DORA Compliance Date: January 2025 and Beyond (2026 Guide)

If you work in a bank, insurer, investment firm, payment institution, or another EU financial entity, you have probably had some version of this conversation already: “DORA went live in January 2025, so are we done now, or is this just the starting point?” That question matters because the dora compliance date is often treated like a finish line when it is really a regulatory turning point. January 17, 2025 marked the moment the Digital Operational Resilience Act became applicable across the EU, but the real work did not stop there.
The reality is that many institutions spent 2024 preparing policies, mapping ICT providers, and building their Register of Information, only to discover in 2025 and 2026 that regulators increasingly want proof, not just plans. DORApp was built to simplify DORA compliance for EU financial institutions through a modular approach, turning complex regulatory requirements into structured, manageable workflows with audit-ready outputs and technically compliant reporting support. If you are still clarifying the timeline, this article will help you understand what the date means, what changed after it, and what your team should be focusing on now.
Contents
What the date actually means
The dora compliance date is January 17, 2025. That is the date on which the Digital Operational Resilience Act, Regulation (EU) 2022/2554, became applicable across the European Union. If you want a broader foundation first, it helps to review what is dora and how the framework was designed.
In plain language, this means financial entities covered by DORA were expected to comply from that date onward, not begin thinking about compliance afterward. The date is sometimes also referred to as the dora effective date or dora regulation effective date. For regulated firms, that distinction matters because regulators usually assess whether your institution had the required capabilities, controls, and governance in place as of the application date, subject to supervisory practice and national implementation details.
Who the date applies to
DORA applies to 20 categories of EU financial entities, including banks, insurers, investment firms, payment institutions, electronic money institutions, asset managers, and certain crowdfunding platforms and funds. From a practical standpoint, if your organization relies on ICT providers to support critical or important functions, DORA is almost certainly relevant to your operating model.
If you need a broader explanation of scope and structure, dora regulation explained is a useful next read. It gives context around why DORA exists and how it fits into the wider EU resilience agenda.
Timeline recap: from adoption (2022) to applicability (2025) to RTS/ITS updates (2025 to 2026)
If you have seen “dora compliance date 2022” or “dora effective date 2023” in search results, you are not imagining it. Here’s the thing: EU regulations usually have multiple dates that get discussed in different ways, and people often mix them together.
“Entered into force” vs “applicable” (why both show up)
Typically, a regulation will be adopted and published, then it will enter into force, and only later become applicable. In practical terms, “entered into force” is when the law exists as an EU legal act. “Applicable” is when covered firms are expected to comply in day-to-day operations.
That is why you still see 2022 referenced. Regulation (EU) 2022/2554 was adopted in 2022, and many early articles and internal project plans anchored around that moment. But the dora compliance date you should manage against is the applicability date, January 17, 2025.
A simple milestone timeline that matches how DORA actually unfolded
Most teams find it easier to align internally when the key milestones are written down in a single sequence:
Now, when it comes to compliance planning, that last line is the one that causes the most confusion. The core date does not move, but the “how” can still evolve.
Why RTS/ITS updates still matter after the date is fixed
RTS and ITS often shape the operational detail regulators care about. They may define templates, required data elements, validation rules, time limits, process steps, and reporting mechanics. That means you can be “ready for January 2025” at a framework level, then still have real work in 2025 and 2026 to keep your processes aligned with updated technical expectations.
From a practical standpoint, this is why teams that treat DORA as a one-off project often get stuck. The stronger approach is to build an operating routine that can absorb changes, such as updated reporting fields for the Register of Information or deeper expectations around subcontracting and concentration risk, without rebuilding everything each time.

Why January 2025 was not the end
A lot of teams treated January 2025 like a deadline to survive. They rushed to update frameworks, collect vendor data, assign responsibilities, and prepare documentation. That was understandable. But DORA was never meant to be a one-time filing exercise.
Think of it this way: the date triggered an obligation to operate with digital resilience, not just to describe it on paper. Under DORA, this means your institution needs to maintain ICT risk management, incident reporting readiness, testing capabilities, third-party oversight, and controlled information sharing on an ongoing basis.
Compliance moved from documentation to evidence
What many people overlook is that initial compliance and provable compliance are not the same thing. In early implementation phases, institutions could sometimes rely on policy packs, remediation plans, and partial inventories while building out their operating model. By 2026, supervisors are increasingly focused on whether controls actually work in practice.
This is where the conversation starts shifting toward execution quality. The question is less “Do you have a DORA framework?” and more “Can you show how it operates, who approved what, what changed, and what evidence supports your reporting?” That shift is one reason many teams are now revisiting their dora implementation approach.
