The Digital Operational Resilience Act (EU Regulation 2022/2554), known as DORA, has applied directly to EU financial entities since January 17, 2025. Unlike a directive, DORA is a regulation — it does not require national transposition and applies uniformly across all EU member states with immediate legal effect. This places DORA in a different category from NIS2: there is no implementation lag, no national variation in requirements, and no ambiguity about whether your organization is covered. The European Supervisory Authorities (EBA, ESMA, and EIOPA) published their final regulatory technical standards in early 2024, and national competent authorities began formal DORA supervisory activities in Q1 2025.

DORA fundamentally changes how financial entities must approach ICT risk. Where previous EU financial sector rules treated technology risk as a subset of operational risk, DORA elevates digital operational resilience to a standalone regulatory pillar with its own governance requirements, testing obligations, and supervisory regime. For many financial institutions, particularly those outside the largest tier, achieving DORA compliance requires a substantial uplift in ICT governance, third-party oversight, and operational resilience testing capabilities.

This guide covers the five DORA pillars, who must comply, the most commonly identified compliance gaps, and a practical 10-item compliance checklist you can use to assess your organization’s current posture.

1. The Five DORA Pillars

DORA organizes its requirements across five distinct pillars. Each pillar has its own chapter in the Regulation and associated regulatory technical standards (RTS) specifying detailed implementation requirements.

Pillar 1
ICT Risk Management
Chapters II and III require a comprehensive ICT risk management framework, including governance, risk identification, protection, detection, response, recovery, and learning functions. Management body oversight is mandatory.
Pillar 2
ICT-Related Incident Reporting
Chapter IV establishes classification criteria for “major” incidents and a three-stage reporting timeline to national competent authorities. Significant cyber threats must also be voluntarily notified.
Pillar 3
Digital Operational Resilience Testing
Chapter V requires all in-scope entities to conduct basic resilience testing annually, and significant entities to perform Threat-Led Penetration Testing (TLPT) at least every three years.
Pillar 4
ICT Third-Party Risk
Chapter VI mandates a third-party risk management framework, including a register of all ICT third-party providers, key contractual provisions, exit strategies, and ongoing monitoring of concentration risk.
Pillar 5
Information Sharing
Chapter VII encourages voluntary participation in cyber threat intelligence sharing arrangements. While voluntary, participation demonstrates a proactive security culture and supports regulatory relationship management.

ICT Risk Management in Detail

Pillar 1 is the foundation of the entire DORA framework. It requires entities to maintain a sound, comprehensive, and well-documented ICT risk management framework that is integral to the overall risk management system. The framework must identify all ICT assets and their dependencies, assess risks against the entity’s risk tolerance, implement protection and prevention measures, maintain detection capabilities, and define response and recovery procedures. Critically, the management body is personally responsible for approving the ICT risk management framework and bears ultimate accountability for ICT risk oversight. This mirrors NIS2’s Article 20 provisions and represents a significant shift for boards that have historically delegated technology risk entirely to the CTO or CISO function.

ICT Incident Reporting Timeline

DORA establishes a three-stage incident reporting process for major ICT-related incidents. The classification criteria for “major” incidents are defined in the RTS on incident classification and include thresholds based on number of clients affected, duration of service disruption, geographic spread, and data integrity impact.

Within 4 hours of classification — Initial Notification
Notify the competent authority as soon as the incident is classified as major. The initial notification must indicate whether the incident is suspected to be caused by unlawful or malicious action and whether it has cross-border impact.
Within 72 hours — Intermediate Report
Submit an updated assessment including the current status of the incident, severity assessment, available indicators of compromise, and the impact on financial services and clients. If the incident is resolved before 72 hours, include a final report instead.
Within one month of closure — Final Report
Provide a comprehensive account of the incident root cause, total impact (financial, reputational, client), remediation measures applied, lessons learned, and planned preventive actions. Cross-border impacts must be included where applicable.

2. Who Must Comply with DORA

DORA applies to a broad range of financial entities operating in the EU. The full scope is defined in Article 2(1) of the Regulation and covers both traditional and emerging financial services sectors.

Entity Type Scope
Credit institutions (banks) In Scope
Payment institutions In Scope
Investment firms In Scope
Insurance and reinsurance undertakings In Scope
Crypto-asset service providers (CASPs) In Scope
Central securities depositories In Scope
Trade repositories and data reporting service providers In Scope
Crowdfunding service providers In Scope
Electronic money institutions In Scope
Microenterprises (fewer than 10 employees, <€2M turnover) Simplified regime
Small non-interconnected investment firms Simplified regime

The Simplified Regime

DORA recognizes a proportionality principle, allowing smaller and less complex financial entities to apply a simplified ICT risk management framework under Articles 16 and 17. The simplified regime is specifically available for microenterprises and small non-interconnected investment firms. However, even entities on the simplified regime must maintain basic ICT risk management policies, perform incident detection and response, and apply the third-party risk provisions when using ICT providers that support critical or important functions. The simplified regime is narrower than many organizations assume — it does not eliminate the core DORA obligations.

