multi jurisdiction dora (2026 Guide)


A group compliance lead at an EU financial group typically learns the hard way that multi jurisdiction dora execution is not a simple matter of copying one policy pack across entities. Three weeks before a supervisory interaction, you discover that your “single” ICT vendor inventory differs by entity, your incident thresholds are interpreted differently in local playbooks, and your Register of Information export requires clean identifiers and consistent service mappings. Each local team is confident they are “DORA compliant,” yet the consolidated view is fragmented and hard to evidence.
This is the operational reality of DORA for cross-border financial groups: DORA is a directly applicable EU regulation, but it must be operationalized through entity-level governance, local accountability, and reliable data across multiple competent authorities. This article explains how to structure a multi-jurisdiction DORA program so you can demonstrate control under DORA’s five pillars, with a specific focus on practical friction points: governance, the register of information, ICT third-party oversight, and incident reporting. For context on the broader concept behind the regulation, see what is digital resilience.
Table of Contents
Why multi-jurisdiction DORA feels harder than it “should”
DORA (Regulation EU 2022/2554) is directly applicable across the EU, which leads many executives to expect uniform implementation. Here’s the thing: while the legal text is uniform, execution is not. The burden sits in the operational layer: data models, decision logs, and cross-functional workflows that must work under time pressure and withstand supervisory scrutiny.
In multi-entity groups, the most common failure mode is not missing policies. It is inconsistent decisions and inconsistent evidence. Supervisors and internal audit may focus less on whether you have “a policy,” and more on whether you can prove that controls are performed consistently, exceptions are governed, and management has reliable oversight. DORA’s intent, reflected across its governance and ICT risk management obligations, is outcomes and demonstrability, not documentation volume.
Multi-jurisdiction complexity typically shows up in three places:
To anchor terminology internally, it can help to align your definitions to DORA-focused education materials, such as what is digital operational resilience act and the broader digital operational resilience act overview.
Governance models that work across entities
DORA requires a management body that is accountable for the ICT risk management framework and for digital operational resilience. In a group, you typically have to show both entity-level accountability and a credible group-level oversight structure, especially when ICT services are centralized.
Model 1: Federated governance with group standards
Most mid-sized and large groups land here. You define group-wide minimum standards for DORA pillars, and each entity implements them with controlled local extensions. From an operational standpoint, the key is to make deviations visible and approved. That means a deviation register, approval workflow, and periodic review cadence, not informal “local differences.”
Consider this scenario: a payment institution in one member state relies on a local core banking outsourcer with bespoke contractual constraints. Your group standard for ICT third-party contract clauses may be correct, but the local contract negotiation may require compensating controls. The governance model must allow that, while preserving the ability to evidence board awareness and risk acceptance.
Model 2: Centralized governance with entity execution
This model is common when the group runs shared technology platforms and centralized security operations. The group function designs the control set, but entities remain responsible for execution evidence and for ensuring local applicability. What many compliance teams overlook is that centralized design does not remove the need for entity-level “ownership objects,” such as named control owners, local KRIs, and sign-offs suitable for each entity’s management body.
Model 3: Hybrid by pillar
Some pillars centralize better than others. For example, third-party inventory and concentration risk analysis may benefit from centralization, while local incident reporting to competent authorities may require entity-driven execution with group support. If you choose this hybrid approach, document it clearly in a DORA responsibility matrix and ensure it ties back to DORA Articles on governance, ICT risk management, and incident reporting.
If your stakeholders include German-speaking local teams, internal education may benefit from localized explainers like digital operational resilience act deutsch and dora digital operational resilience act deutsch, while you still run one consistent group interpretation baseline.

Scope and jurisdiction: what “multi-jurisdiction DORA” really means
Many group programs treat “multi jurisdiction dora” as a project management issue. Under DORA, it is also a scope and accountability issue. DORA applies to financial entities in scope under Article 2 of DORA and it has applied since 17 January 2025. In a cross-border group, that means you often have a mix of:
What the regulation actually requires is that each in-scope financial entity can demonstrate its own compliance, even when execution is shared. From a practical standpoint, you should expect supervisors to probe where “group policy” ends and where the entity’s management body decisions begin, especially for ICT Risk Management Framework design, acceptance of residual ICT risk, and major ICT-related incident reporting.
