Key Takeaways
  • DORA's Level 2 framework comprises approximately 13 RTS/ITS across two batches, plus delegated acts and guidelines — together they translate DORA's high-level requirements into actionable specifications
  • Batch 1 (submitted January 2024) covers ICT risk management, incident classification, TLPT, and the Register of Information template
  • Batch 2 (submitted July 2024) covers contractual provisions, sub-outsourcing, aggregated cost reporting, incident notification content, and the CTPP oversight framework
  • All standards became applicable from 17 January 2025, creating a single compliance date regardless of when individual standards were finalised
  • Significant changes from draft to final versions include refined incident classification thresholds, clarified proportionality provisions, and revised RoI data field requirements
  • The simplified ICT risk management framework under Article 16 provides reduced requirements for qualifying smaller entities, but does not exempt them from incident reporting, RoI, or third-party risk management

The Digital Operational Resilience Act (DORA) — Regulation (EU) 2022/2554 — establishes the high-level requirements for digital operational resilience in the EU financial sector. However, DORA itself is a Level 1 regulation. The detailed, technically specific requirements that financial entities must actually implement are contained in the Level 2 measures: Regulatory Technical Standards (RTS), Implementing Technical Standards (ITS), delegated acts, and guidelines developed by the three European Supervisory Authorities (ESAs) — the European Banking Authority (EBA), the European Securities and Markets Authority (ESMA), and the European Insurance and Occupational Pensions Authority (EIOPA).

Understanding these Level 2 standards — what each one covers, how they map to DORA's five pillars, what changed between draft and final versions, and when they apply — is essential for any financial entity building or validating its DORA compliance programme. This article provides a comprehensive tracker of all DORA RTS and ITS, organised by batch, pillar, and implementation status.

What Are DORA RTS and ITS?

In the EU legislative framework, RTS and ITS are secondary legislation developed by ESAs and adopted by the European Commission. They differ in function:

  • Regulatory Technical Standards (RTS) define the substantive requirements — the "what." They specify what financial entities must do, what controls they must implement, what thresholds they must meet, and what governance structures they must establish. RTS are legally binding once adopted by the Commission through delegated regulation.
  • Implementing Technical Standards (ITS) define the procedural and reporting requirements — the "how." They specify the templates, formats, and procedures for reporting to supervisory authorities, for submitting information, and for standardised communication. ITS are adopted by the Commission through implementing regulation.

For DORA, the ESAs received 13 mandates to develop RTS and ITS (plus additional mandates for delegated acts and guidelines). These mandates were divided into two batches based on priority and development timeline.

The Five Pillars of DORA

Before examining the individual standards, it is important to understand the five-pillar structure that DORA uses to organise its requirements. Each RTS and ITS maps to one or more of these pillars:

Pillar 1: ICT Risk Management (Articles 5–16)

The foundation of DORA. Financial entities must establish and maintain an ICT risk management framework that is comprehensive, documented, and integrated into their overall risk management structure. This pillar covers identification, protection, detection, response, recovery, and learning from ICT-related incidents. The management body must approve and oversee the framework.

Pillar 2: ICT-Related Incident Management, Classification, and Reporting (Articles 17–23)

Financial entities must establish processes to detect, manage, and report ICT-related incidents. This pillar introduces mandatory incident classification criteria and a multi-stage reporting process (initial notification within 4 hours of classification, intermediate report, and final report within one month). Major ICT-related incidents must be reported to the competent authority.

Pillar 3: Digital Operational Resilience Testing (Articles 24–27)

Financial entities must establish a digital operational resilience testing programme that includes a range of tests — vulnerability assessments, network security assessments, performance testing, penetration testing, and source code reviews. Significant financial entities must also conduct Threat-Led Penetration Testing (TLPT) at least every three years. TLPT must be conducted in accordance with the TIBER-EU framework.

Pillar 4: ICT Third-Party Risk Management (Articles 28–44)

Financial entities must manage the risks arising from their use of ICT third-party service providers. This pillar includes the Register of Information (RoI), pre-contractual due diligence, mandatory contractual provisions, ongoing monitoring, and exit strategies. It also establishes the oversight framework for Critical ICT Third-Party Providers (CTPPs) designated by the ESAs.

