DORA Regulation Guide

What Is DORA Regulation? Everything Financial Entities Need to Know

The EU's Digital Operational Resilience Act went into full application on January 17, 2025 , fundamentally changing how financial entities and their ICT providers must manage digital risk. If your organization operates across multiple entities, subsidiaries, or jurisdictions in the financial sector, understanding DORA isn't optional. Non-compliance carries supervisory penalties, contractual disruption, and reputational damage.

Download the Free DORA Readiness Checklist

Trusted by compliance teams managing

50+

group entities

Swiss-Hosted

data sovereignty

ISO 27001

aligned platform

GDPR-Compliant

by design

Trusted by 50+ privacy teams across 14 countries
Healthcare
Aviation
Energy
Legal
Technology
Zurzach logo
AXA logo
Open Medical logo
Glencore logo
Pilatus logo
Liferay logo
CareerFairy logo
Voicepoint logo
Kellerhals Carrard logo
Aclaris logo
Avantec logo
Diakonie Bethanien logo
Liferay logo
CareerFairy logo
Zurzach logo
Voicepoint logo
Open Medical logo
Kellerhals Carrard logo
AXA logo
Aclaris logo
Avantec logo
Diakonie Bethanien logo
Understanding DORA

What Is DORA and Why Does It Matter Now?

The Digital Operational Resilience Act (Regulation (EU) 2022/2554) is the EU's regulatory framework for ensuring financial entities can withstand, respond to, and recover from ICT-related disruptions. It replaces a patchwork of national guidelines with a single, harmonized set of requirements , enforceable since January 17, 2025.

Before DORA, ICT risk management in the financial sector was governed by sector-specific guidelines . EBA Guidelines on ICT and Security Risk Management, EIOPA Guidelines on Outsourcing to Cloud Service Providers, and various national supervisory expectations. The result: inconsistent standards, regulatory arbitrage, and systemic blind spots when critical ICT providers served multiple financial entities across borders.

DORA changes this fundamentally. It creates a single regulatory framework that applies across all EU financial sub-sectors , banking, insurance, investment, payment services, crypto-assets, and more , with direct requirements for the ICT third-party providers these entities depend on.

For organizations managing compliance across multiple entities and jurisdictions, DORA introduces both complexity and opportunity. The complexity comes from coordinating five interconnected pillars across every subsidiary. The opportunity comes from finally having a clear, unified standard to build your operational resilience program around.

Scope

Who Must Comply With DORA?

DORA applies to virtually all regulated financial entities in the EU, plus the ICT providers they depend on. The European Commission estimates over 22,000 entities fall within scope.

Financial Entities (Article 2)

  • Credit institutions (banks)
  • Payment institutions and e-money institutions
  • Investment firms and management companies
  • Insurance and reinsurance undertakings
  • Central securities depositories
  • Central counterparties and trade repositories
  • Crypto-asset service providers
  • Crowdfunding service providers
  • Institutions for occupational retirement provision
  • Credit rating agencies and securitisation repositories

ICT Third-Party Providers

  • Cloud service providers serving financial entities
  • Data analytics and data centre providers
  • Software providers (SaaS, core banking, etc.)
  • ICT infrastructure providers
  • Managed security service providers
  • Critical ICT third-party providers designated by ESAs are subject to the new EU-level oversight framework with direct supervisory powers

Proportionality principle: DORA applies proportionally , microenterprises and certain entities face simplified requirements under Articles 16(1) and 25(1). But proportionality doesn't mean exemption.

The 5 Pillars of DORA

What DORA Actually Requires , and Why Multi-Entity Groups Struggle Most

DORA's requirements span five interconnected pillars. For organizations managing compliance across multiple subsidiaries and jurisdictions, each pillar multiplies in complexity. Here's what your compliance program must cover.

PILLAR 1

ICT Risk Management Framework

Articles 5–16 mandate a comprehensive ICT risk management framework with direct management body accountability. Your organization must document identification, protection, detection, response, and recovery processes , including legacy system management , across every entity.

The multi-entity challenge: Each subsidiary needs its own documented framework, but group-level consistency is required for supervisory review.

