The Digital Operational Resilience Act (DORA, EU 2022/2554) applies to financial entities in the EU - including banks, payment institutions, investment firms, insurance companies, crypto-asset service providers, and their critical ICT third-party service providers. It has applied since January 2025.DORA introduces binding requirements for ICT risk management, incident classification and reporting, digital operational resilience testing, and third-party ICT risk - all with documentation and audit obligations that regulators can examine.The defining feature of DORA compliance is auditability: financial entities must demonstrate, with verifiable evidence, that their ICT systems were managed and monitored in accordance with the regulation. That evidence must hold up under adversarial scrutiny, including during incident investigations where the entity itself may be a subject of review.
Article 19 - Reporting of Major ICT-Related Incidents
DORA Article 19 requires financial entities to report major incidents to their competent authority. ROOTKey supports the evidence requirements at each reporting stage:
Reporting stage
Timeline
ROOTKey role
Initial notification
Within 4 hours of major incident classification
Anchored classification record proves timing - timestamp cannot be altered
Intermediate report
Within 72 hours
Anchored incident detail record provides tamper-evident status at time of reporting
Final report
Within 1 month of resolution
Full anchored audit trail of incident timeline - independently verifiable by competent authority
Article 28 - General Principles on ICT Third-Party Risk
DORA Article 28 requires financial entities to manage the risks arising from ICT third-party service providers - including their software supply chains.
Requirement
ROOTKey capability
Register and monitor ICT third-party service providers
Anchor vendor assessment records and due diligence evidence
Assess ICT third-party concentration risk
Immutable records of which critical functions depend on which providers
Verify software and artifact integrity
Anchor build artifacts and release packages in CI/CD pipelines - detect tampering between build and deployment
Maintain contractual documentation
Anchor SLA terms, service descriptions, and amendment records at signing