Does DORA apply to non-EU entities in the group?
DORA is an EU regulation focused on EU-regulated financial entities. A non-EU affiliate is not typically directly in scope only because it belongs to an EU group. The catch is operational: if non-EU entities provide services, platforms, development, or operational support that EU regulated entities rely on, those dependencies can still become part of your DORA evidence. This often shows up through:
This content is for informational purposes only and does not constitute legal advice. For borderline cases, such as complex group structures or mixed regulated and unregulated service chains, you typically confirm scoping with qualified legal or regulatory counsel and align your approach with competent authority expectations.
Register of Information: turning a local inventory into a group asset
The Register of Information (ROI) is where multi-jurisdiction DORA becomes very concrete. You may have to produce structured information about ICT services, providers, contracts, and dependencies. In practice, the ROI becomes a data quality program. If your ROI data cannot be validated, reconciled, and exported reliably, you are left with manual remediation each reporting cycle.
In many groups, the first attempt fails because each entity treats the ROI as a one-time collection exercise. DORA expects ongoing accuracy. That means you need lifecycle triggers: new outsourcing, contract renewals, material changes, provider sub-outsourcing changes, and service criticality changes should flow into ROI updates with ownership and approvals.
Define one group data model, then enforce it
Start by agreeing on a common definition of “ICT service” and how it maps to business functions and critical or important functions. Then define consistent identifier rules, including legal entity identifiers where applicable, supplier identifiers, contract IDs, and consistent country and location fields.
Now, when it comes to multi-jurisdiction reporting, the hardest part is not collecting fields. It is making the relationships consistent. Supervisors often care about traceability: which critical function relies on which service, which service relies on which provider, and what the material subcontracting chain looks like.
Typical control points that make ROI defensible
One operational option some groups choose is a dedicated DORA compliance platform to keep ROI data, workflows, and evidence in one place. DORApp, for example, supports a modular approach centered on the ROI and includes automatic LEI validation and enrichment during record creation and import, plus controlled workflow sign-offs and audit logs. If you want to evaluate that approach, you can review the platform entry points on DORApp Modules and the support resources in the DORApp Help Center.
ICT third-party risk and outsourcing oversight in a group
DORA Articles 28 to 44 set expectations for ICT third-party risk management, including governance, pre-contract due diligence, contractual content, ongoing monitoring, and exit strategies. In a group, the friction is predictable: procurement is centralized, risk assessments are local, and ICT is shared. Without an operating model, you end up with parallel vendor files and inconsistent contract clause coverage.
Think of it this way: DORA wants you to manage third-party ICT risk as a resilience issue, not only as a supplier management issue. That drives three group-level priorities: consistent classification of criticality, consistent minimum contract clauses, and a consolidated view of concentration and dependency risk across entities.
Standardize the “minimum” and govern exceptions
Most groups benefit from a mandatory minimum control set, for example:
The reality is that you will still face local constraints, including different outsourcing market practices and legacy contracts. Your defensibility depends on how you document compensating controls and ensure management body awareness where residual risk remains.
Concentration risk is a group problem
Even if each entity “only” uses a hyperscaler for a small workload, group-level concentration may become material when you aggregate critical functions, shared identity services, and shared monitoring infrastructure. DORA expects you to understand and manage concentration risk. Practically, this is hard to do without a consolidated register that normalizes vendor names, service names, and subcontractor chains.
From a tooling perspective, some institutions use dedicated workflows to connect ROI records to third-party questionnaires, scoring, review gates, and board reporting. DORApp’s Third Party Risk Management and Questionnaire Automation (TPRM) module is designed around that continuous oversight model and can connect questionnaire-driven collection to controlled approvals and reporting outputs. If you are assessing solution options, the product overview in DORApp Functions can help you map capabilities to your target operating model.

Incident reporting: keeping speed and consistency under pressure
DORA’s incident reporting obligations, particularly DORA Articles 17 to 23, create an immediate multi-jurisdiction challenge: you need speed, consistency, and evidence. Major ICT-related incidents must be classified and reported according to DORA requirements and the related ITS and RTS developed by the ESAs (EBA, ESMA, EIOPA) through the Joint Committee.
