Understanding DORA regulation: The Digital Operational Resilience Act
- Volodymyr Garbar
- 3 days ago
- 3 min read
Updated: 3 days ago
In January 2025, the European Union’s Digital Operational Resilience Act (DORA) will become fully enforceable, transforming the regulatory cybersecurity landscape for financial services. Designed to ensure digital resilience across the financial ecosystem, DORA introduces comprehensive requirements for ICT risk management, incident handling, testing, and third-party oversight. Here's what every affected organisation needs to know.

What Is DORA regulation?
DORA (Regulation (EU) 2022/2554) is an EU-wide regulatory framework focused on the digital operational resilience of financial institutions. Unlike earlier regulations, DORA specifically targets ICT risks—cybersecurity incidents, third-party service disruptions, and digital infrastructure failures. It applies to over 22,000 financial entities and their critical ICT providers, including banks, insurers, investment firms, crypto platforms, and cloud or software vendors.
Who Must Comply?
DORA covers a wide range of entities:
Banks, insurers, and pension funds
Crypto-asset service providers
Payment service providers and crowdfunding platforms
ICT providers that serve regulated financial entities
If you are part of the digital supply chain to a financial institution in the EU, DORA likely applies to you.
When Does DORA Take Effect?
Published: January 16, 2023
In force: January 17, 2025
Entities are expected to use this two-year window to fully align with DORA’s framework and be audit-ready by the enforcement date.
The 5 Pillars of DORA
1. ICT Risk Management
Organisations must develop an ICT risk management framework that includes:
Clear governance roles and responsibilities
Ongoing risk assessments
Incident response and recovery plans
Monitoring, alerting, and backup strategies
Communication and learning mechanisms
Importantly, DORA supports a proportional approach—meaning smaller organisations may adopt lighter implementations, while large enterprises must meet higher standards.
2. ICT-Related Incident Reporting
Mandatory reporting for major ICT incidents is a cornerstone of DORA. Entities must:
Detect and classify incidents based on severity
Notify national competent authorities within strict timeframes
Optionally report significant cyber threats for industry-wide awareness
An efficient and structured incident management process is essential to meet these requirements.
3. Digital Operational Resilience Testing (DORT)
DORA introduces rigorous and regular testing:
Annual security testing of critical systems
Threat-Led Penetration Testing (TLPT) every 3 years
These tests must be conducted by independent experts and focus on real-world threats, requiring organisations to validate their resilience under simulated attacks.
4. ICT Third-Party Risk Management
The regulation demands greater scrutiny and control over third-party providers:
Risk-based vendor assessments
Security provisions within contracts
Centralised registry of all ICT-related third-party agreements
Audit rights and exit strategies
Supply chain risk is no longer optional—it's a regulatory obligation.
5. Information Sharing
DORA promotes collective cyber resilience by encouraging:
Participation in threat intelligence sharing communities (e.g., ISACs)
Reporting systemic threats to competent authorities
Although voluntary, these practices significantly strengthen threat detection and sector-wide preparedness.
How to Prepare for DORA
Step 1: Assign Governance and Ownership
Designate a senior executive or committee responsible for DORA implementation and oversight. Ensure top-level sponsorship to align the organisation and allocate resources.
Step 2: Conduct a Gap Assessment
Benchmark current practices against DORA’s requirements. Identify gaps in risk management, incident handling, and third-party governance.
Step 3: Create a Compliance Roadmap
Prioritise remediation based on risk and impact. Define timelines and deliverables for policies, tools, and process updates.
Step 4: Implement Controls and Technology
Deploy solutions to support continuous monitoring, incident response, risk analysis, and audit readiness. Tools may include SIEM, SOAR, EDR, and vulnerability scanners.
Step 5: Formalise Third-Party Management
Review contracts, perform vendor risk assessments, and maintain a central third-party register. Ensure performance clauses and data protection obligations are embedded.
Step 6: Develop a Testing Strategy
Plan for annual system tests and prepare for TLPT with internal or external teams. Simulate disruptions, review results, and prioritise remediation.
Step 7: Document and Train
Update or create policies on incident response, ICT risk, and DR/BCP. Train staff on roles and responsibilities, response workflows, and reporting obligations.
Enforcement Measures
Non-compliance with DORA can lead to:
Fines up to €10 million or 5% of global turnover
Public reprimands and reputational damage
Withdrawal of financial licenses in severe cases
Compensation liabilities for client or third-party harm
Conclusion
DORA brings a new era of digital accountability for the financial sector. It’s not just about avoiding penalties—it's about building resilience, protecting clients, and maintaining trust in the digital economy. Organisations that act early will not only ensure compliance but also strengthen their overall cybersecurity maturity in the process.