An Actionable DORA Regulation Requirements Guide Covering ICT Risk, Third-Party Oversight, and Incident Reporting for US-Headquartered Firms with EU Exposure

Executive Summary

The Digital Operational Resilience Act (DORA) became fully applicable on January 17, 2025. If your US-headquartered firm operates an EU-licensed bank, investment firm, insurance company, payment institution, or asset manager, DORA applies to you now — not eventually.

This guide gives you a practical DORA compliance checklist organized across the five pillars of the regulation: ICT risk management, incident reporting, resilience testing, third-party risk, and governance.

It also maps DORA requirements against familiar US frameworks (NIST CSF, OCC Third-Party Risk Guidance, CIRCIA) so you can identify gaps without starting from scratch. The 90-day roadmap at the end gives your team a sequenced action plan with owners and outputs.

1. What Is DORA and Why Does It Matter to US Firms?

DORA — Regulation (EU) 2022/2554 — is a horizontal EU regulation that establishes binding ICT risk management, incident reporting, resilience testing, and third-party oversight requirements for financial entities operating within the European Union.

Unlike a directive, it does not require national transposition: it applies directly and uniformly across all 27 EU member states. The European Banking Authority (EBA), European Insurance and Occupational Pensions Authority (EIOPA), and European Securities and Markets Authority (ESMA) — collectively the European Supervisory Authorities (ESAs) — published the final regulatory technical standards (RTS) and implementing technical standards (ITS) in 2024, giving firms the detailed specifications needed for full implementation.

For US firms, the key insight is this: DORA does not care where your headquarters are. If your EU subsidiary, branch, or licensed entity uses your US parent’s ICT infrastructure, cloud services, or shared technology platforms, those systems and the contracts supporting them must meet DORA standards.

This creates compliance obligations that cascade upstream from the EU entity to the US parent’s ICT, procurement, legal, and risk functions.

The regulation covers roughly 22,000 financial entities across the EU. Non-compliance carries administrative sanctions up to EUR 10 million or 5% of global annual turnover for financial entities, and supervisory oversight by EU competent authorities including the possibility of on-site inspections.

For ICT providers designated as Critical Third-Party Providers (CTPPs) by the ESAs, EU Lead Overseers have direct supervisory powers. The ESA DORA Oversight Framework published in 2024 outlines how this will operate in practice.

2. Does DORA Apply to Your Organization? Scope Determination

The first step in any DORA compliance program is confirming whether and how DORA applies to your specific operations. The table below covers the most common configurations for US firms with EU exposure.

Entity TypeIn-Scope TriggerUS Firm Applicability
EU-licensed bank, insurer, or investment firmDORA Article 2 — direct obligation on financial entityUS parent with EU subsidiary: EU subsidiary is the DORA subject
US bank with EU branch (passported or direct license)EU branch operations fall under DORA regardless of US HQ locationCompliance obligation sits on the EU-licensed entity; US parent must support
ICT vendor / cloud provider serving EU financial entitiesDORA Article 31 — Critical Third-Party Provider (CTPP) designation by ESAsUS cloud and SaaS providers serving EU clients may be designated CTPPs
US asset manager or fund administrator with EU AIF/UCITS licenseMiFID II / AIFMD authorization brings DORA obligationsFull DORA compliance required for EU-regulated fund operations
US fintech with EU e-money or PSD2 licensePayment institution authorization triggers DORA Article 2(1)(f)Compliance required; ICT risk framework must meet DORA Title II standards

Table 1: DORA Scope Determination for US-Headquartered Organizations

One critical nuance: DORA applies to the EU-licensed entity, but the obligations frequently require action by the US parent.

For example, if the EU subsidiary relies on a US parent-negotiated cloud contract with AWS or Microsoft Azure, that contract must now include DORA-mandated clauses (Article 30).

The US parent’s procurement and legal teams must update master service agreements accordingly. This is not optional and is not mitigated by the fact that the contract was signed in New York under New York law.

