What is DORA Regulation
DORA (Digital Operational Resilience Act) is EU Regulation 2022/2554 that mandates ICT risk management, incident reporting, and third-party risk controls for financial entities. Effective January 17, 2025, DORA requires financial institutions to implement comprehensive digital resilience frameworks, conduct mandatory ICT third-party risk assessments, and maintain detailed control mapping across their technology supply chains.
Key takeaways:
- DORA applies to all EU financial entities and their critical ICT third-party service providers
- Requires mandatory ICT risk assessments, incident reporting within 24 hours, and annual resilience testing
- Introduces direct oversight of critical ICT providers by European Supervisory Authorities (ESAs)
- Non-compliance penalties reach up to 2% of global annual turnover
- Harmonizes fragmented ICT risk requirements across EU member states
DORA represents the EU's unified response to systemic ICT risks in financial services. Unlike previous guidance-based approaches, DORA establishes legally binding requirements for operational resilience across 20 different types of financial entities—from banks and insurers to crypto-asset service providers.
For GRC analysts managing third-party portfolios, DORA fundamentally changes vendor risk assessment methodology. The regulation mandates contractual provisions, concentration risk monitoring, and exit strategies for all ICT dependencies. Your existing ISO 27001 or SOC 2 assessments now require additional control mapping to DORA's specific articles on third-party risk management (Articles 28-44).
The regulation's extraterritorial reach means non-EU vendors serving EU financial institutions must demonstrate DORA compliance. This creates new due diligence requirements for your vendor onboarding processes, particularly around sub-outsourcing transparency and incident notification capabilities.
Core Components of DORA Regulation
DORA structures digital resilience requirements across five pillars:
1. ICT Risk Management Framework (Articles 5-16) Financial entities must implement governance structures with board-level accountability for ICT risk. This includes:
- ICT risk management policies approved annually by management
- Business continuity plans with recovery time objectives (RTOs)
- Regular risk assessments using recognized methodologies (ISO 27005, NIST)
2. ICT Incident Management (Articles 17-23) DORA mandates granular incident classification and reporting:
- Initial notification within 24 hours for major incidents
- Intermediate reports within 72 hours
- Final reports within one month
- Root cause analysis with lessons learned
3. Digital Operational Resilience Testing (Articles 24-27) Annual testing requirements escalate based on entity size:
- Basic entities: Vulnerability assessments and scenario testing
- Significant entities: Threat-led penetration testing (TLPT) every three years
- Testing must cover critical third-party dependencies
4. ICT Third-Party Risk Management (Articles 28-44) The most transformative pillar for vendor management:
- Mandatory risk assessments before contracting
- Contractual clauses ensuring audit rights, data localization, and termination procedures
- Concentration risk monitoring at entity and sector levels
- Exit strategies for all critical ICT services
5. Information Sharing (Article 45) Voluntary cyber threat intelligence sharing with liability protections.
Third-Party Risk Management Under DORA
Articles 28-44 establish Europe's most comprehensive third-party ICT risk framework. Key requirements include:
Pre-Contract Due Diligence (Article 28)
Before engaging ICT providers, you must assess:
- Provider's financial stability and operational resilience
- Compliance with relevant security standards
- Sub-outsourcing arrangements and fourth-party risks
- Data residency and processing locations
- Incident response capabilities
Mandatory Contract Provisions (Article 30)
DORA prescribes specific contractual terms:
- Detailed service level agreements with performance indicators
- Audit rights including on-site inspections
- Notification requirements for sub-outsourcing changes
- Data portability and exit assistance obligations
- Incident notification within prescribed timeframes
Concentration Risk Analysis (Article 29)
Entities must identify and mitigate dependencies:
- Single points of failure in ICT supply chains
- Geographic concentration risks
- Market dominance concerns
- Systemic dependencies across the financial sector
Regulatory Crosswalks and Framework Mapping
DORA intersects with multiple existing frameworks:
GDPR Alignment: DORA's data localization requirements (Article 30) complement GDPR's transfer mechanisms. Both require data processing agreements, but DORA adds operational resilience criteria.
NIS2 Directive: While NIS2 covers critical infrastructure broadly, DORA provides sector-specific requirements for financial services. Entities may face dual obligations.
EBA Guidelines on Outsourcing: DORA supersedes and expands EBA/GL/2019/02, adding:
- Broader scope including all ICT services
- Direct regulatory oversight of critical providers
- Standardized incident reporting formats
ISO 27001/27017: DORA Article 6 recognizes international standards for demonstrating compliance. Map your ISMS controls to DORA requirements:
- A.15 (Supplier Relationships) → DORA Articles 28-30
- A.16 (Incident Management) → DORA Articles 17-23
- A.17 (Business Continuity) → DORA Articles 11-12
Implementation Timeline and Transition
January 17, 2025, marks full DORA applicability. Transition considerations:
Existing Contracts: Agreements signed before January 17, 2023, have until January 17, 2025, to comply. New contracts require immediate DORA alignment.