The 5 DORA pillars and what “good” looks like after January 2025
Many institutions can describe DORA at a high level, but still struggle to explain what “good” looks like once the regulation is applicable and supervisors expect routine execution. A simple way to structure that conversation is to use DORA’s five core pillars.
The difference often comes down to this: after January 2025, teams are typically assessed less on whether a policy exists and more on whether the operating model produces consistent outputs and evidence. That does not mean every institution is expected to look identical. It does mean you should be able to show ownership, cadence, and traceability.
1) ICT risk management
This is the foundation. Post-2025, “good” often means you can show how ICT risks are identified, assessed, treated, and monitored as part of routine governance, not just an annual risk exercise. Evidence might include risk decisions, exception handling, change approvals, management reporting, and clear accountability for keeping risk information current.
2) ICT-related incident reporting
A plan is not enough if you cannot execute it under pressure. “Good” typically looks like a workable classification process, defined escalation paths, and a way to document decisions quickly. Evidence might include incident logs, timelines, post-incident reviews, and records showing how you determined impact and materiality, even if your procedures still evolve.
3) Digital operational resilience testing
Testing is where theory meets reality. After January 2025, supervisors often expect that you can demonstrate a testing approach that fits your institution’s size and risk profile, and that findings are tracked through remediation. Evidence can include test plans, results, remediation tracking, and sign-offs that show what was tested, what failed, and what improved.
4) ICT third-party risk management
This is where many teams feel the operational load, especially when groups have many entities and providers. “Good” often means you can show a reliable inventory of providers, services, and contracts, plus ongoing monitoring and periodic reviews. Evidence may include contract review records, subcontractor visibility, concentration risk considerations, provider performance monitoring, and decision logs for onboarding and renewals.
5) Information sharing
DORA encourages controlled information sharing on cyber threats and vulnerabilities. The reality is that “good” here is usually about governance: clear rules on what can be shared, with whom, and how decisions are documented. Evidence might include internal procedures, participation records, and documented approvals, without exposing sensitive operational details.
For most small business owners and entrepreneurs, “pillars” can sound abstract. For a regulated financial entity, they are a practical checklist for where ongoing proof will come from. If you can map each pillar to recurring routines and evidence, you usually have a clearer path through 2026 than a team relying mainly on one-time documentation.
What changed through 2025 and 2026
Once the dora compliance date passed, the regulatory picture kept developing. For many institutions, that was the harder part. The framework became operational, supervisory expectations became more concrete, and technical reporting quality started to matter much more.
The first Register of Information submission raised the bar
One of the biggest practical milestones after January 2025 was the first Register of Information submission deadline, which was set for April 30, 2025. Institutions had to maintain a mandatory register of all ICT third-party service arrangements and prepare data in XBRL format for EU-level submissions based on the DORA XBRL Data Point Model.
That created pressure in a very specific area: data quality. Many institutions discovered gaps in legal entity data, provider hierarchies, subcontracting visibility, and contract-level details. If your team is still refining this area, the Register of Information category is worth bookmarking.
Supervisory oversight became more operational
In November 2025, the European Supervisory Authorities designated Critical Third-Party Providers, or CTPPs. That development matters because it reinforces the idea that third-party risk is not just a procurement issue. It sits at the center of operational resilience and supervisory attention.
At the same time, Delegated Regulation (EU) 2025/532 introduced deeper subcontracting risk requirements. The ECB also finalized its Guide on outsourcing cloud services in July 2025. Together, these developments pushed institutions to look more closely at concentration risk, supply-chain visibility, and contractual governance.
2026 is about proof of compliance
By 2026, many institutions are moving from “we implemented DORA” to “we can demonstrate ongoing resilience.” That is a different level of maturity. It usually requires stronger workflows, clearer accountability, and a better audit trail than manual spreadsheets alone can provide.
DORApp’s modular structure reflects that practical shift. Its ROI module, TPRM module, and roadmap modules for incident management, risk management and governance, and intelligence sharing are designed to support ongoing DORA processes rather than one-off submissions. That distinction is useful if your institution is trying to reduce manual work while improving defensibility.

What teams should be doing now
If January 2025 was the legal starting point, 2026 is the operational checkpoint. The reality is that many teams do not need a full reset. They need a clearer view of where their current process is fragile.
Review your timeline assumptions
Some institutions still work as if DORA has one main implementation date and then occasional annual updates. In practice, there are multiple recurring obligations behind the headline date. You should understand not just when DORA became applicable, but how recurring governance, testing, reporting, and third-party management obligations affect your calendar. A focused read on the dora implementation deadline can help clarify this distinction.
