1. Home/
  2. Services/
  3. Regulatory Compliance Management/
  4. DORA Digital Operational Resilience Act/
  5. DORA Compliance En

Newsletter abonnieren

Bleiben Sie auf dem Laufenden mit den neuesten Trends und Entwicklungen

Durch Abonnieren stimmen Sie unseren Datenschutzbestimmungen zu.

A
ADVISORI FTC GmbH

Transformation. Innovation. Sicherheit.

Firmenadresse

Kaiserstraße 44

60329 Frankfurt am Main

Deutschland

Auf Karte ansehen

Kontakt

info@advisori.de+49 69 913 113-01

Mo-Fr: 9:00 - 18:00 Uhr

Unternehmen

Leistungen

Social Media

Folgen Sie uns und bleiben Sie auf dem neuesten Stand.

  • /
  • /

© 2024 ADVISORI FTC GmbH. Alle Rechte vorbehalten.

ADVISORI Logo
BlogCase StudiesAbout Us
info@advisori.de+49 69 913 113-01
Your browser does not support the video tag.
BaFin is auditing — are you ready?

DORA Compliance

From gap analysis to audit support. DORA has been mandatory since 17 January 2025 — and BaFin is acting: over 600 reported ICT incidents, ongoing §44 special audits, and in Q3 2025 the first DORA fine proceedings due to inadequate ICT third-party documentation. The new IDW audit standard EPS 528 defines how statutory auditors will assess your DORA compliance. We make your organization audit-ready — across all five DORA pillars, based on our ISO 27001-certified methodology and years of BAIT/MaRisk experience in the financial sector.

  • ✓Comprehensive DORA gap analysis across all 5 pillars with a prioritized action plan
  • ✓ICT risk management and incident reporting in accordance with BaFin requirements and RTS/ITS Level 2 standards
  • ✓Third-party information register and concentration risk analysis (submission deadline: 30.03.2026)
  • ✓Audit preparation for IDW EPS 528, §44 special audits, and internal review
  • ✓TLPT support according to TIBER-EU for systemically important institutions

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

  • Your strategic goals and objectives
  • Desired business outcomes and ROI
  • Steps already taken

Or contact us directly:

info@advisori.de+49 69 913 113-01

Certifications, Partners and more...

ISO 9001 CertifiedISO 27001 CertifiedISO 14001 CertifiedBeyondTrust PartnerBVMW Bundesverband MitgliedMitigant PartnerGoogle PartnerTop 100 InnovatorMicrosoft AzureAmazon Web Services

1 Year of DORA: The Grace Period Is Over — BaFin Is Auditing

Why ADVISORI for DORA Compliance

  • ISO 27001-certified — our own information security meets the highest standards that we implement for our clients
  • Deep experience with BAIT, MaRisk, KAIT, VAIT, and ZAIT — DORA builds on these frameworks, and we know each of them from years of practice at banks and insurance companies
  • Dedicated DORA team with its own readiness check, two-day training program (dora.advisori.de), and experience from over 30 DORA projects
  • AI platform Synthara AI Studio for automated compliance documentation, information register maintenance, and continuous monitoring
  • Practical experience at banks, insurance companies, capital management companies, payment institutions, and investment firms of all sizes — from fintech to large bank
  • In-depth knowledge of RTS/ITS Level 2 standards and close exchange with auditors conducting reviews under IDW EPS 528 and §44 KWG
⚠

Expert Consultation Available

Contact our specialists today for a personalized assessment of your requirements.

ADVISORI in Numbers

11+

Years of Experience

120+

Employees

520+

Projects

We follow a structured yet pragmatic approach. No overengineering, no paper compliance — but resilience that works in day-to-day operations, withstands any BaFin audit, and meets the RTS/ITS requirements of the ESAs.

Our Approach:

Phase 1 — Assessment (2–4 weeks): Systematic as-is analysis of your ICT governance against all DORA requirements and RTS/ITS. Benchmark against KPMG industry maturity levels, identification of regulatory gaps and quick wins. Output: gap report, maturity scoring, prioritized roadmap.

Phase 2 — Design (4–8 weeks): Development of the required frameworks, processes, and role models. Establishment of the ICT risk manager function, definition of reporting chains according to DORA deadlines (4h/72h/1M), build-out of the information register. Output: framework documentation, process map, role model.

