The Digital Operational Resilience Act (DORA) is the European framework for effective and all-inclusive management of digital risks in Financial Markets and applies to more than 22.000 financial entities and ICT service providers within the EU.
DORA introduces an end-to-end holistic framework of effective Risk management, ICT and cyber security operational capabilities, ICT incident management, Third Party management, ensuring a consistent provision of services across the entire value chain.
By introducing a single consistent supervisory approach across the relevant sectors, where the Austrian Financial Market Authority (FMA) is the regulator in Austria , DORA aims to assure that financial services firms can maintain resilient operations through a cybersecurity or ICT incident of severe operational disruption.
Although DORA is applicable since 17.01.2025 for financial institutions, digital transformation and technology implementation initiatives as well as additional managed services, automation and leveraging the AI are expected still to be a top-priority to further enhance resilience and support compliance to the regulation.
DORA with a holistic approach has a wide scope of financial institutions addressed. Not only banks and insurance firms who were already familiar to such regulations with EBA / EIOPA guidelines on ICT security and outsourcing, but also central market infrastructures, credit risk agencies, crypto-asset service providers, investment and management firms, pension firms, payment service providers and trade repositories and venues are within the radar of the new framework.
FinTech's and start-ups due to their limited size are not exempted, if they operate under the entity types named under DORA regulation. Those firms that employ fewer than 10 persons together with an annual turnover limitation however are subject to a lighter scope of requirements.
ICT providers - including cloud service providers - provisioning services for financial institutions can be now subject to the Oversight Framework, if they would be designated as ‘critical ICT provider’. Although criteria for designation of critical ICT providers were already developed by the ESAs, the actual designation of those ICT providers will depend on the «registers of information» submitted by financial entities throughout Europe in April 2025 first.
Financial entities are required to set up a comprehensive ICT risk management framework, including:
Financial entities are required to:
The regulation requires all entities to:
Financial entities are required to:
developed by European Supervisory Authorities
DORA tasks European Supervisory Authorities (EBA, EIOPA and ESMA) to define further technical standards and guidelines under level 2 acts that will further guide financial institutions. Please note that the list does not include those technical standards that are within the Oversight Framework for critical ICT providers.
Level 2 Regulatory Technical Standard | DORA Article | EUC adoption date | Link |
---|---|---|---|
ICT risk management tools, methods, processes, and policies and the simplified ICT risk management framework | Art. 15(4), Art. 16(3)(4) | March 2024 | Legal Text |
Specifications on the detailed content of the policy regarding contractual arrangements on the use of ICT services supporting critical or important functions provided by ICT third-party service providers | Art. 28(10)(3) | March 2024 | Legal Text |
Classification of ICT-related incidents and cyber threats, setting out materiality thresholds and specifying the details of reports of major incidents | Art. 18(4)(3) | March 2024 | Legal Text |
Standard templates for register of information on contractual agreements related to ICT services | Article 29(9) | November 2024 | Legal Text |
Content and time limits for the initial notification of, and intermediate and final report on, major ICT-related incidents, and the content of the voluntary notification for significant cyber threats | Art. 20(3) | Legal Text | |
Specification of the elements which a financial entity needs to determine and assess when subcontracting ICT services supporting critical or important functions | Art. 30(5) | Legal Text | |
Specification of elements related to threat led penetration tests | Art. 26(11) | Legal Text | |
Joint Guidelines on the estimation of aggregated annual costs and losses caused by major ICT-related incidents | Art. 11(11) | Legal Text |
while supporting your digital transformation initiatives to boost your resilience.
Here's how:
DORA requires:
Establishing training programme for ICT security awareness, digital operational resilience, ICT upskilling, as well as regular trainings for Management and Supervisory boards related to ICT risk by financial institutions, to ensure continuous learning and preparation for the evolving threat landscape.
Our services:
Security awareness trainings for your organization
Dedicated technical ICT upskilling trainings tailored for the needs of your ICT teams as well as your Internal Audit teams to enable them sufficient competence for internal ICT audits by DORA ICT risk management framework
Fit & proper trainings for your management teams
Digital operational resilience trainings for your key personnel
Review your HR training and competency management frameworks for employees and third-party providers to align with DORA requirements
DORA requires:
Regular ICT audits on the ICT risk management framework, including those for ICT third-party providers supporting critical or important functions when a financial entity outsources any of its ICT services. Those audits must be conducted by personnel with sufficient ICT competence and experience.
