The DORA scope of application covers 20 types of financial entities — from credit institutions and insurers to crypto-asset service providers and ICT third-party providers. We help you precisely determine your entity classification, assess third-party obligations, and build a proportionate compliance strategy.
Our clients trust our expertise in digital transformation, compliance, and risk management
30 Minutes • Non-binding • Immediately available
Or contact us directly:










Incomplete or incorrect scope determination can lead to significant compliance gaps. Especially with complex group structures and extensive third-party ecosystems, a systematic, documented approach is essential.
Years of Experience
Employees
Projects
We develop a customized strategy with you for precise determination and continuous management of your DORA scope of application.
Comprehensive analysis of your organizational structure and business activities
Systematic identification and classification of all DORA-relevant entities
Detailed third-party analysis and critical service assessment
Development of documentation and governance structures
Implementation of continuous monitoring and update processes
"Precise DORA scope determination is the foundation of every successful compliance strategy. Our systematic approach ensures that all relevant entities and dependencies are captured while developing practical and efficient implementation pathways."

Head of Information Security, Cyber Security
Expertise & Experience:
10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security
Our DORA audit packages offer a structured assessment of your ICT risk management – aligned with regulatory requirements according to DORA. Get an overview here:
View DORA Audit PackagesWe offer you tailored solutions for your digital transformation
Systematic analysis and classification of all entities within your organization to determine DORA applicability and specific requirements.
Comprehensive assessment of your third-party ecosystem to identify critical ICT services and their DORA implications.
Specialized analysis for international group structures to determine DORA applicability across different jurisdictions.
Building solid governance structures and processes for continuous management and monitoring of the DORA scope of application.
Establishment of systematic monitoring processes to ensure continuous currency and completeness of your DORA scope determination.
Comprehensive assessment of your current compliance position and identification of specific action areas based on your individual DORA scope.
Choose the area that fits your requirements
DORA requires financial institutions to conduct regular internal ICT audits and prepares them for external supervisory reviews by BaFin and statutory auditors. We guide you through the full DORA audit cycle - from internal audit programs to supervisory examination readiness.
Successful DORA compliance verification requires systematic preparation, documented evidence, and — for identified financial entities — TIBER-EU-aligned Threat-Led Penetration Tests (TLPT). We guide you through every phase: from gap assessment and audit readiness to BaFin/ECB-compliant TLPT execution.
From gap analysis to audit support. DORA has been mandatory since 17 January 2025 — and BaFin is acting: over 600 reported ICT incidents, ongoing §44 special audits, and in Q3 2025 the first DORA fine proceedings due to inadequate ICT third-party documentation. The new IDW audit standard EPS 528 defines how statutory auditors will assess your DORA compliance. We make your organization audit-ready — across all five DORA pillars, based on our ISO 27001-certified methodology and years of BAIT/MaRisk experience in the financial sector.
DORA Compliance encompasses the ongoing adherence to the regulatory requirements of the Digital Operational Resilience Act. We support you with a comprehensive compliance approach that integrates documentation, controls, monitoring, reporting, and audit preparation.
Our DORA Compliance Checklist guides financial entities through all five DORA pillars — from initial gap analysis and self-assessment through to BaFin-aligned documentation and continuous monitoring.
Choosing the right DORA compliance software is critical for audit-proof implementation. We support financial institutions in evaluating, selecting, and integrating GRC platforms that cover all five DORA pillars — from the ICT register to incident reporting and third-party risk management.
DORA requires financial entities to maintain comprehensive documentation of their digital operational resilience. We support you in building a complete documentation system - from ICT risk management policies to the supervisory information register.
DORA Article 5 makes the management body personally accountable for the ICT risk management framework, digital resilience strategy, and governance structures. We help financial institutions build DORA-compliant governance — from board-level oversight to the three lines model.
An existing ISO 27001 certification covers approximately 85% of DORA requirements — but the remaining gaps are critical: TLPT resilience testing, ICT third-party contract management, and the Register of Information go beyond ISO 27001. We build precise control mappings, identify your specific DORA gaps, and design an integrated compliance framework that connects both standards efficiently.
Full DORA implementation requires more than documentation — it demands operational execution across all five pillars. We guide you from gap analysis through phased delivery to BaFin audit readiness.
