Digital Operational Resilience Act When (2026 Guide)


Your board asks a simple question: digital operational resilience act when, and are we already late? The operational answer is rarely a single date. DORA is a directly applicable EU Regulation, but your readiness depends on scope (which entities and services are captured), how fast you can operationalize controls, and whether you can evidence decisions across risk, incidents, testing, and third-party oversight.
Many compliance teams experienced this pressure most sharply in late 2024 and early 2025, when they realized that “we have policies” was not the same as “we can prove operational resilience outcomes.” You might have an incident process, but not one aligned to DORA Article 17 to DORA Article 23 timelines. You might have vendor oversight, but not a DORA-ready register of information and contract baseline under DORA Article 28 to DORA Article 44.
This article clarifies when DORA applies, what the DORA effective date means in practice, and which implementation milestones you should treat as non-negotiable. If you need a refresher on the underlying concept, start with what is digital resilience.
Table of Contents
- Digital Operational Resilience Act when it applies: the dates that matter
- Who must comply: entity scope and common boundary mistakes
- What “application” changes operationally in 2026
- Key legal milestone: entry into force versus application, and why supervisors care
- Implementation schedule by DORA pillar
- Key dependency: the register of information, identifiers, and LEI data
- Critical ICT third-party oversight in 2026: what changes beyond your contracts
- Supervisory expectations: evidence, governance, and the ESAs
- A practical 90-day schedule to stabilize your DORA program
- Frequently Asked Questions
- Key Takeaways
- Conclusion
Digital Operational Resilience Act when it applies: the dates that matter
From a legal standpoint, DORA is Regulation EU 2022/2554. As a Regulation, it is directly applicable in EU Member States, without national transposition. That is why the “when” question needs two answers: the formal applicability date, and the operational reality of supervisory expectations.
DORA has applied since January 17, 2025. This is the practical compliance deadline most executives mean when they ask for the DORA effective date. In many institutions, supervisory discussions quickly moved from “do you have a plan” to “can you demonstrate controlled execution and evidence.”
Here’s the thing: DORA is not just a one-time implementation. It creates ongoing obligations, including governance and continuous improvement expectations under DORA Article 5 and DORA Article 6, incident reporting duties under DORA Article 17 to DORA Article 23, testing under DORA Article 24 to DORA Article 27, and third-party oversight under DORA Article 28 to DORA Article 44.
If you need to align this to a clearer sequence of milestones, use digital operational resilience act timeline as a companion reference for planning discussions and internal communications.
“Effective date” versus “application date”: why the wording matters internally
Compliance teams often hear “effective date” used loosely. Operationally, the important concept is the application date, the point at which the obligations apply to in-scope financial entities. You should document the terminology your institution uses in governance reporting so you do not create ambiguity in board papers or audit artifacts.
What to do if your program started late
Late start does not automatically imply non-compliance, but it typically increases supervisory friction. You will need a defensible remediation roadmap, clear ownership, and evidence that critical gaps are being reduced in a risk-based way. Supervisors generally expect prioritization toward major ICT-related incident reporting readiness, critical or important function mapping, and third-party risk and contracting controls.
Who must comply: entity scope and common boundary mistakes
When does DORA apply? It applies to the financial entities and ICT third-party service providers in scope, as defined in Regulation EU 2022/2554. Your first task is not “implement controls.” It is to confirm scope and document it.
From an operational standpoint, scope errors usually happen in three places. First, group structures, where local entities assume group policies automatically satisfy entity-level accountability. Second, outsourced or white-labeled services, where responsibility for resilience activities becomes unclear. Third, complex ICT supply chains, where vendors provide subcontracted components that support critical services.
Think of it this way: DORA expects you to govern resilience as a business capability, not just as an IT control set. That means you should map critical or important functions, map the ICT services that support them, and map the providers and contracts that deliver those services.
For a plain-language primer you can share with non-specialists, reference what is digital operational resilience act.
Misconception: “NIS2 covers us, so DORA is mostly done”
NIS2 and DORA share themes, but they are not interchangeable. DORA is a financial-sector specific operational resilience regime with detailed requirements on governance, incident reporting formats and timelines, testing expectations, and third-party oversight. Even where you reuse controls, you still need DORA-specific evidence, mapping, and reporting outputs.
Misconception: “DORA is only for large banks”
DORA applies across multiple types of financial entities, including smaller firms, subject to proportionality. Proportionality can reduce the scale and complexity of measures, but it does not remove the core obligations. You should be prepared to justify your proportionality decisions and show how they align to your risk profile and operational dependencies.

