Artifact GuideEU

EU DORA Applicability Test

A practical way to decide whether DORA applies - and what layer applies.

Designed to output a scope memo you can defend in audits and supervisory discussions.

Author
Sorena AI
Published
Feb 23, 2026
Updated
Feb 23, 2026
Sections
6

Structured answer sets in this page tree.

Primary sources
1

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Feb 23, 2026
Updated Feb 23, 2026
Overview

DORA applicability is a structured decision: you classify each legal entity, map it to Article 2 scope, decide proportionality/simplification, and identify which obligations attach (controls, reporting, testing, third-party governance). This applicability test is written for implementation teams so the output is actionable, not just legal interpretation.

Section 1

Output you should produce (what "done" looks like)

At the end of this test you should have a scope memo per regulated entity and a group summary. This memo becomes the backbone for your requirements matrix, roadmap, and evidence pack.

Most teams fail by skipping this artifact and immediately building controls without tier clarity.

  • Entity-by-entity scope memo: covered category mapping (Article 2) + supervisor + perimeter.
  • Proportionality decision: simplified framework basis and what is scaled down.
  • Workstreams and owners: ICT risk controls, incident reporting, testing/TLPT, third-party risk + register of information.
  • Evidence map: where each required artifact lives (policies, procedures, logs, reports, registers).
Section 2

Step 1 - Are you a covered financial entity under Article 2?

Start with legal facts: what regulated category are you, and what license/authorization do you hold?

DORA scope is defined by the covered financial entity list in Article 2.

  • List your legal entities and licenses (banking, investment, payment services, insurance, market infrastructure, etc.).
  • Map each entity to Article 2 categories and record the competent authority.
  • If you operate in multiple Member States or have multiple authorizations, scope each entity separately and then create a consolidated group view.
Section 3

Step 2 - What's your DORA implementation layer (full vs proportional/simplified)?

DORA requires applying the proportionality principle: controls and testing intensity can scale with size, complexity, and risk profile.

Document your proportionality decision as a management body artifact and review it periodically.

  • Define your ICT dependency profile: critical/important functions, outsourcing model, and technology concentration.
  • Decide which parts of ICT risk management/testing are simplified and why the residual risk is acceptable.
  • Create an annual review cadence for proportionality (especially after major ICT or outsourcing changes).
Section 4

Step 3 - Which compliance workstreams apply to you?

Once you're in scope, DORA becomes an implementation program across four main workstreams plus governance and cooperation.

Use this as your workstream inventory and owner assignment checklist.

  • ICT risk management (Chapter II): governance, asset inventory/classification, protection/detection, response/recovery, business continuity and communications.
  • Incident management and reporting (Chapter III): record incidents and significant cyber threats, classify, and report major incidents (initial/intermediate/final).
  • Testing and TLPT (Chapter IV): annual testing programs; TLPT readiness for entities required to run threat-led penetration tests.
  • ICT third-party risk + register of information (Chapter V): third-party strategy, contractual clauses, concentration risk, exit strategies, and register maintenance.
  • Information sharing and cooperation: decide how you will participate in sector exercises and threat intelligence sharing.
Section 5

Step 4 - Group-level obligations: register and governance layers

Some obligations, especially around ICT third-party risk, operate at entity level and also at sub-consolidated and consolidated levels.

If you have centralized vendor management, ensure entity-level supervisory requests can still be answered quickly.

  • Maintain the register of information at entity level and, where relevant, sub-consolidated and consolidated levels (Article 28).
  • Define how group policies map to entity controls (policy ownership vs control execution).
  • Set up a supervisory response workflow: who can export register sections and incident reports on request.
Section 6

Step 5 - Are you an ICT third-party provider (and could you become critical)?

Even if you're not a covered financial entity, you may be impacted as an ICT third-party provider supporting critical or important functions for in-scope entities.

Financial entities will demand contract clauses aligned to DORA RTS; critical designation adds oversight exposure.

