What will be the Impact of DORA Regulation on Financial Entities?

DORA Regulation under the Digital Operational Resilience Act sets requirements for ICT risk management, incident reporting, resilience testing, and third-party oversight to enhance financial entities' resilience against disruptions.

What will be the Impact of DORA Regulation on Financial Entities?




The Digital Operational Resilience Act (DORA) is a transformative regulation aimed at standardising and strengthening the digital operational resilience of financial entities across the European Union. Enforced from January 17, 2025, DORA seeks to harmonise operational resilience practices, particularly focusing on information and communication technology (ICT) risks. This article delves into DORA's scope, its five pillars, implementation timelines, and its strategic implications for financial entities.




Source

[1]

Digital Operational Resilience Act (DORA)
DORA introduces uniform and harmonised governing principles for the management of cyber risks. This means that the reporting on cyber incidents will be streamlined, and third-party risk supervised.

[2]

Digital Operational Resilience Act (DORA)
The Digital Operational Resilience Act (DORA) is an EU regulation that entered into force on 16 January 2023 and will apply as of 17 January 2025. It aims at strengthening the information and communication technology (ICT) security of financial entities in the remit of the 3 ESAs and making sure that the financial sector in Europe is able to stay resilient in the event of a severe operational digital disruption.



What is DORA?


DORA applies to a wide range of financial entities, including banks, payment institutions, investment firms, crypto-asset service providers, insurance firms, and pension funds. The regulation also indirectly impacts ICT service providers critical to the operations of these entities. By establishing a uniform framework, DORA aims to ensure the financial sector can withstand and recover from ICT disruptions, fostering trust and stability in an increasingly digital financial landscape.




The Five Pillars of DORA


DORA's comprehensive framework is built upon five pillars, each addressing specific aspects of digital operational resilience. These pillars ensure a holistic approach to managing ICT risks in financial entities, fostering robust systems that can withstand and recover from disruptions.


1. ICT Risk Management and Governance


What It Covers:


Financial entities are required to develop a comprehensive ICT risk management framework that integrates policies, processes, and tools to identify, assess, and mitigate ICT risks. Governance structures must ensure oversight by senior management and dedicated teams.


Key Points and Regulatory Details:


  1. Governance Oversight:
    • The management body holds ultimate responsibility for ICT risk management, including the approval and oversight of the ICT risk management framework.
    • Regulatory guidelines emphasize the necessity for the management body to ensure the implementation of policies that maintain high standards of data availability, authenticity, integrity, and confidentiality.
  2. Business Continuity:
    • Entities are mandated to establish and maintain comprehensive ICT business continuity policies and disaster recovery plans, particularly for critical or important functions.
    • These plans must be regularly tested and updated to ensure their effectiveness in the face of potential ICT disruptions.
  3. Adaptability:
    • Financial entities are required to adopt frameworks that are capable of evolving in response to emerging ICT risks.
    • The proportionality principle mandates that these frameworks align with the entity's size, complexity, and risk profile, allowing for scalability and flexibility.
  4. Documentation and Audits:
    • Entities must maintain extensive documentation of all ICT-related policies, incident logs, and resilience measures.
    • These records are subject to audit to ensure compliance with ICT risk management requirements.
  5. ICT Impact Analysis:
    • Financial institutions are obligated to conduct business impact analyses (BIA) to assess the potential consequences of ICT disruptions on their critical or important functions.
    • This analysis aids in prioritizing risk mitigation strategies and enhancing overall operational resilience.

Impact:


This pillar places a strong emphasis on leadership involvement, demanding greater accountability and resource allocation for ICT risk management. For example, a global bank might establish a governance framework where the board actively monitors ICT risks and approves quarterly updates on risk mitigation strategies. In practice, this could include actions like strengthening multi-factor authentication across all employee accounts after a phishing attack or upgrading firewalls following an external vulnerability assessment. Such measures demonstrate proactive risk governance, ensuring critical operations remain secure.


