The Sub-Processor Myth: DORA Wants a Service Chain, Not a List

Share:

General Counsel

Updated

Mar 30, 2026

10 min. read

The Sub-Processor Myth: DORA Wants a Service Chain, Not a List

Share:

The Sub-Processor Myth: DORA Wants a Service Chain, Not a List

In this article

The first problem with “sub-processors under the Digital Operational Resilience Act (DORA)” is that it sounds simpler than the work really is. Teams hear the phrase and think vendor list. Supervisors see a service chain.

Under DORA Article 28(3) and Commission Implementing Regulation (EU) 2024/2956, the register has to show one information and communication technology (ICT) service, the direct contract behind it, and the downstream providers that sit in that chain.

In this article, “sub-processor” is used in the way most teams search for it; in Register of Information (RoI) terms, we are talking about subcontractors in an ICT service supply chain captured in B_05.02. The European Supervisory Authorities’ (ESAs’) 19 March 2025 RoI reporting FAQ helps because it speaks to the practical side and is clear about its status: useful clarification on a best-efforts basis, not formal legal interpretation.

QuestionGDPR-style sub-processor listDORA RoI supply-chain view
What is being tracked?Processing relationshipsICT service delivery chain
What is the anchor?Processing activity or contract setDirect contractual arrangement reference number plus the relevant ICT service
Which downstream parties matter?Parties relevant to processingSubcontractors that effectively underpin the ICT service supporting a critical or important function, plus the first extra-group leg in the intra-group case
What has to stay accurate over time?Legal inventory completenessChain logic, identifiers, rank, recipient links, and scope decisions
Why a General Data Protection Regulation (GDPR)-style sub-processor inventory does not answer the DORA RoI question once the unit of account becomes the ICT service chain rather than the broader supplier estate.

Where the subcontractor line actually sits

Most of the debate gets easier once you pin down the service chain. Under the Implementing Technical Standards (ITS) instructions for B_05.02, firms have to record all direct ICT providers, all intra-group ICT providers, and, for ICT services supporting critical or important functions, the subcontractors that effectively underpin those services.

The test is practical: the ITS and the March 2025 FAQ both point to subcontractors whose disruption would impair the security or continuity of service provision.

I would frame the scope test this way:

  1. Start with one direct contractual arrangement and one ICT service.
  2. Decide whether that service supports a critical or important function, or a material part of one.
  3. Check whether the downstream provider actually sits inside the delivery chain for that service.
  4. Apply the disruption test: would that provider’s failure impair the security or continuity of the service?
  5. If yes, it belongs in the reported chain. If no, it may still sit in internal third-party risk records, but it stays outside the RoI boundary for that service.

The supported function still matters first, which is why subcontractor scope starts with the function map, not the supplier list.

This decision is easier to defend when it rests on a few concrete pieces of evidence rather than a broad statement that a provider “seems important”. In practice, firms usually rely on a current service dependency view, the service description and contract wording, provider disclosures obtained through the direct provider, and internal continuity mapping showing that failure at that layer would affect the service. That is usually the difference between a scope judgment and a scope explanation.

B_05.02 is where the chain becomes reportable

The direct arrangement stays as the anchor even when the service runs through several providers.

Under the ITS instructions for B_05.02, providers in the same ICT service supply chain share the same contractual arrangement reference number and the same ICT service type; the ITS instructions for B_02.01 do not give external subcontractors separate RoI contract references for that same chain.

For subcontractor traceability, the minimum keys that make chains reportable (IDs, contract refs, function IDs) are what keep each downstream row tied to the service it belongs to.

B_05.02 mechanics: contract reference, rank and recipient logic

Most confusion starts when teams treat the subcontractor leg as if it were a new contract object.

In B_05.02 it is still the same service chain. The direct arrangement stays as the anchor, the direct ICT provider stays at rank 1, subcontractors sit at higher ranks, and several providers can share the same rank when the chain branches, all as set out in the ITS. Each row also has to point to the provider receiving that subcontracted service.

That is why the March 2025 FAQ’s explanation of recipient logic matters: the recipient is the provider at rank n-1 receiving the subcontracted ICT service from the provider at rank n.

One narrow reporting wrinkle is worth knowing because teams do trip over it: the ITS fill-in instruction for B_05.02.0060 says the rank-1 recipient field is left blank, while the March 2025 FAQ and European Banking Authority (EBA) Single Rulebook Q&A 2024_7284 indicate that firms may need to repeat the direct-provider code in reporting practice.

B_05.02 field logicPractical reading
Rank = 1Direct ICT provider in the service chain
Rank > 1Subcontractor in the same service chain
RecipientProvider at rank n-1 receiving the subcontracted ICT service from the provider at rank n
Working read of rank and recipient in B_05.02, because these fields determine whether the subcontractor chain still points back to the service being reported.

