The Digital Operational Resilience Act has been fully applicable since January 17, 2025. For financial entities that deferred DORA readiness work pending final RTS publication, that date was a hard stop. For those that began compliance programs in 2023 or 2024, 2026 is the year where supervisory scrutiny intensifies and early enforcement decisions begin shaping how the regulation is interpreted in practice.

ICT risk management is DORA's foundational pillar. Everything else โ€” incident reporting, resilience testing, third-party risk management โ€” is built on the assumption that financial entities have a functioning, documented ICT risk management framework in place. If that foundation is weak, nothing else can be compliant.

This guide provides a complete breakdown of what DORA Chapter II actually requires, how the January 2025 RTS translate those requirements into specific tools and processes, and how compliance teams should approach ongoing monitoring of this evolving regulatory area.

What DORA Requires for ICT Risk Management

Chapter II of DORA (Articles 5โ€“16) establishes the ICT risk management framework requirements. The core obligation is straightforward: financial entities must have a comprehensive, documented, and regularly reviewed ICT risk management framework. What makes implementation complex is the specificity of what that framework must contain.

Article 5 of DORA establishes the governance foundation. The management body of the financial entity โ€” not the CTO, not the CISO, but the board-level management body โ€” bears ultimate responsibility for ICT risk management. Specifically, Article 5 requires the management body to:

The board-level accountability in Article 5 is not ceremonial. The RTS specify that management body members must undertake regular training on ICT risk. Supervisors will assess whether boards genuinely understand ICT risk or are merely rubber-stamping management submissions.

Article 6 of DORA describes the ICT risk management framework itself โ€” what it must contain, how it must be documented, and how it must evolve. The framework must be documented in a dedicated ICT risk management policy that is reviewed at least annually and after every major ICT incident or major change to the ICT infrastructure.

"DORA's ICT risk management framework is not a checklist. It's an integrated system of controls where each layer feeds into the next. A gap in identification means you can't protect what you don't know you have. A gap in detection means incidents escalate unnoticed. Supervisors are looking for coherence across all five layers, not box-ticking on individual requirements."

The practical challenge for many financial entities is that DORA's requirements consolidate and formalize what was previously scattered across different frameworks (ISO 27001, NIST CSF, EBA ICT Guidelines). The resulting DORA ICT risk management framework must be a single, coherent document โ€” not a collection of existing policies with a DORA label appended.

The 5-Layer ICT Risk Management Framework

DORA's ICT risk management framework is most practically understood as five interconnected layers, each addressing a different phase of the risk lifecycle. The RTS provide detailed requirements for each layer.

Layer 1: Governance and Organization (Article 5)

The foundation of the framework. Requirements include:

The governance layer is where DORA departs most sharply from prior ICT guidance. Earlier EBA ICT Guidelines placed responsibility with senior management. DORA places ultimate accountability at management body level. This distinction has significant implications for how compliance teams document and report ICT risk โ€” the audience is now the board, not just the CTO.

Layer 2: Risk Identification and Classification (Articles 8โ€“9)

Financial entities must maintain a complete, up-to-date inventory of all ICT assets โ€” hardware, software, data, and network infrastructure โ€” and classify them by criticality. Article 8 of DORA requires:

Article 9 of DORA extends the identification requirement to ICT risks themselves: entities must continuously identify and document ICT risks associated with each asset, including risks arising from third-party dependencies and from the interconnection of ICT systems across the entity and with external providers. Risk assessments must be conducted after every significant change to the ICT environment and at least annually for all assets.

Layer 3: Protection and Prevention (Articles 9โ€“10)

Once identified, ICT risks must be addressed through protection and prevention controls. The RTS published in January 2025 provide granular requirements in this area. Key controls mandated by Article 9(4) of DORA include:

The January 2025 RTS also specify requirements for ICT project management and change management โ€” all significant changes to ICT systems must go through a documented change control process that includes ICT risk assessment before implementation.

