DORA compliance timeline: Key deadlines and implementation milestones

Share:

General Counsel

Nov 19, 2025

7 min. read

DORA compliance timeline: Key deadlines and implementation milestones

Share:

DORA compliance timeline: Key deadlines and implementation milestones

In this article

Not too long ago, many financial institutions treated cybersecurity like an IT chore. Patch Tuesday, annual pen test, maybe a policy refresh if someone remembered. Then ransomware, supply chain compromises, and cloud outages started hitting the headlines. That’s when regulators decided it’s time for… another regulation.

As a result, the Digital Operational Resilience Act (DORA) directive dropped, sending a pretty blunt message to the financial sector:

“You can’t be digitally fragile and systemically important at the same time.”

But here’s something interesting: DORA isn’t just like any other directive. It’s a hardline blueprint built around five pillars designed to see if you can actually take a hit and get back up.

If DORA is still news to you, don’t worry. In this article, I’ll bring you up to speed on the DORA implementation timeline and key milestones.

From IT Problem To Boardroom Risk: What DORA Really Changed

Pillars of DORA

DORA is an EU regulation, which means it is directly applicable law, not a soft guideline you can negotiate with.

It entered into force in January 2023 and began applying on 17 January 2025, covering banks, insurers, payment institutions, investment firms, and a long list of other financial entities and ICT providers that support them.

The regulation takes everything you used to bucket under “IT stuff” and reframes it as business continuity, systemic stability, and supervisory priority.

The five pillars it’s built on are not theory. They map directly to what regulators expect to see when they walk into your organization or open your documentation.

Here is how the core pillars translate into day-to-day reality.

DORA Requirement/PillarKey expectation
ICT risk managementA documented, risk-based framework that identifies, assesses, mitigates, and tracks ICT risks.
Incident reportingDefined thresholds, internal playbooks, and the ability to report major incidents on time.
Operational resilience testingRegular, risk-based tests that go beyond checklists and actually stress your critical services.
Third-party risk managementStructured oversight of vendors, especially critical ICT third-party providers (CTPPs).
Information sharingParticipation in threat-intelligence and incident-sharing mechanisms, where relevant.
Key DORA compliance requirements

When you put it all together, the shift is clear. DORA is not asking you to say you are resilient. It is asking you to prove it with governance, controls, testing, and evidence that tie back to these pillars.

If you treat this as “IT compliance,” you will constantly be behind. If you treat it as a core part of your operating model, it becomes much easier to make decisions, justify investments, and survive audits.

The DORA Timeline: Not Just Dates, But Operational Checkpoints

DORA implementation timeline

Let’s decode the timeline, because it is more than a series of EU press releases. Each milestone quietly shifted the bar on what “prepared” should look like.

DateMilestoneWhat It Means In Practice
27 December 2022The countdown to the application begins; DORA becomes part of EU law. The final text is fixed. No more excuses about uncertainty — time to start mapping requirements.
16 January 2023DORA enters into forceFinancial entities are expected to be compliant; the “transition period” talk ends.
13 March 2024First batch of RTS adopted by the European CommissionYou get detailed rules on areas like ICT risk management and incident classification—your implementation can stop guessing.
17 July 2024Second batch of RTS/ITS and guidelines published by the ESAsIncident reporting templates, TLPT, oversight conditions — Level 2 rules are largely complete.
17 January 2025DORA starts to apply across the EUFinancial entities are expected to be compliant; “transition period” talk ends.
2025 and beyondESAs roll out oversight and CTPP designation and monitoringRegisters of ICT arrangements, criticality assessments, and active supervision of key providers go live.
DORA legislation timeline

By now, you are not in the “preparation” phase anymore. You are in the “show us what you actually built” phase.

And yes, there is a twist: some delegated and implementing regulations are still being finalized or entering into effect on a rolling basis, which means compliance is not a one-and-done project. It is an ongoing alignment exercise with evolving Level 2 rules and guidance from ESAs and national competent authorities.

If your internal story is still, “We are waiting for the final guidance,” you are out of sync with where supervisors are. They expect a working framework that can adapt as the last pieces of the puzzle drop in.

What You Should Already Have In Place Under DORA

With the DORA deadline behind us, regulators assume you have moved past slideware. They will want to see actual processes, tooling, and evidence.

At a minimum, your organization should be able to show how it meets the core obligations around ICT risk, incidents, testing, third-party risk, and information sharing.

If you can only show spreadsheets and a few static policies, that is a red flag. DORA expects traceability: risks linked to controls, controls linked to tests, tests linked to findings, findings linked to remediation, and all of it living inside a governance loop that reaches your management body.

In other words, your DORA story has to be more than “we wrote a policy.” It has to be “here is how we run this, every quarter, every incident, every vendor onboarding.”

Oversight Has Entered The Chat: ESAs, CTPPs, And Real-World Scrutiny

DORA regulatory assessment focus

DORA did not stop at telling financial entities to manage ICT risk. It introduced an oversight framework for the big dependencies behind you: cloud providers, core banking vendors, payment processors, and other ICT third-party service providers that are critical to the functioning of the financial system.

From 2025 onwards, the European Supervisory Authorities (ESMA, EBA, and EIOPA) are moving through a clear sequence. National competent authorities submit registers of ICT third-party arrangements by set deadlines, the ESAs perform criticality assessments, and Critical ICT Third-Party Providers (CTPPs) are then designated and brought into an EU-level oversight regime.

What does this mean for you as a financial entity? It means regulators will look at two things at once.

First, whether your own ICT risk management, incident handling, and testing frameworks are live and proportionate.

Second, whether you actually understand and manage your exposure to the providers that keep your services running. If a hyperscaler or core SaaS platform you rely on is designated as critical, the quality of your relationship with them will come under more light, not less.

And yes, the enforcement side is real.

Non-compliance under DORA can lead to administrative sanctions, remedial measures, and reputational damage that hurts a lot more than the legal language suggests. Supervisors will care less about your slide deck and more about your incident metrics, test logs, and vendor performance data.

Stay ahead of DORA enforcement with Copla

Copla is built for teams that want DORA compliance without burning out their staff or their budget. By pairing an automation-first platform with expert CISOs, Copla delivers 4 main advantages:

  1. Helps to reduce compliance workload by up to 80%
  2. Automates key DORA compliance tasks
  3. Guides you through the compliance process step-by-step
  4. Provides CISO-level leadership without the overhead

On top of that, clients typically save over €60K per year compared to hiring in-house staff to handle the same compliance workload, while staying continuously audit-ready.

FAQ

  • When does DORA come into force? +

  • What are the key dates I should be aware of? +

  • What does DORA implementation involve? +

  • What happens if we miss the DORA compliance deadline? +

Share this article

Post on Linkedin
Post on Facebook
Post on X

How useful was this post?

4.5 / 5. 2

General Counsel

He is regulatory compliance strategist with over a decade of experience guiding fintech and financial services firms through complex EU legislation. He specializes in operational resilience, cybersecurity frameworks, and third-party risk management. Nojus writes about emerging compliance trends and helps companies turn regulatory challenges into strategic advantages.
  • DORA compliance
  • EU regulations
  • Cybersecurity risk management
  • Non-compliance penalties
  • Third-party risk oversight
  • Incident reporting requirements
  • Financial services compliance

Explore further

  • Compliance & Regulations
  • GRC
  • Guide
  • ISO 27001
  • Compliance & Regulations
  • PCI DSS