The DORA scope is deliberately broad and covers virtually all actors in the European financial sector. Accurately classifying your organisation is essential for determining the specific compliance requirements and forms the foundation of your entire DORA strategy. Financial institutions covered under DORA: Credit institutions under the CRR (Capital Requirements Regulation), including all banks, savings banks and cooperative banks regardless of size Insurance and reinsurance undertakings under Solvency II, including small mutual insurance associations Investment firms under MiFID II, ranging from large investment banks to small asset managers Central counterparties (CCPs) and central securities depositories (CSDs) as critical market infrastructures Trading venues including regulated markets, multilateral trading facilities and organised trading systems Crypto-asset sector and new market participants: Crypto-asset service providers under the Markets in Crypto-Assets Regulation (MiCA) E-money institutions and payment institutions under the Payment Services Directive Crowdfunding service providers and alternative investment fund managers Credit rating agencies and trade repositories as supporting financial service.
DORA takes a group-wide approach that has significant implications for the governance and risk management of international financial groups. The regulation acknowledges the reality of modern financial services, where operational resilience often needs to be coordinated at group level to be effective. Group-wide application and coordination: DORA applies to all EU subsidiaries of financial institutions, regardless of where the parent company is domiciled Third-country subsidiaries of European financial groups may be indirectly affected through group-level policies and standards The regulation requires a coordinated approach to ICT risk management at group level Central ICT functions and services must be assessed across the group from a DORA perspective Shared services and group-wide technology platforms require particular attention Governance structures and responsibilities: The management body of each DORA-obligated entity bears ultimate responsibility for compliance Group-wide ICT governance frameworks must take local regulatory requirements into account Delegation of ICT functions within the group is subject to specific DORA requirements.
The inclusion of critical ICT third-party providers within the DORA scope represents one of the most significant innovations of the regulation, substantially extending the traditional focus on financial institutions. This extension creates a comprehensive ecosystem of digital operational resilience that reaches well beyond direct regulatory boundaries. Definition and identification of critical ICT third-party providers: Critical ICT third-party providers are entities that provide ICT services to financial institutions while having systemic importance for the financial sector Criticality is determined based on factors such as systemic relevance, substitutability, complexity of services and the number of dependent financial institutions Cloud service providers, data centre operators, software developers and data processing service providers may be designated as critical Designation is carried out by the European supervisory authorities based on quantitative and qualitative criteria Sub-contractors of critical third-party providers may also be captured in certain cases Direct supervision and compliance requirements: Critical ICT third-party providers are subject to direct supervision.
DORA establishes a uniform European framework for digital operational resilience that differs from both existing sector-specific regulations and general cybersecurity frameworks. Understanding these differences and overlaps is essential for an efficient compliance strategy. Relationship with existing financial regulations: DORA complements and harmonises existing ICT requirements in CRD, Solvency II, MiFID II and other sector-specific regulations Existing national ICT regulations are superseded by DORA or must be adapted accordingly DORA creates, for the first time, a cross-sector standard for all financial service providers in the EU The regulation integrates elements from various existing frameworks into a coherent approach Specific requirements for third-party risk management go beyond previous regulations Distinction from the NIS 2 Directive: NIS 2 focuses on critical infrastructure and essential services, while DORA is specifically targeted at financial services DORA has stricter and more detailed requirements for incident reporting and third-party management While NIS 2 pursues a risk-based approach, DORA defines specific minimum standards Financial institutions may.
Identifying critical ICT services is a fundamental step in DORA compliance and requires a systematic assessment of all technological dependencies within your organisation. This analysis goes well beyond a simple inventory and demands a thorough understanding of business processes and their technological support. Criticality criteria under DORA: Systemic relevance to critical or important functions of the financial institution Impact of a service outage on business continuity and customer services Availability of alternatives and substitutability of the service Complexity of recovery in the event of disruptions or failures Number of dependent business processes and affected stakeholders Systematic service assessment methodology: Mapping all ICT services to critical and important business functions Assessment of Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) for each service Analysis of interdependencies between different services and systems Quantification of the financial and reputational impact of service outages Consideration of regulatory requirements and compliance implications Business process-oriented assessment: Identification of all business.