Pressure-test your Register of Information process
Your Register of Information should not live as a static spreadsheet updated right before a submission. In practice, this means reviewing who owns updates, how provider records are validated, how contracts are linked, and how changes are approved. Teams that treat the register as a living process usually have fewer issues at reporting time.
Platforms like DORApp streamline the creation and maintenance of the Register of Information process through a structured import workflow, ongoing record management, public-data enrichment, validation against reporting rules, and compliant report generation. That does not replace your governance decisions, but it can reduce the friction between raw data and submission-ready output.
Check whether your evidence is audit-ready
Consider this simple test: if a supervisor asks how a specific provider classification changed, can your team show the decision history, the approver, the timing, and the rationale quickly? If not, your process may be compliant on paper but weak in operational evidence.
This is also where the broader concept of what is digital resilience becomes useful. DORA is not only about filing. It is about whether your institution can continue operating through disruption with traceable controls and credible governance.
Where tools fit into the picture
Not every institution needs the same delivery model. Some can manage parts of DORA internally. Others need a focused platform because the volume of entities, providers, contracts, and approvals creates too much manual risk.
What a tool should actually help with
A useful DORA tool should support process discipline, data quality, and technical output, not just act as a document repository. From a practical standpoint, the most valuable support often shows up in four places:
With features confirmed in its documentation such as automatic LEI validation and enrichment, audit trail, configurable workflows with review gates, and DORA report export in XBRL, DORApp gives compliance teams a more operational path from source data to regulator-ready reporting. The platform also offers a Free Trial – 14 Days and a Book a Demo option if you want to evaluate how that approach fits your institution.
Why modularity matters after the compliance date
Once the dora effective date has passed, the challenge usually becomes prioritization. You may be strongest on the Register of Information but weaker on third-party risk reviews. Or you may have policy structure in place but no clean evidence trail. A modular approach can make sense because it lets teams focus on the area creating the most operational pain first.
If you want more context on DORA’s structure as a whole, the DORA Pillars Explained: Complete Breakdown (2026) article is a useful companion read, alongside the DORA Fundamentals category.
Do you need DORA compliance software? When tooling becomes necessary (and what to evaluate)
A lot of search intent around DORA has shifted from “what is the date?” to “what do we use to run this?” That is fair. After January 2025, the workload is less about writing policies and more about operating repeatable processes across entities, providers, and contracts.
Here’s the thing: not every institution needs dedicated DORA compliance software right away. Some teams can run a proportionate approach with internal workflows, spreadsheets, or an existing GRC setup, at least for a period. Tooling becomes harder to avoid when the scale and change rate make manual control risky.
Common signals that spreadsheets are starting to break down
In most cases, the tipping point looks like one or more of these:
None of those issues automatically mean non-compliance. They do increase the odds of reporting errors, missed changes, and weak evidence if a supervisor asks how a decision was made.
What to evaluate if you are considering a tool
If you are evaluating platforms, it helps to stay focused on what DORA forces you to operationalize. A practical checklist usually includes:
Selection criteria also matter. Integration is usually a deciding factor because provider and contract data often sits in procurement, IT, and governance tools already. Scalability matters if you support multiple entities or expect growth. Exportability matters because you should not be locked into a format you cannot evidence or move. Regulatory coverage matters too, but you should validate what is truly supported today versus what is planned.
If your team is at the stage where data quality, audit trail, and recurring reporting are taking too much effort, it may be worth exploring whether a focused platform approach like DORApp fits your delivery model. The goal is not software for its own sake. The goal is a more controlled, evidence-backed process that can keep up as DORA expectations continue to mature through 2026.

Common misunderstandings
Once you start talking about dates, a few misconceptions appear almost every time. Clearing them up can save your team a lot of wasted effort.
“If we were compliant on January 17, 2025, we are fine”
Not necessarily. Being prepared on the application date was important, but DORA expects ongoing operation and maintenance. Your data, suppliers, incidents, and governance structures keep changing. Your controls need to keep up.
“The only date that matters is the effective date”
No. The dora regulation effective date matters, but so do follow-on obligations, supervisory requests, national authority expectations, and reporting milestones. The original date sets the baseline, not the entire timetable.
“DORA is mainly an IT problem”
It is not. DORA is cross-functional by design. Compliance, risk, IT, procurement, legal, security, and senior management all have roles to play. That is one reason the digital operational resilience act dora framework tends to expose process gaps between teams, not just technology gaps.
