Key Takeaways
  • DORA applies to 21 categories of financial entities and to ICT third-party service providers designated as critical (CTPPs).
  • The proportionality principle adjusts requirements based on entity size, risk profile, and complexity — but does not exempt any in-scope entity from core obligations.
  • Micro-enterprises benefit from the simplified ICT risk management framework under Article 16, but must still comply with incident reporting and third-party risk provisions.
  • Financial groups must ensure compliance at each in-scope entity while leveraging group-level frameworks and the consolidated Register of Information.
  • Third-country ICT providers are indirectly captured through contractual flow-down of DORA's mandatory Article 30 clauses.

Introduction

One of the first — and most consequential — questions any organisation must answer about the Digital Operational Resilience Act (DORA) is whether it applies to them. DORA's scope is broad by design, capturing virtually the entire EU-regulated financial services ecosystem along with the ICT service providers they depend on.

Getting the applicability assessment right is critical. Underscoping leads to regulatory exposure and potential supervisory action. Overscoping wastes resources and creates unnecessary compliance burden. This guide provides a systematic approach to determining DORA applicability, understanding the proportionality principle, and scoping compliance programmes for individual entities and financial groups.

DORA — Regulation (EU) 2022/2554 — entered into force on 16 January 2023 and became enforceable from 17 January 2025. Unlike a Directive, DORA is directly applicable across all EU Member States without national transposition, ensuring consistent application of digital operational resilience requirements across the financial sector.

The 21 Entity Categories Under DORA

Article 2(1) of DORA defines 21 categories of financial entities that fall within scope. These categories span the breadth of the European financial services landscape:

Banking and Credit

  • (a) Credit institutions — Banks authorised under the Capital Requirements Directive (CRD), including all branches and subsidiaries within the EU
  • (b) Payment institutions — Entities authorised under the Payment Services Directive (PSD2), including electronic money institutions and payment service providers
  • (d) Electronic money institutions — Issuers of electronic money authorised under the Electronic Money Directive (EMD2)

Investment and Capital Markets

  • (c) Investment firms — Firms authorised under MiFID II to provide investment services and activities
  • (l) Central securities depositories — Entities authorised under CSDR to operate settlement systems and provide core custody services
  • (m) Central counterparties — CCPs authorised under EMIR to interpose themselves between counterparties in derivatives and securities transactions
  • (n) Trading venues — Regulated markets, multilateral trading facilities (MTFs), and organised trading facilities (OTFs) authorised under MiFID II
  • (o) Trade repositories — Entities registered under EMIR or SFTR to centrally collect and maintain transaction records

Insurance and Pensions

  • (f) Insurance undertakings — Life and non-life insurance companies authorised under Solvency II
  • (g) Reinsurance undertakings — Entities authorised under Solvency II to accept risks transferred from insurance companies
  • (h) Institutions for occupational retirement provision (IORPs) — Pension funds authorised under the IORP II Directive
  • (i) Insurance intermediaries, reinsurance intermediaries, and ancillary insurance intermediaries — Distribution entities under the Insurance Distribution Directive (IDD)

Asset Management

  • (j) Management companies — UCITS management companies authorised under the UCITS Directive
  • (k) Alternative investment fund managers (AIFMs) — Managers authorised under the AIFMD to manage alternative investment funds

Crypto and Crowdfunding

  • (e) Crypto-asset service providers — Entities authorised under MiCA to provide crypto-asset services
  • (p) Crowdfunding service providers — Platforms authorised under the European Crowdfunding Service Provider Regulation (ECSPR)
  • (q) Issuers of asset-referenced tokens — Issuers authorised under MiCA for stablecoins and asset-referenced tokens

Data and Reporting Services

  • (s) Securitisation repositories — Repositories registered under the Securitisation Regulation to store securitisation data
  • (t) Administrators of critical benchmarks — Administrators of benchmarks designated as critical under the Benchmarks Regulation (BMR)

Credit Services

  • (r) Credit rating agencies — Agencies registered under the CRA Regulation to issue credit ratings
  • (u) Data reporting service providers — Approved Publication Arrangements (APAs) and Consolidated Tape Providers (CTPs) under MiFID II

Entity Types and Requirements Comparison

Different entity categories face different levels of DORA requirements, primarily influenced by the proportionality principle and whether the entity qualifies for the simplified framework.

