DORA
ICT risk, resilience testing, and incident reporting for EU financial entities
The Digital Operational Resilience Act (Regulation EU 2022/2554) applies to banks, insurers, investment firms, crypto-asset providers, and their critical ICT third parties. Run DORA assessments, coordinate threat-led penetration testing, log major ICT incidents, and produce supervisory-ready evidence from one platform.
No credit card required. Free plan available forever.
DORA in context: a single resilience regime across EU financial services
The Digital Operational Resilience Act (Regulation EU 2022/2554) entered into force in January 2023 and has applied since 17 January 2025. It consolidates the operational resilience expectations of banks, insurers, investment firms, payment institutions, crypto-asset service providers, and their critical ICT third parties into one regulation with directly applicable rules. DORA replaces the patchwork of guidance previously issued by the European Supervisory Authorities (EBA, EIOPA, and ESMA) and is supported by a set of regulatory technical standards (RTS) and implementing technical standards (ITS) that spell out the detail.
The regulation sits across five operating pillars: ICT risk management, ICT-related incident management and reporting, digital operational resilience testing, ICT third-party risk management, and information sharing arrangements. DORA assumes proportionality, so the depth of testing, the reporting cadence, and the inclusion in TLPT scale with the size and systemic relevance of the entity, but every entity in scope owns the same five pillars. For matters DORA covers, DORA is the lex specialis for financial entities; outside those matters the wider NIS2 Directive still applies, which is why most groups end up running both frameworks against a single evidence pack.
Who is in scope, and where third parties sit
The scope is wide. DORA applies directly to financial entities and indirectly to the ICT third parties they rely on. Critical ICT third-party service providers can also be brought under direct oversight by the European Supervisory Authorities, which means cloud platforms, managed service providers, and software vendors supporting critical functions face their own assessments and audits.
Banks and credit institutions
CRD-authorised credit institutions of any size, including building societies and significant cross-border banks supervised under the SSM. The proportionality regime softens some testing and reporting cadences for smaller firms but every credit institution sits inside the regulation.
Investment firms, asset managers, and trading venues
MiFID investment firms, UCITS management companies, AIFMs, central counterparties, central securities depositories, and trading venues. Resilience testing expectations and TLPT inclusion depend on size, complexity, and systemic relevance.
Insurance and reinsurance undertakings, IORPs
Solvency II insurers, reinsurers, and intermediaries plus institutions for occupational retirement provision. ICT third-party concentration is a particular focus for life and pension portfolios where long-running policy systems sit on a small set of providers.
Crypto-asset service providers and EMI/PI
MiCA-authorised crypto-asset service providers, e-money institutions, and payment institutions. DORA aligns the operational resilience expectations across digital-finance entities that previously had fragmented requirements.
Critical ICT third-party service providers
Cloud platforms, software providers, managed service providers, and data analytics firms designated as critical by the European Supervisory Authorities sit under direct DORA oversight and must support the assessments and audits their financial-entity customers run.
Pillar 1: building an ICT risk management framework that holds up
Articles 5 to 16 set the bar for the ICT risk management framework. The supervisor expects a documented framework approved at board level, an asset register that maps systems and data to the business services they support, and a treatment plan for every identified risk. The framework is reviewed at least annually and after every major incident, with traceable updates feeding back into governance.
- Asset register covering ICT systems, data, network, and the business services they support, with classification and dependency mapping
- Identification and assessment of ICT risk linked to the asset register, the threat landscape, and inherent and residual ratings
- Protection and prevention controls including access management, encryption, secure development, network segregation, and patching cadence
- Detection capability covering logging, monitoring, anomaly detection, and integrity verification across critical systems
- Response and recovery covering incident response runbooks, business continuity, ICT disaster recovery, and tested fallback solutions
- Backup, restoration, and learning loop with periodic review of the framework, incident lessons learned, and board-level oversight
Pillar 2: classifying and reporting ICT-related incidents
Articles 17 to 23 require every financial entity to detect, log, classify, and report major ICT-related incidents to the competent authority. The DORA RTS on classification sets the criteria, and entities must apply them consistently with documented evidence. A well-run incident workflow links the technical detection record to the impact assessment, the supervisor reports, and the remediation backlog so the same data tells the same story across all of those audiences.
- Number of clients or financial counterparts affected and whether the impact crosses borders
- Reputational impact assessed on a defined scale, including media coverage and supervisory dialogue
- Duration and service downtime measured against recovery time objectives for the affected critical or important function
- Data losses, including confidentiality, integrity, and availability impact, with the volume and sensitivity of data noted
- Geographical spread covering the Member States and third countries where customers, counterparties, or services were affected
- Economic impact measured by direct and indirect losses, including remediation costs and missed transactions
- Criticality of the affected service, which weights all of the above when classifying as a major ICT-related incident
The reporting clock: initial, intermediate, and final
Once an incident is classified as major, the entity must follow the supervisor template and timeline for initial, intermediate, and final reports. A clean workflow keeps the classification, the report drafts, and the post-incident actions linked together so nothing has to be reassembled at the deadline.