Phase 3 — Implementation (8–16 weeks): Stepwise implementation with minimal impact on ongoing operations. Integration into existing ISMS, BCM, and outsourcing structures. Migration of existing BAIT/MaRisk evidence into the DORA framework. Output: implemented processes, populated information register, training records.

Phase 4 — Operationalization (ongoing): Embedding into day-to-day operations with KPI tracking, automated monitoring, and regular resilience exercises. Because DORA is not a project — it is a permanent state. Output: KPI dashboard, exercise protocols, quarterly reporting.

Phase 5 — Audit preparation (4–6 weeks): Targeted preparation for IDW EPS 528 audits, §44 special audits, and internal reviews. Documentation, evidence management, dry runs, and interview coaching. Output: audit readiness report, documentation matrix, dry-run protocol.

"ADVISORI provided exceptional expertise and guidance throughout our project. Their deep understanding of regulatory requirements and practical approach helped us achieve our compliance goals efficiently."
Sarah Richter

Sarah Richter

Head of Information Security, Cyber Security

Expertise & Experience:

10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security

LinkedIn Profile

DORA Audit Packages

Our DORA audit packages offer a structured assessment of your ICT risk management – aligned with regulatory requirements according to DORA. Get an overview here:

View DORA Audit Packages

Our Services

We offer you tailored solutions for your digital transformation

DORA Readiness Assessment

Where do you actually stand? Our readiness assessment systematically evaluates your current ICT governance against all DORA requirements and the 13 RTS/2 ITS of the ESAs — from ICT risk management and incident reporting to the third-party register. You receive a detailed gap report with a prioritized action plan, effort estimate, and timeline. Companies with an existing ISMS (e.g., ISO 27001) have, in our experience, already covered 40–60% of the requirements. Deliverables: gap report, maturity scoring per DORA pillar, management presentation, prioritized roadmap.

  • Review of all 5 DORA pillars and RTS/ITS against your existing structures
  • Gap report with risk assessment, prioritization, and effort estimate
  • Management-ready results presentation for the executive board and supervisory board
  • Benchmarking against KPMG industry maturity levels and current BaFin expectations

ICT Risk Management Framework

DORA Art. 5–16 requires a comprehensive ICT risk management framework — significantly beyond what BAIT and MaRisk previously demanded. The associated RTS specify requirements for risk taxonomy, protective measures, detection mechanisms, and recovery strategies. We design and implement this framework tailored to your organization, including the new role of the ICT risk manager. Deliverables: ICT risk framework, risk taxonomy, role model, process documentation.

  • Development of a DORA-compliant ICT risk taxonomy and assessment methodology
  • Definition and staffing of the ICT risk manager function pursuant to DORA Art. 6(4)
  • Integration into existing ISMS (ISO 27001), BCM, and operational risk management
  • Derivation of protection, detection, and recovery measures in accordance with RTS requirements

Incident Management & BaFin Reporting

Since January 2025, BaFin has registered over 600 serious ICT incidents — and explicitly checks whether documented incident response processes exist and are regularly exercised. DORA defines clear reporting deadlines: initial notification within 4 hours, intermediate report after 72 hours, final report after 1 month. We implement a complete incident management system including tabletop exercises. Deliverables: incident response playbook, reporting chain documentation, BaFin reporting templates, exercise program.

  • Classification scheme for ICT incidents pursuant to DORA Art. 17–23 and the associated RTS
  • Reporting chains and escalation paths with DORA deadlines (4h / 72h / 1 month)
  • BaFin MVP reporting integration and process automation
  • Incident response exercise program (tabletop exercises, simulations, lessons learned)

Third-Party Risk Management & Information Register

According to industry surveys, ICT third-party management is the greatest DORA challenge — 75% of critical outsourcing service providers originate from third countries. DORA requires a complete information register of all contractual arrangements with ICT third-party service providers. The next BaFin submission deadline is 30 March 2026. In Q3 2025, the first fine was imposed for inadequate third-party documentation. Deliverables: BaFin-compliant information register, concentration risk report, exit strategies, monitoring process.

