Live Webinar | 26 June 2025 9AM PT
From Black Box to Boardroom: Operationalizing Trust in AI Governance
December 9, 2024

DORA compliance update: Actionable insights from the latest ESAs announcement

Megha Thakkar
Technical Content Writer at
Scrut Automation

The European Supervisory Authorities (ESAs) have released an important update to support compliance with the Digital Operational Resilience Act (DORA). This update tackles the growing challenges of managing ICT risks and strengthening operational resilience in today's digital financial world.

CISOs, CEOs, and other decision-makers need to understand this update to align their strategies with new regulatory requirements.

This blog breaks down the latest ESA announcement, highlights its key points, and explains what it means for organizations working toward DORA compliance. It also offers practical tips to help decision-makers navigate these changes effectively.

Read also: DORA Steps: A Comprehensive Guide to the Digital Operational Resilience Act

Overview of the ESAs announcement

The ESAs—comprising the European Banking Authority (EBA), European Insurance and Occupational Pensions Authority (EIOPA), and European Securities and Markets Authority (ESMA)—have issued a directive requiring competent authorities to submit detailed registers of information regarding contractual arrangements with ICT third-party service providers.

This directive emphasizes the importance of transparency and accountability in managing third-party ICT relationships, ensuring that financial institutions are adequately prepared to mitigate risks stemming from critical dependencies.

The path leading to the ESAs announcement

The ESAs have been actively developing Regulatory Technical Standards (RTS) to facilitate the implementation of the DORA. These ESA DORA RTS provide detailed requirements to enhance the digital operational resilience of the EU financial sector.

Key developments:

1. First set of ESA DORA RTS (January 2024):

  • ICT risk management framework: Detailed elements for managing ICT risks, including a simplified framework for smaller entities.
  • Incident classification: Criteria for classifying major ICT-related incidents to ensure consistent reporting.
  • ICT third-party policy: Governance and risk management requirements for ICT third-party service providers.
  • Information register templates: Standardized templates for maintaining records of ICT third-party service providers.

2. Second set of ESA DORA RTS (July 2024):

  • Incident reporting: Content, format, and timelines for reporting major ICT-related incidents and significant cyber threats.
  • Oversight activities: Harmonization of conditions for conducting oversight activities.
  • Joint Examination Teams (JET): Criteria for determining the composition of JETs.
  • Threat-Led Penetration Testing (TLPT): Requirements for conducting TLPT to assess resilience.

3. ESA DORA RTS on subcontracting (July 2024):

  • Guidelines for assessing and managing subcontracting of ICT services that support critical or important functions.

Next steps:

The ESAs have submitted these RTS to the European Commission for review and adoption. Financial entities are expected to comply with DORA requirements by January 17, 2025.

Entities should proactively assess their ICT risk management frameworks, incident reporting procedures, and third-party service provider arrangements to ensure alignment with the upcoming standards.

Staying updated about these developments is crucial for financial institutions to strengthen digital resilience and meet EU regulations.

Read also: Streamline compliance with dashboards and reports

Key components of the ESAs announcement

3 elements of the ESAs announcement

The ESA directive explains the timelines, reporting schedule, and steps for submitting information registers. Following these rules is key for authorities and financial entities to meet DORA requirements, ensuring the EU financial system remains stable and secure.

1. Timelines and deadlines

  • Initial submission: Competent authorities must send the first set of information registers to the ESAs by April 30, 2025. This starts the monitoring of critical ICT third-party service providers.
  • Ongoing reporting: After that, submissions will happen annually, with exact dates provided by the ESAs. Regular reporting helps keep track of ICT third-party risks.

2. Reporting frequency

  • The directive requires information registers to be submitted once a year. This allows data to be updated regularly, reflecting any changes in contracts or the status of ICT third-party service providers.

3. Procedures for submission

  • Standardized templates: TESAs will provide templates for competent authorities to ensure all necessary data is included in a consistent format.
  • Submission channels: Authorities must use secure submission methods to keep the data safe and private.
  • Data validation: Before sending, authorities must check that all information is complete and accurate to ensure its reliability.

