DORA's 5 pillars — what the regulation requires in practice
DORA is not a single obligation — it is a framework of five interconnected requirements designed to ensure that every financial entity operating in the EU can withstand, respond to, and recover from ICT (Information and Communication Technology) disruptions. Each pillar imposes specific, documented deliverables.
Where most financial organizations have existing controls in areas like ICT risk management and incident response, DORA demands a significantly higher level of documentation, testing rigor, and third-party oversight than previous frameworks. The gap between "we have processes" and "we are DORA-compliant" is frequently larger than organizations expect — and closing it before a supervisory inspection is essential.

ICT Risk Management
Requirements for Information & Communication Technology (ICT) risk management.

ICT Incident Reporting
Reporting requirements of major ICT-related incidents to the competent authorities;
.
Information Sharing
Information and Intelligence sharing in relation to cyber threats and vulnerabilities.

Digital Operational Resilience Testing
Requirements for Advanced testing of ICT tools, systems and processes based on Threat-Led Penetration Testing (TLPT).

ICT third-party Risk Management
Requirements for ICT third-party Risk Management.
ICT incident classification and reporting timelines under DORA
Not every ICT incident triggers a DORA reporting obligation — but misclassifying a major incident as non-reportable is itself a compliance failure. DORA establishes specific criteria for what constitutes a "major incident" requiring mandatory notification.
Classification depends on a set of impact criteria set by the European Supervisory Authorities — covering the number of clients affected, duration of disruption, data loss, criticality of affected services, geographic spread, and financial impact. Cyber-Management builds classification frameworks and decision trees into your incident response procedures so your team can make the right call quickly, under pressure.
Major ICT incident
Mandatory reporting to competent authority
An incident that has a significant adverse impact on the availability, authenticity, integrity, or confidentiality of network and information systems — assessed against specific impact thresholds set by ESA technical standards.
Reporting timeline:
Significant cyber threat
Voluntary notification encouraged
A cyber threat that, if materialized, could cause a major ICT incident. Financial entities are encouraged to voluntarily notify their competent authority of significant threats — even where no actual disruption has occurred.
Where a significant threat could affect clients, entities must also inform those clients of protective measures they can take — creating a customer communication obligation.
Cyber-Management provides pre-built incident classification templates, escalation procedures, and regulatory notification drafts — so when an incident occurs, your team is not constructing a response from scratch against a 4-hour deadline.
Resilience testing and third-party ICT risk — DORA's two most demanding requirements
Threat-Led Penetration Testing (TLPT)
TLPT is not a standard penetration test. It is a controlled, intelligence-led simulation of a real attack against your live production systems — conducted by approved external testers using tactics, techniques, and procedures derived from real threat intelligence relevant to your entity.
TLPT is mandatory every three years for significant financial entities identified by competent authorities. It must cover at minimum the critical functions identified in your ICT risk management framework, and must involve your critical ICT third-party providers where they support those functions.
ICT third-party service provider register
Every financial entity must maintain a complete, up-to-date register of all ICT third-party service providers — from cloud platforms and SaaS tools to managed security services and payment processors.
For each provider, the register must document the services provided, the criticality classification, data locations, sub-contractor dependencies, and contractual exit provisions. Critical ICT third-party providers face direct oversight by the relevant European Supervisory Authority.
The contractual requirements for critical providers are extensive — covering data access rights for competent authorities, audit rights, incident notification obligations, and business continuity commitments. Cyber-Management reviews your existing ICT contracts and identifies the gaps against DORA's Article 30 mandatory provisions.
What your ICT third-party register must include
DORA Article 28(3) requires financial entities to maintain a register of information on all contractual arrangements with ICT third-party service providers. At minimum, each entry must capture:
Provider name & registered address
Services provided & ICT systems supported
Criticality classification
Data storage & processing locations
Sub-contractor dependencies
Contract start / end dates
Audit and inspection rights
Exit and transition plan provisions
