Compliance & Regulations/European Union/DORA
Banking & Finance · European Union — financial entities and their critical ICT third-party providers

DORA

The EU Digital Operational Resilience Act — applies directly to financial entities and designates critical ICT third-party providers as supervised.

Regulator
European Supervisory Authorities (EBA, ESMA, EIOPA) + national competent authorities
Jurisdiction
European Union — financial entities and their critical ICT third-party providers
Status
Active.
In force since
17 January 2025
Regulator's source
Who it applies to

Banks, insurers, investment firms, payment institutions, crypto-asset service providers, plus critical ICT third-party providers.

Penalties

Administrative penalties per Member State; critical third parties up to 1% global daily turnover per day of non-compliance.

What it requires

What DORA actually requires.

These are the obligations a regulated entity owes — the things an assessor or supervisor will ask about.

01

ICT risk management framework with board accountability.

02

Major ICT incident reporting per Commission Delegated Regulation thresholds (24/72/30 milestones).

03

Threat-Led Penetration Testing (TLPT) every three years for significant entities (TIBER-EU compatible).

04

ICT third-party risk register including all contracts and subcontracting chains.

05

Critical ICT providers subject to EU oversight framework (lead overseer model).

06

Information and intelligence sharing within and across financial sector communities.

How Safeguard maps to it

Pre-mapped controls. Continuous evidence.

Each requirement above is bound to live telemetry — not screenshots. The mapping below is what your auditor or regulator sees.

ICT risk register with subcontracting chain visualisation.

Major incident classification engine with Commission Delegated Regulation thresholds.

TLPT scoping and evidence repository with TIBER-EU alignment.

Critical ICT third-party register with renewal cadence.

Intelligence sharing pipeline via STIX/TAXII connectors.

Evidence we produce

Artifacts your auditor accepts.

Each evidence artifact is signed and timestamped. Auditors can verify integrity without trusting Safeguard.

ICT risk management framework documentation.

Major incident report — pre-populated per ESMA/EBA/EIOPA template.

TLPT evidence package.

Register of all ICT contracts and subcontractors.

Ready for DORA?

Bring the framework. We'll walk the controls with you — section by section, evidence packet by evidence packet, with the regulators you actually have to answer to.

Safeguard | Software Supply Chain Security Platform | Zero CVE + Self-Healing