Required Actions:


  • Develop a Comprehensive ICT Risk Management Framework:
    • Establish policies and procedures to identify, assess, and manage ICT risks.
    • Integrate ICT risk management into the overall risk management system.
  • Governance Structure:
    • Assign clear roles and responsibilities for ICT risk management within the organization.
    • Ensure the management body oversees and approves the ICT risk management framework.
  • Risk Assessment:
    • Conduct regular assessments to identify ICT vulnerabilities and threats.
    • Evaluate the potential impact of identified risks on critical functions and services.
  • Business Continuity and Disaster Recovery:
    • Develop and maintain business continuity plans (BCPs) and disaster recovery plans (DRPs) tailored to ICT-related incidents.
    • Regularly test and update BCPs and DRPs to ensure effectiveness.
  • Training and Awareness:
    • Implement ongoing training programs to enhance staff awareness of ICT risks and their roles in mitigating them.

2. Incident Reporting


What It Covers:


Organizations must implement structured processes to detect, classify, and report ICT-related incidents. Reporting must be prompt and align with templates provided by regulatory authorities.


Key Points and Regulatory Details:


  1. Incident Classification:
    • Entities must establish procedures for the identification, tracking, logging, and classification of ICT-related incidents based on criteria such as severity, impact, and geographic spread.
    • Standardized classification ensures uniformity across the sector, facilitating effective incident management and reporting.
  2. Three-Step Reporting:
    • Entities are required to submit an initial notification, intermediate reports, and a final report for major ICT-related incidents.
    • The final report must include a root cause analysis and details of the mitigation measures implemented.
  3. Notification Standards:
    • Entities are required to notify competent authorities of major ICT-related incidents within the time limits specified by regulatory technical standards.
    • Prompt reporting enables regulators to assess the incident's impact and coordinate responses as necessary.
  4. Client Transparency:
    • Financial institutions are encouraged to inform clients when their financial interests are directly impacted by an ICT-related incident.
    • This transparency helps maintain trust and allows clients to take appropriate actions in response to the incident.

Impact:


This pillar promotes early detection and rapid response, reducing the risk of systemic disruptions across the financial ecosystem. For instance, during a cyberattack that disrupts online banking services, a financial institution may use its incident reporting protocols to notify regulators and customers within hours. By providing real-time updates to affected clients and implementing remediation steps (e.g., reactivating systems with enhanced security patches), the institution can restore trust and minimize reputational damage. This swift reporting also enables regulators to issue broader alerts to other entities in the sector, helping prevent further escalation.


Action Required:


  • Establish Incident Management Procedures:
    • Develop processes for detecting, managing, and reporting ICT-related incidents.
    • Classify incidents based on criteria such as severity, impact, and urgency.
  • Reporting to Competent Authorities:
    • Notify relevant authorities of significant ICT-related incidents promptly, adhering to specified timelines.
    • Provide detailed reports, including the nature of the incident, its impact, and remedial actions taken.
  • Internal Reporting Mechanisms:
    • Implement internal channels for staff to report ICT incidents or vulnerabilities.
    • Ensure timely escalation of reported issues to appropriate management levels.
  • Record-Keeping:
    • Maintain logs of all ICT incidents, including minor ones, to analyze trends and improve resilience.

3. Digital Operational Resilience Testing


What It Covers:


Comprehensive and periodic testing of ICT systems ensures preparedness for cyber threats and operational disruptions.


Key Points and Regulatory Details:


  1. Annual Testing for Core Systems:
    • Entities must conduct periodic testing of their ICT systems, applications, and processes to assess resilience.
    • Testing methodologies should include vulnerability assessments and penetration testing to identify and address potential weaknesses.
  2. Advanced Threat-Led Penetration Testing (TLPT):
    • Entities identified as critical are required to conduct TLPT at least every three years.
    • TLPT must be performed by independent parties with appropriate expertise to ensure unbiased and thorough assessments.
  3. Testing of Third-Party Providers:
    • Resilience testing should include critical third-party service providers to assess their impact on the entity's ICT risk.
    • Contracts with third-party providers should include provisions for their participation in resilience testing.
  4. Remediation Plans:
    • Entities must develop and implement plans to address vulnerabilities identified during testing.
    • The effectiveness of remediation actions should be monitored, and plans updated as necessary to maintain resilience.