How DORA fits with ISO 27001, NIS2, and existing financial regulations
DORA was explicitly designed to complement — not duplicate — existing regulatory frameworks. However, it imposes a higher level of specificity and testing rigor than any predecessor framework.
| Framework | Relationship with DORA | What DORA adds beyond it |
|---|---|---|
| ISO 27001 | ISO 27001 covers the ICT risk management, incident management, and access control foundations that underpin DORA's requirements. A certified ISMS satisfies approximately 45–60% of DORA's obligations | ISO 27001 covers the ICT risk management, incident management, and access control foundations that underpin DORA's requirements. A certified ISMS satisfies approximately 45–60% of DORA's obligations |
| NIS2 | Financial entities subject to DORA are generally exempt from NIS2 for their financial services activities — DORA is the lex specialis for the financial sector. However, where a financial entity also operates infrastructure covered by NIS2, both may apply | DORA's testing requirements (TLPT), third-party oversight framework, and financial-sector-specific incident classification criteria go significantly beyond NIS2's provisions |
| EBA / EIOPA / ESMA guidelines | DORA supersedes and consolidates previous ICT risk guidelines issued by EBA, EIOPA, and ESMA — replacing the patchwork of sector-specific ICT guidance with a single, directly applicable regulation | Directly applicable as an EU Regulation (no member state transposition required), broader scope including ICT third-party providers, and mandatory TLPT for significant entities |
| GDPR | DORA's incident reporting requirements and data security obligations overlap with GDPR Article 32's security measures and breach notification obligations — a single incident may trigger both DORA and GDPR reporting | DORA's incident reporting timelines are more demanding (4h initial vs GDPR's 72h). DORA adds specific resilience testing and third-party ICT requirements that go beyond GDPR's scope |
DORA enforcement — what non-compliance costs
DORA empowers competent authorities with significant supervisory and enforcement powers — going well beyond the ability to impose fines. The full range of remedial measures available makes proactive compliance far less costly than a supervisory intervention.
Financial entities — periodic penalty
1% / day
Up to 1% of average daily worldwide turnover per day, for each day of non-compliance following a binding supervisory instruction. Can run for up to six months.
Critical ICT third-party providers
€5M
Or up to 1% of average daily worldwide turnover — whichever is higher — for critical ICT third-party providers under direct EU supervisory oversight. Individual liability also possible for management.
Non-financial penalties
Broad
Binding instructions to remedy non-conformities. Public disclosure of violations. Temporary prohibition on offering services. Suspension of senior management. Mandatory external audit at entity's own cost.
The daily penalty structure is particularly significant — unlike a one-time fine, it accrues for each day an identified compliance failure persists after a supervisory instruction. For a financial entity with €50M annual turnover, a sustained 90-day period of non-compliance following a supervisory instruction could generate penalties exceeding €120,000. Our vCISO service → provides the ongoing governance oversight to prevent compliance gaps from escalating to this point.
Why DORA Compliance matters ?
Regulatory Requirement
Compliance with DORA is not optional; it is a legal necessity for financial entities operating within the EU. Ensuring compliance protects your business from regulatory penalties and legal issues.
Enhanced Cybersecurity
Implementing DORA requirements strengthens your overall cybersecurity posture, reducing the risk of breaches and operational disruptions.
Customer Trust
Demonstrating your commitment to digital resilience builds trust with your clients, enhancing your reputation in a competitive market.
Business Continuity
DORA compliance ensures that you have robust processes in place to maintain operations, even in the face of unexpected incidents.

DORA has been in force since January 2025 —
is your organization ready for supervisory review?
Book a free 25-minute scoping call. We will assess your current DORA compliance status, identify your highest-risk gaps, and outline a practical roadmap to a defensible compliance position.
Benefits of Partnering with Us
Expertise in Cybersecurity and Financial Sector
Expertise in Cybersecurity and Financial Sector
Our team consists of seasoned professionals with extensive experience within the Financial Industry.
Peace of Mind
Focus on your core business while we handle your data protection needs, ensuring compliance and reducing risk.
Regulatory Compliance
Stay ahead of the ever-changing landscape of data privacy regulations, minimizing the risk of penalties and reputational damage.
Enhanced Customer Trust
Demonstrating a commitment to data protection can strengthen your relationship with clients and stakeholders, enhancing your brand’s reputation.