  • Build-out of the BaFin-compliant information register (submission deadline: 30.03.2026)
  • Concentration risk analysis and substitutability assessment of critical providers
  • Exit strategies and contingency plans for critical ICT service providers
  • Ongoing monitoring and risk assessment of the third-party portfolio

TLPT & Resilience Testing

DORA Art. 24–27 requires regular testing of digital operational resilience — for systemically important institutions including Threat-Led Penetration Testing (TLPT) under the TIBER-EU framework, at least every 3 years. We plan and support your testing programs: from vulnerability assessments and scenario-based tests to full TLPT with qualified red team providers. Deliverables: test strategy, TLPT scope definition, provider selection, test support, measure tracking.

  • Test planning and strategy pursuant to DORA Art. 24–27 and the associated RTS
  • TLPT support according to the TIBER-EU/TIBER-DE framework
  • Coordination with qualified threat intelligence and red team providers
  • Derivation, prioritization, and tracking of measures from test results

DORA Audit Preparation & Audit Support

BaFin has announced DORA as an audit focus, and the IDW standard EPS 528 defines for the first time how statutory auditors must assess DORA compliance. In addition, §44 KWG special audits with a DORA focus are already underway. We prepare you specifically: documentation, evidence management, dry runs, and support during the audit. From 2026, the leniency for first-year deficiencies no longer applies. Deliverables: audit readiness report, documentation matrix, dry-run protocol, audit support.

  • Preparation for IDW EPS 528 audits and §44 KWG special audits
  • Documentation matrix: mapping of all DORA requirements to your evidence
  • Dry runs with realistic audit scenarios and interview preparation
  • Support during the audit as a technical sparring partner

Looking for a complete overview of all our services?

View Complete Service Overview

Our Areas of Expertise in Regulatory Compliance Management

Our expertise in managing regulatory compliance and transformation, including DORA.

Apply for Banking License

Further information on applying for a banking license.

▼
    • Banking License Governance Organizational Structure
      • Banking License Supervisory Board Executive Roles
      • Banking License ICS Compliance Functions
      • Banking License Control Management Processes
    • Banking License Preliminary Study
      • Banking License Feasibility Business Plan
      • Banking License Capital Requirements Budgeting
      • Banking License Risk Opportunity Analysis
Basel III

Further information on Basel III.

▼
    • Basel III Implementation
      • Basel III Adaptation of Internal Risk Models
      • Basel III Implementation of Stress Tests Scenario Analyses
      • Basel III Reporting Compliance Procedures
    • Basel III Ongoing Compliance
      • Basel III Internal External Audit Support
      • Basel III Continuous Review of Metrics
      • Basel III Monitoring of Supervisory Changes
    • Basel III Readiness
      • Basel III Introduction of New Metrics Countercyclical Buffer Etc
      • Basel III Gap Analysis Implementation Roadmap
      • Basel III Capital and Liquidity Requirements Leverage Ratio LCR NSFR
BCBS 239

Further information on BCBS 239.

▼
    • BCBS 239 Implementation
      • BCBS 239 IT Process Adjustments
      • BCBS 239 Risk Data Aggregation Automated Reporting
      • BCBS 239 Testing Validation
    • BCBS 239 Ongoing Compliance
      • BCBS 239 Audit Pruefungsunterstuetzung
      • BCBS 239 Kontinuierliche Prozessoptimierung
      • BCBS 239 Monitoring KPI Tracking
    • BCBS 239 Readiness
      • BCBS 239 Data Governance Rollen
      • BCBS 239 Gap Analyse Zielbild
      • BCBS 239 Ist Analyse Datenarchitektur
CIS Controls

Weitere Informationen zu CIS Controls.

▼
    • CIS Controls Kontrolle Reifegradbewertung
    • CIS Controls Priorisierung Risikoanalys
    • CIS Controls Umsetzung Top 20 Controls
Cloud Compliance

Weitere Informationen zu Cloud Compliance.

▼
    • Cloud Compliance Audits Zertifizierungen ISO SOC2
    • Cloud Compliance Cloud Sicherheitsarchitektur SLA Management
    • Cloud Compliance Hybrid Und Multi Cloud Governance
CRA Cyber Resilience Act

Weitere Informationen zu CRA Cyber Resilience Act.