“Once we can export XBRL, the hard part is over”
XBRL matters, but technical export alone is not enough. If the underlying records are incomplete, outdated, or poorly governed, technical output may still create regulatory issues. Good reporting starts much earlier in the workflow. For historical context on how the framework developed, the DORA European Commission Timeline and History (2026) post is helpful.
The information in this article is intended for general informational and educational purposes only. It does not constitute professional technical, legal, financial, or regulatory advice. Website performance outcomes, platform capabilities, and business results will vary depending on your specific circumstances, goals, and implementation. Always evaluate tools and platforms based on your own needs and, where relevant, seek professional guidance.
This article is for informational purposes only and does not constitute financial, legal, or regulatory advice. DORA compliance requirements may vary based on your institution type, size, and national regulatory framework. Content referencing regulated industries is provided for general context only and should not be interpreted as legal, regulatory, compliance, or financial advice. If you operate in a regulated sector, always consult qualified financial, legal, and compliance professionals for guidance specific to your situation.
Frequently Asked Questions
What is the official DORA compliance date?
The official DORA compliance date is January 17, 2025. That is the date the Digital Operational Resilience Act became applicable across the EU. For covered financial entities, this means the regulation was no longer in a preparation phase from that point onward. In practice, though, many obligations tied to DORA continue after that date through recurring governance, reporting, testing, and third-party oversight activities. So while January 17, 2025 is the key legal date, your institution should treat it as the start of ongoing operational expectations rather than a one-time event.
Is the DORA effective date the same as the DORA compliance date?
In most practical discussions, yes. People often use dora effective date, dora regulation effective date, and dora compliance date to refer to the same milestone: January 17, 2025. The more important distinction is not between those phrases, but between the regulation becoming applicable and your institution being able to demonstrate continuous compliance afterward. A team may know the date but still struggle with evidence, process ownership, or reporting quality. That is why it helps to pair date awareness with a realistic review of how your DORA controls work day to day.
Did DORA end on January 17, 2025, once firms became compliant?
No. DORA did not “end” once the date arrived. The regulation created ongoing obligations around ICT risk management, incident handling, resilience testing, third-party oversight, and information sharing. The first wave of work often focused on getting frameworks and registers in place before the applicability date. After that, institutions needed to maintain those processes, improve data quality, and respond to supervisory expectations. In 2026, many regulators are placing more emphasis on proof of compliance, which means your operating model, evidence trail, and record quality may matter just as much as your written policies.
What happened after the DORA compliance date passed?
Several important things followed. The first Register of Information submission deadline arrived on April 30, 2025. The ESAs designated Critical Third-Party Providers in November 2025. Delegated Regulation (EU) 2025/532 added more depth around subcontracting risk, and supervisory expectations around operational resilience continued to mature. For institutions, this meant the period after January 2025 became more operational, more detailed, and more evidence-driven. If your team focused heavily on initial readiness, 2026 is a good time to review where your controls are working well and where they may still rely too much on manual effort.
Who needs to care most about the DORA compliance date?
Compliance officers, CIOs, CISOs, risk managers, procurement leaders, legal teams, and senior management all need to care about it. DORA is not just an IT issue. It affects how your institution governs ICT risk, manages external providers, responds to incidents, and demonstrates resilience to supervisors. Smaller institutions may feel the strain most sharply because the same people often cover multiple responsibilities. Larger groups may face a different challenge, which is coordinating multiple entities, providers, and reporting lines. In both cases, understanding the date is only useful if it leads to better ownership and more reliable operational processes.
Does DORA require XBRL reporting from all institutions?
DORA’s EU-level reporting framework for the Register of Information uses XBRL based on the DORA XBRL Data Point Model. Whether and how your institution submits, and through which channels, may depend on the supervisory setup and national process that applies to you. What matters operationally is that institutions should prepare source data in a way that supports technically correct reporting. Many compliance teams are not data engineering teams, so tools that help convert structured records into XBRL can reduce friction. Even so, technical formatting does not replace the need for complete, well-governed underlying data.
What should a team review in 2026 if it already prepared for January 2025?
Start with your weak spots, not your best-looking documents. Review whether your Register of Information is updated continuously, whether provider and contract data are complete, whether decision-making is traceable, and whether your workflows produce evidence that would stand up to supervisory review. Also look at third-party risk, subcontracting visibility, incident readiness, and management reporting. Many institutions do not need to rebuild everything. They need to move from fragmented, manual steps toward a more controlled operating model. That usually means better ownership, cleaner data, and stronger proof that DORA processes are actually being followed.
