Stay DORA compliant with encrypted file sharing & data management

Strengthen operational resilience across your financial data workflows. Tresorit provides a robust platform for effortless DORA compliance 💪 with end-to-end encryption and built-in tools for risk management & incident response.
01_DORA-hero

DORA – a pressing reality for the financial sector

As of 17 January, the Digital Operational Resilience Act (DORA) has moved from a compliance checklist on paper to an actionable reality.

Traditional cybersecurity measures in finance have struggled to keep pace with increasingly complex cyber attacks. In response, the EU introduced the Digital Operational Resilience Act (DORA), establishing a unified and proactive framework to cybersecurity. Prioritizing operational resilience, DORA aims to enable financial institutions to withstand, respond to, and rapidly recover from security threats.  

Digital payment, investment, insurance and crypto-asset services have become part of our everyday life. Yet behind the convenience lies a network of complex ICT systems, creating potential vulnerabilities to critical financial workflows.

Act now to close the gap in your compliance and secure the future of your financial services. 

8 essential steps to achieve DORA compliance

Build operational resilience by complying with DORA's key standards.
Dora 8 Steps DE-4-Reedited by Anna EN

DORA vs. NIS2: How they differ and where they overlap?

DORA and the NIS2 Directive (Network and Information Systems Directive) are both legislations introduced by the European Union aimed at improving cybersecurity and digital resilience across the EU. While they share common goals, they differ in scope, sectorial focus, and approaches.  

DORA is a regulation tailored specifically for the financial sector, focusing on digital resilience. It ensures that financial services – including banks, investment firms and their ICT service providers – can effectively handle, mitigate, and recover from ICT-related incidents.  

The NIS2 Directive applies to essential and important entities across multiple sectors, such as energy, transport, health, water, digital infrastructure, and some financial services. Its primarily goal is to improve the overall cybersecurity posture of the EU. 

DORA is a regulation that has binding legal force and applies uniformly across all EU Member States without requiring national transposition. 

NIS2 is a directive, which sets objectives that Member States must achieve but allows them to define how to transpose these into their national laws. This can lead to variations in implementation across Member States. 

Lex specialis rule: In cases where financial services fall under the scope of both DORA and NIS2, DORA takes precedence due to the lex specialis rule. As a result, entities must primarily adhere to DORA’s sector-specific requirements. 

DORA focuses on digital operational resilience across the financial sector by mandating measures in five key areas: ICT risk management, incident reporting, third-party risk management, operational resilience testing, and information sharing.  

NIS2 aims to strengthen the cybersecurity of all critical infrastructure and essential services by promoting supply chain security, incident handling and reporting, cyber hygiene practices, and broader risk management strategies.

DORA introduces mandatory resilience testing of ICT systems and processes. Significant entities must undergo Threat-Led Penetration Testing (TLPT) performed by independent external testers under strict regulatory oversight. This ensures systems are tested against realistic, advanced cyber threats. 

While testing is a part of the NIS2 framework as well, it is not as rigorously defined as in DORA. Instead, testing is integrated into broader risk management strategies, focusing on vulnerability assessments and system audits, with less emphasis on threat simulation. 

DORA emphasizes stringent regulation of third-party ICT providers delivering critical services to financial institutions. It mandates specific contractual requirements for service providers and direct regulatory oversight for critical ICT providers, such as cloud providers and data centers. 

NIS2 addresses third-party risk as part of supply chain security focusing on the overall security of external partners and vendors. However, it does not impose the same direct regulatory obligations on ICT providers as DORA does.

DORA aims to harmonize the reporting of ICT-related incidents, including data breaches, service disruptions, outages, and third-party ICT failures. Financial entities must submit the following reports on major incidents to their competent national financial supervisors (who may escalate major incidents to the European Supervisory Authorities):

  • Initial report: within 4 hours, but no later than 24 hours, containing a brief overview of the incident.
  • Intermediate report: Within 72 hours, with insights into the root cause, impact on the business and clients.
  • Final report: Within one month, including the final resolution, costs & losses incurred, and remediation steps.

