- Primary legal text for DORA scope (Article 2) and the layered compliance workstreams: ICT risk management, incident reporting, testing/TLPT, and ICT third-party risk including the register of information (Article 28).
EU DORA Scope & Covered Entities
A defensible way to decide if DORA applies to you - and what layer applies.
Built for regulators and audits: scope memo, evidence inputs, and owner assignments.
Structured answer sets in this page tree.
Cited legal and guidance references.
DORA scope is not a vibe-check. It's a written classification of (1) whether you are a covered financial entity under Article 2, (2) what proportionality/simplified framework applies, and (3) which services in your group are in scope (entity, sub-consolidated and consolidated). This page helps you produce a scope memo you can defend and maintain as your business evolves.
What DORA covers (and why scope matters operationally)
DORA is a sector-specific operational resilience regulation for the financial sector. Its workstreams are concrete: ICT risk management controls, ICT incident management and reporting, resilience testing including TLPT, and ICT third-party risk governance.
Scope decisions drive the cost profile of compliance. For example: TLPT readiness, incident reporting pipelines, and register of information build-outs are not "optional" once in scope.
- Treat scope as a living artifact: update it when entity type, licensing, or group structure changes.
- Run scope per entity and per group layer: entity-level plus sub-consolidated/consolidated registers and governance where required.
- Ship a scope memo: service facts -> classification -> obligations -> owners -> evidence.
Use EU DORA Scope & Covered Entities as a cited research workflow
Research Copilot can take EU DORA Scope & Covered Entities from clarifying scope and applicability with cited answers to a reusable workflow inside Sorena. Teams working on EU DORA can keep owners, evidence, and next steps aligned without copying this guide into separate documents.
Start from EU DORA Scope & Covered Entities and answer scope, timing, and interpretation questions with cited outputs.
Review your current process, evidence gaps, and next steps for EU DORA Scope & Covered Entities.
Step 1 - Are you a covered financial entity (Article 2)?
DORA's primary scope is financial entities listed in Article 2. Start by identifying your authorization/licensing category and map it to the Article 2 list.
Many organizations have multiple regulated entities (bank + investment firm + payment services). Scope each regulated entity separately, then build a group view.
- Identify your legal entities and licenses; map each to a covered category in Article 2.
- Document competent authority and supervisory perimeter per entity (useful for incident reporting routing).
- Record what you are not: if you're not a covered financial entity, you may still be impacted as an ICT third-party provider supporting critical or important functions.
Step 2 - Proportionality and simplified frameworks (what can be scaled down)
DORA is explicit about proportionality. Requirements are applied considering the nature, scale, complexity and risk profile of the entity and its ICT dependencies.
Some entities can use simplified ICT risk management frameworks and reduced testing requirements; document the basis for the simplification.
- Define your proportionality basis: size, business model, criticality of services, and ICT dependency profile.
- Document simplified controls: what is simplified, what is not, and why the residual risk is acceptable.
- Keep "proportionality evidence": risk assessments, management body decisions, and review cadence.
Step 3 - Group-level scope: entity vs sub-consolidated vs consolidated
DORA third-party risk governance and the register of information explicitly operate at multiple levels: entity level and (where relevant) sub-consolidated and consolidated levels.
This is where programs fail if the operating model is unclear: procurement and vendor management often sit centrally while supervision is entity-based.
- Define a group operating model: who owns the central policy vs entity-specific implementation.
- Maintain the register of information at entity level and, where required, at sub-consolidated and consolidated levels.
- Plan a supervisory response model: which authority asks for which register section and who can produce it quickly.
Step 4 - ICT third-party providers and the "critical provider" layer
DORA also creates an EU oversight framework for critical ICT third-party service providers (CTPPs). Even if you're not a financial entity, you can be impacted if you provide ICT services supporting critical or important functions for in-scope entities.
Financial entities must manage third-party risk and maintain a register of information covering all contractual arrangements for ICT services.
- Financial entities: implement ICT third-party risk strategy, contractual minimum clauses, concentration risk assessments, and exit plans; keep the register of information.
- ICT providers: be prepared for contractual clauses aligned to DORA RTS and, if designated critical, oversight interactions and requirements.
- Program implication: procurement/legal/security must align on contract playbooks and evidence artifacts.
Scope memo template (copy/paste)
A scope memo is a short document you update over time. It is your single source of truth for: what applies, to whom, and what program owners must deliver.
Use this structure to avoid ambiguity and scope drift.
- 1) Entity inventory: legal entities, licenses, supervisors, and covered category mapping (Article 2).
- 2) Service inventory: critical/important functions and ICT-supported business functions; key ICT dependencies.
- 3) Proportionality statement: simplified framework decisions and rationale.
- 4) Obligation map: ICT risk controls (Chapter II), incident reporting (Chapter III), testing/TLPT (Chapter IV), third-party risk + register (Chapter V).
- 5) Owner map: RACI for each workstream; evidence pack location and retrieval process.
- 6) Change triggers: what changes force re-scoping (new product, new license, new outsourcing model).