DORA Compliance: What the Regulation Requires, Who It Affects, and How to Prepare
2026-03-07
By Orbiq Team

DORA Compliance: What the Regulation Requires, Who It Affects, and How to Prepare

A practical guide to DORA compliance — what the Digital Operational Resilience Act requires, which financial entities and ICT providers are affected, key obligations around ICT risk management, incident reporting, resilience testing, and third-party risk management.

DORA
Digital Operational Resilience
Financial Services
EU Regulation
ICT Risk Management
Compliance

DORA Compliance: What the Regulation Requires, Who It Affects, and How to Prepare

The Digital Operational Resilience Act (DORA) is the EU's regulation for digital operational resilience in the financial sector. Applicable from January 2025, it establishes harmonised requirements for ICT risk management, incident reporting, resilience testing, and third-party risk management across all types of financial entities.

For B2B SaaS companies serving the financial sector, DORA has significant implications. If designated as a critical ICT third-party provider, you fall under direct EU oversight. Even without that designation, financial entity customers will impose DORA-aligned contractual requirements on their ICT suppliers. Understanding DORA is essential for any technology company doing business with European financial institutions.

This guide covers what DORA requires, who it applies to, the five pillars of compliance, and how to prepare as an ICT service provider.


DORA Scope and Applicability

Financial Entities in Scope

DORA applies to virtually all regulated financial entities in the EU:

CategoryEntities
BankingCredit institutions, payment institutions, electronic money institutions
InvestmentInvestment firms, trading venues, central counterparties, central securities depositories
InsuranceInsurance undertakings, reinsurance undertakings, insurance intermediaries
PensionsInstitutions for occupational retirement provision
CryptoCrypto-asset service providers, issuers of asset-referenced tokens
OtherCredit rating agencies, administrators of critical benchmarks, securitisation repositories, crowdfunding service providers

ICT Third-Party Service Providers

DORA extends beyond financial entities to cover ICT third-party service providers, including:

  • Cloud service providers (IaaS, PaaS, SaaS)
  • Data analytics providers
  • Software vendors
  • Data centre service providers
  • ICT infrastructure providers

Critical ICT third-party providers (CTPPs) designated by the European Supervisory Authorities face direct oversight. Designation criteria include systemic importance to the financial sector, degree of substitutability, and the number and significance of financial entities relying on the provider.


The Five Pillars of DORA

Pillar 1: ICT Risk Management (Articles 5-16)

Financial entities must establish comprehensive ICT risk management frameworks:

Governance

  • Management body bears ultimate responsibility for ICT risk management
  • Define, approve, and oversee the ICT risk management framework
  • Allocate sufficient budget and resources for ICT security
  • Management members must maintain ICT risk knowledge through regular training

ICT Risk Management Framework

  • Identify all ICT-supported business functions and assets
  • Classify information assets by criticality
  • Conduct regular risk assessments
  • Implement protection and prevention measures
  • Establish detection mechanisms for anomalous activity
  • Define response and recovery procedures
  • Maintain a comprehensive ICT risk management policy

Key Requirements:

AreaRequirement
IdentificationMaintain updated inventory of ICT assets, map dependencies, identify critical functions
ProtectionImplement security policies, access controls, encryption, network security
DetectionDeploy monitoring, alerting, and anomaly detection capabilities
ResponseEstablish incident response procedures, containment strategies, communication plans
RecoveryDefine recovery objectives, backup policies, restoration procedures
LearningPost-incident reviews, vulnerability assessments, continuous improvement

Pillar 2: ICT-Related Incident Management and Reporting (Articles 17-23)

Incident Classification

Financial entities must classify ICT-related incidents using these criteria:

CriterionDescription
Affected clientsNumber of clients or financial counterparts affected
DurationLength of the incident
Geographical spreadAreas affected, including cross-border impact
Data lossesWhether data was compromised, corrupted, or lost
Criticality of servicesHow critical the affected services are
Economic impactDirect and indirect costs and losses

Reporting Timeline

StageDeadlineContent
Initial notification4 hours after classification (24 hours after detection)Incident summary, initial impact assessment
Intermediate report72 hours after classificationUpdated assessment, containment measures, root cause (if known)
Final report1 month after last intermediate reportRoot cause analysis, total impact, remediation measures, lessons learned

Voluntary Threat Reporting

Financial entities may voluntarily report significant cyber threats to competent authorities. This is encouraged to improve sector-wide resilience and threat intelligence sharing.

Pillar 3: Digital Operational Resilience Testing (Articles 24-27)

Basic Testing (All entities)

All financial entities must conduct proportionate testing:

  • Vulnerability assessments and scans
  • Open source analyses
  • Network security assessments
  • Gap analyses
  • Physical security reviews
  • Questionnaires and scanning software solutions
  • Source code reviews where feasible
  • Scenario-based tests
  • Compatibility testing
  • Performance testing
  • End-to-end testing
  • Penetration testing (at least annually)

Advanced Testing — TLPT (Significant entities)

Significant financial entities must conduct threat-led penetration testing (TLPT):

RequirementDetail
FrequencyAt least every 3 years
FrameworkMust follow TIBER-EU or equivalent national framework
ScopeCritical or important functions on live production systems
TestersQualified external providers with specific expertise
Threat intelligenceBased on current threat landscape specific to the entity
ReportingResults reported to competent authority with remediation plan

Pillar 4: ICT Third-Party Risk Management (Articles 28-44)

