In This Article
- DORA creates a first-of-its-kind EU-level direct oversight framework for Critical ICT Third-Party Providers (CTPPs) — principally major cloud providers and technology platforms that the financial sector depends on systemically
- CTPPs are designated by the ESAs based on systemic impact, dependency, substitutability, and concentration criteria — the first designations are expected in 2025
- Each CTPP is assigned a Lead Overseer (one of the three ESAs) with powers to request information, conduct inspections, and issue recommendations
- The Lead Overseer can issue recommendations but cannot directly impose binding orders or fines — non-compliance triggers secondary enforcement through competent authorities and financial entities
- Hyperscalers (AWS, Azure, GCP) are widely expected to be designated as CTPPs, which will subject them to unprecedented EU regulatory scrutiny over their financial sector operations
- Financial entities using CTPPs must assess concentration risk, maintain credible exit strategies, and monitor the CTPP's compliance with oversight recommendations
The Digital Operational Resilience Act (DORA) introduces many obligations for financial entities, but one of its most structurally innovative provisions is the establishment of a direct EU-level oversight framework for Critical ICT Third-Party Providers (CTPPs). For the first time, a major technology provider — such as a hyperscale cloud platform — can be designated as "critical" to the financial sector and subjected to direct oversight by a European Supervisory Authority, even though the provider itself is not a regulated financial entity.
This article examines the CTPP oversight framework in detail: who qualifies as a CTPP, how designation works, what powers the Lead Overseer has, what this means for hyperscalers like AWS, Azure, and GCP, and — critically — what it means for the financial entities that depend on them.
What Is a CTPP?
A Critical ICT Third-Party Provider (CTPP) is an ICT third-party service provider that the ESAs have designated as systemically important to the EU financial sector. The concept recognises a fundamental reality of modern financial services: the sector's operational resilience is not determined solely by the resilience of individual financial entities but also by the resilience of the technology providers they all depend on. When hundreds of banks, insurers, and investment firms run their core operations on the same cloud platform, a failure of that platform is a systemic financial stability event — regardless of how well each individual financial entity has managed its own ICT risks.
Prior to DORA, the EU had no mechanism for directly overseeing these providers. Supervisory authorities could assess how financial entities managed their ICT third-party risks, but they had no authority to assess the providers themselves. DORA's CTPP framework closes this gap by creating a direct, EU-level oversight mechanism — operated by the ESAs — that applies to the provider entity rather than (only) to the financial entities that use its services.
It is important to understand what CTPP oversight is not. It is not a licensing or authorisation regime. It does not make CTPPs into regulated financial entities. It does not subject them to prudential requirements or capital adequacy rules. It is a focused oversight mechanism designed to assess and, where necessary, improve the operational resilience of providers that the financial sector cannot easily replace or avoid.
Designation Criteria
DORA Article 31 establishes the criteria the ESAs must use to designate an ICT third-party service provider as critical. The criteria are designed to identify providers whose failure, disruption, or degradation would have a systemic impact on the EU financial sector.
Systemic Impact
The assessment considers the potential impact on the stability, continuity, or quality of financial services if the provider were to face a wide-scale operational failure. This includes both direct impact (disruption to the provider's services) and indirect impact (cascading effects across financial entities and markets).
Systemic Character and Importance
The ESAs assess the systemic character of the financial entities that rely on the provider. A provider serving a large number of globally systemically important banks (G-SIBs) or significant insurance groups carries greater systemic weight than one serving primarily small or non-interconnected entities.
Dependency and Substitutability
The assessment considers the degree to which financial entities depend on the provider and the ease with which the provider's services could be substituted. A provider offering a commodity service that can be easily migrated to an alternative carries less systemic risk than one providing a deeply integrated platform service with high switching costs and limited alternatives. Substitutability is assessed at the financial sector level, not at the individual entity level — even if one entity could theoretically switch, the assessment considers whether the sector as a whole could.
Concentration
The ESAs assess the degree of concentration — both the number of financial entities using the provider and the proportion of critical or important functions supported. A provider that supports a large share of the EU financial sector's core banking, trading, or insurance processing carries significant concentration risk.