4. Content of information registers

The registers should include:

  1. Contract details: Information about the services provided by ICT third-party providers, contract duration, and any subcontracting.
  2. Service criticality: Highlighting services that are essential to the financial entity's operations.
  3. Incidents and risks: Documenting issues or risks related to the ICT providers' performance for better oversight and risk management.

Listen to: De*Romanticizing the Cybersecurity Complexity

Implications for CISOs and CEOs

implications of the new announcement for CISOs and CEOs

The ESAs announcement brings critical implications for CISOs and CEOs tasked with navigating the complexities of DORA compliance.

For CISOs, this announcement underscores the importance of integrating operational resilience into cybersecurity strategies.

CEOs, on the other hand, must view compliance as a strategic imperative, recognizing its role in safeguarding the organization's reputation and financial stability.

It is not merely a regulatory requirement but an opportunity to enhance resilience and build trust in an increasingly digital financial ecosystem.

Key areas of focus include strategic planning and operational adjustments to meet the newly established reporting framework.

Strategic planning

1. Risk assessment:

  • Organizations must conduct a comprehensive evaluation of their current ICT third-party dependencies.
  • This involves identifying providers whose services are critical to operations and could pose significant risks if disrupted.
  • Risk assessments will help prioritize efforts and prepare for the designation of critical service providers under the ESA directive.

2. Resource allocation:

  • Ensuring compliance with the reporting requirements necessitates a commitment of resources, including financial investments and personnel.
  • Dedicated teams may need to be established to handle data collection, reporting, and engagement with competent authorities.
  • Timely resource allocation will be essential to meet the April 30, 2025, deadline and sustain ongoing compliance efforts.

Operational adjustments

1. Data management:

  • The directive highlights the need for robust data collection and reporting mechanisms that align with ESA standards.
  • This includes implementing systems to gather, validate, and securely store information about contractual arrangements with ICT service providers.
  • Automating data processes can enhance accuracy and efficiency while reducing manual errors.

2. Vendor management:

  • Organizations must reassess their existing contracts and relationships with ICT service providers to ensure alignment with DORA's oversight framework.
  • This may involve renegotiating terms, enhancing service-level agreements (SLAs), and verifying the criticality of services provided.
  • Strengthened vendor management practices will help maintain compliance and mitigate risks associated with third-party dependencies.

Read also: 5 Ways Automated Compliance Checks Help CISOs Manage Their Workload

Actionable steps for compliance

steps to take to ensure dora compliance

To meet the ESA directive and align with DORA requirements, organizations must take a phased approach to compliance, addressing immediate, mid-term, and long-term priorities. These steps will enable CISOs and CEOs to build the necessary frameworks and processes to meet regulatory expectations effectively.

Immediate actions

1. Internal audit

  • Conduct a detailed review of all ICT third-party service providers to assess their criticality to your organization's operations.
  • Identify service providers whose disruptions could pose significant operational or financial risks.
  • Document findings in a structured format to support subsequent reporting and compliance efforts.

2. Policy updates

  • Update internal policies to reflect the ESA's requirements for data reporting and quality assurance.
  • Include protocols for identifying and designating critical ICT third-party providers, as well as ensuring accurate and confidential data reporting.
  • Align policies with broader organizational resilience and cybersecurity strategies to create a cohesive compliance framework.

Mid-term strategies

1. Training programs

  • Design and deliver training sessions for key personnel involved in vendor management, compliance, and IT operations.
  • Focus on DORA-specific requirements, the ESA reporting framework, and data validation standards.
  • Regularly refresh training materials to incorporate updates from regulators or internal process changes.

2. Technology investments

  • Explore and implement compliance management tools to automate the collection, validation, and reporting of ICT third-party data.
  • Leverage risk management platforms to monitor vendor performance and identify potential compliance gaps.
  • Ensure any new technology investments prioritize scalability and secure data handling in line with DORA's expectations.

