration of regulated financial and healthcare organizations on a small number of large DDoS mitigation providers creates systemic risk, which ESMA and the ECB have flagged as a financial stability concern. Firms must assess their mitigation provider's financial stability, geographic diversity of scrubbing centers, and contractual SLAs for detection and mitigation activation time (typically seconds to minutes for BGP-based upstream scrubbing).

How We Handle It

We design DDoS protection architectures for regulated organizations covering upstream BGP scrubbing provider selection and integration, WAF Layer 7 protection for application-layer attacks, API rate limiting controls, and DDoS scenario testing programs aligned to DORA ICT business continuity requirements. Our documentation supports both operational resilience testing evidence and regulatory self-assessment submissions.

Services
Service
Compliance Infrastructure
Service
Cloud Infrastructure & Migration
Service
Self-Healing Infrastructure
Service
Managed Infrastructure
Related Frameworks
DORA Articles 11–12
FFIEC Business Continuity Booklet (2019)
FFIEC CAT
NHS Security Operations Guidance
NIST SP 800-189
AWS Shield Advanced SLA
DECISION GUIDE

Compliance-Native Architecture Guide

Design principles and a structured checklist for building software that is compliant by default — not compliant by retrofit. Covers data architecture, access controls, audit trails, and vendor due diligence.

§

Compliance built at the architecture level.

Deploy a team that knows your regulatory landscape before they write their first line of code.

Start the conversation
Related
Service
Compliance Infrastructure
Service
Cloud Infrastructure & Migration
Service
Self-Healing Infrastructure
Service
Managed Infrastructure & Cloud Operations
Related Framework
DORA Articles 11–12
Related Framework
FFIEC Business Continuity Booklet (2019)
Related Framework
FFIEC CAT
Platform
ALICE Compliance Engine
Service
Compliance Infrastructure
Engagement
Surgical Strike (Tier I)
Why Switch
vs. Accenture
Get Started
Start a Conversation
Engage Us