DORA - Relevant Articles

Regulation (EU) 2022/2554 of the European Parliament and of the Council of 14 December 2022 on digital operational resilience for the financial sector (Digital Operational Resilience Act - DORA). The Regulation is directly applicable in all EU Member States. Below, only those articles are reproduced in their official English wording that are particularly relevant to the assessment of open-source software risks in the financial sector.

The selection focuses on articles concerning ICT risk management, the identification of dependencies, testing obligations (including the explicitly required open-source analyses in Art. 25(1)), the management of ICT third-party risk and the sanctions regime. Each section is thematically organised and accompanied by a brief contextual explanation.

Governance und Organisation (Art. 5) #

Art. 5 establishes the responsibility of the management body for the entire ICT risk management framework. Senior management must not merely delegate ICT risks but must itself understand, approve and oversee them. This expressly includes the digital operational resilience strategy, budget allocation and the oversight of ICT third-party service providers.

Art. 5 Abs. 2 #

Art. 5 Abs. 4 #

IKT-Risikomanagementrahmen (Art. 6) #

The ICT risk management framework forms the structural foundation for all further DORA obligations. It must encompass strategies, procedures and tools that protect all ICT assets, including open-source software components.

Art. 6 Abs. 2 #

Identifizierung (Art. 8) #

Art. 8 mandates a complete inventory of all ICT assets and their dependencies. For open-source components this means: every dependency must be recorded, its configuration documented and its connections to other assets traced. Regular risk assessments, particularly for legacy systems, are mandatory.

Art. 8 Abs. 4 #

Art. 8 Abs. 5 #

Art. 8 Abs. 6 #

Art. 8 Abs. 7 #

Schutz und Prävention (Art. 9) #

Art. 9(4) requires documented policies for change management and patch management. For open-source components this means: every update to a dependency must be recorded, tested and approved in a controlled manner. Documented patch policies are expressly prescribed.

Art. 9 Abs. 4 #

Erkennung (Art. 10) #

The detection obligation goes beyond mere CVE scanning: financial entities must promptly detect anomalous activities and material single points of failure. Detection mechanisms must be regularly tested, which creates the link to the testing obligations in Art. 25.

Art. 10 Abs. 1 #

Lernprozesse und Weiterentwicklung (Art. 13) #

Art. 13 requires active capabilities for gathering and assessing vulnerability information. For the open-source supply chain this means: not just scanning, but analysing the results, assessing impacts and learning from them. The annual reporting obligation to the management body ensures that findings reach leadership level.

Art. 13 Abs. 1 #

Art. 13 Abs. 5 #

Kommunikation (Art. 14) #

The communication obligation includes responsible disclosure of vulnerabilities to clients and the public. This corresponds to the responsible-disclosure process in the open-source world.

Art. 14 Abs. 1 #

Meldung IKT-bezogener Vorfälle (Art. 19) #

Art. 19 obliges financial entities to report major ICT-related incidents to the competent authority - with initial notification, intermediate report and final report within fixed time limits.

Art. 19 Abs. 1 #

---

Art. 19 Abs. 4 #

Testen der digitalen operationalen Resilienz (Art. 24, 25) #

Art. 24 and 25 form the core of DORA's testing obligations. Art. 25(1) explicitly names open source analyses as one of the prescribed testing methods. This is the most explicit legal requirement for a systematic assessment of open-source components in all EU regulation.

Art. 24 Abs. 6 #

---

Art. 25 Abs. 1 #

Art. 25 Abs. 2 #

IKT-Drittparteienrisiko (Art. 28) #

Art. 28 comprehensively regulates the management of risks arising from ICT third-party service providers. For open-source dependencies this is particularly relevant: every open-source component can be considered an ICT third-party risk. The articles require due diligence in selection, ongoing monitoring, exit strategies and documented information registers.

Art. 28 Abs. 1 #

Art. 28 Abs. 2 #

Art. 28 Abs. 3 #

Art. 28 Abs. 4 #

Art. 28 Abs. 5 #

Art. 28 Abs. 7 #

Art. 28 Abs. 8 #

Befugnisse der federführenden Überwachungsbehörde (Art. 35) #

The oversight authority can impose periodic penalty payments of up to 1% of average daily worldwide turnover for non-compliance. Imposed penalty payments are generally made public.

Art. 35 Abs. 8 #

Art. 35 Abs. 10 #

Verwaltungsrechtliche Sanktionen und Abhilfemaßnahmen (Art. 50) #

Art. 50 defines the sanctions toolkit of the authorities. Measures range from cease-and-desist orders to pecuniary measures to public statements. Personal liability of members of the management body is also provided for.

Art. 50 Abs. 3 #

Art. 50 Abs. 4 #

Art. 50 Abs. 5 #

Öffentliche Bekanntmachung verwaltungsrechtlicher Sanktionen (Art. 54) #

Sanction decisions are published on the official websites of the authorities, including the identity of the persons responsible. Publication remains for up to five years.

Art. 54 Abs. 1 #

Art. 54 Abs. 2 #

Art. 54 Abs. 6 #

Full Text of the Regulation #

The full text of Regulation (EU) 2022/2554 is published in the Official Journal of the European Union (OJ L 333, 27.12.2022) and can be accessed via EUR-Lex:

DORA Factsheet