Quantitative and Qualitative Assessment
The designation process combines quantitative data (number of entities served, proportion of critical functions supported, revenue from financial sector) with qualitative assessment (complexity of services, integration depth, geographical concentration). The Register of Information data submitted by financial entities provides the quantitative foundation for this assessment — which is why accurate and complete RoI data is essential not only for individual entity compliance but for the functioning of the CTPP framework as a whole.
The Designation Process
The designation process is a structured, multi-step procedure established in DORA Articles 31 through 33:
Step 1: Data Collection
The ESAs collect and analyse Register of Information data from financial entities across the EU. This data reveals which providers are used, for which functions, by how many entities, and with what degree of criticality. This is the quantitative foundation of the designation assessment.
Step 2: Preliminary Assessment
The Joint Committee of the ESAs conducts a preliminary assessment of potential CTPPs based on the designation criteria. Providers that meet or exceed the thresholds across multiple criteria are identified as candidates for designation.
Step 3: Designation Decision
The Joint Committee formally designates the provider as a CTPP through a decision addressed to the provider. The decision specifies the Lead Overseer (the ESA primarily responsible for overseeing the CTPP) and the scope of oversight. The provider is notified and given the opportunity to make representations before the designation takes effect.
Step 4: Lead Overseer Assignment
One of the three ESAs is assigned as the Lead Overseer based on the composition of the CTPP's client base. If the majority of the CTPP's financial sector clients are credit institutions, the EBA serves as Lead Overseer. If the majority are investment firms or market infrastructure, ESMA takes the lead. If the majority are insurance or pension entities, EIOPA leads. A joint oversight network — comprising all three ESAs and relevant national competent authorities — supports the Lead Overseer.
Step 5: Publication
The list of designated CTPPs is published by the ESAs, along with the assigned Lead Overseer for each. This transparency enables financial entities to identify which of their providers have been designated and to adjust their risk management and monitoring accordingly.
The Lead Overseer Framework
The Lead Overseer is the ESA assigned primary responsibility for overseeing a specific CTPP. The framework is designed to be proportionate, risk-based, and collaborative:
Oversight Plan
The Lead Overseer develops an oversight plan for each CTPP, setting out the objectives, scope, and activities for the oversight period. The plan is risk-based — it focuses on the areas of greatest systemic risk and the controls most critical to the financial sector's operational resilience. The plan is shared with the joint oversight network to ensure coordination.
Joint Oversight Network
The Lead Overseer does not operate alone. A joint oversight network comprising representatives of all three ESAs and relevant national competent authorities supports the oversight activities. This network ensures that oversight reflects the cross-sectoral nature of CTPP dependencies — a major cloud provider serves banks, insurers, and investment firms simultaneously, and the oversight must account for all of these perspectives.
Ongoing Engagement
The Lead Overseer maintains ongoing engagement with the CTPP — not just periodic inspections. This includes regular information exchanges, meetings with the CTPP's senior management, and monitoring of the CTPP's internal developments (such as organisational changes, technology platform updates, or sub-outsourcing changes) that could affect its service to the financial sector.
Oversight Powers
DORA Articles 35 through 39 grant the Lead Overseer a range of powers over designated CTPPs. These powers are significant, though they differ from the enforcement powers that competent authorities have over financial entities.
Information Requests
The Lead Overseer can request any information or documentation necessary for the discharge of its oversight duties. This includes information about the CTPP's governance, risk management, security controls, incident history, business continuity arrangements, and sub-outsourcing chain. The CTPP is obligated to respond within the timeframe specified by the Lead Overseer.
General Investigations
The Lead Overseer can conduct general investigations to examine the CTPP's compliance with the oversight framework. Investigations may include requesting records, examining accounts, obtaining written or oral explanations, and interviewing the CTPP's personnel.