For firms unsure whether their specific EU activity triggers DORA, the EBA’s list of financial entities subject to DORA Article 2 provides a definitive reference.

Payment institutions, e-money institutions, and crypto-asset service providers (CASPs) under MiCA are all included.

3. The Five Pillars of DORA: What Each One Requires

DORA is organized around five substantive pillars. Understanding what each pillar requires before you work through the checklist will help you prioritize effort correctly.

Pillar 1: ICT Risk Management (Articles 5-16)

This is the foundational pillar. DORA requires every in-scope financial entity to maintain a documented, Board-approved ICT risk management framework that covers the full risk lifecycle:

identification of ICT assets and threats, protection and prevention controls, detection systems, response protocols, recovery capabilities, and continuous learning. The framework must be reviewed at least annually and after every major incident.

For US firms, the closest analog is the NIST Cybersecurity Framework (CSF 2.0) or the FFIEC Cybersecurity Assessment Tool. The critical difference is that DORA is mandatory, prescriptive, and subject to EU regulatory inspection.

A firm that has implemented NIST CSF rigorously will have a significant head start, but will still need to document DORA article-by-article mapping and address specific requirements around Board accountability and ICT business continuity that are more detailed than the NIST voluntary guidance.

Our post on ICT risk management frameworks covers the technical architecture of a DORA-compliant ICT risk program, including the asset inventory and control design requirements under Articles 7–9.

Pillar 2: ICT-Related Incident Reporting (Articles 17-23)

DORA establishes a three-stage reporting regime for major ICT incidents. Stage one is an initial notification to the National Competent Authority (NCA) within four hours of classifying an incident as major.

Stage two is an intermediate report within 72 hours of the initial notification. Stage three is a final report within one month of resolving the incident, including root cause analysis and corrective actions.

The incident classification methodology is defined in RTS under Article 18, covering criteria including client impact, duration, geographic spread, data loss, and financial impact.

For US firms, this timeline is materially tighter than the OCC’s 36-hour notification requirement (OCC Bulletin 2021-35) and requires a separate reporting track to EU NCAs that most US compliance teams have not previously operated.

Pillar 3: Digital Operational Resilience Testing (Articles 24-27)

All in-scope entities must conduct annual basic resilience testing including vulnerability assessments and network security tests.

Significant financial entities — determined by size, systemic importance, and risk profile — must additionally conduct Threat-Led Penetration Testing (TLPT) every three years, aligned to the TIBER-EU framework. TLPT is a structured, intelligence-led red team exercise that tests critical systems and people simultaneously.

For US firms already conducting CBEST (UK) or CORIE (Australia) testing, TIBER-EU follows similar methodology.

The European Central Bank has published the TIBER-EU Framework Implementation Guide which provides the detailed test lifecycle. All TLPT findings must be remediated and tested again before the cycle closes.

Pillar 4: ICT Third-Party Risk Management (Articles 28-30)

This is the pillar most likely to require immediate action from US parent entities. DORA requires financial entities to maintain a register of all ICT third-party service providers, classify them by criticality, conduct pre-contract due diligence, include mandatory contract clauses (detailed in Section 6 below), monitor ongoing performance, manage concentration risk, and maintain documented exit strategies.

These requirements apply to the full vendor chain including material subcontractors.

US firms that rely on group-level contracts negotiated by the US parent for shared cloud, data center, network, or software services need to review every such contract for DORA clause compliance immediately.

Article 30 requires specific provisions that many US-standard technology contracts do not include.

Pillar 5: Information Sharing and Governance

DORA encourages — but does not mandate — participation in cyber threat intelligence sharing arrangements (Article 45).

On governance, Article 5 requires a named Board member to be accountable for ICT risk oversight, and the Board must approve the ICT risk framework, review it annually, and receive regular ICT risk reporting.

This Board-level named accountability is more explicit than most US frameworks outside of OCC Heightened Standards for large banks.