What “application” changes operationally in 2025
Many teams treated 2024 as the year to draft policies and 2025 as the year to operationalize. In practice, supervisors may expect that operationalization started before the application date, at least for high-impact areas.
Now, when it comes to DORA after January 2025, the focus shifts to three themes: demonstrable governance, repeatable processes, and audit-ready evidence. You need to show that controls are not only designed, but executed, monitored, and improved based on incidents, test results, and third-party performance.
Consider this scenario. An insurer experiences an outage in a claims portal operated by an external SaaS provider. The business impact is immediate, but the harder part is determining whether the event qualifies as a major ICT-related incident under DORA Article 18 and whether your internal classification process supports timely reporting. If your process relies on ad hoc email threads, you may not be able to evidence decision points and escalation timing.
DORA’s compliance “unit” is the operating model. It is the combination of roles, decisions, evidence, and controls, run continuously across the five pillars. If you need a consolidated regulatory view, see digital operational resilience act.
Key legal milestone: entry into force versus application, and why supervisors care
If your internal stakeholders are still debating “when DORA started,” it is usually because three dates get mixed together: publication, entry into force, and application. This distinction matters because it affects how you explain governance decisions, procurement lead times, and control buildout in audit trails.
DORA (Regulation (EU) 2022/2554) entered into force in January 2023, and it has applied since January 17, 2025. The period between these dates was the runway regulators expected you to use to build capability, validate data, and align contracts and testing programs.
From a practical standpoint, supervisors and auditors may use this timeline as context for assessing whether your approach was reasonable, risk-based, and appropriately governed. This does not mean there is a single “correct” implementation path for every financial entity. It does mean you should be ready to explain why certain measures were prioritized, and why certain gaps could not be closed earlier, especially where dependencies on third parties, legacy systems, or group-wide operating models exist.
This content is for informational purposes only and does not constitute legal advice. Financial institutions should seek qualified regulatory counsel for institution-specific DORA compliance guidance, including how their National Competent Authority may view timeline and remediation decisions.
Implementation schedule by DORA pillar
DORA is structured around five pillars, each with ongoing requirements. The practical implementation schedule is less about “finish the project” and more about reaching a stable operating cadence. What many compliance teams overlook is that you can be strongest on policy and weakest on evidence, and supervisors will notice the mismatch.
Pillar 1: ICT risk management and governance (DORA Article 5 to DORA Article 16)
Start with governance clarity. You need defined roles and responsibilities, management body oversight, and a coherent ICT risk management framework. In practice, this means aligning your risk taxonomy, risk acceptance thresholds, control ownership, and reporting to management.
Implementation sequencing that often works: define critical services and supporting assets, align key controls to those services, then build monitoring and exception handling. You can expand from there into KRIs, scenario-based risk analysis, and change-driven risk reassessments.
Pillar 2: ICT-related incident reporting (DORA Article 17 to DORA Article 23)
The incident reporting pillar is frequently underestimated because teams confuse internal incident response with regulatory incident reporting. DORA introduces standardized expectations for classification and reporting of major ICT-related incidents, including deadlines and content requirements that may be specified further in ITS and supervisory guidance.
In practice, this means you should operationalize: severity classification logic, escalation triggers, evidence capture, and reporting pack assembly. You also need to ensure coordination between IT, Security, Operations, Legal, and Compliance for decision-making under time pressure.
Pillar 3: Digital operational resilience testing (DORA Article 24 to DORA Article 27)
Testing is not a single annual exercise. You need a risk-based testing program that includes vulnerability assessments and scenario-based testing, and may include threat-led penetration testing (TLPT) for entities designated in scope.
Plan for testing evidence, remediation tracking, and retesting. Supervisors may expect you to show how tests cover critical or important functions and how results lead to measurable risk reduction.
Pillar 4: ICT third-party risk management (DORA Article 28 to DORA Article 44)
This pillar forces discipline in vendor inventories, contract governance, and concentration risk awareness. The register of information and required contractual provisions under DORA Article 30 can become a program bottleneck because they touch Procurement, Legal, IT, and business owners simultaneously.
A realistic schedule usually starts with vendor and service inventory completeness, then criticality assessment, then contract gap remediation, then ongoing performance and exit planning.
Pillar 5: Information sharing (DORA Article 45)
DORA encourages information sharing arrangements, subject to safeguards. Operationalizing this requires legal and policy guardrails around data classification and sharing permissions. Many institutions treat this as optional, but supervisors may still ask what your approach is and how you control the risk of sharing.