Inspections
The Lead Overseer can conduct on-site inspections at the CTPP's premises. Inspections are a powerful oversight tool — they enable the Lead Overseer to verify the CTPP's representations, examine actual operational practices, and assess the CTPP's security posture directly. For hyperscalers, inspections may include visits to data centre facilities, review of operational procedures, and examination of change management and incident response capabilities.
Recommendations
Following its assessments, the Lead Overseer can issue recommendations to the CTPP. Recommendations may address: security and resilience deficiencies, governance shortcomings, concentration risks, sub-outsourcing concerns, and any other matter affecting the CTPP's ability to serve the financial sector reliably and securely. The CTPP must respond to recommendations, indicating whether it agrees and what actions it will take.
Enforcement Mechanism — The Critical Nuance
Here is the critical limitation of the CTPP oversight framework: the Lead Overseer cannot directly impose binding orders or financial penalties on the CTPP. Its primary enforcement tool is the recommendation, which the CTPP is expected to follow but is not legally compelled to obey in the way a financial entity is bound by a supervisory order.
However, the enforcement mechanism has teeth through an indirect route. If a CTPP fails to comply with a recommendation, the Lead Overseer can:
- Issue a public notice identifying the CTPP and describing the non-compliance
- Notify the competent authorities of the financial entities that use the CTPP
- Recommend that competent authorities require financial entities to suspend or terminate arrangements with the non-compliant CTPP
This last measure — requiring financial entities to exit — is the ultimate sanction. A major cloud provider that refuses to comply with oversight recommendations risks losing access to the EU financial sector as a market. The commercial consequences are sufficiently severe that recommendations are expected to function as de facto binding, even without a formal enforcement mechanism.
Oversight Fees
DORA Article 43 provides for CTPPs to pay oversight fees to fund the Lead Overseer's activities. The fee methodology is specified in an RTS and is proportionate to the CTPP's turnover and the extent of its provision of services to the EU financial sector.
Key aspects of the fee framework:
- Fees are annual, recurring obligations — not one-time charges
- The calculation methodology accounts for the CTPP's total annual worldwide turnover and the proportion attributable to EU financial sector clients
- Fees fund the Lead Overseer's oversight activities, including staffing, inspections, investigations, and the joint oversight network
- The fee level is designed to ensure that oversight is properly resourced without creating a disproportionate financial burden on the CTPP
For major hyperscalers, the oversight fees are expected to be modest relative to their overall revenue. The significance of the fees lies not in their financial impact but in the principle they establish: CTPPs are now subject to a regulated oversight relationship with EU authorities, funded by the CTPPs themselves.
Implications for Hyperscalers (AWS, Azure, GCP)
The major hyperscale cloud providers — Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) — are widely expected to be among the first providers designated as CTPPs. The implications are significant and unprecedented.
Direct EU Regulatory Engagement
For the first time, hyperscalers will have a direct, formal regulatory relationship with EU authorities for their financial sector operations. This goes beyond responding to individual financial entities' audit requests or meeting contractual obligations. The Lead Overseer relationship means ongoing engagement, information sharing, and accountability at the corporate level — not just at the account or contract level.
Transparency Requirements
Hyperscalers will need to provide the Lead Overseer with detailed information about their operations — governance, risk management, security controls, incident history, change management, sub-outsourcing chains, and business continuity arrangements. For providers that have historically maintained a significant degree of operational opacity (arguing that security controls are proprietary), DORA's oversight framework represents a fundamental shift toward transparency.
Inspection Readiness
On-site inspections by the Lead Overseer will require hyperscalers to enable access to their facilities, processes, and personnel. This includes data centres, operational centres, and management offices. For providers operating at massive scale with security-sensitive facilities, enabling regulatory inspections while maintaining operational security will require careful coordination and new protocols.
Sub-Outsourcing Scrutiny
Hyperscalers rely extensively on sub-contractors for specific services — data centre construction and operations, network connectivity, hardware maintenance, content delivery, and specialised software components. Under CTPP oversight, the Lead Overseer may examine these sub-outsourcing chains and issue recommendations about their management. Hyperscalers will need to demonstrate that their own supply chains are resilient and that changes in sub-outsourcing do not introduce risks to financial sector clients.
