Adopted: November 2022
Entered into force: January 16, 2023
Applies from: January 17, 2025 (full compliance date)
The Digital Operational Resilience Act (DORA) is a binding EU regulation designed to strengthen the digital operational resilience of the financial sector. Rather than replacing existing financial regulations, DORA supplements them by establishing a unified framework for managing ICT and operational risks across financial entities and their critical technology providers.
From January 17, 2025, all in-scope financial entities and relevant ICT third-party service providers operating within the EU must comply with DORA’s requirements.
DORA’s objective is to ensure that organizations can prevent, withstand, respond to, and recover from ICT-related disruptions, including cyberattacks, while maintaining continuity of critical financial services.
View: Deloitte’s new rules for DORA compliance
Key Takeaways
- DORA is enacted EU legislation, not a proposal, with mandatory compliance starting January 17, 2025.
- It applies to EU financial entities and the ICT service providers that support them.
- DORA is built on five mandatory pillars covering ICT risk, incident handling, testing, and third-party oversight.
- Organizations must establish structured ICT risk management and incident response capabilities.
- Major ICT incidents must be classified and reported within strict regulatory timelines.
- Oversight of Critical ICT Third-Party Providers (CTPPs) is carried out by European Supervisory Authorities (ESAs).
What does the Digital Operational Resilience Act (DORA) mean for your business?
DORA introduces significant changes to how financial institutions manage digital and operational resilience. Under the regulation, organizations must implement a comprehensive ICT risk management framework that includes defined policies, procedures, controls, and governance mechanisms.
Financial entities are required to maintain documented incident response and recovery plans, detailing how they will detect, respond to, and recover from ICT disruptions, including cyber incidents such as phishing attacks, ransomware, or service outages.
In addition, ICT third-party service providers that support financial institutions fall within DORA’s scope and are subject to enhanced contractual, monitoring, and risk management obligations.
Simplify Dora with PowerDMARC!
Scope and Applicability of DORA
DORA applies to:
- Financial entities operating within the EU (including banks, insurers, investment firms, fintechs, and payment institutions)
- ICT third-party service providers that support these financial entities
ICT providers deemed critical are subject to direct oversight by European Supervisory Authorities (ESAs) to ensure their resilience and risk controls meet DORA standards.
DORA does not offer voluntary certification for organizations outside this scope. Non-financial organizations may adopt similar best practices, but they cannot be considered “DORA-compliant” under the regulation.
Core Requirements Under DORA
DORA is structured around five mandatory pillars:
ICT Risk Management
Establishing governance, policies, controls, and procedures to manage ICT risks
ICT-Related Incident Reporting
Classification of major incidents and mandatory reporting to regulators within defined timelines
(including an initial notification within hours, followed by updates and a final report)
Digital Operational Resilience Testing
Regular testing of systems, processes, and controls to identify vulnerabilities
ICT Third-Party Risk Management
Managing risks arising from outsourced ICT services through contracts, monitoring, and exit strategies
Information Sharing
Encouraging voluntary sharing of cyber threat intelligence within the financial sector
These measures are designed to ensure that both financial entities and their ICT partners can operate securely even during severe digital disruptions.
Achieving Compliance Under DORA
To meet DORA requirements, organizations should implement a well-defined ICT risk and resilience program, which typically includes:
- Ongoing risk assessments and vulnerability testing
- Incident detection, classification, and response procedures
- Business continuity and disaster recovery planning
- Employee awareness and training programs
- Oversight of ICT suppliers and subcontractors
A documented and consistently implemented framework helps organizations demonstrate compliance and build trust within the financial ecosystem.
The DORA Act: Principal Conditions & Goals
DORA aims to ensure that the EU financial sector remains secure, stable, and resilient in the face of increasing digital threats. Key regulatory expectations include:
- A clearly defined ICT incident response and recovery plan
- Continuous assessment and mitigation of ICT risks
- Strong security controls across networks, systems, and infrastructure
- Timely and structured reporting of major ICT incidents to regulators
- Measures to ensure continuity of critical services during disruptions
Step closer toward DORA-Compliance with PowerDMARC
As organizations strengthen their digital resilience in response to DORA, email remains a critical attack vector that must be protected as part of a broader ICT security strategy.
While DORA does not explicitly mandate email authentication protocols, it requires organizations to secure their networks, systems, and communications infrastructure. Implementing strong email security controls aligns with DORA’s broader objectives around risk reduction and incident prevention.
PowerDMARC is a multi-tenant SaaS platform that helps organizations strengthen email channel security through a full-stack email authentication suite. We are ISO 27001, SOC 2 Type II, and GDPR compliant, and work with financial organizations to reduce email-based threats and improve visibility into authentication risks.
We help you:
- Protect against spoofing and impersonation using DMARC
- Reduce risks from downgrade and interception attacks with MTA-STS
- Gain visibility into email authentication results through DMARC reporting
- Avoid SPF lookup failures with automated SPF flattening
Contact us today to strengthen your email security as part of a DORA-aligned ICT risk strategy.

- What Is BIMI? Email Trust and Brand Identity - December 26, 2025
- What Is a CAA Record? DNS Security Guide - December 24, 2025
- Is It Safe to Open Spam Emails? Risks & Safety Tips - December 16, 2025


