Digital Operational Resilience

EU Digital Operational Resilience Act (2026 Guide)

M
ByMatevž RostaherLast updatedApril 27, 2026
eu-digital-operational-resilience-act-concept-showing-a-modern-business-workspac.jpg

You might have first heard about the EU Digital Operational Resilience Act in a meeting that moved a little too fast. Someone from compliance mentioned DORA, IT talked about incident reporting, procurement raised questions about vendors, and the business side just wanted to know one thing: what does this actually mean for us? That confusion is common. For many financial entities and teams supporting them, DORA can sound like another dense EU regulation until you connect it to daily reality, your systems, your service providers, your operational risks, and your ability to keep critical services running when something goes wrong.

That is why the eu digital operational resilience act matters. It is not only about policies on paper. It is about proving that your organization can manage ICT risk, oversee third parties, report major incidents correctly, and keep operating under pressure. If you are still getting your bearings, it helps to start with the bigger picture of what is digital resilience before focusing on the regulation itself.

DORApp was built to simplify DORA compliance for EU financial institutions through a modular approach, turning complex regulatory requirements into structured, manageable workflows. In this article, you will get a clear explanation of what DORA is, why it matters, and what practical implications it may have for your business in 2026.

  • What the Act actually is
  • Why this matters beyond compliance
  • Who needs to pay attention
  • What DORA requires in practice
  • DORA vs GDPR (and other frameworks): what overlaps and what does not
  • What the five pillars typically produce (and what supervisors often want to see)
  • ICT third-party risk management: what Chapter V changes in vendor oversight
  • Why 2026 feels different
  • How teams usually prepare
  • Frequently Asked Questions
  • Key Takeaways
  • Conclusion
  • What the Act actually is

    The Digital Operational Resilience Act, formally Regulation (EU) 2022/2554, is an EU regulation designed to strengthen how financial entities manage digital and ICT-related disruption. It became applicable on 17 January 2025 and applies across 20 categories of EU financial entities.

    In plain language, the eu digital operational resilience act is the EU’s way of saying that financial institutions cannot treat technology failures, cyber incidents, and third-party ICT dependencies as side issues. These are core business risks, and regulators expect them to be governed that way.

    If you want a straightforward foundation, it may help to read what is digital operational resilience act alongside this article. You can also browse the broader Digital Operational Resilience category for related topics.

    It is broader than cybersecurity

    What many people overlook is that DORA is not just a cyber rule. It covers operational continuity, governance, third-party dependencies, incident processes, resilience testing, and evidence of control. Cybersecurity is part of it, but not the whole story.

    Think of it this way: if your institution depends on cloud providers, software vendors, outsourced ICT functions, internal systems, and business-critical data flows, DORA is about making sure those dependencies are identified, governed, tested, and documented well enough that your organization can continue functioning under stress.

    DORA vs GDPR (and other frameworks): what overlaps and what does not

    A common point of confusion is whether DORA is basically the same thing as GDPR. It is not. In most cases, the simplest way to separate them is this: DORA is about operational resilience for financial entities, GDPR is about protecting personal data. They can overlap during incidents, but the purpose, scope, and reporting obligations are different.

    From a practical standpoint, DORA focuses on whether you can keep critical services running, manage ICT risk, and evidence controls across governance, testing, incident handling, and third-party dependencies. GDPR focuses on whether personal data is processed lawfully and securely, and what you must do if personal data is breached. Other frameworks may also sit in the background, including sector rules from supervisors, national cybersecurity expectations, and internal risk management standards. DORA does not automatically replace them.

    Consider this: an ICT incident may be a DORA reportable event even if no personal data is affected. A major outage in a critical system, a serious software failure, or a third-party disruption could trigger DORA incident handling and reporting expectations because the key issue is continuity and impact on services.

    The reverse can also happen. A personal data breach could be primarily a GDPR issue, yet still matter under DORA if it exposes weaknesses in ICT risk management, incident response, or third-party oversight. In real incidents, dual processes are often needed. For example, a ransomware event at a service provider could create a service outage that triggers DORA incident classification and reporting steps, and it could also create a personal data breach that triggers GDPR notifications, depending on the facts and on jurisdiction-specific interpretation.

