Zum Hauptinhalt springen
Law · EU

DORA — Digital Operational Resilience Act

Updated on 5 min Reviewed by: Cenedril Editorial
A.5.7A.5.19A.5.20A.5.21A.5.22A.5.23A.5.24A.5.25A.5.26A.5.27A.5.29A.5.30A.8.6A.8.8A.8.14A.8.15A.8.16 EU

A mid-sized asset manager relies on a single cloud provider for portfolio data without documenting its subcontractor chain. When the provider fails, reporting is down for 48 hours. The supervisor asks for the third-party register, the exit strategy and the resilience testing protocol. Taking DORA seriously only when the supervisor calls means being structurally too late.

The Digital Operational Resilience Act (DORA) is the central EU regulation on digital operational stability in the financial sector. It consolidates requirements on ICT risk management, incident reporting, resilience testing, third-party management and information sharing into a single framework, replacing a large share of the previously fragmented national supervisory communications.

Who is affected?

DORA has an unusually broad set of addressees. It covers 21 categories of financial entities and for the first time also ICT third-party service providers directly:

  • Financial entities — banks, insurers, reinsurers, investment firms, payment and e-money institutions, crypto asset service providers, central counterparties, trading venues, data reporting service providers, alternative investment fund managers, UCITS management companies, insurance intermediaries and others.
  • ICT third-party service providers — all providers of digital services to financial entities, from cloud platforms and software providers to managed security services.
  • Critical ICT third-party providers (CTPPs) — providers designated by the ESAs as posing a concentration risk for the financial sector. They are subject to direct European oversight with annual supervisory plans and sanctioning powers.

Proportionality (Art. 4) allows simplified requirements for microenterprises and small investment firms. The core obligations on incident reporting and the third-party register apply universally.

What does the law require?

DORA is structured around five pillars. Each pillar contains detailed requirements that are further specified through delegated acts (RTS/ITS):

  • ICT risk management (Chapter II, Art. 5–16) — documented framework, reviewed annually, approved by the management body. Inventory of all ICT assets, continuous risk assessment, protection and detection measures, backup and recovery strategies.
  • ICT incidents (Chapter III, Art. 17–23) — classification system, obligation to report major incidents against fixed thresholds, initial, intermediate and final reports to the supervisor. Cyberattacks are in scope.
  • Resilience testing (Chapter IV, Art. 24–27) — risk-based testing programme, at least annually; for significant entities, extended Threat-Led Penetration Tests (TLPT) every three years under the TIBER-EU methodology.
  • ICT third-party risk (Chapter V, Art. 28–44) — contract register with mandatory fields, concentration risk analysis, contractual minimum clauses (audit rights, subcontractor control, exit strategy), direct oversight framework for critical third-party providers.
  • Information sharing (Chapter VI, Art. 45) — voluntary exchange of cyber threat intelligence between financial entities.

In practice

Have the contract register complete before the audit starts. The most common gap after DORA took effect: the register was compiled from old outsourcing lists without consistently maintaining the DORA mandatory fields (function, data category, subcontractor, country of processing, materiality rating). The supervisor can request the register at any time.

Operationalise the thresholds for incident classification. The delegated regulation defines hard criteria (customers affected, duration, geographic reach, data loss, economic impact, reputation). Without these thresholds wired into the incident response process, the initial 4-hour deadline and the follow-up reporting dates are at risk.

Test exit strategies, do more than document them. DORA requires a documented exit strategy including a transition period for every material ICT function. A strategy that has never been tested does not hold up in a crisis. Tabletop exercises with the provider are the most practical form of validation.

Mapping to ISO 27001

DORA overlaps structurally with ISO 27001 and ISO 22301. Anyone running a certified ISMS and BCMS already covers a large share of DORA requirements technically — the DORA-specific documentation structure and reporting obligations still need to be met separately.

Directly relevant controls:

Typical audit findings

  • Third-party register incomplete — subcontractors are missing, materiality rating was never systematically assigned, concentration risk has not been analysed.
  • Incident classification not operationalised — the incident response process does not know the DORA thresholds, the initial 4-hour report is only a theoretical capability.
  • Resilience testing programme too narrow — testing focuses on penetration tests of individual applications, without the breadth DORA requires (scenario analyses, open source component tests, performance tests).
  • Exit strategies are mere boilerplate — no migration estimate, no transition period, no tested data portability.
  • Management body not actively involved — the ICT risk framework was formally approved, but the annual review is cosmetic.
  • TLPT preparation started too late — choosing threat intelligence and red team providers, scope definition and TIBER-EU-compliant execution take more lead time than is often planned.

Sources

ISO 27001 Controls Covered

A.5.7 Threat intelligence A.5.19 Information security in supplier relationships A.5.20 Addressing information security within supplier agreements A.5.21 Managing information security in the ICT supply chain A.5.22 Monitoring, review and change management of supplier services A.5.23 Information security for use of cloud services A.5.24 Information security incident management planning and preparation A.5.25 Assessment and decision on information security events A.5.26 Response to information security incidents A.5.27 Learning from information security incidents A.5.29 Information security during disruption A.5.30 ICT readiness for business continuity A.8.6 Capacity management A.8.8 Management of technical vulnerabilities A.8.14 Redundancy of information processing facilities A.8.15 Logging A.8.16 Monitoring activities

Frequently asked questions

Who falls under DORA?

Practically all regulated financial entities in the EU: banks, insurers, investment firms, payment institutions, e-money institutions, crypto asset service providers, trading venues, central counterparties, fund managers and several other categories. The regulation also covers critical ICT third-party service providers, which can be supervised directly by the ESAs under the oversight framework.

Do small financial entities have to implement the full set of obligations?

DORA includes a proportionality principle (Art. 4). Microenterprises and small investment firms can apply a simplified ICT risk framework. The obligation to report major ICT incidents, maintain a register of third-party contracts and carry out resilience testing remains for all.

How does DORA relate to BAIT, VAIT, KAIT and MaRisk?

As an EU regulation, DORA takes precedence over national supervisory communications. BaFin has announced that it will partly withdraw or adapt BAIT, VAIT and KAIT. MaRisk topics beyond ICT (e.g. outsourcing governance for non-ICT providers) remain relevant. In practice this converges on a consolidated ICT framework that uses DORA as the foundation.