Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for What Is the DORA Regulation? EU Digital Resilience Framework
Cybersecurity 101/Cybersecurity/DORA Regulation

What Is the DORA Regulation? EU Digital Resilience Framework

DORA Regulation mandates digital operational resilience for EU financial entities. Learn the five pillars, compliance deadlines, penalties, and implementation best practices.

CS-101_Cybersecurity.svg
Table of Contents
What Is DORA Regulation?
Why DORA Matters for Financial Institutions
Who Must Comply with DORA?
DORA Cybersecurity Requirements
How DORA Works
ICT Risk Management Under DORA
Incident Reporting Requirements Under DORA
DORA Penalties and Enforcement
Challenges in Implementing DORA
DORA Best Practices
DORA Compliance Timeline and Key Deadlines
DORA and Related EU Regulations
Key Takeaways

Related Articles

  • CMMC Checklist: Audit Prep Guide for DoD Contractors
  • Ethical Hacker: Methods, Tools & Career Path Guide
  • What Is Session Fixation? How Attackers Hijack User Sessions
  • What Is Insecure Direct Object Reference (IDOR)?
Author: SentinelOne | Reviewer: Arijeet Ghatak
Updated: April 30, 2026

What Is DORA Regulation?

Financial institutions in the EU face a mandatory compliance framework that took effect on January 17, 2025, with penalties reaching EUR 5-10 million or 5-10% of annual turnover for non-compliance. The Digital Operational Resilience Act (DORA), officially Regulation (EU) 2022/2554, establishes uniform requirements for ICT risk management across EU financial entities. According to the official regulation text, DORA mandates that financial entities achieve a high common level of digital operational resilience, meaning you must demonstrate the ability to withstand, respond to, and recover from any disruption involving information and communication technologies.

DORA governs covered financial entities including credit institutions, payment service providers, investment firms, crypto-asset service providers, insurance companies, and ICT third-party service providers. If you operate in the EU financial sector, DORA likely governs your security operations.

Industry research reveals that only a small fraction of financial institutions report full compliance with ICT third-party risk management requirements [TKTK - need source], one of the lowest compliance areas across all DORA pillars. The third-party reporting deadline of April 30, 2025, requires action if you haven't already addressed these gaps.

Understanding why this regulation exists helps contextualize the scope of its requirements.

Why DORA Matters for Financial Institutions

DORA establishes harmonized digital operational resilience requirements across the EU financial sector, eliminating fragmentation that previously created compliance complexity and security gaps. Recent cyberattacks on financial institutions demonstrate exactly why this regulation exists.

In 2016, attackers exploited SWIFT messaging systems to steal $81 million from Bangladesh Bank, exposing critical weaknesses in third-party ICT risk management that DORA now addresses. The 2019 Capital One breach compromised over 100 million customer records through a misconfigured cloud environment, highlighting the need for unified ICT risk frameworks across hybrid infrastructure. In 2018, attackers used destructive malware to distract Banco de Chile staff while simultaneously stealing $10 million through fraudulent SWIFT transactions, demonstrating how operational disruptions can mask financial theft.

  • Systemic Risk Reduction: By mandating uniform ICT risk management standards, DORA reduces the probability that operational failures at one institution cascade through the financial system. This uniform approach ensures financial entities can withstand, respond to, and recover from ICT disruptions.
  • Third-Party Risk Transparency: The critical third-party provider oversight framework addresses concentration risk that emerges when the financial sector relies on limited ICT providers. According to the EIOPA oversight framework, Articles 31-44 establish direct regulatory oversight of critical ICT third-party service providers (CTPPs), marking the first time the EU has established such oversight at this scale.
  • Incident Response Standardization: The 4-hour notification requirement creates consistency in how financial entities handle security incidents. When major ICT-related incidents have systemic potential, authorities coordinate responses through the European Systemic Cyber Incident Coordination Framework (EU-SCICF).
  • Customer Protection Enhancement: DORA requires financial entities to report major ICT-related incidents and significant cybersecurity threats to competent authorities, while any obligation to inform customers arises, if at all, from other sectoral laws such as GDPR or PSD2 rather than from DORA itself.