    Now, when it comes to execution, the operational challenge is not the theory. The challenge is aligning workflows so teams do not discover too late that they have two different incident clocks running, two different definitions of severity, and two different evidence packs expected by different stakeholders. Requirements can vary based on your entity type, regulator, and country, so it is typically worth confirming reporting obligations and timelines with qualified legal and compliance professionals.

    Why this matters beyond compliance

    It is easy to see DORA as a reporting burden. The reality is more practical than that. The regulation forces institutions to take a hard look at how resilient they really are, not how resilient they appear in policy documents.

    For example, a payment institution may have strong internal security controls but weak visibility over subcontracted ICT providers. An insurer may have a solid outsourcing register but fragmented incident classification. An investment firm may know its critical systems, yet struggle to connect that knowledge to testing, reporting, and board oversight. DORA brings those disconnected pieces together.

    From a business standpoint, that matters because outages, vendor issues, and data problems do not stay inside the IT department. They affect customer trust, regulatory relationships, business continuity, and management accountability.

    Why leadership teams should care

    Under DORA, responsibility is not confined to technical teams. Management bodies are expected to understand and oversee digital operational resilience. That means compliance, risk, procurement, legal, security, and leadership all need a shared view of critical ICT risks and dependencies.

    This is also where a practical platform can help. Platforms like DORApp streamline the creation and maintenance of the Register of Information process through importing existing data, managing it in an intuitive interface, auto-enriching public data where relevant, validating records against reporting rules, and generating compliant outputs. That does not replace internal judgment, but it can reduce manual friction.

    eu-digital-operational-resilience-act-compliance-planning-workspace-with-digital.jpg

    Who needs to pay attention

    DORA directly applies to a wide range of EU financial entities, including banks, insurers, investment firms, payment institutions, electronic money institutions, asset managers, crowdfunding service providers, and certain funds and intermediaries. If you are unsure where your organization fits, start with a plain-English overview of what is dora.

    Now, when it comes to practical impact, not every institution will feel DORA in exactly the same way. The proportionality principle still matters, and national supervisory expectations may vary in application. But the core obligations are still real.

    Even smaller firms may feel significant pressure

    Smaller institutions sometimes assume DORA is mainly a large-bank problem. In practice, leaner teams may feel the pressure even more because they often rely heavily on external ICT providers and may still manage parts of compliance through spreadsheets, email chains, and disconnected processes.

    If your organization depends on a handful of key vendors for hosting, software, communications, or outsourced operations, DORA may expose just how much resilience depends on visibility and control over those third parties.

    What DORA requires in practice

    DORA is commonly explained through five pillars: ICT risk management, incident reporting, digital operational resilience testing, ICT third-party risk management, and information sharing. If you want a pillar-by-pillar explanation, see DORA Pillars Explained: Complete Breakdown (2026).

    1. ICT risk management

    You need a structured way to identify, assess, manage, and review ICT risks. Under DORA, this means governance cannot be ad hoc. Roles, controls, evidence, and escalation paths need to be clear. The related category on DORA Fundamentals is useful if your team is still building a shared baseline.

    2. Incident reporting

    Institutions must classify and report major ICT-related incidents according to the applicable framework. This is not only about detecting incidents, but about determining their regulatory significance and documenting them correctly within strict timelines.

    3. Resilience testing

    Testing matters because policies alone do not prove resilience. Institutions may need to test how well they can withstand disruptions, recover services, and learn from weaknesses. If this area is new to you, read more about digital operational resilience testing and the more practical angle in dora digital resilience testing.

    4. Third-party oversight and the Register of Information

    One of the most visible DORA obligations is the Register of Information, which records ICT third-party service arrangements. The first ROI submission deadline was 30 April 2025, and by 2026 regulators are expected to rely more heavily on automated checks and cross-referencing. This makes data quality and consistency much more important than many teams first assumed.

    With features such as configurable workflows, validation logic, full-text search, audit trail support, and data conversion toward XBRL-based reporting structures, DORApp allows teams to start working with imperfect source data and improve quality over time. That is often more realistic than waiting until every spreadsheet is perfectly aligned.

    5. Information sharing

    DORA also encourages information and intelligence sharing in a controlled way. From a regulatory standpoint, this reflects a simple idea: institutions can strengthen resilience when they learn from threats, incidents, and patterns beyond their own walls, provided that legal and governance boundaries are respected.