4 hours

Maximum time to detect and classify a major ICT incident once identified . DORA Article 17 classification criteria

PILLAR 2

Incident Reporting and Classification

Articles 17–23 require harmonized incident classification and a strict reporting timeline: initial notification within 4 hours of classification, intermediate report within 72 hours, and a final report within one month. Voluntary reporting of significant cyber threats is also encouraged.

The multi-entity challenge: A single ICT incident can affect multiple subsidiaries simultaneously, each with its own reporting obligation to different national authorities.

72 hours

Deadline for intermediate incident report to competent authority . DORA Article 19 reporting requirements

PILLAR 3

Digital Operational Resilience Testing

Articles 24–27 require regular testing of ICT systems, from basic vulnerability assessments for all entities to advanced threat-led penetration testing (TLPT) every three years for systemically important institutions. Testing programs must cover all critical ICT systems and applications.

The multi-entity challenge: Coordinating TLPT exercises across shared infrastructure serving multiple subsidiaries requires centralized planning and evidence management.

Every 3 years

Minimum frequency for threat-led penetration testing at significant financial entities . DORA Article 26

PILLAR 4

Third-Party ICT Risk Management

Articles 28–44 establish rigorous requirements for managing ICT third-party providers. Financial entities must maintain a register of all ICT outsourcing arrangements, conduct pre-contract due diligence, include mandatory contractual clauses, and continuously monitor provider performance and risk.

The multi-entity challenge: The same cloud provider may serve 15 subsidiaries under 15 different contracts , without centralized vendor management, gaps are invisible until a supervisor finds them.

22,000+

Financial entities and ICT providers subject to DORA . European Commission estimates, 2022

PILLAR 5

Information Sharing Arrangements

Article 45 encourages financial entities to exchange cyber threat intelligence and vulnerability information with peers through trusted arrangements. While voluntary, participating in information-sharing communities strengthens collective resilience and demonstrates proactive risk management to supervisors.

The multi-entity challenge: Sharing threat intelligence across subsidiaries in different jurisdictions requires data governance controls to avoid inadvertently breaching GDPR or confidentiality obligations.

Jan 17, 2025

DORA full application date , all five pillars enforceable across EU member states . Regulation (EU) 2022/2554

THE COMMON THREAD

Every Pillar Gets Harder With Every Subsidiary You Add

For groups managing compliance across multiple entities, DORA's five pillars don't just add requirements , they multiply them. Centralized vendor registers, coordinated incident reporting, and consistent risk frameworks become impossible in spreadsheets.

Book a 30-Min Walkthrough
Key Dates

DORA Timeline: From Adoption to Enforcement

November 2022
DORA adopted by the European Parliament and Council as Regulation (EU) 2022/2554, published in the Official Journal of the EU.
January 16, 2023
Entry into force. Two-year implementation period begins. ESAs (EBA, ESMA, EIOPA) start developing Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS).
Throughout 2023–2024
RTS/ITS development and consultation. ESAs publish draft standards covering ICT risk management, incident reporting templates, TLPT frameworks, and the register of information for ICT third-party providers.
January 17, 2025
Full application date. All five pillars enforceable. National competent authorities begin supervisory activities. Financial entities must have their ICT risk frameworks, incident reporting processes, testing programs, and vendor registers in place.
2025 onwards
Ongoing enforcement and oversight. ESAs designate critical ICT third-party providers. Supervisory examinations begin. Entities must demonstrate continuous compliance, not just point-in-time readiness.

200+

Hours saved on ROPA management

Medtec redirected 200+ hours from manual ROPA maintenance to ISO 27001 preparation , achieving certification 3 months ahead of schedule.

60%

Lower compliance admin time

Aircraft manufacturer cut compliance admin time by 60% in their first 6 months , with predictable pricing based on entities, not per-user fees.

3 mo

Ahead of schedule on ISO 27001

Medtec achieved ISO 27001 certification 3 months ahead of their projected timeline using Priverion's audit-ready evidence packages.

