DORA Third-Party Risk Register Template

Photo of author
Written By Chris Ekai
Key Takeaways
DORA Article 28 requires every EU-regulated financial entity to maintain a Register of Information (RoI) covering all ICT third-party contractual arrangements, with mandatory annual reporting to competent authorities.
The ESA template structures the RoI across 15 interlinked tables with over 60 mandatory data fields, covering provider identity, contract terms, criticality assessments, data locations, and sub-outsourcing chains.
A practical DORA third-party risk register maps each ESA table to internal risk management fields including inherent risk scores, residual risk ratings, KRIs, and control effectiveness measures.
Penalties for non-compliance can reach up to 2% of annual worldwide turnover for financial entities and 1% of average daily worldwide turnover for designated critical ICT providers.
Organizations already ISO 27001-certified are approximately 80% ready for DORA compliance but must close gaps in contractual clause requirements, exit strategies, and sub-outsourcing oversight.
Competent authorities must submit completed RoI data to ESAs by 31 March 2026, making the current window critical for register build-out and validation.
A structured 90-day implementation roadmap moves teams from ICT provider inventory through risk scoring and operational reporting within a single quarter.

According to Deloitte research, 46% of financial institutions rank the Register of Information as the single most challenging component of DORA compliance.

That statistic exposes a gap between regulatory intent and operational readiness that grows more urgent every quarter.

The Digital Operational Resilience Act (DORA) became enforceable on 17 January 2025, and competent authorities across the EU must forward completed register of information submissions to the European Supervisory Authorities by 31 March 2026.

Financial entities that still rely on ad-hoc spreadsheets or fragmented vendor lists face material compliance and penalty exposure.

This guide provides a practitioner-ready DORA third-party risk register template that maps the ESA’s 15-table structure to a usable risk register format.

The template covers every mandatory field under Article 28, adds risk-scoring columns aligned with ISO 31000, and includes a 90-day implementation roadmap so your team can move from inventory to operational reporting in a single quarter.

The article walks through each register component, explains the criticality assessment methodology, provides worked KRI examples, and highlights the pitfalls that trip up first-time filers.

Every table and field mapping is designed for direct use in your third-party risk management programme.

What DORA Article 28 Requires for ICT Third-Party Risk

DORA establishes five core pillars: ICT risk management, incident reporting, resilience testing, third-party risk management, and cyber threat information sharing.

The third-party pillar carries particular weight because financial entities increasingly depend on external ICT providers for critical functions ranging from cloud hosting to payment processing.

Article 28 mandates that every financial entity shall maintain and update, at entity level and at sub-consolidated and consolidated levels, a register of information covering all contractual arrangements with ICT third-party service providers.

The register is not a passive compliance document. DORA assigns it three active roles: an internal monitoring tool for the financial entity, a supervisory data source for competent authorities, and a foundation for the ESAs’ designation of Critical ICT Third-Party Providers (CTPPs).

In November 2025, the ESAs designated 19 CTPPs, including AWS, Microsoft Azure, and Google Cloud, triggering direct EU-level oversight for the first time. Entities that contract with designated CTPPs face heightened scrutiny of their register entries and risk assessment documentation.

Scope of Entities Covered

DORA applies to 21 categories of financial entities, spanning banks, insurers, investment firms, payment institutions, crypto-asset service providers, and more. The regulation also covers ICT intra-group service providers, meaning that shared-services centres within financial groups must appear in the register.

A solid understanding of your enterprise risk management framework is foundational before mapping DORA-specific requirements.

Entity CategoryExamplesRoI Obligation
Credit institutionsBanks, building societiesEntity, sub-consolidated, and consolidated RoI
Insurance undertakingsLife/non-life insurers, reinsurersEntity and group-level RoI
Investment firmsAsset managers, broker-dealersEntity-level RoI (consolidated if part of group)
Payment & e-money institutionsPSPs, digital walletsEntity-level RoI
Crypto-asset service providersExchanges, custodiansEntity-level RoI
ICT intra-group providersShared-services IT centresMust appear as provider in parent entity’s RoI

The ESA Register of Information: 15-Table Structure

Commission Implementing Regulation (EU) 2024/2956 specifies the template that all financial entities must follow.

