← Back to all briefings
Compliance 5 min read Published Updated Credibility 89/100

EU Dora Official Journal Publication

DORA was published in the EU Official Journal. Financial entities have until January 17, 2025 to comply with digital operational resilience requirements including ICT risk management, incident reporting, and third-party risk oversight.

Editorially reviewed for factual accuracy

Compliance pillar illustration for Zeph Tech briefings
Compliance controls, audit, and evidence briefings

On 27 December 2022 the EU Digital Operational Resilience Act (DORA) was published in the Official Journal (Regulation (EU) 2022/2554), triggering a 24-month setup period ahead of the 17 January 2025 application date. DORA sets up a harmonized ICT risk management framework for financial entities—including banks, insurers, investment firms, payment institutions, and critical ICT service providers—covering governance, incident reporting, testing, third-party risk, and threat intelligence. Firms must align operating models, control frameworks, and outcome testing to meet the regulation’s prescriptive requirements.

Scope and governance

DORA applies to a broad range of financial entities and designates critical ICT third-party service providers (CTPPs) subject to direct European Supervisory Authority (ESA) oversight. Key governance obligations include:

  • Board responsibility for ICT risk management, strategy approval, and oversight.
  • Establishing risk management frameworks covering identification, protection, detection, response, and recovery.
  • Adopting ICT security policies, business continuity, and disaster recovery plans with periodic testing.
  • Maintaining incident response processes aligned with ESA technical standards.

Boards must receive regular reporting on ICT risk, incidents, testing outcomes, and third-party performance.

ICT risk management requirements

Firms must implement controls across:

  • ICT risk identification: Asset inventories, risk assessments, dependency mapping, and risk appetite statements.
  • Protection and prevention: Security policies, access controls, encryption, vulnerability management, and secure development lifecycle.
  • Detection: Monitoring, logging, and anomaly detection with defined thresholds.
  • Response and recovery: Incident response plans, communication strategies, backup and recovery testing, and crisis management.
  • Learning and evolving: Post-incident reviews, lessons learned, and continuous improvement.

Outcome testing should evidence control effectiveness, such as reduced incident impact, faster recovery times, and improved detection rates.

Incident reporting and information sharing

DORA standardizes incident classification and reporting through ESA technical standards. Financial entities must:

  • Classify incidents based on criteria (service downtime, client impact, data breaches) and notify competent authorities.
  • Submit initial, intermediate, and final reports within specified timelines.
  • Participate in threat intelligence sharing arrangements and consider voluntary sharing with peers.

Firms must ensure incident response teams, communication plans, and reporting tools meet DORA requirements.

Digital operational resilience testing

DORA requires regular testing, including:

  • Basic testing (vulnerability assessments, penetration testing, scenario-based tests) for all financial entities.
  • Advanced Threat-Led Penetration Testing (TLPT) at least every three years for significant entities, aligned with TIBER-EU.
  • Testing of business continuity and disaster recovery, including participation in industry-wide exercises.

Outcome testing must document findings, remediation actions, and retesting results. Entities should maintain testing registers and report outcomes to senior management and regulators.

Third-party risk management

Firms must maintain a full register of ICT third-party arrangements, perform due diligence, and ensure contracts include mandatory clauses (service levels, security requirements, audit rights, exit strategies). Critical ICT third-party providers will be overseen by ESAs, and financial entities must cooperate with regulators during inspections.

Outcome metrics should track supplier performance, incident rates, and compliance with contractual obligations.

Information sharing and threat intelligence

DORA encourages participation in threat intelligence communities, with safeguards for confidentiality. Firms should establish governance for sharing indicators of compromise, tactics, techniques, and procedures (TTPs), and integrate intelligence into detection and response workflows.

How to implement this

  1. 2023: Conduct gap analyzes, establish DORA program governance, and align with ESA rulemaking timelines.
  2. 2024: Implement control improvements, update third-party contracts, and prepare for TLPT scoping.
  3. 2025: finalize compliance documentation, execute required tests, and ensure readiness for supervisory assessments.

Documentation

This brief guides financial institutions through DORA setup, aligning governance, testing, and third-party oversight to show operational resilience by the 2025 go-live.

Supervisory engagement strategy

Firms should prepare for active supervision by ESAs and national competent authorities. This involves designating regulatory liaisons, maintaining evidence repositories, and conducting mock supervisory reviews. Documenting decision logs, board minutes, and remediation plans ensures responses to information requests are timely. Firms operating across multiple jurisdictions should coordinate messaging to avoid inconsistencies.

Outcome testing can include dry-run supervisory meetings, benchmarking readiness scores, and tracking closure of regulator feedback.

Integration with broader resilience initiatives

DORA matches existing frameworks such as the ECB Cyber Resilience Oversight Expectations (CROE) and the UK’s operational resilience regime for cross-border firms. Financial institutions should map DORA controls to existing programs, identifying benefits and gaps. Establishing a unified resilience taxonomy can simplify reporting, testing, and board oversight. Firms should also coordinate DORA setup with CSRD sustainability disclosures and NIS2 obligations to ensure consistent risk narratives.

Change management and culture

Embedding DORA requires cultural change. Firms should develop communication campaigns explaining why digital resilience matters, establish communities of practice, and recognize teams that contribute to resilience improvements. Incorporating DORA objectives into performance evaluations and incentives reinforces accountability.

Data architecture readiness

Meeting DORA’s reporting and testing obligations depends on high-quality data. Firms should assess whether current data lakes, SIEM platforms, and configuration databases can produce the required metrics. Implementing data lineage tools helps trace how resilience metrics are derived, supporting auditability. Teams may need to harmonize taxonomies across risk, security, and continuity functions to avoid inconsistent reporting.

Outcome testing should validate that dashboards pull from authoritative sources and that manual interventions are minimized. Regular data quality reviews—covering completeness, accuracy, and timeliness—should feed into governance forums.

Firms should align employee training with DORA roles, ensuring first-line operations teams, incident responders, and third-party managers understand new obligations. Training metrics and competency assessments should be recorded to show readiness during supervisory reviews.

Boards should request heat maps highlighting critical ICT dependencies and residual risks, enabling strategic oversight and investment prioritization.

Internal audit should validate setup milestones annually, providing assurance to the board and regulators.

Cross-functional steering committees should review resilience KPIs monthly to maintain progress.

External assurance over key resilience processes can provide additional comfort to supervisors.

Independent scenario exercises can validate cross-entity coordination under severe disruption conditions.

Teams can benchmark maturity against industry utilities to gauge readiness.

Regular stakeholder forums with ICT providers can surface systemic risks early.

Continuous improvement logs should document all remediation actions.

Continue in the Compliance pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Coverage intelligence

Published
Coverage pillar
Compliance
Source credibility
89/100 — high confidence
Topics
EU DORA setup · ICT risk management · Operational resilience testing · Third-party oversight
Sources cited
3 sources (eur-lex.europa.eu, esma.europa.eu, iso.org)
Reading time
5 min

Documentation

  1. Regulation (EU) 2022/2554 on digital operational resilience for the financial sector — Official Journal of the European Union
  2. EU publishes Digital Operational Resilience Act — European Securities and Markets Authority
  3. ISO 37301:2021 — Compliance Management Systems — International Organization for Standardization
  • EU DORA setup
  • ICT risk management
  • Operational resilience testing
  • Third-party oversight
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.