DORA Compliance Guide: ICT Risk Management for Financial Entities
What is DORA?
The Digital Operational Resilience Act (DORA), formally Regulation (EU) 2022/2554, establishes a comprehensive framework for managing ICT (Information and Communication Technology) risks in the EU financial sector. DORA became fully applicable on January 17, 2025.
Unlike previous fragmented approaches to ICT risk, DORA creates uniform requirements across all EU member states and covers virtually all types of financial entities, from large banks to small payment institutions.
Why DORA Matters
The financial sector's increasing dependence on technology creates systemic risks. A major cyber incident or ICT failure at a critical service provider could cascade across the entire financial system. DORA addresses this by:
- Establishing minimum ICT risk management standards
- Creating a harmonized incident reporting framework
- Requiring regular resilience testing
- Introducing oversight of critical ICT third-party providers
Who Must Comply with DORA?
DORA applies to a broad range of financial entities:
Directly Covered Entities
- Credit institutions (banks)
- Payment institutions
- Electronic money institutions
- Investment firms
- Crypto-asset service providers (CASPs)
- Central securities depositories
- Insurance and reinsurance undertakings
- Pension funds
- Credit rating agencies
- Crowdfunding service providers
ICT Third-Party Providers
Critical ICT service providers designated by European Supervisory Authorities (ESAs) fall under a new oversight framework, even if they are not financial entities themselves.
The Five Pillars of DORA
Pillar 1: ICT Risk Management
Financial entities must establish a comprehensive ICT risk management framework including:
Governance Requirements
- Management body responsibility for ICT risk strategy
- Dedicated ICT risk management function
- Clear roles and responsibilities
- Regular reporting to management
Risk Identification and Assessment
- Maintain inventory of all ICT assets
- Identify and classify ICT-supported business functions
- Assess risks to confidentiality, integrity, and availability
- Document dependencies on ICT third-party providers
Protection and Prevention
- Implement ICT security policies
- Access control and identity management
- Encryption and cryptographic controls
- Network security measures
- Physical security of ICT assets
Detection
- Continuous monitoring of ICT systems
- Anomaly detection mechanisms
- Vulnerability scanning
- Threat intelligence integration
Response and Recovery
- ICT business continuity policy
- Disaster recovery plans
- Backup and restoration procedures
- Communication plans for ICT incidents
Pillar 2: ICT Incident Management and Reporting
DORA creates a harmonized incident reporting framework:
Classification Requirements
Incidents must be classified based on:
- Number of clients/counterparties affected
- Duration of the incident
- Geographic spread
- Data losses
- Economic impact
- Criticality of services affected
Reporting Obligations
Major ICT-related incidents must be reported to competent authorities:
- Initial notification: within 24 hours
- Intermediate report: within 72 hours
- Final report: within one month
Voluntary Reporting
Entities may voluntarily report significant cyber threats, even if they don't result in incidents.
Pillar 3: Digital Operational Resilience Testing
DORA mandates regular testing of ICT systems:
Basic Testing (All Entities)
- Vulnerability assessments and scans
- Open source analyses
- Network security assessments
- Gap analyses
- Physical security reviews
- Source code reviews (where feasible)
- Scenario-based tests
- Compatibility testing
- Performance testing
- End-to-end testing
Advanced Testing (Significant Entities)
Threat-led penetration testing (TLPT) every three years for entities meeting certain thresholds. TLPT must:
- Be conducted by qualified testers
- Cover critical functions
- Include live production environments
- Follow TIBER-EU framework
Pillar 4: ICT Third-Party Risk Management
Financial entities must manage risks from ICT service providers:
Pre-Contractual Assessment
- Due diligence on potential providers
- Risk assessment considering concentration risk
- Evaluation of provider's resilience measures
Contractual Requirements
DORA mandates specific provisions in ICT contracts including:
- Service level descriptions
- Data protection provisions
- Audit and access rights
- Exit strategies and transition assistance
- Incident notification obligations
- Subcontracting limitations
Ongoing Monitoring
- Regular assessment of provider performance
- Review of provider's resilience measures
- Monitoring of concentration risk
Pillar 5: Information Sharing
DORA encourages (but doesn't mandate) participation in cyber threat information sharing arrangements among financial entities, subject to appropriate confidentiality protections.
DORA and MiCA: The Intersection
For crypto-asset service providers (CASPs), DORA compliance is mandatory alongside MiCA. Key overlaps include:
- ICT security requirements in MiCA Article 68 align with DORA
- CASPs must apply DORA's full ICT risk management framework
- Incident reporting follows DORA timelines
- Third-party risk provisions apply to crypto custody providers
Proportionality Principle
DORA recognizes that one size doesn't fit all. Requirements are applied proportionally based on:
- Size and overall risk profile
- Nature, scale, and complexity of services
- Systemic importance
- Risk posed to financial stability
Smaller entities may benefit from simplified requirements in certain areas.
Penalties for Non-Compliance
Member states must establish effective penalties for DORA violations. While specific amounts vary by jurisdiction, penalties must be:
- Effective and proportionate
- Dissuasive
- Made public in most cases
Compliance Checklist
Use this checklist to assess your DORA readiness:
How FinlexPro Helps
DORA contains 64 articles plus numerous regulatory technical standards (RTS) and implementing technical standards (ITS). FinlexPro indexes:
- Complete DORA regulation text
- All published RTS and ITS
- ESA guidelines and Q&As
- Cross-references to related regulations (MiCA, PSD2, etc.)
Search specific DORA requirements and get AI-powered explanations with direct article citations.
Search Related Regulations
Use FinlexPro to find specific articles mentioned in this post.
Start Searching