▼
    • CRA Cyber Resilience Act Conformity Assessment
      • CRA Cyber Resilience Act CE Marking
      • CRA Cyber Resilience Act External Audits
      • CRA Cyber Resilience Act Self Assessment
    • CRA Cyber Resilience Act Market Surveillance
      • CRA Cyber Resilience Act Corrective Actions
      • CRA Cyber Resilience Act Product Registration
      • CRA Cyber Resilience Act Regulatory Controls
    • CRA Cyber Resilience Act Product Security Requirements
      • CRA Cyber Resilience Act Security By Default
      • CRA Cyber Resilience Act Security By Design
      • CRA Cyber Resilience Act Update Management
      • CRA Cyber Resilience Act Vulnerability Management
CRR CRD

Weitere Informationen zu CRR CRD.

▼
    • CRR CRD Implementation
      • CRR CRD Offenlegungsanforderungen Pillar III
      • CRR CRD SREP Vorbereitung Dokumentation
    • CRR CRD Ongoing Compliance
      • CRR CRD Reporting Kommunikation Mit Aufsichtsbehoerden
      • CRR CRD Risikosteuerung Validierung
      • CRR CRD Schulungen Change Management
    • CRR CRD Readiness
      • CRR CRD Gap Analyse Prozesse Systeme
      • CRR CRD Kapital Liquiditaetsplanung ICAAP ILAAP
      • CRR CRD RWA Berechnung Methodik
Datenschutzkoordinator Schulung

Weitere Informationen zu Datenschutzkoordinator Schulung.

▼
    • Datenschutzkoordinator Schulung Grundlagen DSGVO BDSG
    • Datenschutzkoordinator Schulung Incident Management Meldepflichten
    • Datenschutzkoordinator Schulung Datenschutzprozesse Dokumentation
    • Datenschutzkoordinator Schulung Rollen Verantwortlichkeiten Koordinator Vs DPO
DORA Digital Operational Resilience Act

Stärken Sie Ihre digitale operationelle Widerstandsfähigkeit gemäß DORA.

▼
    • DORA Compliance
      • Audit Readiness
      • Control Implementation
      • Documentation Framework
      • Monitoring Reporting
      • Training Awareness
    • DORA Implementation
      • Gap Analyse Assessment
      • ICT Risk Management Framework
      • Implementation Roadmap
      • Incident Reporting System
      • Third Party Risk Management
    • DORA Requirements
      • Digital Operational Resilience Testing
      • ICT Incident Management
      • ICT Risk Management
      • ICT Third Party Risk
      • Information Sharing
DSGVO

Weitere Informationen zu DSGVO.

▼
    • DSGVO Implementation
      • DSGVO Datenschutz Folgenabschaetzung DPIA
      • DSGVO Prozesse Fuer Meldung Von Datenschutzverletzungen
      • DSGVO Technische Organisatorische Massnahmen
    • DSGVO Ongoing Compliance
      • DSGVO Laufende Audits Kontrollen
      • DSGVO Schulungen Awareness Programme
      • DSGVO Zusammenarbeit Mit Aufsichtsbehoerden
    • DSGVO Readiness
      • DSGVO Datenschutz Analyse Gap Assessment
      • DSGVO Privacy By Design Default
      • DSGVO Rollen Verantwortlichkeiten DPO Koordinator
EBA

Weitere Informationen zu EBA.

▼
    • EBA Guidelines Implementation
      • EBA FINREP COREP Anpassungen
      • EBA Governance Outsourcing ESG Vorgaben
      • EBA Self Assessments Gap Analysen
    • EBA Ongoing Compliance
      • EBA Mitarbeiterschulungen Sensibilisierung
      • EBA Monitoring Von EBA Updates
      • EBA Remediation Kontinuierliche Verbesserung
    • EBA SREP Readiness
      • EBA Dokumentations Und Prozessoptimierung
      • EBA Eskalations Kommunikationsstrukturen
      • EBA Pruefungsmanagement Follow Up
EU AI Act

Weitere Informationen zu EU AI Act.