Impact:


Regular testing boosts entities' ability to identify weak points proactively, minimizing vulnerabilities and ensuring continuous improvement. For example, an insurance company may conduct an annual penetration test that reveals outdated software in its claims processing system. After identifying this vulnerability, the company implements updates to mitigate risks. Furthermore, a critical financial market infrastructure might perform a TLPT (Threat-Led Penetration Test) simulating a ransomware attack to evaluate its response time and recovery capabilities, ensuring robust safeguards are in place for its critical functions.


Action Required:


  • Regular Testing:
    • Perform periodic testing of ICT systems, applications, and processes to assess resilience.
    • Include various testing methodologies, such as vulnerability assessments and penetration testing.
  • Advanced Testing for Critical Entities:
    • Entities identified as critical must conduct threat-led penetration testing (TLPT) at least every three years.
    • Ensure TLPT is performed by independent parties with appropriate expertise.
  • Testing of Third-Party Providers:
    • Include critical third-party service providers in resilience testing to assess their impact on the entity's ICT risk.
  • Remediation Plans:
    • Develop and implement plans to address vulnerabilities identified during testing.
    • Monitor the effectiveness of remediation actions and update them as necessary.

4. Third-Party Risk Management


What It Covers:


Financial entities are required to manage risks arising from their ICT third-party service providers, particularly those offering critical services.


Key Points and Regulatory Details:


  1. Register of Providers:
    • Entities are required to maintain an updated register of all third-party ICT service providers.
    • Providers should be classified based on the criticality of the services they offer to the entity's operations.
  2. Contractual Requirements:
    • Contracts with ICT providers must include service levels, audit rights, security standards, and exit strategies.
    • Providers are also required to agree to provisions for audits and access to performance data to ensure compliance.
  3. Concentration Risk Assessments:
    • Financial entities must evaluate risks associated with over-reliance on a single ICT provider or limited substitutes.
    • Risk assessments should address geographic, technical, and financial dependencies on providers.
  4. Exit Strategies and Subcontracting Governance:
    • Entities must establish detailed exit strategies to manage disruptions during provider termination.
    • Subcontractors must be disclosed, and risks across the entire supply chain assessed comprehensively.

Impact:


This pillar emphasizes due diligence, making financial entities accountable for third-party risks while ensuring sector-wide operational stability. For example, a retail bank relying on a cloud provider for data storage might conduct a thorough risk assessment before signing a contract, ensuring the provider complies with DORA's security standards. If the provider experiences a significant service outage, the bank's well-documented exit strategy could enable a seamless transition to an alternative provider without disrupting customer access to banking services. By maintaining a comprehensive register of all third-party ICT providers, the bank mitigates over-reliance and prepares for contingencies.


Action Required:


  • Identification and Classification:
    • Maintain an updated register of all third-party ICT service providers.
    • Classify providers based on the criticality of services they offer.
  • Risk Assessment:
    • Conduct thorough due diligence before engaging third-party providers.
    • Assess potential risks, including concentration risk and the provider's own resilience.
  • Contractual Agreements:
    • Ensure contracts with third-party providers include clauses on service levels, security requirements, and incident reporting.
    • Include provisions for audit rights and access to information necessary for monitoring.
  • Monitoring and Review:
    • Regularly monitor the performance and risk profile of third-party providers.
    • Review and update contracts and risk assessments periodically.
  • Exit Strategies:
    • Develop and maintain exit strategies to manage the termination of third-party services without disrupting critical functions.

5. Information Sharing


What It Covers:


DORA encourages the sharing of cyber threat intelligence and best practices among financial entities within trusted networks.