- Initial notification to the competent authority within the deadlines set out in the DORA RTS once a major ICT-related incident is classified
- Intermediate report providing updates on impact, containment progress, and recovery work as the incident evolves
- Final report covering root cause, remediation, lessons learned, and feedback into the ICT risk management framework
- Voluntary notification of significant cyber threats with sufficient detail for the supervisor to share intelligence across the sector
For the operational side of incident management beyond DORA reporting, the incident response workflow covers triage, containment, recovery, and post-incident reporting in the same platform so the technical record and the supervisor record stay in sync.
Pillar 3: digital operational resilience testing as a programme
Articles 24 to 27 frame testing as a continuous programme rather than a single annual engagement. Vulnerability assessments, scenario tests, penetration tests, and source code reviews are all required where they are proportionate to the entity. The supervisor expects a documented test plan, defensible scoping, evidence per test, and a remediation track that closes findings on a documented timeline.
Annual baseline testing
All financial entities run an annual programme of vulnerability assessments, network security assessments, gap analysis against the framework, source code reviews where in-house code supports a critical function, and scenario-based tests of incident response and recovery. Capture scope, ruleset, results, remediation, and re-test evidence per cycle.
Penetration testing on critical functions
Penetration tests are required on systems and applications supporting critical or important functions. The depth and cadence are proportionate to the firm and the system, but the supervisor expects a defensible test plan, scoping rationale, and remediation tracking that closes findings on a documented timeline.
Threat-led penetration testing (TLPT)
Significant credit institutions and other entities designated by the competent authority run TLPT at least every three years, aligned to the TIBER-EU framework. TLPT is a full red team operation against live production with dedicated threat intelligence, controlled access, and a structured replay phase with the blue team.
Continuous coverage between cycles
DORA expects continuous detection and a programme of testing rather than a single annual report. Schedule scans, retain raw output, link each scan run to an asset and a control, and track trend over the period so the supervisor sees coverage rather than a snapshot.
The penetration testing workflow and the vulnerability assessment workflow are designed for this kind of programme: scope, log findings against assets, track remediation against deadlines, and re-test before closure.
TLPT: threat-led penetration testing aligned to TIBER-EU
Threat-led penetration testing is the most demanding part of the DORA testing regime. In scope entities run TLPT at least every three years, on live production systems supporting critical or important functions, with bespoke threat intelligence, a controlled red team, and a joint replay with the blue team. The TIBER-EU framework provides the methodology the European Central Bank and national competent authorities use to standardise the work, and the DORA regulatory technical standards on TLPT explicitly reference TIBER-EU as the reference framework.
- Scope the engagement against critical or important functions, document the rationale for inclusion, and obtain board sign-off
- Commission a threat intelligence provider to produce a targeted threat landscape and bespoke threat scenarios for the firm
- Run a full red team operation against live production systems with controlled access, white team oversight, and blue team unaware of the test
- Conduct the replay phase where the red team walks the blue team through the attack path so detection gaps are identified jointly
- Produce the test report, the remediation plan, and the joint attestation signed by the firm, the testers, and the threat intelligence provider
- Submit the attestation to the competent authority, log every artefact, and feed lessons learned back into the ICT risk management framework
Tagging every TLPT finding by tactic and technique tightens the report and the replay conversation. The MITRE ATT&CK framework page covers how to tag findings end-to-end, the threat-led penetration testing workflow covers the end-to-end TLPT cycle (scoping, threat intelligence, red team, replay, joint attestation) on a single engagement record, and the red teaming workflow keeps the timeline, attack paths, and operator notes structured rather than buried in chat history.
Pillar 4: ICT third-party risk and the contractual register
Articles 28 to 44 require every financial entity to maintain a register of ICT third-party arrangements and to manage concentration risk, exit strategies, and sub-outsourcing. The register is reported to the competent authority and underpins the oversight of critical ICT third-party providers. Treat the register as a live record rather than an annual export, with assessments, incidents, and remediation linked to the provider entry they affect.
- Provider name, legal entity, registration identifier, and group structure including any sub-contracting chain that delivers part of the service
- Function or service supported and a clear flag for whether it underpins a critical or important function
- Contract metadata including start and end dates, notice periods, governing law, audit rights, and exit clauses
- Data categories processed, location of processing and storage, and the legal basis for any data transfer outside the EEA
- Risk assessment, due diligence outcome, contingency plan, and exit strategy with a tested fallback for critical providers
- Concentration view across the firm and group level so the supervisor can see exposure to a single provider or a small set of providers
- Incident history per provider, including supplier-reported incidents and incidents detected by the firm involving the provider
Evidence the supervisor (and your board) actually want
Resilience programmes that fail review usually fail because the artifacts are scattered across drives, ticket systems, and screenshots. Build the evidence pack as the work happens, retain raw scanner output and test reports alongside the summary, and tie every artefact back to an article, an asset, and an owner. The supervisor narrative writes itself when the underlying record is consistent.