In a group, the operational risk is that each entity applies different classification thresholds and timelines. Under stress, teams may prioritize technical containment and delay the compliance decision. That may be understandable operationally, but it can create reporting failures if you lack a structured decision process that runs in parallel with incident response.
Build a group-wide classification method, then localize the routing
A workable approach is to standardize the classification logic and minimum evidence, then localize the escalation path and competent authority submission steps. This keeps the “what counts as major” decision consistent, while respecting local reporting channels. Your process should also address cross-entity incidents, for example shared IAM outage impacting multiple regulated entities.
Design for the board question: “How did you decide?”
Supervisors and boards often focus on decision traceability: who classified the incident, based on what evidence, and who approved external reporting. That is why many groups implement a decision journal or controlled workflow to capture timestamps, rationale, and approvals.
For deeper context on structuring the reporting artifact itself, see the Dorapp resource on incident report, which can help teams align the content and structure of incident documentation to DORA expectations.
Testing and assurance: making resilience evidence comparable
DORA’s digital operational resilience testing expectations push groups to move beyond ad hoc IT testing. You may have vulnerability assessments, red team exercises, and disaster recovery tests already. The gap is usually comparability and coverage: can you show that every entity and every critical function sits in a risk-based testing plan, with tracked findings, remediation ownership, and repeat testing where needed?
For some entities, threat-led penetration testing (TLPT) under DORA Article 26 may apply, subject to national implementation details and supervisory direction. Even when TLPT is not in scope, DORA still expects a structured testing program and management oversight.
In multi-jurisdiction groups, testing challenges often include:
To stay defensible, define group-level minimum evidence and remediation governance, then let local teams choose the most appropriate testing techniques within that envelope.
RTS, ITS, and ESA expectations: how to stay consistent across countries
A multi-jurisdiction DORA program can look consistent on paper and still fail under scrutiny because teams interpret technical requirements differently. DORA is supported by Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) developed by the European Supervisory Authorities (EBA, ESMA, EIOPA) through the Joint Committee. Those standards are often where “local execution drift” starts, especially when different entities read and implement requirements through different internal stakeholders.
What many compliance teams overlook is that the standards layer creates operational work items that are easy to fragment: reporting templates, minimum data fields, control testing evidence, and role definitions. In a group setting, the cost is not only duplicated work. It is inconsistent evidence, which is exactly what supervisors and internal audit tend to challenge.
Build one group interpretation baseline, then allow controlled local add-ons
A practical approach is to maintain one controlled baseline that maps each DORA pillar to your group controls and evidence expectations, and then manage local differences explicitly. In most groups, a “baseline pack” includes:
Make supervisory interactions easier with pre-agreed evidence packages
Supervisory requests are often time-sensitive. In a multi-entity group, delays commonly come from “evidence hunting” across tools and teams. Consider preparing a set of entity-level and group-level evidence packages that you can refresh periodically, such as:
This content is for informational purposes only and does not constitute legal advice. RTS and ITS obligations, and how evidence is evaluated in practice, may be subject to supervisory interpretation. For institution-specific conclusions, you typically align internally with legal counsel and your supervisory engagement model.

Operating model and tooling: what to standardize vs localize
Multi jurisdiction dora programs succeed when you explicitly decide what is standardized, what is localized, and how you reconcile differences. If you leave this implicit, you will spend each reporting cycle negotiating definitions and fixing data inconsistencies.
Standardize these elements (in most groups)
Localize these elements (subject to entity profile and NCA expectations)
Some groups decide that the ROI and third-party oversight workflows must be run on a single platform to reduce reconciliation and to maintain an audit trail. DORApp’s subscription model is modular and priced by user seat, with the first module priced at €200 per user per month and additional modules at €100 per user per month, excluding VAT. If you want to compare this to internal build costs and ongoing operational effort, the reference point is available via DORApp Pricing. For a hands-on evaluation, you can also use the Free Trial – 14 Days or Book a Demo to review workflows with your own ROI and vendor samples.