How can DORApp support work after the DORA compliance date?
DORApp is positioned as a modular cloud platform for financial institutions that need ongoing DORA process support, not just one-time project work. Based on the verified product documentation, it includes modules for the Register of Information and third-party risk management today, with additional modules on the roadmap for incident management, ICT risk management and governance, and information sharing. It also supports audit trail, LEI enrichment, controlled workflows, and DORA report export in XBRL. That may be helpful if your team wants a more structured path from raw data to recurring, evidence-backed compliance operations.
Is DORA only relevant for large banks and insurers?
No. DORA applies across a wide set of EU financial entities, not just the largest institutions. Smaller payment firms, investment businesses, and specialized regulated entities may feel the burden differently, but they are not outside the framework simply because they are smaller. In some cases, smaller organizations face a tougher implementation challenge because they have limited resources and less room for manual rework. The good news is that DORA does not require every institution to solve the problem in the same way. What matters is that your approach is proportionate, controlled, and defensible.
What is the timeline for DORA?
DORA is commonly discussed across three phases. Regulation (EU) 2022/2554 was adopted in 2022, then the main applicability milestone arrived on January 17, 2025, which is why that date is treated as the DORA compliance date. After that, the framework continues to evolve in practice through supervisory expectations and detailed technical standards and acts that influence how specific obligations are executed, including how certain reporting and third-party oversight details are structured. For most institutions, that means the timeline is not only about one day in 2025, it is about building repeatable routines that still work as expectations mature through 2026.
When did DORA compliance start?
From an operational perspective, DORA compliance started on January 17, 2025, because that is when the regulation became applicable across the EU. Many institutions began implementation work earlier, often in 2023 and 2024, because building inventories, contracts mapping, incident processes, and testing capability takes time. If you are trying to align internal stakeholders, it can help to frame 2022 as the adoption and legal setup phase, and January 2025 as the point where “we should be able to operate this” became the expectation.
Do I need to be DORA compliant?
If you are an EU financial entity within one of DORA’s covered categories, or you are part of a group that includes such entities, DORA compliance is typically not optional. The exact obligations and how they apply can vary based on your entity type and supervisory context, and in practice firms often apply proportionality in how they implement controls. If you are unsure whether your specific entity is in scope, it is usually best to confirm with your internal compliance or legal team, or with qualified external advisors who can assess your situation.
What is DORA compliance?
DORA compliance is your institution’s ability to meet the Digital Operational Resilience Act’s requirements in practice. It covers ongoing capabilities across ICT risk management, ICT-related incident handling and reporting, operational resilience testing, ICT third-party risk management, and controlled information sharing. In 2026, the day-to-day meaning of “compliance” increasingly comes down to evidence: can you show who owns each process, how decisions are made, what changed over time, and what records support your reporting and oversight activities.
What is the best next step if my team is still unclear on DORA dates and obligations?
Start by separating three questions: what DORA requires, which dates matter, and how your institution currently handles the related processes. Many teams mix those together and end up with confusion. Build a simple timeline, confirm your entity scope, review your Register of Information process, and identify which obligations depend on recurring execution rather than one-time policy updates. After that, it makes sense to explore educational resources, category hubs, and practical tooling options. If you want a structured overview, Dorapp’s DORA content hub and DORApp platform are both reasonable places to continue your research.
Key Takeaways
Conclusion
If you only remember one thing from this article, make it this: the dora compliance date matters, but what matters more is what your institution can show after that date. January 17, 2025 established the legal baseline. Everything that followed has been about whether financial entities can maintain resilient, well-governed, and evidence-backed ICT processes in practice.
For some teams, the next step is simply getting clearer on the timeline and recurring obligations. For others, it is improving the quality of the Register of Information, tightening third-party oversight, or making reporting less manual and more defensible. DORApp supports that kind of ongoing work with a DORA-focused, modular approach built for financial institutions that need structure without unnecessary complexity. If you want to keep learning, explore the Dorapp blog categories on DORA Fundamentals and Register of Information, or visit dorapp.eu to see how DORApp approaches practical DORA operations.
About the Author
Matevž Rostaher is Co-Founder and Product Owner of DORApp. He brings deep experience in building secure and compliant ICT solutions for the financial sector and is positioned by DORApp as an expert trusted by financial institutions on complex regulatory and operational challenges. DORApp’s own webinar materials list him as CEO and Co-Founder of Skupina Novum d.o.o. and CEO and Co-Founder of FJA OdaTeam d.o.o. His articles should carry the voice of someone who understands not just compliance requirements, but the systems and delivery realities behind them.