4. DORA Compliance Checklist: 30 Requirements Across Five Pillars

Use this checklist as your working compliance inventory. For each item, assign a status and an owner. Priority ratings: Critical = regulatory breach risk if not addressed; High = material gap; Medium = best practice gap. Update the status column as you complete each requirement.

DORA PillarArticleRequirementPriorityStatusOwner
ICT Risk ManagementArt. 5–16Establish a Board-approved ICT risk management framework with defined risk appetiteCritical[ ] Not started  [ ] In progress  [ ] CompleteCRO / CISO
ICT Risk ManagementArt. 6Document ICT risk management policies covering identification, protection, detection, response, and recoveryCritical[ ] Not started  [ ] In progress  [ ] CompleteCISO
ICT Risk ManagementArt. 7Maintain an up-to-date ICT asset inventory covering hardware, software, and data assetsHigh[ ] Not started  [ ] In progress  [ ] CompleteIT Operations
ICT Risk ManagementArt. 8Conduct continuous ICT risk identification and document threat landscape assessment annuallyHigh[ ] Not started  [ ] In progress  [ ] CompleteRisk / IT
ICT Risk ManagementArt. 9Implement protection and prevention controls (network segmentation, access control, encryption, patch management)Critical[ ] Not started  [ ] In progress  [ ] CompleteCISO / IT Ops
ICT Risk ManagementArt. 10Deploy continuous monitoring tools for anomalous activity; document detection playbooksHigh[ ] Not started  [ ] In progress  [ ] CompleteSOC / CISO
ICT Risk ManagementArt. 11Document ICT business continuity policy with RTO/RPO targets aligned to DORA requirementsCritical[ ] Not started  [ ] In progress  [ ] CompleteBCM / CISO
ICT Risk ManagementArt. 11Test ICT continuity plans at least annually; document exercise results and lessons learnedHigh[ ] Not started  [ ] In progress  [ ] CompleteBCM / Audit
ICT Risk ManagementArt. 12Establish data backup procedures; test restore capability; meet RPO targets for critical systemsCritical[ ] Not started  [ ] In progress  [ ] CompleteIT Ops / BCM
ICT Risk ManagementArt. 13Define ICT learning and evolving procedures: post-incident reviews, threat intelligence integrationMedium[ ] Not started  [ ] In progress  [ ] CompleteRisk / CISO
ICT Risk ManagementArt. 14Establish ICT communication plan for incidents (internal escalation + external notification)High[ ] Not started  [ ] In progress  [ ] CompleteComms / Compliance
Incident ReportingArt. 17–23Classify ICT incidents per DORA criteria: major vs. non-major; document classification methodologyCritical[ ] Not started  [ ] In progress  [ ] CompleteCRO / CISO
Incident ReportingArt. 19Submit initial notification to competent authority within 4 hours of classifying major incidentCritical[ ] Not started  [ ] In progress  [ ] CompleteCompliance / Legal
Incident ReportingArt. 19Submit intermediate report within 72 hours of initial notification (for ongoing major incidents)Critical[ ] Not started  [ ] In progress  [ ] CompleteCompliance / Legal
Incident ReportingArt. 19Submit final report within 1 month of incident resolution with root cause and corrective actionsCritical[ ] Not started  [ ] In progress  [ ] CompleteCompliance / Legal
Incident ReportingArt. 20Designate a competent national authority (NCA) contact point for each EU jurisdiction of operationHigh[ ] Not started  [ ] In progress  [ ] CompleteLegal / Compliance
Incident ReportingArt. 23Implement voluntary reporting capability for significant cyber threats that did not materializeMedium[ ] Not started  [ ] In progress  [ ] CompleteCISO / Risk
Digital Operational Resilience TestingArt. 24–27Conduct annual basic ICT resilience testing (vulnerability assessments, network security tests)High[ ] Not started  [ ] In progress  [ ] CompleteIT / Third party
Digital Operational Resilience TestingArt. 26Identify significant financial entities; conduct Threat-Led Penetration Testing (TLPT) every 3 yearsHigh[ ] Not started  [ ] In progress  [ ] CompleteCISO / Audit
Digital Operational Resilience TestingArt. 27Engage TIBER-EU framework or equivalent for TLPT execution; document scope and resultsMedium[ ] Not started  [ ] In progress  [ ] CompleteCISO / External tester
Digital Operational Resilience TestingArt. 25Document remediation plans for all critical and high findings from resilience tests; track closureHigh[ ] Not started  [ ] In progress  [ ] CompleteCISO / Risk
ICT Third-Party RiskArt. 28–30Maintain a register of all ICT third-party service providers with risk classification (critical vs. non-critical)Critical[ ] Not started  [ ] In progress  [ ] CompleteRisk / Procurement
ICT Third-Party RiskArt. 28Conduct pre-contract due diligence on ICT vendors: security posture, concentration risk, subcontractorsCritical[ ] Not started  [ ] In progress  [ ] CompleteRisk / Legal
ICT Third-Party RiskArt. 30Ensure ICT contracts include DORA mandatory clauses: audit rights, exit strategies, SLAs, data locationCritical[ ] Not started  [ ] In progress  [ ] CompleteLegal / Procurement
ICT Third-Party RiskArt. 28(5)Assess ICT concentration risk at entity and group level; document mitigation for over-reliance on single providersHigh[ ] Not started  [ ] In progress  [ ] CompleteCRO / Risk
ICT Third-Party RiskArt. 29Implement ongoing monitoring of critical ICT providers: performance, security, contractual complianceHigh[ ] Not started  [ ] In progress  [ ] CompleteRisk / IT
ICT Third-Party RiskArt. 28(8)Maintain documented exit strategies and termination plans for all critical ICT providersHigh[ ] Not started  [ ] In progress  [ ] CompleteRisk / Legal
Information SharingArt. 45Consider joining an EU-recognized cyber threat information sharing arrangement (ISAC/ISAO equivalent)Medium[ ] Not started  [ ] In progress  [ ] CompleteCISO / Risk
Governance and BoardArt. 5Assign individual Board member accountable for ICT risk oversight (DOR equivalent of CRO/CISO sponsor)Critical[ ] Not started  [ ] In progress  [ ] CompleteBoard / CEO
Governance and BoardArt. 5Ensure Board reviews and approves ICT risk framework at least annually; document board resolutionsHigh[ ] Not started  [ ] In progress  [ ] CompleteCompany Secretary
Governance and BoardArt. 16Implement simplified ICT risk management framework if entity qualifies as ‘proportionate regime’ firmMedium[ ] Not started  [ ] In progress  [ ] CompleteCRO

