What is DORA?

What is DORA

Digital transformation in the financial industry has led to numerous advantages, but it has also made businesses more vulnerable to various technology risks such as cyberattacks, system failures, and disruptions in third-party information and communication technology (ICT) services.

The European Union introduced the Digital Operational Resilience Act (DORA), which outlines specific requirements for financial institutions operating in the EU to ensure the industry can combat these threats and safeguard its business operations.

DORA took effect on January 16, 2023, and full enforcement began on January 17, 2025. The policy aims to standardise the regulations concerning operational resilience for the financial industry, covering 20 different types of financial entities and ICT service providers.

Double trouble or double defense: What NIS2 and DORA mean for finance

Check now
ManageEngine's guide for NIS2 compliance

What does DORA mean for your
financial organisation?

DORA is a transformative regulation designed to enhance your organisation's ability to
withstand, recover from, and adapt to ICT-related disruptions. Here's what DORA
means for your organisation:

  • Strengthened cyber resilience

    You'll need to implement strong measures to protect your digital infrastructure from cyberthreats and operational disruptions. Regular risk assessments and security upgrades will become a core part of your operations.

  • Governance and oversight

    DORA places accountability at the board level, requiring you to align your governance framework with digital resilience objectives.

  • Incident reporting and recovery

    You need to establish efficient mechanisms to detect, report, and recover from ICT-related incidents, ensuring minimal impact on operations and customer trust.

  • Third-party risk management

    DORA emphasises the importance of assessing and mitigating risks posed by ICT third-party providers. You'll be expected to ensure that your vendors meet the same resilience standards as your organisation.

5 core areas of Digital Operational Resilience Act

5 core areas of
Digital Operational
Resilience Act

  • Digital operational
    resilience testing

    Test ICT risk management to identify any weaknesses.
    The European Parliament recommends annual Digital
    Operational Resilience testing on their ICT services.
    However, advanced testing is only required once
    every three years.

  • ICT risk management
    framework

    Developing a framework to monitor and
    manage risks with third-party ICT
    providers, covering critical aspects like
    capabilities, levels, and locations.

  • Incident reporting and
    management

    Implementing uniform procedures for
    monitoring and classifying ICT incidents
    and reporting them to the relevant
    authorities.

  • Managing third-party
    risks

    Ensuring effective service relationships for
    better risk management. Service
    agreements must cover monitoring,
    service levels, and data processing
    locations.

  • Information sharing and
    threat intelligence

    Facilitating the sharing of cybersecurity
    threat information while safeguarding
    confidential data to stay abreast of any
    recent threats and risks.

Implement DORA with ManageEngine

ManageEngine's suite of IT management solutions can help you meet the technical requirements of DORA, thereby supporting your compliance with this regulation.

If your organisation qualifies as a small or non-interconnected investment firm or a payment institution exempt under Directive (EU) 2015/2366, institutions exempt under Directive 2013/36/EU, Articles 5 to 15 of the DORA Regulation do not apply to you, and you can proceed directly to Article 16. For more details, please refer to the DORA guide or the official document.

Implement DORA with ManageEngine solutions
  • Article 5
  • Article 6
  • Article 7
  • Article 8
  • Article 9
  • Article 10
  • Article 11
  • Article 12
  • Article 13
  • Article 14
  • Article 15
  • Article 16
  • Article 17
  • Article 18
  • Article 19
Article 5

Governance and organisation

Financial entities must have a governance framework for effective ICT risk management to ensure digital operational resilience.

ManageEngine products to help you comply

  • PAM360

    Offers admins high-level visibility, in-depth control, and governance over privileged activities across the enterprise.

  • ServiceDesk Plus

    Provides a unified, AI-driven ITIL compatible platform to orchestrate automated workflows for incident handling, user access, change and release management, and IT asset management.

  • OpManager Plus

    Enforce strict access controls and maintain audit trails - providing essential visibility and accountability for ICT risk management.

