bafin digital operational resilience (2026 guide)


For Germany-supervised financial entities, the Digital Operational Resilience Act (DORA) is not a theoretical EU regulation. It becomes a day-to-day supervisory topic because your competent authority will expect a defensible operating model, complete evidence, and consistent reporting quality across ICT risk, incidents, and ICT third-party oversight. If you are aligning DORA delivery for a German entity or a group with German operations, it helps to separate what DORA mandates at EU level from how Germany’s supervisor, the Federal Financial Supervisory Authority (BaFin), may scrutinize your implementation in practice. This article explains the most important DORA obligations that typically matter most in German examinations, and how to evaluate whether your workflows and tooling are audit-ready. For background definitions, see what is digital resilience.
Contents
BaFin and DORA in Germany: what to focus on
DORA is directly applicable EU law and has applied from 17 January 2025. It sets harmonized requirements for ICT risk management, ICT-related incident reporting, digital operational resilience testing, ICT third-party risk management, and voluntary information sharing (the five “pillars”). In Germany, BaFin acts as the competent authority for many supervised financial entities, and will typically assess whether your DORA program is more than policy text.
From an execution perspective, German supervisory scrutiny often becomes evidence scrutiny: Can you show who approved what, when it was reviewed, which controls exist and how you tested them, and how third-party dependencies map to critical or important functions? DORA explicitly pushes financial entities toward demonstrable control effectiveness and governance (for example, via DORA Article 5 on governance and DORA Article 6 on the ICT risk management framework).
If your program is still “documents in folders plus spreadsheets,” your main risk is not only missing requirements. It is being unable to prove completeness, traceability, and repeatability across cycles. That is why many institutions treat the digital operational resilience act as an operating model change, not only a compliance project.
Where BaFin scrutiny typically concentrates
BaFin’s supervisory approach may vary by sector and entity type, but German examinations commonly press on a few practical questions that align closely with DORA’s intent:
The practical implication is that DORA delivery in Germany can become a data and workflow problem: consistent records, approvals, and exports, not only policies.

What DORA requires (with article references)
This section is not a substitute for legal interpretation, but it summarizes core obligations that typically drive BaFin-facing workstreams.
1) Governance and accountability
DORA Article 5 places responsibility on the management body for defining, approving, overseeing, and being accountable for the ICT risk management framework. In practice, you should expect to evidence:
2) The ICT risk management framework
DORA Article 6 requires a sound, comprehensive, and well-documented ICT risk management framework, supported by further requirements across DORA Articles 7 to 15 (for example, protection and prevention, detection, response and recovery, backup, and learning and evolving).
BaFin-facing evidence questions tend to include whether the framework is actually run as a lifecycle process: risk identification, assessment, treatment, control monitoring, and continuous improvement.
3) ICT-related incident management and reporting
DORA Articles 17 to 23 require financial entities to manage ICT-related incidents and report major ICT-related incidents to competent authorities. The detailed criteria and timelines are set out in the applicable RTS/ITS on incident classification and reporting, and financial entities should verify their implementation against the current published standards.
From a supervisory standpoint, the weak points are often consistent classification, internal escalation decisions, and complete reporting data. This is where traceable workflow records matter.
4) Digital operational resilience testing
DORA Articles 24 to 27 establish testing obligations, including a risk-based testing program and, for in-scope entities, threat-led penetration testing (TLPT). Even where TLPT is not mandatory, supervisors may expect testing to be driven by material risks and critical services, not only generic checklists.
5) ICT third-party risk management and the Register of Information
DORA Chapter V requires a structured approach to ICT third-party risk management, including pre-contract due diligence, contractual provisions, monitoring, and exit strategies. For many German financial entities, the operational burden concentrates around the Register of Information required by the relevant Implementing Technical Standards.
If you need a focused read on the data side, see dora register of information. For German-language context, many teams also align terminology across internal documents using resources such as digital operational resilience act deutsch and dora digital operational resilience act deutsch, while keeping the binding requirements anchored to the official EU texts.