Table 2: DORA Compliance Checklist — 30 Requirements with Priority, Status Tracker, and Owner

5. Incident Classification: When Does the 4-Hour Clock Start?

The incident reporting timeline under DORA Article 19 starts running from the moment you classify an incident as ‘major’ — not from when the incident actually began. This means your classification methodology is itself a compliance control.

Classify too slowly, and you have missed the notification deadline. Classify incorrectly, and you face supervisory scrutiny over your methodology.

The table below summarizes the seven classification criteria from the Article 18 RTS. You should build these criteria into your incident response playbook as a mandatory decision gate.

Classification CriterionDORA Definition (Art. 18)Practical Indicator
Number of clients affectedSignificant portion of client base or any systemically important counterparties> 10% of active clients OR any payment infrastructure clients
Duration of incidentOutage or degradation exceeding threshold> 4 hours for critical services (Art. 18 RTS threshold)
Geographic spreadMulti-member state impactIncident affecting operations in 2+ EU member states
Reputational damageMaterial adverse media coverage or regulatory inquiry triggeredAny incident attracting national regulatory attention
Data loss or breachLoss, corruption, or unauthorized access to client or transaction dataAny confirmed unauthorized data access regardless of volume
Financial impactDirect financial loss above regulatory thresholdPer RTS: loss exceeding defined percentage of annual revenue
Availability impactCritical ICT service unavailableCore banking, trading, settlement, or payment systems offline

Table 3: DORA Major Incident Classification Criteria (Article 18 RTS)

Practical tip: build a simple two-step classification triage into your incident response process. Step one is a 30-minute initial assessment within one hour of detecting a significant ICT event, using the criteria above.