NIS2 also establishes detailed incident reporting, but with a broader focus on any cybersecurity event that impacts critical services, such as cyberattacks, system failures, and supply chain vulnerabilities. NIS2 sets similar reporting deadlines for incidents to be submitted to the CSIRTs (Computer Security Incident Response Teams):

  • Early warning: Within 24 hours.
  • Incident notification: Within 72 hours, including an initial assessment of the incident’s impact and severity.
  • Final report: No later than one month after the incident.

Both frameworks aim to simplify reporting processes with automated workflows, templates, and user-friendly interfaces.

dora_nis2_x2

DORA FAQ

DORA (Digital Operational Resilience Act) is an EU-wide regulation enforcing strict rules for the operational resilience of financial entities and their ICT system providers. It aims to create a harmonized and secure financial ecosystem – resilient to the ever-evolving risk landscape and fit for the digital future.  

Due to the growing reliance on digital services, the EU brings a wide range of financial entities under its regulatory umbrella. If an organization participates in the financial value chain, it is likely subject to DORA. 

This includes traditional financial entities such as credit institutions and investment firms, as well as emerging service providers like crypto-asset or crowdfunding services.

DORA also applies to critical third-party ICT providers that support the financial sector, including cloud providers, data centers, and data analytics providers.

To support businesses in building a robust operational resilience framework, DORA defines 5 pillars: 

1. ICT Risk Management: Strengthening ICT risk management to minimize the impact of ICT incidents.

2. ICT Incident Reporting: Establishing processes for the identification, analysis, and reporting of ICT-related incidents.

3. Digital Operational Resilience Testing: Implementing regular resilience testing, including advanced threat-led penetration tests and attack simulations.

4. ICT Third-Party Risk Management: Ensuring robust management of third-party ICT risks through rigorous oversight, contractual compliance, and regulatory reporting obligations.

5. Information Sharing: Promoting collaboration among financial entities by exchanging threat intelligence and lessons learned.

DORA defines penalties for non-compliance, ensuring that organizations within its scope take cybersecurity and operational resilience seriously. The European Supervisory Authorities (ESAs) have the power to impose fines for non-compliance.

Organizations found in violation of DORA requirements can face fines up to 2% of their total annual worldwide turnover, depending on the severity of the violation. For individuals, the maximum penalty can reach 1 million euros.

Third-party providers deemed as critical by ESAs could incur even higher fines — up to 5 million euros.

8 essential steps to achieve compliance with DORA:

1. Conduct a gap analysis: Assess your current cybersecurity practices and policies against DORA’s compliance requirements to find any areas that need improvement.

2. Enhance third-party risk management: Devise a well-rounded strategy for managing third-party risks, including due diligence processes, to guarantee all vendors comply with DORA standards.

3. Invest in cybersecurity training: Provide ongoing cybersecurity training for all employees to build a resilient workforce and foster a culture of responsibility and awareness.

4. Implement robust incident response plans: Establish or update incident response plans to ensure quick and effective action in the event of a cyber threat or breach.

5. Foster collaboration and information sharing: Join industry groups or forums to facilitate sharing of threat intelligence and best practices within the financial sector.

6. Review and update IT infrastructure: Make certain that IT systems and infrastructure are up to date, secure, and capable of withstanding cyber threats in line with DORA requirements.

7. Engage with regulatory authorities: Stay informed about the latest guidance from regulatory bodies regarding DORA’s implementation and seek clarification when necessary.

8. Allocate resources appropriately: Ensure that sufficient resources, including budget and skilled personnel, are allocated to meet DORA compliance objectives efficiently.

DORA and the NIS2 Directive (Network and Information Systems Directive) are both legislations introduced by the European Union aimed at improving cybersecurity and digital resilience across the EU. While they share common goals, they differ in scope, sectorial focus, and approaches.  