  • Log360

    Offers a unified security monitoring dashboard, allowing the tracking of security events, the detection of anomalies, and the assessment of risks in real-time.

  • AppCreator

    Develop robust custom governance solutions with integrated frameworks that can enable the entity to easily adhere to global governance standards.

Article 6

ICT risk management framework

Financial entities must establish a comprehensive ICT risk management framework to ensure digital operational resilience. This includes strategies and tools to protect information and ICT assets from risks such as damage and unauthorized access.

ManageEngine products to help you comply

  • Endpoint Central

    Offers extensive reporting features and detailed insights into endpoint assets to deliver in-depth insights into the endpoint environment.

  • PAM360

    Dynamic trust scoring capabilities as well as privileged user behaviour analytics provide organisations with the ability to implement real-time risk management.

  • Digital Risk Analyzer

    Manages domain risks by providing visibility, identifying threats, ensuring SSL validity, and monitoring expiry.

  • Analytics Plus

    Create risk management dashboards to track user access, monitor asset health, and analyse risk scores for better compliance.

  • AD360

    Identifies security risks in AD and Microsoft 365 and detects insider threats. Protects resources with strong MFA.

  • ServiceDesk Plus

    Automates incident responses, IT change governance, and IT asset inventory and management for effective risk mitigation. Includes orchestration and AI-driven insights.

  • OpManager Plus

    Offers a security audit service for auditing firewalls, which includes necessary reporting and improvements to security posture.

  • Log360

    Uses behavioural analytics and anomaly detection to identify suspicious activities such as privilege escalation, unauthorized access attempts, and data exfiltration.

  • AppCreator

    Develop custom risk mitigation and risk deterrence solutions that can empower the financial entity to protect and shield itself from unauthorized access and damage.

Article 7

ICT systems, protocols and tools

Financial entities must regularly update ICT systems to manage risks, ensure reliability, handle increased demands during peak periods, and ensure resilience when operating under adverse situations.

ManageEngine products to help you comply

  • Endpoint Central

    Provides a FIPS 140-2 mode with approved algorithms for heightened security. Its multi-tenant design allows easy onboarding of new endpoints.

  • OpManager Plus

    Ensures reliable monitoring and service delivery, even during peak demands and evolving technological challenges.

  • AppCreator

    Develop bespoke ICT risk management solutions that have high uptime and persistence.

Article 8

Identification

Financial institutions must regularly review and document all business functions, roles, and ICT assets, identifying potential risks like cyberthreats. They should assess changes in network infrastructure or legacy systems and maintain an updated inventory of critical information and third-party dependencies.

ManageEngine products to help you comply

  • Endpoint Central

    Collects comprehensive inventory details from your IT environment and provides continuous vulnerability management through a single interface.

  • PAM360

    PAM360's audit trails automatically log all privileged account activities, including login attempts and task executions, providing clear visibility for internal audits and investigations.

  • Site24x7

    Discovers all network devices, offers network configuration management for change management, enhancing network security and performance.

  • Analytics Plus

    Get insights into asset health, change records, privileged account activity, and risk scores from consolidated dashboards.

  • AD360

    Detects AD and Microsoft 365 security risks, monitors suspicious activity, helps manage and certify entitlements, and offers insights.

  • ServiceDesk Plus

    Allows tracking and control of hardware and software assets, both on-premises and remote. The CMDB streamlines infrastructure mapping for IT teams, identifying risks during incident responses and change implementations.

  • OpManager Plus

    Ensures proactive network management and efficient service restoration by merging real-time device performance insights with service dependency visualisation, crucial for maintaining infrastructure stability.

  • Log360

    Monitors network infrastructure and legacy systems for vulnerabilities, misconfigurations, and unauthorized changes.

  • AppCreator

    Build and maintain a repository that can serve as an up to date inventory of critical information, ICT assets, and third-party dependencies.

