As of 2026, the Digital Operational Resilience Act (DORA) is a fully established regulatory framework across the European Union, having entered into application on January 17, 2025.
The era of “grace periods” and implementation planning has ended. We have entered the supervisory phase, where EU financial entities and their critical Information and Communication Technology (ICT) providers must show their controls work in real operations.
DORA compliance is the mandatory process of aligning a financial entity’s operations with the Digital Operational Resilience Act (DORA), a European Union regulation that entered into application on January 17, 2025. DORA harmonizes rules for 20 different types of financial entities and their ICT service providers across all Member States, acting as a specialized law (lex specialis) for the financial sector.
Achieving DORA compliance means an organization has implemented the necessary internal controls, reporting structures, and security protocols to withstand, respond to, and recover from all types of digital threats such as cyberattacks or system failures.
As of 2026, DORA has cast one of the widest nets in the history of EU financial regulation. Unlike previous frameworks that focused primarily on “systemic” banks, DORA’s reach extends to virtually every corner of the financial ecosystem and, critically, the technology companies that support them.
If your organization handles, processes, or facilitates financial data within the European Union, you are likely in scope.
DORA applies to a specific group of 20 different types of financial entities, which are collectively required to meet uniform standards for digital security and operational resilience.
The 20 types of financial entities covered are:
While ICT third-party service providers are also within the scope of the regulation and subject to its requirements, they are categorized separately from the 20 types of “financial entities” listed above.
DORA does not apply to:
DORA is built upon five non-negotiable pillars that govern the entire ICT lifecycle:
ICT Risk Management
Incident Reporting
Digital Operational Resilience Testing
Third-Party Risk Management
Information Sharing
To be DORA compliant, entities must meet the requirements across the five primary pillars.
Financial entities must maintain a sound, comprehensive, and well-documented ICT risk management framework as part of their overall risk management system.
Financial entities must implement a process to detect, manage, and notify authorities of ICT-related incidents.
To identify vulnerabilities, entities must establish a comprehensive testing program as an integral part of their risk management framework.
DORA treats third-party risk as an integral component of ICT risk, requiring entities to remain fully responsible for compliance even when services are outsourced.
The final pillar encourages financial entities to voluntarily exchange cyber threat information and intelligence amongst themselves.
DORA establishes a comprehensive framework for penalties that includes financial sanctions, non-financial measures, and potential criminal penalties for non-compliance.
The administrative fines are categorized based on whether they apply to financial entities, critical ICT third-party service providers (CTPPs), or individuals in management roles:
1. Fines for Financial Entities
Financial institutions found to be in breach of DORA may face significant pecuniary penalties administered by National Competent Authorities (NCAs).
2. Fines for Critical ICT Third-Party Providers
Providers designated as “critical” are overseen by a Lead Overseer (one of the European Supervisory Authorities) and face a distinct penalty regime aimed at compelling compliance with oversight requests.
3. Personal Liability and Individual Fines
DORA explicitly includes provisions for individual liability to ensure senior management takes active responsibility for digital resilience.
Supervisory authorities have extensive powers to intervene in the operations of both financial entities and critical ICT third-party service providers (CTPPs). Aside from financial penalties, other enforcement measures include:
1. Supervisory and Investigatory Actions
Authorities can use several tools to identify and address non-compliance in real time:
2. Public Disclosure (“Naming and Shaming”)
To ensure public awareness and market discipline, authorities can utilize public notices:
3. Operational and Contractual Restrictions
In more severe cases, authorities can directly restrict business activities:
4. Individual and Management Liability
DORA places significant personal accountability on senior leaders:
5. Criminal Penalties
For the most severe violations, DORA allows Member States to pursue criminal sanctions. These measures may include:
This table summarizes the key penalties available under the Digital Operational Resilience Act (DORA):
| Penalty Type | Description | Relevant Example |
|---|---|---|
| Pecuniary Measures (Fines) | Monetary penalties applied to financial entities to ensure continued compliance with legal requirements. | Failing to document or regularly review the ICT risk management framework. |
| Periodic Penalty Payments | Daily fines for critical ICT third-party service providers, up to 1% of their average daily worldwide turnover, for up to six months. | A critical provider refusing to grant the Lead Overseer access to its Operation Centers for inspection. |
| Cease and Desist Orders | Formal orders requiring an entity to stop a specific conduct that breaches the law and to avoid repeating it. | Continuing to use unauthorized software that has been identified as a security risk. |
| Public Censure | Public notices or statements identifying the responsible party and describing the nature of their violation. | Significant or repeated failure to report major ICT-related incidents to competent authorities. |
| Contractual Termination | A measure of last resort requiring a financial entity to terminate its relationship with a critical third-party provider. | Using a third-party provider that fails to address serious weaknesses in its risk management systems. |
| Personal Liability | Administrative and remedial measures applied to members of the management body or other responsible individuals. | A senior manager neglecting their responsibility to oversee ICT risk exposure. |
| Operational Suspension | Requiring a financial entity to temporarily stop using a specific service provided by a critical third party. | A provider fails to provide necessary security audit reports, creating an unmitigated risk to the financial entity. |
| Data Record Demands | Requiring data traffic records from telecommunications operators, where permitted by national law. | Investigating a potential breach where there is reasonable suspicion of non-compliance. |
DORA fines are imposed for a range of violations related to operational resilience and regulatory oversight. These penalties apply to both financial entities and critical ICT third-party service providers that fail to meet the legal standards set by the framework.
