Compliance Reading Time: 12 minutes

Your Guide to DORA Compliance 

Introduction to DORA

Cybercriminals are hitting financial institutions harder than ever, with cyber threats increasing at an alarming rate. According to IBM, in 2023, the average cost of a data breach in the financial industry was reported to be $5.90 million, and it surged to $6.90 million in 2024. On top of that, a report published by Trend Micro revealed that the banking sector ranked as the No. 1 industry for detected ransomware attacks in 2023. As financial institutions become more interconnected and reliant on digital infrastructure, the risks continue to grow. This evolving threat landscape made it clear that a stronger, standardized approach to cybersecurity and operational resilience is essential. That’s why DORA was introduced. 

The Digital Operational Resilience Act (DORA) is a European Union regulation that is designed to strengthen both the operational resilience and regulatory compliance of financial institutions against Information and Communication Technology (ICT) risks. Financial institutions rely heavily on ICT systems for their digital infrastructure, networks, and data management. However, if these systems are not managed effectively, they can become vulnerable entry points for cyber threats, operational failures, and third-party risks. A security breach or operational disruption could expose sensitive data, interrupt critical services, and ultimately jeopardize financial stability. 

To avoid this, DORA establishes a comprehensive framework for managing, mitigating, and reporting ICT-related incidents. This framework ensures that financial institutions not only meet regulatory requirements but are also well-equipped to withstand, respond to, and recover from cyber threats and operational disruptions. 

DORA provides clear and consistent rules for operational resilience across the EU, primarily focusing on: 

  • Mitigating the risks posed by increasing vulnerabilities due to the growing interconnectivity within the financial sector. 
  • Ensuring that dependencies on third-party service providers are effectively managed, safeguarding the stability and security of financial operations.
  • Addressing the new risks that arise from the growing use of digital financial services. 
  • Establishing a unified supervisory framework across the EU to ensure consistent oversight and resilience within the financial sector. 

Who Must Comply with DORA?

DORA applies to a broad range of financial entities, including banks, insurance companies, investment firms, payment service providers, crypto-asset service providers, and ICT service providers that support these financial institutions.  

As of January 2025, Article 2 of the DORA regulation specifies the following 21 categories of in-scope entities:   

  1. Credit institutions 
  2. Payment institutions, including those exempted under the Directive (EU) 2015/2366
  3. Account information service providers  
  4. All electronic money institutions  
  5. Investment firms  
  6. Crypto asset service providers  
  7. Central securities depositories  
  8. Central counterparties  
  9. Trading venues  
  10. Trade repositories  
  11. Alternative investment fund managers  
  12. Management companies  
  13. Data reporting service providers  
  14. Insurance and reinsurance undertakings  
  15. Insurance intermediaries, reinsurance intermediaries, and ancillary insurance intermediaries  
  16. Institutions for Occupational Retirement Provision  
  17. Credit rating agencies  
  18. Administrators of critical benchmarks
  19. Crowdfunding service providers  
  20. Securitization repositories  
  21. ICT third-party service providers 

Notably, DORA’s scope extends beyond traditional financial entities to include Information and Communication Technology (ICT) third-party service providers. These are firms that offer digital services to financial institutions, such as cloud service providers, software vendors, data analytics companies, and managed service providers. The inclusion of these service providers highlights the critical role they play in the infrastructure of the financial sector and the risks that come with dependency on them. 

Under DORA, ICT third-party service providers must:  

  • Cooperate with financial entities for regular resilience testing.
  • Notify the financial entities about any ICT-related incidents or disruptions.
  • Maintain business continuity plans to ensure service delivery during unforeseen events.
  • Comply with EU privacy and confidentiality requirements to protect sensitive data.

By encompassing both financial institutions and their critical ICT service providers, DORA aims to create a strong and unified approach to operational resilience across the EU’s financial sector.  

DORA Timeline

DORA was first proposed on September 24, 2020, and later approved by the European Parliament and Council on November 24, 2022. It was officially published in the EU Journal on December 27, 2022, and came into effect on January 16, 2023. Financial entities and third-party service providers were given two years to familiarize themselves with DORA’s requirements and achieve compliance before full enforcement began on January 17, 2025. 