The register is a multi-table relational data model, not a single flat spreadsheet. Each table links to others through primary and foreign keys, enabling regulators to trace relationships from entity-level governance down to individual subcontractor arrangements.

Understanding this structure is essential for building a compliance risk assessment that holds up under supervisory review.

Table IDTable NamePurpose
B_01.01Entity identificationLegal entity identifier (LEI), name, entity type, consolidation scope
B_01.02Entity branch identificationBranch-level details for entities operating across jurisdictions
B_02.01Contractual arrangement generalContract reference ID, start/end dates, governing law, renewal terms
B_02.02Contractual arrangement linked to functionMaps each contract to the critical/important function it supports
B_02.03Contractual arrangement ICT servicesDetailed description of each ICT service, data classification, hosting model
B_03.01ICT third-party provider identificationProvider LEI, name, registration country, parent company structure
B_03.02ICT third-party provider additionalProvider certifications (ISO 27001, SOC 2), audit rights, data centres
B_03.03ICT third-party provider linked to entityRelationship type, first engagement date, provider criticality for the entity
B_04.01Function identificationList of critical/important functions with business-line mapping
B_05.01Sub-outsourcing arrangement generalSub-outsourcing contract ID, tier, scope of services delegated
B_05.02Sub-outsourcing ICT servicesICT services delivered by sub-outsourcers, data locations, oversight model
B_06.01Assessment of criticality or importanceCriticality score, substitutability, impact of disruption on critical functions
B_07.01Costs and feesAnnual cost, fee structure, cost as percentage of ICT budget
B_99.01Data quality and reconciliationValidation flags, reconciliation status, last-updated timestamp
B_99.02Reporting informationReporting reference date, submission entity, consolidation level

Each table includes mandatory and conditional fields. The mandatory fields form the baseline that every entity must complete.

Conditional fields activate based on the criticality assessment; contracts supporting critical or important functions trigger additional disclosure requirements around business continuity provisions, exit strategies, and subcontractor chains.

DORA Third-Party Risk Register Template: Core Fields

The ESA template captures regulatory data. A practical risk register adds risk-scoring and monitoring dimensions that transform compliance data into an active management tool.

The template below merges ESA mandatory fields with risk assessment methodology columns drawn from ISO 31000 and COSO ERM. Adapt column widths and scoring scales to your entity’s risk appetite statement.

Provider and Contract Section

FieldESA Table SourceData TypeExample EntryValidation RuleUpdate Frequency
Provider LEIB_03.0120-char alphanumeric5493001KJTIIGC8Y1R12GLEIF validationOn contract change
Provider NameB_03.01TextAmazon Web Services EMEAMatch LEI registerAnnual
Contract Reference IDB_02.01Internal codeICT-2025-AWS-001Unique within entityOn creation
Contract Start DateB_02.01ISO 8601 date2024-01-15Cannot be future for activeOn execution
Contract End DateB_02.01ISO 8601 date2027-01-14Must be after start dateOn renewal
Governing LawB_02.01ISO 3166 country codeIE (Ireland)Valid country codeOn contract change

Criticality and Risk Scoring Section

DORA requires a formal assessment of whether each ICT service supports a critical or important function.

The template below adds inherent and residual risk scores using a 5×5 risk assessment matrix so your team can prioritize oversight resources and set KRI thresholds that drive escalation.

Risk DimensionScore 1 (Very Low)Score 2 (Low)Score 3 (Medium)Score 4 (High)Score 5 (Critical)Weight
Business impact of disruptionMinimal, <1hr RTOLow, 1-4hr RTOModerate, 4-8hr RTOSignificant, 8-24hr RTOSevere, >24hr RTO30%
Substitutability of providerMultiple alternatives2-3 alternativesLimited alternativesSingle realistic alternativeNo alternative exists20%
Data sensitivityPublic data onlyInternal dataConfidential dataRestricted/PIIRegulated financial data20%
Concentration risk<5% of ICT budget5-10% of budget10-20% of budget20-35% of budget>35% of ICT budget15%
Subcontracting depthNo sub-outsourcing1 tier, full visibility2 tiers, partial visibility3+ tiers, limited visibilityUnknown chain15%

The weighted score produces a composite risk rating that maps directly to oversight intensity.

