Supplier due-diligence checklist for WordPress hosting and WAF providers under DORA Article 28, with the contractual clauses every financial entity client expects in 2026.
EN

DORA Article 28 ICT third-party risk: WordPress hosting and WAF supplier audit

4.60 /5 - (8 votes )
Last verified: May 1, 2026
8min read
Guide
500+ WP projects
Security auditor

#DORA Article 28 ICT third-party risk: WordPress hosting and WAF supplier audit

Article 28 of Regulation 2022/2554 is the part of DORA that decides whether a financial-entity client can sign a hosting contract or a WAF subscription at all. It applies to credit institutions, payment institutions, insurers, investment firms, crypto-asset service providers and around fifteen more categories listed in Article 2. From 17 January 2025 it applies directly without national transposition.

This is a supporting article in the NIS2 and DORA on WordPress pillar, with cross-references to the NIS2 Annex II evidence trail and the CRA + NIS2 + DORA stack overview.

#TL;DR

  • DORA Article 28 = general principles for managing ICT third-party risk.
  • Article 30 = the mandatory contractual clauses.
  • Article 31 = the CTPP designation regime, run by the European Supervisory Authorities.
  • A WordPress engagement with a bank or insurer triggers a register entry, due diligence, mandatory clauses and an exit strategy.
  • Hosting, CDN, WAF, payment gateway plugin and email-sending plugin all enter the register.

#Who DORA covers

Article 2(1) of DORA enumerates the financial entities. The most common in WordPress engagements:

  • Credit institutions and their groups.
  • Payment institutions and electronic money institutions.
  • Investment firms, including those running an MTF or OTF.
  • Crypto-asset service providers under MiCA.
  • Insurance and reinsurance undertakings.
  • Insurance and reinsurance intermediaries above the size threshold.
  • Crowdfunding service providers.
  • Investment funds (UCITS managers, AIFMs).

Plus the Critical ICT Third-Party Providers (CTPP) designated under Article 31 by the European Banking Authority, ESMA and EIOPA jointly. The first batch of designations ran in 2025 and is dominated by hyperscale cloud providers (the public list lives on the European Supervisory Authorities portal). A WordPress agency is unlikely to be a CTPP. A managed WordPress hosting platform with a large financial-services book might be.

#What Article 28 actually demands

Article 28 has eight paragraphs. The operative ones for a WordPress engagement:

Article 28(1). The financial entity manages ICT third-party risk as an integral part of its overall ICT risk-management framework. The framework, the policies and the governance are at the entity, not the supplier. The supplier provides evidence that supports the entity’s framework.

Article 28(2). Sound, comprehensive and well-documented strategy on ICT third-party risk. The entity must keep documentation. The supplier must be ready to feed it.

Article 28(3). A register of all contractual arrangements with ICT third-party providers, distinguishing those supporting critical or important functions from the rest. The register must be reportable to the regulator. For WordPress: hosting, CDN, WAF, payment gateway, transactional email, AI provider, monitoring tool, backup destination.

Article 28(4). Pre-contractual phase due diligence. Identification and assessment of all relevant risks. Concentration risk analysis when adding another contract with the same provider or a provider in the same group.

Article 28(5). Conflicts of interest assessment. The board approves the policy on the use of ICT services supporting critical or important functions.

Article 28(7). Periodic reassessment of the contractual arrangement.

Article 28(8). Exit strategy for ICT services supporting critical or important functions. Documented, tested, with a transition plan.

