The six pillars of digital operational resilience
DORA establishes uniform requirements for ICT security across all EU financial entities. Here's what you need to implement.
ICT Risk Management
Governance framework for identifying and managing ICT-related risks
REQUIREMENTS
- Establish an ICT risk management framework approved by management body
- Implement strategies, policies, and procedures for ICT security
- Continuously identify and classify ICT assets and dependencies
- Conduct regular risk assessments and document findings
- Define detection, response, and recovery capabilities
- Establish communication plans for ICT incidents
Incident Reporting
Standardized classification and reporting of ICT-related incidents
REQUIREMENTS
- Classify incidents using standardized criteria (clients affected, duration, geographic spread)
- Submit initial notification within 4 hours of classification
- Provide intermediate report within 72 hours
- Submit final report within one month of incident resolution
- Maintain incident management and response procedures
- Document root cause analysis for all major incidents
Resilience Testing
Regular testing to validate operational resilience capabilities
REQUIREMENTS
- Establish a digital operational resilience testing program
- Conduct vulnerability assessments at least annually
- Perform penetration testing based on threat scenarios
- Test ICT systems supporting critical functions
- Address all findings through prioritized remediation
- Significant entities must conduct TLPT (Threat-Led Penetration Testing) every 3 years
Third-Party Risk
Due diligence and monitoring of ICT service providers
REQUIREMENTS
- Maintain a register of all ICT third-party service providers
- Conduct pre-contract due diligence on security capabilities
- Include mandatory contractual provisions (audit rights, exit strategies, data location)
- Monitor concentration risk across providers
- Assess sub-outsourcing arrangements
- Establish exit strategies for all critical providers
Information Sharing
Voluntary cyber threat intelligence arrangements
REQUIREMENTS
- Establish arrangements for sharing cyber threat information
- Participate in trusted information-sharing communities
- Share indicators of compromise, tactics, and procedures
- Protect sensitive information during sharing
- Ensure sharing arrangements comply with competition law
Business Continuity
ICT continuity plans and disaster recovery procedures
REQUIREMENTS
- Develop comprehensive ICT business continuity policy
- Implement backup policies and recovery procedures
- Establish redundancy for critical ICT systems
- Test continuity plans at least annually
- Define recovery time and point objectives (RTO/RPO)
- Document crisis management and communication procedures
Who must comply?
DORA applies to 21 types of financial entities and their critical ICT providers.
Banking & Credit
- Credit institutions
- Payment institutions
- E-money institutions
- Account information providers
Investment
- Investment firms
- Fund managers (UCITS, AIFM)
- Trading venues
- Central securities depositories
Insurance & Pension
- Insurance undertakings
- Reinsurance undertakings
- Insurance intermediaries
- Pension funds (IORPs)
Crypto & Crowdfunding
- Crypto-asset service providers
- Issuers of asset-referenced tokens
- Crowdfunding service providers
Market Infrastructure
- Central counterparties (CCPs)
- Trade repositories
- Securitization repositories
- Credit rating agencies
ICT Providers
- Critical ICT third-party providers
- Cloud service providers (if critical)
- Data analytics providers (if critical)
Non-compliance penalties
Assess your readiness
Understand where you stand against these requirements and get a roadmap to compliance.
Need help with software testing?
BetterQA provides independent QA services with 50+ engineers across manual testing, automation, security audits, and performance testing.