These benefits apply broadly across the financial sector, but the first step is determining whether your organization falls within DORA's scope.

Who Must Comply with DORA?

DORA applies to 21 categories of financial entities operating within the EU, creating one of the broadest regulatory scopes in financial services cybersecurity. Article 2 defines the complete list of covered entities.

Traditional financial institutions form the core scope: credit institutions, payment institutions, electronic money institutions, investment firms, and central securities depositories. Insurance and reinsurance undertakings, insurance intermediaries, and institutions for occupational retirement provision fall under DORA's requirements. The regulation also covers crypto-asset service providers, crowdfunding service providers, and securitization repositories.

Market infrastructure entities including trading venues, trade repositories, central counterparties, and data reporting service providers must comply. Credit rating agencies, administrators of critical benchmarks, and account information service providers complete the financial entity categories.

ICT third-party service providers face DORA requirements when they serve EU financial entities, regardless of where the provider is headquartered. Non-EU technology companies providing cloud services, software, or managed services to EU banks must meet DORA's contractual requirements. The ESAs designate certain providers as Critical Third-Party Providers (CTPPs) based on systemic importance, subjecting them to direct regulatory oversight.

The proportionality principle under Article 4 allows smaller entities to implement requirements proportionate to their size, risk profile, and complexity. Microenterprises qualify for simplified ICT risk management frameworks under Article 16(3), though they remain subject to incident reporting and third-party oversight obligations.

Once you determine DORA applies to your organization, the next question is what specific security obligations you face.

DORA Cybersecurity Requirements

DORA specifically addresses security of network and information systems supporting financial sector business processes. ICT-related disruptions and cyber threats pose significant risks to financial stability, operational continuity, and customer protection.

Article 15 establishes explicit cybersecurity requirements: you must monitor anomalous behavior across network use patterns, hours, IT activity, and unknown devices. According to the official regulation text, financial entities must implement monitoring of anomalous behavior in relation to ICT risk through appropriate indicators.

The incident reporting requirements extend beyond traditional cybersecurity frameworks. Articles 19 and 20 require you to include threat actor attribution in your incident and threat reports. You must classify incidents as major or not major within 4 hours, then submit initial notification to your national competent authority.

DORA functions as lex specialis for the financial sector, taking precedence over NIS2. While ISO 27001 provides a foundation, DORA extends requirements with mandatory threat actor attribution, customer notification obligations, and third-party oversight mechanisms addressing systemic concentration risk.

These cybersecurity requirements form part of DORA's broader regulatory structure, which organizes obligations into five distinct pillars.

How DORA Works

DORA operates through mandatory technical requirements enforced by national competent authorities coordinated by the European Supervisory Authorities.

Your ICT risk management framework requires strategies, policies, and procedures. Your management body bears ultimate responsibility for ICT risk oversight, as established throughout DORA's regulatory requirements, per Citi's regulatory briefing.

When an incident occurs, you classify incidents immediately upon identification using predefined criteria. For major incidents, you submit initial notification within 4 hours of classification to your national competent authority, followed by sequential notifications as the situation evolves.

The resilience testing program operates on defined cycles. For most entities, you conduct regular assessments and scenario-based tests appropriate to your risk profile. If regulatory authorities identify your institution as significant, you perform TLPT at least every 3 years. Following test completion, you document summary findings and remediation plans with timelines.

Third-party oversight functions through contractual requirements and regulatory designation. Before engaging ICT service providers, you verify they comply with DORA's information security standards. Per Article 30, your contracts must include:

  • Service level agreements with performance metrics
  • Security standards and compliance requirements
  • Audit rights and access provisions
  • Exit strategies and transition planning

The ESAs designate certain providers as critical third-party providers (CTPPs) based on systemic importance. These CTPPs face direct regulatory oversight regardless of their domicile.

Two of DORA's five pillars carry the most operational weight for security teams: ICT risk management and incident reporting.

ICT Risk Management Under DORA

ICT risk management forms the foundation of DORA's regulatory framework. Article 6 requires financial entities to establish ICT risk management frameworks as an integral component of their overall risk management system, with direct accountability assigned to the management body.

