DORA Reporting Requirements: An Exhaustive List

DORA Reporting Requirements header

If your organisation is subject to DORA and you’re wondering how to navigate the regulation’s stringent reporting requirements, you’re in the right place.

When you think of DORA reporting requirements, you might immediately skip to the “ICT-Related Incidents Management, Classification and Reporting” pillar. But, there are actually reporting requirements you need to be aware of in the other pillars of DORA, too.

We break them down below.

DORA Reporting Requirements for Financial Entities

We’ve laid out the reporting obligations, timelines, and report recipients in a table here:

Table 1@2x

Below, we provide more details on the reporting obligations set out by DORA for covered financial entities, broken down by DORA pillars.


Under the ‘ICT risk management’ pillar, financial entities need to…

Produce ICT risk management framework review reports

This report should reflect the findings from regular reviews of your “sound, comprehensive, and well-documented ICT risk management framework.”

→ Delivered to: The competent authority upon request.

Report on ICT incident costs and losses

Report an estimation of aggregated annual costs and losses caused by major ICT-related incidents.

→ Delivered to: The competent authority upon request.

Share ICT resilience and incident insights

Senior ICT staff must report yearly insights from digital resilience testing, real-life incidents (e.g., cyber-attacks), and business continuity challenges. These findings, which should continuously inform updates to the ICT risk management framework, should be accompanied by actionable recommendations.

→ Delivered to: The management body at least yearly.


Under the ‘ICT-related incident management, classification and reporting’ pillar, financial entities need to…

Report major ICT-related incidents (to senior management)

Report at least major ICT-related incidents, explaining the impact, response and additional controls that need to be established as a result of these incidents.

→ Delivered to: Senior management.

Classify and access ICT incident impact

Classify ICT-related incidents and determine their impact based on the following criteria:

→ Delivered to: Primarily for internal use, but also helps with reporting major incidents to the relevant competent authority (as described below).

Report major incidents (to the relevant competent authority)

Submit several reports (initial, intermediate, and final - more information on this below) in the event of a major ICT-related incident.

General information that must be provided in all reports includes the following:

Initial report

The initial report must include at least the following information about the incident:

Timeline: As early as possible, within 4 hours from when the incident is classified as major, but no later than 24 hours from when you become aware of the incident.

Intermediate report

The intermediate report must include at least the following information about the incident:

Timeline: No later than 72 hours from the submission of the initial report, even if there were no changes in the incident’s status or handling. When regular activities recover, another report needs to be submitted without undue delay and show what recovery and final actions were taken.

Final report

The final report must include the following information about the incident:

Timeline: No later than one month after you submitted the latest updated intermediate report.

→ All reports to be delivered to: Relevant competent authority.

Report significant cyber threats (voluntary)

Financial entities can report significant cyber threats to the financial system, service users, or clients if they want to.

Reports should contain the following information:

→ Delivered to: Relevant competent authorities.


Under the ‘Managing of ICT third-party risk’ pillar, financial entities need to…

Maintain ICT contractual registers

Maintain an up-to-date register of all contracts with ICT third-party service providers at entity, sub-consolidated, and consolidated levels.

→ Delivered to: Competent authorities upon request, either in full or in specified sections, along with any additional information needed for effective supervision. A template is available here.

*Worth noting: During the 2024 Dry Run exercise on reporting the registers of information under the Digital Operational Resilience Act (DORA), 10,000 TPPs were identified, and 25,000 contractual arrangements were reported. Just 6.5% of submitted registers passed all data quality checks. On the other hand, 50% failed fewer than 5 out of 116 data quality checks. So, while initial submissions show promise, significant improvements are necessary to meet the 2025 requirements.


Under the ‘Information sharing arrangements’ pillar, financial entities need to…

Notify of participation in information-sharing arrangements

Upon validation of membership and of membership cessation.

→ Delivered to: Competent authorities.


DORA Reporting Requirements for Critical Third-Party Providers (CTPP)

For critical third-party providers (CTPP) and third-party providers that want to be designated as such, all reporting requirements fall under the DORA pillar of ‘Managing of ICT third-party risk.’

Again, we summarise these requirements in a table here and explain each requirement in more detail below.

Table 2@2x

Submit a reasoned statement

The statement should include any relevant information for the purposes of the assessment.

→ Delivered to: The Lead Overseer within 6 weeks from the date of the notification.

→ Follow up: Within 6 weeks from the date of the notification. The Lead Overseer will consider the statement and may request additional information, which the CTPP will need to submit within 30 calendar days.

Inform financial entity clients about the designation

This is to ensure financial entities are aware of the CTPP designation and its implications for oversight and compliance under DORA.

→ Delivered to: All financial entities that use the services of the designated provider.

Notify of management structure changes (for subsidiaries)

CTPPs that establish a subsidiary in the EU within 12 months of their designation must notify the Lead Overseer of any changes to the subsidiary’s management structure.

→ Delivered to: The Lead Overseer overseeing the CTPP.


Submit a reasoned statement addressing impact of oversight plan on customers not subject to DORA

Upon receiving the draft oversight plan, the CTPP can submit a reasoned statement that:

1) Provides evidence of the plan’s expected impact on non-regulated customers.

2) Proposes solutions to reduce or mitigate any risks identified.

→ Delivered to: The Lead Overseer responsible for the oversight plan within 15 calendar days of receiving the draft oversight plan.

Provide subcontracting information

Provide details about their subcontracting arrangements related to services provided to financial entities.

→ Delivered to: The Lead Overseer. A template is referred to in Article 41(1), point (b).


Submit a reasoned statement addressing impact of oversight plan on customers not subject to DORA

The Lead Overseer must allow CTPPs to submit:

  1. Evidence showing how oversight activities may affect customers outside the scope of DORA.
  2. Potential solutions to mitigate potential risks to those customers.

→ Delivered to: The Lead Overseer within 30 calendar days of request from the Lead Overseer.


Supply information the Lead Overseer requires to enable it to carry out its duties

Representatives of the CTPPs, including lawyers authorised to act, shall supply all information requested by the Lead Overseer to enable it to fulfil its oversight duties.

The information requested can include:

→ Delivered to: The Lead Overseer, upon request.


Respond to Lead Overseer recommendations

Respond to recommendations issued by the Lead Overseer, saying that they will either:

→ Delivered to: The Lead Overseer within 60 calendar days of receiving the recommendations issued by the Lead Overseer.


Submit a reasoned application for CTPP designation (voluntary)

ICT Third-Party Providers (TPPs) that wish to be designated as Critical Third-Party Providers (CTPPs) must submit a reasoned application.

→ Delivered to: The appropriate authority (EBA, ESMA, or EIOPA). The respective authority, through the Joint Committee, will evaluate the application and decide on the designation.


Need Help Complying with DORA? SECFORCE Can Help

SECFORCE is a consultancy firm specialising in DORA, with vast experience assisting financial institutions and businesses in managing compliance processes, including those required under DORA.

Contact us for support with your DORA compliance journey.

You may also be interested in...

CBEST Implementation Guide 2024 Update
March 20, 2024

CBEST Implementation Guide: What’s New In 2024

A refresher on the overall CBEST process and a quick summary of the updates for 2024.

See more
Visual-Portada-Pen-Test-vs-Vul-Scan
Sept. 3, 2024

Pen Test vs Vulnerability Scan: How to Tell the Difference and Why It Matters

This blog post goes deeper into why understanding the use cases for a pen test vs a vulnerability scan matters.

See more