Multi-Jurisdictional Coordination
Hyperscalers serve financial entities across all EU Member States. CTPP oversight requires coordination between the Lead Overseer, the joint oversight network (all three ESAs), and national competent authorities. Hyperscalers will need to engage with this multi-layered structure, which may require dedicated regulatory affairs teams for DORA oversight — distinct from their existing compliance and legal functions.
Implications for Financial Entities Using CTPPs
While the CTPP framework creates direct oversight obligations for the providers themselves, it also has significant implications for the financial entities that use them.
Heightened Due Diligence
Financial entities using designated CTPPs must monitor the CTPP's compliance with oversight recommendations. If the Lead Overseer issues recommendations that the CTPP does not fully address, this becomes a risk that the financial entity must assess and manage. Due diligence on a CTPP is not a one-time, pre-contractual exercise — it is an ongoing obligation that intensifies once the provider is designated.
Contractual Implications
Existing contracts with CTPPs may need updating to reflect the CTPP's oversight obligations. Specifically, contracts should address: the CTPP's obligation to cooperate with the Lead Overseer, the CTPP's obligation to implement oversight recommendations, the financial entity's right to be informed of oversight findings and recommendations relevant to their service, and provisions for what happens if the CTPP fails to comply and the competent authority recommends termination.
Concentration Risk Assessment
Financial entities must assess the concentration risk arising from their dependence on CTPPs. This includes: the proportion of critical or important functions running on CTPP infrastructure, the availability of alternative providers, the cost and time required to migrate, and the potential impact of a CTPP disruption on the entity's operations. The concentration risk assessment must be presented to the management body and factored into the entity's overall risk management framework.
Information Sharing with Authorities
Competent authorities may request additional information from financial entities about their dependency on designated CTPPs. This may include detailed dependency mapping, business impact assessments for CTPP disruption scenarios, and exit plan status. Financial entities should maintain this information in a readily accessible format.
Concentration Risk
Concentration risk is the core systemic concern that the CTPP framework is designed to address. The EU financial sector's concentration on a small number of hyperscale cloud providers is well documented:
- A significant and growing proportion of EU financial entities use AWS, Azure, or GCP for core infrastructure
- Many entities use the same provider for multiple critical functions — compute, storage, database, AI/ML, and networking
- The switching costs between hyperscalers are high, and migration timelines are measured in months or years
- The pool of genuinely comparable alternatives is limited — particularly for entities that have adopted cloud-native architectures deeply integrated with a specific provider's ecosystem
DORA's approach to concentration risk operates at two levels. At the entity level, financial entities must assess and manage their individual concentration on specific providers. At the systemic level, the CTPP framework enables the ESAs to assess sector-wide concentration and, if necessary, issue recommendations to mitigate it — including, in extreme cases, recommending that financial entities diversify their provider base.
For financial entities, the practical implication is that concentration on a single CTPP — even one that is being overseen by the Lead Overseer — is not without risk. The entity must demonstrate that it has assessed the concentration, has a credible exit strategy, and has considered multi-provider or hybrid architectures where the risk warrants it.
Exit Planning
Exit planning is one of the most operationally complex aspects of CTPP risk management. DORA Article 28(8) requires financial entities to ensure that they are able to exit contractual arrangements with ICT third-party service providers without undue disruption to their business activities, without limiting compliance with regulatory requirements, and without detriment to the continuity and quality of their provision of services to clients.
For services hosted on major cloud platforms, credible exit planning requires:
Technical Migration Path
A documented, technically validated path for migrating workloads from the current CTPP to an alternative provider or to on-premises infrastructure. This must account for application portability, data transfer volumes, API dependencies, and any provider-specific technologies that would need to be replaced.
Timeline and Resource Estimate
A realistic estimate of the time and resources required to execute the migration. For complex, cloud-native workloads, migration timelines can extend to 12–18 months. The exit plan must acknowledge this and include interim measures to maintain service continuity during the migration period.