    What the five pillars typically produce (and what supervisors often want to see)

    It helps to think of the five pillars as a framework that should produce real deliverables, not just broad intentions. In supervisory interactions, the conversation is often less about whether you know the pillar names and more about whether you can show, with evidence, how each pillar operates in day-to-day work.

    Here is what each pillar typically produces in practice. The exact format can vary by institution and by regulator, so treat these as common patterns, not a fixed template.

    ICT risk management: governance packs and control evidence

    This pillar often produces a governance set that includes defined roles and responsibilities, policies and standards, risk assessments, system and service inventories, and evidence that controls are designed and operating. What regulators will usually ask to see is how management oversight works in practice, for example decision trails, risk acceptance logic, control testing outcomes, and how ICT risk connects to business-critical services.

    Incident reporting: repeatable workflows and audit-ready timelines

    Incident obligations tend to produce classification criteria, response playbooks, escalation paths, and an incident record with timestamps that can withstand scrutiny. What many people overlook is that incident reporting is also a data discipline problem. Supervisors often want to see consistency across detection, classification, notification decision-making, and post-incident review, with clear ownership and documented rationale.

    Resilience testing: test plans, results, and remediation tracking

    Testing typically produces test plans, scopes, methodologies, results, and remediation tracking. This is where teams often feel friction because testing evidence can end up scattered across tools and departments. Supervisors will often ask how test outcomes feed back into risk decisions, investment prioritization, and control improvements, not just whether a test happened.

    ICT third-party risk management: a living view of dependency and control

    Third-party oversight often produces a mapped view of providers, supported services, criticality assessments, contract and SLA requirements, monitoring activities, and exit planning. This is also where concentration risk and subcontracting visibility become recurring questions. In many institutions, the hardest part is connecting procurement reality to operational resilience needs, especially when contracts were not originally written with DORA-style evidence expectations in mind.

    Information sharing: controlled participation with governance guardrails

    Information sharing tends to produce participation decisions, internal rules on what can be shared, and records of how intelligence was used. Regulators may ask how sharing is governed, who approves it, and whether lessons from external intelligence actually influence internal controls and response readiness.

    The difference often comes down to whether these outputs are maintained as ongoing operations. If evidence only exists as a one-time compliance push, gaps tend to reappear quickly when staff change, vendors change, or systems evolve.

    digital-operational-resilience-act-eu-team-meeting-on-ict-risk-vendor-oversight-.jpg

    ICT third-party risk management: what Chapter V changes in vendor oversight

    Third-party oversight was already a pressure point for many financial entities before DORA. Chapter V raises expectations by making ICT vendor dependency a first-class resilience topic. In practice, that typically means you need a clearer view of who provides what, how critical that service is, what subcontracting exists behind it, and how you would keep operating if something fails.

    One theme that comes up repeatedly is that oversight cannot stop at onboarding. Monitoring and review are expected to be ongoing, especially for arrangements that support critical or important functions. This is also where concentration risk starts to feel less theoretical. If a large portion of your critical services rely on a small set of providers, institutions are typically expected to recognize that dependency and manage it, even if the provider is well known and widely used.

    Critical ICT providers and why that changes internal expectations

    DORA introduces supervisory attention on certain providers that may be designated as critical at EU level. For your institution, the practical impact is that regulators may ask sharper questions about how you manage dependencies on those providers, how you monitor service performance, and how you handle disruption scenarios. This does not automatically mean you must exit those relationships. It usually means you should be able to evidence oversight and continuity planning in a more structured way.

    Contract review: practical topics teams often need to confirm exist

    From a practical standpoint, many organizations discover that the Register of Information is only the beginning. Contracts and operational practices need to line up with what is being reported and what is being monitored. The right approach is typically to treat the following as contract review topics to confirm with your legal and compliance teams, rather than as a one-size-fits-all checklist:

  • Access and audit rights, including what evidence you can obtain and on what terms
  • Incident notification expectations, including timelines, thresholds, and what information the provider must supply
  • Subcontracting conditions and visibility, including approval or notification requirements and who remains accountable
  • Service continuity expectations, including recovery objectives where relevant and communication during disruptions
  • Exit and transition support, including data return, deletion, and realistic migration assistance
  • Security and resilience requirements, including how controls are evidenced and reviewed over time
  • What many people overlook is that the toughest part is often not writing these clauses, it is operating them. If you have audit rights but never use them, or incident notification clauses that do not match your internal incident workflow, you may still struggle to demonstrate effective control.