Layer 4: Detection (Article 10)

Article 10 of DORA requires financial entities to implement mechanisms to promptly detect anomalous activities, including ICT-related incidents and potential vulnerabilities. Detection requirements include:

The detection layer connects directly to DORA's incident reporting obligations under Chapter III (Articles 17โ€“23). An entity that cannot demonstrate effective detection mechanisms will face questions about whether its incident reports are complete and timely.

Layer 5: Response and Recovery (Articles 11โ€“12)

Article 11 of DORA requires financial entities to have documented ICT Business Continuity and Disaster Recovery (BC/DR) plans that have been tested. Specific requirements include:

Article 12 of DORA separately addresses backup policies: financial entities must maintain backup systems for all critical data and ICT systems, with backup copies stored in a geographically separate location from primary systems and tested regularly. The RTS specify minimum backup frequency based on data criticality classification. For detailed implementation guidance, see also our DORA compliance guide.

Key RTS Requirements (January 2025)

The Commission Delegated Regulation specifying the RTS on ICT risk management tools, methods, processes and policies was published on January 17, 2025, the same day DORA came into full application. Developed jointly by EBA, ESMA, and EIOPA, the RTS translate DORA's framework-level requirements into operational specifics.

ICT Asset Register Standards

The RTS specify that the ICT asset register must include, for each asset: asset type, asset name, business function(s) supported, owner/responsible party, location, interdependencies with other assets, third-party provider(s) if applicable, and classification (critical/important vs. non-critical). The register must be maintained in a format accessible for supervisory review and updated within defined timelines when changes occur.

ICT Risk Appetite Specification

The RTS require the ICT risk appetite statement to include quantitative and qualitative tolerances for: system availability (expressed as maximum permitted downtime per period for each critical system), data integrity failures (maximum acceptable data loss), cybersecurity incidents (response time thresholds), and third-party ICT failures (concentration risk limits). The risk appetite statement must be reviewed at least annually and cascaded into specific ICT risk limits for individual business lines and systems.

Vulnerability and Patch Management

One of the more operationally demanding RTS requirements. Financial entities must:

Cryptographic Key Management

The RTS specify that financial entities must have a documented cryptographic key management policy covering: key generation, storage, distribution, rotation, revocation, and destruction. Keys used for critical systems must be rotated at least annually. Hardware Security Modules (HSMs) must be used for cryptographic operations on critical systems where operationally feasible.

Third-Party ICT Risk: The CTPP Register

DORA Chapter V (Articles 28โ€“44) addresses ICT third-party risk management, but the foundation is laid in Chapter II: Article 8's requirement to include third-party assets in the ICT asset register, and Article 9's requirement to assess risks arising from third-party dependencies.

The Critical Third-Party Provider (CTPP) framework is DORA's most structurally novel contribution to financial regulation. Under Article 31 of DORA, the ESAs jointly designate ICT third-party service providers as "critical" based on systemic importance. As of early 2026, the Lead Overseer framework is operational and the first cohort of CTPPs has been designated.

For financial entities, CTPP designation of a provider has direct compliance implications:

The CTPP register maintained by the ESAs is a key document for compliance teams to monitor. CTPP designations are published by the Joint ESA Committee and affect the contractual obligations of every financial entity using those services. For a broader view of how regulatory monitoring tools support this kind of ongoing obligation, see our analysis of regulatory monitoring software for compliance teams.

The Third-Party Register

Under Article 28(3) of DORA, financial entities must maintain a register of all contractual arrangements with ICT third-party service providers. This register must include: provider name and location, services provided, classification (critical/important function vs. non-critical), contract start and end dates, and concentration risk indicators. The register must be submitted to the competent authority upon request and is subject to supervisory review.

For complex financial groups with dozens or hundreds of ICT vendor relationships, maintaining this register is a significant data management exercise. The register must also capture changes โ€” new contracts, renewals, terminations โ€” in real time.