Scores of 1.0-2.0 fall within risk tolerance and require standard annual review. Scores of 2.1-3.5 trigger enhanced monitoring with quarterly reviews. Scores above 3.5 demand monthly oversight, board reporting, and active risk mitigation plans.

Key Risk Indicators for DORA Third-Party Monitoring

Static registers decay in value unless connected to live monitoring. The table below defines key risk indicators calibrated to DORA’s third-party requirements.

Each KRI includes green/amber/red thresholds and an escalation path aligned with the three lines model. Feed these into your KRI dashboard for real-time visibility.

KRI NameData SourceGreenAmberRedEscalation Path
RoI completeness rateRegister vs. contract inventory>95%85-95%<85%2nd Line risk to CRO
Critical provider SLA breach rateService monitoring tools<2%2-5%>5%1st Line ops to CISO
Sub-outsourcing visibilityProvider disclosures100% mapped80-99% mapped<80% mappedVendor management to CRO
Contract renewal without risk reviewContract management system0 instances1-2 instances>2 instancesCompliance to board risk committee
Days since last provider auditAudit schedule<365 days365-450 days>450 daysInternal audit to audit committee
ICT budget concentration (top provider)Finance/procurement data<15%15-25%>25%CFO and CRO joint escalation
Exit strategy readiness scoreBCM assessments>80%60-80%<60%BCM lead to operational resilience committee

Aligning DORA with ISO 27001 and NIST CSF 2.0

Organizations holding ISO 27001 certification have a head start. Research from GRC Solutions indicates that ISO 27001-certified entities cover approximately 80% of DORA’s requirements through existing controls for information security management.

The gap sits primarily in three areas: prescriptive contractual clauses for ICT providers, mandatory exit strategies, and structured sub-outsourcing oversight.

A mapped approach avoids duplicate controls and reduces compliance cost. The table below cross-references DORA articles to ISO 27001 controls and NIST CSF 2.0 functions.

DORA RequirementISO 27001:2022 ControlNIST CSF 2.0 FunctionGap Action Required
Article 28: Register of InformationA.5.19-5.22 (Supplier relationships)GV.SC (Supply Chain)Build RoI template with ESA fields; automate data feeds
Article 29: Preliminary assessmentA.5.19 (Supplier assessment)ID.SC-3 (Assessment)Add DORA-specific criteria to vendor onboarding checklist
Article 30: Key contractual provisionsA.5.20 (Contract clauses)GV.SC-5 (Agreements)Embed mandatory DORA clauses in contract templates
Article 31: Concentration riskNo direct equivalentGV.SC-7 (Concentration)Develop concentration risk model and thresholds
Article 32: Exit strategiesA.5.21 (Transition planning)PR.IP (Protection processes)Draft exit playbooks for each critical provider
Resilience testing (Art. 26-27)A.8.8 (Vulnerability management)PR.PT / DE.CM (Testing)Extend pen-test scope to include provider interfaces

Building Your DORA Third-Party Risk Register: Step-by-Step

A phased build prevents scope paralysis. The following six-step process moves from raw provider data to a submission-ready register, incorporating lessons from first-wave filers and regulatory feedback from competent authorities.

Anchor each step in your risk management process to ensure consistency.

Step 1: Complete ICT Provider Inventory

Start with procurement, accounts payable, and IT asset management data. Cross-reference against cloud subscription consoles (AWS, Azure, GCP), SaaS licence databases, and IT risk management inventories.

The goal is a single, deduplicated list of every entity providing ICT services, including intra-group providers.

Step 2: Map Contracts to Critical Functions

Link each provider to the critical or important functions they support using table B_04.01 as the anchor.