Step two is a 90-minute detailed classification review. This gives you time to correctly classify while still meeting the four-hour notification window, which runs from classification, not detection.

For a comprehensive incident response framework that integrates DORA notification requirements with your existing business continuity management program and IT disaster recovery plan, see our dedicated BCM guides.

6. ICT Third-Party Contracts: The Nine Mandatory DORA Clauses

Article 30 of DORA specifies a minimum set of provisions that must appear in every contract between a financial entity and an ICT third-party service provider.

For US firms, the most common gap is the audit rights clause and the exit strategy provisions, which many standard US technology contracts exclude or limit. The table below covers all nine required elements with implementation guidance.

Mandatory Contract ClauseDORA ArticleImplementation Guidance
Full description of services and service levels (SLAs)Art. 30(2)(a)Include uptime guarantees, response times, degraded-service thresholds
Locations where data will be processed and storedArt. 30(2)(b)Specify EU vs. non-EU data residency; flag US data transfers under SCCs
Data protection provisions referencing GDPRArt. 30(2)(c)Incorporate DPA / data processing agreement as schedule
Audit rights for the financial entity and competent authoritiesArt. 30(2)(d)Right to conduct on-site and remote audits; 10 business-day notice minimum
Subcontracting chain disclosureArt. 30(2)(e)Vendor must notify and obtain consent before adding material subcontractors
Termination rights and exit strategy supportArt. 30(2)(f)Minimum 12-month notice for termination; data portability obligation on vendor
ICT security requirements and incident notification obligationsArt. 30(2)(g)Vendor must notify financial entity within 4 hours of incidents affecting service
Business continuity and disaster recovery requirementsArt. 30(2)(h)Vendor must maintain BCP/DRP consistent with financial entity’s RTO/RPO
Cooperation with competent authority supervisionArt. 30(2)(i)Applies to Critical Third-Party Providers; EU Lead Overseer access rights

Table 4: DORA Article 30 Mandatory Contract Clauses with Implementation Guidance

One clause that deserves special attention for US firms is the data location requirement. DORA Article 30(2)(b) requires the contract to specify where data will be processed and stored.

If your EU entity’s data is processed in US data centers under a US parent agreement, you need to document this clearly and assess whether it is consistent with GDPR cross-border transfer requirements (Standard Contractual Clauses under Article 46 GDPR).

This is a DORA and GDPR intersection point that many US firms have not yet addressed.

For a detailed template on vendor risk due diligence that maps to DORA Article 28, see our guide on third-party risk management frameworks. For concentration risk analysis across your ICT vendor portfolio, see our post on operational risk management.

7. DORA vs. US Frameworks: Where the Gaps Actually Are

US financial institutions are not starting from zero. Most firms subject to NIST CSF, FFIEC guidance, OCC Third-Party Risk Management, or CIRCIA already have substantial ICT risk infrastructure.

The question is not whether you have controls — it is whether those controls meet DORA’s specific requirements. The table below identifies the five most important gap areas.

