EU 2022/2554
DORA Regulation Explorer
Browse and search DORA (Digital Operational Resilience Act) articles with this interactive tool. Plain-language explanations and compliance requirements.
22
Articles Covered
11
Critical Requirements
7
Chapters
68%
Your Coverage
Chapters
Glossary
ICT Risk
ICT Risk
Any reasonably identifiable circumstance related to the use of ICT which, if materialised, may compromise the security of a financial entity. Digital Operational Resilience
Digital Operational Resilience
The ability of a financial entity to build, assure and review its operational integrity and reliability with respect to ICT-related disruptions. TLPT
TLPT
Threat-Led Penetration Testing — tests that mimic real-world cyber attacks against a financial entity's critical functions using threat intelligence. Critical ICT Provider
Critical ICT Provider
A third-party ICT service provider whose disruption could systemically impact financial stability. RTS
RTS
Regulatory Technical Standards — detailed rules drafted by ESAs for implementing DORA requirements. Concentration Risk
Concentration Risk
Risk arising from over-reliance on a single ICT service provider for critical or important functions. Register of Information
Register of Information
The mandatory register under DORA Art. 28(3) documenting all third-party ICT contractual arrangements. ITS
ITS
Implementing Technical Standards — standard forms and templates drafted by ESAs for DORA compliance. 22 articles found
⚖
Chapter I: General Provisions
(Art. 1-4)🛡
Chapter II: ICT Risk Management
(Art. 5-16)⚠
Chapter III: ICT Incident Management
(Art. 17-23)🔍
Chapter IV: Resilience Testing
(Art. 24-27)🌐
Chapter V: Third-Party Risk
(Art. 28-44)👥
Chapter VI: Information Sharing
(Art. 45)🏛
Chapter VII: Competent Authorities
(Art. 46-56)Ready to check your compliance?
Use our free self-assessment tool to find out how far you are from meeting DORA requirements.