1. Scope and targeted entities 

DORA is a regulation tailored specifically for the financial sector, focusing on digital resilience. It ensures that financial services – including banks, investment firms and their ICT service providers – can effectively handle, mitigate, and recover from ICT-related incidents.  

The NIS2 Directive applies to essential and important entities across multiple sectors, such as energy, transport, health, water, digital infrastructure, and some financial services. Its primarily goal is to improve the overall cybersecurity posture of the EU. 

2. Regulation vs Directive: 

DORA is a regulation that has binding legal force and applies uniformly across all EU Member States without requiring national transposition. 

NIS2 is a directive, which sets objectives that Member States must achieve but allows them to define how to transpose these into their national laws. This can lead to variations in implementation across Member States. 

Lex specialis rule: In cases where financial services fall under the scope of both DORA and NIS2, DORA takes precedence due to the lex specialis rule. As a result, entities must primarily adhere to DORA’s sector-specific requirements. 

 3. Objectives and measures: 

DORA focuses on digital operational resilience across the financial sector by mandating measures in five key areas: ICT risk management, incident reporting, third-party risk management, operational resilience testing, and information sharing.  

NIS2 aims to strengthen the cybersecurity of all critical infrastructure and essential services by promoting supply chain security, incident handling and reporting, cyber hygiene practices, and broader risk management strategies.

4. Operational resilience testing: 

DORA introduces mandatory resilience testing of ICT systems and processes. Significant entities must undergo Threat-Led Penetration Testing (TLPT) performed by independent external testers under strict regulatory oversight. This ensures systems are tested against realistic, advanced cyber threats. 

While testing is a part of the NIS2 framework, it is not as rigorously defined as in DORA. Instead, testing is integrated into broader risk management strategies, focusing on vulnerability assessments and system audits with less emphasis on threat simulation. 

5. Third-party risk management: 

DORA emphasizes stringent regulation of third-party ICT providers delivering critical services to financial institutions. It mandates specific contractual requirements for service providers and direct regulatory oversight for critical ICT providers, such as cloud providers and data centers. 

NIS2 addresses third-party risk as part of supply chain security focusing on the overall security of external partners and vendors. However, it does not impose the same direct regulatory obligations on ICT providers as DORA does.

6. Incident Reporting:

DORA aims to harmonize the reporting of ICT-related incidents, including data breaches, service disruptions, outages, and third-party ICT failures. Financial entities must submit the following reports on major incidents to their competent national financial supervisors (who may escalate major incidents to the ESAs):

  • Initial report: within 4 hours, but no later than 24 hours, containing a brief overview of the incident.
  • Intermediate report: Within 72 hours with insights into the root cause, impact on the business and clients.
  • Final report: Within one month, including the final resolution, costs & losses incurred, and remediation steps.

NIS2 also establishes detailed incident reporting, but with a broader focus on any cybersecurity event that impacts critical services, such as cyberattacks, system failures, and supply chain vulnerabilities. NIS2 sets similar reporting deadlines for incidents to be submitted to the CSIRTs (Computer Security Incident Response Teams):

  • Early warning: Within 24 hours.
  • Incident notification: Within 72 hours including an initial assessment of the incident’s impact and severity.
  • Final report: No later than one month after the incident.

Both frameworks aim to simplify reporting processes with automated workflows, templates, and user-friendly interfaces.

