How DORA-compliant
are you, pillar by pillar?
Twenty questions across DORA's five pillars — ICT risk management, incident reporting, operational-resilience testing, third-party risk, information sharing. Pick a status for each; live overall score + per-pillar bands + the top five gaps to close. Effective 17 January 2025.
ICT Risk Management
Critical gap · 0Governance, asset register, BIA, BCP, awareness
DORA Article 5 — management body owns ICT risk; framework reviewed at least annually.
DORA Article 8 — comprehensive register of all ICT assets supporting business functions, classified by criticality.
DORA Article 11 — BIA documented and updated at material change.
DORA Articles 11–12 — BCP, ICT response and recovery plans, recovery-time objectives, recovery-point objectives.
DORA Article 13 — staff training on ICT operational risk and cybersecurity.
Incident Reporting
Critical gap · 0Classification, 4h/72h/1mo timelines, threat reporting
DORA Article 18 + RTS — classify by clients affected, data losses, duration, geographic spread, economic impact.
DORA Article 19 — initial notification within 4 hours of classification, intermediate within 72 hours, final within 1 month.
DORA Article 19(2) — voluntary reporting of significant cyber-threats with the same timelines.
DORA Article 19(3) — clients informed of impact and remediation steps.
Operational Resilience Testing
Critical gap · 0Vulnerability scans, pen tests, TLPT, remediation
DORA Article 24 — comprehensive programme based on risk profile.
DORA Article 25 — scope must include external interfaces and ICT systems supporting critical functions.
DORA Article 26 + RTS on TLPT — every 3 years if in scope.
DORA Article 24(6) — remediation effectively addressed.
Third-Party Risk Management
Critical gap · 0Register, DD, contract clauses, concentration, sub-outsourcing
DORA Article 28(3) — structured, continuously updated; submitted to NCA on request.
DORA Article 28(2) — risk-based assessment before contracting.
DORA Article 30 — service descriptions, data protection, audit rights, exit strategies, security incident reporting.
DORA Article 28(8) — concentration-risk identification; documented exit strategy.
DORA Article 30(2)(a) — sub-contracting locations and sub-outsourcer access controls.
Information Sharing
Critical gap · 0Voluntary cyber threat-intel arrangements
DORA Article 45 — voluntary; document the choice + rationale.
DORA Article 45(2) — limited to threat indicators, anonymised where necessary.
Dataset version 2026-05-06. No data is sent or stored. Computation runs locally.
Ordered by combined pillar weight + status weakness. Closing these in this order produces the largest score uplift per hour of remediation effort.
- Board-approved ICT risk management framework documented and reviewed annually · Article 5–6
- ICT asset inventory complete and maintained · Article 8
- Business-impact analysis identifies all critical / important functions · Article 11
- ICT incident classification matrix in place per RTS criteria · Article 18
- Incident-reporting workflow can hit 4-hour initial / 72-hour intermediate / 1-month final timelines · Article 19
- Significant cyber-threat reporting tested at least once · Article 19(2)
- Annual digital operational-resilience testing programme documented · Article 24
- Vulnerability scans + penetration tests executed in last 12 months · Article 25
- Threat-Led Penetration Testing (TLPT) — required for "significant" entities · Article 26
- Register of information for ICT third-party arrangements complete · Article 28
- Pre-engagement due diligence on ICT third-parties supporting critical / important functions · Article 28(2)
- Mandatory contract clauses present (Article 30(2) for critical/important functions) · Article 30
- Decision documented on participation in cyber threat-information-sharing arrangements · Article 45
- Information-sharing communications align with applicable confidentiality + GDPR requirements · Article 45(2)
For orientation only — not financial, legal, regulatory, or investment advice. Outputs are directional and based on generalised inputs. Decisions should be taken only after consultation with a qualified adviser on your specific facts — book the full assessment before acting on anything you read here.
Numbers shown exclude finconduit fees and any third-party costs (legal, audit, regulator-mandated experts, banking-relationship fees, document-translation, ongoing supervisory levies, or local agent / service-provider charges). Real-world authorisation budgets typically exceed the headline regulator-side numbers by a meaningful multiple.