The Digital Operational Resilience Act (2026 Guide)

You are sitting in a meeting with compliance, IT, procurement, and risk, and everyone is using the word DORA a little differently. One person means incident reporting. Another means vendor oversight. Someone else thinks it is mostly about cyber. That confusion is common, especially if your institution moved quickly to meet the January 2025 deadline and is now facing a harder question: what does ongoing compliance actually look like?
That is where understanding the digital operational resilience act properly matters. DORA is not just another reporting exercise. It is an EU regulation that pushes financial entities to treat digital resilience as an operational discipline, with evidence, governance, testing, and oversight that stand up to scrutiny over time. In 2026, that shift is even clearer as regulators move from initial readiness to proof of compliance. If you want the plain-English version of what DORA is, who it applies to, and what it expects in practice, this guide will help you get grounded fast.
What the act actually is
The digital operational resilience act is the common name for Regulation (EU) 2022/2554. It became applicable on 17 January 2025 and created a unified EU framework for digital operational resilience across financial services.
Think of it this way: before DORA, many institutions already managed cyber risk, outsourcing, business continuity, and incident processes. The problem was fragmentation. Rules differed by sector, by regulator, and often by internal team. DORA pulls these strands together and sets a more consistent baseline for how financial entities should manage ICT risk, test resilience, report major incidents, oversee ICT third parties, and participate in trusted information sharing.
If you want a broader foundation before going deeper, Dorapp’s article on what is digital resilience is a useful starting point. You can also explore the Digital Operational Resilience category for related explainers.
Why this regulation matters beyond compliance
The reality is that DORA reflects a business issue as much as a regulatory one. Financial institutions depend heavily on technology, data flows, cloud services, software providers, and outsourced operations. A disruption in any of those areas can affect customers, market confidence, and supervisory trust.
Under DORA, this means resilience is no longer treated as a side topic owned only by security or infrastructure teams. It becomes a cross-functional management issue with board visibility, evidence requirements, and clearer accountability.
Is DORA the same as GDPR (and how they relate)?
This question comes up often, especially in institutions where security, privacy, and operational resilience are already tightly connected. DORA and GDPR are not the same thing, and meeting one does not automatically mean you have satisfied the other.
Now, when it comes to purpose and scope, the difference is fairly clear:
What many people overlook is that the two can intersect in day-to-day operations even though they are different frameworks. A major ICT incident might involve service disruption (a DORA concern) and personal data compromise (a GDPR concern). Vendor oversight might require visibility into subcontractors, locations, and security controls for both resilience and privacy reasons. Security controls, logging, and access management can support both, but they are not identical obligations and the reporting routes and timelines may differ.
From a practical standpoint, what typically helps is treating the overlap as an alignment problem, not a documentation exercise:
Think of it this way: DORA pushes you to prove you can keep critical services running through ICT disruptions, and GDPR pushes you to protect personal data and respect privacy rights. In real institutions, both can be true at the same time, and the safest path is coordination rather than assumptions.
Who DORA applies to
DORA applies to 20 categories of EU financial entities, including banks, insurers, investment firms, payment institutions, electronic money institutions, asset managers, crowdfunding service providers, and several other regulated entity types.
From a practical standpoint, scope questions are often more complicated than they first appear. A group may contain multiple entities in different jurisdictions, each with different regulators, reporting lines, and ICT dependencies. Some requirements may also interact with local outsourcing rules, sector guidance, or group governance structures.
If your team is still aligning on basics, this related explainer on what is digital operational resilience act can help clarify the definition side before you move into implementation detail.
Who inside the institution owns DORA
One common misconception is that DORA belongs to compliance alone. In practice, it usually spans compliance, ICT, security, procurement, operational risk, legal, internal audit, and senior management. The exact ownership model varies, but the work itself is shared.
Consider this: your Register of Information may depend on procurement data, contract data, entity hierarchies, and ICT service mapping. Your incident obligations may depend on IT operations and escalation processes. Your testing program may involve security, resilience, and business continuity teams. That is why institutions that treat DORA as a living operating model often progress more smoothly than those treating it as a one-off filing project.

