Marketing

The DORA HANDBOOK - part 2

By Eric Williamson
AI & Data: Who Really Holds the Power?

DCW Research: DORA Part 2 - Implementation Guide

table { width: 100%; border-collapse: collapse; margin: 20px 0; font-size: 14px; } th, td { border: 1px solid #000; /* Standard Word table border */ padding: 8px 10px; text-align: left; vertical-align: top; } th { background-color: #f2f2f2; font-weight: bold; } ul { margin-bottom: 15px; padding-left: 20px; } li { margin-bottom: 5px; } .checkbox { font-family: 'Segoe UI Symbol', sans-serif; font-size: 1.2em; padding-right: 5px; } .disclaimer { margin-top: 50px; padding-top: 20px; border-top: 1px solid #ccc; font-size: 12px; color: #666; } .header-meta { margin-bottom: 40px; font-size: 14px; } .header-meta strong { display: inline-block; width: 120px; }

The DCW Research DORA Part 2

Includes: Abbreviations, Terms, Definitions, Official Websites, and a Planning and Implementation Guide

Date: January 22nd, 2026

Prepared by: Eric Williamson, Director of Compliance and Risk

Classification: Industry Analysis - Public

Executive Summary

The Digital Operational Resilience Act, known throughout the financial services industry as DORA, represents a watershed moment in European financial regulation. Fully applicable as of January 17, 2025, it fundamentally transforms how financial institutions across the European Union must approach information and communication technology (ICT) risk management, operational continuity, and digital resilience.

For the first time, the European Union has established a harmonised, detailed, and enforceable regulatory framework that addresses technology risks with the same rigour traditionally reserved for financial risks such as capital adequacy and market conduct. DORA emerged from a recognition that the financial sector's increasing dependence on digital technology has created new vulnerabilities that traditional regulatory frameworks were not designed to address.

The Five Pillars

The regulation establishes five interconnected pillars that collectively define what digital operational resilience means in practice:

  • ICT Risk Management: The foundational framework for identifying and controlling technology risks.
  • Incident Management and Reporting: Ensuring rapid response when disruptions occur.
  • Digital Operational Resilience Testing: Validating that systems and processes work as intended under stress.
  • Third-Party Risk Management: Addressing the growing dependence on external technology providers.
  • Information Sharing: Fostering collective defence against common cyber threats.

Application and Scope

What makes DORA particularly significant is its breadth of application and its unprecedented level of detail. The regulation applies directly to more than twenty thousand financial entities across the European Union. Importantly, DORA also extends regulatory requirements to information and communication technology service providers that support these financial entities, particularly cloud computing platforms, software vendors, and data centre operators.

r1

Abbreviations

Abbreviation Term BCP / DRPBusiness Continuity Plan / Disaster Recovery Plan BIABusiness Impact Analysis CA / NCACompetent Authority / National Competent Authorities CDR / CIRCommission Delegated Regulation / Commission Implementing Regulation CIFCritical or Important Function CSIRTComputer Security Incident Response Team CTTPCritical ICT Third-Party Service Provider CySACybersecurity Act, Regulation (EU) 2019/881 DORADigital Operational Resilience Act, Regulation (EU) 2022/2554 DORSDigital Operational Resilience Strategy DORTDigital Operational Resilience Testing ENISAEuropean Union Agency on Cybersecurity ESAsEuropean Supervisory Authorities (EBA, EIOPA, ESMA) FEFinancial Entity IAFInternal Audit Function ICTInformation and Communication Technology ICT RMFICT Risk Management Framework ICT TPP / TPSPICT Third-Party Service Provider / Third-Party Service Providers IGCFInternal Governance and Control Framework ISMSInformation Security Management System KRI / KCI / KPIKey Risk / Control / Performance Indicator NIS 2NIS 2 Directive, Directive (EU) 2022/2555 RCARoot Cause Analysis RoIRegister of Information (DORA Art.28.3) RTO / RPORecovery Time Objective / Recovery Point Objective RTPRisk Treatment Plans SLAs / OLAsService Level Agreements / Operational Level Agreements SoAStatement of Applicability TIThreat Intelligence TLPTThreat-Led Penetration Testing TPRMThird-Party Risk Management