Documentation Requirements: Build audit trails demonstrating:
- Board approval of ICT risk frameworks
- Third-party risk assessment methodologies
- Incident classification procedures
- Testing schedules and results
Regulatory Technical Standards (RTS): ESAs published final RTS in January 2024 covering:
- ICT risk management frameworks
- Major incident classification criteria
- Threat-led penetration testing requirements
- Oversight fees for critical providers
Common Implementation Challenges
Resource Constraints: Small financial entities struggle with DORA's documentation burden. Consider shared assessment models or managed service providers specializing in DORA compliance.
Legacy System Dependencies: Older ICT systems lacking modern security controls require compensating measures. Document risk acceptance decisions with board approval.
Multi-Jurisdictional Complexity: Global financial groups must harmonize DORA with local requirements (UK Operational Resilience, US FFIEC guidance). Create control mapping matrices showing coverage across frameworks.
Vendor Resistance: Non-EU providers may resist DORA's audit rights and data localization requirements. Prepare alternative vendor strategies and transition plans.
Frequently Asked Questions
Does DORA apply to non-EU companies serving EU financial institutions?
Yes. ICT third-party service providers fall under DORA's scope when designated as "critical" by ESAs, regardless of location. All providers must meet contractual requirements under Article 30.
How does DORA define "ICT services" versus traditional outsourcing?
DORA defines ICT services broadly: any digital service provided through ICT systems. This includes cloud computing, software development, data analytics, and cybersecurity services—beyond traditional IT outsourcing.
What constitutes a "major incident" requiring 24-hour notification?
ESA RTS define major incidents using seven criteria including number of affected clients, data losses exceeding €100,000, service downtime impacting critical functions, and reputational impact thresholds.
Can existing ISO 27001 certification satisfy DORA requirements?
ISO 27001 provides partial coverage. DORA Article 6 recognizes international standards but requires additional controls for third-party management, incident reporting, and resilience testing not fully addressed in ISO frameworks.
How does DORA's penalty structure work?
Maximum penalties reach 2% of global annual turnover or €10 million (whichever is higher) for entities, and 1% or €5 million for individuals. Penalties consider severity, duration, intentionality, and cooperation levels.
What's the difference between DORA and the UK's Operational Resilience framework?
While both address ICT resilience, DORA provides prescriptive requirements with standardized reporting, while UK rules focus on outcome-based impact tolerances. DORA includes direct oversight of critical providers; UK framework doesn't.
Do crypto-asset service providers need to comply with DORA?
Yes. MiCA-authorized CASPs fall under DORA's full requirements. This includes crypto exchanges, wallet providers, and crypto asset custody services operating in the EU.
Frequently Asked Questions
Does DORA apply to non-EU companies serving EU financial institutions?
Yes. ICT third-party service providers fall under DORA's scope when designated as "critical" by ESAs, regardless of location. All providers must meet contractual requirements under Article 30.
How does DORA define "ICT services" versus traditional outsourcing?
DORA defines ICT services broadly: any digital service provided through ICT systems. This includes cloud computing, software development, data analytics, and cybersecurity services—beyond traditional IT outsourcing.
What constitutes a "major incident" requiring 24-hour notification?
ESA RTS define major incidents using seven criteria including number of affected clients, data losses exceeding €100,000, service downtime impacting critical functions, and reputational impact thresholds.
Can existing ISO 27001 certification satisfy DORA requirements?
ISO 27001 provides partial coverage. DORA Article 6 recognizes international standards but requires additional controls for third-party management, incident reporting, and resilience testing not fully addressed in ISO frameworks.
How does DORA's penalty structure work?
Maximum penalties reach 2% of global annual turnover or €10 million (whichever is higher) for entities, and 1% or €5 million for individuals. Penalties consider severity, duration, intentionality, and cooperation levels.
What's the difference between DORA and the UK's Operational Resilience framework?
While both address ICT resilience, DORA provides prescriptive requirements with standardized reporting, while UK rules focus on outcome-based impact tolerances. DORA includes direct oversight of critical providers; UK framework doesn't.
Do crypto-asset service providers need to comply with DORA?
Yes. MiCA-authorized CASPs fall under DORA's full requirements. This includes crypto exchanges, wallet providers, and crypto asset custody services operating in the EU.
Put this knowledge to work
Daydream operationalizes compliance concepts into automated third-party risk workflows.
See the Platform