What is DORA?

The Digital Operational Resilience Act (DORA, Regulation EU 2022/2554) is an EU Regulation that has applied to the entire financial sector since January 2025. The objective: financial undertakings must systematically ensure their digital operational resilience — not just on paper but in an operationally demonstrable manner.

Who does DORA affect? #

DORA applies to 21 categories of financial undertakings (Art. 2(1)), including:

Additionally affected: ICT third-party service providers — i.e. all IT, cloud, and software suppliers working for financial undertakings.

What does DORA specifically require? #

DORA demands comprehensive ICT risk management. For open source components, the following are particularly relevant:

For severe incidents, a first notification deadline of 4 hours applies (Art. 19(4a)).

What are the consequences of non-compliance? #

Implementation in Germany #

DORA is an EU Regulation and applies directly in all Member States — no national transposition is required. In Germany, BaFin is the competent supervisory authority. DORA supplements existing regulation through MaRisk and BAIT and tightens the requirements for ICT risk management and third-party oversight in particular. Financial undertakings already subject to DORA are exempt from the obligations under the NIS2 Implementation Act (§ 28(6) NIS2UmsuCG). Other EU countries have different supervisory structures.

What does this mean for you? #

If you manage a financial undertaking or provide IT services for the financial sector, you are obliged to know, monitor, and document your entire software supply chain. Open source components in your SBOM are no exception — they are an explicit subject of examination. Responsibility for this cannot be delegated: it lies personally with the management body.

Important: The supply chain does not only include components that end up in your final product. Development dependencies — compilers, build tools, test frameworks, CI/CD pipelines — also fall under the obligations. Art. 25(1) mandates open source analyses as a required test, Art. 8(4-6) requires the inventory of all ICT assets including dependencies. A compromised build tool can inject malicious code into your final product without a single runtime dependency being affected.

Further reading #

Download factsheet: DORA factsheet (PDF)

Want to know how OTTRIA covers your DORA obligations in the open source domain? Arrange an initial consultation.