Terms and Definitions

Term Definition Source Digital operational resilience The ability of a financial entity to build, assure and review its operational integrity and reliability by ensuring, either directly or indirectly through the use of services provided by ICT third-party service providers, the full range of ICT-related capabilities needed to address the security of the network and information systems which a financial entity uses, and which support the continued provision of financial services and their quality, including throughout disruptions. DORA ICT risk management framework The ICT risk management framework is part of financial entities' overall risk management system, enabling them to address ICT risk quickly, efficiently, and comprehensively and to ensure a high level of digital operational resilience. It shall include at least strategies, policies, procedures, ICT protocols and tools that are necessary to duly and adequately protect all information assets and ICT assets. DORA Art.6 Critical function A function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law. DORA Legacy ICT system An ICT system that has reached the end of its lifecycle (end-of-life), that is not suitable for upgrades or fixes, for technological or commercial reasons, or is no longer supported by its supplier or by an ICT third-party service provider, but that is still in use and supports the functions of the financial entity. DORA ICT concentration risk An exposure to individual or multiple related critical ICT third-party service providers creating a degree of dependency on such providers so that the unavailability, failure or other type of shortfall of such provider may potentially endanger the ability of a financial entity to deliver critical functions, or cause it to suffer other types of adverse effects, including large losses, or endanger the financial stability of the Union as a whole. DORA Major ICT-related incident An ICT-related incident that has a high adverse impact on the network and information systems that support critical or important functions of the financial entity. DORA Threat-led penetration testing (TLPT) A framework that mimics the tactics, techniques and procedures of real-life threat actors perceived as posing a genuine cyber threat, delivering a controlled, bespoke, intelligence-led (red team) test of the financial entity’s critical live production systems. DORA

Relevant Regulations (CDRs & CIRs)

The following Commission Delegated Regulations (CDRs) and Implementing Regulations (CIRs) supplement DORA:

  • CDR (EU) 2025/532: Regulatory technical standards specifying the elements that a financial entity has to determine and assess when subcontracting ICT services supporting critical or important functions.
  • CDR (EU) 2025/1190: Regulatory technical standards specifying the criteria used for identifying financial entities required to perform threat-led penetration testing (TLPT).
  • CDR (EU) 2025/420: Regulatory technical standards specifying the criteria for determining the composition of the joint examination team.
  • CIR (EU) 2025/302: Implementing technical standards for the application of Regulation (EU) 2022/2554 with regard to standard forms, templates, and procedures for financial entities to report a major ICT-related incident.
  • CDR (EU) 2025/301: Regulatory technical standards specifying the content and time limits for the initial notification of, and intermediate and final report on, major ICT-related incidents.
  • CIR (EU) 2024/2956: Implementing technical standards for the application of Regulation (EU) 2022/2554 with regard to standard templates for the register of information.
  • CDR (EU) 2024/1774: Regulatory technical standards specifying ICT risk management tools, methods, processes, and policies and the simplified ICT risk management framework.

Planning and Implementation

Maturity Levels

Level Definition & Criteria 0. Non-existent No attention has been paid to this control measure. No or limited control measures implemented. 1. Initial The control measure is (partially) defined, but is implemented inconsistently. There is a great deal of dependence on individuals. 2. Repeatable but informal The control measure is in place and implemented in a consistent, structured, but informal manner. There is limited evidence of design and existence. 3. Defined The design of the control measure is documented and implemented in a structured and formalised manner. The required effectiveness of the control measure is demonstrable and is tested. 4. Effective and measurable In addition to the effectiveness of individual control measures, the effectiveness of the coherence of all information security measures is also periodically evaluated. 5. Continuous improvement Continuous efforts are made to improve the effectiveness of the system of control measures by taking future risks into account.