DORA establishes comprehensive requirements for third-party risk management that go well beyond traditional vendor management practices. These requirements aim to strengthen the digital operational resilience of the entire financial ecosystem and minimise systemic risks. Comprehensive due diligence requirements: Detailed assessment of the ICT security measures and risk management practices of the third-party provider Analysis of the financial stability and business continuity capabilities of the provider Assessment of the governance structures and compliance culture of the third-party provider Review of sub-contractor chains and their potential risks Assessment of the geographic distribution and concentration of the provider's infrastructure Contractual security requirements: Mandatory inclusion of specific DORA compliance clauses in all third-party contracts Detailed service level agreements with measurable security and availability metrics Comprehensive audit rights and access rights for compliance reviews Clear incident reporting obligations and escalation procedures Exit clauses and data return agreements for emergency situations Ongoing monitoring and oversight: Implementation of regular risk assessments and.
Cloud services present a particular challenge for DORA compliance, as they often support critical business functions while simultaneously creating complex dependencies and risks. Multi-cloud strategies add further complexity and require a well-considered governance approach. Cloud-specific DORA requirements: Detailed assessment of the security architecture and compliance certifications of the cloud provider Analysis of data residency and data sovereignty in relation to regulatory requirements Assessment of encryption standards and key management practices Review of the cloud provider's backup and disaster recovery capabilities Assessment of network security and isolation between different customers Multi-cloud governance and coordination: Development of uniform security standards and compliance requirements for all cloud providers Implementation of centralised monitoring and management tools for multi-cloud environments Coordination of incident response processes across different cloud providers Harmonisation of contractual structures and service level agreements Establishment of consistent audit and compliance monitoring practices Risk management in cloud environments: Assessment of shared responsibility models and clear delineation of responsibilities.
Intra-group services represent a distinct category of ICT services requiring specific considerations for DORA compliance. Although these services are provided within the same corporate group, they are nevertheless subject to certain DORA requirements and can pose significant risks to operational resilience. Classification of intra-group services: Intra-group services are generally treated as ICT third-party services when provided by separate legal entities The geographic location of the service-providing entity may trigger additional regulatory considerations Shared service centres and centralised IT functions typically fall within this category Outsourcing to group entities in third countries requires particular attention The assessment must take into account both the legal and the operational structure Risk assessment and due diligence: A formal risk assessment is required even for intra-group services The assessment should cover the financial stability and operational capacity of the service-providing entity Governance structures and reporting lines must be clearly defined and documented Dependencies on shared infrastructure and resources must be.
DORA has significant extraterritorial implications that extend well beyond the borders of the European Union. For international financial groups, this creates complex compliance challenges requiring careful coordination across multiple jurisdictions. Extraterritorial application of DORA: EU subsidiaries of international groups are fully subject to DORA requirements, regardless of where the parent company is domiciled Branches of EU financial institutions in third countries may be indirectly affected through group-wide DORA compliance standards Third-country subsidiaries of European financial groups may need to implement DORA-compliant processes ICT services provided by third-country entities to EU financial institutions are subject to DORA requirements Cross-border data flows and processing must meet DORA compliance standards Group-wide governance challenges: Harmonising DORA requirements with local regulatory frameworks across different jurisdictions Developing uniform ICT risk management standards that satisfy both DORA and local requirements Coordinating incident response processes between EU and non-EU entities Managing differing data protection and data localisation requirements Establishing consistent audit and monitoring.
Fintech companies and new market entrants face unique challenges in DORA compliance, as they often deploy effective business models and technologies that do not fit neatly into traditional regulatory frameworks. At the same time, DORA also presents opportunities for these organisations to differentiate themselves through superior digital resilience. Fintech-specific DORA challenges: Many fintech companies are heavily dependent on cloud services and third-party APIs, creating complex third-party risk management requirements Agile development methods and continuous deployment practices must be harmonised with DORA compliance requirements Limited resources for compliance functions require efficient and cost-effective implementation strategies Effective technologies such as blockchain, AI and machine learning may create new risk categories Rapid growth and evolving business models require flexible and adaptable compliance frameworks Opportunities through DORA compliance: DORA compliance can be utilized as a competitive advantage and trust-building measure vis-à-vis traditional financial institutions Early implementation of solid ICT risk management practices can create long-term operational benefits Compliance can.
Coordinating DORA compliance with other international cybersecurity regulations is a complex task that requires strategic planning and systematic management. Global financial institutions must develop a coherent framework that efficiently integrates various regulatory requirements. International regulatory landscape: US frameworks such as the NIST Cybersecurity Framework, FFIEC guidance and state-specific regulations Asian regulations such as Singapore's Technology Risk Management Guidelines and Hong Kong's Cybersecurity Fortification Initiative Other European regulations such as NIS2, GDPR and national cybersecurity laws Sector-specific international standards such as ISO 27001, the SWIFT Customer Security Programme and PCI DSS Emerging regulations in developing markets and their potential implications Harmonisation and integration: Development of a master compliance matrix mapping all applicable regulations and their requirements Identification of overlaps and synergies between different regulatory frameworks Development of uniform policies and procedures that satisfy multiple regulatory requirements Implementation of governance structures that coordinate both local and international compliance Establishment of reporting mechanisms that efficiently serve various supervisory.