Documentation expectations in Germany: how to structure evidence under DORA
Here’s the thing: DORA is full of explicit or implicit documentation duties. BaFin has also published non-binding material to help supervised entities navigate documentation expectations, including summaries of where documentation is required across DORA and Level 2 standards. Even when a document is not explicitly named in a single DORA article, supervisors typically still expect you to demonstrate that your processes are designed, approved, run, reviewed, and improved in a controlled way.
From a practical standpoint, you can treat DORA documentation as a controlled “evidence chain” across five areas, mapped to Chapter II (ICT Risk Management), Chapter III (Incident reporting), Chapter IV (Testing), and Chapter V (ICT third-party risk):
This content is for informational purposes only and does not constitute legal advice. Documentation expectations may vary by financial entity type, proportionality, and supervisory practice, and you should confirm your institution-specific approach with qualified legal or regulatory counsel.
Simplified ICT Risk Management Framework: when proportionality may apply
DORA is built with proportionality in mind. Under DORA Article 16, certain financial entities may be permitted to apply a simplified ICT Risk Management Framework, subject to conditions in the regulation and how competent authorities supervise proportionality in practice. If you operate in Germany, it is sensible to assume BaFin will still expect clarity on scope, rationale, and control effectiveness, even where a simplified approach is permitted.
Consider this: “simplified” typically does not mean “undocumented” or “light-touch.” It usually means your framework can be less complex in design and operation, provided it remains sound, comprehensive, and demonstrably effective for your risk profile. In supervisory conversations, the deciding factor is often whether you can explain why the simplification is appropriate and how you still meet the intent of the control outcomes in DORA Articles 6 to 15.
In most implementations, a defensible proportionality position includes:
This content is for informational purposes only and does not constitute legal advice. Proportionality, including eligibility for a simplified ICT Risk Management Framework, may depend on entity type and supervisory interpretation. Consult qualified legal or regulatory counsel for institution-specific guidance.

Oversight of critical ICT third-party service providers: what changes for financial entities
Many compliance teams focus on Chapter V as “contracts and the Register of Information.” What the regulation actually requires is broader: DORA also establishes an EU-level oversight framework for critical ICT third-party service providers, led by the European Supervisory Authorities (EBA, EIOPA, and ESMA) through their Joint Committee. This oversight is primarily directed at the providers, but it has practical implications for financial entities, especially those with material reliance on large cloud or infrastructure providers.
Now, when it comes to BaFin-facing execution, there are three practical angles to get right:
The operational takeaway is that third-party oversight under DORA is not only a procurement control. It is a continuous resilience control that ties together Chapter II (ICT Risk Management Framework), Chapter IV (Testing), and Chapter V (third-party risk). That connective tissue is exactly what supervisors often test.
This content is for informational purposes only and does not constitute legal advice. The oversight regime for critical ICT third-party service providers and its implications for financial entities can be fact-specific and subject to supervisory practice. Consult qualified legal or regulatory counsel where needed.
What “audit-ready” looks like in practice
For Germany-based supervisory interactions, “audit-ready” often means you can produce consistent answers quickly, with verifiable lineage from source records to reports. In most institutions, that comes down to five evidence layers:
If you cannot demonstrate these layers, your program may still be compliant on paper, but it could be fragile under supervisory challenge. DORA’s logic is that resilience should be continuously governed and continuously evidenced, not reconstructed during an examination.
How to evaluate tooling for BaFin-facing DORA execution
Many German financial entities ask whether they should extend an existing enterprise GRC stack, build internal workflows, or use a DORA-focused platform. The right answer depends on your maturity, group complexity, and how much of DORA you need to operationalize within a single year-round operating model.
When evaluating tooling for bafin digital operational resilience readiness, the following criteria are usually practical and defensible:
1) Regulatory alignment depth (DORA plus RTS/ITS practicality)
2) Workflow control and approvals (governance evidence)
3) Third-party risk operations at scale
4) Reporting and repeatability
5) Implementation realism
As a cross-check on definitions and scope, many teams use references like what is digital operational resilience act to confirm that their tooling evaluation covers the full DORA intent, not only cybersecurity controls.