Fast-track your compliance – meet critical DORA requirements with Tresorit

⚙️ ICT risk management framework, systems, protocols & tools

Efficiently design and implement an ICT risk management framework — with a multi-certified platform. Tresorit offers a redundant, scalable infrastructure secured with E2EE. With embedded tools, controls, and policies, it has been built for hassle-free risk mitigation. (Art. 5, 6, 7, 8)

🔎 Identification & detection

Get full visibility into your internal and external data flows at a granular level. Tresorit empowers you to proactively assess data activities, detect anomalies, and respond swiftly. Leverage powerful control tools: detailed access logs, link tracking, central user and asset monitoring, as well as SIEM integration. (Art. 8, 10)

🔐 ICT protection and prevention

Safeguard your sensitive financial workflows with the highest standards of data privacy. With zero-knowledge end-to-end encryption, unauthorized access to your files is impossible — even for Tresorit. Flexibly adapt access controls at the user/folder/file level, ensuring the principle of least privilege at every moment of your data activity. (Art. 9)

🔄 Response and recovery, backup policies and procedures

Keep your financial workflows running even during incidents. Tresorit strengthens your incident response plans and business continuity with redundant storage, secure cloud backups, and recovery tools. Reconcile data using version history. Manage restoration checks with activity logs. And bounce back quickly after incidents. (Art. 11, 12)

💬 Communication

Protect your incident-related communications with robust end-to-end encryption. Encrypted emails & attachments with granular access rights help you control the information flow with clients, regulators, and other stakeholders — both internally and externally. (Art. 14)

⚠️ Incident management, classification, and reporting

Proactively manage incidents by empowering your admins with Tresorit’s Admin Center and SIEM integration. With advanced monitoring and reporting tools, you can detect suspicious activities, enforce policies, and customize them flexibly. Standardize your incident reporting using secure communication channels and exportable reports. (Art. 17, 18, 19, 20, 21)

Stay DORA-ready starting at the data level

With Tresorit’s zero-knowledge end-to-end encrypted platform.

One platform, multiple benefits

Security-Reward-check

Automatic end-to-end encryption & zero-knowledge

that your employees, clients, and partners cannot bypass and bad actors will never be able to exploit.
Product-QeSign

One platform for secure storing, sharing & signing

that have been built for securing your entire financial file management lifecycle – without risky system switches.
Cloud-Share

Utmost security for external & internal file sharing

that helps you facilitate risk-free collaboration with your teams, clients, regulatory bodies, and other organizations.
Compliance-GDPR

A platform designed for compliance

that has proven to be the perfect choice for the strictest regulatory requirements – GDPR, HIPAA, FINRA, ISO 27001 as well as NIS2 & DORA.
Reaction-Sparkles

Intuitive interface & integrations

that naturally adapt to your work style while supporting secure work habits – whenever you touch on a sensitive document.
System-Switches

Strong access, sharing & admin controls at your fingertips

that empower you to regain control over your data flow, supervise who and when can access your content, and detect suspicious events in-time.
DORANIS2GDPRTÜVFINRA

Tresorit for finance – operational excellence with secure file management & collaboration

As your clients and partners demand seamless data exchange, security isn’t just a matter of trust – it’s a regulatory obligation under DORA.

Tresorit lightens your compliance burden with an encrypted, user-friendly platform – designed to meet your operational needs while delighting your clients & partners.

Transform your financial workflows with our DORA-ready solutions for secure storage, file sharing, and data room collaboration. 

04_DORA_and_Finance-1

How our finance customers secure digital transformation

"Tresorit makes it easy for us to exchange files with our external partners without the need to always create links. Our partners can access the necessary files provided by us directly and easily in Tresorit – and so can we."

Dario Amrhein, IT Manager at Obwaldner Kantonalbank
Read their story
01_Obwaldner@2x

"I prefer not to send customers’ businesses and financial data via email. [It] is not secure. Sharing data using secure infrastructure like Tresorit is a better way."

Edi Platter, Consultant at Raiffeisen Unternehmerzentrum
Read their story
02_Raiffeisen@2x

"We need to have this extra layer of security when it comes to certain topics and handling personal data, we do it with Tresorit."

Raza Perez, Strategic Operations Lead at Trade Republic
Read their story
03_Trade_Republic@2x

Ready to streamline DORA compliance and boost operational agility?

Company-wide and beyond.