Entity Category ICT Risk Mgmt Incident Reporting Resilience Testing TLPT Third-Party Risk
Credit institutions (significant) Full framework Full reporting Full programme Mandatory Full requirements
Credit institutions (less significant) Full framework Full reporting Full programme At discretion Full requirements
Investment firms (large) Full framework Full reporting Full programme At discretion Full requirements
Payment/e-money institutions Full framework Full reporting Full programme At discretion Full requirements
Insurance undertakings Full framework Full reporting Full programme At discretion Full requirements
CCPs and CSDs Full framework Full reporting Full programme Mandatory Full requirements
Crypto-asset service providers Full framework Full reporting Full programme At discretion Full requirements
Micro-enterprises Simplified (Art. 16) Full reporting Proportionate Exempt Full requirements
Insurance intermediaries (small) Simplified (Art. 16) Full reporting Proportionate Exempt Proportionate
Important Note on TLPT

Competent authorities identify entities required to perform TLPT based on the entity's overall risk profile and the criticality of its ICT systems. The ESAs, through the Joint Committee, have developed criteria for identification. Check with your national competent authority for specific TLPT obligations.

The Proportionality Principle

DORA's proportionality principle (Recital 21 and embedded throughout the Regulation) recognises that a one-size-fits-all approach to digital operational resilience is neither practical nor desirable. The principle allows financial entities to calibrate their compliance approach based on several factors.

Proportionality Factors

When applying proportionality, entities should consider:

  • Size: Total assets, number of employees, market share, volume of transactions processed
  • Overall risk profile: Nature and complexity of services, interconnectedness with the financial system, criticality of functions to the market
  • Nature, scale, and complexity: Range of services offered, geographical scope, ICT infrastructure complexity, number of third-party dependencies

What Proportionality Does NOT Mean

Proportionality should not be confused with exemption. Even the smallest in-scope entity must:

  • Have an ICT risk management framework (simplified for micro-enterprises under Article 16)
  • Report major ICT-related incidents to their competent authority
  • Manage ICT third-party risk with appropriate contractual provisions
  • Conduct proportionate resilience testing
  • Maintain a Register of Information on ICT third-party arrangements

Documenting Proportionality Decisions

Critically, proportionality decisions must be documented and justifiable. Competent authorities may challenge proportionality rationale during supervisory review. We recommend maintaining a proportionality assessment document that records the basis for each significant decision to apply reduced requirements.

Micro-Enterprise Exemptions and Simplified Framework

Article 16 provides a simplified ICT risk management framework for entities that qualify as micro-enterprises under the EU definition — generally entities with fewer than 10 employees and annual turnover or balance sheet total not exceeding EUR 2 million.

Simplified Framework Elements

Micro-enterprises benefit from reduced requirements in Pillar 1 (ICT Risk Management):

  • Governance: The ICT risk management framework need not include a separate ICT risk management function, provided ICT risk responsibilities are clearly assigned
  • Documentation: The framework may consist of simplified documentation proportionate to the entity's operations
  • Asset management: The ICT asset inventory can be maintained in a simplified format
  • Testing: Testing requirements are scaled to the entity's ICT risk exposure and infrastructure complexity
  • BCP/DR: Business continuity and disaster recovery can be addressed through simpler arrangements

What Micro-Enterprises Must Still Do

Micro-enterprise status does not exempt entities from:

  • Major ICT incident reporting (Pillar 2) — the same timelines and classification criteria apply
  • ICT third-party risk management (Pillar 4) — contracts must include mandatory clauses
  • Register of Information — must be maintained even in simplified form
  • Proportionate resilience testing — even simplified testing must be documented

Determining Micro-Enterprise Status

The assessment must consider the entity individually, not at group level. An entity that is part of a large financial group but individually meets micro-enterprise criteria may still qualify for the simplified framework. However, competent authorities may look through to group-level resources and capabilities when assessing the appropriateness of applying the simplified framework.

