Live Webinar | 26 June 2025 9AM PT
From Black Box to Boardroom: Operationalizing Trust in AI Governance
December 4, 2024

DORA Compliance Checklist

The Digital Operational Resilience Act (DORA) aims to boost IT security in the EU's financial sector. It sets requirements for managing technology risks, ensuring continuity, and safeguarding data.

These measures ensure continuity in critical business operations and help companies withstand and recover from ICT-related disruptions. However, many organizations struggle with DORA's complex requirements. They often lack clear guidance on where to begin.

This DORA checklist will help organizations identify potential vulnerabilities, mitigate risks, and implement necessary measures to meet DORA's rigorous standards.

Key steps to comply with DORA

To effectively comply with DORA, read the regulatory text and the European Supervisory Authorities (ESAs) guidelines. A thorough understanding of the regulation will make the compliance process smoother and more manageable.

All organizations subject to DORA must:

  • Ensure operational resilience through risk management measures.
  •  
  • Identify, assess, and mitigate ICT (Information and Communication Technology) risks.
  •  
  • Maintain a comprehensive ICT security framework.
  •  
  • Ensure business continuity in the event of an ICT failure.

Determine if DORA applies

  • Review Article 2 of the DORA legislation to confirm whether your organization qualifies as an in-scope entity, such as a financial institution or a critical ICT service provider to a financial institution.

If your organization falls under any of these categories, proceed to step one.

Also read: Streamlining compliance: DORA's path to cyber resilience

Step 1: ICT risk management

To ensure compliance with DORA, financial institutions must focus on managing ICT risks across their operations. The following steps are essential:

  • Document critical ICT assets and business functions: Identify and classify critical ICT assets based on their importance to business operations and regulatory compliance.
  •  
  • Conduct a gap analysis: Assess exposure risks, vulnerabilities, and weaknesses in security defenses that could impact the integrity, availability, and security of ICT systems and services.
  •  
  • Define risk appetite and tolerance levels: Establish detection thresholds and processes that align with the institution's desired risk tolerance, ensuring appropriate risk management.
  •  
  • Ensure resilience of business-critical systems: Implement measures to secure critical ICT systems and data, ensuring they are available, backed up, and recoverable in the event of failure.
  •  
  • Establish a continuous learning cadence: Regularly review and update the ICT risk management framework to adapt to emerging risks and evolving regulatory requirements.

Technical controls:

Financial institutions must implement specific technical measures to secure their ICT systems and data:

  • Implement technical security measures: Apply appropriate technical controls to safeguard ICT systems, including encryption, strong access management, multi-factor authentication (MFA), and network security protocols.
  •  
  • Regularly assess and update security measures: Continuously review and enhance security measures in response to emerging risks and cyber threats. This may include firewall updates, intrusion detection systems (IDS), and anti-malware defenses.
  •  
  • Conduct security audits and penetration testing: Perform regular audits and simulated attacks (e.g., penetration testing) to identify vulnerabilities within the ICT infrastructure and take corrective actions to mitigate risks.
  •  
  • Establish and maintain an ICT Risk Management Framework: Develop and maintain a comprehensive ICT governance framework that defines roles, responsibilities, and processes for managing ICT risks, ensuring that all staff are aligned with DORA's resilience objectives.

Third-party service providers supplying essential services to financial institutions also adhere to similar risk management practices and technical controls.

Step 2: ICT-related incident management, classification, and reporting

Financial institutions must implement and maintain comprehensive systems for managing ICT-related incidents, ensuring resilience and regulatory compliance.

1. Establish an incident management strategy:

Develop a strategy integrating technology, people, and processes to handle ICT incidents and cyber threats effectively.

2. Streamline incident detection and classification:

Implement clear procedures for detecting and classifying incidents, including specific information-gathering requirements and a reporting cadence.

3. Define thresholds for incident classification:

Set criteria to categorize incidents as minor, major, or critical based on impact, downtime, and affected services.

4. Define cyber threat categorization and impact analysis:

Evaluate cyber threats' likelihood and business impact, especially on critical financial systems and services.

5. Harmonize ICT management processes:

Continuously review and optimize incident management, classification, and reporting processes to ensure they remain effective.

6. Maintain documentation and retention:

Retain records of incidents, risk management actions, and compliance measures for at least five years or as required by DORA.

