DORA7 min read

DORA vs NIS 2: Understanding the Differences

Financial entities operating in the EU may find themselves potentially subject to both DORA and NIS 2. Understanding how these regulations interact is essential for efficient compliance planning.

The key principle is that DORA is lex specialis (the more specific law) for the financial sector. Where DORA and NIS 2 overlap, DORA requirements apply to financial entities.

Key Takeaways

Point Summary
Lex specialis DORA takes precedence over NIS 2 for financial entities
Sector focus DORA is financial sector-specific; NIS 2 covers 18 critical sectors
Similar structure Both address risk management, incident reporting, and supply chain security
Incident timelines Both use similar reporting timeframes but to different authorities
Testing requirements DORA has more prescriptive testing requirements, including mandatory TLPT

Quick Answer: DORA and NIS 2 are both EU cybersecurity regulations, but DORA specifically targets the financial sector while NIS 2 covers 18 critical sectors. For financial entities, DORA is considered the more specific regulation (lex specialis), meaning DORA requirements apply where the two overlap. Both regulations share similar themes but DORA has more prescriptive requirements tailored to financial services.

Overview Comparison

Aspect DORA NIS 2
Full name Digital Operational Resilience Act Network and Information Security Directive 2
Legal instrument Regulation (directly applicable) Directive (requires national transposition)
Sector scope Financial services (20 entity types) 18 critical sectors
Effective date January 17, 2025 October 17, 2024 (transposition deadline)
Primary focus Digital operational resilience Cybersecurity
Reporting authority Financial supervisors National cybersecurity authorities

Scope and Applicability

DORA Scope

DORA applies to 20 categories of financial entities, including:

  • Credit institutions
  • Payment institutions
  • Investment firms
  • Insurance undertakings
  • Crypto-asset service providers
  • Central counterparties
  • Trading venues

NIS 2 Scope

NIS 2 applies to entities in 18 sectors classified as essential or important:

Essential Sectors Important Sectors
Energy Postal services
Transport Waste management
Banking Chemicals
Financial market infrastructure Food
Health Manufacturing
Drinking water Digital providers
Wastewater Research
Digital infrastructure
ICT service management
Public administration
Space

Overlap

The overlap occurs in:

  • Banking (NIS 2 essential sector, DORA scope)
  • Financial market infrastructure (NIS 2 essential sector, DORA scope)
  • ICT service management (NIS 2 essential sector, potentially DORA CTPP scope)

The Lex Specialis Principle

How It Works

Article 4 of NIS 2 establishes that where sector-specific EU legislation:

  • Requires essential or important entities to adopt cybersecurity risk management measures, or
  • Requires notification of significant incidents, and
  • The requirements are at least equivalent to NIS 2 obligations

Then the sector-specific legislation applies instead of NIS 2.

DORA as Lex Specialis

For financial entities, DORA is recognized as the more specific regulation:

  • DORA requirements on ICT risk management are at least equivalent to NIS 2 cybersecurity requirements
  • DORA incident reporting obligations are at least equivalent to NIS 2 notification requirements
  • Therefore, DORA applies instead of NIS 2 for covered financial entities

Practical Implications

Financial entities:

  • Should focus compliance efforts on DORA, not NIS 2
  • Report incidents to financial supervisors under DORA, not to national cybersecurity authorities under NIS 2
  • Follow DORA testing requirements, not NIS 2 security assessments

Requirement Comparison

Risk Management

Aspect DORA NIS 2
Framework Comprehensive ICT risk management framework required Appropriate cybersecurity risk management measures
Governance Explicit management body accountability Management body approval and oversight
Documentation Detailed documentation requirements Risk-based policies and procedures
Business continuity Specific ICT continuity requirements Business continuity included in measures

Both regulations require risk-based approaches, but DORA provides more detailed requirements specific to financial services.

Incident Reporting

Aspect DORA NIS 2
Timeline 4 hours (classification) / 24 hours / 72 hours / 1 month 24 hours / 72 hours / 1 month
Authority Financial supervisors National cybersecurity authorities
Content Detailed multi-stage reporting Significant incident notification
Client notification Required when financial interests affected May be required to inform recipients

The timelines are similar, reflecting alignment during the legislative process.