The five pillars you need to know
DORA is commonly understood through five pillars. Each one matters on its own, but regulators often look at how well they connect in practice.
1. ICT risk management
This pillar focuses on governance, identification, protection, detection, response, recovery, and continuous improvement across ICT risks. It is broader than cybersecurity. It also includes availability, continuity, dependency management, and internal control design.
For more topic-specific reading, the DORA Fundamentals category is a useful reference point.
2. ICT-related incident reporting
Institutions must classify, manage, and report major ICT-related incidents based on the applicable criteria and supervisory expectations. That requires more than a breach inbox. You need escalation logic, decision ownership, and a way to document why an event was or was not reportable.
3. Digital operational resilience testing
Testing is where many programs become real. DORA expects institutions to assess resilience through proportionate testing, and in some cases through more advanced threat-led approaches. If this area feels abstract, start with Dorapp’s article on digital operational resilience testing, then move to dora digital resilience testing for a more practical evaluation lens.
4. ICT third-party risk management
This pillar covers outsourcing and third-party service oversight, especially where ICT services support important business operations. The Register of Information sits here as a major operational artifact, but the real challenge is governance over contracts, dependencies, subcontracting, concentration risk, and evidence quality.
5. Information sharing
DORA also supports voluntary information sharing arrangements on cyber threats and vulnerabilities under controlled conditions. This is often less urgent in early implementation phases, but it is still part of the framework and may become more relevant as institutions mature.
If you want a concise breakdown of the full structure, DORA Pillars Explained: Complete Breakdown (2026) is another helpful companion read.
The five pillars mapped to real deliverables and evidence
Here is the thing: most institutions can describe the five pillars in a slide deck. The harder part, especially in 2026, is proving that each pillar is operating through repeatable artifacts, current evidence, and clear ownership.
Supervisory expectations vary by authority and by institution type, but the deliverables below reflect the kinds of tangible outputs that are commonly requested, reviewed, or sampled. The difference often comes down to whether you can show an end-to-end evidence trail, not just written intent.
1. ICT risk management: what you typically need to show
2. ICT-related incident reporting: what you typically need to show
3. Digital operational resilience testing: what you typically need to show
4. ICT third-party risk management: what you typically need to show
5. Information sharing: what you typically need to show
Common failure points tend to look boring, but they create real supervisory friction: unclear ownership, weak evidence trails, and documentation that is created once and not maintained. In 2026, many institutions are learning that the goal is not only to cover each pillar. It is to demonstrate that the pillar works consistently, with artifacts you can produce quickly and defend under review.
What changed in 2026
2025 was largely about becoming compliant on paper and meeting immediate deadlines. 2026 is shaping up differently. Supervisors are increasingly interested in whether your controls work consistently, whether your records are current, and whether your institution can demonstrate traceable governance over time.
The shift from first submission to proof of compliance
What many people overlook is that regulatory pressure tends to increase after the first reporting cycle, not decrease. Once institutions have submitted their initial materials, regulators can compare filings, cross-check data quality, and ask more targeted questions. Automated cross-referencing of ICT registers across the EU only strengthens that dynamic.
There are also important context updates to keep in view. The ESAs designated Critical Third-Party Providers in November 2025. Delegated Regulation (EU) 2025/532 introduced deeper subcontracting risk expectations. The ECB also finalized its guide on outsourcing cloud services in July 2025. Together, these developments push institutions toward stronger evidence, better mapping of dependencies, and more disciplined vendor oversight.
Oversight of critical ICT third-party providers (CTPPs): what it means for financial entities
One of the more practical shifts behind the 2026 conversation is the idea of oversight of critical ICT third-party providers. You will sometimes hear this described as regulators paying closer attention to the biggest or most systemically important ICT providers that many institutions depend on.