Ensure documentation is accessible for regulatory inspections and audits.

7. Incident reporting and notification:

Establish a clear process for reporting ICT-related incidents and notifying competent authorities of significant incidents within the required timeframes.

8. Maintain detailed records:

Keep detailed records of incidents, including actions to resolve them, follow-up measures, and lessons learned.

9. Business continuity and disaster recovery:

Implement Business Continuity Plans (BCPs): Develop and implement BCPs for critical ICT systems and processes.

Establish Disaster Recovery Plans (DRPs): Ensure DRPs are in place for rapid recovery after ICT disruptions.

Regularly test BCPs and DRPs: Conduct regular tests to verify the effectiveness of continuity and recovery plans.

10. Financial-specific incident management protocols:

Financial institutions should implement protocols specific to the financial sector to manage risks and comply with ICT incident regulations, including DORA and PSD2.

Third-party providers play a key role in financial institutions' operational resilience. They must also develop and follow similar plans. These plans must be regularly tested. They should also notify financial institutions of incidents and collaborate on cyber threat analysis to ensure risk management transparency.

Step 3: Digital operational resilience testing

Financial institutions must adhere to specific DORA-compliant testing requirements to ensure their ICT systems and security measures meet operational resilience standards, reflecting the critical nature of their services.

1. Define the scope of DORA testing:

Identify the systems, tools, protocols, processes, and attack surfaces that need to be tested for operational resilience and security.

Ensure that all financial systems, including payment systems, transaction infrastructures, and customer data protection mechanisms, are part of the testing scope.

2. Conduct regular DORA-compliant resilience testing:

Implement regular resilience testing that meets DORA-specific requirements. This may involve more frequent or stringent testing due to the importance of their operations and customer data.

3. Test operational resilience in the context of financial services:

Tailor resilience testing to address the unique risks within the financial industry, including threats related to financial transactions, customer data protection (e.g., PSD2 compliance), and the stability of financial services.

4. Engage in Threat-Led Penetration Testing (TLPT):

Engage in TLPT to simulate advanced, targeted threats aimed explicitly at financial systems such as payment infrastructure, trading platforms, and financial transaction systems.

TLPT should assess vulnerabilities that could directly impact financial services' security and operational resilience.

5. Adhere to regulatory reporting after testing:

After conducting resilience testing, financial institutions must report the results and any vulnerabilities to regulatory authorities. They must also share their mitigation strategies in compliance with DORA and any additional industry-specific regulations.

Critical third-party service providers supporting financial institutions must follow similar practices. They must collaborate closely with third-party ICT service providers to improve risk analysis, refine testing procedures, and establish communication practices that ensure alignment on resilience goals.

Step 4: ICT third-party risk management

Financial institutions must manage third-party risks rigorously to ensure compliance with DORA and other financial industry regulations. This includes assessing and monitoring third-party providers that support critical financial services.

1. Create a third-party ICT service provider register:

Maintain an up-to-date register of all third-party ICT service providers, identifying the associated risks they may pose to business continuity and resilience.

2. Ensure third-party compliance with DORA and financial regulations:

Financial institutions must ensure that their third-party ICT service providers comply with DORA's operational resilience requirements as well as financial sector-specific regulations, such as those concerning payment security and customer data protection.

3. Conduct enhanced third-party risk assessments:

Perform detailed risk assessments of third-party ICT providers, focusing especially on critical services like payment systems, cloud services, and cybersecurity. These assessments should address potential vulnerabilities, service disruptions, and compliance failures.

4. Incorporate financial sector-specific resilience requirements in contracts:

Contracts with third-party service providers must explicitly outline financial industry-specific regulations and resilience requirements, including those related to payment security, transaction processing, customer data protection, and regulatory reporting.

5. Conduct regular third-party resilience testing:

Include third-party vendors in regular resilience testing as part of the broader operational resilience framework. Regularly monitor the performance and compliance of third-party providers.

Step 5: Information-sharing arrangements

Information sharing and governance arrangements are crucial to ensure compliance with DORA.

1. Ensure robust compliance management frameworks for DORA:

Financial institutions must ensure their Governance, Risk, and Compliance (GRC) teams are equipped to handle the specific requirements of DORA, including compliance with financial sector resilience standards. The GRC framework should integrate both operational and regulatory resilience requirements.