Alternative Provider Assessment
An assessment of alternative providers — their capability, capacity, geographical coverage, and willingness to onboard large-scale migrations from a CTPP. For entities using multiple cloud-native services (managed databases, AI services, serverless compute), the pool of alternatives may be limited.
Regular Testing
Exit plans should not be theoretical documents. DORA expects financial entities to test their exit plans — at least conceptually through tabletop exercises, and where practical, through technical proof-of-concept migrations for critical workloads.
Contractual Provisions
Contracts with CTPPs must include provisions that facilitate exit — including data portability, transition assistance, reasonable notice periods, and the provider's obligation to support migration. Financial entities should review their existing contracts against these requirements and negotiate amendments where necessary.
Non-EU Providers
A significant proportion of the ICT third-party providers likely to be designated as CTPPs are headquartered outside the EU — principally in the United States. DORA addresses this through the requirement that CTPPs establish a subsidiary within the EU within 12 months of designation. This subsidiary serves as the point of contact for the Lead Overseer and ensures that oversight activities can be conducted within the EU legal framework.
For non-EU providers, this means:
- Establishing or designating an EU-based legal entity to serve as the CTPP subsidiary
- Ensuring that the subsidiary has sufficient authority and resources to engage with the Lead Overseer, provide information, and facilitate inspections
- Coordinating between the EU subsidiary and the global parent entity on oversight matters
If a non-EU provider designated as a CTPP fails to establish the required EU subsidiary, the Lead Overseer may recommend that competent authorities require financial entities to suspend or terminate arrangements with the provider. This provision creates a strong incentive for non-EU providers to comply with the EU presence requirement.
Glocert International provides end-to-end advisory support for DORA's ICT third-party risk management requirements, including CTPP-related obligations. We help financial entities conduct concentration risk assessments, develop credible exit strategies, review and update contractual provisions, build Register of Information entries for CTPP arrangements, and establish ongoing monitoring processes for CTPP oversight developments. Our advisory team tracks CTPP designations, Lead Overseer activities, and emerging supervisory expectations in real time.
Frequently Asked Questions
What is a Critical ICT Third-Party Provider (CTPP) under DORA?
A Critical ICT Third-Party Provider (CTPP) is an ICT third-party service provider designated by the European Supervisory Authorities (ESAs) as systemically important to the EU financial sector. Designation is based on criteria including systemic impact, dependency, substitutability, and concentration. CTPPs are subject to direct EU-level oversight by a Lead Overseer with powers to request information, conduct inspections, and issue recommendations.
Will AWS, Azure, and Google Cloud be designated as CTPPs?
The major hyperscale cloud providers — AWS, Azure, and GCP — are widely expected to be among the first providers designated as CTPPs, given the concentration of EU financial sector workloads on these platforms. However, designation requires a formal assessment by the ESAs using the criteria in DORA Article 31. The first designations are expected in the course of 2025, following analysis of Register of Information data.
What powers does the Lead Overseer have over CTPPs?
The Lead Overseer can request information, conduct general investigations, perform on-site inspections, and issue recommendations. Importantly, the Lead Overseer cannot directly impose binding orders or fines. Non-compliance with recommendations triggers secondary enforcement: the Lead Overseer can issue public notices, notify competent authorities, and recommend that financial entities suspend or terminate arrangements with the non-compliant CTPP.
What does CTPP designation mean for financial entities using that provider?
Financial entities using a designated CTPP face heightened due diligence obligations, exit planning requirements, concentration risk assessment obligations, potential contractual updates, and additional information sharing with competent authorities. The entity must monitor the CTPP's compliance with oversight recommendations and have credible exit strategies in case the CTPP fails to comply or loses designation.
Can a CTPP be de-designated or voluntarily withdraw from the EU market?
Yes. CTPP designation is not permanent and can be reviewed if the criteria are no longer met. Voluntary withdrawal from the EU financial sector by a major provider — while theoretically possible — would trigger massive exit planning obligations for hundreds of financial entities and be managed as a financial stability event. DORA does not prevent withdrawal but the systemic implications would be closely monitored.