Why Companies Switch

The OneTrust alternative built for mid-market reality

Enterprise platforms sell you complexity you don't need at prices you can't justify. Here's what changes when your privacy tool is designed for how multi-entity organizations actually work.

The typical enterprise platform experience

Hosting and data residency

US-headquartered, data often processed outside the EU. Post-Schrems II, this creates transfer risk you have to document and justify to supervisory authorities.

Pricing model

Per-user, per-module pricing that balloons as you onboard subsidiaries. Budget surprises every renewal cycle. Features locked behind tier upgrades.

Implementation

6–12 month rollouts requiring dedicated consultants. You're paying for the platform before you've configured it for a single subsidiary.

User experience

Built for GRC teams with dedicated admin staff. Business unit owners resist adoption because the interface requires training just to submit a processing activity.

Platform scope

Sprawling suite covering ESG, ethics, third-party risk, and more. You pay for everything, use a fraction, and still need workarounds for multi-entity privacy management.

The Priverion experience

Swiss-hosted, European data residency

All data processed within Swiss infrastructure. In a post-Schrems II world, Swiss hosting isn't a marketing checkbox . it's a legal advantage for cross-border data transfers. One fewer risk to document.

Predictable, group-based pricing

Pricing based on number of companies and organizational size , not per-user or per-module. Onboard every business unit owner without watching costs climb. No expansion traps at renewal.

Operational in weeks, not months

Aircraft manufacturer achieved a 60% reduction in compliance admin time within their first 6 months. Most customers are running production workflows within weeks of signing.

Based on Aircraft manufacturer deployment, first 6 months

Designed for the people who actually do the work

Business unit owners complete ROPA recertifications without training. AI-assisted drafting handles the heavy lifting for DPIAs and risk scoring. Your DPO focuses on strategy, not spreadsheet maintenance.

All-in-one privacy platform, nothing you don't need

ROPA, DPIA, vendor risk, incident management, DSR handling, cross-entity data mapping, AI Register , everything for group-wide privacy management in a single platform. We don't cover ESG or cookie consent. We go deep where it matters.

Honest note: We're not built for single-entity companies, and we don't offer 200 integrations. We integrate deeply with the systems that matter for privacy workflows . HR, procurement, IT asset management , rather than offering shallow connectors that create maintenance overhead.

Book a 30-min walkthrough
DORA Readiness Checklist

Your DORA Compliance Readiness Checklist

Use this checklist to assess your organization's readiness across all five DORA pillars. For multi-entity groups, each item must be evaluated at both the subsidiary and group level.

Pillar 1: ICT Risk Management

  • 1. Documented ICT risk management framework approved by the management body for each entity
  • 2. Defined roles and responsibilities for ICT risk management, including a dedicated control function
  • 3. Complete inventory of ICT assets, systems, and their interdependencies across all entities
  • 4. Business continuity and disaster recovery plans that cover ICT-related disruptions
  • 5. Annual review and update process for the ICT risk management framework

Pillar 2: Incident Reporting

  • 6. Incident classification process aligned with DORA Article 18 criteria (clients affected, data integrity, criticality of services, duration)
  • 7. Reporting workflows capable of meeting the 4-hour initial notification, 72-hour intermediate, and 1-month final report deadlines
  • 8. Coordination process for incidents affecting multiple subsidiaries with different national authorities
  • 9. Incident root cause analysis process with lessons-learned documentation

Pillar 3: Resilience Testing

  • 10. Annual testing program covering vulnerability assessments, network security tests, and scenario-based testing
  • 11. TLPT program established (if designated as a significant entity) with qualified external testers
  • 12. Remediation tracking for all findings from testing activities with defined timelines

Pillar 4: Third-Party Risk Management

  • 13. Complete register of all ICT third-party provider arrangements, including intra-group services
  • 14. Pre-contract due diligence process for new ICT providers covering risk assessment and concentration risk
  • 15. Existing contracts reviewed for mandatory clauses (audit rights, exit strategies, data location, sub-outsourcing)
  • 16. Ongoing monitoring process for ICT provider performance and compliance
  • 17. Exit strategies documented for all critical or important ICT service arrangements

Pillar 5: Information Sharing

  • 18. Assessment completed on whether to participate in threat intelligence sharing arrangements
  • 19. If participating: data governance controls in place to manage GDPR and confidentiality obligations in shared intelligence
  • 20. Internal process for distributing relevant threat intelligence across subsidiaries and business units

Need Help Coordinating DORA Compliance Across Multiple Entities?