A business impact analysis should already exist for your entity’s critical functions. Map providers against BIA outputs to auto-populate the criticality assessment in table B_06.01. Where BIA coverage is incomplete, prioritise services that carry regulated data or support payment processing.

Step 3: Populate ESA Mandatory Fields

Work through tables B_01 to B_07 sequentially. Use LEI lookups from the GLEIF database for provider identification.

For contracts lacking explicit end dates (e.g., evergreen SaaS subscriptions), enter the next renewal/notice date and flag for review. Populate the sub-outsourcing tables (B_05) by requesting provider disclosure letters.

Step 4: Apply Risk Scoring

Layer your risk scoring methodology over the ESA data. Use the 5×5 weighted matrix from this template to generate composite scores for each provider-contract pair.

Align scoring thresholds to your entity’s risk appetite and ensure scores trigger the correct oversight intensity (standard, enhanced, or intensive).

Step 5: Connect KRIs and Reporting

Embed the KRIs from this guide into your operational risk management dashboard. Automate data feeds where possible: pull SLA breach data from service monitoring tools, contract expiry alerts from CLM systems, and budget concentration figures from finance. Set up board reporting that surfaces red-rated KRIs alongside register completeness metrics.

Step 6: Validate and Submit

Run the ESA’s validation rules against your register before submission. Check primary-foreign key integrity across all 15 tables, verify LEI validity, and confirm that conditional fields are populated for all critical/important function contracts. Use a RCSA process to self-assess the completeness and accuracy of your submission.

Implementation Roadmap

The roadmap below compresses register build-out into a single quarter. Adjust timelines based on your entity’s size and current maturity level. Align milestones with your risk management lifecycle stages.

PhaseActionsDeliverablesSuccess Metrics
Days 1-30: Discovery & InventoryComplete ICT provider inventory across all business units. Cross-reference procurement, IT asset, and cloud subscription data. Identify intra-group providers. Map providers to critical functions using existing BIA outputs.Deduplicated provider master list. Provider-to-function mapping. Gap analysis of BIA coverage.100% of known providers inventoried. >90% of critical functions mapped to providers. BIA gaps documented with remediation owners.
Days 31-60: Population & ScoringPopulate ESA tables B_01 through B_07 with mandatory fields. Validate LEIs via GLEIF. Request sub-outsourcing disclosures from providers. Apply 5×5 weighted risk scoring to each provider-contract pair. Draft exit strategies for critical providers.Populated RoI template (all 15 tables). Completed risk score for each provider. Exit strategy drafts for top-5 critical providers.>95% of mandatory fields populated. All critical providers scored. Exit strategies reviewed by BCM lead and legal.
Days 61-90: Validation & Go-LiveRun ESA validation rules. Remediate data quality issues. Connect KRI data feeds to monitoring dashboard. Conduct dry-run submission to competent authority portal. Train 1st and 2nd line teams on register maintenance procedures.Validated RoI ready for submission. Live KRI dashboard with automated feeds. Training completion records. Dry-run submission confirmation.Zero critical validation errors. KRI dashboard operational with real-time data. 100% of designated staff trained. Dry-run submitted on schedule.

Common Pitfalls and How to Avoid Them

PitfallRoot CauseRemedy
Treating the RoI as a one-off compliance exerciseRegister ownership sits with a project team that disbands after initial submissionAssign permanent register ownership to 2nd line risk function. Embed quarterly update cycles in the risk management calendar.
Incomplete sub-outsourcing chain visibilityProviders resist disclosing subcontractor details or clauses lack disclosure obligationsEmbed mandatory sub-outsourcing disclosure clauses in all new and renewed contracts. Use Article 29 preliminary assessments to verify chains.
Misclassifying critical vs. important functionsBIA not updated since pre-DORA period, or criticality criteria do not align with DORA definitionsRefresh BIA using DORA-specific criticality criteria. Cross-reference against impact tolerance assessments under operational resilience requirements.
Flat-file register that breaks relational integrityTeams build RoI in a single Excel tab without primary-foreign key relationshipsUse the 15-table relational structure from the ESA ITS. Implement data validation rules and referential integrity checks before every submission.
Ignoring concentration risk until audit findings surfaceNo systematic process for aggregating spend and dependency across providersBuild an automated concentration risk model that pulls live data from finance systems. Set thresholds at 15% (amber) and 25% (red) of ICT budget.
Missing the 31 March 2026 submission windowLate start, underestimation of data collection effort, or unclear internal deadlinesWork backward from the competent authority submission date. Set internal deadline 30 days ahead of regulatory deadline to allow for remediation.
Disconnecting the register from ongoing risk monitoringRegister data is not linked to KRIs, incident feeds, or vendor performance dashboardsIntegrate register fields with your KRI dashboard. Automate alerts for SLA breaches, contract renewals, and score threshold crossings.