RACI Chart (Roles and Responsibilities)

R: Responsible, A: Accountable, C: Consulted, I: Informed

Topic Mgmt Board Legal / Comp Risk / TPRM Internal Audit Procurement Cyber IT / ICT BCP HR DPO 0. DORA project mgmt ARCCICCCII 1. Governance & Oversight ARRR-CCCC- 2. ICT/DORA Strategies ACCI-RRRI- 3. Asset inventory ACC-CRRR-C 4. ICT risk management ACR--RRI-- 5. ISMS ACI--RRICI 6. ICT operations A----CRI-I 7. Incident management ARI--RRI-R 8. BCP & Crisis Mgmt ARII-RRRRI 9. Contract mgmt / RoI ARC-RCCC-C 10. TPRM ARRIRRCI-R 11. Testing (TLPT) AIIICRRR-I 12. Info-sharing ACI--R-I-I

Comprehensive DORA Implementation Checklist

1. General

xTopicTasksReference ☐ 1.1. Requirements and Guidelines Collect and study all DORA-related requirements (including Commission Delegated Regulation), ESAs’ and local authorities’ Technical Standards, Guidelines & Recommendations. Make and regularly review a list of them. DORA, CDRs/CIRs ☐ 1.2. DORA Scope Determine the boundaries and applicability of the DORA to establish its scope. Check the references in Article 16, “Simplified ICT risk management framework”. DORA: art.2, 16.1 ☐ 1.3. Proportionality principle Identify internal and external factors affecting digital operational resilience, including company size and overall risk profile, as well as the nature, scale, and complexity of services. DORA: art.4 ☐ 1.4. Introductory meeting Organise an introductory meeting with the Management Body. Make sure that the Management Body is fully supportive and committed. DORA: art.5.2a, 5.2g, 5.4 ☐ 1.5. Implementation team Gather an implementation team. Create and, if necessary, approve a DORA implementation plan and project charter. Conduct a kick-off meeting. DORA: art.5.2g ☐ 1.6. Document Management Define the requirements for managing DORA-related documentation and prepare appropriate templates. Create and maintain a register for DORA-related documents. DORA: art.6.1, 8.1

2. Internal Governance and Control Framework (IGCF)

xTopicTasksReference ☐ 2.1. Gap Analysis Conduct a Gap analysis to understand the current state of the IGCF. Guidelines (GIG) ☐ 2.2. Management body Describe (review) the information on the structure, organisation, members and responsibilities of the management body. DORA: art.5.2a,c ☐ 2.3. Committees Establish a Risk committee, Audit committee and other necessary committees (e.g., Cybersecurity, Business Continuity, Privacy). GIG ☐ 2.6. Risk management function Design and implement (review) a Risk Management Function (RMF). DORA: art.6.4 ☐ 2.8. Internal audit function Design and implement (review) an Internal Audit Function (IAF). Plan, establish, implement, and maintain an audit program to evaluate the effectiveness of the ICT RMF. DORA: art.6.4, 6.6 ☐ 2.11. Business continuity function Design and implement a Business continuity function (BCF). GIG ☐ 2.12. Executive training Conduct regular training for the management body to improve knowledge and skills in understanding ICT risks. DORA: art.5.4

