Back to Sia Partners A Sia product
Sia RegAI  /  Frameworks  /  DORA
Framework · Banking & financial entities

DORA — the Digital Operational Resilience Act, decoded.

Regulation (EU) 2022/2554. In force from 17 January 2025 across the 27 EU member states. Applies to ~22,000 financial entities — banks, insurers, investment firms, crypto-asset service providers, central counterparties, trade repositories — plus the ICT third-party providers that serve them.

Who's in scope

Twenty financial-entity categories listed in Article 2(1), from credit institutions to electronic-money institutions to alternative investment fund managers. The Article 4 proportionality principle means the requirements apply, but how rigorously is calibrated to the entity's size, risk profile, and systemic relevance. Microenterprises get a lighter regime under Article 16.

Critical ICT third-party service providers — designated by the European Supervisory Authorities under Article 31 — fall under direct EU oversight. The first list of CTPPs is expected mid-2026; once designated, a CTPP can be examined, fined, or required to amend contract terms by a lead overseer (ECB, EBA, EIOPA, or ESMA depending on the financial sector).

The five pillars

DORA is structured as five interlocking workstreams:

  1. ICT risk management — Articles 5-16. A single integrated ICT risk-management framework, board-approved, reviewed at least annually. Identification, protection, detection, response and recovery, learning. Builds on but goes deeper than EBA Guidelines on ICT and security risk management.
  2. ICT-related incident reporting — Articles 17-23. Classification by criteria in Commission Delegated Regulation (EU) 2024/1772; major-incident reporting to the competent authority on a three-stage timeline (initial, intermediate, final). Significant cyber threats reported on a voluntary basis.
  3. Digital operational resilience testing — Articles 24-27. Annual basic testing of all ICT systems supporting critical or important functions. Threat-led penetration testing (TLPT), aligned with the TIBER-EU framework, every three years for entities meeting Article 26(8) thresholds.
  4. ICT third-party risk — Articles 28-44. Strategy, register of information, contractual provisions (Article 30), exit strategies, concentration-risk monitoring. Direct oversight of CTPPs.
  5. Information sharing — Article 45. Voluntary cyber-threat intelligence sharing among financial entities, governed by data-protection and confidentiality safeguards.

The RTS / ITS landscape

The level-1 regulation is supplemented by a dense layer of RTS, ITS, and Joint Guidelines from the ESAs. The ones most projects spend time on:

Most failed first-pass audits trace back to the register-of-information template — the field-level mapping between contracts and the ITS schema is where teams discover the policy library doesn't actually have the required information in a structured form.

The DORA gap analysis, compressed

The traditional approach — line-by-line policy review against each DORA article and RTS — runs eight to fourteen weeks for a Tier-1 bank or large insurer. Sia RegAI compresses that into days with a six-phase pipeline:

  1. Scope & entity classification — proportionality bracket, scoped functions, applicable RTS/ITS.
  2. Obligation extraction — every Article and Recital parsed into atomic, citable obligations.
  3. Applicability triage — obligations filtered by the entity's scope, materiality, and existing scope of authorisation.
  4. Gap analysis — semantic mapping of every applicable obligation to the existing policy library.
  5. Control drafting — AI-drafted control language, in your tone of voice, for every gap.
  6. Evidence pack — audit-ready bundle: obligation, mapped clause, control, evidence, and citation graph.

Common findings (from real engagements)

Where Sia RegAI fits

Sia RegAI ingests the level-1 regulation, every RTS / ITS / Joint Guideline, and any national-competent-authority guidance you point it at. It produces a single, navigable obligation tree with paragraph-level traceback. From there it maps to your policy library, scores gaps, drafts controls, and assembles the evidence pack — every output carrying its citation graph so internal audit can defend it.

Related guides

Industry pages

See the DORA gap analysis on your own policy library.

A 45-minute walkthrough on a regulation and policy of your choosing. We bring the platform; you keep the output.