▼
    • EU AI Act AI Compliance Framework
      • EU AI Act Algorithmic Assessment
      • EU AI Act Bias Testing
      • EU AI Act Ethics Guidelines
      • EU AI Act Quality Management
      • EU AI Act Transparency Requirements
    • EU AI Act AI Risk Classification
      • EU AI Act Compliance Requirements
      • EU AI Act Documentation Requirements
      • EU AI Act Monitoring Systems
      • EU AI Act Risk Assessment
      • EU AI Act System Classification
    • EU AI Act High Risk AI Systems
      • EU AI Act Data Governance
      • EU AI Act Human Oversight
      • EU AI Act Record Keeping
      • EU AI Act Risk Management System
      • EU AI Act Technical Documentation
FRTB

Weitere Informationen zu FRTB.

▼
    • FRTB Implementation
      • FRTB Marktpreisrisikomodelle Validierung
      • FRTB Reporting Compliance Framework
      • FRTB Risikodatenerhebung Datenqualitaet
    • FRTB Ongoing Compliance
      • FRTB Audit Unterstuetzung Dokumentation
      • FRTB Prozessoptimierung Schulungen
      • FRTB Ueberwachung Re Kalibrierung Der Modelle
    • FRTB Readiness
      • FRTB Auswahl Standard Approach Vs Internal Models
      • FRTB Gap Analyse Daten Prozesse
      • FRTB Neuausrichtung Handels Bankbuch Abgrenzung
ISO 27001

Weitere Informationen zu ISO 27001.

▼
    • ISO 27001 Internes Audit Zertifizierungsvorbereitung
    • ISO 27001 ISMS Einfuehrung Annex A Controls
    • ISO 27001 Reifegradbewertung Kontinuierliche Verbesserung
IT Grundschutz BSI

Weitere Informationen zu IT Grundschutz BSI.

▼
    • IT Grundschutz BSI BSI Standards Kompendium
    • IT Grundschutz BSI Frameworks Struktur Baustein Analyse
    • IT Grundschutz BSI Zertifizierungsbegleitung Audit Support
KRITIS

Weitere Informationen zu KRITIS.

▼
    • KRITIS Implementation
      • KRITIS Kontinuierliche Ueberwachung Incident Management
      • KRITIS Meldepflichten Behoerdenkommunikation
      • KRITIS Schutzkonzepte Physisch Digital
    • KRITIS Ongoing Compliance
      • KRITIS Prozessanpassungen Bei Neuen Bedrohungen
      • KRITIS Regelmaessige Tests Audits
      • KRITIS Schulungen Awareness Kampagnen
    • KRITIS Readiness
      • KRITIS Gap Analyse Organisation Technik
      • KRITIS Notfallkonzepte Ressourcenplanung
      • KRITIS Schwachstellenanalyse Risikobewertung
MaRisk

Weitere Informationen zu MaRisk.

▼
    • MaRisk Implementation
      • MaRisk Dokumentationsanforderungen Prozess Kontrollbeschreibungen
      • MaRisk IKS Verankerung
      • MaRisk Risikosteuerungs Tools Integration
    • MaRisk Ongoing Compliance
      • MaRisk Audit Readiness
      • MaRisk Schulungen Sensibilisierung
      • MaRisk Ueberwachung Reporting
    • MaRisk Readiness
      • MaRisk Gap Analyse
      • MaRisk Organisations Steuerungsprozesse
      • MaRisk Ressourcenkonzept Fach IT Kapazitaeten
MiFID

Weitere Informationen zu MiFID.

▼
    • MiFID Implementation
      • MiFID Anpassung Vertriebssteuerung Prozessablaeufe
      • MiFID Dokumentation IT Anbindung
      • MiFID Transparenz Berichtspflichten RTS 27 28
    • MiFID II Readiness
      • MiFID Best Execution Transaktionsueberwachung
      • MiFID Gap Analyse Roadmap
      • MiFID Produkt Anlegerschutz Zielmarkt Geeignetheitspruefung
    • MiFID Ongoing Compliance
      • MiFID Anpassung An Neue ESMA BAFIN Vorgaben
      • MiFID Fortlaufende Schulungen Monitoring
      • MiFID Regelmaessige Kontrollen Audits
NIST Cybersecurity Framework

Weitere Informationen zu NIST Cybersecurity Framework.