Pillar 5: Information Sharing (Article 45)

Financial entities may participate in voluntary information-sharing arrangements to exchange cyber threat intelligence and information among themselves. This pillar is the least prescriptive but provides a legal framework for sharing that was previously uncertain under data protection and competition law constraints.

Batch 1 Standards: Overview

Batch 1 standards were the first set developed by the ESAs. Draft versions were published for public consultation in mid-2023, and final versions were submitted to the European Commission in January 2024. These standards address the most foundational and time-critical areas of DORA implementation.

RTS on ICT Risk Management Framework (Article 15)

This RTS specifies the detailed elements of the ICT risk management framework that financial entities must establish. It covers: ICT security policies and procedures, ICT operations security, network security, access control, encryption and cryptographic controls, ICT project management, ICT change management, physical and environmental security, HR security policies, identity management, detection capabilities, and business continuity management. This is the broadest RTS and forms the foundation for the majority of operational compliance work. The final version provides more explicit proportionality guidance than the draft, recognising that the framework must be scalable across entity sizes.

RTS on Simplified ICT Risk Management Framework (Article 16(3))

This RTS provides a reduced set of requirements for financial entities that qualify for the simplified framework — principally small and non-interconnected investment firms, small insurance undertakings, and small IORPs. The simplified framework retains the core risk management principles but reduces the documentation, governance, and testing requirements. Qualification criteria are specified in the relevant sectoral legislation (e.g., MiFID II for investment firms, Solvency II for insurance).

RTS on Incident Classification Criteria (Article 18(3))

This RTS establishes the criteria and materiality thresholds for classifying ICT-related incidents as "major" (triggering mandatory reporting) or "significant" (potentially requiring internal escalation). Classification criteria include: the number of clients affected, the duration of the incident, the geographical spread, the data losses involved, the criticality of the services affected, and the economic impact. The final version refined the thresholds to reduce the volume of reportable incidents while maintaining supervisory visibility over genuinely significant events.

RTS on Threat-Led Penetration Testing — TLPT (Article 26(11))

This RTS specifies the requirements for conducting TLPT, including: scoping criteria (which entities must perform TLPT and how the testing scope is determined), the testing methodology (aligned with TIBER-EU), the roles and responsibilities of the threat intelligence provider and the red team, the requirements for the control team, and the rules for pooled testing where multiple entities share a common ICT third-party provider. The final version provides additional clarity on mutual recognition — allowing TLPT results to be recognised across Member States — and on the circumstances under which internal testers may be used.

ITS on Register of Information (Article 28(9))

This ITS specifies the templates and data formats for the Register of Information. It defines the multi-table structure (entity information, contractual arrangements, provider information, service descriptions, data locations, and sub-outsourcing chains), the mandatory data fields, the validation rules, and the machine-readable format for submission. This ITS has been the subject of extensive industry feedback, particularly regarding the granularity of data location requirements and the practicality of sub-outsourcing chain documentation.

ITS on Incident Reporting (Article 20)

This ITS specifies the templates and formats for incident notification and reporting. It defines the content of the initial notification, the intermediate report, and the final report, along with the data fields, submission format, and transmission mechanism. The ITS ensures consistency in incident reporting across all financial entities and Member States, enabling meaningful aggregation and cross-border analysis by the ESAs.

Batch 2 Standards: Overview

Batch 2 standards were submitted to the European Commission in July 2024. They address additional DORA requirements that, while equally mandatory, were considered less foundational than Batch 1 and therefore given a longer development timeline.

RTS on ICT Third-Party Contractual Provisions (Article 30(5))

This RTS specifies the detailed elements that must be included in contractual arrangements between financial entities and ICT third-party service providers. For all arrangements, this includes provisions on service descriptions, performance targets, audit and access rights, notification obligations, exit provisions, and data protection. For arrangements supporting critical or important functions, additional requirements include specific SLA metrics, guaranteed levels of availability, incident support obligations, and the provider's obligation to cooperate with supervisory authorities.

RTS on Sub-Outsourcing Oversight (Article 30(5))

This RTS specifies the requirements for monitoring and managing sub-outsourcing by ICT third-party service providers. It covers notification obligations (providers must inform financial entities of sub-outsourcing changes), risk assessment requirements (financial entities must assess the impact of sub-outsourcing on their risk profile), and contractual provisions (contracts must address the financial entity's right to object to sub-outsourcing changes that could impact service quality or security).