Penalties for Non-Compliance

DORA Article 50 requires member states to establish administrative penalties and remedial measures for violations of DORA that are "effective, proportionate, and dissuasive." The specific penalty levels are set at the national level, but the regulation provides minimum standards.

Financial Entity Penalties

For most financial entities, the competent authority can impose:

In practice, the 1% daily penalty is the mechanism most likely to be used in cases of persistent non-compliance with ICT risk management requirements. A large institution with โ‚ฌ10 billion in annual revenue has average daily turnover of approximately โ‚ฌ27 million โ€” meaning daily penalties of up to โ‚ฌ270,000 for an ongoing violation.

CTPP Penalties

For Critical Third-Party Providers, Article 55 of DORA gives the Lead Overseer authority to impose periodic penalty payments of up to 1% of average daily global turnover for each day of non-compliance, applicable for up to six months. Given that major cloud providers designated as CTPPs generate tens of billions in annual revenue, these penalties represent a significant deterrent even in percentage terms.

Individual Liability

DORA also introduces individual liability exposure for management body members. Where an infringement results from intentional misconduct or gross negligence by management body members, national authorities may impose personal fines. The maximum levels vary by member state, but the principle โ€” that ICT risk management failures can result in personal consequences for board members โ€” is a significant departure from prior practice in financial regulation.

These penalty structures underscore why Article 5's board-level accountability is so significant. Board members who cannot demonstrate active oversight of ICT risk are now personally exposed if a major failure occurs. The practical response is more frequent, more substantive board-level ICT risk reporting โ€” and consequently, greater demand from boards for clear, accessible regulatory intelligence.

Simplified vs. Enhanced ICT Risk Framework

DORA recognizes that a single framework applied uniformly to a global systemically important bank and a small payment institution would be disproportionate. The regulation therefore distinguishes between the enhanced ICT risk management framework (the full Chapter II requirements) and a simplified framework under Article 16.

Who Qualifies for the Simplified Framework?

Article 16 of DORA allows competent authorities to designate certain financial entities as "small and non-interconnected" for DORA purposes, qualifying them for a simplified ICT risk management framework. The criteria for this designation include:

Entities qualifying for the simplified framework still must implement an ICT risk management framework, but with reduced documentation and governance requirements. A separate set of RTS โ€” published alongside the main DORA RTS in January 2025 โ€” specifies the simplified framework requirements.

Key Differences: Enhanced vs. Simplified

The main differences between the enhanced and simplified frameworks:

The simplified framework is not a "light touch" exemption from DORA. It is a proportionate application of the same principles. Entities that initially qualify for simplified treatment should monitor their growth and cross-border expansion, as these factors can cause them to transition to the enhanced framework โ€” requiring significant additional compliance work. For a broader overview of how AI is transforming compliance approaches, see our analysis on AI in compliance monitoring.

Automating DORA Compliance Monitoring

DORA is unusual among EU financial regulations in that its compliance obligation does not end at implementation. The regulation's emphasis on ongoing review, continuous monitoring, and regular updating of frameworks means that DORA compliance is inherently a live, ongoing activity โ€” not a project with a completion date.

What Needs to Be Monitored

For a DORA-compliant entity, the regulatory monitoring workload includes:

The Case for Automated Monitoring

Manual monitoring of DORA regulatory developments is not scalable. EBA alone published over 200 documents in 2024 related to DORA implementation. ESMA and EIOPA added further volumes. At the NCA level, 27 member state regulators may each publish DORA-related guidance at any time.

Compliance teams that relied on manual monitoring during the DORA run-up report that tracking publications across all relevant sources required multiple full-time team members. For most financial entities, that resource allocation is unsustainable once DORA is in full application and operational teams are also consuming compliance capacity.