Where Dorapp can fit (verified modules only)
Dorapp positions DORApp as a cloud-based platform to support financial entities with structured, auditable DORA processes. Based on the currently available verified information, the platform is modular and includes:
For German DORA programs, the most immediately relevant verified capabilities are typically on the data and execution side:
If you are evaluating whether a DORA-focused platform could reduce manual burden while improving evidence quality for BaFin-facing interactions, a practical next step is to review the modules and request a walkthrough aligned to your operating model.
Explore DORApp Modules, or Book a Demo to see how ROI and third-party workflows can be structured for audit-ready reporting. You can also start with a sandbox approach via the Free Trial – 14 Days, depending on your internal procurement policies.
Strengths and Challenges
Strengths
Implementation Considerations
Frequently Asked Questions
Does BaFin enforce DORA directly, or is it purely EU-level supervision?
DORA is an EU regulation and applies directly, but day-to-day supervision for many financial entities is performed by the national competent authority. In Germany, BaFin typically assesses whether your DORA obligations are implemented and evidenced. Exactly how BaFin reviews DORA controls may vary by sector, entity type, and supervisory cycle, and may evolve as the European Supervisory Authorities publish further guidance.
What does “bafin digital operational resilience” mean in practical terms?
In practice it usually means being able to demonstrate operational resilience outcomes under DORA in a way that stands up to German supervisory review. That often includes evidence of governance decisions, complete inventories of ICT services and ICT third-party service providers (ICT TPPs), repeatable reporting, and traceable incident handling. It is less about one-time documentation and more about continuous control execution.
Which DORA articles should German compliance teams prioritize first?
Many institutions start with governance and the ICT risk framework (DORA Articles 5 and 6) because they set the operating model for everything else. Third-party risk management and the Register of Information under DORA Chapter V also tend to be high-effort and high-visibility. Incident reporting (DORA Articles 17 to 23) and testing (DORA Articles 24 to 27) are often run in parallel because they require coordination across IT, security, risk, and compliance.
Is the Register of Information only a reporting deliverable?
Not really. While the Register of Information must be produced in a structured format defined by the Implementing Technical Standards, supervisors often treat it as evidence that you understand your ICT dependency chain. If your register is incomplete or inconsistent, it can undermine your claims about critical or important functions, concentration risk, and exit feasibility. Maintaining it as a living dataset is typically safer than treating it as an annual filing.
How should we handle incident classification thresholds under DORA in Germany?
Classification and reporting of major ICT-related incidents are defined in the applicable RTS/ITS on incident reporting, including materiality criteria and timelines. You should implement a documented classification approach, decision logs, and escalation paths that align with those standards, then test it with realistic scenarios. Because supervisory expectations can evolve, it is prudent to confirm your approach with qualified legal counsel and your internal audit function.
Does DORA replace German outsourcing expectations?
DORA harmonizes many ICT risk and third-party requirements at EU level, but it does not automatically remove the need to consider other applicable legal and supervisory obligations. In most cases, you will still need to align DORA controls with existing German requirements and internal governance. The practical approach is usually mapping: identify overlaps, resolve conflicts, and define which policy is authoritative for each control area.
What evidence is most persuasive in a BaFin-facing review?
Supervisory reviews often value evidence that is traceable and repeatable: approvals, meeting minutes or decisions, audit trails, control testing results, remediation tracking, and consistent inventories linking critical functions to ICT services and providers. Evidence quality matters as much as document quantity. Workflows that enforce review gates and record decision rationale can reduce the risk of “missing context” during an examination.
What should we look for in a DORA platform for German operations?
Prioritize DORA-aligned data structures (especially for the Register of Information), workflow controls (review gates, sign-offs), audit trail quality, and reporting outputs that can be reproduced across cycles. Third-party risk operations should support recurring assessments and cross-functional review. If incident reporting tooling is not available, confirm how the platform integrates with or coexists alongside your incident management process.
How does Dorapp support DORA execution (based on verified information)?