Key Takeaways
Conclusion
Multi jurisdiction dora is less about interpreting one EU regulation differently across borders, and more about building a resilient operating model that works across entity boundaries. You need consistent definitions, controlled workflows, and evidence that management can rely on, especially for the Register of Information, third-party ICT oversight, and major incident reporting. The groups that mature fastest are the ones that treat DORA as an ongoing execution discipline, with explicit decisions about what is standardized and what remains local.
If you are validating whether your current approach can produce consistent, audit-ready outputs across entities, start with a reporting rehearsal and a cross-entity incident classification tabletop. If you conclude that spreadsheets and email-driven approvals are creating friction or evidence gaps, it may be worth seeing how a dedicated DORA compliance platform supports ROI, third-party governance, and traceable decisioning. You can Book a Demo to review how your multi-entity workflows could be implemented in practice.
Regulatory Disclaimer: This article is provided for informational and educational purposes only. It does not constitute legal advice and should not be relied upon as a substitute for qualified legal or regulatory counsel. DORA compliance obligations vary depending on the nature, scale, and risk profile of each financial entity. Always consult with a qualified legal advisor or compliance professional regarding your specific obligations under the Digital Operational Resilience Act and applicable Regulatory Technical Standards. DORA interpretation and supervisory expectations may evolve as the European Supervisory Authorities (EBA, ESMA, EIOPA) publish additional guidance, and outcomes may be subject to supervisory discretion by your National Competent Authority. This content applies to EU-regulated financial entities as defined under Regulation EU 2022/2554.
Frequently Asked Questions
Does DORA allow a single group-wide program for all EU entities?
DORA is directly applicable EU law, so a group-wide program is often efficient, but you still need entity-level accountability and evidence. In practice, most groups implement group standards, shared tooling, and centralized oversight, while each regulated entity maintains ownership, approvals, and local escalation paths. Supervisors may focus on whether the entity’s management body can demonstrate effective oversight, especially for ICT risk decisions, third-party reliance, and incident reporting. A single policy is rarely enough if local execution and evidence are fragmented.
How do we handle different National Competent Authority expectations if DORA is an EU regulation?
Even with uniform EU law, supervisory emphasis may differ based on market practices, entity risk profile, and local supervisory priorities. Your best defense is a consistent baseline aligned to DORA and the ESAs’ RTS and ITS, plus a structured method to document local add-ons. Many compliance teams maintain an NCA variance log that maps differences to controls, reporting steps, and governance artifacts. Where expectations are unclear, you typically confirm interpretations with legal counsel and, where appropriate, engage the competent authority through established supervisory channels.
What is the most common multi-jurisdiction DORA gap in the Register of Information?
Data consistency across entities is usually the biggest gap, not missing fields. Common issues include duplicate supplier records, inconsistent service naming, and weak relationship mapping between critical functions, ICT services, and providers. These problems surface during ROI export rehearsals or audits. A practical fix is to implement validation gates, maker-checker approvals, and a clear ownership model for reference data. This is also where automated LEI validation and enrichment can reduce recurring errors during record creation and import.
Can shared services be owned centrally while entities remain compliant?
Yes, but you should document how central ownership translates into entity-level governance. For example, a centralized SOC may run monitoring and response, but each entity may still need to show how it oversees the service, receives metrics, approves risk acceptances, and escalates major ICT-related incidents. Auditors often ask how an entity’s management body exercises control when execution is centralized. Clear RACI matrices, recurring reporting, and traceable approvals are typically necessary to demonstrate that shared services do not dilute accountability.
How do we keep incident classification consistent across multiple entities?
Most groups standardize classification criteria and minimum evidence, then localize the submission and notification routing. The key is to run classification as a controlled decision workflow, in parallel with technical incident response. This ensures you can evidence who decided what, when, and based on which facts. For documentation structure and expectations, it helps to align teams on an incident report format that is consistent across entities, even when the final regulatory submission steps differ.
Do we need to run TLPT in every jurisdiction?
Threat-led penetration testing under DORA Article 26 is risk-based and depends on whether your entity is in scope and how competent authorities operationalize the requirement. In groups, you often need to analyze scope per entity and per critical function, especially when shared infrastructure supports multiple regulated entities. Even where TLPT is not mandated, DORA still expects an overall testing program with remediation governance. You typically maintain a test inventory and remediation tracker that can be aggregated to group level for management reporting.