Now that the deadline has passed, organizations must ensure that they are fully compliant with DORA’s requirements, conduct regular resilience testing, and continuously monitor their ICT risk management frameworks to avoid penalties and operational disruptions.  

Core Pillars of DORA

DORA is built on five key pillars that strengthen the digital resilience of financial institutions, and they are: 

  1. ICT Risk Management

    As outlined in Chapter II, ICT Risk Management is a fundamental pillar of DORA. It ensures that financial entities take a structured and proactive approach to identify, assess, and mitigate technology-related risks. By enforcing continuous monitoring, timely risk assessments, and adaptive response strategies, DORA enhances resilience against cyber threats and operational disruptions.

    Financial institutions must implement the following measures to enhance ICT risk management:

    • Set up a dedicated ICT risk management team to oversee risks, monitor service providers, document risk exposure, and regularly assess ICT-related dependencies.
    • Implement real-time threat detection, continuity planning, and recovery measures to ensure swift incident response.
    • Strengthen digital resilience by identifying vulnerabilities and cyber threats, reviewing past incidents to determine root causes, and implementing necessary improvements.
    • Have a structured crisis communication plan to ensure clear internal coordination and timely external notifications in case of disruptions.

  2. ICT-Related Incident Reporting

    Chapter III, ICT-related incident management, classification, and reporting, lays out a standardized approach for detecting, classifying, and reporting ICT incidents, ensuring financial institutions stay ahead of potential threats.

    Under DORA, financial entities need structured processes to track incidents, assess their impact, and notify the right people—both internally and externally. Internally, that means quickly identifying issues and keeping all relevant teams updated. Externally, it involves timely reporting to regulators and, in cases like data breaches, notifying affected customers.

    To comply with DORA, financial institutions must adhere to the following guidelines:

    • Establish a structured process for detecting, managing, and reporting ICT incidents, including logging all ICT incidents and major cyber threats for tracking and future analysis.
    • Investigate and classify incidents based on severity, considering affected customers, service disruptions, data loss, downtime, and financial impact. Document root causes, take corrective actions to prevent recurrence, and maintain early warning systems and response plans to limit damage and ensure quick recovery.
    • Report serious ICT incidents to regulatory authorities when they disrupt critical operations or pose security risks.

  3. Digital Operational Resilience Testing

    DORA mandates that financial institutions regularly test their ICT risk management frameworks to assess their ability to withstand cyber threats and operational disruptions. According to Chapter IV – Digital Operational Resilience Testing, financial entities must perform regular risk-based testing, including vulnerability assessments and scenario-based testing, to identify weaknesses and implement corrective measures. These tests must be conducted by independent internal or external parties.

    To strengthen digital resilience, financial institutions must take the following actions:

    • Have a structured, risk-based resilience testing program as part of their ICT risk management framework to assess readiness for ICT incidents, identify weaknesses, and ensure timely corrective actions.
    • Establish clear procedures for prioritizing and addressing issues, with internal validation to track remediation efforts.
    • Conduct resilience testing for critical ICT systems annually, and for high-risk organizations, perform advanced threat-led penetration testing (TLPT) at least every three years as required by regulators.

  4. Management of ICT Third-Party Risk

    DORA imposes strict requirements on financial institutions to manage risks associated with ICT service providers, with Chapter V specifically focusing on ICT third-party risk management. It ensures that financial entities thoroughly assess third-party providers before entering agreements, ensuring they meet security and regulatory compliance. Contracts must clearly define service scope, quality expectations, monitoring requirements, and termination clauses.

    To comply with DORA, financial institutions must implement the following measures:

    • Develop a clear vendor risk management strategy and maintain a register of all ICT providers, documenting their roles in critical or important functions for regulatory review.
    • Report new ICT service agreements to regulators annually and provide advance notice for contracts involving critical services.
    • Adopt a risk-based approach for audits, inspections, and monitoring of ICT providers.
    • Evaluate the difficulty of replacing ICT providers, explore other alternatives before entering contracts, and assess risks related to vendor insolvency or data protection regulations.