At a high level, the concept is simple: some providers are so central to the financial sector’s technology stack that their disruption could affect many firms at once. When a provider is considered critical, supervisory attention can increase around how that provider manages resilience, and around how financial entities manage their dependency on that provider. This does not remove your responsibilities as a regulated entity. In most cases, it raises expectations that you understand, document, and govern that dependency with more precision.
From a practical standpoint, financial entities often need to be ready for a few types of changes:
Consider this: even if a major provider is under a form of oversight, your institution still has to show it has done its own work. That typically includes maintaining accurate records, being able to explain why a provider is used, what alternatives exist, what controls are in place, and how risks are monitored over time. If you rely heavily on cloud or outsourced ICT services, coordination between procurement, risk, security, and legal is often where things either hold together or break under scrutiny.
Why historical context still matters
If you need a timeline view of how the regulation developed, DORA European Commission Timeline and History (2026) gives useful background. That history matters because it explains why DORA emphasizes consistency across sectors and why supervisory expectations now focus on operational proof, not just policy language.

Reporting, registers, and XBRL
For many compliance teams, this is where DORA stops being conceptual and starts becoming operational. The regulation requires a Register of Information covering ICT third-party service arrangements, and EU-level submissions use XBRL based on the DORA XBRL Data Point Model.
The first Register of Information submission deadline was 30 April 2025. Since then, the practical issue has shifted from initial assembly to ongoing maintenance. Data quality problems that were tolerated internally during preparation become harder to defend once regulators can compare submissions across periods or entities.
Why XBRL matters even if you are not technical
You do not need to be a data engineer to understand the business impact of xbrl. It is the structured reporting format used for EU-level submissions, and it introduces a layer of technical precision that spreadsheet-based processes often struggle with. A field that looks fine to a human reviewer may still fail taxonomy or structural validation.
DORApp was built to simplify DORA compliance for EU financial institutions through a modular approach, turning complex regulatory requirements into structured, manageable workflows with strong support for technically compliant reporting outputs.
What the Register of Information usually gets wrong
In practice, institutions often struggle with incomplete provider records, inconsistent entity identifiers, unclear service classification, duplicate records, and weak ownership between procurement and compliance teams. These are not minor admin issues. They directly affect the defensibility of your submission and the credibility of your third-party oversight.
Platforms like DORApp streamline the Register of Information process through data import, structured record management, public data enrichment, validation logic, and report generation. That does not replace internal judgment, but it can reduce manual friction significantly.
What implementation looks like in practice
Here is the thing: DORA implementation is rarely blocked by not knowing the regulation exists. It is blocked by fragmented data, unclear ownership, and too many manual handoffs. A typical institution has contract data in one place, ICT inventories somewhere else, vendor assessments in email threads, and incident evidence spread across multiple teams.
A realistic implementation pattern
Most institutions move through a pattern that looks something like this:
This is where the real maturity jump happens. A team may technically submit once with heroic effort, but sustainable compliance usually requires repeatable processes, audit trails, and better coordination between business and control functions.
With features like modular workflows, validation support, auto-conversion toward XBRL reporting structures, searchability, and audit-oriented recordkeeping described in current DORApp materials, compliance teams may be able to start operating sooner instead of waiting for perfect source data.

Where tools fit, and where they do not
No platform can make your institution compliant on its own. DORA requires governance decisions, accountability, policy alignment, legal interpretation, and operational discipline. Tools support that work, but they do not replace it.
What good support usually looks like
A useful DORA platform typically helps with data structure, workflow control, validation, evidence tracking, and reporting output. That is especially helpful if you are managing multiple entities or recurring submissions. DORApp, for example, offers modular components such as Register of Information support, third-party risk management capabilities, reporting functions, a help center, a book-a-demo path, and a 14-day free trial based on the currently available product information.
You can explore more at https://dorapp.eu/create-account/ or review the platform paths such as https://dorapp.eu/book-demo/ if you want to see how this kind of approach could fit your institution.
What tools cannot do for you
They cannot decide your legal interpretation, map governance ownership for you, or remove the need for regulator-ready judgment. They also cannot fix poor source data unless your teams actively maintain it. The best results usually come when institutions treat tooling as part of a broader operating model, not a last-minute reporting patch.
