Mapping Critical or Important Functions (CIFs) Under DORA

Share:

General Counsel

Updated

Mar 20, 2026

7 min. read

Mapping Critical or Important Functions (CIFs) Under DORA

Share:

Mapping Critical or Important Functions (CIFs) Under DORA

In this article

Most teams don’t struggle to produce a first pass at function mapping. The friction shows up later, when someone asks a very plain question: why is this function critical, what actually breaks, and how fast does that turn into a regulatory problem. That is usually where the logic starts to thin out.

Under DORA, critical or important functions (CIFs) are those where disruption would materially impair financial performance, service continuity, or compliance with authorisation conditions, as defined in Regulation (EU) 2022/2554 on digital operational resilience for the financial sector. Firms must also record the assessment, the reasons, and the assessment date in the register, as required by Commission Implementing Regulation (EU) 2024/2956 on the RoI templates.

Mapping CIFs sits inside the broader structure of how the DORA register of information is designed and used in practice, but the pressure point is always the same: define the function clearly, test what happens when it breaks, and record enough detail to explain the decision.

Function definitions fail quietly, then all at once

Most CIF problems start with unstable function boundaries.

DORA leaves room for firms to define functions according to their internal organisation, but those definitions are still recorded in a structured way, tied to the financial entity, a function identifier and name, and—where relevant—a licensed activity.

The flexibility is useful, but it creates drift. A function starts as “payments processing,” then absorbs reconciliation, then partially splits when systems change. The label stays. The meaning shifts. The CIF decision does not get revisited.

That is where reviews start to bite.

What a function entry needs to stay usable

FieldWhat it capturesWhy it matters
PurposeOne-sentence description of the functionAnchors the definition
In scopeIncluded activities or servicesPrevents silent expansion
Out of scopeExplicit exclusionsAvoids overlap and duplication
OwnerAccountable roleEnsures someone updates it
Assessment cadenceReview frequencyStops drift over time
Licensed activity linkWhere relevantConnects to regulatory scope
Minimum fields required to keep a function definition stable enough for CIF assessment and ongoing review

Outsourcing registers tend to build from vendors and contracts upward. CIF mapping works the other way around, which is why outsourcing registers rarely map cleanly into DORA’s structure.

Once the function is stable, the real test begins.

The CIF decision only works when you force the chain

Disruption on its own is not enough. Impact statements are often too broad. The useful work happens when you force the link between the two and add time and constraint.

The material impairment chain

StepQuestionWhat it reveals
DisruptionWhat fails?The starting point
ConsequenceWhat is affected?The business impact
Time-to-impactHow quickly it mattersUrgency
ConstraintWhat limits recoveryReal exposure
Compliance impactWhich obligation is affectedRegulatory consequence
Sequence used in practice to test whether disruption becomes material impairment

Most weak CIF classifications stop at “this would be disruptive.” That is rarely enough to defend the decision.

  • Function: customer access to online banking (login and session management)
  • ICT service: authentication service

Walk the chain:

  • Disruption: authentication fails
  • Consequence: customers cannot log in
  • Time-to-impact: immediate
  • Constraint: no manual fallback at scale
  • Compliance impact: interruption of access to account services

The rationale is short in the register, but it has to stand up

The register only captures a compressed version of the decision. The underlying logic still needs to exist.

The ITS specifies that firms must record the CIF assessment, provide reasons (with a 300-character limit), and include the date of the last assessment, with 9999-12-31 used where no assessment has been performed.

That structure exposes weak reasoning quickly.

What the rationale actually needs behind the fields

ElementWhat it must includeWhy it matters
What breaksNamed service or activityMakes impact concrete
Time-to-impactHours or daysShows urgency
ConstraintWorkaround or recovery limitExplains why impact cannot be contained
Compliance consequenceSpecific obligation or conditionLinks to DORA test
Owner + dateResponsible role and timestampCreates accountability
TriggerReason for assessmentExplains context
Minimum evidence needed to support a CIF decision and why each element matters in review

A weak rationale might say: “important due to dependency.”

A strong one says what stops, how fast, and why it matters.

Weak CIF reasoning tends to surface quickly when reviewers test consistency, evidence, and timing against supervisory expectations, which is why what supervisors will likely test in a function-mapping review and which RoI fields actually evidence the criticality decision become relevant at the same time.

ICT mapping breaks when the service level is wrong

Teams often map vendors or applications instead of services.

That makes the CIF logic hard to follow. If the service definition does not explain what fails, it cannot support the classification.

The useful level is the delivered capability the function depends on.

What “right level” actually looks like

Right level (usable)Why it worksWrong levelWhy it fails
Payment routing serviceDirect link to transaction flowVendor nameNo functional meaning
Login authentication serviceExplains access failureCloud providerToo broad
Trade processing serviceMatches business activityDatabase clusterToo technical
Document storage serviceTied to compliance needApplication nameToo vague
Comparison of usable ICT service definitions with common but unhelpful ones

A good mapping links a function to a service that clearly explains what would fail. The definition also needs to stay stable enough that technology, risk, and procurement or legal continue working from the same dependency picture when contracts, services, or providers change.

CIF mapping usually fails on the second pass

The first version is rarely challenged. The second version is where problems appear.

Functions evolve. Systems are replaced. Providers change. Workarounds turn out to be weaker than expected. If the mapping is not updated, the CIF classification becomes detached from reality.

What should trigger a reassessment

TriggerWhat changes
Major incident or near missReveals real weaknesses
System change or migrationAlters dependencies
Contract renewal or amendmentChanges service scope
Provider changeIntroduces new risk profile
New location or regionAffects resilience assumptions
New subcontractorExtends dependency chain
Main events that should trigger a CIF reassessment to prevent the mapping from becoming outdated

Subcontracting is often where hidden dependencies sit, especially when services rely on additional providers behind the scenes. That is why the ICT service chain that extends beyond the contracted provider needs to be visible.

This is also where cross-functional gaps become obvious. Business and risk may still be working with an old function definition, technology may have updated the service layer, and procurement may have changed the contract terms. Each piece looks correct on its own. Together, they no longer line up.

Once the CIF mapping is accurate, concentration exposure and exit feasibility stop being abstract. They become visible in the same dependency structure, which is why turning CIF visibility into concentration exposure you can actually see and where CIF mapping forces exit feasibility to be real follow naturally.

Share this article

Post on Linkedin
Post on Facebook
Post on X

How useful was this post?

0 / 5. 0

General Counsel

He is regulatory compliance strategist with over a decade of experience guiding fintech and financial services firms through complex EU legislation. He specializes in operational resilience, cybersecurity frameworks, and third-party risk management. Nojus writes about emerging compliance trends and helps companies turn regulatory challenges into strategic advantages.
  • DORA compliance
  • EU regulations
  • Cybersecurity risk management
  • Non-compliance penalties
  • Third-party risk oversight
  • Incident reporting requirements
  • Financial services compliance

Explore further