RTS on Aggregated Cost Reporting (Article 31(6))

This RTS specifies how financial entities must report the costs associated with ICT-related incidents to supervisory authorities. It covers the methodology for calculating direct and indirect costs, the reporting format, and the aggregation approach. This standard supports the ESAs' mandate to monitor the financial impact of ICT incidents across the sector.

RTS on CTPP Oversight Fees (Article 43(2))

This RTS specifies the methodology for calculating the oversight fees that Critical ICT Third-Party Providers must pay to the Lead Overseer (the ESA responsible for their oversight). The fees fund the oversight activities and are proportionate to the provider's annual turnover and the extent of their provision of services to the EU financial sector.

ITS on Major Incident Notification Content (Article 20)

This ITS supplements the Batch 1 incident reporting ITS by specifying the detailed content requirements for major incident notifications. It defines the minimum information that must be included at each reporting stage and the technical standards for data transmission.

Guidelines on CTPP Designation Criteria (Article 31)

These guidelines specify the criteria and methodology the ESAs use to designate ICT third-party service providers as "critical." Criteria include the systemic impact of a failure or disruption of the provider's services, the number of financial entities dependent on the provider, the degree of concentration, and the substitutability of the provider's services. These guidelines are not legally binding in the same way as RTS/ITS but represent the ESAs' supervisory expectations.

Complete Standards Tracker Table

The following table provides a consolidated reference for all DORA Level 2 standards, their batch, type, pillar mapping, and status.

Standard Type Batch DORA Pillar DORA Article Status
ICT Risk Management Framework RTS 1 Pillar 1 — ICT Risk Management Article 15 Final — Commission Delegated Regulation (EU) 2024/1774
Simplified ICT Risk Management RTS 1 Pillar 1 — ICT Risk Management Article 16(3) Final — Commission Delegated Regulation (EU) 2024/1774
Incident Classification Criteria RTS 1 Pillar 2 — Incident Management Article 18(3) Final — Commission Delegated Regulation (EU) 2024/1772
Incident Reporting Templates ITS 1 Pillar 2 — Incident Management Article 20 Final — Commission Implementing Regulation (EU) 2024/2956
Threat-Led Penetration Testing (TLPT) RTS 1 Pillar 3 — Resilience Testing Article 26(11) Final — Commission Delegated Regulation (EU) 2024/1774
Register of Information Template ITS 1 Pillar 4 — Third-Party Risk Article 28(9) Final — Commission Implementing Regulation (EU) 2024/2956
ICT Third-Party Contractual Provisions RTS 2 Pillar 4 — Third-Party Risk Article 30(5) Final — adopted 2024
Sub-Outsourcing Oversight RTS 2 Pillar 4 — Third-Party Risk Article 30(5) Final — adopted 2024
Aggregated Cost Reporting RTS 2 Pillar 2 — Incident Management Article 31(6) Final — adopted 2024
CTPP Oversight Fees RTS 2 Pillar 4 — Third-Party Risk (CTPP) Article 43(2) Final — adopted 2024
Major Incident Notification Content ITS 2 Pillar 2 — Incident Management Article 20 Final — adopted 2024
CTPP Designation Criteria Guidelines 2 Pillar 4 — Third-Party Risk (CTPP) Article 31 Final — published 2024

Key Changes from Draft to Final

The ESAs conducted extensive public consultations on both Batch 1 and Batch 2 standards. The consultation process resulted in meaningful changes between draft and final versions. Understanding these changes is important because many organisations began their compliance programmes based on draft standards and need to verify that their implementation reflects the final requirements.

ICT Risk Management Framework — Proportionality Clarification

The draft RTS applied uniform requirements across all entity sizes, which drew significant industry criticism. The final version includes explicit proportionality provisions that allow smaller and less complex entities to implement the framework in a manner commensurate with their size, risk profile, and the complexity of their ICT environment. The principles remain the same, but the expected depth of documentation and formality of processes is explicitly scalable.

Incident Classification — Threshold Refinement

The draft incident classification criteria would have resulted in a high volume of reportable incidents, creating operational burden for financial entities and analytical burden for supervisory authorities. The final version raised certain materiality thresholds — particularly for client impact and economic impact — to focus mandatory reporting on genuinely significant incidents. The "significant but non-major" incident category was clarified to require internal tracking and escalation but not external reporting.

