What is DORA?

DORA (Digital Operational Resilience Act, Regulation EU 2022/2554) establishes a comprehensive framework for ICT risk management in the EU financial sector. Effective January 17, 2025, it creates harmonized requirements for how financial entities manage ICT risk, report incidents, test resilience, and oversee third-party ICT providers.

DORA applies to credit institutions, investment firms, insurance and reinsurance undertakings, payment institutions, crypto-asset service providers, and their critical ICT third-party providers. It represents the most comprehensive EU framework for digital operational resilience in financial services.

The Five Pillars of DORA

DORA is built on five interconnected pillars, each with specific requirements and regulatory technical standards.

PillarScopeKey Requirements
ICT Risk ManagementGovernance, identification, protection, detection, response/recovery, learningComprehensive ICT risk management framework with board-level oversight
ICT Incident ReportingClassification, notification, harmonized templatesReport major ICT incidents to competent authorities using standardized formats
Digital Operational Resilience TestingBasic testing, advanced TLPTRegular testing program; significant entities must conduct threat-led penetration testing
ICT Third-Party Risk ManagementRegister of arrangements, concentration risk, exit strategiesMaintain register of ICT third-party arrangements; manage concentration risk
Information SharingVoluntary threat intelligence sharingArrangements for sharing cyber threat intelligence with other financial entities

Applicability

DORA applies broadly across the EU financial sector. Understanding whether your organization falls within scope is the first step toward compliance.

Entity TypeDORA AppliesTLPT Required
Credit InstitutionsYesSignificant entities
Investment FirmsYesSignificant entities
Insurance / ReinsuranceYesSignificant entities
Payment InstitutionsYesSignificant entities
Crypto-Asset Service ProvidersYesSignificant entities
Critical ICT Third-Party ProvidersYes (direct oversight)Per oversight framework

ICT Risk Management Framework

DORA requires financial entities to establish a comprehensive ICT risk management framework covering six key areas:

  • Governance — board-level responsibility for ICT risk management, including approval of the ICT risk management framework
  • Identification — identify, classify, and document all ICT-supported business functions, information assets, and dependencies
  • Protection — implement ICT security policies, access controls, encryption, and network security measures
  • Detection — establish mechanisms to detect anomalous activities and ICT incidents promptly
  • Response and Recovery — develop ICT business continuity plans, response procedures, and recovery capabilities
  • Learning — conduct post-incident reviews, share lessons learned, and continuously improve the framework

Readiness Assessment Checklist

Before engaging with regulators or auditors, evaluate where your organization stands against these readiness questions:

  1. Is an ICT risk management framework documented with board-level governance and oversight?
  2. Are incident classification and reporting procedures defined using DORA-harmonized templates?
  3. Is a resilience testing program in place, including TLPT for significant entities?
  4. Is there a complete register of all ICT third-party arrangements?
  5. Has a concentration risk assessment been completed for critical ICT third-party providers?
  6. Are information sharing arrangements established for cyber threat intelligence?

If you can’t confidently answer “yes” to most of these, a readiness sprint will get you there.

Next step: See our control domain breakdown to understand what DORA requires across all five pillars, with evidence examples for each.