Group-Level Scoping

Financial groups face unique scoping challenges when implementing DORA. The Regulation applies at the individual entity level, but group-level coordination is both permitted and expected.

Individual Entity Compliance

Each in-scope entity within a group must individually comply with DORA. This means:

  • Each entity needs its own ICT risk management framework (though it can adopt the group framework)
  • Each entity must independently report major ICT-related incidents
  • Each entity must maintain its own resilience testing programme
  • Each entity must manage its own third-party ICT relationships

Group-Level Coordination

DORA permits and encourages group-level approaches:

  • Common ICT risk management framework: The parent entity can establish a group-wide ICT risk management framework that subsidiaries adopt and adapt
  • Consolidated Register of Information: Article 28(3) allows the RoI to be maintained at sub-consolidated and consolidated level
  • Centralised functions: Group-level ICT risk management, security operations, and incident response can serve multiple entities
  • Joint testing: Group entities sharing common ICT infrastructure can coordinate testing programmes
  • Pooled TLPT: Where multiple group entities use the same critical ICT systems, pooled TLPT is permitted

Group Scoping Methodology

We recommend the following approach for group-level DORA scoping:

  • Step 1: Map all legal entities within the group across all jurisdictions
  • Step 2: Identify which entities hold EU financial services licences falling within the 21 DORA categories
  • Step 3: Assess micro-enterprise status for each entity individually
  • Step 4: Map shared ICT infrastructure, services, and third-party providers across entities
  • Step 5: Determine which group-level capabilities can be leveraged (e.g., SOC, incident response, third-party management)
  • Step 6: Identify TLPT-obligated entities and assess pooled testing opportunities
  • Step 7: Design the group DORA compliance architecture — balancing central coordination with entity-level accountability

Third-Country Entities Serving EU Clients

DORA's geographic scope is anchored to EU-authorised financial entities, but its effects extend beyond EU borders through several mechanisms.

Direct Application

DORA directly applies to financial entities authorised in the EU. Third-country entities — whether financial institutions or ICT service providers — are not directly subject to DORA unless they are designated as CTPPs under the oversight framework.

Indirect Application Through Contractual Flow-Down

The most significant impact on third-country entities comes through contractual requirements. Article 30 mandates specific clauses in all ICT service agreements. EU financial entities must ensure their contracts with third-country providers include:

  • Clear service level descriptions and performance targets
  • Data processing and data location provisions
  • Audit and inspection rights for the financial entity and its competent authority
  • Termination rights and exit provisions with transition periods
  • Sub-outsourcing notification and approval requirements
  • Cooperation obligations during supervisory examinations

Third-Country Branches of EU Entities

Third-country branches of EU-authorised financial entities are generally within scope of the parent entity's DORA compliance programme. The ICT systems and services supporting these branches must be covered by the entity's ICT risk management framework, incident reporting, and third-party risk management processes.

EU Branches of Third-Country Entities

EU branches of third-country financial entities may fall within DORA scope depending on the specific EU legislation under which they operate. For example, third-country credit institution branches authorised under national regimes may be subject to DORA at the discretion of the Member State competent authority.

CTPP Designation and Oversight

One of DORA's most innovative provisions is the establishment of a direct EU-level oversight framework for Critical ICT Third-Party Service Providers (CTPPs). This framework is managed by the European Supervisory Authorities (ESAs) through a Lead Overseer model.