Your management body must define, approve, oversee, and be accountable for ICT risk management arrangements. This includes setting risk tolerance levels, approving ICT business continuity policies, and allocating adequate budget for digital operational resilience. DORA makes clear that ICT risk is a board-level responsibility, not an IT department function.

Article 8 mandates identification of all sources of ICT risk, including risks arising from ICT third-party dependencies. You must maintain a complete inventory of ICT assets, map interdependencies between systems, and document all ICT-supported business functions. This mapping exercise reveals concentration risks and single points of failure that could disrupt critical financial services.

Protection and prevention requirements under Article 9 specify that financial entities must implement ICT security policies across several domains:

  • Information security for data in transit and at rest
  • Network security management and segmentation
  • Access control policies and authentication mechanisms
  • Patch and update management procedures
  • Physical and environmental security for ICT assets

These controls must operate as an integrated system, not as isolated measures applied independently.

Detection capabilities are equally critical. Article 10 requires mechanisms to promptly find anomalous activities, including ICT network performance issues and ICT-related incidents. Your detection infrastructure must monitor anomalous behavior through appropriate indicators and enable multiple layers of control.

Response and recovery procedures under Articles 11 and 12 complete the framework. You must implement ICT business continuity policies, disaster recovery plans, and backup policies. These must be tested regularly and updated based on lessons learned from disruptions, resilience testing, and audit findings.

Meeting these ICT risk management obligations creates the foundation for DORA's equally demanding incident reporting requirements.

Incident Reporting Requirements Under DORA

DORA establishes a structured, time-bound incident reporting framework that goes beyond what most financial entities have implemented under prior regulations. Articles 17 through 23 define classification criteria, reporting timelines, and notification obligations for ICT-related incidents.

You must first classify every ICT-related incident using criteria defined in Article 18. Classification factors include the number of clients affected, the duration and geographical spread of the incident, data losses involved, the criticality of services affected, and the economic impact. Based on this assessment, you determine whether the incident qualifies as "major" under DORA's thresholds.

For major incidents, the reporting timeline is strict:

  • Initial notification: Within 4 hours of classifying the incident
  • Intermediate report: Within 72 hours of the initial notification, covering progress updates, preliminary root cause analysis, and temporary measures implemented
  • Final report: Within one month of the intermediate report, including confirmed root cause analysis, actual impact assessment, and remediation actions taken

Effective incident response processes become essential to meeting these timelines. Articles 19 and 20 also require threat actor attribution in your incident and threat reports, creating a demand for threat intelligence integration in your reporting workflows.

Beyond major incidents, DORA introduces voluntary reporting of significant cyber threats under Article 19. Financial entities may notify their competent authority when they identify a cyber threat they consider to be of relevance to the financial system, even if the threat has not yet resulted in an incident.

These reporting obligations carry enforcement consequences, which brings us to DORA's penalty framework.

DORA Penalties and Enforcement

DORA enforcement operates through national competent authorities coordinated by the European Supervisory Authorities (EBA, ESMA, and EIOPA). Each EU member state implements its own penalty framework within DORA's parameters, creating variation in maximum fines and enforcement approaches.

Penalty structures differ significantly across member states. According to DLA Piper's analysis, Belgium imposes maximum penalties of EUR 5 million or 10% of net annual turnover. Sweden calculates penalties as the highest of EUR 1 million, 10% of total annual net turnover, or three times the benefit derived from the breach. Germany's framework allows penalties up to EUR 5 million for legal persons and EUR 500,000 for natural persons in management positions.

Enforcement powers extend beyond financial penalties. Competent authorities can:

  • Issue cease and desist orders requiring immediate remediation
  • Publish public warnings identifying non-compliant entities by name
  • Remove board members responsible for ICT risk oversight failures

These reputational consequences often exceed direct financial penalties in long-term business impact.

Article 54 requires competent authorities to publish decisions imposing administrative penalties on their official websites, including information about the type and nature of the breach and the identity of persons responsible. This public disclosure mechanism creates transparency but also significant reputational risk for non-compliant organizations.

Critical Third-Party Providers face direct oversight from the Lead Overseer designated by the ESAs. CTPPs that fail to comply with oversight recommendations face periodic penalty payments until they achieve compliance, separate from penalties imposed on the financial entities they serve.