  5. Information and Intelligence Sharing

    Chapter VI promotes the sharing of information and threat intelligence amongst the EU financial community. By fostering collaboration, financial institutions can enhance awareness, strengthen threat detection, and build more effective defense strategies against cyber risks.

    To ensure secure and effective information sharing, financial institutions must adhere to the following guidelines: 

    • Facilitate threat intelligence sharing to enhance awareness, limit cyber threats, and improve detection and response strategies.
    • Participate in secure and trusted communities of financial institutions for cyber intelligence exchange.
    • All exchanges must follow strict confidentiality, data protection, and competition rules to safeguard sensitive business information.
    • Establish formal agreements outlining participation terms, including the involvement of authorities and third-party ICT providers.
    • Notify regulators about their participation in such arrangements.

Together, these five pillars create a strong foundation for financial institutions to navigate ICT risks, ensuring resilience against cyber threats and operational disruptions. By emphasizing proactive risk management, continuous testing, and secure collaboration, DORA enhances the financial sector’s ability to safeguard critical operations and maintain regulatory compliance. 

Role of Cryptography in DORA

Cryptography plays a fundamental role in the Digital Operational Resilience Act (DORA) by protecting the digital infrastructure, data, and communication systems of financial institutions. As the financial sector becomes more dependent on Information and Communication Technology (ICT), the importance of cryptographic measures in ensuring the confidentiality, integrity, and availability of critical data cannot be overstated. DORA outlines specific obligations related to cryptographic controls to mitigate risks associated with cybersecurity threats and operational disruptions. 

  1. Article 6 – Encryption and Cryptographic Controls

    DORA mandates that financial institutions establish a formal policy for encryption and cryptographic controls to protect financial and customer data. This includes:

    • Article 6.2(a) – Encryption of data at rest and in transit to prevent unauthorized access.
    • Article 6.2(b) – Rules for the encryption of data in use, where necessary. If not possible, data in use shall be processed in a separate and protected environment or with equivalent measures to ensure confidentiality, integrity, authenticity, and availability.
    • Article 6.2(c) – Encryption of internal network connections and external communications to secure sensitive data exchanges.
    • Article 6.2(d) – Strong cryptographic key management to regulate the use, storage, and lifecycle of cryptographic keys (referring to Article 7).
    • Article 6.4 – Periodic updates to cryptographic technology to ensure resilience against evolving cyber threats.

  2. Article 7 – Cryptographic Key Management

    Proper management of cryptographic keys is critical for preventing unauthorized access, data breaches, and operational risks. DORA requires financial institutions to:

    • Article 7.1 – Manage cryptographic keys throughout their entire lifecycle, including generation, renewal, storage, backup, transmission, and destruction.
    • Article 7.2 – Implement strict access controls to protect cryptographic keys from unauthorized access, modification, or loss throughout their lifecycle.
    • Article 7.3 – Develop key replacement mechanisms in case of compromise or damage.
    • Article 7.4 – Maintain a register of all cryptographic certificates and certificate-storing devices for critical ICT assets.
    • Article 7.5 – Ensure timely renewal of cryptographic certificates to maintain security.

  3. Article 9 – Secure Authentication and Access Controls

    DORA reinforces the need for secure authentication methods and controlled access to ICT assets using cryptographic security measures. Financial institutions must:

    • Article 9.4(a) – Develop an information security policy to safeguard data authenticity, integrity, and confidentiality.
    • Article 9.4(c) – Enforce strict access controls, limiting physical and logical access to information assets and ICT assets to only authorized users.
    • Article 9.4(d) – Implement strong authentication mechanisms based on recognized standards, including cryptographic key protection.

The Cost of Non-Compliance

Failing to comply with DORA isn’t just a regulatory issue—it comes with serious financial and reputational risks. Financial institutions and third-party service providers (TPSPs) that don’t meet DORA’s requirements can face hefty fines and other penalties.  

Here’s what non-compliance could mean:  

For Financial Entities:  

  • Fines of up to two percent of total annual worldwide turnover or average daily worldwide turnover. 
  • Individuals could be fined up to €1,000,000 for failing to comply. 