Key Points and Regulatory Details:


  1. Voluntary Participation in Trusted Communities:
    • Entities are encouraged to join trusted communities to share cyber threat intelligence.
    • Frameworks support secure sharing while safeguarding sensitive data.
  2. Standardized Threat Intelligence Formats:
    • Information shared must include actionable data such as indicators of compromise and mitigation strategies.
    • Formats should be structured to enable swift response and align with cybersecurity strategies.
  3. Data Protection Compliance:
    • Information sharing must comply with GDPR and other data protection laws.
    • Data should be anonymized or pseudonymized to prevent breaches of privacy regulations.
  4. Utilization of Shared Insights:
    • Entities must incorporate shared threat intelligence into internal ICT risk management frameworks.
    • Training programs should use shared insights to enhance staff preparedness and awareness.

Impact:


Collaboration under this pillar fosters a collective defense, raising the resilience bar across the financial sector. For instance, a consortium of financial institutions might share intelligence about a new phishing tactic targeting payment systems. By acting on this shared information, entities can deploy advanced email filtering and train employees to recognize similar attacks, significantly reducing the threat. Additionally, regulators could use aggregated threat intelligence to develop sector-wide guidelines, ensuring the financial ecosystem is better equipped to respond to emerging cyber risks.


Action Required:


  • Establish Information Sharing Arrangements:
    • Engage in trusted communities or platforms to share cyber threat intelligence.
    • Ensure that shared information is relevant, accurate, and timely.
  • Data Protection Compliance:
    • Ensure that information sharing complies with data protection regulations, such as GDPR.
  • Anonymize or pseudonymize data where necessary to protect privacy.
  • Use of Shared Information:
    • Utilize received threat intelligence to enhance internal ICT risk management and resilience.
    • Incorporate shared insights into training and awareness programs.

A woman sitting on a cliff overlooking the ocean
Challenges in Implementing DORA


Challenges in Implementing DORA


DORA’s comprehensive framework presents several challenges for financial entities:


  1. Resource Demands: Compliance requires significant financial investments in technology, cybersecurity tools, and skilled personnel, posing difficulties for smaller entities.
  2. Third-Party Compliance: Managing third-party ICT providers involves renegotiating contracts, monitoring compliance, and addressing risks in global supply chains.
  3. Technological Adjustments: Entities must upgrade legacy systems and implement regular testing, such as Threat-Led Penetration Testing (TLPT), alongside real-time incident reporting.
  4. Regulatory Alignment: Multinational firms face complexities in aligning DORA with other regulations like NIS2, while adapting to evolving technical standards from ESAs.
  5. Cultural Shifts: Building awareness, training staff, and integrating ICT risk management into daily operations require significant internal changes.
  6. Information Sharing: Balancing GDPR compliance with secure threat intelligence sharing and establishing trusted networks can be challenging.

Addressing these issues strategically will enable entities to enhance resilience and maintain regulatory compliance.




Timeline for DORA Implementation


  • January 16, 2023: DORA entered into force.
  • January 17, 2025: Full compliance becomes mandatory.
  • Ongoing: Financial entities must align with additional technical standards developed by European Supervisory Authorities (ESAs).

The timeline emphasizes the need for entities to act swiftly in developing their compliance strategies and updating existing frameworks.


Strategic Outlook


DORA marks a paradigm shift in how financial entities approach digital resilience, setting a high bar for ICT governance and operational risk management. While compliance poses challenges, including significant financial and operational investments, it also presents opportunities for innovation and enhanced competitiveness. Entities that proactively adapt to DORA can position themselves as leaders in operational resilience, building trust among customers and stakeholders.


The future of financial resilience lies in the seamless integration of robust ICT practices, collaborative threat intelligence, and a culture of continuous improvement. DORA not only prepares the financial sector for digital disruptions but also establishes a foundation for sustainable growth in a digital-first economy.

Reduce your
compliance risks