Regulations

DORA Compliance Checklist 2026: 14 Steps to Avoid Fines (Free Template)

·12 min read

Quick answer: The Digital Operational Resilience Act (DORA) became enforceable on January 17, 2025. It requires financial entities and their ICT providers in the EU to implement strict cybersecurity, incident reporting, and resilience testing measures. Unlike GDPR, DORA is a regulation (directly applicable — no national transposition needed).

What Is DORA?

DORA (Regulation (EU) 2022/2554) establishes a unified framework for digital operational resilience across the EU financial sector. It ensures that banks, insurance companies, investment firms, and their technology providers can withstand, respond to, and recover from ICT-related disruptions and cyber threats.

Who Must Comply?

Entity TypeExamplesMust comply?
Banks & credit institutionsAll EU-licensed banksYes
Insurance & reinsuranceAll EU-regulated insurersYes
Investment firmsMiFID-regulated firmsYes
Payment institutionsPSPs, e-money issuersYes
Crypto-asset service providersMiCA-regulated entitiesYes
Crowdfunding platformsEU-regulated platformsYes
ICT third-party providersCloud providers, SaaS, fintech toolsYes (critical providers)
Microenterprises (<10 employees)Small fintechsSimplified regime

The 5 Pillars of DORA Compliance

Pillar 1: ICT Risk Management (Articles 5-16)

  • Establish a comprehensive ICT risk management framework
  • Identify, classify, and document all ICT assets and dependencies
  • Implement protection measures: encryption, access controls, patch management
  • Define detection mechanisms: monitoring, logging, anomaly detection
  • Create response & recovery plans with defined RTOs and RPOs
  • Assign a dedicated function for ICT risk management (or CISO)
  • Management body responsibility — board members are personally accountable

Pillar 2: ICT Incident Reporting (Articles 17-23)

  • Classify incidents by severity (major vs non-major)
  • Initial notification within 4 hours of classifying a major incident
  • Intermediate report within 72 hours
  • Final report within 1 month
  • Report to the competent authority (national financial regulator)
  • Voluntary reporting for significant cyber threats

Pillar 3: Digital Operational Resilience Testing (Articles 24-27)

  • Basic testing: Vulnerability assessments, network security testing, gap analyses — at least annually
  • Advanced testing (TLPT): Threat-Led Penetration Testing every 3 years for significant financial entities
  • TLPT must follow the TIBER-EU framework
  • Tests must cover critical ICT systems and be performed by qualified independent testers

Pillar 4: Third-Party Risk Management (Articles 28-44)

  • Maintain a register of all ICT third-party contracts
  • Perform due diligence before contracting with ICT providers
  • Include mandatory contractual clauses: audit rights, incident notification, subcontracting limits, exit strategies
  • Critical ICT providers (designated by ESAs) are subject to direct EU-level oversight
  • Concentration risk assessment — avoid over-dependence on a single provider

Pillar 5: Information Sharing (Article 45)

  • Participate in voluntary cyber threat intelligence sharing arrangements
  • Share anonymized threat data with peers and authorities
  • Establish information exchange agreements with appropriate safeguards

DORA Compliance Checklist

#ActionPillarPriority
1Appoint ICT risk management function / CISO1Critical
2Document all ICT assets, systems, and dependencies1Critical
3Create/update ICT risk management policy1Critical
4Implement incident classification framework2Critical
5Set up 4-hour incident notification process2Critical
6Build ICT third-party provider register4High
7Review all ICT contracts for DORA-required clauses4High
8Conduct annual resilience testing program3High
9Assess concentration risk for critical providers4High
10Train board/management on ICT risk responsibilities1High
11Define business continuity & disaster recovery plans1High
12Plan first TLPT (if significant entity)3Medium
13Establish information sharing arrangements5Medium
14Review exit strategies for critical ICT providers4Medium

DORA vs GDPR vs NIS2: Key Differences

AspectDORAGDPRNIS2
FocusFinancial sector ICT resiliencePersonal data protectionNetwork & information security
ScopeFinancial entities + their ICT providersAll organizations processing EU personal dataEssential & important entities (broad sectors)
TypeRegulation (directly applicable)Regulation (directly applicable)Directive (requires national transposition)
Incident reporting4 hours (initial), 72h, 1 month72 hours to DPA24 hours (early warning), 72h, 1 month
FinesUp to 1% of avg daily worldwide turnover (critical providers: up to €5M)Up to €20M or 4% of revenueUp to €10M or 2% of revenue
TestingAnnual + TLPT every 3 yearsNo specific testing requirementRisk-appropriate measures

Impact on Website Compliance

If you're a financial entity or an ICT provider to the financial sector, DORA impacts your website and online services:

  • Security headers: Mandatory implementation of CSP, HSTS, X-Frame-Options — scan your headers with PrivacyChecker
  • Third-party scripts: Every external dependency (analytics, fonts, CDNs) must be documented and risk-assessed
  • Incident response: Your website is a critical ICT system — downtime and breaches must be reported
  • Penetration testing: Customer-facing web applications must be included in resilience testing

Frequently Asked Questions

Does DORA apply to fintech startups?

Yes, if you're an EU-regulated financial entity (even a small payment institution or e-money issuer). However, microenterprises (<10 employees, <€2M turnover) benefit from asimplified ICT risk management framework under Article 16.

Does DORA apply to SaaS providers used by banks?

Yes. If your SaaS product is used by financial entities for critical or important functions, you're an "ICT third-party service provider" under DORA. You must be prepared for: contractual audit rights, incident notification obligations, and possibly direct oversight by European Supervisory Authorities (if designated as "critical").

What are the fines for DORA non-compliance?

Individual financial entities face enforcement by their national regulator (which can impose fines, suspend activities, or revoke licenses). Critical ICT third-party providers face fines of up to1% of average daily worldwide turnover per day, or up to €5 millionfor natural persons.

Check your website now — free

Run a complete privacy audit in under 60 seconds. Get your score, find issues, and learn how to fix them.

Start Free Audit