Skip to Content
  • Craft’s easy-to-use platform simplifies supply chain resilience and speeds time to value with new enhanced capabilities

    Learn More
Craft Logo
  • Platform
  • Solutions
    • Supplier Intelligence

      Conduct checks in hours instead of weeks with comprehensive supplier intelligence you can trust.

    • Supplier Risk Management

      Stay alerted to changes in supplier health to understand threats and avoid disruption.

    • Supply Chain Risk Management

      Gain insights into supplier dependencies and risks to predict and prevent disruption.

  • Risk and Compliance
    • Risk and Compliance Solutions

    • Compliance Hub

      Navigate complex regulatory landscapes

    • Cybersecurity

      Defend against cyber threats.

    • ESG

      Empower sustainable practices with ESG insights.

    • Financial

      Identify and navigate financial risks.

    • Geopolitical

      Navigate geopolitical risks with confidence.

  • Industries
    • Aerospace and Defense

      Simplify risk management in this complex and crucial sector.

    • Federal Government

      Enhance risk visibility and mitigation in federal government.

    • Financial Services

      Navigate challenges within the financial services sector.

    • Manufacturing

      Optimize risk management in manufacturing.

  • Resource Center
    • Resources

      Learn more about Craft, our vision, and what we’re doing to strengthen global supply chain resilience.

    • Blog

      Explore Craft thought leadership from our technology and supply chain experts.

    • Events

      Get the latest industry news, topics, and trends from Craft experts.

  • Company
    • About Us

      Learn about our mission, world-class technology, and esteemed investors.

    • Culture & Careers

      Learn about our culture and check out our current job postings.

    • Newsroom

      Stay up to date on our latest news and announcements.

    • Contact Us

      Learn more about the Craft platform and how we can mitigate risk to your supply chain.

  • Request a Demo
FinancialQuick GuidesRegulatory & Compliance

Understanding the Digital Operational Resilience Act (DORA)

Share


What is the Digital Operational Resilience Act?

The Digital Operational Resilience Act (DORA) is a new set of rules passed by the European Union that came into effect on January 16, 2023, with full application beginning on January 17, 2025, to strengthen the financial sector’s digital defenses, requiring banks, insurance firms, investment companies, and similar institutions to improve their digital security. This includes having good plans, training employees, testing systems regularly, and being transparent when problems arise. DORA aims to prevent widespread disruptions caused by cyberattacks, system failures, and other tech-related problems.

The core themes of DORA are risk management, incident response and reporting, digital operational resilience testing, third-party risk management, and information sharing. These elements build a comprehensive strategy for assessing risks, handling incidents, testing defenses, ensuring vendor security, and collaborating through information sharing.

How will DORA affect businesses?

With recent increased frequency and sophistication of cyberattacks, DORA aims to prevent severe consequences from cyber crime by setting strict risk management standards across the board for financial institutions like banks, insurance firms, investment companies, and even crypto-asset service providers. This applies not only to the institutions themselves, but also to the tech companies they rely on for services like cloud and data management. 

Penalties for noncompliance with DORA can be severe, including:

1. Financial Penalties

Entities that fail to comply with DORA may face substantial fines. The amount can vary, but is typically proportionate to the gravity of the breach and the financial strength of the entity. Fines can be revenue-based, daily, cumulative, or a combination of various fine types depending on the violation. In some instances, fines may be reduced if the entity can demonstrate that it has taken steps to mitigate the impact of the breach or has cooperated fully with regulatory authorities during the investigation.

2. Operational Restrictions

In cases of severe noncompliance, regulatory authorities may impose restrictions on the entity’s operations. This could include limiting the scope of activities the entity is allowed to perform or suspending certain operations until compliance is achieved.

3. Increased Supervision

Entities that fail to meet DORA’s requirements may be subject to increased supervision by regulatory authorities. This could involve more frequent audits, mandatory reporting requirements, or other oversight measures designed to ensure future compliance.