Key dependency: the register of information, identifiers, and LEI data
If you ask teams what blocked their schedule, many will describe the same root cause: data quality. DORA’s third-party oversight obligations depend on having a reliable inventory of ICT services, providers, contracts, and the functions they support.
One specific friction point is entity and provider identification across systems and jurisdictions. If your firm operates across multiple EU markets, you may have inconsistent naming, missing identifiers, or duplicated vendor records across Procurement and IT. These issues make reporting and oversight brittle.
That is where structured identifiers matter. The Legal Entity Identifier can support consistency across registers and reporting artifacts. For a dedicated explanation, see lei.
In practice, this means you should implement validation and reconciliation controls for core reference data, then use those controls consistently across the register of information, incident reporting, and resilience testing scope definitions.
Critical ICT third-party oversight in 2026: what changes beyond your contracts
Most third-party programs approached DORA as a contract remediation exercise. Contractual alignment matters, but DORA’s model goes further. Under DORA Article 28 to DORA Article 44, you remain accountable for ICT Risk stemming from ICT third-party service providers, including subcontracting chains that support critical or important functions.
Here is the operational shift supervisors may probe after January 2025. They may ask whether you can demonstrate ongoing oversight of ICT third-party performance, not only whether you have a contract clause. That typically includes: (1) a complete mapping of providers and services supporting critical or important functions, (2) a credible approach to concentration risk, (3) evidence that you can execute exit strategies, and (4) governance of material changes such as migrations, subcontractor changes, or data location changes.
DORA also introduces an EU-level oversight framework for critical ICT third-party service providers, with oversight activities coordinated through the European Supervisory Authorities (EBA, ESMA, EIOPA) via the Joint Committee. Your institution does not control whether a given provider is designated as critical, but you can control whether your internal inventory, contracts, and oversight routines can absorb and respond to related supervisory requests and risk events.
From a practical standpoint, a useful internal test is this: if a supervisor asks you to produce the full list of ICT services supporting a critical or important function, and the associated providers, contracts, service locations, and exit options, can you deliver it quickly with consistent data? If the answer is “we need to reconcile spreadsheets across teams,” your bottleneck is not legal interpretation. It is operational governance and data traceability.
This content is for informational purposes only and does not constitute legal advice. Financial institutions should seek qualified legal and regulatory counsel to confirm how DORA third-party requirements apply to their specific services, outsourcing model, and supervisory context.
Supervisory expectations: evidence, governance, and the ESAs
DORA’s technical detail is supported by standards developed through the European Supervisory Authorities. You will see supervisory convergence work led through the Joint Committee of the ESAs, with the European Banking Authority (EBA), European Securities and Markets Authority (ESMA), and European Insurance and Occupational Pensions Authority (EIOPA) each playing roles for their sectors.
The reality is that supervisory attention often lands on evidence quality. You may have the right written policy, but if you cannot show approvals, periodic reviews, test outcomes, incident decision logs, and third-party oversight actions, your control environment looks theoretical.
What many compliance teams overlook is that evidence is not a document dump. It is a traceable record of decisions and execution. For example, under DORA Article 5 and DORA Article 6 governance expectations, you should be able to demonstrate management body oversight, not just committee calendars.
If you are building capability internally, training is part of resilience. Use digital operational resilience act training to structure role-based enablement for Compliance, IT Risk, Security, Procurement, and business owners.

A practical 90-day schedule to stabilize your DORA program
If your leadership is still asking “when does DORA apply,” it often signals uncertainty about readiness. A 90-day stabilization plan can help you move from policy coverage to controlled execution, even if your broader program runs longer.
This is not a substitute for a full DORA operating model, but it is a realistic sequence many institutions use to reduce immediate supervisory risk.
Days 1 to 30: confirm scope, data completeness, and governance ownership
- Document in-scope entities, critical or important functions, and key ICT dependencies.
- Baseline the register of information data set, then prioritize gaps for critical services and high-risk providers.
- Confirm management body oversight structure and decision rights for risk acceptance, incident reporting, and third-party contracting exceptions.
Days 31 to 60: operationalize incident classification and third-party controls
- Run a tabletop exercise specifically on DORA Article 18 major incident classification and escalation.
- Implement a repeatable workflow for contract gap assessment against DORA Article 30 requirements.
- Start concentration and critical provider visibility, even if the initial model is qualitative.
Days 61 to 90: create an evidence cadence that survives audits
- Define the evidence pack for each pillar, including who signs off and how often.