Long-term considerations

1. Continuous monitoring

  • Develop robust systems for ongoing oversight of ICT third-party service providers to ensure they consistently meet performance and compliance standards.
  • Utilize automated tools or dashboards to track metrics such as service availability, incident reports, and adherence to SLAs.
  • Incorporate feedback loops to adapt monitoring practices to evolving regulatory requirements.

2. Stakeholder communication

  • Establish clear channels for communication with internal and external stakeholders, including regulators and ICT service providers.
  • Stay proactive in engaging with regulators to remain updated on changes or clarifications regarding DORA compliance.
  • Foster transparency within the organization to build a culture of accountability and preparedness for future regulatory shifts.

By implementing these steps, organizations can achieve compliance with current ESA directives. They can also build a resilient and adaptable foundation for long-term operational resilience and regulatory alignment.

Read also: How Scrut helps achieve compliance with DORA

Winding up

The ESA's announcement is a key milestone for DORA compliance, focusing on resilience and managing ICT risks in the financial sector. For CISOs and CEOs, this isn't just about meeting regulations—it's a chance to improve transparency, trust, and operational strength.

By adopting proactive strategies and aligning with the ESA framework, organizations can meet compliance deadlines and create a strong, future-ready foundation. Taking on this challenge now ensures long-term stability and leadership in the changing digital world.

Ready to simplify your path to DORA compliance?

Scrut makes DORA compliance effortless with automated tools for risk management, vendor assessments, and regulatory reporting. Stay ahead of deadlines, streamline ICT third-party oversight, and build operational resilience—all in one platform.

Talk to our experts today and get started on achieving DORA compliance with confidence.

FAQs

What are the key points of the DORA Act? DORA ensures financial entities in the EU can withstand ICT disruptions through robust risk management, incident reporting, oversight of third-party providers, and threat-led penetration testing.

What is ESA from DORA? ESA DORA refers to the European Supervisory Authorities' role in developing Regulatory Technical Standards (RTS) and guidelines for implementing the Digital Operational Resilience Act.

What is the DORA regulation 2025? DORA, effective January 17, 2025, mandates EU financial entities to enhance ICT resilience, monitor risks, and comply with standardized reporting and third-party oversight requirements.

What are the reporting requirements for DORA? Financial entities must report ICT-related incidents, maintain registers of third-party contracts, and comply with ESA-defined formats, timelines, and validation procedures.

What are the five pillars of DORA? The five pillars are ICT risk management, ICT incident reporting, digital operational resilience testing, ICT third-party risk management, and information sharing.

Liked the post? Share on:
Table of contents
Join our community
Join our community and be the first to know about updates!
Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Join our community and be the first to know about updates!

Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

HIPAA
Compliance Essentials
Understanding HIPAA violations: Types, prevention, and best practices
HIPAA
PHI vs PII: Essential comparisons, compliance differences, and a focused checklist
GDPR
Risk Management
Best GDPR Compliance Automation Software in 2025: Features, Pricing, Pros & Cons

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

See what a real security- first GRC platform looks like

Ready to see what security-first GRC really looks like?

Focus on the traveler experience. We’ll handle the regulations.

Get Scrut. Achieve and maintain compliance without the busywork.

Choose risk-first compliance that’s always on, built for you, and never in your way.

Ready to see what security-first GRC
One platform, every framework. No more duplicate work.
You can’t manage user access if you’re always playing catch-up.
Explore the future of enterprise GRC
Tired of chasing vendors for risk assessments?

Join the thousands of companies automating their compliance with Scrut.

The right partner makes all the difference. Let’s grow together.

Make your business easy to trust, put security transparency front and center.

Risk-first security starts with risk-first visibility.
Secure your team from the inside out.
Don't settle for slow, expensive compliance. Get Scrut instead.
Risk-first compliance for forward-thinking teams.
Audits without the back-and-forth. Just seamless collaboration.
Scale fast. Stay compliant. Automate the rest.
Compliance? Done and dusted, in half the time.
Get ahead of GDPR compliance before it becomes a problem.
Outgrowing table-stakes compliance? Create custom frameworks with ease.
Navigate SOC 2 compliance, minus the stress.
PCI DSS compliance, minus the panic.
Take the wheel of your HIPAA certification journey today.
We’ve got what you need to fast-track your ISO 27001 certification.
Make your NIST AI RMF journey as smooth as possible.

