Digital threats are undoubtedly ever-evolving. To address this, the European Union has taken a significant step to fortify its financial sector’s cybersecurity. The Digital Operational Resilience Act (DORA) is set to reshape the landscape of digital security in finance, with far-reaching implications for both traditional institutions and emerging Web3 projects.
As a Web3 audit security firm, Hacken is leading the charge in helping projects navigate this new regulatory environment with our DORA Compliance, a new service at Hacken.
The Digital Operational Resilience Act (DORA) establishes a unified regulatory framework for digital operational resilience in the financial sector across the European Union. Recognizing the critical role of Information and Communication Technology (ICT) in the functioning of financial services, DORA ensures that financial entities, including banks, payment providers, investment firms, and crypto-asset service providers, can effectively withstand and recover from ICT-related disruptions. By harmonizing rules across Europe, the most comrepehsive regulation to-date regulation eliminates inconsistencies and ensures a robust approach to managing ICT risks.
DORA introduces comprehensive requirements for ICT risk management, incident reporting, and digital operational resilience testing. It also emphasizes oversight of critical third-party ICT providers to address potential systemic risks. With its implementation beginning in January 2025, DORA aims to safeguard financial stability, enhance consumer confidence, and support the smooth functioning of the internal market in an era of increasing digitalization.
As financial services increasingly rely on digital infrastructure, the sector faces vulnerabilities that could disrupt operations, jeopardize market integrity, and harm consumers. The legislation aims to address these risks by establishing a harmonized framework for managing cyber risks, ensuring that financial entities are equipped to prevent, respond to, and recover from ICT-related disruptions.
For the crypto and DeFi industry, historically plagued by exploits and frauds with total losses from hacks nearing $10 billion, DORA is a transformative step forward. By including crypto-asset service providers within its scope, DORA aims to enhance trust and foster long-term stability in the innovative yet risky decentralized technology.
European Securities and Markets Authority (ESMA), alongside the EBA and EIOPA, collectively known as the European Supervisory Authorities (ESAs), plays a key role in DORA’s implementation. In 2019, the ESAs issued advice advocating a unified approach to ICT risks and strengthening digital resilience across the EU.
ESMA’s responsibilities under DORA include providing technical guidance, developing frameworks, and ensuring compliance. Key ESMA recommendations include:
Through these measures, ESMA seeks to harmonize resilience standards, reduce systemic ICT vulnerabilities, and bolster trust and stability in the EU financial market.
The Markets in Crypto-Assets (MiCA) regulation introduces a comprehensive framework for crypto-asset service providers (CASPs), such as centralized exchanges, custodians, and other service providers, requiring them to obtain a CASP license and ensuring exchanges are liable for customer losses. It also regulates the issuance of new crypto assets through mandatory white paper requirements and imposes stricter oversight on stablecoins, including licensing obligations. With its new supervisory architecture, MiCA aims to provide clarity, security, and accountability in the crypto market. For players aiming for MiCA compliance, adhering to DORA regulations is crucial, as it establishes the operational resilience and cybersecurity foundation.
DORA’s scope extends to all financial entities in the EU, including banks, fintech, investment firms, insurance, as well as crypto-asset service providers (CASPs) authorized under MiCA.
Category | Description |
Credit institutions | Banks and other financial institutions offering credit services. |
Payment institutions | Includes those exempted under Directive (EU) 2015/2366. |
Account information service providers | Providers offering account-related services. |
Electronic money institutions | Includes those exempted under Directive 2009/110/EC. |
Investment firms | Firms engaged in investment activities. |
Crypto-asset service providers | Authorized under MiCA, including issuers of asset-referenced tokens. |
Central securities depositories | Entities managing securities and ensuring settlement. |
Central counterparties | Organizations that facilitate trading between parties. |
Trading venues | Platforms enabling financial instrument trading. |
Trade repositories | Entities maintaining records of trade data. |
Managers of alternative investment funds | Includes hedge funds, private equity, etc. |
Management companies | Companies overseeing collective investment schemes. |
Data reporting service providers | Entities facilitating data submissions and analytics. |
Insurance and reinsurance undertakings | Firms providing insurance and reinsurance services. |
Insurance intermediaries | Includes reinsurance and ancillary intermediaries. |
Institutions for occupational retirement provision | Pension funds and similar entities. |
Credit rating agencies | Organizations issuing credit ratings. |
Administrators of critical benchmarks | Responsible for maintaining financial benchmarks. |
Crowdfunding service providers | Platforms facilitating crowdfunding projects. |
Securitization repositories | Entities handling securitization transaction data. |
ICT third-party service providers | Providers offering critical ICT services to financial entities. |
In addition to CASPs, DORA’s scope is likely to affect blockchain-based entities that are increasingly integral to the financial ecosystem:
To operate within the EU’s regulatory framework, crypto, and DeFi entities must align with DORA’s stringent operational resilience and cybersecurity standards, ensuring they can mitigate risks and maintain compliance in this rapidly evolving sector.