The practical solution is automated regulatory intelligence. RegPulse monitors EBA, ESMA, EIOPA, the European Commission, and all 27 EU NCAs for DORA-related publications in real time. When the Joint ESA Committee designates a new CTPP, when EBA publishes updated Q&As on ICT risk management, or when a national supervisor issues enforcement guidance, compliance teams receive the alert the same day โ€” not after a weekly manual scan of 20+ regulatory websites.

For financial entities implementing DORA's ICT risk management framework, this kind of monitoring infrastructure is not a luxury. It is the mechanism by which the ongoing review obligations in Article 6(5) โ€” "the ICT risk management framework shall be reviewed at least once a year" โ€” can actually be met with current information, rather than a 12-month-old snapshot of the regulatory landscape.

Frequently Asked Questions

What is DORA's ICT risk management framework?
DORA's ICT risk management framework is established in Chapter II of the Digital Operational Resilience Act (Articles 5โ€“16). It requires financial entities to implement a comprehensive, documented ICT risk management framework consisting of five interconnected layers: governance and organization (Article 5), risk identification and classification (Articles 8โ€“9), protection and prevention (Article 9), detection (Article 10), and response and recovery (Articles 11โ€“12). The framework must be reviewed at least annually and after every major ICT incident. January 2025 RTS published by EBA, ESMA, and EIOPA specify the detailed tools, methods, and processes required for each layer.
Who must comply with DORA ICT requirements?
DORA applies to a broad range of financial entities as defined in Article 2(1) of the regulation, including: credit institutions, payment institutions, electronic money institutions, investment firms, crypto-asset service providers (CASPs) under MiCA, central counterparties, trading venues, AIFMs and UCITS management companies, insurance and reinsurance undertakings, credit rating agencies, and ICT third-party service providers designated as Critical Third-Party Providers (CTPPs). Simplified ICT risk management requirements under Article 16 apply to entities designated as small and non-interconnected by their competent authority.
What are the DORA RTS on ICT risk management?
The DORA RTS on ICT risk management tools, methods, processes and policies were published on January 17, 2025, the same date DORA became fully applicable. Developed jointly by EBA, ESMA, and EIOPA, they specify detailed requirements for: ICT asset management and classification, ICT risk appetite statements, vulnerability and patch management (including specific patching timelines by severity), network security and segmentation, cryptographic controls and key management, capacity and performance management, and physical security of ICT infrastructure. A separate simplified RTS applies to entities covered by Article 16.
What penalties does DORA impose for non-compliance?
DORA Article 50 requires effective, proportionate, and dissuasive penalties at the national level. For most financial entities, administrative penalties can reach up to 1% of average daily worldwide turnover for each day of ongoing violation (for up to six months), or up to 2% of total annual turnover for significant breaches. For Critical Third-Party Providers (CTPPs) under Article 55, the Lead Overseer can impose penalties of up to 1% of average daily global turnover per day of non-compliance. DORA also provides for reputational sanctions (public naming) and temporary prohibition of responsible management body members from exercising management functions.
How can financial entities automate DORA compliance monitoring?
DORA compliance monitoring requires tracking regulatory updates from multiple sources simultaneously: EBA, ESMA, EIOPA, the European Commission, and national competent authorities in each relevant EU member state. Key publications to monitor include updates to the RTS on ICT risk management, new CTPP designation notices from the Joint ESA Committee, NCA enforcement guidance, and Q&As clarifying specific DORA requirements. Regulatory intelligence platforms like RegPulse aggregate these sources and alert compliance teams in real time when a relevant publication appears, replacing manual monitoring of 20+ agency websites and ensuring that ICT risk management framework reviews are based on current regulatory requirements.

Stay ahead of DORA regulatory updates

Track EBA, ESMA, EIOPA, and all 27 EU national competent authorities for DORA-related publications in real time. Never miss a CTPP designation, an RTS update, or enforcement guidance that affects your ICT risk framework.

Start Free Trial

14-day free trial. No credit card required.