DORA has far-reaching implications for existing and future outsourcing arrangements and requires a comprehensive review and adaptation of service provider contracts. The regulation introduces new requirements for contract design, risk management and the oversight of outsourcing relationships. Contractual adaptation requirements: Integration of specific DORA compliance clauses into all existing and new outsourcing contracts Inclusion of detailed service level agreements with measurable security and resilience metrics Implementation of comprehensive audit rights and access permissions for compliance reviews Definition of clear incident reporting obligations and escalation procedures Establishment of exit clauses and data return agreements for various scenarios Enhanced due diligence requirements: Comprehensive assessment of the ICT security measures and risk management practices of all service providers Analysis of the financial stability and business continuity capabilities of providers Assessment of the governance structures and compliance culture of service providers Detailed review of sub-contractor chains and their potential risks Assessment of the geographic distribution and concentration of provider.
DORA implementation follows a structured timeline with specific milestones and phases. Strategic planning of these timelines is critical to a successful and timely compliance implementation that both meets regulatory requirements and ensures operational efficiency. Critical DORA timelines and milestones: January 2025: Full applicability of DORA for all in-scope financial institutions Ongoing deadlines for incident reporting: Immediate notification of critical ICT incidents within four hours Annual penetration tests for significant financial institutions from the first full calendar year Ongoing monitoring and assessment of critical ICT third-party arrangements Regular review and update of ICT risk management frameworks Phased implementation strategy: Phase
1 – Scope assessment and gap analysis: Comprehensive assessment of the current position and identification of all DORA-relevant entities and services Phase
2 – Framework development: Establishment of the required governance structures, policies and procedures Phase
3 – System implementation: Technical implementation of monitoring, reporting and control systems Phase
4 – Testing and validation: Comprehensive testing.
A strategic roadmap for the gradual expansion of DORA scope management enables organisations to systematically build their compliance capabilities while maintaining operational continuity. This roadmap should address both short-term compliance objectives and long-term strategic improvements. Strategic roadmap development: Baseline assessment: Comprehensive evaluation of current ICT risk management capabilities and identification of starting points Target state definition: Clear articulation of the desired DORA compliance position and strategic objectives Gap analysis and prioritisation: Systematic identification of gaps and their prioritisation based on risk and business impact Milestone planning: Definition of specific, measurable interim objectives with clear timeframes and success criteria Resource and budget planning: Realistic estimation of required investments and capacities Gradual expansion strategy: Level
1 – Foundations: Establishment of basic governance structures and critical compliance processes Level
2 – Core functions: Implementation of comprehensive third-party management and incident response capabilities Level
3 – Advanced functions: Development of advanced monitoring, analytics and automation capabilities Level
4 –.
The proportionality principle is a central aspect of DORA, enabling financial institutions to tailor their compliance approaches to their specific size, complexity and risk profile. Strategic application of this principle can yield significant efficiency gains without compromising compliance quality. Foundations of the proportionality principle: DORA acknowledges that different financial institutions have varying risk profiles and operational complexities Smaller and less complex institutions may use simplified approaches for certain DORA requirements Proportionality applies to both the intensity and the sophistication of the measures implemented The principle applies across all DORA pillars: ICT risk management, incident reporting, resilience testing and third-party management Proportionality does not mean exemption from requirements, but rather appropriate adaptation of their implementation Factors for proportionality assessment: Size of the institution: total assets, number of employees, number of customers and geographic presence Complexity of business activities: number and type of services offered, technology sophistication and market position Risk profile: dependence on ICT systems, criticality.
Preparing for future expansions of the DORA scope requires a forward-looking strategy that accounts for both regulatory developments and technological and business changes. An adaptive and future-oriented approach can help organisations respond proactively to scope expansions. Anticipating regulatory developments: Continuous monitoring of the activities of European supervisory authorities and their guidance development Analysis of consultation papers and drafts relating to potential scope expansions Participation in industry dialogues and regulatory consultation processes Assessment of the implications of related regulations such as NIS2, the AI Act and the Digital Services Act Monitoring international regulatory trends that could influence EU developments Building adaptive compliance infrastructures: Development of modular and flexible compliance frameworks that can be readily extended Implementation of flexible technology architectures capable of rapidly integrating new requirements Building governance structures that can cover both current and future scope areas Establishment of change management processes for rapid adaptation to new requirements Development of scenario planning capabilities for various.