Article 9

Protection and prevention

Financial entities must continuously monitor and control the security of their ICT systems to minimize risks. Key objectives for ICT security include ensuring the resilience, continuity, and availability of systems, especially those supporting critical functions, while maintaining high standards of data availability, authenticity, integrity, and confidentiality.

ManageEngine products to help you comply

  • Endpoint Central

    Enhances security with DLP, antivirus, patching, encryption, and robust admin controls for devices.

  • PAM360

    Centralized vault for managing sensitive information, including passwords, certificates, keys, and data documents.

  • Analytics Plus

    Provides in-depth security analytics, correlating asset vulnerabilities, patch compliance, and potential risks with actionable dashboards.

  • AD360

    Securely backs up AD, Microsoft 365, and more. Uses MFA, detects risks, prevents breaches, and reviews access regularly.

  • Identity360

    Manages access with automated role sync and bulk access management. Secures data and resources using strong MFA methods.

  • ServiceDesk Plus

    Helps in protecting ICT services and assets through proactive cybersecurity incident response workflows, tailored access request management workflows, and robust change management workflows.

  • OpManager Plus

    Provides 24/7 monitoring of network devices, applications, and services, ensuring system resilience and availability for critical functions. Real-time alerts and comprehensive visibility enable early threat detection and faster incident response.

  • Log360

    Provides continuous security monitoring, threat detection, and incident response to protect ICT systems. It ensures system resilience, availability, and data integrity through real-time log analysis, access controls, and anomaly detection.

  • AppCreator

    Data stored in AppCreator is encrypted at rest with industry-grade encryption standards, compliant with global data safety regulations.

Article 10

Detection

Financial entities must quickly detect ICT anomalies (as per Article 17) and conduct regular testing (as per Article 25). They should establish multiple control layers and automated incident alerts, allocate resources for monitoring user activity and cyberthreats, and ensure data reporting services can verify trade report completeness and handle errors.

ManageEngine products to help you comply

  • Endpoint Central

    Notifies SOC and IT admins to isolate system during malware attack. System can be recovered after forensic analysis.

  • Site24x7

    Offers real-time monitoring, anomaly detection, and customizable and dynamic thresholds for smoother IT operations.

  • Analytics Plus

    AI-powered anomaly detection, real-time alerts, and ML-driven predictive analytics spot anomalous activities and prevent potential threats.

  • AD360

    Detects security risks in hybrid environments with risk assessment reports, and utilises UBA to investigate and mitigate malicious threats.

  • ServiceDesk Plus

    Detects alerts and alarms from different ITOM, SIEM, and IT alert management tools and converges them into incidents that are triaged and escalated to the right incident responders.

  • OpManager Plus

    An anomaly detection engine, powered by ML, identifies deviations from baseline performance and enables rapid detection of ICT anomalies.

  • Log360

    Offers real-time alerts for security incidents, unauthorized access, and system anomalies. It supports custom alert configurations based on event severity, helping security teams prioritise threats and respond proactively.

Article 11

Response and recovery

Financial entities should implement a comprehensive ICT business continuity policy within their risk management framework to ensure critical functions and incident response. They must establish and audit ICT response and recovery plans, regularly testing outsourced functions.

ManageEngine products to help you comply

  • Endpoint Central

    Protects endpoints from ransomware with unalterable backups and quarantine abilities.

  • PAM360

    Scalable architecture supports multiple application servers while relying on a single SQL availability group, cluster, or Cloud RDS for the backend.

  • Site24x7

    Ensures business continuity via real-time monitoring, automated alerts, and regular response plan testing.

  • Analytics Plus

    Pre-emptively spot indicators of compromise and automate root cause analysis to expedite incident response and resolutions.

  • AD360

    Backs up AD, Microsoft 365, and more as encrypted versions with immutability. Protects access to data using MFA.

  • ServiceDesk Plus

    Enables incident response teams to detect and log incidents, kick starting predefined incident response workflows that automate notifications, assignment, escalations, and recovery.