- Schedule testing and remediation tracking for critical services, then report progress to senior management.
- Perform a targeted internal audit style review of evidence traceability, focusing on where decisions are made under pressure.
In many institutions, tooling becomes necessary once you want consistent evidence and traceability across teams. Dorapp is one example of a dedicated DORA compliance platform designed to manage DORA workflows in a structured and auditable way, including modules for the register of information (ROI) and third-party risk management (TPRM), with additional modules on the published roadmap. If you want to explore that approach, you can review the platform entry points on DORApp Functions or consult the DORApp Help Center.
Key Takeaways
- DORA has applied since January 17, 2025. Operational readiness depends on evidence, execution, and scope clarity, not only policy coverage.
- The “digital operational resilience act when” question should trigger a scope confirmation and an operating model assessment across all five pillars.
- Incident reporting and third-party oversight typically create the most immediate supervisory pressure due to timelines, data quality, and cross-functional coordination.
- Data quality in the register of information, including consistent legal entity identification, is a common blocker for sustainable compliance operations.
- A 90-day stabilization plan should prioritize scope, incident classification, third-party contracting controls, and evidence cadence.
Conclusion
Digital Operational Resilience Act when questions usually surface when leadership wants certainty about your compliance position. The formal answer is clear: DORA has applied since January 17, 2025. The operational answer is harder: you need a repeatable operating model that produces consistent evidence across governance, incident reporting, resilience testing, and ICT third-party risk management.
If you are still closing foundational gaps, focus on scope and data quality first, then stabilize incident classification and third-party controls, then mature your testing and continuous improvement cadence. This sequencing is often easier to defend to supervisors because it ties remediation to business-critical services and measurable execution.
If you want to see how a DORA-focused platform can support these workflows, you can explore Dorapp at DORApp Modules or request a consultative walkthrough via Book a Demo. Treat tooling as an enabler for governance discipline and evidence quality, not as a shortcut. Over time, that mindset is what moves programs from compliance to resilience maturity.
Regulatory Disclaimer: This article is provided for informational and educational purposes only. It does not constitute legal advice and should not be relied upon as a substitute for qualified legal or regulatory counsel. DORA compliance obligations vary depending on the nature, scale, and risk profile of each financial entity. Always consult with a qualified legal advisor or compliance professional regarding your specific obligations under the Digital Operational Resilience Act and applicable Regulatory Technical Standards. DORA interpretation and supervisory expectations may evolve as the European Supervisory Authorities publish additional guidance, including through the Joint Committee of the ESAs, the EBA, ESMA, and EIOPA. This content reflects information available at the time of publication and should be verified against current ESA publications and the expectations of your National Competent Authority. DORA applies to EU-regulated financial entities as defined under Regulation EU 2022/2554.
Frequently Asked Questions
Digital operational resilience act when did it start applying in practice?
DORA has applied since January 17, 2025, which is the key date most teams refer to as the DORA effective date. In practice, supervisors often assess not only whether you have documented policies, but whether you can evidence operational execution across the five pillars. If your institution is still maturing, you may need a risk-based remediation plan showing prioritized controls for critical or important functions, major incident reporting readiness, and third-party oversight. Your National Competent Authority’s expectations may shape how quickly you need to close specific gaps.
When was DORA introduced, and why do people cite 2022, 2023, and 2025?
DORA is Regulation (EU) 2022/2554, which is why 2022 is commonly referenced. It entered into force in January 2023, and it has applied since January 17, 2025. Teams cite different years depending on whether they mean the regulation identifier, the legal start of the regulation, or the date obligations began to apply to in-scope financial entities.
Who does the Digital Operational Resilience Act apply to?
DORA applies to a defined list of EU-regulated financial entities (set out in DORA Article 2) and also establishes requirements related to ICT third-party service providers that support those entities. The exact perimeter for your institution typically depends on your regulated permissions, the legal entity structure of your group, and the critical or important functions you deliver, subject to supervisory interpretation by your National Competent Authority.
When does DORA apply to group structures and subsidiaries?
DORA applies to in-scope financial entities, and group structures do not remove entity accountability. Many groups use centralized frameworks, but you still need to show how each regulated entity meets DORA governance and operational requirements, including evidence of local oversight and execution. This becomes especially important for ICT third-party arrangements shared across entities. You should document which activities are centralized, how segregation of duties is maintained, and how each entity can produce its own evidence pack for supervisory reviews.
Is the DORA effective date the same as the date the regulation was adopted?
