EU Regulation In Force

Digital Operational Resilience Act

The EU regulation establishing uniform ICT risk management requirements for the financial sector, including cryptographic key management, certificate governance, and third-party oversight.

Quick Facts

Status
In Force
Type
EU Regulation
Scope
Financial Sector ICT
Effective
Jan 2025
Supervision
ESAs (EBA, ESMA, EIOPA)

Overview

The Digital Operational Resilience Act (DORA) creates a comprehensive framework for digital operational resilience across the entire EU financial sector. It establishes uniform requirements for ICT risk management, incident reporting, resilience testing, and third-party provider oversight.

Article 9 mandates that financial entities implement cryptographic controls and key management policies as part of their ICT security framework. Article 15 requires thorough ICT risk assessments that encompass certificate infrastructure and cryptographic assets. These requirements make robust PKI governance a regulatory necessity.

DORA applies broadly to banks, insurers, investment firms, crypto-asset service providers, and — critically — critical ICT third-party providers such as cloud services and infrastructure vendors. This wide scope means that certificate management practices must be governed not only internally but also across the entire supply chain.

Key Requirements

ICT Risk Management Framework (Art. 6-16)

Financial entities must establish and maintain a comprehensive ICT risk management framework, including identification, protection, detection, response, and recovery capabilities.

Cryptographic Key Lifecycle (Art. 9.4)

Entities must implement policies and procedures for the management of cryptographic keys throughout their lifecycle, including generation, storage, distribution, rotation, and destruction.

Third-Party ICT Risk (Art. 28-44)

Financial entities must manage risks from ICT third-party providers, including contractual requirements for certificate management, security controls, and exit strategies.

Incident Reporting (Art. 17-23)

Major ICT-related incidents — including certificate-related breaches and cryptographic failures — must be classified, reported, and communicated to competent authorities within strict timelines.

Digital Operational Resilience Testing (Art. 24-27)

Entities must conduct regular testing of ICT systems, including threat-led penetration testing (TLPT) for significant institutions, covering certificate infrastructure and cryptographic controls.

Information Sharing (Art. 45)

Financial entities are encouraged to participate in cyber threat intelligence sharing arrangements, exchanging information on ICT risks, vulnerabilities, and indicators of compromise.

Key Milestones

20
2020

Proposed by European Commission

The EC proposes DORA as part of the Digital Finance Package, aiming to harmonize ICT risk management across the financial sector.

22
2022

Adopted Nov 2022

The European Parliament and Council formally adopt Regulation (EU) 2022/2554, establishing a comprehensive digital resilience framework for financial entities.

24
2024

Technical standards published

The European Supervisory Authorities (ESAs) publish detailed Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) for DORA compliance.

25
2025

Full application Jan 17, 2025

DORA becomes fully applicable across the EU. Financial entities and critical ICT third-party providers must comply with all requirements.

25+
2025+ Current

Oversight framework for critical ICT providers

The ESAs begin exercising oversight powers over designated critical ICT third-party service providers, including cloud and infrastructure vendors.

Impact on PKI & Certificates

DORA elevates certificate and key management from an operational concern to a regulatory requirement for the financial sector. Here are the critical areas:

1

Certificate Governance as Part of ICT Risk

Certificates must be inventoried and governed within the broader ICT risk management framework, with clear ownership, policies, and lifecycle controls.

2

Key Lifecycle Management per Art. 9.4

Cryptographic key management must cover the full lifecycle — from generation through distribution, storage, rotation, and secure destruction — with documented policies and procedures.

3

Certificate Infrastructure in Third-Party Risk

Third-party ICT provider assessments must include review of their certificate management practices, CA trust chains, and cryptographic security controls.

4

Incident Response for Certificate Breaches

Certificate compromises, CA breaches, and cryptographic failures must be classified and reported as ICT incidents under DORA's mandatory reporting framework.

How we help

Evertrust & DORA

Complete certificate inventory for ICT asset mapping — Discover and catalogue all certificates across your financial infrastructure, fulfilling DORA's ICT asset identification requirements.

Automated lifecycle for operational resilience — Prevent certificate-related outages with automated renewal and rotation, ensuring continuous operational resilience of critical financial systems.

Audit trails for regulatory reporting — Generate detailed certificate lifecycle logs and compliance reports ready for supervisory authority review under DORA's reporting obligations.

Multi-CA governance for third-party oversight — Manage certificates from multiple Certificate Authorities in a single pane of glass, enabling visibility into third-party ICT provider certificate practices.