EU Regulation | Financial Sector
DORA: Digital Operational
Resilience Act
Since 17 January 2025, DORA (Regulation EU 2022/2554) applies directly across all EU member states. Banks, insurers, and all other financial entities must systematically demonstrate their digital operational resilience - with mandatory penetration tests, strict incident reporting obligations, and a comprehensive ICT third-party register.
Last updated: March 2026
- Applicable since
- 17 Jan 2025
- Categories of financial entities
- 20
- Incident reporting deadlines
- 4h / 72h
- CTP fine (daily global turnover)
- 1%
Definition
What is DORA?
The Digital Operational Resilience Act (Regulation EU 2022/2554) has been directly and bindingly applicable in all EU member states since 17 January 2025. As an EU regulation - not a directive - DORA applies without national transposition into domestic law.
DORA creates the first harmonized legal framework for digital operational resilience across the entire European financial sector. Financial entities must demonstrate that they can absorb, adapt to, and recover from ICT-related disruptions, cyberattacks, and system failures.
Particularly significant: DORA regulates not only the financial entities themselves but also their critical ICT third-party providers directly - cloud hyperscalers such as AWS, Microsoft Azure, or Google Cloud may be designated as Critical Third-Party Providers (CTPs) subject to direct European supervision.
DORA vs. NIS2 Comparison
| Aspect | DORA | NIS2 |
|---|---|---|
| Legal form | EU Regulation (direct) | EU Directive (national transposition) |
| Scope | Financial sector only | All critical sectors |
| ICT third parties | Directly regulated | Indirect (supply chain) |
| Penetration tests | TLPT mandatory | No specific requirement |
| Supervisory authority | National FSA / ECB | National cybersec. authority |
| Lex specialis | Yes, takes precedence | General rule |
Lex specialis: For financial entities subject to both DORA and NIS2, DORA takes precedence as sector-specific law. Most DORA requirements simultaneously satisfy NIS2 obligations.
Applicability
Who is subject to DORA?
Art. 2 DORA defines 20 categories of financial entities and critical ICT third-party providers in scope. The range spans from traditional credit institutions to crypto-asset service providers.
Financial Entities
- Credit institutions and investment firms
- Payment institutions and e-money institutions
- Insurance and reinsurance undertakings
- Institutions for occupational retirement provision (IORPs)
- Alternative investment fund managers (AIFMs) and UCITS management companies
- Crypto-asset service providers (under MiCA)
- Crowdfunding service providers
- Central counterparties (CCPs) and central securities depositories
- Trading venues (Regulated Markets, MTF, OTF)
- Trade repositories and securitisation repositories
Critical ICT Third-Party Providers (CTPs)
For the first time, ICT service providers delivering systemically important services to the financial sector are directly regulated by the European Supervisory Authorities (ESAs):
- Cloud computing providers (AWS, Azure, Google Cloud)
- Data centres and colocation services
- Data analytics and market data platforms
- Core banking software providers
- Payment processors and clearing houses
CTP sanctions: Up to 1% of average daily global turnover - levied daily until remedied (Art. 35 DORA)
Requirements
The 5 DORA Pillars
DORA structures the requirements for digital operational resilience into five pillars. All five areas are mandatory for in-scope financial entities.
ICT Risk Management
Financial entities must establish a comprehensive ICT risk management framework that systematically identifies, classifies, and assesses all ICT risks. This includes an up-to-date ICT asset inventory mapping all hardware, software, and data, plus implemented protective measures: access control, patch management, data backup, and encryption. Business continuity and contingency plans for ICT systems must be defined and regularly tested.
Key obligations
- Complete ICT asset inventory
- Risk appetite strategy (board-approved)
- Business Continuity Plan
- Patch management processes
- Personal management accountability
ICT-Related Incident Reporting
DORA establishes a harmonized EU-wide three-tier reporting procedure for major ICT-related incidents to the national competent authority. Classification as major is determined according to EBA regulatory technical standards and considers factors such as number of affected clients, service downtime, and data loss.