How should we manage third-party ICT concentration risk at group level?
Concentration risk is rarely visible if each entity maintains separate vendor lists and inconsistent service mappings. You typically need a consolidated view that normalizes provider identities and maps dependencies to critical functions. This includes subcontractor chains where relevant. Groups often implement a quarterly concentration risk review that feeds management reporting and informs exit strategy prioritization. DORA’s third-party risk provisions in DORA Articles 28 to 44 create the expectation that you can identify and manage material dependencies, not only list vendors.
Is NIS2 compliance enough to cover multi-jurisdiction DORA?
NIS2 and DORA overlap in operational resilience themes, but they have different scopes, addressees, and supervisory mechanics. DORA is tailored to financial entities and includes specific obligations such as the financial sector ROI, DORA-specific incident reporting structures, and the third-party oversight framework for critical ICT third-party service providers. Many institutions reuse security controls and incident handling practices across both regimes, but you typically still need DORA-specific governance, evidence, and reporting alignment. Treat NIS2 as complementary, not a substitute.
How should we train local teams without creating multiple “interpretations” of DORA?
Use one group interpretation baseline and train local teams on how it applies to their entity, including permitted deviations and escalation routes. Many groups publish a controlled DORA glossary and run recurring calibration sessions where local teams review borderline cases, for example outsourcing classification and major incident thresholds. If language localization is needed, ensure translations still anchor to one interpretation, using controlled references such as digital operational resilience act rather than rewriting requirements informally.
What is the jurisdictional scope of DORA for cross-border groups?
DORA applies to EU-regulated financial entities in scope under Article 2 of DORA, regardless of which EU member state they are established in. Multi-jurisdiction complexity comes from operating across multiple competent authorities and from shared services and shared providers that cut across entity boundaries. Non-EU affiliates are not typically directly in scope only due to group ownership, but dependencies on non-EU teams or locations may still need to be captured in your ROI, third-party oversight, and incident response evidence.
What does “Regulation (EU) 2022/2554” mean in practice for evidence across jurisdictions?
Regulation (EU) 2022/2554 is the legal act that sets the baseline DORA requirements. In practice, evidence often needs to align not only with the regulation text but also with the RTS and ITS produced by the ESAs (EBA, ESMA, EIOPA) through the Joint Committee. For cross-border groups, the practical objective is one consistent evidence standard, plus a controlled way to capture local add-ons driven by competent authority expectations. This content is for informational purposes only and does not constitute legal advice.
Does DORA apply to US entities that provide services to an EU financial entity?
DORA is focused on EU-regulated financial entities, not on general non-EU companies. A US-based provider is not typically “in scope” as a financial entity under DORA. Still, your EU entity may have DORA obligations to manage that provider as an ICT third-party service provider, including contractual provisions, oversight, and exit planning under DORA Articles 28 to 44. Whether a given provider could be designated as a critical ICT third-party service provider is subject to the DORA oversight framework and supervisory processes.
What are the five pillars of DORA, and why do they matter for a multi-jurisdiction program?
DORA is commonly operationalized through five pillars: ICT risk management, ICT-related incident reporting, digital operational resilience testing, ICT third-party risk management, and information sharing arrangements. In a multi-jurisdiction group, the pillars matter because the same incident, vendor, or shared service can trigger obligations in several entities at once. The groups that execute well typically standardize taxonomy, decision workflows, and evidence across all pillars, then localize only the competent authority routing and entity-specific governance artifacts.
About the Author
Matevž Rostaher is Co-Founder and Product Owner of DORApp. He brings deep experience in building secure and compliant ICT solutions for the financial sector and is positioned by DORApp as an expert trusted by financial institutions on complex regulatory and operational challenges. DORApp’s own webinar materials list him as CEO and Co-Founder of Skupina Novum d.o.o. and CEO and Co-Founder of FJA OdaTeam d.o.o. His articles should carry the voice of someone who understands not just compliance requirements, but the systems and delivery realities behind them.