  • OpManager Plus

    Ensures ICT business continuity with real-time monitoring and failover, while automated workflows and configuration backups enable swift recovery and data protection for effective ICT disaster recovery.

  • Log360

    Automated incident response and recovery mechanisms help minimize downtime and ensure business continuity. Log360 enables real-time threat detection, automated remediation workflows, and forensic analysis to contain security incidents efficiently.

  • AppCreator

    A repository of disruptions can be developed and maintained, with records, for accessibility and future reference.

Article 12

Backup policies and procedures, restoration and recovery procedures and methods

Financial entities must create and document backup and recovery policies to minimize downtime.

ManageEngine products to help you comply

  • Endpoint Central

    Safeguards endpoints from ransomware with instant backups and quarantines suspicious ones for forensic analysis.

  • PAM360

    When a server fails, users can do a fresh install of PAM360 and restore the database with the help of the backup file and master key in less than 15 minutes.

  • AD360

    Backs up AD, Microsoft 365, and more with encryption, quick recovery, MFA, and immutability for data protection.

  • OpManager Plus

    Automates the backup of network device configurations (routers, switches, firewalls) and performs compliance checks for quick restoration and business continuity.

  • Log360

    Enables long-term storage of security logs, ensuring critical data is available for forensic analysis and compliance audits.

Article 13

Learning and evolving

Financial organisations must assess cyberthreats, review incidents, track risk trends, and provide security training for staff and third parties to enhance cyber maturity and adapt to changes.

ManageEngine products to help you comply

  • ServiceDesk Plus

    Records and summarises all incident response details for post-incident reviews to promote shared knowledge and learning.

  • Log360

    Aggregates and analyses security event data from across the IT environment, enabling organisations to identify vulnerabilities, assess cyberthreats, and refine risk management strategies.

Article 14

Communication

Financial entities need crisis communication plans for disclosing ICT incidents or vulnerabilities to clients, counterparts, and the public, as required by Article 6(1). This involves policies for both internal and external stakeholders, with a designated person in charge of managing media inquiries.

ManageEngine products to help you comply

  • ServiceDesk Plus

    Enables organisations to alert incident responders, internal teams, competent authorities, and any external stakeholders at every stage of the incident response workflow.

Article 15

Further harmonisation of ICT risk management tools, methods, processes and policies

The European Supervisory Authorities (ESAs) and ENISA have established regulatory technical standards to enhance ICT security in financial entities. These standards cover network strength, data integrity, access management, incident response, continuity plans, and ICT risk management. They have also been adopted by the European Commission.

ManageEngine products to help you comply

  • Endpoint Central

    Assists companies in meeting RTS for ICT risk management and improves frameworks with enhanced endpoint privilege management.

  • AD360

    Secures business networks with phishing-resistant MFA, tracks risks, and reviews access permissions regularly.

  • Identity360

    Automates access management and uses MFA to protect data, assets, and the entire business network.

  • ServiceDesk Plus

    Ensures that every single incident response action, impact, CIs, conversation, and notes are recorded and summarised to generate detailed post-incident reviews to facilitate knowledge sharing and collective learning.

  • OpManager Plus

    Strengthens financial entities' compliance with ESAs and ENISA standards through granular access controls and proactive rogue device detection, ensuring robust ICT security and operational resilience.

  • Log360

    Enables financial institutions to manage access privileges effectively and monitor user authentication, role-based access, and anomaly detection in compliance with regulatory standards.

Article 16

Simplified ICT risk management framework

Organisations must establish an ICT risk management framework with a clear plan, continuously monitor systems, and respond quickly to risks. They should recognize their reliance on third-party providers and develop business continuity plans with backups.

Note: This article is only applicable to small, non-interconnected firms as described above. You can refer to the DORA regulation for more details.

ManageEngine products to help you comply

  • Endpoint Central

    Helps meet RTS for ICT risk management tools, methods, processes, policies, and simplified framework.