For Third-Party Service Providers (TPSPs):  

  • Critical TPSPs can face fines of up to €5,000,000.
  • Individuals within these providers may be fined up to €500,000. 
  • If a financial entity fails to report a major ICT-related incident or threat, the ESAs can also impose a fine. 

Organizations that fail to meet the requirements of DORA not only face significant penalties but also risk damaging their reputation and losing customer trust.  

Who Will Oversee DORA Compliance?

DORA will be enforced by various EU regulatory bodies. National Competent Authorities (NCAs) in each EU member state will play a key role in overseeing compliance at a local level.  

At the European level, three major regulatory agencies will be involved: 

  • European Banking Authority (EBA)
  • European Securities and Markets Authority (ESMA) 
  • European Insurance and Occupational Pensions Authority (EIOPA) 

These regulators will have the authority to oversee and enforce compliance with DORA, ensuring that financial entities meet the required resilience obligations. They can conduct audits and inspections to assess adherence, impose fines and penalties on organizations that fail to comply, and directly monitor ICT third-party service providers to ensure they implement the necessary risk management, security, and operational resilience measures as required by DORA.  

How can EC help?

At Encryption Consulting (EC), we specialize in providing tailored encryption assessments to help organizations achieve compliance with regulatory requirements such as DORA, HIPAA, and GDPR, as well as industry standards like NIST and PCI-DSS. Our process begins with evaluating your current infrastructure against established standards, allowing us to identify any gaps in your security measures. From there, we provide a roadmap that outlines the steps needed to achieve compliance effectively. Here’s how we can assist you:    

We start with a review of your existing policies. This involves identifying your current encryption capabilities and understanding any limitations in your systems. We also examine your overall security setup to ensure we have a complete picture of your environment, taking into account various use cases relevant to your organization. 

Next, we assess the gaps in your current policies. This includes identifying gaps in your existing policies against industry standards to ensure adherence to security and compliance requirements. We also conduct workshops to facilitate discussions about your current applications, encouraging collaboration among team members to gather valuable insights. Additionally, we create an assessment questionnaire designed to capture important information about your encryption practices. Through this evaluation, we identify existing data encryption capabilities and pinpoint specific areas for improvement. 

Once the assessment is complete, we transition into the implementation phase with a detailed roadmap. We provide a comprehensive report summarizing our findings and recommendations for each finding. This report serves as a foundational guide for implementing necessary encryption enhancements. Our roadmap aligns your processes with industry standards, strengthens data security, and ensures compliance. 

By choosing our encryption assessment services, you take a proactive step towards strengthening your organization’s compliance with relevant standards. We guide you through the process, ensuring your strategies are both effective and aligned with your business goals. 

Conclusion

Digital operational resilience is no longer an option; it has become a necessity, and that is why DORA was introduced. It outlines a clear framework for managing ICT risks, enhancing incident response, and securing third-party dependencies. Effective ICT risk management, proactive incident response, and rigorous resilience testing are not just about regulatory compliance—they are essential for maintaining stability in an increasingly digital world. By integrating DORA’s principles into daily operations, firms can strengthen their defenses, protect customer trust, and stay ahead of evolving threats. 

Free Downloads

Datasheet of Encryption Consulting Services

Encryption Consulting is a customer focused cybersecurity firm that provides a multitude of services in all aspects of encryption for our clients.

Download

About the Author

Himani Joshi's profile picture

Himani Joshi is a cybersecurity intern at Encryption Consulting, where she works with the Encryption Advisory team. She possesses a foundational understanding of Hardware Security Modules (HSMs) and Public Key Infrastructure (PKI) and is actively enhancing her expertise in these critical areas. She is also dedicated to researching and learning about cybersecurity standards, frameworks, and regulations to strengthen her understanding of best encryption and security practices. In addition to her research, she is contributing to the development of both the frontend and backend of the SSH Key Manager, a comprehensive solution that helps manage SSH keys by generating, discovering, rotating, monitoring, and auditing all SSH key-related activities.

Explore the full range of services offered by Encryption Consulting.

Feel free to schedule a demo to gain a comprehensive understanding of all the services Encryption Consulting provides.

Request a demo