See how Priverion's group-wide vendor risk management, incident workflows, and audit-ready evidence packages help multi-entity organizations build DORA readiness without spreadsheet chaos.

Book a 30-Min Walkthrough
FAQ

Frequently Asked Questions About DORA

What is DORA regulation?

DORA (Digital Operational Resilience Act) is EU Regulation 2022/2554, which establishes uniform requirements for the security of network and information systems of financial entities and their critical ICT third-party service providers. It has been fully applicable since January 17, 2025, replacing a patchwork of sector-specific guidelines with a single harmonized framework.

Who must comply with DORA?

DORA applies to virtually all regulated financial entities in the EU , including banks, insurance companies, investment firms, payment institutions, crypto-asset service providers , as well as their critical ICT third-party service providers. The European Commission estimates over 22,000 entities fall within scope. The regulation applies proportionally, with simplified requirements for microenterprises, but proportionality doesn't mean exemption.

What are the 5 pillars of DORA?

The five pillars are: (1) ICT Risk Management Framework (Articles 5–16), (2) Incident Reporting and Classification (Articles 17–23), (3) Digital Operational Resilience Testing (Articles 24–27), (4) Third-Party ICT Risk Management (Articles 28–44), and (5) Information Sharing Arrangements (Article 45). Each pillar has specific requirements that must be addressed at both entity and group level.

When did DORA come into effect?

DORA entered into force on January 16, 2023, with a two-year implementation period. It became fully applicable on January 17, 2025, meaning all five pillars are now enforceable across EU member states. The ESAs (EBA, ESMA, EIOPA) developed Regulatory Technical Standards and Implementing Technical Standards throughout 2023–2024 to provide detailed implementation guidance.

What are the penalties for DORA non-compliance?

DORA empowers national competent authorities to impose administrative penalties and remedial measures, including periodic penalty payments. For critical ICT third-party providers under the EU oversight framework, penalties can reach up to 1% of average daily worldwide turnover for each day of non-compliance, for up to six months. Beyond financial penalties, non-compliance creates reputational risk and potential contractual disruption with financial entity clients.

How does DORA affect ICT third-party providers?

DORA requires financial entities to maintain registers of all ICT outsourcing arrangements, conduct pre-contract due diligence, include mandatory contractual clauses (covering audit rights, exit strategies, data location, and sub-outsourcing), and monitor provider performance. Critical ICT third-party providers designated by the ESAs are subject to a new EU-level oversight framework with direct supervisory powers , a significant change from the previous indirect supervision model.

How does DORA relate to GDPR?

DORA and GDPR are complementary regulations. DORA focuses on ICT operational resilience for financial entities, while GDPR covers personal data protection. An ICT incident under DORA that involves personal data will also trigger GDPR breach notification obligations (72-hour notification to supervisory authorities under Article 33). Organizations need coordinated incident response processes that satisfy both regulatory frameworks simultaneously , particularly challenging for multi-entity groups reporting to multiple authorities.

Stop Managing Privacy Compliance in Spreadsheets. Start Managing It for Real.

Aircraft manufacturer cut compliance admin time by 60% in their first six months. AXA hit 100% automated ROPA recertification. Medtec saved 200+ hours preparing for ISO 27001.

In 30 minutes, we'll show you exactly how group-wide privacy management works when it's built for multi-entity organizations , not bolted on as an afterthought. Swiss-hosted. AI-assisted with full human oversight. Predictable pricing without per-user traps.

Book a 30-Minute Walkthrough

Weeks, Not Months

Average time to go live

50+ Entities

Proven group-wide scale

100% Swiss-Hosted

European data residency guaranteed

No commitment required. No sales pressure. Just a clear look at what's possible.