• Hacken
  • Blog
  • Discover
  • The Digital Operational Resilience Act (DORA) Compliance: What You Need To Know

The Digital Operational Resilience Act (DORA) Compliance: What You Need To Know

9 minutes

Digital threats are undoubtedly ever-evolving. To address this, the European Union has taken a significant step to fortify its financial sector’s cybersecurity. The Digital Operational Resilience Act (DORA) is set to reshape the landscape of digital security in finance, with far-reaching implications for both traditional institutions and emerging Web3 projects. 

As a Web3 audit security firm, Hacken is leading the charge in helping projects navigate this new regulatory environment with our DORA Compliance, a new service at Hacken.

What Is DORA?

The Digital Operational Resilience Act (DORA) establishes a unified regulatory framework for digital operational resilience in the financial sector across the European Union. Recognizing the critical role of Information and Communication Technology (ICT) in the functioning of financial services, DORA ensures that financial entities, including banks, payment providers, investment firms, and crypto-asset service providers, can effectively withstand and recover from ICT-related disruptions. By harmonizing rules across Europe, the most comrepehsive regulation to-date regulation eliminates inconsistencies and ensures a robust approach to managing ICT risks.

DORA introduces comprehensive requirements for ICT risk management, incident reporting, and digital operational resilience testing. It also emphasizes oversight of critical third-party ICT providers to address potential systemic risks. With its implementation beginning in January 2025, DORA aims to safeguard financial stability, enhance consumer confidence, and support the smooth functioning of the internal market in an era of increasing digitalization​.

Why Is DORA Needed?

As financial services increasingly rely on digital infrastructure, the sector faces vulnerabilities that could disrupt operations, jeopardize market integrity, and harm consumers. The legislation aims to address these risks by establishing a harmonized framework for managing cyber risks, ensuring that financial entities are equipped to prevent, respond to, and recover from ICT-related disruptions.

DORA Objectives:

  • Harmonize financial system resilience
  • Enhance market stability
  • Increase consumer confidence
  • Fill gaps in existing regulations

DORA Objectives For Crypto

For the crypto and DeFi industry, historically plagued by exploits and frauds with total losses from hacks nearing $10 billion, DORA is a transformative step forward. By including crypto-asset service providers within its scope, DORA aims to enhance trust and foster long-term stability in the innovative yet risky decentralized technology.

ESMA Recommendations

European Securities and Markets Authority (ESMA), alongside the EBA and EIOPA, collectively known as the European Supervisory Authorities (ESAs), plays a key role in DORA’s implementation. In 2019, the ESAs issued advice advocating a unified approach to ICT risks and strengthening digital resilience across the EU.

ESMA’s responsibilities under DORA include providing technical guidance, developing frameworks, and ensuring compliance. Key ESMA recommendations include:

  • External cybersecurity audits on a regular basis for financial entities and critical ICT providers.
  • Broader evaluations for management members, including reputational checks on fraud prevention, anti-money laundering compliance, and adherence to financial services law.

Through these measures, ESMA seeks to harmonize resilience standards, reduce systemic ICT vulnerabilities, and bolster trust and stability in the EU financial market. 

MiCA Regulations & DORA

The Markets in Crypto-Assets (MiCA) regulation introduces a comprehensive framework for crypto-asset service providers (CASPs), such as centralized exchanges, custodians, and other service providers, requiring them to obtain a CASP license and ensuring exchanges are liable for customer losses. It also regulates the issuance of new crypto assets through mandatory white paper requirements and imposes stricter oversight on stablecoins, including licensing obligations. With its new supervisory architecture, MiCA aims to provide clarity, security, and accountability in the crypto market. For players aiming for MiCA compliance, adhering to DORA regulations is crucial, as it establishes the operational resilience and cybersecurity foundation.


Who Is Affected by DORA?

DORA’s scope extends to all financial entities in the EU, including banks, fintech, investment firms, insurance, as well as crypto-asset service providers (CASPs) authorized under MiCA. 

