Required DORA RoI Fields by Category: What Drifts After You Populate It

Share:

General Counsel

Updated

Mar 20, 2026

8 min. read

Required DORA RoI Fields by Category: What Drifts After You Populate It

Share:

Required DORA RoI Fields by Category: What Drifts After You Populate It

In this article

Two provider records appear in B_05.01 for what is clearly the same firm. One uses an LEI. The other uses a national identifier pulled from a procurement system. Both are technically valid. Both connect to different contracts, different signatories, and different supply chains.

Everything is populated. The dataset does not reconcile.

Field drift is one part of a wider operating problem across the RoI, as set out in the full DORA RoI framework. This article focuses on how required data fields behave in practice, broken down by the categories institutions actually have to manage.

The four anchors that tend to break first

Contract reference, provider identifier, function identifier, and the signer versus service user split are the most common origins of reconciliation failure.

Minimum keys every category depends on

  • Contract reference (B_02.01) — anchors all service and obligation records
  • Provider identifier (B_05.01) — anchors vendor, supply chain, and signatory linkage
  • Function identifier (B_06.01) — anchors service criticality and mapping
  • Signer vs service user split (B_03 vs B_04) — anchors accountability vs consumption

If these drift, every category below starts to misalign regardless of how complete the fields look. For a structural view of how these keys connect across the dataset, you’d have to analyse how the linked-table model works.

Category ownership, source systems, and drift triggers across the RoI

CategoryPrimary owning teamsSystems you reconcile againstDrift triggers
Entity & service mappingLegal entity management, outsourcing oversightLegal entity master, org structure systemsM&A, branch changes, function redesign
Provider profileProcurement, vendor management, data governanceVendor master, finance systems, LEI/EUID registriesOnboarding, identifier changes, data refresh cycles
Contracts & obligationsProcurement, LegalContract lifecycle systems, procurement platformsRenewals, amendments, novations, terminations
Risk & controlsRisk, resilience, outsourcing oversightRisk assessments, BIA, resilience testing outputsAnnual reviews, incidents, material service changes
Continuity & exitThird-party risk, architecture, resilienceSupplier inventories, architecture diagramsOutsourcing changes, architecture shifts, critical service reviews
Oversight & changeCentral RoI owner, data governanceAll upstream systemsContinuous; reporting cycles, audits
Mapping RoI categories to ownership, source systems, and typical drift triggers

Entity & service mapping — where alignment starts to slip (B_01, B_03, B_04, B_06)

This category brings together B_01 (entity perimeter and branches), B_03 (signatories), B_04 (service users), and B_06 (function inventory).

In field terms, this means maintaining:

  • entity identifiers, hierarchy, and branch records (B_01)
  • signing entities on both receiving and providing sides (B_03)
  • actual service-consuming entities (B_04)
  • function identifiers, ownership, and criticality classification (B_06)

The first signs of drift usually appear after structural change. A merger updates the legal entity structure, but the RoI perimeter does not move in step. Signatories remain tied to entities no longer in scope. Service-user records reflect an outdated structure. Function ownership no longer matches the organisation.

As the RoI template instructions in Implementing Regulation (EU) 2024/2956 require, these identifiers must remain unique and consistent across templates. That requirement only holds if updates are synchronised.

Provider profile — duplication hides in plain sight (B_05.01)

Provider data sits primarily in B_05.01, but it feeds every other template.

At field level, the provider profile includes:

  • provider identifier (LEI, EUID, or controlled alternative) and code type
  • legal name and name in Latin alphabet
  • headquarters country
  • ultimate parent undertaking and its identifier
  • annual expense or estimated cost where applicable

The provider identification requirements in the ITS expect a consistent identifier strategy across all of these fields.

No fields are missing. The provider landscape is duplicated, and downstream dependencies split accordingly.

Contracts & obligations — continuity breaks under normal operations (B_02 spine)

Contracts are captured across B_02.01 to B_02.03, with B_02.02 adding the service-specific layer.

At field level, this category includes:

  • contractual arrangement reference number and arrangement type (B_02.01)
  • links to associated and overarching arrangements (B_02.01, B_02.03)
  • lifecycle fields: start date, end date, renewal, termination reason (B_02.02)
  • governing law and country of provision (B_02.02)
  • notice periods and contractual exit conditions (B_02.02)
  • service-specific attributes such as data storage and processing locations (B_02.02)

As the B_02.01 instructions make clear, the contractual arrangement reference number has to remain unique and consistent across templates.

Operational reality is less stable. Renewals introduce new identifiers. Framework agreements are split. Procurement systems generate parallel references.

