DORA Knowledge Base
Authoritative guides, templates, and regulatory references to help you understand and implement DORA compliance — no registration required.
Regulation & Technical Standards
Primary source summaries and RTS/ITS references
DORA Article-by-Article Summary
Plain-language breakdown of all 64 DORA articles. Covers scope, governance, ICT risk management, incident reporting, testing, third-party risk, and intelligence sharing — with direct compliance implications for each entity type.
Covers
RTS on TLPT (Joint ESA Standard)
Summary of the Joint Regulatory Technical Standards specifying requirements for Threat-Led Penetration Testing under DORA Article 26(11). Covers tester qualifications, threat intelligence requirements, scope assessment, and mutual recognition.
Covers
RTS on ICT Incident Classification
EBA/ESMA/EIOPA Joint RTS defining criteria for classifying ICT incidents as "major" under DORA Article 18. Includes materiality thresholds, client impact assessment, and reporting timeline obligations.
Covers
RTS/ITS on ICT Third-Party Risk
Regulatory technical standards for ICT third-party risk management under DORA Articles 28–30. Covers mandatory contractual provisions, register of information format, and the oversight framework for critical ICT providers.
Covers
Implementation Guides
Practical how-to guides for each DORA pillar
Building Your ICT Risk Management Framework
Step-by-step guide to implementing a DORA-compliant ICT risk management framework under Articles 5–16. Covers governance structure, risk appetite, asset management, and business continuity planning.
Covers
TLPT Programme Planning Guide
End-to-end guide for planning and executing your first DORA-compliant Threat-Led Penetration Test. Covers pre-engagement scoping, threat intelligence gathering, provider selection, execution, and supervisory reporting.
Covers
DORA Incident Response Playbook
Practical playbook for managing ICT-related incidents in compliance with DORA Articles 17–23. Includes classification decision trees, notification workflows, and template communications for competent authorities.
Covers
ICT Third-Party Due Diligence Framework
How to build a proportionate third-party ICT risk management programme under DORA Article 28. Covers provider risk tiering, onboarding due diligence, ongoing monitoring, and exit strategy planning.
Covers
Templates & Checklists
Ready-to-use tools for your compliance programme
TLPT Provider RFP Template
Ready-to-use Request for Proposal template for selecting a DORA-compliant TLPT testing provider. Includes evaluation criteria aligned with DORA Article 26 tester requirements and TIBER-EU standards.
Covers
ICT Third-Party Provider Register
Excel-compatible template for maintaining your DORA-compliant ICT third-party service provider register (Article 28). Pre-mapped to the mandatory fields required by the RTS on ICT third-party risk.
Covers
ICT Incident Classification Flowchart
Visual decision tool for determining whether an ICT incident qualifies as "major" under DORA Article 18 and the classification RTS. Walk through the materiality thresholds step-by-step.
Covers
DORA Gap Assessment Spreadsheet
Comprehensive spreadsheet for conducting your own DORA compliance gap assessment. Covers all five pillars across 180+ control points with a traffic light scoring system.
Covers
Testing & TLPT
Guides to DORA's digital operational resilience testing requirements
TIBER-EU Framework Explained
Clear explanation of the TIBER-EU framework (ECB, 2018, updated 2021) and its relationship to DORA TLPT requirements. How TIBER-XX national variants relate to DORA Article 26 mutual recognition.
Covers
DORA Testing Hierarchy: What You Need
Not all testing is equal under DORA. This guide explains the full testing hierarchy — from basic vulnerability scans to full TLPT — and maps requirements to entity types and sizes.
Covers
Red Team vs. TLPT: Key Differences
Understanding the distinction between a conventional red team exercise and a DORA-compliant Threat-Led Penetration Test. Critical for procurement, scoping, and supervisory reporting.
Covers
Need a Qualified TLPT Provider?
We match financial entities with vetted TLPT providers that meet DORA Article 26 tester requirements.
Find a TLPT ProviderDORA Glossary
Key terms and abbreviations used in DORA and its technical standards.
Digital Operational Resilience Act — EU Regulation 2022/2554, applicable from 17 January 2025.
Threat-Led Penetration Testing — advanced adversarial testing of critical functions using real-world threat intelligence.
Threat Intelligence-Based Ethical Red Teaming — ECB framework that informs and is partly satisfied by DORA TLPT.
Regulatory Technical Standard — binding delegated acts specifying DORA requirements in detail, published by the ESAs.
Implementing Technical Standard — specifies uniform formats and procedures; complementary to RTS.
European Supervisory Authorities — EBA, ESMA, and EIOPA, jointly responsible for DORA technical standards.
Critical Third-Party Provider — ICT providers designated as critical by ESAs, subject to direct oversight.
Information and Communication Technology — systems, infrastructure, and services covered by DORA.
Official Regulatory Sources
Primary source documents from European regulatory authorities.
DORA Official Text (EUR-Lex)
Full text of Regulation (EU) 2022/2554 as published in the Official Journal.
TIBER-EU Framework
The TIBER-EU implementation guide for threat-led red team testing.
EBA DORA Policy Products
All EBA technical standards, guidelines, and Q&As related to DORA.
ESMA DORA Resources
ESMA technical standards and guidance for investment firms and CCPs.
Need Expert Guidance?
Our network of DORA specialists can answer your specific compliance questions, conduct formal gap assessments, and connect you with the right testing providers.