Compliance Assistant supports and helps you to:
Make sure the app is installed in your environment.
The following table describes the required permissions.
To take full advantage of
Compliance Assistant, get started with
Business Flow to monitor and analyze compliance-critical business processes.
To maximize the value of risk management insights, set up data sources for security events from your monitored environment or from third-party sources. Security-related data includes vulnerability events, compliance events, and detection finding events.



Compliance Assistant offers monitoring and automation capabilities streamlined to specific compliance frameworks. To start managing compliance, set up a compliance framework applicable to your organization.
Compliance Assistant.
Compliance Assistant.
Business Flow.
Compliance Assistant.
Compliance Assistant users.
Compliance Assistant allows you to map compliance-relevant IT assets to end-to-end business processes.
Compliance Assistant integrates with
Business Flow to identify compliance-critical business process with configuration as an entity.
Compliance Assistant.
Compliance Assistant.
Compliance Assistant users.
Compliance Assistant.
Compliance Assistant
Compliance Assistant.Economic impact is met where the costs and losses incurred by the financial entity due to the incident have exceeded or are likely to exceed €100,000 (RTS on the classification of ICT-related incidents and cyber threats).
Compliance Assistant > Incidents > Classified incidents.A compliance framework is a structured set of requirements, guidelines, and best practices to support organizations in meeting regulatory and industry-specific standards.
Compliance Assistant consolidates insights and functionalities tailored to a specific compliance framework.
Compliance Assistant currently offers monitoring and automation capabilities supporting compliance with the EU DORA Regulation.
A real-time, tiered score summarizing your current ICT risk posture across potential incidents, security detection findings, vulnerabilities, and misconfigurations. This score is an indicative metric based on current data and tier logic. This score is a high-level indicator based on real-time observability and automated systems. It does not replace comprehensive or formal compliance assessments.
According to the EU DORA Regulation, financial entities must identify, classify, and document ICT-supported business functions and their supporting assets. CIFs are processeses that, if disrupted, could significantly impact financial performance or service continuity.
Compliance Assistant allows you to map compliance-relevant IT assets to end-to-end business processes. By integrating with
Business Flow, you can identify compliance-critical business processes, leveraging Smartscape entities for enhanced visibility and context.
IT-detected incidents are affecting any of the business processes configured as CIFs that
Business Flow is monitoring. Incidents are considered unclassified problems when less than one of the materiality thresholds for the classification of major incidents is breached. In line with the EU DORA Regulation, it must be assessed whether an incident affects or has affected ICT services or network and information systems that support CIFs (RTS on the classification of ICT-related incidents and cyber threats).
IT-detected incidents are affecting any of the business processes configured as CIFs that
Business Flow is monitoring. Incidents are considered potential major incidents when two or more of the monitored materiality thresholds for the classification of major incidents are breached. In line with the EU DORA Regulation, an incident is considered major when two or more of the materiality thresholds are met (RTS on the classification of ICT-related incidents and cyber threats).
IT-detected incidents are affecting any of the business processes configured as CIFs that
Business Flow is monitoring and have been manually classified as major in line with the EU DORA Regulation. Once an incident is classified as major, Dynatrace automatically generates a business event with a snapshot of the compliance incident. Learn more about Compliance incident classification events.
Compliance Assistant relies on vulnerability findings to proactively mitigate risks before they escalate into incidents. In line with the EU DORA Regulation, organizations are required to assess vulnerabilities on a continuous basis. A vulnerability finding is a security event that highlights a detected weakness in a system, software component, or environment.
Compliance Assistant relies on detection finding events to support in prioritizing cyber risks. In line with the EU DORA Regulation, organizations are required to assess cyber threats on a continuous basis (RTS on ICT risk management framework). A detection finding event is generated when suspicious activity is observed around an object.
Compliance Assistant relies on compliance events to detect potential misconfigurations. In line with the EU DORA Regulation, organizations are required to identify a secure configuration baseline for ICT assets that minimizes exposure to cyber threats and regularly verify that those baselines are effectively deployed (RTS on ICT risk management framework). Compliance events represent the assessment of a resource in the context of the rule specified in the compliance standard.
Compliance Assistant enables you to achieve and manage compliance across supported frameworks:
The Dynatrace score is a real-time indicator based on your current ICT risk posture and impacted by the severity of findings. To improve your score:
Compliance Assistant?Insights on conversions and errors KPIs on CIFs are updated on the basis of the configured generation frequency of the KPI monitoring in
Business Flow. The evaluation timeframe for the monitored KPIs of critical or important functions (CIFs) is also defined in setting up a business configuration as an entity.
To ensure reliable KPI evaluation and avoid missing data from long‑running processes, set the evaluation timeframe to at least three to four times the process's average duration (for example, if the average duration of the CIF is 5 minutes, set the window to at least 15–20 minutes).
If you have recently edited or added business processes configured as entity and selected any of those as a CIF in
Compliance Assistant, it may take up to the maximum defined frequency for the monitoring KPIs of those business processes to be updated in
Compliance Assistant. You can adjust the monitoring frequency in the business flow configuration.
Compliance Assistant (Preview)