Competent authorities have the power to impose administrative penalties and remedial measures for any breach of the regulation’s requirements. Specifically, they may adopt measures of a pecuniary nature (commonly known as fines) to ensure that financial entities continue to comply with their legal obligations. The decision to fine an entity is based on factors such as the materiality and duration of the breach, the degree of responsibility, and the financial strength of the organization.
Critical ICT third-party service providers are subject to a specific set of “periodic penalty payments” designed to compel cooperation with the Lead Overseer. These fines are triggered by the following specific violations:
Competent authorities are required to ensure that all administrative penalties and remedial measures are effective, proportionate, and dissuasive. To achieve this balance, they evaluate the specific circumstances of a breach using the following mitigating and aggravating factors.
| Factor | Impact on Penalty Severity |
|---|---|
| Intentional Conduct | Penalties are increased if the breach was committed intentionally rather than through negligence. |
| Gravity and Duration | Sanctions are more severe for breaches that are high in materiality or have lasted for a long period. |
| Previous Breaches | A history of prior violations by the responsible natural or legal person leads to higher penalties. |
| Financial Impact | Higher fines are imposed when significant profits were gained, or losses were avoided, due to the breach. |
| Third-Party Loss | The magnitude of losses caused to third parties by the incident is a primary consideration for increasing sanctions. |
| Systemic Flaws | Serious weaknesses identified in management systems, risk management, or internal controls will intensify remedial measures. |
| Criminal Association | If a breach facilitated or was attributable to a financial crime, it justifies the most severe measures, including contract termination. |
| Factor | Impact on Penalty Severity |
|---|---|
| Negligence | If the breach was a result of negligence rather than a deliberate act, authorities may apply more lenient measures. |
| Cooperation | A high degree of cooperation with the competent authority or Lead Overseer can reduce the final penalty level. |
| Financial Strength | The financial strength of the responsible party is considered to ensure the fine is proportionate to their ability to pay. |
| Business Continuity | Regulators may refrain from terminating a contract if doing so introduces an unacceptable risk to the continuity of the financial entity’s operations. |
DORA was designed to be technology-neutral, meaning its principles apply whether you are using a mainframe from the 1990s or a generative AI model from 2026. However, as the financial sector hits the “AI Inflection Point,” the way you implement DORA must evolve to remain effective.
By August 2026, the EU AI Act will be fully applicable, creating a dual-regulatory environment for financial institutions. If you use AI for “high-risk” functions, such as credit scoring or risk assessment, your DORA ICT Risk Management framework must include AI-specific controls.
Algorithmic Resilience
DORA’s requirement for “robust ICT systems” (Article 6) now extends to the integrity of AI models.
You must protect against Data Poisoning (corrupting training data) and Model Evasion (manipulating inputs to bypass security).
Transparency & Bias
Under the AI Act, “high-risk” systems require technical documentation and human oversight. From a DORA perspective, this means your Register of Information (RoI) should specifically flag AI-driven ICT services to ensure they are subject to deeper resilience testing.
In 2026, the “threat landscape” is being industrialized by Large Language Models (LLMs) and deepfake technology. Your DORA strategy must account for these emerging vectors:
Deepfake Phishing
Standard security awareness training is no longer enough. DORA-mandated training programs must now include simulations of AI-driven voice and video impersonation targeting C-suite executives and payment authorization teams.
Automated Exploit Generation
Threat actors now use AI to scan for vulnerabilities and rewrite malware in real-time. To remain compliant with DORA’s Protection and Prevention pillar (Article 9), firms are increasingly shifting to AI-driven XDR (Extended Detection and Response) to match the speed of the attackers.
