DORA Compliance for Financial Services: A Practical Guide
The Digital Operational Resilience Act (DORA) is the EU's answer to a simple question: what happens when the technology that financial services depend on fails? DORA establishes uniform requirements for ICT risk management, incident reporting, resilience testing, and third-party risk management across all EU financial entities.
DORA applies to virtually every financial entity in the EU — banks, insurance companies, investment firms, payment institutions, crypto-asset service providers, and critically, the ICT third-party service providers that serve them.
The Five Pillars of DORA
Pillar 1: ICT Risk Management
Financial entities must establish a comprehensive ICT risk management framework. This isn't just about having policies — it requires an internal governance structure with clear responsibilities, a documented ICT risk management framework reviewed annually, identification and classification of all ICT-supported business functions, regular ICT risk assessments, and protection, detection, and response capabilities.
The framework must be proportionate to your size and risk profile, but the core requirements apply to everyone. Small firms can't simply opt out.
Pillar 2: ICT-Related Incident Reporting
DORA standardizes incident reporting across the financial sector. You must classify ICT-related incidents using criteria defined by the European Supervisory Authorities, report major incidents to your competent authority, submit initial notifications, intermediate reports, and final reports within specified timeframes, and maintain a log of all ICT-related incidents.
The reporting requirements are stricter than general cybersecurity frameworks — DORA expects detailed root cause analysis and remediation reporting.
Pillar 3: Digital Operational Resilience Testing
All financial entities must conduct basic resilience testing including vulnerability assessments and scanning, open-source analyses, network security assessments, gap analyses, and scenario-based testing. Significant financial entities must also undergo advanced Threat-Led Penetration Testing (TLPT) at least every three years.
Pillar 4: Third-Party Risk Management
This is where DORA breaks new ground. Financial entities must maintain a register of all ICT third-party service providers, conduct risk assessments before entering contracts, ensure contracts contain mandatory provisions (including audit rights and exit strategies), and monitor third-party performance continuously.
Critical ICT third-party providers will be directly supervised by EU authorities through an oversight framework — a first in EU financial regulation.
Pillar 5: Information Sharing
DORA encourages (but doesn't mandate) financial entities to share cyber threat intelligence and vulnerability information within trusted communities. This is about collective defense — if one bank sees a new attack vector, others benefit from knowing about it.
Track all 94 DORA requirements in one dashboard
Normado maps every DORA requirement to controls and evidence, with actionable guidance on what each requirement means for your organization.
Get early access →DORA Compliance Roadmap
Phase 1: Assessment (Month 1-2)
Determine which DORA requirements apply based on your entity type and size. Map your current ICT risk management practices against DORA requirements. Identify gaps and prioritize them by risk and regulatory impact.
Phase 2: Framework Development (Month 3-5)
Develop or enhance your ICT risk management framework. Create or update policies covering all five pillars. Establish your incident classification and reporting procedures. Build your third-party register.
Phase 3: Implementation (Month 6-10)
Implement technical and operational controls. Set up monitoring and detection capabilities. Conduct initial resilience testing. Onboard third-party providers into your risk management process.
Phase 4: Testing and Validation (Month 11-12)
Conduct comprehensive resilience testing. Validate incident reporting procedures with tabletop exercises. Review third-party contracts for DORA-mandated provisions. Prepare for supervisory review.
DORA vs. Other Frameworks
DORA doesn't exist in isolation. Most financial entities also need to comply with:
- NIS2 — broader cybersecurity directive that also applies to financial entities
- GDPR — data protection requirements that overlap with DORA's data security provisions
- ISO 27001 — often used as the management system framework underlying DORA compliance
- EBA/EIOPA Guidelines — sector-specific guidelines that predate DORA
The good news: there's significant overlap. An organization with ISO 27001 certification and strong GDPR compliance already meets 40-60% of DORA requirements. The gaps are typically in ICT-specific resilience testing, third-party register maintenance, and the detailed incident reporting requirements.
Manage DORA alongside ISO 27001, GDPR, and NIS2
Normado's multi-framework support lets you track compliance across all five frameworks simultaneously, with cross-mapping so one control satisfies requirements across multiple regulations.
Start for free →