Compliance · Credibility 94/100 · · 7 min read
EU Digital Operational Resilience Act First Enforcement Wave Reveals ICT Risk Management Gaps Across Financial Sector
The European Supervisory Authorities have initiated the first coordinated enforcement actions under the Digital Operational Resilience Act, issuing supervisory findings to over forty financial institutions across banking, insurance, and investment management. The findings identify pervasive gaps in ICT third-party risk management, incident classification and reporting, and digital operational resilience testing — the three DORA pillars where regulators have focused initial supervisory attention. Financial entities that treated DORA compliance as a documentation exercise rather than an operational-capability-building program are receiving the most severe findings. The enforcement signals confirm that supervisors will assess DORA compliance based on demonstrated operational capability, not just policy documentation.
- DORA
- ICT Risk Management
- Financial Sector Resilience
- Third-Party Risk
- Incident Reporting
- Resilience Testing
DORA entered into force in January 2025, establishing binding requirements for ICT risk management, incident reporting, resilience testing, and third-party risk management across the EU financial sector. The regulation applies to virtually all regulated financial entities — banks, insurers, investment firms, payment institutions, crypto-asset service providers — and to the critical ICT third-party service providers that support them. The first year of enforcement has been a learning period for both the industry and supervisors, and the initial supervisory findings provide invaluable insight into how regulators interpret and enforce the regulation's requirements.
ICT third-party risk management findings
Third-party risk management is the DORA pillar generating the most supervisory findings. Article 28 requires financial entities to maintain a thorough register of all ICT third-party arrangements, conduct risk assessments of critical and important functions outsourced to ICT providers, and implement contractual provisions ensuring the entity's ability to monitor, audit, and terminate third-party arrangements when necessary. Supervisors are finding widespread deficiencies across all three requirements.
The ICT third-party register — a thorough inventory of all technology providers, the services they deliver, the criticality of those services, and the contractual terms governing the arrangement — is incomplete at most inspected institutions. Many organizations maintain partial inventories that cover major cloud providers and managed-service relationships but omit SaaS applications, data providers, and technology components embedded within larger vendor platforms. The register's incompleteness undermines the entity's ability to assess concentration risk, identify single points of failure, and plan for provider disruption.
Contractual compliance is another persistent finding. DORA specifies mandatory contractual provisions that must be included in agreements with ICT third-party providers, including audit rights, incident notification obligations, data-access guarantees, and exit-strategy provisions. Supervisors report that many existing contracts predate DORA and do not include the required provisions. Renegotiating contracts with major technology providers is a protracted process, and many financial entities have not completed the renegotiation cycle despite the regulation being enforceable since January 2025.
Concentration risk assessment — the evaluation of the financial entity's dependence on a small number of critical ICT providers — receives attention as a systemic-risk concern. Supervisors observe that the entire European financial sector's concentration on a handful of hyperscale cloud providers creates correlated risk that individual entity-level assessments do not adequately capture. The designation framework for critical ICT third-party providers under DORA Article 31 is expected to produce the first designations in 2026, subjecting designated providers to direct regulatory oversight by the European Supervisory Authorities.
Incident classification and reporting gaps
DORA's incident-reporting requirements mandate that financial entities classify ICT-related incidents according to defined criteria — including duration, geographic scope, number of affected clients, data integrity impact, and criticality of affected services — and report major incidents to their competent authority within specified timeframes. The initial reporting deadline is four hours for an initial notification, followed by intermediate and final reports at defined intervals.
Supervisors find that incident-classification processes are inconsistent across the sector. The classification criteria defined in the DORA Regulatory Technical Standards require organizations to evaluate incidents against multiple dimensions simultaneously, and the multi-dimensional assessment challenges organizations that previously classified incidents using simpler severity scales. Several supervised entities have been cited for underclassifying incidents — applying severity ratings that result in non-reporting when the incident's actual characteristics meet the major-incident threshold.
The four-hour initial notification timeline has proven operationally challenging. Organizations with 24/7 security operations centers can generally meet the deadline, but smaller institutions with limited after-hours staffing struggle to detect, classify, and report incidents within the window. The challenge is compounded when the incident affects multiple regulatory jurisdictions, requiring parallel notifications to multiple competent authorities with potentially different reporting formats.
Incident taxonomy standardization across the financial sector remains a work in progress. The European Supervisory Authorities are refining the incident-reporting templates and taxonomy based on the first year's reporting experience, aiming to reduce interpretation ambiguity and improve cross-sector comparability of incident data. Financial entities should monitor the evolving guidance and update their classification procedures accordingly.