2. Share information within the financial sector:

Foster partnerships with other financial entities, regulators, and third-party vendors to exchange intelligence on ICT resilience, emerging threats, and compliance challenges. This collaborative effort strengthens sector-wide resilience.

3. Collaborate with specialized consultative partners:

Engage consultative partners with expertise in both DORA compliance and the financial sector's specific regulations. This collaboration can help enhance operational security, especially in areas like transaction systems, customer data protection, and cyber resilience.

4. Compliance updates for the financial sector:

Stay informed on DORA's evolving impact on financial institutions, including changes that may affect transaction systems, payment processing, and customer data security. Implement regular monitoring to ensure compliance with both general and financial-specific requirements.

5. Staff training on financial sector regulations:

Ensure staff are regularly trained on both general DORA compliance and specific financial regulations related to operational resilience. This training should include industry-specific scenarios, threats, and regulatory updates.

Critical third-party providers must ensure DORA compliance by sharing ICT risks, security vulnerabilities, and resilience practices with their clients. Service contracts should include clauses on incident reporting, disaster recovery, and risk management.

Providers need to monitor their own compliance and performance, offering transparency and regular updates. They should collaborate with financial institutions to align resilience efforts and ensure coordinated risk management and testing.

Also read: DORA Steps: A Comprehensive Guide to the Digital Operational Resilience Act

Need help with DORA compliance?

The Scrut Platform can help you navigate DORA and other regulatory requirements efficiently. Here's how our platform supports DORA compliance:

  • Automates compliance tasks: Reduces manual processes, simplifying DORA management.
  •  
  • Enhances risk management: Provides real-time visibility into risks and controls.
  •  
  • Centralized platform: Manage DORA and other frameworks in one place.
  •  
  • Continuous monitoring: Keeps you up-to-date on evolving DORA requirements.
  •  
  • Simplified reporting: Generates clear, audit-ready compliance reports.

With Scrut, you can stay compliant, strengthen your operational resilience, and confidently prepare for audits. Get in touch to learn more.

FAQs

1. What is DORA, and why is compliance important? DORA (Digital Operational Resilience Act) is a regulation for financial institutions aimed at ensuring operational resilience in the face of digital and cybersecurity risks. Compliance is crucial to maintain business continuity and protect against ICT-related disruptions.

2. What steps should organizations take to comply with DORA? Organizations should focus on establishing incident management strategies, conducting regular ICT testing, managing third-party risks, and fostering a culture of information sharing. They must also ensure their staff is well-trained in DORA requirements.

3. What are the key requirements for financial institutions under DORA? Financial institutions must implement more stringent measures for resilience testing, third-party risk management, and incident reporting. They also need to comply with financial sector-specific regulations to ensure the security and integrity of financial systems.

4. How often should organizations update their DORA compliance practices? Organizations should continuously monitor DORA's evolving requirements and regularly update their risk management strategies, security measures, and training programs to remain compliant with any regulatory changes.

5. What is the role of third-party vendors in DORA compliance? Third-party vendors must be carefully vetted, regularly tested for resilience, and monitored to ensure they meet DORA's operational and security requirements. Financial institutions must ensure their third-party providers maintain the same level of security and resilience.

Liked the post? Share on:
Table of contents
Join our community
Join our community and be the first to know about updates!
Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Join our community and be the first to know about updates!

Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

HIPAA
Compliance Essentials
Understanding HIPAA violations: Types, prevention, and best practices
HIPAA
PHI vs PII: Essential comparisons, compliance differences, and a focused checklist
GDPR
Risk Management
Best GDPR Compliance Automation Software in 2025: Features, Pricing, Pros & Cons

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

See what a real security- first GRC platform looks like

Ready to see what security-first GRC really looks like?

Focus on the traveler experience. We’ll handle the regulations.

Get Scrut. Achieve and maintain compliance without the busywork.

Choose risk-first compliance that’s always on, built for you, and never in your way.

Ready to see what security-first GRC
One platform, every framework. No more duplicate work.
You can’t manage user access if you’re always playing catch-up.
Explore the future of enterprise GRC
Tired of chasing vendors for risk assessments?

Join the thousands of companies automating their compliance with Scrut.

The right partner makes all the difference. Let’s grow together.

Make your business easy to trust, put security transparency front and center.