DORA regulation entered into force on January 16, 2023, and will apply from January 17, 2025. This gives Web3 projects a crucial window to prepare and ensure compliance before the regulation takes full effect.
Noncompliance with DORA can result in administrative or even criminal penalties determined by a “competent authority” of each EU member state, while critical ICT providers face fines of up to 1% of their average daily global turnover per day for up to six months until compliance is achieved.
For example, if a critical ICT provider with an average daily global turnover of €10,000,000 remains non-compliant for 180 days, they could face a daily fine of €100,000, resulting in a total penalty of €18,000,000.
When deciding the penalty amount, the lead overseer will consider:
Besides financial penalties, failing to comply with DORA can be costly due to operational disruptions and reputation damage.
Developing an ICT Risk Management Framework is a fundamental requirement under DORA. Companies need to perform a detailed gap analysis to assess their current ICT risk landscape and identify vulnerabilities. This framework must integrate into broader operational strategies, ensuring consistent risk management and mitigation. For example, a financial institution might implement extractor monitoring for real-time detection of potential threats and adopt automated protection measures to prevent incidents.
Organizations must establish robust cybersecurity measures to safeguard their infrastructure. This includes regular penetration testing to uncover vulnerabilities, continuous monitoring for real-time threat detection, and implementing incident response plans to quickly mitigate attacks. For instance, deploying security audits and automated protection tools can enhance both prevention and response capabilities.
DORA requires entities to establish clear protocols for detecting, classifying, and reporting ICT-related incidents. Structured reporting processes are essential for compliance, ensuring accurate and timely submissions to regulators. Companies might use root cause analysis tools to investigate incidents and streamline their reporting systems to meet regulatory deadlines.
Entities must conduct regular cyber resilience testing, such as Threat-Led Penetration Testing (TLPT), to simulate real-world attack scenarios. These tests assess the organization’s resilience to advanced threats and highlight areas requiring improvement. For example, basic penetration testing could address common vulnerabilities, while TLPT focuses on high-risk attack vectors impacting critical systems.
Under DORA, managing risks associated with third-party service providers is critical. Companies must monitor and assess their vendors’ compliance with ICT security standards. For instance, implementing TLPT for critical providers ensures their systems align with regulatory expectations. Additionally, contracts with third parties should mandate regular audits and establish clear incident reporting procedures.
Complying with DORA may seem daunting, but it offers several benefits, especially for Web3 projects that have suffered losses, thefts, and devastation from cyber incidents. Some of the benefits are:
From January 2025, entities must comply with requirements for risk management, incident reporting, and third-party oversight. Crypto businesses like exchanges and DeFi projects must adopt resilience measures, conduct cyber resilience testing, and implement incident reporting protocols.
Preparation involves a gap analysis to identify vulnerabilities, update ICT risk frameworks, manage third-party risks, and implement advanced testing such as Threat-Led Penetration Testing (TLPT).
Hacken is the go-to provider for DORA compliance, leveraging its position as a top auditor in Europe and its ongoing cooperation with the European Commission’s EBSI. With 1500+ clients in Web3 and fintech, Hacken delivers tailored compliance strategies, implements ICT risk management frameworks, and conducts advanced digital resilience testing like TLPT. Clients benefit from detailed assessments that address compliance gaps, monitoring of third-party risks, and continuous support, culminating in the Hacken DORA Compliance Certificate upon completion.
Our package for DORA Compliance includes:
Our team of experts understands the unique challenges faced by Web3 projects and can provide guidance on all aspects of DORA compliance.
Don’t let DORA compliance become a stumbling block for your Web3 project. With Hacken’s DORA Compliance Service, you can stay ahead of the regulatory curve and enhance your project’s security posture.
Contact us today to ensure your project is ready for the future of digital operational resilience in the EU financial sector!
The periodic penalty payment can be up to 1% of the critical ICT third-party provider’s average daily global revenue from the previous business year, starting from the date mentioned in the penalty decision.
Compliance requires assessing ICT risks, implementing tailored strategies, conducting resilience testing like TLPT, and ensuring oversight of third-party providers—services Hacken specializes in delivering.
DORA is directly tied to cybersecurity, requiring risk management frameworks, incident reporting, and penetration testing to ensure digital operational resilience.
Be the first to receive our latest company updates, Web3 security insights, and exclusive content curated for the blockchain enthusiasts.
Table of contents
Tell us about your project
6 min read
Discover
5 min read
Discover
2 min read
Discover