DORA: Establishing a Shared Understanding Across ICT, Risk, Internal Audit and External Assessors

A Landmark Moment for DORA
The designation of these providers is more than symbolic — it marks the beginning of direct EU-level oversight, including supervisory inspections, information requests, remediation expectations and pan-European coordination.
What designation does not mean for financial entities (FEs):
-
It does not relieve FEs of responsibility for ICT risk management (Articles 5–15).
-
It does not replace due diligence, monitoring, contractual governance, or exit strategy planning.
-
It does not guarantee resilience for any FE using a CTPP.
What designation does mean:
-
Systemically important ICT providers will now face EU-level supervision.
-
FEs must understand and incorporate CTPP oversight into their own third-party risk management (Chapter V).
-
FEs should expect more structured expectations around supply-chain transparency, risk reporting, and incident communication.
This development has rightly captured the attention of boards, CIOs, CROs and Internal Audit functions across Europe.
"Yet, working closely with financial institutions throughout 2024–2025, I am seeing a second issue of equal importance emerging — one that receives far less public attention but is now affecting operational resilience programmes every day:
A widening misalignment of interpretation between ICT, Internal Audit, external consultants, Risk, and the management body regarding what DORA actually requires — and how it should be evidenced.
The remainder of this article aims to reset that understanding." Paul C Dwyer
DORA Is Broader Than ICT — and No Single Function Can Cover It Alone
DORA is sometimes assigned to the CIO because of its ICT focus, but the Regulation’s scope is considerably broader.
Article 5 — Management Body Responsibilities
The management body “shall bear the ultimate responsibility for managing the ICT risk of the financial entity.”
This immediately places DORA at the enterprise level, not within a single technological silo.
Articles 6–7 — ICT Governance and Strategy
These Articles require integration of ICT risk into the overall risk management framework, which includes:
-
Risk
-
Compliance
-
Finance
-
Internal Audit
-
Operational leadership
-
Senior executive management
Articles 10–12 — Incident Detection, Response, Recovery
These obligations involve:
-
ICT Security
-
Security Operations
-
Crisis Management
-
Communications
-
Business Continuity
-
Senior leadership engagement
Chapter V — ICT Third-Party Risk
This chapter requires joint involvement from:
-
Procurement
-
Legal
-
Vendor management
-
ICT
-
Risk
-
Compliance
Conclusion:
A CIO cannot reasonably be expected to represent or evidence DORA in its entirety.
DORA is a cross-functional organisational framework with ICT as one important component.
RTS and ITS Are Essential — But Not Prescriptive Checklists
The Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) are crucial.
They provide:
-
classification criteria
-
templates and formats
-
additional detail
-
technical clarifications
However, ESAs consistently describe RTS as:
-
“further specifying” or
-
“supplementing”
-
“providing additional detail to”
the underlying Regulation.
They are not standalone checklists replacing the principle-based structure of DORA.
Why RTS-only assessments create problems
If RTS are treated as a standalone checklist:
-
Broader governance and management-body requirements (Articles 5–7) are under-captured
-
Proportionality (Article 4) is not applied
-
Controls are evaluated for existence, not operational effectiveness
-
The scope can skew toward ICT without capturing organisational context
-
Internal Audit and ICT may assess different things with different assumptions
-
Maturity, repeatability and governance cannot be meaningfully assessed
RTS criteria are essential — but only within a wider framework.