  • If you sell ICT services to financial entities: prepare for DORA-aligned contracts, audit/access rights, incident communications, and exit/portability support.
  • If you are large/systemic: understand the criteria for designation as a critical ICT third-party service provider and the oversight model.
  • Operational implication: treat "DORA-ready supplier" as a product capability (controls + evidence + contract positions).
Recommended next step

Turn EU DORA Applicability Test into an operational assessment

Assessment Autopilot can take EU DORA Applicability Test from deciding whether these obligations apply in practice to a reusable workflow inside Sorena. Teams working on EU DORA can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

eur-lex.europa.eu
Referenced sections
  • Primary DORA scope (Article 2) and workstreams: ICT risk management (Chapter II), incident reporting (Chapter III), testing/TLPT (Chapter IV), ICT third-party risk and register of information (Chapter V).
Related guides

Explore more topics

DORA FAQ (EU) - Scope, Deadlines, Reporting, TLPT, RoI, and Third-Party Risk
High-signal answers to the most searched DORA questions: who is in scope, when DORA applies (17 Jan 2025), what "critical or important functions" means.
DORA ICT Risk Management Control Baseline | Chapter II + RTS 2024/1774
A deep DORA ICT risk management baseline: how to implement Chapter II of Regulation (EU) 2022/2554 as controls with acceptance criteria and evidence.
DORA ICT Third-Party Risk Management + Contract Clauses | Article 28-30 + RTS 2024/1773 + RTS 2025/532
A deep guide to DORA ICT third-party risk: build the third-party risk strategy (Article 28), implement due diligence + ongoing monitoring.
DORA Major ICT Incident Reporting | Articles 17-20 + RTS 2024/1772 + 2025/301
A practical DORA major incident reporting guide: build the Article 17 and 19 workflow, apply RTS 2024/1772 classification and RTS 2025/301 timing rules.
DORA Penalties, Fines, and Enforcement | Articles 50-55 + Oversight Penalty Payments
A practical DORA enforcement guide: how competent authorities' supervisory/investigatory/sanctioning powers work (Article 50).
DORA Register of Information (RoI) - How to Build It | Article 28 + ITS 2024/2956
Build an audit-ready DORA Register of Information (RoI): define scope and relational keys.
DORA Register of Information (RoI) Template Guide | ITS 2024/2956 Annex Templates (B_01-B_07)
A practical guide to the DORA Register of Information templates: understand the ITS schema (Implementing Regulation (EU) 2024/2956).
DORA Testing & TLPT Readiness | Chapter IV + TIBER-EU Execution Guide
A deep DORA testing and TLPT readiness guide: build the Chapter IV testing program, prepare remediation and validation.
DORA vs ISO/IEC 27001:2022 | Mapping Controls, Evidence, and Audit Readiness
A deep DORA vs ISO 27001 comparison: where ISO/IEC 27001:2022 helps satisfy DORA ICT risk management and evidence expectations.
DORA vs NIS2 (EU) | Scope, Reporting, Controls, and Overlap for Financial Entities
A deep comparison of DORA and NIS2: who is in scope, what "security measures" mean, incident reporting differences, governance and enforcement posture.
EU DORA Checklist | DORA Compliance Checklist (Audit-Ready)
An audit-ready EU DORA checklist (Regulation (EU) 2022/2554): scope memo and proportionality, ICT risk management control baseline.
EU DORA Compliance Guide | DORA Implementation Playbook
A practical EU DORA compliance guide (Regulation (EU) 2022/2554): how to set up a DORA program, build an ICT risk management control baseline.
EU DORA Deadlines & Compliance Calendar | Key Dates, RTS/ITS and Cadence
A DORA compliance calendar for Regulation (EU) 2022/2554: publication, entry into force, application date, key RTS and ITS including 2024/2956, 2025/301.
EU DORA Requirements | Obligations by Workstream (ICT Risk, Incidents, TLPT, Third Parties)
A practical breakdown of EU DORA (Regulation (EU) 2022/2554) requirements: ICT risk management framework (Chapter II).
EU DORA Scope & Covered Entities | Who Is In Scope (Article 2)
A practical scoping guide for EU DORA (Regulation (EU) 2022/2554): covered financial entities (Article 2), proportionality and simplified frameworks.