#Article 30 mandatory clauses

Article 30(2) lists the minimum clauses for any contract. Article 30(3) adds clauses for contracts supporting critical or important functions. The agency template I ship with hosting and WAF contracts covers all of them:

ClauseArticle 30 paragraphWhat goes in the WordPress contract
Clear description of services30(2)(a)Hosting tier, WAF rule set, included plugins, response times
Location of data30(2)(b)EU/EEA data centre, EU-based support staff, no extra-EU subprocessors without notice
Availability and security requirements30(2)(c)Uptime SLA, RPO, RTO, encryption at rest and in transit
Personal data protection30(2)(d)DPA under GDPR Article 28, data-processing register
Right of access, inspection and audit30(2)(e)On-site or remote audit right, frequency, notice
Service level descriptions30(2)(f)SLA matrix, credit mechanism for breach
Cooperation with competent authorities30(2)(g)Provider cooperates with the regulator on request
Termination rights30(2)(h)Material breach, regulator-imposed termination, change of control
Provider participation in awareness and training30(2)(i)Annual security briefing, named contact
Sub-outsourcing30(3)(c)Prior approval for any sub-outsourcing of critical functions
Threat-led penetration testing30(3)(g)Cooperation with TLPT under Article 26
Exit strategy support30(3)(f)Data export format, transition assistance, parallel-run period

I keep this matrix as a single Markdown file in the engagement folder. Every contract gets reviewed against it before signing.

#The supplier register, populated for WordPress

A WordPress engagement for a financial entity touches more ICT third-parties than the procurement team usually anticipates. The register I produce on day one of an engagement:

  • Hosting provider. The actual data-centre operator, the management plane, the support team. Critical-or-important if the WordPress site is part of customer-facing service delivery.
  • CDN provider. Cloudflare, Fastly, Akamai. Treats traffic, can see request bodies, terminates TLS. Often classified as critical-or-important.
  • WAF provider. Sometimes the same entity as the CDN, sometimes separate (Sucuri, Imperva). Inspects payloads. Critical-or-important.
  • Payment gateway plugin. Stripe, Adyen, mollie, regional gateways. The plugin author is one supplier; the gateway operator is another. Both go into the register.
  • Transactional email provider. SES, Postmark, SendGrid. Carries password resets, KYC notifications, AML alerts. Often critical-or-important.
  • Monitoring and APM. New Relic, Datadog, Sentry. Receives stack traces and partial request payloads.
  • Backup destination. S3, Backblaze, Wasabi. Holds the database and the uploads. Always critical-or-important.
  • AI provider. If the WordPress site uses an LLM for any customer-touching function (chat, summarisation), the LLM provider is in scope.
  • Plugin marketplace. WordPress.org, premium marketplaces. Update channels are part of the supply chain under Article 28(2)(d).

For each provider the register holds: legal name, contract reference, services description, data flows, criticality classification, location of processing, last due-diligence date, exit strategy reference.

#Concentration risk and the same-group test

Article 28(4) introduces a test that catches WordPress agencies more often than expected: do not concentrate critical functions in providers that share an ownership chain. A bank that uses Cloudflare for CDN, Cloudflare Workers for backend, Cloudflare R2 for object storage and Cloudflare Stream for video has high concentration risk on a single provider. This is not a Cloudflare-specific finding; the same applies to AWS, Azure or GCP stacks.

For WordPress this often surfaces as: hosting on AWS, backups to S3, email through SES, monitoring through CloudWatch. Four AWS dependencies, one provider. The risk register has to acknowledge it explicitly and either justify it or plan diversification.

#Exit strategies that actually work

Article 28(8) requires the exit strategy to be documented and tested. For WordPress hosting and WAF a real exit strategy includes:

  • Database export in standard format. SQL dump compatible with stock MySQL or MariaDB, no proprietary extensions.
  • Filesystem export including uploads. Tar or zip archive, downloadable from outside the provider’s console.
  • DNS control. Domain registrar account owned by the financial entity, not the agency, not the host.
  • Plugin and theme licence portability. Licences in the entity’s name, transferable to a new host.
  • Tested transition. A staging environment on an alternative host that can be promoted in a documented timeframe. The test is logged and dated.
  • Contractual transition window. The hosting contract obliges the provider to continue services during the migration, paid at the same rate, for at least a documented period.

Pricing for engagements that include the exit-strategy package is individual; the exit document itself adds days, not hours, and it is a deliverable.