With these enforcement stakes in mind, understanding the practical barriers to compliance becomes essential.

Challenges in Implementing DORA

Industry research reveals systematic implementation barriers across the financial sector, with ICT third-party risk management and digital operational resilience testing showing the lowest compliance levels.

  1. Third-Party Risk Management Complexity: ICT third-party risk management represents the lowest compliance area across all DORA pillars. Organizations face the prospect of technology-enabled legal reviews of potentially thousands of contracts, each requiring verification that vendors comply with DORA's security standards.
  2. Testing Program Deficiencies: Digital operational resilience testing shows equally concerning compliance levels. This indicates organizations struggle to implement threat-led penetration testing frameworks required under DORA.
  3. Multi-Cloud Visibility Gaps: Creating a central overview of complex, segregated, and segmented ICT systems represents a major challenge. You need metadata ingestion from multi-cloud environments, on-premise infrastructure integration, and complete asset inventories. Unified visibility platforms that consolidate monitoring across multi-cloud and on-premise environments help address this challenge.
  4. Incident Attribution Requirements: The mandate to include threat actor attribution in incident reports creates operational burden beyond traditional incident response. This requirement demands access to threat intelligence feeds and analysts with attribution expertise, along with autonomous reporting workflows to support multi-stakeholder notification including customer communication.
  5. Timeline Pressure: The 4-hour notification requirement from incident classification creates significant operational pressure. Security platforms with autonomous capabilities reduce response time by finding and classifying threats without manual intervention. When an incident occurs at 2 AM, you have four hours to classify severity, assess impact, determine threat actors, and submit initial notification.

Avoiding these barriers requires deliberate strategies that address DORA's most demanding requirements.

DORA Best Practices

Successful DORA implementation requires structured approaches across governance, operations, and technology dimensions.

Prioritize Third-Party Risk Management: Given that third-party risk management shows the lowest compliance rates, perform technology-enabled legal reviews of all ICT service provider contracts. Implement individualized approaches for critical providers. Establish ongoing monitoring of third-party compliance and address concentration risk through diversification strategies.

Implement Autonomous Incident Response: Security platforms that deploy behavioral AI to monitor anomalous behavior across network patterns, hours, IT activity, and unknown devices as Article 15 mandates enable rapid incident response. You need security platforms that provide autonomous capabilities to find and classify threats, helping you meet the 4-hour notification timeline. Ensure your infrastructure includes threat intelligence integration to support the threat actor attribution analysis required under Articles 19-20.

Build Testing Programs Across Risk Profiles: Implement threat-led penetration testing (TLPT) for identified critical systems at least every 3 years. Your testing program should include:

  • Regular scenario-based resilience exercises
  • Documented testing results with summary findings
  • Remediation plans with specific timelines
  • Integration with business continuity planning

Deploy Unified Visibility Platforms: Establish centralized visibility across multi-cloud and on-premise environments. Maintain complete ICT asset inventories. Implement continuous posture management. Create a single source of truth for ICT dependencies based on industry recommendations addressing multi-cloud and hybrid infrastructure visibility challenges.

Establish Continuous Compliance: Create ongoing compliance monitoring programs rather than point-in-time assessments. Build feedback loops from testing to risk management. Maintain awareness of evolving supervisory expectations. Plan for regulatory technical standards updates. Monitor critical third-party provider designations by authorities.

Alongside these operational practices, understanding DORA's compliance timeline helps prioritize implementation efforts.

DORA Compliance Timeline and Key Deadlines

DORA follows a phased implementation timeline that began with its publication and continues through ongoing regulatory technical standard updates. Staying ahead of these deadlines is essential for maintaining compliance.

DORA was published in the Official Journal of the EU on December 27, 2022, and entered into force on January 16, 2023. Financial entities and ICT third-party service providers had a two-year transition period to implement the regulation's requirements.

The primary enforcement date was January 17, 2025. From this date, all covered financial entities must demonstrate compliance with DORA's core requirements: ICT risk management frameworks, incident reporting procedures, resilience testing programs, and third-party risk management obligations.