Verified information indicates Dorapp provides modular capabilities including DORApp ROI for the Register of Information and DORApp TPRM for third-party risk management and questionnaire automation, supported by an Execution Governance Engine with review gates and sign-offs and an audit trail. The documentation also describes automatic LEI enrichment and configurable reports and analytics. Incident management and reporting is described as planned on the roadmap, so you should confirm timelines and fit in a demo.
Should we use a general GRC platform or a DORA-specific tool?
It depends on your current landscape and delivery constraints. If you already operate an enterprise GRC stack with strong workflow and reporting, extending it may be efficient. If DORA delivery is slowed by heavy customization, unclear data ownership, or lack of DORA-specific exports, a dedicated DORA platform may reduce operational friction. A structured proof-of-concept focusing on ROI and ICT TPP workflows is often the most reliable way to decide.
What are the five pillars of DORA, and how do they show up in BaFin examinations?
DORA’s five pillars are ICT risk management, ICT-related incident reporting, digital operational resilience testing, ICT third-party risk management, and voluntary information sharing. In BaFin examinations, these pillars often translate into practical evidence checks: a working ICT Risk Management Framework under DORA Articles 6 to 15, disciplined incident classification and reporting under DORA Articles 17 to 23, a risk-based testing program under DORA Articles 24 to 27, and complete third-party inventories and controls under DORA Chapter V, including the Register of Information.
What is a “simplified ICT Risk Management Framework” under DORA Article 16?
Under DORA Article 16, certain financial entities may be permitted to apply a simplified ICT Risk Management Framework, subject to the conditions set out in the regulation and supervisory practice. In most cases, you still need to document eligibility rationale, map DORA requirements to your controls, and evidence ongoing operation. Because proportionality can be fact-specific, it is prudent to confirm your approach with qualified legal or regulatory counsel.
Do German entities need to track ESA guidance as well as BaFin communications?
Yes, typically. The European Supervisory Authorities (EBA, EIOPA, and ESMA), through the Joint Committee, develop DORA Regulatory Technical Standards and Implementing Technical Standards, and may publish guidance that supports consistent application. BaFin may also publish non-binding guidance material for German supervised entities. Your compliance approach should usually be anchored to Regulation (EU) 2022/2554 and the applicable RTS/ITS, then operationalized in a way that withstands local supervisory review.
What documentation is most commonly requested for DORA readiness in Germany?
Requests vary by entity type and examination scope, but common themes include management body approvals and reporting under DORA Article 5, documentation of the ICT Risk Management Framework under DORA Article 6 and related policies and procedures under Articles 7 to 15, incident classification and reporting procedures under Articles 17 to 23, testing plans and results under Articles 24 to 27, and third-party due diligence, contractual mapping, monitoring, exit planning, and Register of Information outputs under Chapter V and the applicable ITS.
Key Takeaways
Conclusion
DORA compliance for German financial entities is increasingly judged by whether you can consistently run and evidence resilience processes, not only whether you have written policies. If you are aligning your DORA program for BaFin-facing supervision, focus on governance traceability (DORA Article 5), operational ICT risk execution (DORA Article 6 and related articles), and high-integrity third-party and Register of Information data under DORA Chapter V. If your current approach relies heavily on manual consolidation, you may want to test whether a DORA-focused operating model and tooling can improve repeatability and evidence quality. To evaluate this pragmatically, Book a Demo and walk through your ROI and ICT third-party workflows end to end, including approvals, audit trail, and reporting outputs.
Disclaimer: This article is intended for informational purposes only and does not constitute legal advice. DORA compliance obligations vary depending on the classification and size of your financial institution. Consult qualified legal or regulatory counsel to assess your specific obligations under the Digital Operational Resilience Act and applicable regulatory technical standards.
About the Author
Matevž Rostaher is Co-Founder and Product Owner of DORApp. He brings deep experience in building secure and compliant ICT solutions for the financial sector and is positioned by DORApp as an expert trusted by financial institutions on complex regulatory and operational challenges. DORApp’s own webinar materials list him as CEO and Co-Founder of Skupina Novum d.o.o. and CEO and Co-Founder of FJA OdaTeam d.o.o. His articles should carry the voice of someone who understands not just compliance requirements, but the systems and delivery realities behind them.