    Why the Register of Information becomes an ongoing control

    The Register of Information is sometimes treated as a one-time submission exercise. By 2026, that mindset can create avoidable risk. The register is often most useful when it functions as an operational control layer that supports ongoing oversight. If provider names, entity mappings, service descriptions, and criticality labels are inconsistent, monitoring becomes harder and supervisory questions become more time-consuming to answer.

    Think of it this way: data quality becomes a control in itself. Clean records make it easier to understand dependencies, manage subcontracting visibility, and respond to supervisory requests with confidence. Poor records typically create the opposite effect, especially when multiple teams maintain partial versions of the truth.

    Why 2026 feels different

    The first phase of DORA was about readiness. The next phase is about evidence. In many institutions, 2026 is becoming the year of proving that controls, registers, testing, and reporting processes actually work as ongoing operations.

    From a regulatory standpoint, that shift matters. The European Supervisory Authorities designated Critical Third-Party Providers in November 2025. Delegated Regulation (EU) 2025/532 added deeper expectations around subcontracting risk. The broader supervisory direction is clear: institutions need more than static documentation.

    Proof of compliance is becoming operational

    This is where many teams feel the gap between “we have a policy” and “we can demonstrate repeatable execution.” Regulators are increasingly interested in traceability, accountability, and whether data submitted across frameworks is internally consistent.

    If you want context on how the EU reached this point, DORA European Commission Timeline and History (2026) offers a useful background view. For a dedicated overview of the digital operational resilience act, see our related guide.

    How teams usually prepare

    Consider this: most organizations did not start from a clean slate. They began with a mix of procurement records, outsourcing lists, incident logs, spreadsheets, policy documents, and department-specific ways of working. The challenge is rarely a total lack of data. It is fragmented ownership and uneven quality.

    What practical preparation often looks like

  • Map your in-scope entities, services, systems, and ICT providers
  • Clarify who owns incident classification, reporting, third-party records, and testing evidence
  • Review whether your Register of Information data can be updated and exported consistently
  • Check whether board and management reporting is connected to real underlying records
  • Identify where manual work creates delay, rework, or control gaps
  • In practice, this means building operating discipline, not just producing documents. DORApp reflects this operational approach through modular workflows, support for imports, validation, XBRL-oriented report generation, and a Help Center at DORApp Help Center for teams working through implementation questions.

    If your institution is evaluating how to operationalize DORA without overcomplicating the process, you can also explore the main DORApp information pages such as DORApp Functions or request a closer look through Book a Demo. For teams that prefer hands-on exploration first, DORApp also offers a Free Trial – 14 Days.

    Disclaimer: The information in this article is intended for general informational and educational purposes only. It does not constitute professional technical, legal, financial, or regulatory advice. Website performance outcomes, platform capabilities, and business results will vary depending on your specific circumstances, goals, and implementation. Always evaluate tools and platforms based on your own needs and, where relevant, seek professional guidance.

    Regulatory note: This article is for informational purposes only and does not constitute financial, legal, or regulatory advice. DORA compliance requirements may vary based on your institution type, size, and national regulatory framework. Content referencing regulated industries is provided for general context only and should not be interpreted as legal, regulatory, compliance, or financial advice. If you operate in a regulated sector, always consult qualified financial, legal, and compliance professionals for guidance specific to your situation.

    eu-digital-operational-resilience-act-third-party-ict-risk-management-and-resili.jpg

    Frequently Asked Questions

    What is the EU Digital Operational Resilience Act in simple terms?

    The EU Digital Operational Resilience Act, usually called DORA, is an EU regulation that requires financial entities to manage technology and ICT-related risk in a more structured and provable way. In simple terms, it asks institutions to show they can keep important services running, handle incidents properly, oversee key ICT vendors, and test their resilience. It is not limited to cybersecurity. It also covers governance, reporting, third-party dependencies, and operational continuity. For most teams, the challenge is turning scattered processes into something repeatable and well documented.