TLPT — Mutual Recognition and Internal Testers

The draft TLPT RTS was ambiguous on whether TLPT results conducted in one Member State would be recognised by authorities in another. The final version establishes a mutual recognition framework, reducing duplication for cross-border entities. Additionally, the final version provides clearer guidance on when internal red teams may conduct TLPT (subject to certain conditions, including independence and capability requirements) and when external testers must be used.

Register of Information — Data Field Practicality

The draft RoI ITS contained data fields that industry respondents flagged as impractical to collect — particularly certain data location fields at sub-outsourcing levels. The final version retained the structure but provided additional guidance on proportionality for non-critical arrangements and clarified the expected level of granularity for data location reporting, particularly for cloud-based services where data locations may be dynamic.

Contractual Provisions — Flexibility for Existing Contracts

The draft RTS on contractual provisions implied that all existing contracts would need immediate amendment to include the specified provisions. The final version acknowledges that contract renegotiation takes time and provides a framework for phased alignment, prioritising contracts supporting critical or important functions. New contracts must include all provisions from the outset.

Mapping Standards to the Five Pillars

Understanding how each standard maps to DORA's five pillars helps financial entities organise their compliance programmes by workstream. The following mapping shows which standards are relevant to each pillar:

Pillar 1 — ICT Risk Management

  • RTS on ICT Risk Management Framework (primary)
  • RTS on Simplified ICT Risk Management (for qualifying entities)

Pillar 2 — Incident Management and Reporting

  • RTS on Incident Classification Criteria
  • ITS on Incident Reporting Templates
  • ITS on Major Incident Notification Content
  • RTS on Aggregated Cost Reporting

Pillar 3 — Digital Operational Resilience Testing

  • RTS on Threat-Led Penetration Testing (TLPT)

Pillar 4 — ICT Third-Party Risk Management

  • ITS on Register of Information Template
  • RTS on ICT Third-Party Contractual Provisions
  • RTS on Sub-Outsourcing Oversight
  • RTS on CTPP Oversight Fees
  • Guidelines on CTPP Designation Criteria

Pillar 5 — Information Sharing

  • No specific RTS/ITS — the Article 45 framework is self-executing with guidance from the ESAs

The concentration of standards in Pillars 2 and 4 reflects the regulatory priority placed on incident reporting (for systemic risk monitoring) and ICT third-party risk management (given the sector's concentration on a small number of major cloud and technology providers).

Implementation Timeline

Despite the staggered development of Batch 1 and Batch 2 standards, all DORA requirements — including all RTS and ITS — became applicable from a single date: 17 January 2025. This is the date DORA became fully applicable across the EU financial sector.

Key dates in the overall DORA timeline:

  • 16 January 2023: DORA entered into force (24-month implementation period begins)
  • June–September 2023: Batch 1 draft standards published for consultation
  • January 2024: Batch 1 final standards submitted to the European Commission
  • December 2023–March 2024: Batch 2 draft standards published for consultation
  • July 2024: Batch 2 final standards submitted to the European Commission
  • September–December 2024: Commission adoption of Batch 1 and Batch 2 standards (Delegated Regulations and Implementing Regulations published in the Official Journal)
  • 17 January 2025: DORA fully applicable — all requirements, including all RTS and ITS, take effect

The compressed timeline between Batch 2 finalisation (July 2024) and DORA application (January 2025) created a challenging implementation window for financial entities. Organisations that waited for final Batch 2 standards before beginning implementation had approximately six months to build and operationalise complex processes such as contractual remediation, sub-outsourcing oversight, and aggregated cost reporting.

Simplified Framework for Smaller Entities

DORA Article 16 provides a simplified ICT risk management framework for certain categories of smaller financial entities. The corresponding RTS specifies reduced requirements that reflect the lower complexity and systemic significance of these entities.