CategoryDescription
Credit institutionsBanks and other financial institutions offering credit services.
Payment institutionsIncludes those exempted under Directive (EU) 2015/2366.
Account information service providersProviders offering account-related services.
Electronic money institutionsIncludes those exempted under Directive 2009/110/EC.
Investment firmsFirms engaged in investment activities.
Crypto-asset service providersAuthorized under MiCA, including issuers of asset-referenced tokens.
Central securities depositoriesEntities managing securities and ensuring settlement.
Central counterpartiesOrganizations that facilitate trading between parties.
Trading venuesPlatforms enabling financial instrument trading.
Trade repositoriesEntities maintaining records of trade data.
Managers of alternative investment fundsIncludes hedge funds, private equity, etc.
Management companiesCompanies overseeing collective investment schemes.
Data reporting service providersEntities facilitating data submissions and analytics.
Insurance and reinsurance undertakingsFirms providing insurance and reinsurance services.
Insurance intermediariesIncludes reinsurance and ancillary intermediaries.
Institutions for occupational retirement provisionPension funds and similar entities.
Credit rating agenciesOrganizations issuing credit ratings.
Administrators of critical benchmarksResponsible for maintaining financial benchmarks.
Crowdfunding service providersPlatforms facilitating crowdfunding projects.
Securitization repositoriesEntities handling securitization transaction data.
ICT third-party service providersProviders offering critical ICT services to financial entities.
The scope of DORA

Crypto and DeFi Services Potentially In-Scope of DORA

In addition to CASPs, DORA’s scope is likely to affect blockchain-based entities that are increasingly integral to the financial ecosystem:

  • Wallet infrastructure services
  • Staking-as-a-Service
  • Blockchain analytics
  • Peer-to-peer trading software
  • KYC services
  • Cloud services

To operate within the EU’s regulatory framework, crypto, and DeFi entities must align with DORA’s stringent operational resilience and cybersecurity standards, ensuring they can mitigate risks and maintain compliance in this rapidly evolving sector.

When Does the Digital Operational Resilience Act Come Into Force?

DORA regulation entered into force on January 16, 2023, and will apply from January 17, 2025. This gives Web3 projects a crucial window to prepare and ensure compliance before the regulation takes full effect.

What’s the Consequences of Not Complying?

Noncompliance with DORA can result in administrative or even criminal penalties determined by a “competent authority” of each EU member state, while critical ICT providers face fines of up to 1% of their average daily global turnover per day for up to six months until compliance is achieved.

For example, if a critical ICT provider with an average daily global turnover of €10,000,000 remains non-compliant for 180 days, they could face a daily fine of €100,000, resulting in a total penalty of €18,000,000.

When deciding the penalty amount, the lead overseer will consider:

  • How serious and how long the non-compliance lasted.
  • Whether the non-compliance was intentional or accidental.
  • How cooperative the ICT provider was during the process.

Besides financial penalties, failing to comply with DORA can be costly due to operational disruptions and reputation damage.


DORA Requirements

ICT Risk Management Framework

Developing an ICT Risk Management Framework is a fundamental requirement under DORA. Companies need to perform a detailed gap analysis to assess their current ICT risk landscape and identify vulnerabilities. This framework must integrate into broader operational strategies, ensuring consistent risk management and mitigation. For example, a financial institution might implement extractor monitoring for real-time detection of potential threats and adopt automated protection measures to prevent incidents.

Cybersecurity Measures

Organizations must establish robust cybersecurity measures to safeguard their infrastructure. This includes regular penetration testing to uncover vulnerabilities, continuous monitoring for real-time threat detection, and implementing incident response plans to quickly mitigate attacks. For instance, deploying security audits and automated protection tools can enhance both prevention and response capabilities.

Incident Classification and Reporting

DORA requires entities to establish clear protocols for detecting, classifying, and reporting ICT-related incidents. Structured reporting processes are essential for compliance, ensuring accurate and timely submissions to regulators. Companies might use root cause analysis tools to investigate incidents and streamline their reporting systems to meet regulatory deadlines.

Cyber Resilience Testing

Entities must conduct regular cyber resilience testing, such as Threat-Led Penetration Testing (TLPT), to simulate real-world attack scenarios. These tests assess the organization’s resilience to advanced threats and highlight areas requiring improvement. For example, basic penetration testing could address common vulnerabilities, while TLPT focuses on high-risk attack vectors impacting critical systems.