4. Reputational Damage

Noncompliance with DORA can lead to reputational damage, especially if breaches are made public. Regulatory authorities may disclose noncompliance to the public, damaging the entity’s reputation and trustworthiness in the market.

5. Legal Consequences

In some cases, noncompliance could lead to legal actions by affected parties, including customers, partners, or other stakeholders who may have suffered losses due to the entity’s failure to meet DORA’s standards.

6. Regulatory Actions

Authorities have the power to impose various regulatory sanctions, including issuing warnings, mandating corrective actions, or even revoking licenses in extreme cases.

What are DORA’s key requirements?

ICT Risk Management and Governance

DORA places a significant responsibility on management to stay informed about Information Communication and Technology (ICT) risks and create robust risk management frameworks. This means top executives and board members can be held accountable if their firm doesn’t meet DORA’s requirements. Firms must be proactive, documenting their systems and regularly assessing their risk profiles.

Under DORA, businesses must analyze their entire technology landscape. This involves identifying critical functions and assets, understanding their interconnections, and documenting their dependencies on each other and external providers. It’s like drawing up a battle plan for the digital world, identifying weaknesses and strengths.

Consider a bank relying on a cloud provider to store sensitive customer data. DORA requires the bank to assess the cloud service’s security and document potential risks, holding both the bank and the cloud provider responsible for maintaining high-security standards.

DORA mandates business impact analysis to play out “what if” scenarios, including service disruptions, cyberattacks, or natural disasters. Through these simulations, institutions determine their risk appetite, strengthen their digital infrastructure, and create robust business continuity plans.

Incident Response and Reporting

If a major incident occurs, firms must be transparent with regulators and affected parties. They must file detailed reports outlining what happened, how they are addressing it, and how they’ll prevent it from happening again. There’s a clear structure for reporting serious incidents: an initial notification, updates on the resolution process, and a final, detailed analysis identifying root causes.

Incident reporting could become complex across different countries and authorities. However, the European Supervisory Authorities (ESAs) are streamlining the process. They aim to establish common templates and explore a centralized EU reporting hub. This simplification will speed up response times and coordination across the financial landscape.

Digital Operational Resilience Testing

DORA requires financial institutions to prove their defenses are strong through regular testing of their systems. This helps identify vulnerabilities and ensure protection measures are effective. These tests include vulnerability assessments, incident scenario simulations, and threat-led penetration testing (TLPT), essentially simulated cyberattacks.

The test results are reviewed by authorities, meaning firms must address weaknesses. This demonstrates a commitment to continuous improvement in their resilience.

Testing is an ongoing process. Each year, institutions must conduct basic tests to identify vulnerabilities early on. However, institutions critical to the financial system undergo a full TLPT simulation every three years. This testing also involves their key tech providers, ensuring everyone is on the same page regarding security. This strengthens the overall security posture.

Third-Party Risk Management

DORA emphasizes third-party risk management, explicitly addressing the tech providers serving financial institutions. This is because a secure system is only as strong as its weakest external link. Financial institutions must proactively mitigate the risks posed by these third-party service providers.

Financial institutions must ensure that any provider handling critical or important functions meet DORA’s strict security and operational requirements. This is because the institutions remain responsible even if the problem originates with an outside vendor.

For instance, if a financial institution contracts a company for data processing, they can’t assume the processor’s security is adequate. DORA mandates strict contract agreements covering exit strategies, regular audits, security requirements, and performance benchmarks. These measures shift the responsibility for strong security from a “hope for the best” approach to a legally binding and supervised reality.

In 2019, the EBA established the Guidelines on ICT and security risk management and Guidelines on outsourcing arrangements. Building on these, the MFSA released its Guidance on Technology Arrangements, ICT and Security Risk Management, and Outsourcing Arrangements in December 2020.