Key deadlines following enforcement include:

  • January 17, 2025: Full compliance required for all covered entities
  • April 30, 2025: First submission deadline for the register of information on ICT third-party arrangements to competent authorities
  • Ongoing (every 3 years): Threat-led penetration testing (TLPT) for entities identified as significant
  • Ongoing: Annual updates to the ICT third-party register and continuous monitoring of third-party compliance

The European Supervisory Authorities continue publishing Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) that provide detailed guidance on specific DORA obligations. The first batch of RTS covering ICT risk management, incident classification, and third-party risk was finalized in early 2024. A second batch addressing TLPT requirements and advanced testing frameworks followed.

Financial entities should monitor ESA publications for updates to technical standards and supervisory guidance that may refine compliance expectations over time. DORA also intersects with other EU regulatory frameworks that financial entities must navigate simultaneously.

DORA and Related EU Regulations

DORA operates alongside several EU regulations that collectively shape the cybersecurity and operational resilience landscape for financial institutions. Understanding how these frameworks interact prevents duplication of effort and ensures complete regulatory coverage.

  • DORA and NIS2: DORA functions as lex specialis for the financial sector, meaning it takes precedence over the Network and Information Security Directive (NIS2) for entities within its scope. Where both regulations could apply, DORA's financial-sector-specific requirements override NIS2's general cybersecurity provisions. However, ICT service providers not classified as CTPPs may still fall under NIS2 obligations if they qualify as essential or important entities under that directive.
  • DORA and GDPR: The General Data Protection Regulation continues to apply alongside DORA, particularly regarding personal data breach notification. Where an ICT-related incident involves personal data, you must comply with both DORA's incident reporting timeline (4-hour initial notification to competent authorities) and GDPR's 72-hour notification to data protection authorities. The two reporting streams operate in parallel with different timelines, recipients, and content requirements.
  • DORA and the Cyber Resilience Act (CRA): The CRA focuses on cybersecurity requirements for products with digital elements placed on the EU market. While DORA governs how financial entities manage ICT risks operationally, the CRA addresses the security of hardware and software products those entities procure. Together, they create a supply chain security framework where product manufacturers must meet CRA standards and financial entities must verify supplier compliance under DORA.
  • DORA and ISO 27001: ISO 27001 provides a voluntary information security management system framework, while DORA imposes mandatory requirements. ENISA provides official mapping tables correlating DORA requirements with ISO 27001 controls. Financial entities certified to ISO 27001 have a head start, but still face gaps in threat actor attribution, customer notification protocols, third-party concentration risk management, and TLPT requirements that DORA specifically mandates.

Implementing these best practices and navigating regulatory overlap requires security infrastructure built for continuous monitoring and rapid response.

Unleash AI-Powered Cybersecurity

Elevate your security posture with real-time detection, machine-speed response, and total visibility of your entire digital environment.

Get a Demo

Key Takeaways

DORA mandates digital operational resilience across EU financial entities with enforcement beginning January 17, 2025. The regulation requires ICT risk management frameworks with board-level accountability, incident classification and reporting within 4 hours for major incidents including threat actor attribution, resilience testing with TLPT at least every three years for significant entities, third-party oversight with ICT provider reporting starting by April 30, 2025, and information sharing mechanisms for cyber threat intelligence exchange.

Third-party risk management and resilience testing show the lowest compliance rates across the financial sector, creating significant regulatory exposure. Security platforms that monitor anomalous behavior, provide threat intelligence integration, and enable rapid incident response help organizations meet DORA's demanding requirements.

FAQs

DORA (Digital Operational Resilience Act) is EU Regulation 2022/2554 that establishes uniform requirements for ICT risk management across EU financial entities. The regulation mandates that financial institutions achieve digital operational resilience by implementing ICT risk management frameworks, incident reporting procedures, resilience testing programs, and third-party risk oversight. 

DORA took effect on January 17, 2025, and applies to 21 types of financial entities including banks, investment firms, insurance companies, and their ICT service providers.

DORA applies to 21 categories of financial entities operating within the EU, including credit institutions, investment firms, insurance companies, payment service providers, crypto-asset service providers, and trading venues. 