Third-Country Branches: EU branches of non-EU financial entities are also subject to DORA requirements for their EU operations. The parent entity’s ICT risk management framework may be used if it is equivalent to DORA requirements, but equivalence must be documented and demonstrable to the competent authority.

3. Common DORA Compliance Gaps

The four most common critical gaps in DORA readiness assessments: TLPT program not established, incomplete third-party register, inadequate incident classification criteria, and no formal ICT concentration risk analysis.

Source: Skyhigh Cybersecurity Research — DORA readiness gap analysis, Q1 2026

Threat-Led Penetration Testing (TLPT)

TLPT is the most technically demanding DORA requirement and the one with the longest lead time to implement. DORA requires significant financial entities to conduct TLPT at least once every three years. Unlike standard penetration testing, TLPT must follow the TIBER-EU framework methodology, be threat intelligence-driven based on entity-specific threat actor profiles, target production systems (not test environments), involve certified testers, and produce remediation plans reviewed by the competent authority. Many organizations underestimate the organizational preparation required: establishing a TLPT governance structure, commissioning threat intelligence, scoping critical functions and systems, and securing board-level authorization for production system testing typically takes 6 to 12 months before testing can begin.

ICT Third-Party Register and Contractual Requirements

DORA requires entities to maintain a register of all ICT third-party providers supporting critical or important functions. Many organizations have informal vendor inventories that are incomplete, outdated, or not formally assessed against DORA’s criteria for criticality classification. Beyond the register, DORA specifies mandatory contractual provisions that must be included in all agreements with ICT providers supporting critical functions: service level descriptions, incident reporting obligations, audit rights, exit provisions, and subcontractor disclosure requirements. A significant proportion of existing vendor contracts predate DORA and lack these provisions, requiring renegotiation or amendment.

Incident Classification Criteria

A major operational gap is the absence of documented, pre-approved incident classification criteria that align with the DORA RTS thresholds. Organizations must be able to classify an incident as “major” and trigger the 4-hour initial notification within the notification window — which means the classification decision process must be automated or pre-delegated, not dependent on an emergency escalation to senior management. Many organizations have generic incident severity classifications (P1/P2/P3) that do not map to DORA’s specific criteria, creating uncertainty during an actual incident about whether and when to notify.

ICT Concentration Risk

Article 29 of DORA requires entities to identify and manage concentration risk arising from dependence on a limited number of ICT third-party providers or providers from a single geographic region. This includes assessing concentration at the individual entity level and, for groups, at the consolidated level. Few financial entities have conducted a formal concentration risk analysis that covers cloud service providers, software vendors, and other critical technology dependencies in the way DORA requires. The European Supervisory Authorities have indicated that concentration risk will be a supervisory priority.

Assess your DORA readiness in 5 minutes

Our free DORA readiness assessment covers all five pillars and generates an instant gap report with prioritized remediation actions for your team.

Take the Free DORA Assessment →

4. DORA Compliance Checklist

Use this 10-item checklist to evaluate your current DORA compliance posture. Each item reflects a mandatory requirement of the Regulation. For each item, your organization should be able to provide documented evidence — not just verbal confirmation — that the requirement is met.

Get your DORA compliance score now

Our free 5-minute DORA readiness assessment evaluates all five pillars and generates a personalized gap report with remediation priorities — no registration required for basic results.

Start the Free DORA Assessment →

Next Steps & Related Resources

Achieving DORA compliance is not a one-time project — it requires ongoing operational resilience capabilities including regular testing, continuous third-party monitoring, and a mature incident notification process. The most effective way to validate that your compliance posture actually works under pressure is through realistic tabletop exercises that simulate ICT incidents requiring regulatory notification decisions. Exercises that rehearse the 4-hour notification window, the incident classification decision process, and management body crisis communication surface procedural gaps that are impossible to identify through documentation review alone. The Skyhigh Cybersecurity platform includes DORA-mapped exercise scenarios for financial entities, covering ransomware, third-party ICT provider outages, and data integrity incidents that require DORA notification decision-making.

DORA Readiness Assessment →

Free 5-minute tool. Score all five DORA pillars instantly.

DORA Compliance Toolkit →

Tabletop scenarios, exercise templates, and gap mapping for DORA.

NIS2 Assessment Guide →

DORA and NIS2 overlap significantly — read the companion NIS2 guide.

ISO 27001 Gap Analysis →

ISO 27001 certification provides valuable evidence for DORA compliance.