To move beyond “checklist compliance,” forward-thinking firms are adopting a Zero Trust Architecture (ZTA) as their baseline for DORA.
Continuous Verification
DORA’s “Identity and Access Management” (Article 9) is best satisfied by ZTA, which assumes the network is already compromised and requires every user and device to be verified at every step.
Micro-Segmentation
This ensures that if an AI-driven breach occurs, the impact is “contained,” satisfying DORA’s Continuity and Recovery requirements.
As of 2026, the European Supervisory Authorities (ESAs) have shifted focus from “Implementation” to “Supervision and Evidence.” Use this questionnaire and checklist to ensure your organization is ready for a potential audit by your National Competent Authority (NCA).
ICT Risk Management & Governance
ICT Incident Reporting (The 2026 Timeline)
Digital Operational Resilience Testing
Third-Party Risk Management (TPRM)
Information Sharing
Pro Tip for 2026: Regulators are looking for “Operational Maturity.” It is no longer enough to have a policy; you must show the logs, audit trails, and board minutes that prove the policy is being lived.
To comply with the Digital Operational Resilience Act (DORA), financial entities must implement a comprehensive framework that integrates information and communication technology (ICT) security into their broader operational strategy. This checklist, derived from the sources, outlines the mandatory actions required for regulatory compliance.
1. Governance and Risk Management
2. Protection, Detection, and Recovery
3. Incident Management and Reporting
4. Digital Operational Resilience Testing
5. ICT Third-Party Risk Management
6. Information Sharing
The Digital Operational Resilience Act (DORA) is an EU regulation that mandates financial entities implement strict standards to withstand, respond to, and recover from all types of Information and Communication Technology (ICT) disruptions. As of 2026, the regulation is fully applicable, requiring harmonized digital resilience across 20 different types of financial institutions and their critical ICT service providers.
Financial entities must follow a strict three-stage reporting process for major ICT-related incidents. An initial notification must be submitted as early as possible, generally within four hours of classifying the incident as major, and no later than 24 hours after becoming aware of it. An intermediate report is required within 72 hours of the initial notification, and a final report providing a root-cause analysis must be submitted within one month.
DORA applies to a broad range of market participants, including credit institutions, payment institutions, and account information service providers. It also covers investment firms, crypto-asset service providers, central securities depositories, and central counterparties. Additionally, the scope includes trading venues, trade repositories, fund managers, insurance undertakings, insurance intermediaries, credit rating agencies, and crowdfunding service providers.
Yes, if a fintech app functions as a regulated payment institution or an e-money institution, it is within the scope of DORA. Furthermore, any crypto-asset service provider authorized under Union law is explicitly required to comply with these digital resilience standards.
DORA excludes certain small or specialized entities to ensure regulatory proportionality. Exemptions apply to alternative investment fund managers as defined in Article 3(2) of Directive 2011/61/EU, small retirement schemes with fewer than 15 members, and insurance intermediaries that qualify as microenterprises or small-to-medium enterprises. Additionally, Member States may choose to exclude specific national credit or public sector entities.
An incident is classified as “major” based on factors such as the number of clients or financial counterparts affected and the duration of the service downtime. Other critical factors include the geographical spread (impacting two or more Member States), the materiality of data losses (such as integrity or confidentiality breaches), and the total economic impact, which is significant if costs exceed €100,000.
For critical ICT third-party service providers (CTPPs), regulators can impose periodic penalty payments of up to 1% of the provider’s average daily worldwide turnover from the preceding business year. These fines are applied daily for up to six months until compliance is achieved. Financial entities may also face various pecuniary measures and administrative sanctions, such as cease-and-desist orders or public censures.
Entities identified as having a systemic impact on the financial sector must perform advanced “Threat-Led Penetration Testing” (TLPT) at least every three years. This testing must cover critical or important functions and be performed on live production systems to simulate real-life cyberattacks.
Yes, ICT third-party service providers, including cloud computing and data analytics providers, are within the scope of the regulation. Providers designated as “critical” by European Supervisory Authorities (ESAs) are subject to a Union-wide oversight framework that includes direct inspections and recommendations from a Lead Overseer.
Small or non-interconnected investment firms and other smaller financial entities may follow a simplified framework to reduce administrative burdens. While these entities must still maintain sound ICT security and business continuity plans, their requirements are more flexible and proportionate to their size and risk profile.