An effective DORA scope assessment requires the use of structured tools and proven methodologies that enable a systematic and comprehensive analysis of all relevant aspects. Combining different assessment approaches ensures complete coverage of the DORA scope. Systematic assessment tools: DORA scope assessment matrix: Structured checklists for systematic assessment of all entity categories and their specific requirements Business process mapping tools: Visualisation of business processes and their ICT dependencies to identify critical services Third-party inventory systems: Comprehensive databases of all ICT service providers with criticality assessments Risk assessment frameworks: Structured approaches for assessing and quantifying ICT risks Compliance gap analysis tools: Systematic comparisons between current position and DORA requirements Data collection and analysis: Automated discovery tools to identify all ICT assets and dependencies Stakeholder interview frameworks for structured conversations with business and IT representatives Document analysis methods for reviewing existing contracts, policies and procedures Technical assessments to evaluate current ICT infrastructure and security Benchmarking analyses to.
Supervisory-compliant and audit-ready DORA scope documentation requires a systematic approach, complete traceability and clear justifications for all scope decisions. The documentation must both meet current regulatory standards and be prepared for future reviews. Fundamental documentation requirements: Complete recording of all DORA-relevant entities with clear justification for their classification Detailed description of all critical ICT services and their business relevance Comprehensive documentation of all third-party relationships and their criticality assessments Clear presentation of governance structures and responsibilities for DORA compliance Complete record of all scope decisions with timestamps and justifications Audit trail and traceability: Implementation of version-controlled documentation systems with a complete change history Establishment of clear approval processes for all scope changes with documented decision paths Retention of all supporting documents and analyses that informed scope decisions Documentation of the methods and criteria used for criticality assessments Evidence of regular reviews and updates to the scope documentation Structured documentation frameworks: Use of standardised templates and.
External consultants and service providers can play a decisive role in DORA scope determination, particularly for organisations with limited internal resources or specialised requirements. The strategic use of external expertise can significantly improve the quality and efficiency of the scope determination process. Strategic advantages of external expertise: Access to specialised DORA know-how and current regulatory developments Objective assessment of organisational structures and processes without internal bias Benchmarking against industry standards and best practices from other financial institutions Accelerated implementation through proven methodologies and tools Risk reduction through experience-based guidance and quality assurance Areas for external support: Comprehensive gap analyses and readiness assessments for DORA compliance Development of tailored scope management frameworks and processes Criticality assessments of complex ICT services and third-party arrangements Technical assessments of ICT infrastructures and security measures Development of documentation and governance structures Selection and management of external partners: Assessment of DORA-specific expertise and experience of prospective consultants Review of references and.
A sustainable strategy for ongoing DORA scope management requires building solid, adaptable systems and processes that can evolve alongside the organisation and the regulatory landscape. This strategy must ensure both operational efficiency and strategic flexibility. Building sustainable governance structures: Establishment of dedicated DORA scope management functions with clear responsibilities and authority Integration of scope management into existing risk management and compliance frameworks Development of cross-functional teams with representatives from IT, risk, compliance and business units Implementation of regular governance reviews to assess the effectiveness of scope management processes Building escalation and decision-making mechanisms for complex scope issues Continuous improvement and innovation: Implementation of feedback loops from operational experience and audit findings Establishment of benchmarking processes against industry standards and best practices Development of innovation programmes for continuous improvement of scope management capabilities Integration of new technologies and methodologies to enhance efficiency Building partnerships with technology providers and research institutions Technological sustainability: Investment in flexible and.
Discover how we support companies in their digital transformation
Klöckner & Co
Digital Transformation in Steel Trading

Siemens
Smart Manufacturing Solutions for Maximum Value Creation

Festo
Intelligent Networking for Future-Proof Production Systems

Bosch
AI Process Optimization for Improved Production Efficiency

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.
Our clients trust our expertise in digital transformation, compliance, and risk management
Schedule a strategic consultation with our experts now
30 Minutes • Non-binding • Immediately available
Direct hotline for decision-makers
Strategic inquiries via email
For complex inquiries or if you want to provide specific information in advance