Why Frameworks Such as NIST CSF 2.0 Help Align All Stakeholders
European regulators do not “endorse” a specific cybersecurity framework.
However, NIST CSF appears repeatedly across Level 2 and Level 3 supervisory materials, making it a widely recognised reference.
This matters because it explains why so many financial entities, Internal Audit functions and external assessors use NIST CSF 2.0 to structure DORA evidence.
Where NIST CSF Is Referenced in European Regulatory Materials
A. ESAs – Joint Consultation on ICT Risk Management (2019)
NIST CSF is cited as a widely used cybersecurity framework in the consultation informing the EBA/ESMA/EIOPA ICT Guidelines that evolved into DORA’s RTS.
B. ENISA Guidance
ENISA refer to NIST CSF in:
-
Financial Sector Cybersecurity Good Practices
-
Threat Landscape Reports
-
SME Security Guidance
It is presented as a commonly used framework across the EU.
C. ECB – Cyber Resilience Oversight Expectations (CROE)
CROE states alignment with:
-
NIST Cybersecurity Framework
-
CPMI-IOSCO cyber guidance
-
ISO/IEC standards
CROE is widely used by NCAs to interpret operational resilience maturity.
D. National Competent Authorities
-
Central Bank of Ireland — references NIST CSF in supervisory speeches as an established framework for ICT risk management.
-
DNB (Netherlands) — references NIST CSF in sectoral cyber guidelines.
-
BaFin (Germany) — references NIST CSF in digital resilience commentary.
These references show that NIST CSF is legitimately and safely used by financial entities, auditors and assessors to structure ICT resilience.
Why NIST CSF 2.0 Specifically Helps
NIST CSF 2.0 adds a new top-level function:
GOVERN (GV)
This aligns directly with:
-
Article 5 (management-body accountability)
-
Articles 6–7 (governance and integration)
-
Chapter V (oversight and outsourcing governance)
-
Article 12 (resilience and continuity governance)
The remaining functions — Identify (ID), Protect (PR), Detect (DE), Respond (RS), Recover (RC) — map cleanly to Articles 6–15 and the RTS on ICT risk management.
Frameworks such as NIST CSF do not replace the RTS.
They provide a:
-
structured
-
maturity-based
-
internationally recognised
-
governance-aligned
way of interpreting DORA in a manner that ICT, Risk, Internal Audit and the Board can all understand consistently.
Proportionality: Central to DORA and Often Misunderstood
Proportionality appears repeatedly throughout DORA — particularly in:
-
Article 4, and
-
the RTS on ICT Risk Management
However, DORA does not prescribe how proportionality should be calculated. A structured approach helps all stakeholders (ICT, Risk, IA, external assessors, management body) align.
Example: Applying Proportionality in Practice
Fictitious Financial Entity: EuroPay Digital Services (EDS)
EDS is:
-
a mid-sized payment institution
-
operating in two Member States
-
cloud-hosted
-
reliant on two ICT providers
-
exposed to fraud and credential-theft risk
-
providing near-real-time services
Proportionality Model (4 Levels → 4 NIST CSF Tiers)

The Three Lines Model: How Each Line Aligns With DORA and Why Frameworks Help
DORA’s multi-domain structure fits naturally into the Three Lines Model.
First Line: Operational Management (ICT, Ops, Vendor Mgmt.)
Responsible for:
-
operating ICT controls
-
monitoring incidents
-
managing third-party relationships
-
executing resilience tests
-
implementing recovery plans
How NIST CSF helps:
Provides a roadmap of capabilities (GV, ID, PR, DE, RS, RC) that the First Line must operate.
Second Line: Risk and Compliance
Responsible for:
-
defining risk appetite
-
overseeing ICT risk management
-
challenging proportionality
-
monitoring third-party risk
-
ensuring governance integration
How NIST CSF helps:
Provides maturity criteria to assess whether First Line controls match inherent risk.
Third Line: Internal Audit
Responsible for:
-
independent assurance
-
reviewing proportionality
-
validating governance and oversight
-
assessing completeness and accuracy of reporting
How NIST CSF helps:
Gives IA a neutral, structured basis for evaluating capability and maturity — beyond binary RTS criteria.
A Shared Understanding Is Essential for DORA Success
With the designation of CTPPs now in effect, the supervisory landscape is evolving rapidly.
However, true resilience — the kind DORA intends — depends on consistent interpretation across ICT, Risk, Compliance, Internal Audit, external assessors and the management body.
Achieving that requires:
-
recognising that DORA is enterprise-wide, not ICT-only
-
using RTS as detailed guidance, not as standalone checklists
-
applying internationally recognised frameworks such as NIST CSF 2.0 for structure and maturity
-
adopting a clear, defensible proportionality method
-
aligning each of the Three Lines of Defence to shared expectations
This approach creates clarity, reduces friction, strengthens governance, and ensures that financial entities can confidently demonstrate digital operational resilience — not just compliance.

HEAD OFFICE
-
ICTTF Ltd
Unit 8, Kinsealy Business Park,
Kinsealy Lane,
Malahide,
Co Dublin
K36 CX92 -
info@icttf.org
support@icttf.org -
+353 (0)1 905 3263
