Compliance · DORA
Private Beta · BuildingDORA has been applicable since 17 January 2025. ICT risk-management framework documentation, major-incident reports filed within 4 / 72 / 30-day windows, threat-led penetration tests, and a third-party register that survives vendor exit — all anchored to a public ledger so EBA, ESMA, EIOPA, or your national competent authority can verify the timeline of every claim.
What it is
DORA (Regulation 2022/2554) harmonises ICT risk management across the EU financial sector. Before DORA, ICT resilience was governed by a patchwork of EBA, ESMA, and EIOPA guidelines layered on top of national supervisory practice. DORA replaces that patchwork with a single, directly applicable regulation.
The regulation organises ICT operational resilience into five pillars: risk management, incident reporting, resilience testing, third-party risk, and information sharing. Penalties for non-compliance reach 2% of annual worldwide turnover for entities (€1M for individuals).
Critical ICT third-party providers (designated by the European Supervisory Authorities) come under direct EU oversight — a first in EU financial regulation. Cloud hyperscalers, core-banking SaaS, and trade-execution systems are all candidates.
Five pillars · how Arkova maps to each
Requirement
Comprehensive ICT risk-management framework covering identification, protection, detection, response, recovery, and learning. Annual review by management body. Documented risk-tolerance levels and digital operational resilience strategy.
Arkova
Anchored ICT risk register with versioned receipts. Annual management-body reviews are timestamped to a public ledger so an EBA/ESMA examiner can verify the review actually happened on the date claimed.
Requirement
Single, harmonized process for classifying, managing, and reporting ICT incidents. Major incidents must be reported to the competent authority within strict timelines (initial within 4 hours, intermediate within 72 hours, final within 1 month).
Arkova
Append-only incident log with cryptographic timestamps. Each report-to-authority milestone is anchored — disputes about timing become objectively verifiable.
Requirement
Annual testing program for ICT systems. Significant entities must conduct threat-led penetration testing (TLPT) every 3 years using TIBER-EU framework. Test results, remediation actions, and lessons learned must be documented.
Arkova
TLPT scope, methodology, findings, and remediation evidence anchored. Three-year cycle reconstructable on demand without trusting your testing-vendor archive.
Requirement
Comprehensive register of all ICT third-party arrangements. Pre-contractual due diligence. Mandatory contractual provisions. Ongoing monitoring. Concentration-risk assessment. Critical ICT TPPs come under direct EU oversight.
Arkova
Third-party register with anchored due-diligence packets per vendor. Contract versions, audit reports, and exit-plan rehearsals all on-ledger. Survives the third party itself going under.
Requirement
Voluntary cyber-threat information sharing among financial entities. Trusted communities. Anonymization where appropriate. Compatible with GDPR and competition law.
Arkova
Information-sharing attestations cryptographically signed. Counterparties can verify the integrity of shared threat indicators without trusting a centralized intermediary.
Implementation timeline
DORA finalised after trilogue. Two-year implementation runway begins.
Regulation 2022/2554 published in the Official Journal.
DORA becomes binding on ~20 categories of EU financial entities. Penalties up to 2% of annual worldwide turnover (or €1M for individuals) for non-compliance.
Final batches of Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) under finalisation. First incident-reporting cycles. Initial competent-authority examinations.
Significant entities complete first three-year threat-led penetration testing cycle under TIBER-EU framework.
Who's in scope
DORA applies to substantially every regulated financial entity operating in the EU. The scope is broader than any prior single ICT-resilience regulation:
Microenterprises (≤10 employees, ≤€2M turnover or balance sheet) face proportionate requirements — not the full regime. Significance criteria for TLPT requirements are set in the relevant RTS.
What a DORA examiner asks for
If you're a financial entity preparing for a DORA examination and want ICT-resilience evidence with verifiable timestamps, we'd like to discuss an early-access pilot.
Arkova is in private beta. Features described on this page are being built and refined with pilot customers right now. Some controls and integrations are live today; others are in active development. Talk to us about the parts most relevant to your workload.
Request Early AccessOr read The State of Compliance in 2026 for the broader regulatory picture.