DomainUS FrameworkDORA RequirementGap / Action for US Firms
ICT risk frameworkNIST Cybersecurity Framework (CSF 2.0), FFIEC CAT, SR 13-19DORA Title II (Art. 5–16): mandatory framework with Board accountabilityDORA is more prescriptive; NIST is voluntary. Map CSF functions to DORA Articles 8–14
Incident reportingCISA 72-hour reporting (CIRCIA 2022), OCC notification within 36 hours (OCC 2021-35)DORA Art. 19: 4hr initial, 72hr intermediate, 1 month final (to NCAs)DORA timelines are tighter for initial notification; different recipients (NCAs not CISA)
Third-party riskOCC Third-Party Risk Guidance (2023), FFIEC guidance, SOC 2 relianceDORA Art. 28–30: prescriptive register, contract terms, exit plans; CTPP oversightDORA contractual requirements exceed OCC guidance specificity; US firms need gap review
Resilience testingPenetration testing (FFIEC, CBEST), red team exercisesDORA Art. 24–27: annual tests + TLPT every 3 years for significant entitiesTLPT under TIBER-EU is more standardized than US pen test practice; scope documentation required
GovernanceSOX IT controls, OCC Heightened Standards, ISO 27001 ISMSDORA Art. 5: named Board member accountable for ICT riskBoard-level named accountability is stronger in DORA than most US frameworks

Table 5: DORA vs. US Framework Comparison — Gap Areas for US Firms

The most commonly underestimated gap in practice is incident reporting to EU NCAs. US firms have existing relationships with the OCC, Federal Reserve, FDIC, and CISA for US incident reporting.

DORA creates a parallel track to EU supervisors — different authorities, different timelines, different report formats, and different escalation chains. You need a DORA-specific incident reporting protocol that sits alongside your US reporting process, not inside it.

For broader context on how DORA fits into global operational resilience regulation alongside the UK’s PS21/3, Australia’s CPS 230, and the US’s own evolving cyber rules, see our post on operational resilience frameworks.

8. Critical Third-Party Providers: What US Tech Firms Need to Know

DORA Article 31 empowers the ESAs to designate ICT providers as Critical Third-Party Providers (CTPPs) and subject them to direct EU supervision. This is unprecedented: it gives EU regulators supervisory reach over US technology companies that provide services to EU financial entities, regardless of where those companies are domiciled.

The ESAs have identified initial criteria for CTPP designation including systemic importance (how many EU financial entities rely on the provider), substitutability (how difficult it would be to switch), and cross-border impact.

Major US cloud providers — AWS, Microsoft Azure, Google Cloud — and critical SaaS providers are the most likely candidates for CTPP designation.

If your US firm is a technology provider to EU financial entities, you should monitor the ESA CTPP designation process closely.

Designated CTPPs must cooperate with an EU Lead Overseer, participate in oversight activities, and remediate identified vulnerabilities. The EBA DORA CTPP oversight portal provides updates on designation decisions.

9. Five DORA Implementation Mistakes US Firms Make

Mistake 1: Treating DORA as an IT Department Project

DORA is a legal compliance obligation with Board accountability requirements, contractual implications, and regulatory reporting obligations. It belongs jointly to Legal, Compliance, Risk, and IT — with Board sponsorship.

Firms that assign it solely to the CISO or IT security team routinely miss the contract review, incident reporting, and governance requirements.

Mistake 2: Assuming US Regulatory Compliance Covers EU Requirements

Meeting OCC Third-Party Risk Guidance does not mean your ICT vendor contracts meet DORA Article 30. Meeting CIRCIA incident reporting timelines does not mean you have a DORA-compliant NCA notification process.

These frameworks share goals but have different requirements, timelines, and recipients. Run a dedicated DORA gap assessment — do not rely on a US compliance certification to stand in for it.

Mistake 3: Missing the Group-Level Contract Problem

US parent entities often negotiate enterprise-wide technology contracts that EU subsidiaries then use.

Under DORA, the EU subsidiary is the financial entity with the compliance obligation, but the contract is held by the US parent. You need either to renegotiate master agreements to include DORA clauses or to enter addenda that apply DORA terms to the EU entity’s use of the services. This requires legal and procurement engagement at the parent level.

Mistake 4: Underbuilding the Incident Classification Engine

The four-hour initial notification window is unforgiving.