Key obligations
- Initial notification: 4 hours after classification
- Intermediate report: 72 hours
- Final report: 1 month
- Internal classification processes
- Predefined escalation paths
Digital Operational Resilience Testing
DORA mandates regular, binding tests. All financial entities must conduct at least annual baseline tests: vulnerability assessments, open-source analyses, and network security assessments. Significant institutions are additionally required to conduct Threat-Led Penetration Tests (TLPT) under TIBER-EU - every three years, based on real threat intelligence.
Key obligations
- Annual baseline tests (all entities)
- TLPT every 3 years (significant institutions)
- TIBER-EU-accredited service providers
- Live production system tests
- Supervisory approval required
ICT Third-Party Risk Management
This is one of the most significant DORA aspects: financial entities must maintain a complete register of all ICT third-party providers. For critical providers, minimum contractual clause requirements apply: audit and inspection rights, SLA definitions, exit strategies, and concentration risk analyses. The ESAs may designate systemically important providers as CTPs and supervise them directly.
Key obligations
- Complete third-party register
- Criticality classification of all providers
- DORA-compliant contractual clauses
- Concentration risk analysis
- Exit strategies per provider
Information Sharing
DORA encourages financial entities to voluntarily exchange structured cyber threat intelligence (threat intel) within trusted communities. This information sharing is intended to strengthen the collective resilience of the financial sector and is legally underpinned by DORA - subject to data protection requirements.
Key obligations
- Voluntary participation
- Trusted communities
- Data-protection-compliant exchange
- Strengthening collective resilience
- ISACs and TIBER networks
Art. 28-44 DORA
ICT Third-Party Risk: The Heart of DORA
ICT third-party risk management is one of the most demanding and innovative aspects of DORA. For the first time, an EU regulation creates direct supervision over critical technology providers in the financial sector.
Financial entities must maintain a complete, continuously updated register of all ICT third-party providers. Each provider must be classified by criticality: if it supports critical or important functions, enhanced contractual requirements apply - including audit and inspection rights for supervisory authorities.
The concentration risk analysis is a novel requirement: financial entities must assess and document their dependency on individual providers - and maintain functioning exit strategies in the event of provider failure.
„DORA requires a holistic approach that combines ISMS methodology with offensive security. Financial entities that rely solely on documentation will fail at their first TLPT exercise. We combine ISO 27001 expertise with genuine red team experience - that is the only way to substantively satisfy DORA.“
Oskar Braun
ISO 27001 Lead Auditor (IRCA certified) · AWARE7 GmbH
Implementation
Implementing DORA: The 6-Step Process
DORA has been in force since January 2025 - financial entities that have not yet started must act now. This structured process leads to demonstrable compliance.
Applicability assessment
Determine whether and to what extent DORA applies to your entity: classification under Art. 2 categories, review of proportionality rules, and identification of all relevant ICT systems and processes.
Gap analysis
Structured comparison of existing ICT risk management, incident processes, and third-party contracts against all DORA requirements. Output: prioritized action plan with effort estimates.
ICT risk management framework
Build or enhance the ICT risk management framework under Art. 5-16: asset inventory, risk assessment procedures, protective measures, Business Continuity Plan, and board-level anchoring.
Third-party register
Create and maintain the complete ICT third-party register per Art. 28. Criticality classification of all providers, contract updates to DORA minimum requirements, and concentration risk analysis.
Resilience testing programme
Establish an annual testing programme for vulnerability assessments and penetration tests per Art. 25. For significant institutions: preparation and execution of TLPT under TIBER-EU with accredited providers.
Continuous improvement
DORA demands not a one-off project but a living compliance system: annual updates of the third-party register, regular risk reviews, lessons from incident reports, and management reviews.
Relationship between frameworks
DORA and NIS2: Lex Specialis
For financial entities subject to both DORA and NIS2, DORA applies as sector-specific law (lex specialis) and takes precedence over the general NIS2 rules. Recital 16 DORA clarifies: financial entities that satisfy all DORA requirements are deemed compliant with the corresponding NIS2 obligations.
In practice this means: DORA sets higher standards than NIS2 in the financial sector. Implementing DORA exceeds NIS2 minimum requirements. An integrated ISMS based on ISO 27001 provides the optimal foundation for both frameworks.