DORA empowers regulators to take action if necessary. They can force firms to terminate agreements with non-compliant tech companies, reinforcing that cybersecurity is not optional but the law.

Research shows that financial companies could spend up to 3% of their payroll on regulatory compliance. While this seems significant, compare it to the cost of major security breaches and reputational damage. The upfront investment in compliance is more appealing.

Information Sharing

While not mandatory, DORA encourages financial services firms to collaborate and share threat intelligence. This means firms are encouraged to share information about cyber threats they’ve faced and the mitigation strategies they’ve used. This fosters a collective defense effort, making everyone smarter and more effective.

However, sharing sensitive information requires clear ground rules. Any intelligence sharing must comply with existing regulations for personal data protection. This ensures sensitive data remains protected even in collaborative environments.

Training and Staff Awareness

Employees are often an organization’s most significant vulnerability regarding cyber threats. DORA emphasizes ongoing training and awareness programs for all staff members. These programs educate employees about cybersecurity threats, security procedures, and how to react during an technology incident.

Many resources are available for staff training in data protection, cyber security, and compliance frameworks like GDPR, ISO 27001, PCI DSS, and CCPA. Training methods include classroom sessions, in-house training, live online courses, self-paced online training, and e-learning programs.

How Craft Can Help

Craft’s supplier risk management solutions are designed to streamline compliance and enhance reporting. With our platform:

  • Identify risky suppliers with in-depth company profiles and easily scalable due diligence
  • Continuously monitor your supplier network for changes and potential violations.
  • Document your efforts for proof of compliance
  • Collaborate and share information across teams for faster risk mitigation.

Learn More

Conclusion

DORA significantly impacts financial companies and technology firms. It represents a crucial shift in the European financial industry’s mindset regarding cybersecurity. Robust security measures are no longer optional but a legally mandated, centrally supervised, crucial aspect of business in today’s digital world.

For an overview of regulations affecting the global supply chain, visit our compliance hub.

Share

In this article

  • What is the Digital Operational Resilience Act?

  • How will DORA affect businesses?

  • What are DORA's key requirements?

  • How Craft Can Help

  • Conclusion

  • Risk and Compliance Solutions

    Get the visibility and insights you need to identify and mitigate risk and build a more resilient supply chain.

    Learn More

Related Posts

View All
  • Procurement & Supply Chain

    The Risk Savvy Report: April 1 – 21, 2025

    Read Now
  • Procurement & Supply Chain

    The Risk Savvy Report: March 18 – 31, 2025

    Read Now
  • Procurement & Supply Chain

    The Risk Savvy Report: February 22 – March 17, 2025

    Read Now

Ready to learn more?

Schedule a risk assessment session with our team to learn more about Craft.

Get Risk Assessment
Craft.co

Craft provides organizations with the 360-degree visibility, timely insights, and agility needed to mitigate risk and build stronger supplier networks and more resilient supply chains.


Sign up for our newsletter

  • Platform
  • Solutions
    • Supplier Intelligence
    • Supplier Risk Management
    • Supply Chain Risk Management
  • Risk and Compliance
    • Risk and Compliance Solutions
    • Compliance Hub
    • Cybersecurity
    • ESG
    • Financial
    • Geopolitical
  • Industries
    • Aerospace and Defense
    • Federal Government
    • Financial Services
    • Manufacturing
  • Resource Center
    • Resources
    • Blog
    • Events
  • Company
    • About Us
    • Culture & Careers
    • Newsroom
    • Contact Us
  • Request a Demo
  • Facebook
  • LinkedIn
  • Twitter
  • Terms of Service
  • Privacy Policy
  • Security

© 2025 Craft.co. All rights reserved.

We value your privacy
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits.
By clicking “Accept”, you consent to the use of ALL the cookies.
Privacy Policy
In case of sale of your personal information, you may opt out by using the link Do not sell my personal information.
CustomizeAccept
Consent Preferences

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
Reject All Save My Preferences Accept All