Entities eligible for the simplified framework include:

  • Small and non-interconnected investment firms as defined in Article 12(1) of Regulation (EU) 2019/2033
  • Payment institutions exempt under Directive (EU) 2015/2366
  • Institutions exempt under Directive 2013/36/EU
  • Electronic money institutions exempt under Directive 2009/110/EC
  • Small institutions for occupational retirement provision (IORPs)

The simplified framework reduces requirements in several areas: governance formality (fewer committees and reporting layers), documentation depth (principles-based rather than prescriptive documentation), testing scope (basic resilience testing rather than full TLPT), and monitoring frequency (risk-based review cycles rather than continuous monitoring). However, critical obligations remain:

  • Incident reporting obligations apply in full — all major incidents must be reported per the standard classification and timeline
  • The Register of Information must be maintained — all ICT third-party arrangements must be registered
  • ICT third-party risk management contractual provisions apply — including for critical or important functions
  • The management body must approve and oversee the ICT risk management framework

Practical Implications for Financial Entities

Understanding the standards tracker is a necessary first step, but translating that knowledge into an effective compliance programme requires additional considerations.

Programme Organisation by Pillar and Workstream

The most effective compliance programmes align their workstreams to DORA's five pillars, with dedicated teams or owners for each. This mirrors the structure of the standards themselves and enables efficient tracking of progress against specific RTS/ITS requirements. Cross-pillar dependencies — such as the relationship between the ICT risk management framework (Pillar 1) and the contractual provisions for third parties (Pillar 4) — must be actively managed to avoid inconsistencies.

Monitoring for Updates and Amendments

The Level 2 standards are not static. The ESAs are expected to issue additional guidance, Q&As, and potentially amend standards as supervisory experience accumulates. Financial entities should establish a regulatory monitoring process that tracks ESA publications, Commission decisions, and competent authority guidance relevant to their DORA obligations.

Evidence and Documentation Strategy

Each RTS and ITS implies specific documentation and evidence requirements. Financial entities should map the documentation requirements of each standard to their existing policy and procedure framework, identify gaps, and create or update documents accordingly. The evidence base should be designed to withstand supervisory inspection — organised, current, and readily accessible.

How Glocert International Helps

Glocert International provides DORA compliance advisory services structured around the five-pillar framework and the specific requirements of each RTS and ITS. Our team tracks regulatory developments in real time, conducts gap assessments against the final standards, and supports implementation across all workstreams — from ICT risk management framework design through incident reporting capability build, TLPT scoping, RoI compilation, and contractual remediation.

Contact us to discuss your DORA compliance programme →

Frequently Asked Questions

What are DORA RTS and ITS?

DORA RTS (Regulatory Technical Standards) and ITS (Implementing Technical Standards) are the Level 2 measures that translate DORA's high-level requirements into detailed, actionable specifications. RTS define the "what" — the substantive requirements financial entities must meet — while ITS define the "how" — the formats, templates, and procedures for reporting and compliance. Together they operationalise DORA across its five pillars: ICT risk management, incident reporting, digital operational resilience testing, ICT third-party risk management, and information sharing.

What is the difference between Batch 1 and Batch 2 DORA standards?

Batch 1 standards were submitted to the European Commission in January 2024 and cover the most time-critical areas: ICT risk management framework, incident classification and reporting, TLPT, and the Register of Information template. Batch 2 standards were submitted in July 2024 and cover additional areas including ICT third-party contractual provisions, sub-outsourcing oversight, aggregated cost reporting, incident notification content, and the CTPP oversight framework. All standards apply from 17 January 2025.

How many DORA RTS and ITS are there in total?

There are approximately 13 RTS/ITS across Batch 1 and Batch 2, plus additional delegated acts and guidelines. Batch 1 includes 4 RTS and 2 ITS, while Batch 2 includes 4 RTS, 2 ITS, and 1 set of guidelines. Additional delegated acts cover the CTPP oversight framework, fees, and proportionality criteria.

Are simplified requirements available for smaller financial entities?

Yes. DORA Article 16 provides a simplified ICT risk management framework for certain small and non-interconnected financial entities. The corresponding RTS specifies reduced requirements for risk management, governance, and documentation. However, all entities — regardless of size — must comply with incident reporting obligations, maintain the Register of Information, and manage ICT third-party risk.

What changed between the draft and final versions of the DORA standards?

Key changes included: (1) clarification of proportionality provisions, particularly for smaller entities; (2) refinement of incident classification thresholds to reduce the volume of reportable incidents; (3) extended timelines for certain reporting obligations; (4) alignment of the Register of Information template with industry feedback on data field practicality; and (5) additional guidance on TLPT scope determination and mutual recognition.