ICT third-party service providers that serve these financial entities must also comply, regardless of whether the provider is headquartered inside or outside the EU. The proportionality principle allows smaller entities to implement simplified requirements proportionate to their size and risk profile.

DORA entered into force on January 16, 2023, following its publication in the Official Journal of the EU on December 27, 2022. The regulation became fully applicable and enforceable on January 17, 2025, after a two-year transition period. 

Financial entities and ICT third-party providers were required to have all necessary frameworks, policies, and procedures in place by this enforcement date.

Yes. DORA mandates digital operational resilience testing under Articles 24-27, which includes vulnerability assessments, network security assessments, and scenario-based testing. 

For entities identified as significant by regulatory authorities, Article 26 requires threat-led penetration testing (TLPT) at least every three years. TLPT must simulate real-world attack scenarios using intelligence on genuine threat actors targeting the specific organization.

Start by mapping your ICT assets and third-party dependencies to understand your full regulatory scope. Establish an ICT risk management framework with board-level accountability as Article 6 requires. 

Review and update all ICT service provider contracts to meet Article 30 requirements. Implement incident classification and reporting procedures that meet the 4-hour notification timeline. Build or enhance your resilience testing program proportionate to your risk profile.

Penalties vary by member state, generally ranging from EUR 5-10 million or 5-10% of annual net turnover. Belgium imposes maximum penalties of EUR 5 million or 10% of net annual turnover. 

Sweden calculates penalties as the highest of EUR 1 million, 10% of total annual net turnover, or three times the benefit derived from the breach. Article 54 also allows authorities to publish penalty details, creating reputational risk beyond financial consequences.

DORA governs 21 types of financial entities including credit institutions, investment firms, insurance companies, crypto-asset service providers, and trading venues. 

ICT third-party providers serving EU financial entities must also comply regardless of their headquarters location. Microenterprises may qualify for simplified framework requirements under Article 16(3).

DORA requires threat actor attribution in incident reports, customer notification of incidents, and direct regulatory oversight of ICT third-party providers. ISO 27001 provides a risk management foundation but lacks these specific requirements. 

DORA functions as lex specialis for financial services, taking precedence over NIS2's general cybersecurity requirements. Financial entities certified to ISO 27001 still face gaps in threat actor attribution, customer notification protocols, and third-party concentration risk management that DORA addresses.

TLPT requires entities identified as significant to conduct advanced testing at least every three years simulating real-world cyberattacks. Testing must use intelligence on genuine threat actors, tactics, techniques, and procedures targeting your specific organization. 

Following completion, you document findings and remediation plans with timelines, then submit compliance documentation to competent authorities for supervisory review.

Article 28 establishes that financial entities can only enter into contracts with ICT providers that comply with DORA's information security standards. Existing contracts with non-compliant providers create regulatory exposure and must be reviewed for required provisions. 

The ESAs designate critical third-party providers for direct regulatory oversight. Financial entities must submit ICT third-party relationship information to the register and maintain ongoing compliance documentation.

Discover More About Cybersecurity

IT vs. OT Security: Key Differences & Best PracticesCybersecurity

IT vs. OT Security: Key Differences & Best Practices

IT vs. OT security covers two domains with distinct risk profiles, compliance mandates, and operating priorities. Learn key differences and best practices.

Read More
What Are Air Gapped Backups? Examples & Best PracticesCybersecurity

What Are Air Gapped Backups? Examples & Best Practices

Air Gapped Backups keep at least one recovery copy beyond attackers' reach. Learn how they work, types, examples, and best practices for ransomware recovery.

Read More
What Is OT Security? Definition, Challenges & Best PracticesCybersecurity

What Is OT Security? Definition, Challenges & Best Practices

OT Security protects industrial systems that run physical processes in critical infrastructure. Covers Purdue Model segmentation, IT/OT convergence, and NIST guidance.

Read More
Cyber Security in Government Sector: Risks, Best Practices & FrameworksCybersecurity

Cyber Security in Government Sector: Risks, Best Practices & Frameworks

Check out what risks and threats government agencies and bodies are facing in the world of cybersecurity. We also cover the best practices for securing government systems. Read on to learn more.

Read More
CS- 101 Cybersecurity - Prefooter | Experience the Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Get a Demo
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English