Using the mechanics in B_05.02 and the FAQ’s explanation of rank and recipient, a financial entity may have one direct contractual arrangement for one ICT service, with the direct provider at rank 1, two downstream providers at rank 2 both supporting that same direct provider, and one further provider at rank 3 supporting only one of those rank-2 firms.

The two rank-2 rows both point back to rank 1 as recipient. The rank-3 row points to the relevant rank-2 provider.

Where chain logic breaks first

The weak spots are usually mundane. Article 3(5) and 3(6) of the ITS require valid legal entity identifier (LEI) or European Unique Identifier (EUID) information for ICT providers that are legal persons and, where a service supports a critical or important function, require firms to secure those identifiers for in-scope subcontractors through the direct provider.

In practice, broken identifiers and broken recipient links are what make a subcontractor chain fail first, which is a very specific version of why chain data breaks when keys and relationships drift.

Intra-group services often hide the real external dependency

“Intra-group” sounds cleaner than it behaves. The contract may be internal while the technology layer doing the real work is outside the group.

A group service company signs the front contract, while hosting, identity or resilience sits with an external provider underneath.

That is why the RoI ITS requires all intra-group ICT providers in the chain and, where they use subcontractors, at least the first extra-group subcontractor even when the service does not support a critical or important function; the March 2025 FAQ repeats the same point in practical terms.

The group boundary is where chains go to disappear.

“First extra-group subcontractor” is the point where an apparently internal service stops being internal.

Reassessment starts when the service changes

A first subcontractor assessment is rarely the hard part. The harder part is spotting when the service has changed and the old boundary no longer fits.

For ICT services supporting critical or important functions, DORA’s contractual requirements in Article 30 already push firms toward explicit subcontracting conditions and change handling.

Commission Delegated Regulation (EU) 2025/532 on subcontracting adds what practitioners need in real life: planning, due diligence, notice periods, approval or non-objection, risk assessment and ongoing monitoring for new subcontracting arrangements and material changes to existing ones.

Some firms keep the RoI in a relational system rather than in spreadsheet handoffs, a pattern also reflected in how the DORA register of information works in practice.

Change events that force a fresh scope test

Change eventWhy the scope decision may need to change
A new subcontractor enters the service chainA new provider may now sit inside the delivery path for the reported ICT service
Hosting, resilience, security or identity moves to a different providerA provider that was peripheral may now underpin continuity or security
The service moves to a new region or data-processing footprintThe chain behind the same service label may no longer be the same chain
The direct provider materially changes the service architecture or ICT service typeThe original underpinning assessment may no longer fit the service being delivered
The supported function becomes critical or important, or the institution’s reliance on the service increasesA provider previously tracked internally may now cross the RoI threshold
Change events that usually move the subcontractor boundary, and why they matter under DORA’s subcontracting and change-control rules rather than as part of a once-a-year clean-up exercise.

Visibility usually runs through the direct provider and the contract chain rather than through direct contractual privity with every downstream firm, which sits comfortably with the subcontracting regulatory technical standard (RTS) and with the ITS requirement to obtain in-scope subcontractor identifiers through the direct provider.

Why supervisors care about the downstream layer

The downstream layer matters because the RoI is supervisory data. Recital 1 of the RoI ITS says the register information is essential for internal ICT risk management, effective supervision and the annual process used by the ESAs to designate critical ICT third-party service providers.

The systemic angle goes lower into the chain than many firms expect: Commission Delegated Regulation (EU) 2024/1502 on critical ICT third-party provider designation criteria brings dependence on the same subcontractors into the assessment of potential systemic impact.

That is why supervisory questions on subcontractors tend to converge.

A defensible answer is usually a narrow one. Anchor the chain to one direct contractual arrangement, one ICT service and one supported function. Use the ITS and the March 2025 FAQ to decide which downstream providers effectively underpin delivery.

Then keep that decision under change control, because the service will move long before anyone admits the chain has changed.

Share this article

Post on Linkedin
Post on Facebook
Post on X

How useful was this post?

0 / 5. 0

General Counsel

He is regulatory compliance strategist with over a decade of experience guiding fintech and financial services firms through complex EU legislation. He specializes in operational resilience, cybersecurity frameworks, and third-party risk management. Nojus writes about emerging compliance trends and helps companies turn regulatory challenges into strategic advantages.
  • DORA compliance
  • EU regulations
  • Cybersecurity risk management
  • Non-compliance penalties
  • Third-party risk oversight
  • Incident reporting requirements
  • Financial services compliance

Explore further