Risk-first security starts with risk-first visibility.
Secure your team from the inside out.
Don't settle for slow, expensive compliance. Get Scrut instead.
Risk-first compliance for forward-thinking teams.
Audits without the back-and-forth. Just seamless collaboration.
Scale fast. Stay compliant. Automate the rest.
Compliance? Done and dusted, in half the time.
Get ahead of GDPR compliance before it becomes a problem.
Outgrowing table-stakes compliance? Create custom frameworks with ease.
Navigate SOC 2 compliance, minus the stress.
PCI DSS compliance, minus the panic.
Take the wheel of your HIPAA certification journey today.
We’ve got what you need to fast-track your ISO 27001 certification.
Make your NIST AI RMF journey as smooth as possible.

Your GRC team, multiplied and AI-backed.

Modern compliance for the evolving education landscape.

Ready to simplify healthcare compliance?

Don’t let compliance turn into a bottleneck in your SaaS growth.

Find the right compliance frameworks for your business in minutes

Ready to see what security-first GRC really looks like?

Real-time visibility into every asset

Ready to simplify fintech compliance?

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Scrut helps you streamline audits, close deals faster, and stay ahead of risk without slowing down your team. Because trust shouldn’t take months to earn.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Tag, classify, and monitor assets in real time—without the manual overhead.

Whether you're entering new markets or launching new products, Scrut helps you stay compliant without slowing down.

Scrut pulls compliance data straight from the tools you already use—so you don’t have to dig for evidence, chase approvals, or manually track controls.

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

With Scrut, you’re not just adding a tool to your offering—you’re adding a competitive edge. Join our Partner Network and help your clients streamline their GRC program.

Gaining trust is your first step to growing and cracking better deals. The Scrut Platform comes pre-built with all the tools you need to showcase a firm security posture and build confidence.

Don’t settle for rigid systems—Scrut ensures your risk management strategy is as flexible as your business needs.

Start building a security-first culture. Save your operations from improper training and a lack of compliance awareness.

Scrut fast-tracks compliance so you can focus on scaling, not scrambling. Automate compliance tasks and accelerate enterprise deals—without the grind.

Automate assessments, track compliance, and get full visibility into third-party risk—all in one place.

Scrut automates compliance tasks, supports proactive risk management, and saves you time, so you can focus on growing your business. Start building trust with customers and scaling confidently.

Leave legacy GRC behind. Meet the AI-powered platform built for teams managing risk and compliance in real time.

Give auditors direct access, keep track of every request, and manage audits effortlessly—all in one place.

Scrut ensures access permissions are correct, up-to-date, and fully compliant.

Whether you need fast results or a fully tailored program mapped to your risks and needs, Scrut delivers exactly what you need, when you need it. Ready to start?

Scrut unifies compliance across all your frameworks, so you can stop juggling systems and start scaling securely.

Manually managing your compliance processes and audits can get inefficient and overwhelming. Scrut automates these outdated, manual processes and eliminates your last-minute worries.

Access automated compliance, real-time risk tracking, and expert-backed support—all in one platform. Get started with Scrut!

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Earn trust and back it up with solid evidence. Scrut takes you through the SOC 2 compliance journey step-by-step, navigating every complexity you face.

Manage your PCI DSS compliance with real-time monitoring and effortless automation. Get started with Scrut today!

Securing your PHI shouldn’t be a constant hassle. Scrut automates your workflows—from risk assessments to monitoring—so you can put your compliance worries on the back burner.

Automate security controls, simplify audits, and keep your ISMS aligned with the latest standards. Get started with Scrut!

Tackle potential AI risks with NIST AI RMF-compliant controls and get expert support every step of the way.

Offload the grunt compliance work to us. Execute manual, draining GRC tasks with the reliable AI-powered Scrut Teammates without switching contexts or bottlenecks.

Whether you're managing student data, partnering with educational institute, or expanding to new geographies—Scrut gives you the tools to stay compliant, manage risk, and build trust at every step.

Scaling healthcare doesn’t have to come at the cost of security. Scrut keeps your organization compliant, audit-ready, and protected—no matter how fast you grow.

Scrut automates the hard parts of compliance and security so you can move fast and stay ahead of risks from day one.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Growth in fintech comes with heavy scrutiny. Scrut helps you stay compliant, audit-ready, and secure—without slowing down your momentum.

Book a Demo
Book a Demo
Join the Scrut Partner Network
Join the Scrut Partner Network