2025 DORA Guide
2025 DORA Guide
A Guide to DORA
Compliance and
Third-Party Risk
Management
Updated March 2025
The Digital Operational Resilience Act (DORA) is reshaping cybersecurity standards for financial institutions across
Europe and beyond. True to its name, DORA is focused on enhancing digital resilience, emphasizing the importance
of protecting critical functions from both current and emerging cyber threats.
“ One of its key directives states: “The financial entity must fully monitor the ICT
subcontracting chain and document it.” – JC 2023 67, November 2023.
With recent updates to DORA introducing additional requirements, this guide explores how to effectively ”
address DORA’s demands for third-party cyber risk management.
What is DORA?
The Digital Operational Resilience Act (DORA) is a regulatory measure established by the European Union to
establish a mandatory and thorough framework for managing information and communication technology (ICT)
risks within the EU financial industry.
2. Incident Reporting. One of DORA’s most rigorous mandates is the requirement for swift and
comprehensive incident reporting. It raises the bar by imposing strict timelines and detailed reporting
protocols.
3. Operational Resilience Testing. DORA mandates regular operational resilience testing for financial
institutions. This includes threat-led penetration testing and stress testing to identify weaknesses in
ICT systems. These tests are essential for ensuring that systems can withstand real-world cyberattacks and
operational disruptions.
4. Managing Third-Party Risk. DORA places a heavy emphasis on third-party risk management, requiring
financial institutions to assess their critical third-party providers and even subcontractors. The process
DORA demands can be broken down into five steps:
2. Categorization of third-party service providers based on functions they support, and their criticality
to the business.
5. Contingency planning to prepare for any disruptions or failures in the supply chain.
5. ICT Incident and Threat Management. DORA’s comprehensive approach to ICT incident and threat
management requires financial institutions to have frameworks in place for detecting, managing, and
reporting cyber threats with strict timelines.
Financial Entities
DORA applies to a wide range of financial institutions, including banks, insurance and reinsurance companies,
payments and e-money providers, brokers, pension funds, capital market entities, and more.
• Clearinghouses
• Credit organizations
• Crypto services
• Insurance firms
• Investment enterprises
• Trading platforms
• This includes cloud providers like Amazon Web Service, Microsoft Azure, and Salesforce Cloud as well as
software vendors, fraud management providers, collaborative tools, CRM solutions, etc.
DORA is transforming how organizations approach cybersecurity, with clear and specific requirements for
managing third-party risks. As external vendors become more integral to business operations, it’s easy to see why
this regulation emerged. Understanding these obligations is essential to maintaining digital resilience. This section
breaks down DORA’s third-party cybersecurity requirements, offering practical guidance to help organizations stay
compliant and secure.
2. ICT-Related Incident Reporting. Monitor the technology contracting chain, identify new threats, and
prepare regulator incident reports.
3. ICT Third-Party Risk Management. Categorize vendors, assess their DORA compliance, and identify
technology subcontracting chains.
b. Exit Strategy. Design and test exit strategies for supplier relationships supporting critical functions.
DORA enforcement started on January 17, 2025. Since its inception in 2022, the regulation has undergone
multiple reviews and refinements. As compliance requirements take effect, organizations must prepare for closer
collaboration with European Supervisory Authorities (ESAs). This includes defining policies, reporting ICT-related
incidents, and developing strong Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs).
A key deadline to note: Most of the EU regulators will expect the first Register of Information report in April,
though some are announcing target dates in March. Moving forward, organizations will be required to submit their
reports annually by March 30 to remain compliant.
To achieve compliance, you’ll need to evaluate your current third-party security risk management process, identify
any gaps, and explore effective solutions. While you can find the full requirements here, these are the practical steps
organizations can take to build a DORA-compliant third-party risk program:
• Identify your critical and important business functions (CIF) and the suppliers supporting them. You
need to profile each business function, document suppliers, contracts, and the specific usage of each ICT
service in the context of those functions. You’ll also identify subcontractors to the ICTs.
• Prepare the Register of Information report. The data about your functions, suppliers, contracts, and usage
must be compiled into an annual report which you’ll submit to the regulators. The format is a complex one,
including 18 data files in two folders, all zipped for submission.
• Create compatible questionnaires and documents. Shared Assessments, for example, have delivered the
2025 version of their SIG questionnaire content library, which directly supports and is mapped to DORA, as
well as many other standards and regulations.
• Monitor the entire ICT contracting chain for potentially disruptive or damaging events. DORA requires
companies to report incidents to the Supervisory Authority (SA). When a fourth or fifth party has a breach,
malware attack, or other incident, you must contact the related third party to learn details and plans to
mitigate the damage.
Panorays' integrated solution simplifies DORA compliance by embedding it into the existing TPCRM process. It
enables customers to collect the data needed for the Register of Information, assess ICT third-party compliance
with DORA requirements, and monitor their contracting chain for cyber and IT risks. This integration ensures full
compliance without the need to manage it as a separate, standalone task.
From user-friendly, ready-to-use questionnaire templates that cover all the key data points required by the
final standards, to a comprehensive reporting package, Panorays provides everything you need to generate
the Register of Information report that regulators require.
1. ICT-Related Incident Reporting. Panorays provides comprehensive support for ICT-related incident
reporting, helping organizations stay resilient and responsive.
This includes:
• Risk Insights and Response: Real-time analysis and actionable recommendations for addressing risks.
• Alerts and In-App Communication: Instant notifications and seamless communication channels.
Panorays not only reports incidents, but also contextualizes them to your business, prioritizing third parties
critical to your supply chain. Additionally, the platform facilitates direct communication with affected third
parties, ensuring a swift and coordinated response.
• Vendor Classification: Categorize and document vendors by criticality and sensitivity relative to your
critical and important functions (CIFs) with ready-to-use, DORA-specific templates covering all required
data points.
• Compliance Assessment: Evaluate ICT compliance with DORA, security requirements, and other
regulations and standards using Shared Assessments 2025 SIG content.
• Supply Chain Visibility: Uncover your digital supply chain and identify third-party dependencies.
3. Register of Information.
• Streamlined File Creation: Easily compile and prepare files for SA submission.
• Regulator-Ready Package: Panorays automatically generates the full Register of Information report in
the precise format required by regulators.
With third-party attacks on the rise and regulatory requirements tightening, CISOs must take proactive steps to
minimize third-party risks. While DORA’s security control requirements continue to evolve, organizations should
focus on maintaining full compliance. Strengthening your security posture, preparing to mitigate attacks, and
enhancing your brand’s trustworthiness go hand in hand. Ensuring compliance isn’t just about meeting regulations—
it’s about building long-term resilience in an increasingly complex threat landscape.