Digital operational resilience testing
DORA requires financial entities to implement a digital operational resilience testing program proportionate to their size and risk profile. All entities must conduct basic ICT testing including vulnerability assessments and scenario-based testing. Entities identified as significant must additionally conduct threat-led penetration testing (TLPT) at least every three years, using methodologies aligned with the TIBER-EU framework.
Supervisory findings indicate that basic resilience testing programs are generally in place but often lack the scope and depth that DORA requires. Vulnerability assessments that cover only internet-facing systems, scenario tests that address only a narrow set of threats, and testing programs that do not cover the entity's full ICT estate including third-party-provided services fall short of the regulation's requirements.
TLPT programs are at an earlier stage of maturity. The regulation requires that threat-led penetration tests simulate realistic attack scenarios based on current threat intelligence, conducted by qualified independent testers against the entity's live production environment. Many significant entities have not yet completed their first DORA-compliant TLPT, citing the complexity of procurement, scope definition, and operational-risk management for live-environment testing. The European Supervisory Authorities are working with national competent authorities to increase the supply of qualified TLPT providers and to harmonize testing standards across member states.
Testing results must feed back into the entity's ICT risk management framework, driving remediation of identified vulnerabilities and improvement of resilience capabilities. Supervisors are checking that this feedback loop is operational — that testing findings result in documented remediation actions, that remediation is tracked to completion, and that subsequent tests verify the effectiveness of remediation measures. The absence of a closed-loop testing-to-remediation process is a common finding.
Proportionality and smaller entity challenges
DORA's proportionality principle allows requirements to be applied with regard to the entity's size, nature, scale, and complexity. However, supervisors are interpreting proportionality narrowly: the principle permits simplification of processes and documentation, not exemption from substantive requirements. Smaller financial entities that assumed proportionality would excuse them from third-party risk management, incident reporting, or resilience testing are receiving corrective findings.
The compliance burden is particularly acute for smaller institutions that lack dedicated ICT risk management functions. Payment institutions, electronic money institutions, and smaller investment firms often operate with IT teams of fewer than ten people, for whom the documentation, process, and testing requirements of DORA represent a significant operational overhead. Industry associations have called for regulatory guidance that provides concrete examples of proportionate compliance for smaller entities, and the European Supervisory Authorities have indicated that such guidance is forthcoming.
Managed service providers that serve multiple smaller financial entities are positioning DORA compliance as a managed service, offering pre-built incident-classification workflows, third-party risk management tools, and resilience-testing programs that smaller entities can adopt without building internal capability from scratch. This approach follows the regulation's intent — the risk-management capability must exist, but it can be delivered through external support rather than internal headcount.
Recommended actions for financial entities
Review your ICT third-party register for completeness. Ensure that every technology provider — including SaaS applications, data feeds, and embedded technology components — is cataloged with accurate criticality assessments and contractual-compliance status. Initiate contract renegotiations for arrangements missing DORA-mandated provisions.
Validate your incident-classification process against the DORA Regulatory Technical Standards. Conduct tabletop exercises simulating incidents at different severity levels and verify that your classification produces the correct regulatory-reporting outcome. Test the four-hour notification timeline under realistic conditions including after-hours scenarios.
Assess your digital operational resilience testing program's scope and depth against DORA requirements. Ensure that testing covers the full ICT estate, includes scenario-based testing informed by current threat intelligence, and feeds findings back into remediation processes with tracking and verification.
If you are a significant entity that has not yet completed a DORA-compliant TLPT, begin procurement and planning immediately. The three-year TLPT cycle means that delays now will create compliance gaps that are difficult to recover from later.
Forward analysis
DORA's first enforcement wave confirms that the regulation is being implemented and enforced with seriousness. Financial entities that treated DORA as a paper-compliance exercise are discovering that supervisors assess operational capability, not just documentation. The findings reinforce a message that applies to all regulatory compliance: the value of a governance framework lies in its operational effectiveness, not in the quality of the policy documents sitting on the compliance team's shelf.
The regulatory trajectory is toward increased scrutiny as supervisory experience accumulates and enforcement maturity develops. Financial entities that achieve genuine operational resilience — not just documented compliance — will be better positioned for both regulatory relationships and real-world ICT disruptions. The investment in operational capability pays dividends in both contexts.