When continuity breaks:

  • service records detach from the original contract
  • obligations are tied to the wrong reference
  • intra-group relationships lose coherence

Risk & controls — assessments degrade faster than expected (B_02.02, B_07.01, B_99.01)

Risk and control fields sit mainly in B_02.02, B_07.01, and B_99.01.

At field level, this includes:

  • reliance on ICT services and data sensitivity (B_02.02)
  • substitutability and difficulty of replacement (B_07.01)
  • identification of alternative providers (B_07.01)
  • impact of discontinuing the service or function (B_07.01, B_06.01)
  • internal definitions for coded values and indicators (B_99.01)

The B_07.01 instructions require these assessment fields to be populated for services supporting critical or important functions, including identifying alternative providers.

Service conditions change. Dependencies deepen. Market options shift. The fields often stay as they were.

B_07.01 only remains credible when the assumptions behind service-level exit planning are revisited after those changes.

Continuity & exit — dependency depth determines what matters (B_05.02, B_07.01)

Continuity and exit considerations sit across B_05.02 and B_07.01.

At field level, this includes:

  • identification of subcontractors that underpin the service (B_05.02)
  • ranking of providers and subcontractors in the supply chain (B_05.02)
  • substitutability and availability of alternatives (B_07.01)
  • existence of exit plans and feasibility of transition (B_07.01)
  • impact of service discontinuation (B_07.01)

The B_05.02 instructions require institutions to capture subcontractors that effectively underpin ICT services, particularly for critical or important functions.

The operational boundary usually depends on which subcontractors actually support the service path, which is why the distinction in what “effectively underpinning” means matters here.

If that boundary is wrong, continuity planning rests on an incomplete or distorted dependency map.

Oversight & change — where the register is either maintained or abandoned (cross-template)

This category cuts across all templates and determines whether the register stays usable.

At field level, it includes:

  • lifecycle date updates and contract renewals (B_02.02)
  • perimeter updates after corporate actions (B_01)
  • identifier governance for providers and functions (B_05.01, B_06.01)
  • maintenance of closed-list definitions (B_99.01)
  • periodic reassessment of service-level fields (B_07.01)

The data quality requirements in the ITS require accuracy, completeness, consistency, integrity, and validity. Those conditions depend on continuous updates.

I would frame it this way: this is the category that determines whether the RoI remains a working dataset or becomes a static extract.

This is also why key stability and updates degrade in spreadsheet builds. The structure may be present, but nothing enforces alignment over time.

How field drift originates and propagates across RoI templates

Drift sourceAffected templatesWhat breaks
Contract renumberingB_02.01–B_02.03Loss of continuity and cost aggregation
Role confusion (signer vs user)B_03 vs B_04Misaligned service ownership and usage
Provider duplicationB_05.01, B_05.02Fragmented supply chains and signatory mismatch
Identifier-type collision (LEI vs national/procurement ID)B_05.01, B_03, B_02.01, B_05.02Parallel provider reality; supply chains fork
Function ID reuseB_06.01, B_02.02, B_07.01Broken service-function mapping
Closed-list inconsistencyB_99.01, B_07.01Loss of comparability across assessments
Drift modes mapped to affected RoI templates and resulting data failures

What expands when services support a critical or important function

ConditionExpansion
Supports critical/important functionExpanded service details (B_02.02), deeper subcontractor capture (B_05.02), full service-level assessments (B_07.01)
Does not support critical/important functionBaseline template population without extended assessment or supply chain depth
Additional RoI field requirements triggered by critical or important function support and their impact on maintenance effort

Understanding when that expansion applies depends on what “critical or important function” means operationally and how it is assessed.

Reporting reality: stable fields determine whether submissions hold

The ITS requires accuracy, completeness, consistency, integrity, and validity in the register.

In practice, recurring issues cluster around:

  • unstable contract references
  • inconsistent provider identifiers
  • outdated lifecycle dates
  • role mismatches across templates

Even when fields are populated, these inconsistencies create reconciliation failures at submission.

The submission mechanics sit separately, but they depend entirely on the stability of the underlying fields. The practical step of packaging and submitting RoI data without triggering preventable errors comes after that.

FAQ

  • Which RoI categories typically require the most ongoing maintenance? +

  • How granular should provider identification be when no LEI is available? +

Share this article

Post on Linkedin
Post on Facebook
Post on X

How useful was this post?

0 / 5. 0

General Counsel

He is regulatory compliance strategist with over a decade of experience guiding fintech and financial services firms through complex EU legislation. He specializes in operational resilience, cybersecurity frameworks, and third-party risk management. Nojus writes about emerging compliance trends and helps companies turn regulatory challenges into strategic advantages.
  • DORA compliance
  • EU regulations
  • Cybersecurity risk management
  • Non-compliance penalties
  • Third-party risk oversight
  • Incident reporting requirements
  • Financial services compliance

Explore further