DORA7 min read

DORA Compliance Checklist: Step-by-Step Implementation Guide

This checklist provides a structured approach to implementing DORA requirements. Use it to assess your current state, identify gaps, and plan your compliance journey.

DORA became fully applicable on January 17, 2025. If you are starting now, prioritize foundational elements and near-term deadlines while building toward comprehensive compliance.

Key Takeaways

Point Summary
Phased approach Address foundational elements first, then build comprehensive capabilities
Proportionality Scale implementation to your size and risk profile
Documentation focus Many requirements center on documented policies and procedures
Third-party priority Register of Information has specific submission deadlines
Ongoing obligation Compliance requires continuous maintenance, not one-time implementation

Quick Answer: DORA compliance involves establishing an ICT risk management framework, implementing incident reporting processes, conducting resilience testing, managing third-party ICT risks, and considering information sharing. This checklist breaks down each area into actionable steps, from governance foundations through operational implementation to ongoing maintenance.

Phase 1: Governance and Foundation

Step 1: Establish Governance Structure

  • Assign management body responsibility for ICT risk management
  • Define roles and responsibilities for ICT risk oversight
  • Establish reporting lines to senior management and board
  • Schedule management body training on ICT risks
  • Allocate budget for DORA compliance activities

Step 2: Assess Current State

  • Inventory existing ICT policies and procedures
  • Map current controls against DORA requirements
  • Identify gaps requiring remediation
  • Document systems supporting critical or important functions
  • Catalog ICT third-party service providers

Step 3: Develop ICT Risk Management Strategy

  • Define ICT risk appetite
  • Establish risk assessment methodology
  • Document ICT risk management strategy
  • Obtain management body approval
  • Communicate strategy across organization

Phase 2: ICT Risk Management Framework

Step 4: Build Identification Capabilities

  • Create comprehensive ICT asset inventory
  • Classify assets by criticality and sensitivity
  • Identify critical and important business functions
  • Map ICT dependencies for critical functions
  • Document network architecture and data flows

Step 5: Implement Protection Measures

  • Establish information security policy
  • Implement access control procedures
  • Deploy encryption for data at rest and in transit
  • Configure network security controls
  • Establish patch management process
  • Implement secure configuration standards
  • Deploy endpoint protection solutions

Step 6: Develop Detection Capabilities

  • Implement security monitoring and logging
  • Establish anomaly detection capabilities
  • Define alert thresholds and escalation procedures
  • Ensure 24/7 monitoring for critical systems
  • Integrate threat intelligence where appropriate

Step 7: Establish Response Procedures

  • Document incident response procedures
  • Define incident classification criteria
  • Establish incident response team and roles
  • Create communication templates for incidents
  • Develop containment and eradication procedures
  • Prepare evidence preservation guidelines

Step 8: Plan for Recovery

  • Document business continuity plans
  • Establish disaster recovery procedures
  • Define recovery time objectives (RTOs)
  • Define recovery point objectives (RPOs)
  • Implement backup procedures
  • Document crisis management arrangements

Phase 3: Incident Reporting

Step 9: Implement Incident Classification

  • Establish incident classification criteria aligned with DORA
  • Create decision tree for major incident determination
  • Document classification approval process
  • Train staff on classification criteria

Step 10: Develop Reporting Procedures

  • Create initial notification template
  • Create intermediate report template
  • Create final report template
  • Document reporting timeline and responsibilities
  • Establish communication channel with competent authority
  • Integrate reporting with incident response process

Step 11: Prepare Client Notification

  • Define criteria for client notification
  • Create client communication templates
  • Establish client notification process
  • Train customer-facing staff

Phase 4: Third-Party Risk Management

Step 12: Develop Third-Party Risk Strategy

  • Document ICT third-party risk policy
  • Define due diligence requirements
  • Establish concentration risk appetite
  • Create provider assessment criteria

Step 13: Build Register of Information

  • Identify all ICT third-party service providers
  • Document contract details for each provider
  • Classify services by criticality
  • Record data locations and sub-outsourcing
  • Prepare for regulatory submission

Step 14: Review and Update Contracts

  • Audit existing contracts against DORA Article 30
  • Identify contracts requiring amendments
  • Negotiate updated terms with providers
  • Prioritize critical function providers
  • Document non-compliance and risk acceptance where needed