Firms that do not have a pre-built, tested incident classification process with clear criteria, designated decision-makers, and pre-drafted notification templates will miss this deadline in a real incident. Build and test the classification process before an incident forces you to use it.

Mistake 5: Forgetting Proportionality

DORA Article 16 provides a simplified ICT risk management regime for microenterprises and small non-complex entities.

US firms with small EU operations sometimes over-engineer their DORA response. Check whether your EU entity qualifies for the proportionate regime before building a full Pillar 1 framework — it could save significant compliance effort.

10. 90-Day DORA Readiness Roadmap

DORA has been applicable since January 17, 2025. If your firm has not yet completed a structured readiness assessment, the priority is to close the most critical gaps as quickly as possible. The roadmap below is sequenced to address regulatory breach risk first, then build the structural foundations.

PhaseLabelKey ActionsOwnerOutput
Days 1–30Scoping and Gap AssessmentIdentify all EU-licensed entities and branches; map DORA articles to existing controls; conduct structured gap assessment against the checklist in Section 4Legal + CRO + CISODORA scope register; gap assessment report with RAG ratings
Days 31–60Framework Build and Contract ReviewDraft or update ICT risk management policy; review top 10 ICT vendor contracts for DORA clause compliance; design incident classification methodologyCISO + Legal + ProcurementUpdated ICT policy; contract gap log; incident classification matrix
Days 61–90Testing, Monitoring, and Board ReportingRun first DORA-aligned resilience test (vulnerability assessment); assign Board DORA sponsor; present readiness dashboard to Board/Audit CommitteeBCM + Board Secretary + CISOTest report; Board resolution; DORA readiness dashboard

Table 6: DORA 90-Day Readiness Roadmap

A practical tip on resourcing: most US firms that have been through this process report that the legal contract review (Pillar 4, Article 30 clauses) is the longest-lead-time workstream.

If you have more than 20 critical ICT vendors, start the contract review in Month 1 even if other workstreams are still in scoping. Contract renegotiations with major technology providers can take 60 to 90 days on their own.

11. What Comes Next: DORA Supervisory Priorities for 2025-2026

EU supervisors have indicated that their initial DORA enforcement focus will be on the largest and most systemic firms — the same institutions subject to EBA stress testing and ECB SREP. However, the supervisory perimeter will expand.

The EBA’s DORA supervisory convergence work program for 2025 includes developing common supervisory methodologies, harmonizing incident classification across member states, and progressing CTPP designation.

Three developments US firms should track: first, the CTPP designation list when published by ESAs — this will determine which of your US technology vendors are subject to EU oversight.

Second, the harmonized incident reporting template under DORA Article 20 implementing technical standards — this will standardize the format of notifications to NCAs. Third, the TLPT mutual recognition framework — the ESAs are working to allow TLPT results performed in one EU member state to be recognized by NCAs in other member states, reducing testing duplication. The EBA DORA implementation timeline provides the current supervisory calendar.

For firms also navigating the EU AI Act, NIS2 Directive, and GDPR alongside DORA, see our post on AI and machine learning risk management and our enterprise risk management framework guide for an integrated compliance architecture approach.

Key External References and Regulatory Sources

  • European Parliament. (2022). Regulation (EU) 2022/2554 — Digital Operational Resilience Act (DORA). Official Journal of the EU.
  • European Banking Authority (EBA). DORA Final RTS and ITS Package — eba.europa.eu/regulation-and-policy/operational-resilience
  • European Central Bank. TIBER-EU Framework Implementation Guide — ecb.europa.eu
  • ESMA. DORA Oversight Framework for Critical ICT Third-Party Providers — esma.europa.eu
  • OCC Bulletin 2021-35: Computer-Security Incident Notification Requirements — occ.gov
  • OCC Third-Party Risk Management Guidance (2023) — occ.gov
  • NIST Cybersecurity Framework 2.0 — nvlpubs.nist.gov
  • FFIEC Cybersecurity Assessment Tool — ffiec.gov
  • CIRCIA: Cyber Incident Reporting for Critical Infrastructure Act (2022) — cisa.gov
  • Federal Reserve SR 13-19: Supervisory Guidance on Managing Outsourcing Risk — federalreserve.gov
  • ISO/IEC 27001:2022 Information Security Management Systems — iso.org
  • ISO 22301:2019 Business Continuity Management Systems — iso.org
  • Basel Committee on Banking Supervision. Principles on Operational Resilience (2021) — bis.org

Ready to Start Your DORA Compliance Program?