Disclaimer: The information in this article is intended for general informational and educational purposes only. It does not constitute professional technical, legal, financial, or regulatory advice. Website performance outcomes, platform capabilities, and business results will vary depending on your specific circumstances, goals, and implementation. Always evaluate tools and platforms based on your own needs and, where relevant, seek professional guidance.
This article is for informational purposes only and does not constitute financial, legal, or regulatory advice. DORA compliance requirements may vary based on your institution type, size, and national regulatory framework. Content referencing regulated industries is provided for general context only and should not be interpreted as legal, regulatory, compliance, or financial advice. If you operate in a regulated sector, always consult qualified financial, legal, and compliance professionals for guidance specific to your situation.
Frequently Asked Questions
What is the digital operational resilience act in simple terms?
The digital operational resilience act, usually called DORA, is an EU regulation that sets common rules for how financial institutions manage technology risk and operational disruptions. It covers ICT risk management, incident reporting, resilience testing, third-party oversight, and information sharing. In simple terms, it asks institutions to show they can prevent, respond to, recover from, and learn from digital disruptions in a structured and provable way. It is not only about cyberattacks. It also covers governance, dependencies, continuity, and the quality of operational controls.
When did DORA start applying?
DORA became applicable on 17 January 2025. That date mattered because it marked the point where regulated financial entities were expected to have their frameworks in place. Still, many institutions treated 2025 as the first major readiness phase. By 2026, the focus is increasingly on whether those frameworks are operating well in practice. That means current evidence, maintained records, repeatable workflows, and stronger audit readiness. If your organization met the initial date but still depends on manual workarounds, you may now be in the phase of improving operational maturity rather than starting from zero.
Who has to comply with DORA?
DORA applies to 20 categories of EU financial entities. This includes banks, insurance undertakings, investment firms, payment institutions, electronic money institutions, asset managers, and several other regulated financial businesses. The exact application can become more nuanced in cross-border group structures or where local supervisory expectations interact with EU rules. That is why many institutions review scope at both entity and group level. If you are unsure whether a specific entity or arrangement falls within scope, it is wise to confirm with legal and compliance advisors rather than relying on high-level summaries alone.
Is DORA mainly a cybersecurity regulation?
No, not in a narrow sense. Cybersecurity is an important part of DORA, but the regulation is broader than that. It also covers governance, ICT continuity, incident processes, testing, dependency management, reporting discipline, and third-party risk. A team that treats DORA as only a security matter may miss major obligations around vendor arrangements, resilience testing, or management oversight. In practice, the institutions that handle DORA best usually involve compliance, ICT, procurement, risk, legal, and executive stakeholders together, because the operating model is cross-functional by design.
What is the Register of Information under DORA?
The Register of Information is the mandatory record of ICT third-party service arrangements required under DORA. It is more than a vendor list. It needs structured information about providers, services, entities, contracts, and dependencies in a format that can support supervisory review and reporting. Many teams underestimate how much normalization and governance this takes, especially where data lives across contracts, spreadsheets, procurement systems, and local entity teams. Maintaining the register over time is usually harder than creating the first version, because updates, ownership, and validation become part of ongoing operations.
Why is XBRL relevant for DORA reporting?
XBRL matters because EU-level DORA submissions are structured in that reporting format, based on the DORA XBRL Data Point Model. Even if you do not work directly with taxonomy files, the format affects how carefully your data must be structured and validated. Human-readable spreadsheets often hide issues that become obvious in machine-readable reporting. That is why institutions often need better validation controls before submission. For compliance teams, the practical takeaway is simple: reporting is not only about having the data. It is also about having the data in a technically acceptable and internally consistent form.
What changed for DORA in 2026?
2026 is widely seen as the year where the focus shifts from initial compliance to evidence of ongoing resilience. Regulators are no longer looking only for a first submission or a documented framework. They increasingly want proof that controls work repeatedly, records stay current, and governance decisions are traceable. Important context updates include the ESA designation of Critical Third-Party Providers in late 2025, deeper subcontracting expectations through Delegated Regulation (EU) 2025/532, and stronger attention to cloud outsourcing governance. In practice, institutions now need to show consistency, not just effort.