Our services:
Support you and your internal audit teams in developing a regular multi-year ICT audit program to be executed on yearly basis
Conducting ICT audits based on the ICT risk management framework of DORA, executed by our top ICT and DORA experts
Dedicated DORA ICT audits for your critical ICT third-party providers to ensure their controls satisfy DORA requirements
DORA requires:
Development of a digital operational resilience strategy framework (aligned with the business strategy) to drive continuous improvement for higher resilience in the organization, learning from experiences, risks, and incidents that have occurred.
Our services:
Establish a digital operational resilience strategy framework through dedicated workshops
Support you developing a strategic and tactical roadmap for your resilience strategy
It is our recommendation to conduct a post-implementation compliance check related to DORA, at least once in the first year of the regulation, and then every few years as part of your digital operational resilience testing program.
Our services:
Dedicated and proportional FIT/GAP assessments on your policy framework and the controls implemented, to ensure all DORA requirements are appropriately satisfied.
Compliance dashboard that helps you to prioritize, track and mitigate the gaps identified, together with the relevant risks they pose.
DORA requires:
Development and implementation of a framework to manage the full life cycle of ICT third-party providers, from initial demand to termination. It is also required to document these agreements, along with additional information, in a dedicated register of information to be reported to regulators at least yearly.
Our services:
Developing a dedicated third-party risk management framework with you, proportional to your firm and services, ensuring appropriate categorization of ICT third-party providers and their criticality, relevant contractual clauses, and measures to manage these providers regularly based on their criticality, substitutability, and complexity of services provided
AI-based automated assessment of your ICT third-party service contracts (as well as those that support critical or important functions) to confirm that they satisfy contractual clause requirements of DORA
DORA requires:
By January 17, 2025, financial institutions must classify ICT incidents according to the DORA incident classification schema and report these incidents to regulatory authorities promptly. An end-to-end approach ensuring integration with ICT continuity plans as well as ICT response and recovery plans is needed, which aligns with business continuity and disaster recovery plans.
Our services:
Early warning service (EWaS) providing you a "head start" in detecting potential ICT incidents
Incident response retainer services providing you assurance with immediate incident response and recovery
Testing your preparedness with tabletop incident exercises, including DORA classification and reporting simulations for a relevant scenario that you select from your risk scenario assessments
DORA requires:
Financial entities to plan and conducted dedicated threat-led penetration tests for all their critical or important functions every three years.
Our services:
Comprehensive end-to-end Threat-Led Penetration Testing (TLPT) exercises conducted by our local and global security experts, featuring certified offensive security experts to assist you through the preparation, threat intelligence, red team and closure phases.
Provide support through our local red team.
Enhance your capabilities with dedicated threat intelligence, leveraging our global threat intelligence services.
Deliver expert Control Team support.
DORA requires:
Establish and maintain a comprehensive digital operational resilience testing policy and programme with yearly testing plans, their documentation and reporting.
Our services:
Develop a resilience testing framework together with you, ensuring it fits your size, complexity, and the market risk you pose
Provide dedicated testing plan templates to establish a solid baseline for your tests
Support the execution of various resilience test types, such as penetration testing, architecture reviews, and exit and transition plans for third-party providers supporting critical or important functions
DORA requires:
Implement a comprehensive ICT continuity framework, supported by continuity plans as well as response and recovery plans. ICT continuity must be part of overall business continuity and the criticality of business functions designated with BIA and dedicated criticality assessments..
Our services:
Increase process maturity on BIA and criticality assessments with our good practices that not only ensure DORA compliance, but also provide you a concrete, objective and well-documented criticality schema that delivers a proportionality.
Oganize and orchestrate dedicated continuity tests and table-top exercises, including crisis scenarios in order to increase awareness throughout the organization and highlight improvement areas with prioritization.
Support you drafting your ICT continuity plans and ICT response and recovery plans.