#What this changes for the procurement conversation

A WordPress agency that arrives with the Article 30 clause matrix already populated, the supplier register template ready, and a proven exit strategy passes procurement faster. The financial entity does not have to translate Article 28 into a contract; it pastes the agency’s deliverables into its own ICT risk-management framework.

This is also the reason why a regulated client filters supplier shortlists by jurisdiction. An EU-based agency operating under EU contract law removes a layer of friction; an agency outside the EU triggers extra Article 28(4) due diligence on jurisdictional risk.

#Cluster reading

Next step

Turn the article into an actual implementation

This block strengthens internal linking and gives readers the most relevant next move instead of leaving them at a dead end.

What does DORA Article 28 actually require?
Article 28 of Regulation 2022/2554 sets the general principles for managing ICT third-party risk: keep a register of all contractual arrangements, classify them by criticality, conduct due diligence before signing, embed mandatory contractual provisions, plan exit strategies. Article 30 lists the mandatory clauses. Source: EUR-Lex CELEX 32022R2554.
Who counts as a financial entity under DORA?
Article 2(1) lists about 20 categories: credit institutions, payment institutions, electronic money institutions, investment firms, crypto-asset service providers, central securities depositories, central counterparties, trading venues, trade repositories, insurance and reinsurance undertakings, investment funds, crowdfunding service providers and others. The full list is in the regulation text.
Is a WordPress agency a critical ICT third-party provider?
Almost never directly. Critical third-party providers (CTPP) are designated by the European Supervisory Authorities under Article 31. The list is short and dominated by hyperscale cloud providers. A WordPress agency is usually a regular ICT third-party, not a CTPP, but Article 28 obligations from the financial-entity client still flow into the engagement contract.
What contractual clauses must end up in our agreement?
Article 30 lists the mandatory provisions: clear description of the service, location of data and processing, availability and security requirements, GDPR compliance, audit and access rights for the financial entity and the regulator, exit strategy, incident reporting obligations, sub-outsourcing approval. Article 30(3) adds extra provisions for contracts supporting critical or important functions.
What does an exit strategy mean for a WordPress hosting contract?
A documented plan for migrating away from the provider without operational disruption. For WordPress: portable database export, full filesystem backup including uploads, DNS control with the entity, no lock-in to proprietary plugin marketplaces, contractual minimum transition window. Article 28(8) requires the strategy to be tested.

Need an FAQ tailored to your industry and market? We can build one aligned with your business goals.

Let’s discuss

Related Articles

The NIS2 Directive (2022/2555) was to be transposed into national law by 2024-10-17. The DORA Regulation (2022/2554) applies directly from 2025-01-17. For a WordPress site operator this means specific obligations if the site relates to a regulated entity. We explain it without panic, with references to the texts of the acts.
wordpress

NIS2 and DORA on WordPress: what a site must meet in 2026

The NIS2 Directive (2022/2555) was to be transposed into national law by 2024-10-17. The DORA Regulation (2022/2554) applies directly from 2025-01-17. For a WordPress site operator this means specific obligations if the site relates to a regulated entity. We explain it without panic, with references to the texts of the acts.

CRA covers products with digital elements. NIS2 covers entities. DORA covers financial entities. When all three apply at once, headless WordPress sits at the intersection. I sketch what the joint evidence package looks like in 2026.
wordpress

Cyber Resilience Act + NIS2 + DORA: the 2026 compliance stack for headless WordPress

CRA covers products with digital elements. NIS2 covers entities. DORA covers financial entities. When all three apply at once, headless WordPress sits at the intersection. I sketch what the joint evidence package looks like in 2026.

Article 21 of Directive 2022/2555 lists ten risk-management measures every in-scope entity must implement. I map each one to a WordPress agency control, with the evidence file each one requires for audit.
wordpress

NIS2 Annex II for WordPress agencies: scope, deadlines, evidence trail

Article 21 of Directive 2022/2555 lists ten risk-management measures every in-scope entity must implement. I map each one to a WordPress agency control, with the evidence file each one requires for audit.