DORA is now in force. As of January 17, 2025, the Digital Operational Resilience Act applies to all financial entities in the EU—including fintechs, payment institutions, and crypto-asset service providers.
If you're still figuring out what you need to have in place, this checklist breaks it down by DORA's five pillars with specific requirements from the regulation.
Who This Applies To
DORA covers:
If you're a fintech operating in the EU or serving EU financial entities, you're in scope.
The Five Pillars
| Pillar | DORA Articles | Core Requirement |
|---|---|---|
| ICT Risk Management | Articles 5-16 | Documented risk management framework |
| Incident Reporting | Articles 17-23 | Report major incidents within 72 hours |
| Resilience Testing | Articles 24-27 | Regular vulnerability and penetration testing |
| Third-Party Risk | Articles 28-44 | Manage and report ICT provider dependencies |
| Information Sharing | Article 45 | Participate in threat intelligence exchange |
Pillar 1: ICT Risk Management (Articles 5-16)
This is the foundation. Article 6 requires a documented ICT risk management framework reviewed annually.
Governance (Article 5)
Framework Requirements (Article 6)
Risk Identification & Protection (Articles 7-9)
Detection & Response (Articles 10-14)
Pillar 2: Incident Reporting (Articles 17-23)
Major ICT incidents must be reported to your national competent authority.
Classification
- Number of affected clients/counterparties
- Duration of the incident
- Geographic spread
- Data losses
- Economic impact
- Criticality of affected services
Reporting Timeline
| Report | Deadline | Content |
|---|---|---|
| Initial notification | 4 hours after classification | Basic incident details |
| Intermediate report | 72 hours | Analysis, impact assessment, mitigation steps |
| Final report | 1 month | Root cause, total impact, remediation completed |
Requirements
Pillar 3: Digital Operational Resilience Testing (Articles 24-27)
Regular testing is mandatory. The depth depends on your entity's size and risk profile.
For All Entities
For Significant Entities (Article 26)
If designated as significant by your regulator:
Testing Documentation
Pillar 4: ICT Third-Party Risk Management (Articles 28-44)
Your vendors are your risk. DORA requires formal management of ICT service providers.
Register of Information
Deadline: April 30, 2025 - Submit to national competent authority
Due Diligence
- Financial stability
- Technical capability
- Security certifications
- Business continuity arrangements
- Subcontracting practices
Contract Requirements (Article 30)
Contracts with ICT providers must include:
Exit Planning
Pillar 5: Information Sharing (Article 45)
Voluntary but encouraged. Sharing threat intelligence strengthens collective resilience.
Key Deadlines
| Date | Requirement |
|---|---|
| Jan 17, 2025 | Full DORA compliance required |
| Apr 30, 2025 | Submit Register of Information to competent authority |
| Jul 2025 | ESAs notify critical ICT third-party providers |
| Jan 17, 2026 | European Commission review report due |
| Ongoing | Annual framework review, regular testing |
Penalties
Non-compliance carries real consequences:
| Entity Type | Maximum Penalty |
|---|---|
| Financial entities | 2% of annual global turnover |
| Critical ICT providers | Up to EUR 5 million |
| Individuals | Up to EUR 500,000 |
Daily fines can apply for up to 6 months until compliance is achieved.
Beyond fines: increased regulatory scrutiny, reputational damage, and potential restrictions on EU market access.
How Threat Modeling Supports DORA
Articles 7-9 require systematic identification of ICT risks. Threat modeling delivers exactly that:
| DORA Requirement | Threat Modeling Deliverable |
|---|---|
| ICT asset identification | Data flow diagrams |
| Risk identification | STRIDE threat analysis |
| Vulnerability assessment | Prioritized threat inventory |
| Protection measures | Documented mitigations |
| Audit evidence | Threat model documentation |
A documented threat model provides the systematic, repeatable risk assessment that auditors expect under DORA.
Quick Compliance Assessment
Answer these to gauge your readiness:
1. Do you have a documented ICT risk management policy approved by management?
2. Can you produce a complete list of ICT third-party providers with contract details?
3. Do you have incident response procedures with defined timelines?
4. Have you conducted vulnerability assessments in the past 12 months?
5. Is there an annual review process for your ICT risk framework?
If you answered "no" to any of these, prioritize those areas.
Key Takeaways
Next Steps
Need help meeting DORA's risk identification requirements? Professional threat modeling provides the documented, systematic assessment that satisfies Article 6's framework requirements.
Sources:
Found this helpful?
Share it with your network
Written by
Jeffrey von Rotz
Founder
Building tools to make threat modeling accessible to every development team.
Ready to automate your threat modeling?
Join security teams using Ansvar to build comprehensive threat models in days, not weeks.
Get Started