Pre-Contracting Requirements

  • Conduct risk assessment before entering ICT arrangements
  • Assess provider's information security capabilities
  • Evaluate concentration risk (dependency on single providers)
  • Ensure due diligence on providers supporting critical functions

Mandatory Contractual Provisions

Contracts with ICT third-party providers must include:

ProvisionDescription
Service descriptionClear description of functions, including sub-outsourcing conditions
Data locationLocations where data is processed and stored, notification of changes
Security measuresService levels, security requirements, access controls
Availability targetsGuaranteed uptime, recovery time and point objectives
Incident notificationObligation to report ICT-related incidents
Business continuityPlans for ensuring continuity during disruptions
Audit rightsRights to conduct audits and inspections
Termination and exitTransition periods, data return, deletion requirements
Sub-outsourcingConditions for further outsourcing to sub-contractors

Ongoing Monitoring

  • Monitor provider performance against contractual obligations
  • Maintain a register of all ICT third-party arrangements
  • Report the register to competent authorities annually
  • Assess and manage concentration risk regularly

Exit Strategies

  • Develop exit plans for critical ICT third-party arrangements
  • Ensure plans include adequate transition periods
  • Plan for data portability and migration
  • Test exit procedures periodically

Pillar 5: Information Sharing (Article 45)

Financial entities may participate in voluntary arrangements for sharing cyber threat intelligence and information about:

  • Tactics, techniques, and procedures (TTPs)
  • Indicators of compromise (IoCs)
  • Security alerts and configuration tools
  • Cyber threat intelligence

Participation is voluntary but encouraged. Shared information must be handled in accordance with confidentiality requirements and competition law.


DORA for ICT Service Providers

Direct Impact

If you are an ICT third-party service provider to financial entities:

Contractual obligations: Financial entity customers will require DORA-compliant contractual terms covering security measures, incident notification, audit rights, data location, and exit strategies.

Enhanced due diligence: Expect deeper security assessments during procurement, including reviews of your ICT risk management framework, incident response capabilities, and business continuity plans.

Incident notification: You will need to notify financial entity customers of ICT-related incidents according to timelines that support their own 4-hour reporting obligation.

Audit and inspection rights: Financial entities and their competent authorities must have the right to audit and inspect your systems, operations, and security measures.

Critical ICT Third-Party Provider (CTPP) Designation

If designated as a CTPP by the ESAs, additional obligations apply:

  • Direct oversight by a Lead Overseer (one of the three ESAs)
  • Obligation to respond to information requests and comply with recommendations
  • Subject to general investigations and on-site inspections
  • Must appoint an EU subsidiary for non-EU providers
  • Recommendations are not legally binding but non-compliance can result in financial entities being required to terminate arrangements

DORA and Other Frameworks

DORA and NIS2

AspectDORANIS2
ScopeFinancial sectorCross-sector (18 sectors)
NatureRegulation (directly applicable)Directive (requires transposition)
Incident reporting4 hours initial notification24 hours early warning
TestingMandatory TLPT for significant entitiesEffectiveness assessment required
Third-party managementComprehensive framework with oversightSupply chain security obligations
RelationshipLex specialis (takes precedence)Applies where DORA does not

DORA and ISO 27001

AspectISO 27001DORA Additions
Risk managementComprehensive ISMSAligned, with financial sector specifics
Incident reportingInternal proceduresMandatory 4/72-hour external reporting
TestingA.8.8 vulnerability managementMandatory TLPT every 3 years
Third-partyA.5.19-A.5.23 supplier securityRegister, contractual provisions, oversight
Business continuityA.5.29-A.5.30Detailed ICT continuity requirements

Preparing for DORA Compliance

For Financial Entities

  1. Gap analysis — Map current ICT risk management framework against DORA requirements
  2. Governance — Ensure management body is engaged with ICT risk oversight and training
  3. ICT risk management — Enhance identification, protection, detection, response, and recovery capabilities
  4. Incident management — Establish classification criteria and reporting processes meeting DORA timelines
  5. Resilience testing — Develop testing programme, plan TLPT if applicable
  6. Third-party register — Create and maintain the register of all ICT third-party arrangements
  7. Contract review — Update contracts with ICT providers to include DORA mandatory provisions
  8. Exit strategies — Develop exit plans for critical ICT third-party arrangements

For ICT Service Providers

  1. Understand your exposure — Identify which financial entity customers are subject to DORA
  2. Review contracts — Prepare for DORA-compliant contractual requirements
  3. Strengthen incident response — Ensure you can support customers' 4-hour reporting obligation
  4. Prepare for audits — Build audit-readiness with comprehensive documentation and evidence
  5. Publish on Trust Center — Make security documentation, incident response capabilities, and compliance evidence available to financial entity buyers
  6. Assess CTPP risk — Evaluate whether you might be designated as critical and prepare accordingly

How Orbiq Supports DORA Compliance

  • Trust Center: Publish your DORA compliance posture — ICT risk management measures, incident response capabilities, and resilience testing evidence for financial entity buyers
  • Continuous Monitoring: Track DORA requirements across all five pillars with real-time compliance status
  • Evidence Management: Centralize ICT risk documentation, incident records, testing reports, and third-party arrangement registers mapped to DORA articles
  • AI-Powered Questionnaires: Auto-respond to DORA-related security questionnaire questions from financial entity customers

Further Reading


This guide is maintained by the Orbiq team. Last updated: March 2026.