No. Regulation EU 2022/2554 was adopted earlier, but the key compliance milestone for most institutions is the application date, January 17, 2025. Internally, it helps to standardize language so governance reporting does not mix “adoption,” “entry into force,” and “application.” If you are aligning program milestones and communications, a structured planning view like the digital operational resilience act timeline can help reduce confusion across stakeholders.
What are the 5 pillars of the Digital Operational Resilience Act?
DORA is commonly described through five pillars: ICT risk management and governance, ICT-related incident management and reporting, digital operational resilience testing, ICT third-party risk management, and information sharing. The underlying legal requirements sit across DORA’s chapters and articles, and the technical detail is supplemented through Regulatory Technical Standards and Implementing Technical Standards developed by the European Supervisory Authorities.
What is the first operational capability supervisors tend to test after January 2025?
In many cases, supervisors focus early on evidence that your operating model works under pressure. Major ICT-related incident classification and escalation are common stress points because DORA Article 17 to DORA Article 23 introduces regulatory reporting expectations that go beyond internal incident response. ICT third-party visibility and contract governance also draw attention because institutions frequently discover incomplete inventories or inconsistent contract baselines. Your best preparation is to run targeted exercises, validate data completeness, and document decision logic and sign-offs.
How does DORA incident reporting change compared to a normal SOC process?
A SOC process is typically designed for technical containment and recovery. DORA requires you to also manage regulatory classification, reporting decision points, and timed communications to supervisory authorities for major incidents, subject to applicable ITS and guidance. This brings Compliance and Legal into time-critical workflows, not only IT and Security. You should define who makes the “major incident” determination, what evidence is required, and how you ensure coverage outside business hours. Testing these steps is often more valuable than rewriting the policy.
When does TLPT apply under DORA, and should we schedule it immediately?
Threat-led penetration testing under DORA Article 26 is not automatically required for every entity. It applies to certain financial entities, typically subject to criteria and supervisory direction. Even if TLPT is not immediately required, you still need a broader testing program under DORA Article 24 to DORA Article 27. Many institutions start by strengthening vulnerability management, scenario tests, and remediation tracking for critical services, then prepare for TLPT if and when they are designated in scope by their supervisor.
Why does the register of information become a bottleneck for DORA timelines?
The register of information depends on accurate, complete data across providers, services, contracts, and internal function mappings. Institutions often discover fragmented vendor records across Procurement, IT, and business units, plus inconsistent identifiers. These issues slow down concentration analysis, contract gap remediation, and reporting consistency. Using standardized legal entity identifiers can help reduce duplication and ambiguity, particularly for cross-border groups. For context, see lei and how it supports reference data consistency.
How should we train staff on DORA deadlines and responsibilities?
DORA training should be role-based. Compliance needs classification and reporting logic, IT and Security need operational procedures and evidence capture, Procurement and Legal need contract baseline requirements under DORA Article 30, and senior management needs oversight responsibilities and decision cadence. You should also train on realistic scenarios, such as third-party outages or ransomware events, because that is where handoffs fail. A structured overview like digital operational resilience act training can help you build a defensible training plan aligned to your operating model.
Does using a dedicated DORA platform change our compliance obligations?
No. Tools do not change your legal obligations, and supervisors will still expect governance accountability and well-justified decisions. What tools can do is improve consistency, traceability, and evidence quality across recurring workflows. For example, DORApp is a modular platform covering DORA pillars such as the register of information (ROI) and third-party risk management (TPRM), with workflow controls and audit trails described in its documentation. You should evaluate any tooling based on your ability to run repeatable processes and produce regulator-ready records.
What documentation should we be ready to provide during a DORA supervisory review?
Supervisory requests vary, but they often focus on: governance and oversight evidence, your ICT risk management framework, incident classification and reporting artifacts, testing plans and remediation tracking, and third-party inventories and contract controls. You should assume reviewers will test traceability, not only existence. That means you should be able to show who approved what, when, based on which inputs, and what changed after incidents or tests. A good internal benchmark is whether an independent reviewer can reconstruct key decisions without relying on oral explanations.
About the Author
Matevž Rostaher is Co-Founder and Product Owner of DORApp. He brings deep experience in building secure and compliant ICT solutions for the financial sector and is positioned by DORApp as an expert trusted by financial institutions on complex regulatory and operational challenges. DORApp’s own webinar materials list him as CEO and Co-Founder of Skupina Novum d.o.o. and CEO and Co-Founder of FJA OdaTeam d.o.o. His articles should carry the voice of someone who understands not just compliance requirements, but the systems and delivery realities behind them.