Step 15: Implement Ongoing Oversight

  • Establish provider performance monitoring
  • Schedule periodic risk reassessments
  • Define audit and inspection approach
  • Create provider incident notification process

Step 16: Develop Exit Strategies

  • Document exit strategies for critical function providers
  • Identify alternative providers or in-house options
  • Estimate transition timelines and resources
  • Test exit strategy feasibility
  • Include exit provisions in contracts

Phase 5: Resilience Testing

Step 17: Establish Testing Program

  • Document testing policy and strategy
  • Define testing scope based on risk assessment
  • Establish testing calendar
  • Identify testing resources (internal/external)
  • Create testing documentation standards

Step 18: Implement Basic Testing

  • Conduct vulnerability assessments
  • Perform network security testing
  • Execute scenario-based testing
  • Test business continuity plans
  • Test disaster recovery procedures
  • Document and track remediation

Step 19: Prepare for TLPT (If Designated)

  • Determine if TLPT designation applies
  • Establish control team
  • Engage threat intelligence provider
  • Select red team (internal or external as appropriate)
  • Define TLPT scope covering critical functions
  • Plan purple teaming phase
  • Prepare for regulatory reporting

Phase 6: Information Sharing (Optional)

Step 20: Consider Information Sharing

  • Assess readiness for threat intelligence consumption
  • Identify appropriate sharing communities
  • Evaluate contribution capability
  • Implement technical infrastructure
  • Notify competent authority of participation

Phase 7: Ongoing Compliance

Step 21: Maintain Documentation

  • Schedule annual policy and procedure reviews
  • Update documentation following changes
  • Maintain evidence of compliance activities
  • Archive records according to retention requirements

Step 22: Conduct Regular Reviews

  • Perform annual ICT risk management framework review
  • Update risk assessments periodically
  • Review provider risk assessments annually
  • Assess control effectiveness
  • Report to management body regularly

Step 23: Support Continuous Improvement

  • Incorporate lessons learned from incidents
  • Update controls based on testing results
  • Track regulatory developments
  • Adapt to evolving threats

Priority Timeline

For entities starting compliance now, prioritize activities as follows:

Priority Activities Rationale
Immediate Governance structure, incident reporting capability, Register of Information Core obligations with near-term deadlines
Short-term ICT risk management framework, critical contract updates Foundation for other requirements
Medium-term Comprehensive testing program, third-party oversight Building on established foundation
Ongoing Reviews, updates, continuous improvement Maintaining compliance over time

Documentation Checklist

Ensure you have documented:

Document Status
ICT risk management strategy
Information security policy
ICT asset inventory
Risk assessment methodology
Business impact analysis
Business continuity plans
Disaster recovery plans
Incident response procedures
Incident classification criteria
Incident reporting templates
Third-party risk policy
Register of Information
Exit strategies
Testing policy
Test plans and reports

Common Questions

Where should we start if we have limited compliance today?

Start with governance (management accountability and roles) and immediate obligations (incident reporting capability). Build the ICT asset inventory and Register of Information in parallel, as these inform everything else.

How long does full compliance take?

Timeline depends on your starting point and resources. Organizations with mature security programs may achieve reasonable compliance in 3-6 months. Those starting from scratch may need 12-18 months for comprehensive implementation. Proportionality allows smaller entities to implement simpler approaches more quickly.

Can we use existing ISO 27001 controls?

Yes. ISO 27001 provides significant overlap with DORA requirements. Conduct a mapping exercise to identify which ISO controls satisfy DORA requirements and where gaps exist.

What evidence should we retain?

Retain evidence of all compliance activities: policies, procedures, risk assessments, testing reports, incident records, training records, contract reviews, and management approvals. Ensure records are accessible for regulatory review.

How Bastion Helps

Bastion provides structured support for DORA implementation:

  • Gap assessment: Evaluation of current state against DORA requirements
  • Roadmap development: Prioritized implementation plan
  • Policy development: Creation of required documentation
  • Implementation support: Hands-on assistance with control implementation
  • Register of Information: Preparation and submission support
  • Testing coordination: Management of testing activities
  • Ongoing compliance: Continuous support for maintenance and improvement

Ready to start your DORA compliance journey? Talk to our team


Sources