Start with the 30-item checklist in Section 4. Work through scoping first, then prioritize the Critical items — these carry the most significant regulatory breach risk. Assign a single senior owner for DORA program coordination (typically the CRO or General Counsel for EU operations) and report progress to the Board quarterly.

Browse our full library of practitioner-ready templates at riskpublishing.com, including BCM templates, ICT risk frameworks, third-party risk registers, and KRI dashboards designed for compliance professionals who need to move quickly.

ICT Risk Management Framework Guide | DORA Pillar 1 technical architecture and control design

Business Continuity Management (ISO 22301) | BCP templates integrating DORA ICT continuity requirements

IT Disaster Recovery Plan Guide | DRP templates with RTO/RPO aligned to DORA Article 11

Third-Party Risk Management Framework | Vendor register and due diligence templates for DORA Article 28-30

Operational Risk Management | ICT concentration risk identification and monitoring

Operational Resilience Frameworks | DORA, UK PS21/3, and global resilience regulation comparison

Key Risk Indicators: Complete Framework | KRI design for ICT and cyber risk monitoring

Enterprise Risk Management Framework | Integrating DORA into your ERM architecture

AI and Machine Learning Risk Management | KRIs for algorithmic systems subject to DORA and EU AI Act

Risk Quantification for Boards | Translating DORA compliance gaps into financial exposure for board reporting

Three Lines Model Implementation Guide | Assigning DORA ownership across first, second, and third lines

Project Risk Assessment Templates | Risk tools for DORA implementation projects

Risk Appetite Statement Development | Setting ICT risk appetite thresholds under DORA governance requirements

COSO ERM Framework Guide | Aligning DORA ICT risk framework to COSO ERM architecture

ESG Key Risk Indicators Framework | For firms navigating DORA alongside EU sustainability disclosure requirements

References

1. European Parliament and Council. (2022). Regulation (EU) 2022/2554 on Digital Operational Resilience for the Financial Sector (DORA). Official Journal of the European Union.

2. European Banking Authority. (2024). Final Report: Draft RTS on ICT Risk Management Framework under DORA Articles 15 and 16. EBA.

3. European Central Bank. (2018). TIBER-EU: Framework for Threat Intelligence-Based Ethical Red Teaming. ECB.

4. ESAs Joint Committee. (2024). Final Report on DORA Oversight Framework for Critical ICT Third-Party Providers. ESMA.

5. Office of the Comptroller of the Currency. (2021). OCC Bulletin 2021-35: Computer-Security Incident Notification Requirements. OCC.

6. OCC, Federal Reserve, FDIC. (2023). Interagency Guidance on Third-Party Relationships: Risk Management. OCC.

7. NIST. (2024). Cybersecurity Framework 2.0. National Institute of Standards and Technology.

8. CISA. (2022). Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA). CISA.

9. Basel Committee on Banking Supervision. (2021). Principles for Operational Resilience. BIS.

10. ISO. (2022). ISO/IEC 27001:2022 Information Security Management Systems — Requirements. ISO.

11. ISO. (2019). ISO 22301:2019 Security and Resilience — Business Continuity Management Systems. ISO.

12. Federal Reserve. (2013). SR 13-19: Guidance on Managing Outsourcing Risk. Board of Governors.

13. FFIEC. (2015). Cybersecurity Assessment Tool. Federal Financial Institutions Examination Council.