- ICT risk management framework document, board approval record, and the annual review minutes
- Asset register and dependency map with each critical or important function traced back to the supporting ICT assets
- Test plan, raw scanner output, penetration test report, and re-test evidence per cycle
- TLPT scope document, threat intelligence brief, red team report, replay notes, and joint attestation
- Major incident classification record, initial, intermediate, and final supervisor reports, and post-incident review
- ICT third-party register, contract evidence, exit strategies, and concentration analysis at firm and group level
- Continuous monitoring records covering scan cadence, alerting effectiveness, and trend over the assessment window
- Board reporting pack covering the resilience programme, open findings, remediation status, and supervisory engagements
Where SecPortal fits in the DORA workflow
SecPortal is the operating layer for the resilience programme, not a replacement for the board, the competent authority, or the testers. The platform handles scope, scans, findings, control mapping, incident records, the third-party register, and the assessor-ready output, so the work runs as a structured workflow rather than a long email thread. Compliance tracking covers DORA alongside the other frameworks the same firm has to satisfy, including ISO 27001, SOC 2, NIST 800-53, NIS2, the SWIFT Customer Security Programme for the SWIFT-related infrastructure that most in-scope financial entities also operate, and the EU Cyber Resilience Act for the products with digital elements that financial entities procure and rely on under the third-party risk regime.
- Compliance tracking that maps every finding to DORA articles alongside ISO 27001, SOC 2, NIST 800-53, and PCI DSS for entities under multiple regimes
- Engagement management for vulnerability assessments, penetration tests, scenario-based exercises, and TLPT, with scope, status, and re-test all on one record
- Findings management with CVSS 3.1 scoring, 300+ templates, and Nessus or Burp Suite imports so existing tooling feeds the same workflow
- 16-module external scanning and 17-module authenticated scanning to cover boundary, configuration, and authenticated weakness evidence between manual tests
- Continuous monitoring with scheduled scans (daily, weekly, monthly) so supervisors see coverage rather than a single snapshot
- AI report generation that turns ICT risk findings, test results, and remediation actions into board and supervisor-ready narratives without a manual rewrite
DORA is a multi-year programme, not a one-off project. The first year of application focuses on the framework, the register, and the testing programme baseline. Subsequent years tighten the evidence trail, expand TLPT coverage where firms grow into scope, and deepen the integration between supplier oversight and incident management. Running the work as a managed workflow pays off most over time: historical findings, classified incidents, supplier records, and remediation timelines stay linked, so each supervisory review is a refresh rather than a rebuild. For consultants delivering DORA work to multiple clients, the security consultants workspace bundles that with branded client portals and AI report generation, so the deliverable looks as polished as the work behind it.
For programmes that want continuous detection and trend evidence between manual tests, the continuous monitoring capability and external scanning capability produce the cadence and coverage record DORA testing programmes are expected to keep.
Key control areas
SecPortal helps you track and manage compliance across these domains.
ICT risk management framework (Articles 5 to 16)
Document the ICT risk management framework, asset register, classification, dependency mapping, and protection and prevention controls. Tie every confirmed vulnerability finding to an ICT asset, a business service, and a treatment plan with an accountable owner.
ICT-related incident management (Articles 17 to 23)
Capture ICT incidents from detection through classification, root cause analysis, and post-incident review. Apply the major-incident classification criteria from the DORA RTS (clients affected, data losses, duration, geographical spread) and produce the initial, intermediate, and final reports on the supervisor template.
Digital operational resilience testing (Articles 24 to 27)
Run a proportionate testing programme covering vulnerability assessments, scenario-based tests, penetration testing, and source code reviews. Track scope, results, remediation, and re-test for each cycle so the supervisor can see continuous coverage rather than a single annual snapshot.
Threat-led penetration testing or TLPT (Articles 26 to 27)
Coordinate TLPT engagements aligned to TIBER-EU at least every three years for in-scope firms. Manage scoping, threat intelligence input, red team execution, blue team observations, replay, and the joint board summary, with the full attestation pack retained as evidence.
ICT third-party risk and concentration (Articles 28 to 44)
Maintain the contractual register of ICT third-party arrangements, classify providers supporting critical or important functions, and track concentration risk, exit strategies, and sub-outsourcing chains. Link supplier-side findings, assessments, and incidents to the register entry they belong to.
Information sharing and oversight readiness (Articles 45 to 49)
Capture intelligence sharing arrangements, oversight engagement records for critical ICT third parties, and the lessons-learned actions feeding back into the ICT risk management framework. Keep a defensible audit trail for supervisory dialogue.
Related features
Run a defensible DORA programme without spreadsheets
Bring ICT risk, TLPT, incident reporting, and the third-party register into one workflow. Start free.
No credit card required. Free plan available forever.