▼
    • NIST Cybersecurity Framework Identify Protect Detect Respond Recover
    • NIST Cybersecurity Framework Integration In Unternehmensprozesse
    • NIST Cybersecurity Framework Maturity Assessment Roadmap
NIS2

Weitere Informationen zu NIS2.

▼
    • NIS2 Readiness
      • NIS2 Compliance Roadmap
      • NIS2 Gap Analyse
      • NIS2 Implementation Strategy
      • NIS2 Risk Management Framework
      • NIS2 Scope Assessment
    • NIS2 Sector Specific Requirements
      • NIS2 Authority Communication
      • NIS2 Cross Border Cooperation
      • NIS2 Essential Entities
      • NIS2 Important Entities
      • NIS2 Reporting Requirements
    • NIS2 Security Measures
      • NIS2 Business Continuity Management
      • NIS2 Crisis Management
      • NIS2 Incident Handling
      • NIS2 Risk Analysis Systems
      • NIS2 Supply Chain Security
Privacy Program

Weitere Informationen zu Privacy Program.

▼
    • Privacy Program Drittdienstleistermanagement
      • Privacy Program Datenschutzrisiko Bewertung Externer Partner
      • Privacy Program Rezertifizierung Onboarding Prozesse
      • Privacy Program Vertraege AVV Monitoring Reporting
    • Privacy Program Privacy Controls Audit Support
      • Privacy Program Audit Readiness Pruefungsbegleitung
      • Privacy Program Datenschutzanalyse Dokumentation
      • Privacy Program Technische Organisatorische Kontrollen
    • Privacy Program Privacy Framework Setup
      • Privacy Program Datenschutzstrategie Governance
      • Privacy Program DPO Office Rollenverteilung
      • Privacy Program Richtlinien Prozesse
Regulatory Transformation Projektmanagement

Wir steuern Ihre regulatorischen Transformationsprojekte erfolgreich – von der Konzeption bis zur nachhaltigen Implementierung.

▼
    • Change Management Workshops Schulungen
    • Implementierung Neuer Vorgaben CRR KWG MaRisk BAIT IFRS Etc
    • Projekt Programmsteuerung
    • Prozessdigitalisierung Workflow Optimierung
Software Compliance

Weitere Informationen zu Software Compliance.

▼
    • Cloud Compliance Lizenzmanagement Inventarisierung Kommerziell OSS
    • Cloud Compliance Open Source Compliance Entwickler Schulungen
    • Cloud Compliance Prozessintegration Continuous Monitoring
TISAX VDA ISA

Weitere Informationen zu TISAX VDA ISA.

▼
    • TISAX VDA ISA Audit Vorbereitung Labeling
    • TISAX VDA ISA Automotive Supply Chain Compliance
    • TISAX VDA Self Assessment Gap Analyse
VS-NFD

Weitere Informationen zu VS-NFD.

▼
    • VS-NFD Implementation
      • VS-NFD Monitoring Regular Checks
      • VS-NFD Prozessintegration Schulungen
      • VS-NFD Zugangsschutz Kontrollsysteme
    • VS-NFD Ongoing Compliance
      • VS-NFD Audit Trails Protokollierung
      • VS-NFD Kontinuierliche Verbesserung
      • VS-NFD Meldepflichten Behoerdenkommunikation
    • VS-NFD Readiness
      • VS-NFD Dokumentations Sicherheitskonzept
      • VS-NFD Klassifizierung Kennzeichnung Verschlusssachen
      • VS-NFD Rollen Verantwortlichkeiten Definieren
ESG

Weitere Informationen zu ESG.

▼
    • ESG Assessment
    • ESG Audit
    • ESG CSRD
    • ESG Dashboard
    • ESG Datamanagement
    • ESG Due Diligence
    • ESG Governance
    • ESG Implementierung Ongoing ESG Compliance Schulungen Sensibilisierung Audit Readiness Kontinuierliche Verbesserung
    • ESG Kennzahlen
    • ESG KPIs Monitoring KPI Festlegung Benchmarking Datenmanagement Qualitaetssicherung
    • ESG Lieferkettengesetz
    • ESG Nachhaltigkeitsbericht
    • ESG Rating
    • ESG Rating Reporting GRI SASB CDP EU Taxonomie Kommunikation An Stakeholder Investoren
    • ESG Reporting
    • ESG Soziale Aspekte Lieferketten Lieferkettengesetz Menschenrechts Arbeitsstandards Diversity Inclusion
    • ESG Strategie
    • ESG Strategie Governance Leitbildentwicklung Stakeholder Dialog Verankerung In Unternehmenszielen
    • ESG Training
    • ESG Transformation
    • ESG Umweltmanagement Dekarbonisierung Klimaschutzprogramme Energieeffizienz CO2 Bilanzierung Scope 1 3
    • ESG Zertifizierung

Frequently Asked Questions about DORA Compliance

Who does DORA apply to?