Is DORA the same as GDPR?
No. DORA and GDPR are different EU regulations with different goals. DORA focuses on ICT risk and operational resilience in financial entities, meaning governance, disruption readiness, incident handling, testing, and third-party oversight. GDPR focuses on protecting personal data and privacy rights. They can overlap in practice, for example when a technology incident has both operational impact and potential personal data impact, but satisfying one framework does not automatically satisfy the other. If you are aligning processes across resilience and privacy, it is wise to confirm specifics with your legal, privacy, and compliance specialists.
What does ICT mean in DORA (what counts as an ICT service)?
In DORA, ICT generally refers to information and communication technology, meaning the systems, software, infrastructure, and technology-enabled services your institution relies on to operate. In practical terms, this often includes core applications, networks, cloud and hosting services, identity and access services, data platforms, managed security services, outsourced IT operations, and other technology services that support business processes. Whether a specific arrangement counts as an ICT service under DORA can depend on how it is used and how it supports critical or important functions, so many institutions document their classification logic and validate edge cases with their compliance or legal teams.
Can software make us DORA compliant?
Software can support DORA compliance, but it cannot create compliance on its own. Your institution still needs governance decisions, policies, control ownership, legal interpretation, training, and management oversight. What software may do well is structure data, standardize workflows, improve validation, and reduce manual reporting effort. That can make a major difference, especially for the Register of Information and recurring evidence collection. Still, a platform should be viewed as an enabler, not a substitute for accountable execution. You will still need human review, internal controls, and professional advice for institution-specific decisions.
What are the penalties under DORA?
DORA provides for significant supervisory enforcement, with penalties that may reach up to 2% of total annual worldwide turnover for legal persons, and individual fines that may reach up to €1 million, depending on the circumstances and enforcement framework. The exact application can vary by context and supervisory process. The practical point is not to focus only on fines. Most institutions are more immediately concerned with supervisory scrutiny, remediation demands, reputational impact, and the operational burden of fixing weak controls under time pressure. Strong evidence and disciplined governance often matter just as much as formal rule mapping.
Where should a compliance team start if DORA still feels too broad?
Start by reducing the topic into operating blocks. First, confirm which entities and service arrangements are in scope. Next, assess the state of your Register of Information data. Then review ownership for incident management, resilience testing, and third-party governance. After that, look at reporting readiness and evidence quality. This sequence helps because it turns a broad regulation into practical workstreams. Teams that begin with structure and ownership often move faster than teams that start with abstract policy discussions. If you need a practical reference point, Dorapp’s DORA-focused content library can help you build that foundation step by step.
Key Takeaways
Conclusion
DORA is best understood as an operating discipline, not just a regulation you read once and file away. Yes, it sets formal obligations. But the institutions making real progress are the ones translating those obligations into living processes across ICT, compliance, procurement, risk, and management. That is especially true now, as supervisory attention moves toward proof, traceability, and resilience that can be demonstrated over time.
If you were looking for a plain-English explanation of the digital operational resilience act, the main takeaway is simple: DORA asks financial entities to understand their technology dependencies, govern them well, test them realistically, and document their decisions clearly. If you want to go deeper, explore Dorapp’s related articles on digital resilience, DORA testing, and reporting topics, or see how DORApp approaches structured DORA workflows, Register of Information management, and reporting support in practice.
About the Author
Matevž Rostaher is Co-Founder and Product Owner of DORApp. He brings deep experience in building secure and compliant ICT solutions for the financial sector and is positioned by DORApp as an expert trusted by financial institutions on complex regulatory and operational challenges. DORApp’s own webinar materials list him as CEO and Co-Founder of Skupina Novum d.o.o. and CEO and Co-Founder of FJA OdaTeam d.o.o. His articles should carry the voice of someone who understands not just compliance requirements, but the systems and delivery realities behind them.