    What are the 5 pillars of the Digital Operational Resilience Act?

    DORA is commonly structured into five pillars: ICT risk management, incident reporting, digital operational resilience testing, ICT third-party risk management, and information sharing. In practice, each pillar typically produces concrete outputs, such as governance and control evidence, incident classification and reporting records, test plans and remediation tracking, third-party oversight artifacts including the Register of Information, and controlled processes for sharing threat intelligence. Exact expectations can vary by regulator and institution type, so it is usually best to confirm scope and evidence needs with your legal and compliance teams.

    Is DORA the same as GDPR?

    No. DORA focuses on operational resilience and ICT risk management for financial entities, while GDPR focuses on personal data protection. They can overlap in incident scenarios, for example when an ICT incident also involves a personal data breach, but the purpose and obligations are different. Depending on the facts and jurisdiction, a team may need to run both DORA incident processes and GDPR breach assessment and notification steps. Because requirements and timelines can vary, it is important to confirm obligations with qualified legal and compliance professionals.

    What is the Digital Operational Resilience Act in Europe?

    The Digital Operational Resilience Act is an EU regulation, Regulation (EU) 2022/2554, that sets requirements for how financial entities manage ICT risk, respond to and report major ICT incidents, test resilience, oversee ICT third-party providers, and participate in controlled information sharing. It is designed to make resilience something institutions can evidence in operations, not only describe in policy. It became applicable on 17 January 2025, and by 2026 many institutions are focusing more on proving repeatable execution and maintaining high-quality records.

    Who does DORA apply to?

    DORA applies to 20 categories of EU financial entities. That includes institutions such as banks, insurers, investment firms, payment institutions, and other regulated financial organizations. Exact applicability depends on your entity type and regulatory status, so it is important to confirm scope with legal and compliance specialists. Even if your team is not directly responsible for regulatory interpretation, you may still be involved operationally. Procurement, IT, risk, compliance, legal, and leadership functions often all play a part because DORA reaches into vendor oversight, incident handling, resilience testing, and management accountability.

    Who needs to comply with DORA?

    DORA compliance obligations generally apply to in-scope EU financial entities and, indirectly, to many ICT third-party providers that support them through contractual and oversight expectations. Even within an institution, “who” typically goes beyond the compliance function. IT, security, risk, procurement, vendor management, legal, and business owners of critical services often all have roles because DORA touches incident workflows, testing evidence, third-party oversight, and management reporting. If you are unsure about your institution’s scope, it is important to confirm with qualified legal and compliance professionals.

    Is DORA only about cybersecurity?

    No. That is one of the most common misunderstandings. Cybersecurity is part of DORA, but the regulation is broader than that. It covers ICT risk governance, incident reporting, operational resilience testing, oversight of ICT third-party providers, and information sharing. If your organization focuses only on security tools and ignores operational dependencies, board oversight, reporting workflows, or third-party documentation, you may still have gaps. DORA looks at whether your institution can manage technology risk as a business-critical issue, not just whether your security team has technical defenses in place.

    What is the Register of Information under DORA?

    The Register of Information is a mandatory record of ICT third-party service arrangements. It helps regulators understand which providers support financial entities, where dependencies exist, and how important those arrangements may be. The challenge is that this is rarely stored neatly in one place. Teams often need to reconcile procurement records, outsourcing data, contract details, service mappings, and entity information. By 2026, data quality matters even more because supervisory review is increasingly focused on consistency and technical submission quality, including XBRL-based reporting structures where applicable.

    Why is 2026 such an important year for DORA?

    For many institutions, 2026 marks the move from initial compliance readiness to proof of compliance in daily operations. Supervisory expectations are maturing, and regulators may increasingly examine whether institutions can demonstrate execution, not just policy intent. Recent developments, including the designation of Critical Third-Party Providers in late 2025 and updated subcontracting expectations, reinforce that direction. In practical terms, teams now need stronger evidence, cleaner data, and more reliable workflows. The focus is shifting from “do you have something documented?” to “can you show how this works in practice?”

    How does DORA affect third-party vendors and outsourcing?