DORA applies to virtually the entire regulated financial sector in the EU: credit institutions, insurance undertakings, reinsurers, investment firms, payment service providers, e-money institutions, crypto-asset service providers (MiCAR), central securities depositories, and central counterparties — a total of

21 categories of financial entities. Critical ICT third-party service providers (e.g., cloud providers, data centers) that provide services to these entities also fall under the EU-wide oversight framework. With the Financial Market Digitalization Act (FinmadiG), Germany has further extended the scope at the national level — companies that were previously not subject to KRITIS requirements may now also be affected. Micro-enterprises are subject to a simplified framework (Art. 16) but are not exempt.

When will DORA be audited — and how?

DORA has been mandatory since

17 January

2025 — and BaFin is already actively supervising. In December 2025, BaFin informed over 4,

500 participants in a virtual event about its expectations. Initial §

44 special audits with a DORA focus have already taken place, and in Q

3 2025 the first DORA-related fine proceedings were initiated. The Institute of Public Auditors in Germany (IDW) is finalizing the audit standard EPS 528, which defines how statutory auditors must assess DORA compliance. For the

2025 audit year, leniency applies to deficiencies remediated by year-end — from

2026 onwards, this grace period no longer applies.

What is the DORA information register?

The information register (Art. 28(3)) is a central DORA requirement: financial entities must maintain a complete register of all contractual arrangements with ICT third-party service providers and make it available to BaFin. The next submission deadline is

30 March 2026. BaFin held its own workshops on the submission process in February

2026 and clarified the technical requirements via the MVP platform. The register must include, among other things, details on the type of service, criticality, subcontractors, data storage locations, and contractual exit options. KPMG recommends low-code-based solutions for ongoing maintenance.

What is the difference between DORA and NIS2?

DORA is sector-specific for the financial sector and goes significantly beyond NIS 2 in several areas: stricter requirements for ICT risk management, mandatory Threat-Led Penetration Testing (TLPT), a detailed third-party regulatory regime with an information register, and an EU-wide oversight framework for critical ICT providers. NIS 2 applies across sectors. For financial entities, DORA takes precedence (lex specialis pursuant to Art.

4 of the NIS 2 Directive) — NIS 2 requirements apply only supplementarily to the extent not already covered by DORA. In practice, this means: financial entities must fully implement DORA; for NIS2, a gap analysis of the remaining requirements is sufficient.

What sanctions are at risk for DORA violations?

DORA and the German FinmadiG provide for a multi-tiered sanctions regime. For ICT third-party providers subject to EU oversight, periodic penalty payments of up to 1% of average daily worldwide turnover may be imposed — on a daily basis until compliance is achieved. FinmadiG defines administrative offense provisions for financial entities with fines of up to EUR

5 million. In Q

3 2025, BaFin initiated its first DORA-related proceedings — due to inadequate ICT third-party risk documentation. In addition, supervisory measures are at risk: orders, public disclosures, and in extreme cases the withdrawal of the operating license.

What does DORA compliance cost?

Costs depend heavily on the maturity of your existing ICT governance. Companies with an established ISMS (e.g., ISO 27001) and functioning BAIT/MaRisk processes have, in our experience, already covered 40–60% of DORA requirements. The additional effort then focuses on the information register, formalized incident reporting under the new RTS reporting deadlines, and enhanced resilience testing. For a reliable effort estimate, we recommend an initial readiness assessment — this produces a concrete, prioritized action plan with realistic budget planning. For companies without a BAIT/MaRisk foundation, the effort is correspondingly higher.

Why is third-party risk management the greatest challenge?