3. ICT Risk Management Framework (ICT RMF)

xTopicTasksReference ☐ 3.1. Gap Analysis (ICT RMF) Conduct a Gap analysis to understand the current state of the ICT RMF. CDR 2024/1774 ☐ 3.3. Digital operational resilience strategy Plan and Design the ICT RMF. Establish a Digital operational resilience strategy, align it with the ICT strategy. DORA: art.5.2d, 6.8 ☐ 3.7. Asset inventory Identify, classify and adequately document all ICT-supported business functions, the information assets and ICT assets supporting those functions. Annually review. DORA: art.8.1, 8.4 ☐ 3.9. ICT Risk Assessment Conduct ICT Risk identification and assessment. DORA: art.8.2, 8.3 ☐ 3.10. Legacy ICT systems Annually conduct a specific ICT risk assessment on all legacy ICT systems. DORA: art.8.7 ☐ 3.11. ICT security Design, procure and implement ICT security policies, procedures, protocols and tools. Document a Statement of Applicability (SoA) if needed. DORA: art.7, 9.2 ☐ 3.13. Monitoring Implement mechanisms to promptly detect anomalous activities, including ICT network performance issues and ICT-related incidents. DORA: art.10 ☐ 3.14. ICT business continuity policy Establish an ICT business continuity policy. Determine recovery time and recovery point objectives (RTO/RPO). DORA: art.11.1 ☐ 3.19. Backup and recovery Develop and document backup and recovery policies and procedures. Regularly review and test them. DORA: art.12.1-12.3 ☐ 3.21. Threat intelligence Have in place capabilities and staff to gather information on vulnerabilities and cyber threats. DORA: art.13.1

4. Incident Management and Reporting

xTopicTasksReference ☐ 4.1. Incident management process Define, establish and implement an ICT-related incident management process, including root causes analysis and post incident review. DORA: art.17.1, 18.1 ☐ 4.2. Incident notification Define, establish and implement a process to report major ICT-related incidents to the relevant competent authority and affected client. DORA: art.19.1 ☐ 4.3. Annual costs and losses Be ready to report to the competent authorities, upon their request, an estimation of aggregated annual costs and losses caused by major ICT-related incidents. DORA: art.11.10

5. Digital Operational Resilience Testing (DORT)

xTopicTasksReference ☐ 5.1. DORT programme Establish and maintain a digital operational resilience testing programme. DORA: art.24.1 ☐ 5.2. Annual tests Annually conduct appropriate tests of all ICT systems and applications supporting critical or important functions. DORA: art.24.6 ☐ 5.3. Vulnerability assessments Conduct vulnerability assessments before any deployment or redeployment of new or existing applications and infrastructure components. DORA: art.25.2 ☐ 5.4. Threat-led penetration test (TLPT) Conduct regular (at least every 3 years) threat-led penetration tests. Get an attestation confirming that the test was performed. DORA: art.26-27

6. ICT Third-Party Risk Management (TPRM)

xTopicTasksReference ☐ 6.1. TPRM Strategy and Policy Establish a Strategy on ICT third-party risk, including a Policy on the use of ICT services supporting critical or important functions. DORA: art.28.1 ☐ 6.3. Register of contractual arrangements Fill in and maintain a register of contractual arrangements on the use of ICT services provided by ICT third-party service providers. DORA: art.28.3 ☐ 6.6. Exit strategies Prepare exit strategies for ICT services supporting critical or important function. DORA: art.28.8 ☐ 6.7. Due Diligence Integrate an extended Due Diligence procedure into the purchasing process. Identify and assess risks. DORA: art.28.4

IMPORTANT NOTICES

Disclaimer: The content provided in this article is for general informational and educational purposes only. This information is not intended to be considered legal, financial, medical, or professional advice. By accessing and using this article, you acknowledge and agree that no professional relationship or duty of care is established between you and the authors, owners, or operators. The information presented may not be current, complete, or applicable to your specific circumstances. It should not be relied upon as a substitute for seeking advice from qualified professionals in relevant fields. The authors, owners, and operators are not liable for any losses, damages, or adverse consequences resulting from your use of or reliance on the content.

Accuracy and Currency: While we endeavour to ensure accuracy, the information provided may not be current, complete, or applicable to your specific circumstances. Security threats and regulatory requirements evolve rapidly. You should conduct your own research and seek professional advice before taking any action based on this information.

EAJW © 2026 DCW Research. All rights reserved