Third-Party Risk Management

Under DORA, managing risks associated with third-party service providers is critical. Companies must monitor and assess their vendors’ compliance with ICT security standards. For instance, implementing TLPT for critical providers ensures their systems align with regulatory expectations. Additionally, contracts with third parties should mandate regular audits and establish clear incident reporting procedures.

Benefits of DORA for Web3 Projects

Complying with DORA may seem daunting, but it offers several benefits, especially for Web3 projects that have suffered losses, thefts, and devastation from cyber incidents. Some of the benefits are:

  • Enhanced security posture
  • Improved operational resilience
  • Increased trust from users and partners
  • Better preparedness for cyber threats
  • Alignment with global best practices in cybersecurity
  • Avoidance of penalties

DORA Preparation Roadmap

From January 2025, entities must comply with requirements for risk management, incident reporting, and third-party oversight. Crypto businesses like exchanges and DeFi projects must adopt resilience measures, conduct cyber resilience testing, and implement incident reporting protocols.

Preparation involves a gap analysis to identify vulnerabilities, update ICT risk frameworks, manage third-party risks, and implement advanced testing such as Threat-Led Penetration Testing (TLPT).

How Hacken Can Help Your DORA Compliance

Hacken is the go-to provider for DORA compliance, leveraging its position as a top auditor in Europe and its ongoing cooperation with the European Commission’s EBSI. With 1500+ clients in Web3 and fintech, Hacken delivers tailored compliance strategies, implements ICT risk management frameworks, and conducts advanced digital resilience testing like TLPT. Clients benefit from detailed assessments that address compliance gaps, monitoring of third-party risks, and continuous support, culminating in the Hacken DORA Compliance Certificate upon completion.

Our package for DORA Compliance includes:

  • DORA Readiness Assessment & Gap Assessment: We help clients clearly understand compliance gaps and non-conformities. Unlike competitors who only provide recommendations, Hacken delivers a detailed Remediation Strategy with tailored, step-by-step solutions to address the gaps.
  • ICT Risk Management Frameworks: We develop and implement a compliant risk management strategy tailored to your Web3 project.
  • Cybersecurity Solutions: From penetration testing to incident response, we ensure your project remains secure and resilient.
  • Incident Reporting Tools: Hacken provides tools to help you identify, classify, and report incidents in accordance with DORA requirements.
  • Threat-Led Penetration Testing (TLPT): Our TLPT services ensure your project is prepared to face advanced cyber threats.
  • Third-Party Risk Management: We help you monitor and manage third-party risks to ensure compliance throughout your ecosystem.

Our team of experts understands the unique challenges faced by Web3 projects and can provide guidance on all aspects of DORA compliance.

Don’t let DORA compliance become a stumbling block for your Web3 project. With Hacken’s DORA Compliance Service, you can stay ahead of the regulatory curve and enhance your project’s security posture. 

Contact us today to ensure your project is ready for the future of digital operational resilience in the EU financial sector!

FAQ

What are the penalties for non-compliance with DORA?


The periodic penalty payment can be up to 1% of the critical ICT third-party provider’s average daily global revenue from the previous business year, starting from the date mentioned in the penalty decision. 

How to achieve compliance with DORA?

Compliance requires assessing ICT risks, implementing tailored strategies, conducting resilience testing like TLPT, and ensuring oversight of third-party providers—services Hacken specializes in delivering.

How does DORA relate to cybersecurity?

DORA is directly tied to cybersecurity, requiring risk management frameworks, incident reporting, and penetration testing to ensure digital operational resilience.

Subscribe
to our newsletter

Be the first to receive our latest company updates, Web3 security insights, and exclusive content curated for the blockchain enthusiasts.

Speaker Img

Table of contents

  • What Is DORA?
  • MiCA Regulations & DORA
  • Who Is Affected by DORA?
  • When Does the Digital Operational Resilience Act Come Into Force?

Tell us about your project

Follow Us

Read next:

More related

Trusted Web3 Security Partner