An industry survey by IT-Finanzmagazin shows: ICT third-party management ranks first among DORA challenges by a wide margin. The reason is the extreme heterogeneity of dependencies: 75% of critical outsourcing service providers originate from third countries. Financial entities must be able to justify why they use certain providers for critical functions, assess substitutability, and maintain viable exit scenarios. The European designation of critical ICT third-party providers by the ESAs is anticipated and could trigger additional requirements. The first BaFin fine related specifically to this area.

What are the RTS/ITS and why do they matter?

The European supervisory authorities (EBA, ESMA, EIOPA) have issued

13 regulatory technical standards (RTS) and

2 implementing technical standards (ITS) that specify DORA at Level 2. These standards define in detail, for example, how the ICT risk management framework must be structured, what information the third-party register must contain, how ICT incidents must be classified and reported, and what requirements apply to TLPT. The RTS/ITS are directly applicable and binding — they are not guidelines but enforceable EU law. Companies that read only the DORA regulation itself will overlook significant operational requirements.

What is TLPT and who must conduct it?

Threat-Led Penetration Testing (TLPT) under Art. 26–

27 DORA is the most demanding testing requirement: systemically important financial entities must conduct threat-led penetration tests based on the TIBER-EU framework at least every

3 years. TLPT goes far beyond conventional penetration tests — it simulates real attack scenarios based on current threat intelligence and tests people, processes, and technology. The tests must be carried out by qualified external red team providers and approved by BaFin. Transitional arrangements apply for the first TLPT wave from 2025; from 2026, an expansion of the scope of entities required to conduct TLPT is expected.

What does FinmadiG regulate?

The Financial Market Digitalization Act (FinmadiG) is the German implementing legislation that accompanies DORA at the national level. It designates BaFin as the competent supervisory authority, defines national administrative offense provisions (fines of up to EUR

5 million), extends the scope beyond the EU regulation, and aligns existing legislation (KWG, VAG, ZAG, WpIG) with DORA requirements. FinmadiG also harmonizes the interaction between DORA and the existing German supervisory frameworks BAIT, KAIT, VAIT, and ZAIT, which are expected to be absorbed into DORA over time.

Success Stories

Discover how we support companies in their digital transformation

Generative KI in der Fertigung

Bosch

KI-Prozessoptimierung für bessere Produktionseffizienz

Fallstudie
BOSCH KI-Prozessoptimierung für bessere Produktionseffizienz

Ergebnisse

Reduzierung der Implementierungszeit von AI-Anwendungen auf wenige Wochen
Verbesserung der Produktqualität durch frühzeitige Fehlererkennung
Steigerung der Effizienz in der Fertigung durch reduzierte Downtime

AI Automatisierung in der Produktion

Festo

Intelligente Vernetzung für zukunftsfähige Produktionssysteme

Fallstudie
FESTO AI Case Study

Ergebnisse

Verbesserung der Produktionsgeschwindigkeit und Flexibilität
Reduzierung der Herstellungskosten durch effizientere Ressourcennutzung
Erhöhung der Kundenzufriedenheit durch personalisierte Produkte

KI-gestützte Fertigungsoptimierung

Siemens

Smarte Fertigungslösungen für maximale Wertschöpfung

Fallstudie
Case study image for KI-gestützte Fertigungsoptimierung

Ergebnisse

Erhebliche Steigerung der Produktionsleistung
Reduzierung von Downtime und Produktionskosten
Verbesserung der Nachhaltigkeit durch effizientere Ressourcennutzung

Digitalisierung im Stahlhandel

Klöckner & Co

Digitalisierung im Stahlhandel

Fallstudie
Digitalisierung im Stahlhandel - Klöckner & Co

Ergebnisse

Über 2 Milliarden Euro Umsatz jährlich über digitale Kanäle
Ziel, bis 2022 60% des Umsatzes online zu erzielen
Verbesserung der Kundenzufriedenheit durch automatisierte Prozesse

Let's

Work Together!

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

Ready for the next step?

Schedule a strategic consultation with our experts now

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

Your strategic goals and challenges
Desired business outcomes and ROI expectations
Current compliance and risk situation
Stakeholders and decision-makers in the project

Prefer direct contact?

Direct hotline for decision-makers

Strategic inquiries via email

Detailed Project Inquiry

For complex inquiries or if you want to provide specific information in advance