Supply Chain / Third-Party Risk

Aspect DORA NIS 2
Focus ICT third-party service providers Supply chain security broadly
Register Register of Information required Not specifically required
Contractual Detailed mandatory contract provisions General supply chain security measures
Oversight CTPP oversight framework No equivalent designation process

DORA has more prescriptive third-party requirements, including the unique CTPP oversight framework.

Testing

Aspect DORA NIS 2
Basic testing Required for all entities General obligation to assess measures
Advanced testing TLPT mandatory for designated entities No specific advanced testing requirement
Frequency Annual program, TLPT every 3 years Proportionate testing
Third-party inclusion Required in testing Not specified

DORA's testing requirements, particularly TLPT, are more prescriptive than NIS 2.

Penalties

Aspect DORA NIS 2
Maximum (entities) 2% of turnover 2% (essential) / 1.4% (important)
Maximum (individuals) 1 million Varies by member state
CTPPs Up to 5 million N/A

Penalty structures are comparable, with both using turnover-based maximums.

ICT Service Providers

Under DORA

ICT third-party service providers serving financial entities:

  • Face contractual requirements from clients
  • May be designated as CTPPs for direct oversight
  • Must participate in client testing programs

Under NIS 2

Managed service providers and managed security service providers:

  • Fall directly within NIS 2 scope as important entities
  • Must implement NIS 2 cybersecurity measures
  • Must report significant incidents

Dual Application

An ICT service provider may face:

  • NIS 2 requirements directly (as a managed service provider)
  • DORA contractual requirements indirectly (from financial sector clients)
  • CTPP oversight (if designated)

This creates layered compliance obligations for major technology providers.

When NIS 2 Might Still Apply

While DORA is lex specialis, NIS 2 may still be relevant when:

Group-Level Considerations

Financial groups with non-financial subsidiaries may find those subsidiaries subject to NIS 2 if they:

  • Provide ICT services to the financial entity
  • Operate in other NIS 2 sectors
  • Meet NIS 2 size thresholds

Technology Providers

Non-financial ICT providers may be subject to NIS 2 directly while also facing DORA-driven contractual requirements from financial clients.

Regulatory Coordination

NIS 2 establishes coordination mechanisms that may involve financial supervisors:

  • National Cyber Crises Liaison Organisation Network (CyCLONe)
  • European cyber crises management framework
  • Cross-sector incident sharing

Compliance Synergies

Organizations subject to both regulations (or supporting clients under both) can leverage synergies:

Area Synergy
Risk management Common risk assessment methodologies
Policies Shared policy frameworks with sector-specific customization
Incident response Common detection and response capabilities
Supply chain Unified vendor assessment approaches
Testing Comprehensive testing programs serving both requirements

Common Questions

I am a bank. Do I need to comply with NIS 2?

No. As a credit institution, you fall within DORA scope. DORA is lex specialis, meaning DORA requirements apply instead of NIS 2.

We are an ICT provider serving banks. Which applies?

Potentially both. NIS 2 may apply to you directly as a managed service provider. DORA applies indirectly through contractual requirements from your financial sector clients. If designated as a CTPP, you also face direct DORA oversight.

Do we report incidents to both authorities?

Financial entities report under DORA to financial supervisors. NIS 2 reporting is not required because DORA is lex specialis. However, coordination between authorities means information may be shared.

Should we pursue ISO 27001 for both?

ISO 27001 provides a strong foundation for both DORA and NIS 2 compliance. Both regulations reference international standards favorably. Certification can demonstrate baseline security to multiple stakeholders.

How Bastion Helps

Bastion supports organizations navigating DORA and NIS 2:

  • Applicability assessment: Determine which regulations apply to your organization
  • Gap analysis: Evaluate current state against applicable requirements
  • Efficient implementation: Leverage synergies between frameworks
  • ISO 27001 certification: Build a foundation supporting multiple compliance objectives
  • Ongoing compliance: Maintain alignment with evolving requirements

Ready to clarify your compliance obligations? Talk to our team


Sources