    DORA places significant attention on ICT third-party risk. Financial entities need visibility into service providers, the services they support, and the risks tied to those relationships. This may include contract review, dependency mapping, concentration risk awareness, and closer attention to subcontracting chains. For many organizations, that means procurement and compliance teams need to work more closely with IT and business owners. It is no longer enough to know that a provider exists. You may need to show how that provider supports critical functions, what controls apply, and how risk is monitored over time.

    Do smaller financial entities need the same level of DORA maturity as large institutions?

    Not always in the same depth, but smaller entities should not assume DORA is light-touch in practice. The regulation still applies, and smaller firms often rely heavily on external providers or manual processes, which can create their own risks. Proportionality matters, but it does not remove the need for structured oversight. In many cases, smaller teams benefit from simpler, more focused operating models rather than large and complicated frameworks. The goal is not to mimic a multinational bank. It is to make sure your own controls, reporting, records, and governance are clear, workable, and defensible.

    What should a team do first if it is just starting with DORA?

    A good first step is to map what you already have. Most teams are not starting from zero. You may already have vendor lists, incident logs, outsourcing records, policies, and risk registers. The practical task is to understand where those records live, who owns them, and whether they support DORA-style governance and reporting. After that, identify your biggest operational gap. For one institution it may be incident classification, for another the Register of Information, and for another resilience testing. Starting with the clearest pain point is often more effective than trying to rebuild everything at once.

    Can software make an institution DORA compliant?

    No software can, by itself, make an institution compliant. DORA is a regulatory obligation that depends on your governance, controls, decision-making, data quality, and operating model. Software may support those processes by organizing records, validating data, structuring workflows, and improving traceability. That support can be valuable, especially where manual processes create risk or delay. Still, institutions need internal ownership, subject matter judgment, and legal and compliance review. The most useful technology usually helps teams execute and evidence their processes more consistently, rather than pretending to replace regulatory responsibility.

    Key Takeaways

  • The eu digital operational resilience act is about managing and proving resilience across ICT risk, incidents, testing, and third-party oversight.
  • DORA applies broadly across EU financial entities and is not limited to cybersecurity alone.
  • By 2026, the focus has shifted from initial readiness to evidence, consistency, and operational proof.
  • The Register of Information and third-party governance are central pressure points for many institutions.
  • Tools may help structure data and workflows, but compliance still depends on your institution’s governance and execution.
  • Conclusion

    The eu digital operational resilience act matters because it turns digital resilience from a technical aspiration into a regulated business expectation. If your institution depends on technology, vendors, data flows, and connected services, DORA is really about whether you can understand those dependencies, govern them well, and keep operating when conditions are less than ideal.

    Here’s the thing: most teams do not need more theory. They need clarity on what matters, what is already in place, and what still needs to become repeatable and auditable. That is why starting with practical understanding is so valuable. Once the concepts are clear, the path forward becomes much more manageable.

    If you want to keep building that understanding, explore the Dorapp blog for more articles on DORA fundamentals, testing, and digital resilience. If your team is already thinking about operationalizing these requirements, DORApp is one platform worth exploring at Why DORApp to see how a modular, compliance-focused approach may support your next step.

    The information in this article is intended for general informational and educational purposes only. It does not constitute professional technical, legal, financial, or regulatory advice. Website performance outcomes, platform capabilities, and business results will vary depending on your specific circumstances, goals, and implementation. Always evaluate tools and platforms based on your own needs and, where relevant, seek professional guidance.

    This article is for informational purposes only and does not constitute financial, legal, or regulatory advice. DORA compliance requirements may vary based on your institution type, size, and national regulatory framework. Content referencing regulated industries is provided for general context only and should not be interpreted as legal, regulatory, compliance, or financial advice. If you operate in a regulated sector, always consult qualified financial, legal, and compliance professionals for guidance specific to your situation.

    M

    About the Author

    Matevž Rostaher is Co-Founder and Product Owner of DORApp. He brings deep experience in building secure and compliant ICT solutions for the financial sector and is positioned by DORApp as an expert trusted by financial institutions on complex regulatory and operational challenges. DORApp’s own webinar materials list him as CEO and Co-Founder of Skupina Novum d.o.o. and CEO and Co-Founder of FJA OdaTeam d.o.o. His articles should carry the voice of someone who understands not just compliance requirements, but the systems and delivery realities behind them.