European Unionregulation

Digital Operational Resilience Act

DORA transforms ICT risk management from an IT concern into a board-level legal liability for every EU financial entity and its critical technology providers.

Mapped to Microsoft controls
Effective Date17 January 2025
Enforcement BodyEuropean Supervisory Authorities (EBA, EIOPA, ESMA) and national competent authorities
Penalty FrameworkMember states define specific penalty frameworks, but DORA mandates that sanctions must be effective, proportionate, and dissuasive. Penalties include administrative fines, public censure, temporary prohibition of management functions, and orders to cease non-compliant practices. Critical ICT third-party providers can face periodic penalty payments of up to 1% of average daily worldwide turnover for each day of non-compliance, for up to six months. Financial entities face the additional risk of supervisory measures including business restrictions.

The Digital Operational Resilience Act (EU) 2022/2554 is the European Union's definitive mandate for systemic ICT risk management across the financial sector. Applicable to banks, investment firms, insurers, and their critical ICT third-party providers, DORA transforms cybersecurity from an IT concern to a board-level legal liability.

Fully enforced since January 17, 2025, DORA demands rigorous digital operational resilience testing, sub-24-hour incident reporting, and strict third-party risk management.

For financial entities reliant on Microsoft 365, we translate DORA’s resilience mandates into enforceable technical operations. From deploying Sentinel analytics for precise incident classification to engineering Purview data resilience controls, we ensure your infrastructure consistently produces the evidence expected by European Supervisory Authorities.

Why This Matters Now

As of January 2025, DORA represents a paradigm shift in financial regulation: ICT risk management is now a strictly enforced legal obligation with immense penalties for failure. Financial entities must demonstrate that their digital infrastructure—especially Microsoft 365—is resilient against operational disruptions and advanced cyber attacks. If M365 serves as your operational backbone, every Conditional Access policy, DLP rule, and automated incident response playbook is now a critical DORA compliance artifact subject to regulatory audit.

Scope & Applicability

DORA applies to virtually all EU-regulated financial entities: credit institutions, investment firms, insurance and reinsurance undertakings, payment institutions, electronic money institutions, crypto-asset service providers, central securities depositories, trade repositories, fund managers, and their critical ICT third-party service providers. Microsoft is designated as a critical ICT third-party provider. Organisations using M365 as their primary collaboration and identity platform must demonstrate that their configuration satisfies DORA's ICT risk management, incident reporting, resilience testing, and third-party risk management requirements.

Core Obligations

01
Articles 5–16

ICT Risk Management Framework

Establish and maintain a comprehensive ICT risk management framework. Identify, classify, and document all ICT-supported business functions, assets, and dependencies.

02
Articles 17–23

ICT Incident Reporting

Classify ICT-related incidents using defined criteria. Report major incidents to competent authorities within strict timelines (initial notification, intermediate report, final report).

03
Articles 24–27

Digital Operational Resilience Testing

Conduct regular testing of ICT systems including vulnerability assessments, network security reviews, and threat-led penetration testing (TLPT) for significant entities.

04
Articles 28–44

Third-Party Risk Management

Maintain a register of all ICT third-party arrangements. Assess concentration risk. Ensure contractual provisions for exit strategies, audit rights, and incident reporting.

05
Article 45

Information Sharing

Participate in threat intelligence sharing arrangements with other financial entities and competent authorities.

Microsoft 365 Control Mapping

How each obligation maps to enforceable Microsoft 365 controls and the evidence they produce.

Obligation

Article 9 - Protection and Prevention

M365 Control

Entra ID PIM eliminating standing privileges. Conditional Access with continuous access evaluation. Defender for Endpoint with attack surface reduction rules.

Evidence

PIM activation logs, CA continuous access evaluation events, ASR rule trigger reports.

Obligation

Article 10 - Detection

M365 Control

Microsoft Sentinel with financial sector-specific analytics rules. Defender XDR unified incident queue with precise severity classification. Custom detection rules for anomalous administrative activity.

Evidence

Sentinel analytics rule inventory, forensic incident detection timeline, MTTD/MTTR metrics, validated false positive rates.

Obligation

Articles 17–23 - Incident Reporting

M365 Control

Sentinel precise incident classification against DORA severity criteria. Playbooks generating initial notification drafts within 4 hours of major incident classification. Evidence chain preserved in immutable storage.

Evidence

Incident classification logs, manually-verified notification timeline reports, evidence chain integrity hashes.

Obligation

Articles 28–44 - Third-Party Risk

M365 Control

Defender for Cloud Apps discovery of all third-party SaaS usage. App governance policies blocking unsanctioned applications. Service principal inventory with permission audits.

Evidence

Cloud App discovery report, sanctioned/unsanctioned app inventory, service principal permission audit.

Implementation Timeline

September 2020
European Commission publishes DORA legislative proposal
November 2022
DORA officially adopted as Regulation (EU) 2022/2554
January 2023
DORA enters into force - 24-month implementation period begins
January 2025
DORA becomes fully applicable - all financial entities must comply
2025-2026
European Supervisory Authorities publish binding Regulatory Technical Standards (RTS)

Related Frameworks

Ready to get DORA-ready?

Start with a fixed-scope sprint. We assess your Microsoft 365 controls against DORA requirements, close gaps, and produce audit-ready evidence.