  • AD360

    Detects AD and Microsoft 365 risks, prevents breaches, and backs up data with immutability for quick recovery.

  • ServiceDesk Plus

    Assists small, non-interconnected firms enhance risk management with ITIL best practices, including incident, service request, change, and IT asset management.

  • OpManager Plus

    Maintains network integrity and simplifies ICT risk management for business continuity. Automated backups and real-time firewall monitoring ensure compliance and quick risk response.

Article 17

ICT-related incident management process

Financial entities must manage ICT-related incidents by detecting, recording, and monitoring them. Key steps include establishing early warning indicators, assigning roles, planning stakeholder communication, reporting major incidents to senior management, and developing response procedures for timely service recovery.

ManageEngine products to help you comply

  • Endpoint Central

    Provides key data to network admins or SOC team, including detection time, attack status, agent actions, and endpoint details for suspicious events like malware or ransomware.

  • Site24x7

    Detects incidents, manages responses, and notifies stakeholders with real-time monitoring and detailed reporting tools.

  • Analytics Plus

    Use AI to spot indicators early and automate workflows to notify stakeholders and address incidents swiftly.

  • ServiceDesk Plus

    Assists accelerate incident response through visual incident response workflows, intelligent triage, GenAI-powered summarization, and robust reporting and analytics.

  • OpManager Plus

    Real-time dashboards and adjustable alerts serve as early warnings. Simplify incident tracking, monitoring, and reporting for prompt service recovery with pre-set response protocols.

  • Log360

    Streamlines incident detection, classification, and resolution for financial entities with its SOAR capabilities.

  • AppCreator

    Build a repository for ICT incidents and cyberthreats. Generate reports for stakeholders to aid in impact assessments and mitigation efforts.

Article 18

Classification of ICT-related incidents and cyber threats

Financial entities must categorise ICT incidents by impact and data loss. Regulatory standards will clarify reporting for significant cybersecurity threats, aiding small enterprises.

ManageEngine products to help you comply

  • ServiceDesk Plus

    Provides condition-based and AI-driven incident classification capabilities based on which incident response workflows can be invoked.

Article 19

Reporting of major ICT-related incidents and notification of significant cyber threats

Financial entities must report major ICT incidents to a designated authority, providing detailed information for assessment and potential cross-border effects. For that, use templates from Article 20.

ManageEngine products to help you comply

  • ServiceDesk Plus

    Assists financial organisations in timely notification of authorities and stakeholders during incident response.

DORA compliance mapping

DORA compliance mapping

Check out the infographic to see how ManageEngine products can help with the various requirements for DORA compliance.

For more detailed information, download the guide.

View the infographic Download DORA guide

Resources

Ebook

Double trouble or double defense: What NIS2 and DORA mean for finance

Read more
Ebook

Your partner in navigating DORA requirements

Read more
Ebook

Achieving DORA compliance standards with privileged access management

Read more
Ebook

DORA compliance: A comprehensive guide

Read more

Get your free guide
on implementing DORA

Check out our downloadable guide for high-level insights into DORA and
how ManageEngine can help you implement most of the DORA compliance controls.

Please enter the name

By clicking ‘Download now’, you agree to the processing of personal data according to our Privacy Policy.

Disclaimer:

The complete implementation of the DORA requires a variety of processes, policy, people, and technology controls. The solutions mentioned above are some of the ways in which IT management tools help with the DORA compliance requirements. Coupled with other appropriate solutions, processes, people controls, and policies, ManageEngine's solutions can help organisations align with the DORA. Organisations must do their independent assessment of ManageEngine's features and to what extent they can help them comply with this directive. This material is provided for informational purposes only, and should not be considered as legal advice for DORA compliance. ManageEngine makes no warranties, express, implied, or statutory, as to the information in this material. Please contact your legal advisor to learn how DORA impacts your organisation and what you need to do to comply with the DORA compliance.