Shared requirements
Both frameworks- - ICT risk management
- - Incident reporting obligations
- - Management accountability
- - Supply chain security
DORA-specific (takes precedence)
DORA only- - TLPT under TIBER-EU (every 3 years)
- - Direct CTP regulation
- - 4-hour initial notification
- - Third-party register under Art. 28
- - Concentration risk analysis
NIS2-specific
NIS2 only- - Cross-sector scope
- - National implementing legislation
- - National cybersecurity authority
- - Critical infrastructure classification
Why AWARE7 for DORA compliance
Was uns von anderen Anbietern unterscheidet
Reine Awareness-Plattformen testen keine Systeme. Reine Beratungskonzerne sind zu weit weg. AWARE7 verbindet beides: Wir hacken Ihre Infrastruktur und schulen Ihre Mitarbeiter - mittelstandsgerecht, persönlich, ohne Enterprise-Overhead.
Forschung und Lehre als Fundament
Rund 20% unseres Umsatzes stammen aus Forschungsprojekten für BSI und BMBF. Unsere Studien analysieren Millionen von Websites und Zehntausende Phishing-E-Mails - publiziert auf ACM- und Springer-Konferenzen. Drei unserer Führungskräfte sind gleichzeitig Professoren an deutschen Hochschulen.
Digitale Souveränität - keine Kompromisse
Alle Daten werden ausschließlich in Deutschland gespeichert und verarbeitet - ohne US-Cloud-Anbieter. Keine Freelancer, keine Subunternehmer in der Wertschöpfung. Alle Mitarbeiter sind sozialversicherungspflichtig angestellt und einheitlich rechtlich verpflichtet. Auf Anfrage VS-NfD-konform.
Festpreis in 24h - planbare Projektzeiträume
Innerhalb von 24 Stunden erhalten Sie ein verbindliches Festpreisangebot - kein Stundensatz-Risiko, keine Nachforderungen, keine Überraschungen. Durch eingespieltes Team und standardisierte Prozesse erhalten Sie einen klaren Zeitplan mit definiertem Starttermin und Endtermin.
Ihr fester Ansprechpartner - jederzeit erreichbar
Ein persönlicher Projektleiter begleitet Sie vom Erstgespräch bis zum Re-Test. Sie buchen Termine direkt bei Ihrem Ansprechpartner - keine Ticket-Systeme, kein Callcenter, kein Wechsel zwischen wechselnden Beratern. Kontinuität schafft Vertrauen.
Für wen sind wir der richtige Partner?
Mittelstand mit 50–2.000 MA
Unternehmen, die echte Security brauchen - ohne einen DAX-Konzern-Dienstleister zu bezahlen. Festpreis, klarer Scope, ein Ansprechpartner.
IT-Verantwortliche & CISOs
Die intern überzeugend argumentieren müssen - und dafür einen Bericht mit Vorstandssprache brauchen, nicht nur technische Findings.
Regulierte Branchen
KRITIS, Gesundheitswesen, Finanzdienstleister: NIS-2, ISO 27001, DORA - wir kennen die Anforderungen und liefern Nachweise, die Auditoren akzeptieren.
Mitwirkung an Industriestandards
OWASP · 2023
OWASP Top 10 for Large Language Models
Prof. Dr. Matteo Große-Kampmann als Contributor im Core-Team des international anerkannten OWASP LLM-Sicherheitsstandards.
BSI · Allianz für Cyber-Sicherheit
Management von Cyber-Risiken
Prof. Dr. Matteo Große-Kampmann als Mitwirkender des offiziellen BSI-Handbuchs für die Unternehmensleitung (dt. Version).
Frequently asked questions about DORA
Answers to the most common questions about the Digital Operational Resilience Act and its requirements for financial entities.
What is DORA?
Who is subject to DORA?
What are the 5 DORA pillars?
What is the difference between DORA and NIS2?
What is TLPT (Threat-Led Penetration Testing)?
What is the ICT third-party register?
What incident reporting obligations apply under DORA?
Does DORA apply to small financial entities?
What are the consequences of DORA non-compliance?
How does AWARE7 support DORA compliance?
Aus dem Blog
Weiterführende Artikel
Alle ArtikelDORA is already in force - act now
We analyse your DORA compliance gaps and create a prioritized action plan - concrete, actionable, and on a fixed-price basis.
Kostenlos · 30 Minuten · Unverbindlich