EU

DORA: ICT Incident Reporting

Rule: Financial entities must detect, manage, classify, and report ICT-related incidents. Major incidents must be reported to competent authorities within strict timelines.

Incident Classification [Art 18]

Classify incidents based on impact criteria:

CriterionAssessment
Clients affectedNumber and relevance of clients/counterparties
DurationPeriod of disruption
Geographic spreadMember States affected
Data lossesAvailability, authenticity, integrity, confidentiality impacts
Critical servicesServices critically affected
Economic impactDirect and indirect costs/losses

Major vs Non-Major Incidents

ClassificationDefinitionReporting Required?
MajorHigh adverse impact on systems supporting critical/important functionsYes — to competent authority
Significant cyber threatPotential material impact if crystallizedYes — voluntary
Non-majorLimited impactInternal logging only

Reporting Timeline [Art 19]

ReportDeadlineContent
Initial notificationWithin 4 hours of classification as major (max 24h from awareness)Basic incident details
Intermediate reportWithin 72 hours of initial notificationUpdated information, impact assessment
Final reportWithin 1 month of last intermediate reportRoot cause, impact, remediation, lessons learned

Initial Notification Content

Must include:

  1. Incident type and summary
  2. Time of detection
  3. Services affected
  4. Countries/clients affected
  5. Preliminary impact assessment
  6. Actions taken/planned

Intermediate Report Content

Must include:

  1. Updated incident information
  2. Classification criteria applied
  3. Severity and impact assessment
  4. Business continuity measures activated
  5. Stakeholders notified

Final Report Content

Must include:

  1. Root cause analysis
  2. Full timeline of events
  3. Impact (financial, reputational, operational)
  4. Remediation measures taken
  5. Lessons learned
  6. Whether incident reported to law enforcement

To Whom to Report [Art 19]

Report to:

  • Competent authority (national supervisor — e.g., FCA, BaFin, AMF)

Authority may share with:

  • Other relevant authorities
  • ESAs (EBA, EIOPA, ESMA)
  • ECB, ESRB (systemic risks)
  • ENISA (cyber threats)

Client/Third-Party Notification [Art 19(4)]

Where major incident impacts clients:

  • Notify affected clients
  • Explain measures to mitigate adverse effects
  • Point to information sources if needed

Cyber Threats Reporting [Art 19(2)]

May voluntarily report significant cyber threats to competent authority:

  • If threat could materially impact financial entity
  • Helps authorities assess systemic risks
  • No penalty for voluntary reporting

ICT Incident Management Process [Art 17]

Must have documented process for:

StageActivities
DetectionMonitor systems, detect anomalies
ClassificationAssess against criteria, determine if major
ResponseContain, eradicate, recover
CommunicationInternal escalation, external notification
DocumentationLog all actions and findings
Post-incidentRoot cause analysis, lessons learned

Recording Incidents [Art 17(3)]

Maintain records of:

  • All ICT-related incidents (major and non-major)
  • Significant cyber threats
  • Response actions taken
  • Timeline of events
  • Lessons learned

Reporting to Management [Art 17(4)]

Management body must receive:

  • Reports on major incidents
  • Information on root causes
  • Lessons learned
  • Recommendations for improvements

Centralized Reporting

Some Member States may establish single reporting hubs:

  • One portal for incident reports
  • Competent authority forwards to relevant supervisors

Comparison with Other Frameworks

FrameworkInitial DeadlineFull Report
DORA4h (max 24h from awareness)1 month
NIS224h early warning1 month
GDPR72h (personal data breach)No specific final report
PSD2 (major ops)Same dayVarious

Citation

Art 17-23, Regulation (EU) 2022/2554

Contains public sector information licensed under the Open Government Licence v3.0 where applicable. This is not legal advice. Always refer to official sources for authoritative text.

llms.txt