The regulatory trajectory is clear: DORA’s third-party risk requirements will tighten, not loosen. The EBA’s July 2025 consultation on non-ICT third-party risk guidelines signals that the register concept will expand beyond ICT services to encompass all material outsourcing arrangements.

Financial entities building their DORA registers should design for this expansion from the start by selecting data architectures that accommodate additional provider categories and risk dimensions. The GRC framework you adopt now should be extensible enough to absorb these incoming requirements.

Direct supervision of CTPPs adds a new dynamic. The 19 providers designated in November 2025 will face ESA-led inspections, and their financial entity clients will need to demonstrate that their registers accurately reflect the services consumed, data locations, and contingency arrangements for each designated provider.

Expect competent authorities to benchmark entity-level RoI submissions against the CTPP supervision findings, creating a cross-validation loop that rewards data accuracy. Your regulatory risk management function should track these designation decisions and update register entries accordingly.

Technology will play a growing role. The current Excel-based submission format will likely migrate to xBRL-CSV or API-based reporting within 18-24 months, reflecting the ESAs’ broader digital reporting strategy.

Entities that invest in structured data models now, rather than flat spreadsheets, will avoid costly re-architecture later. Meanwhile, AI-driven risk assessment tools are beginning to automate provider risk scoring, sub-outsourcing chain mapping, and anomaly detection across register data, reducing the manual burden on 2nd line teams.

Cross-border convergence is another trend to watch. US financial regulators are closely monitoring DORA’s implementation, and the OCC’s existing third-party risk guidance (OCC 2023-17) already shares conceptual DNA with DORA’s register approach.

Global financial groups operating across EU and US jurisdictions should build unified registers that satisfy both regimes, reducing duplication and improving group-level risk quantification for boards.

The cost of compliance, estimated by Deloitte at 2-5 million euros for most institutions, is better absorbed when the register serves multiple regulatory masters simultaneously.

Ready to build your DORA third-party risk register? Visit riskpublishing.com for downloadable templates, risk management consulting services, and expert guidance on DORA compliance implementation. Contact us for a tailored assessment of your register readiness.

References

1. European Insurance and Occupational Pensions Authority (EIOPA) – Digital Operational Resilience Act

2. DORA Article 28 – General Principles for Third-Party Risk

3. European Securities and Markets Authority (ESMA) – DORA Digital Finance and Innovation

4. European Banking Authority (EBA) – Preparation for DORA Application and RoI Reporting

5. EBA – DORA Register of Information Reporting FAQ (March 2025)

6. ESMA – Final Report on Draft ITS on Register of Information (JC 2023/85)

7. ESAs – First Set of Rules Under DORA for ICT and Third-Party Risk Management

8. Morgan Lewis – Preparing for DORA: Compliance Deadline Arrives (January 2025)

9. Copla – DORA ISO 27001 Mapping: Turning Compliance into Resilience

10. GRC Solutions – How DORA Fits with ISO 27001, NIS2 and the GDPR

11. DORA Toolkit – Register of Information: A Practitioner’s Guide to All 15 Tables

12. Austrian Financial Market Authority (FMA) – DORA Managing ICT Third-Party Risk

13. AFM Netherlands – Getting Ready for DORA: Management of ICT Risk for Third Parties

14. ISO – ISO 31000:2018 Risk Management Guidelines

15. NIST – Cybersecurity Framework 2.0