Your GRC team, multiplied and AI-backed.

Modern compliance for the evolving education landscape.

Ready to simplify healthcare compliance?

Don’t let compliance turn into a bottleneck in your SaaS growth.

Find the right compliance frameworks for your business in minutes

Ready to see what security-first GRC really looks like?

Real-time visibility into every asset

Ready to simplify fintech compliance?

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Scrut helps you streamline audits, close deals faster, and stay ahead of risk without slowing down your team. Because trust shouldn’t take months to earn.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Tag, classify, and monitor assets in real time—without the manual overhead.

Whether you're entering new markets or launching new products, Scrut helps you stay compliant without slowing down.

Scrut pulls compliance data straight from the tools you already use—so you don’t have to dig for evidence, chase approvals, or manually track controls.

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

With Scrut, you’re not just adding a tool to your offering—you’re adding a competitive edge. Join our Partner Network and help your clients streamline their GRC program.

Gaining trust is your first step to growing and cracking better deals. The Scrut Platform comes pre-built with all the tools you need to showcase a firm security posture and build confidence.

Don’t settle for rigid systems—Scrut ensures your risk management strategy is as flexible as your business needs.

Start building a security-first culture. Save your operations from improper training and a lack of compliance awareness.

Scrut fast-tracks compliance so you can focus on scaling, not scrambling. Automate compliance tasks and accelerate enterprise deals—without the grind.

Automate assessments, track compliance, and get full visibility into third-party risk—all in one place.

Scrut automates compliance tasks, supports proactive risk management, and saves you time, so you can focus on growing your business. Start building trust with customers and scaling confidently.

Leave legacy GRC behind. Meet the AI-powered platform built for teams managing risk and compliance in real time.

Give auditors direct access, keep track of every request, and manage audits effortlessly—all in one place.

Scrut ensures access permissions are correct, up-to-date, and fully compliant.

Whether you need fast results or a fully tailored program mapped to your risks and needs, Scrut delivers exactly what you need, when you need it. Ready to start?

Scrut unifies compliance across all your frameworks, so you can stop juggling systems and start scaling securely.

Manually managing your compliance processes and audits can get inefficient and overwhelming. Scrut automates these outdated, manual processes and eliminates your last-minute worries.

Access automated compliance, real-time risk tracking, and expert-backed support—all in one platform. Get started with Scrut!

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Earn trust and back it up with solid evidence. Scrut takes you through the SOC 2 compliance journey step-by-step, navigating every complexity you face.

Manage your PCI DSS compliance with real-time monitoring and effortless automation. Get started with Scrut today!

Securing your PHI shouldn’t be a constant hassle. Scrut automates your workflows—from risk assessments to monitoring—so you can put your compliance worries on the back burner.

Automate security controls, simplify audits, and keep your ISMS aligned with the latest standards. Get started with Scrut!

Tackle potential AI risks with NIST AI RMF-compliant controls and get expert support every step of the way.

Offload the grunt compliance work to us. Execute manual, draining GRC tasks with the reliable AI-powered Scrut Teammates without switching contexts or bottlenecks.

Whether you're managing student data, partnering with educational institute, or expanding to new geographies—Scrut gives you the tools to stay compliant, manage risk, and build trust at every step.

Scaling healthcare doesn’t have to come at the cost of security. Scrut keeps your organization compliant, audit-ready, and protected—no matter how fast you grow.

Scrut automates the hard parts of compliance and security so you can move fast and stay ahead of risks from day one.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Growth in fintech comes with heavy scrutiny. Scrut helps you stay compliant, audit-ready, and secure—without slowing down your momentum.

Book a Demo
Book a Demo
Join the Scrut Partner Network
Join the Scrut Partner Network