Designation Criteria

The ESAs designate ICT third-party service providers as critical based on:

  • Systemic impact: The degree to which the provider's disruption would affect financial stability, orderly market functioning, or the soundness of financial entities
  • Concentration: The number and importance of financial entities relying on the provider, particularly for critical or important functions
  • Substitutability: The degree to which the provider can be replaced, considering the availability of alternatives and the difficulty of migrating services
  • Interconnectedness: The degree to which the provider is interconnected with other ICT service providers in the financial supply chain

CTPP Oversight Powers

Once designated, CTPPs are subject to direct oversight by the Lead Overseer, which has powers to:

  • Request information and documentation
  • Conduct general investigations and inspections
  • Issue recommendations on ICT risk management, security, and resilience
  • Require the CTPP to adopt specific measures to address identified risks
  • Request reports on compliance with recommendations

Third-Country CTPPs

Third-country ICT service providers designated as CTPPs must establish a subsidiary within the EU within 12 months of designation. This ensures the Lead Overseer has a legal entity within the EU to exercise its oversight powers. Third-country CTPPs that fail to establish an EU subsidiary may face restrictions on their services to EU financial entities.

Practical Scoping Steps for Your Organisation

Whether you are a standalone financial entity, part of a group, or an ICT service provider, follow these practical steps to scope your DORA compliance programme:

Step 1: Regulatory Status Assessment

  • Confirm your EU financial services authorisation and licence type
  • Map your entity to the specific DORA Article 2(1) category
  • Assess whether you hold multiple licences (e.g., payment institution and e-money institution)

Step 2: Proportionality Assessment

  • Document your entity size (assets, employees, transaction volumes)
  • Assess your overall risk profile and systemic importance
  • Evaluate the nature, scale, and complexity of your services and ICT
  • Determine micro-enterprise eligibility under Article 16

Step 3: Critical Function Mapping

  • Identify all critical and important functions under Article 3(22)
  • Map ICT systems supporting each function
  • Identify third-party ICT providers for each critical function

Step 4: TLPT Obligation Assessment

  • Determine whether your entity is identified for mandatory TLPT
  • Engage with your competent authority on TLPT requirements
  • Assess pooled testing options for shared infrastructure

Step 5: Third-Party Scoping

  • Inventory all ICT third-party service providers
  • Classify providers by criticality of supported functions
  • Identify potential CTPPs in your supply chain
  • Assess contract compliance with Article 30

Step 6: Documentation and Sign-Off

  • Document the scoping assessment with all supporting rationale
  • Present to the management body for review and approval
  • Include the scoping document in your DORA evidence pack
  • Review and update annually or when material changes occur

A well-documented scoping assessment is one of the first things a competent authority will review during supervisory engagement. Invest the time to get it right, document the rationale clearly, and keep it current.

Frequently Asked Questions

Does DORA apply to my organisation?

DORA applies to 21 categories of financial entities authorised in the EU, including credit institutions, investment firms, insurance undertakings, payment institutions, electronic money institutions, and crypto-asset service providers. It also applies to ICT third-party service providers designated as critical (CTPPs). If your organisation holds a financial services licence in any EU Member State, DORA almost certainly applies.

What is the DORA proportionality principle?

The proportionality principle means that DORA requirements are applied in a manner proportionate to the size, overall risk profile, and nature, scale, and complexity of the financial entity's services, activities, and operations. Smaller, less complex entities may implement simpler controls while still meeting regulatory expectations. Proportionality decisions must be documented and justifiable.

Are micro-enterprises exempt from DORA?

Micro-enterprises are not fully exempt from DORA. However, Article 16 provides a simplified ICT risk management framework for micro-enterprises with fewer than 10 employees and annual turnover or balance sheet total not exceeding EUR 2 million. They benefit from reduced documentation and governance requirements but must still comply with incident reporting, third-party risk management, and Register of Information obligations.

Does DORA apply to non-EU entities serving EU clients?

DORA directly applies to financial entities authorised in the EU. Third-country entities are not directly in scope unless designated as CTPPs. However, third-country ICT providers serving EU financial entities will face contractual DORA requirements passed through by their EU clients, particularly the mandatory contract clauses under Article 30, including audit rights and data location provisions.

How do I scope DORA for a financial group?

For financial groups, DORA compliance must be assessed at each in-scope entity level. However, groups can establish a common ICT risk management framework, maintain the Register of Information at consolidated level, and coordinate resilience testing. The parent entity's management body retains overall responsibility for ICT risk strategy. Each entity must still be able to demonstrate individual compliance.