DORA
Comparison

DORA vs NIS2 for Financial Entities 2026 — Which Applies, Key Differences, Checklist

·11 min read·Last reviewed by FinancialRegulations.EU Editorial Team
FR

FinancialRegulations.EU Team

Regulatory Intelligence

DORA
NIS2
cybersecurity
operational-resilience

The Digital Operational Resilience Act (DORA, Regulation (EU) 2022/2554) and the Network and Information Security Directive (NIS2, Directive (EU) 2022/2555) both address cybersecurity and digital resilience for entities operating in the EU. Both have applied since January 2025. Both impose governance obligations, incident reporting requirements, and risk management frameworks. And for financial institutions, both appear to apply simultaneously — creating a compliance question that cannot be ignored.

This article sets out the relationship between DORA and NIS2, explains where they overlap and diverge, and provides practical guidance for financial entities navigating dual compliance.

Why the DORA vs NIS2 Question Matters

Before January 2025, cybersecurity regulation in the EU financial sector was fragmented. The original NIS Directive (Directive 2016/1148) covered some financial entities, but requirements were general and implementation varied across Member States. Financial sector-specific rules on ICT risk were scattered across sectoral legislation — CRD, MiFID II, Solvency II, PSD2 — without a unified framework.

The EU legislature addressed this with two instruments adopted within days of each other in late 2022:

  • DORA (14 December 2022): A directly applicable regulation targeting digital operational resilience for the financial sector specifically.
  • NIS2 (27 December 2022): A directive replacing the original NIS Directive, broadening cybersecurity obligations across all critical sectors — including finance.

The result: financial entities now face two EU-level cybersecurity frameworks with overlapping subject matter but different legal instruments, different scopes, different enforcement mechanisms, and different levels of specificity. Understanding which framework applies — and how they interact — is essential for any compliance programme.

DORA: Overview

Scope

DORA applies to 21 categories of financial entities listed in Article 2(1), including credit institutions, investment firms, insurance and reinsurance undertakings, payment institutions, electronic money institutions, central counterparties, central securities depositories, trading venues, fund managers (both UCITS and AIFMs), crypto-asset service providers, and ICT third-party service providers designated as critical by the European Supervisory Authorities (ESAs).

There is no size threshold. A boutique investment firm with ten employees and a global systemically important bank are both in scope. Proportionality applies to implementation (Article 4), not to scope. For a step-by-step overview of what DORA requires, see our DORA compliance checklist.

The Five Pillars

DORA is structured around five pillars:

  1. ICT Risk Management (Articles 5-16): A comprehensive framework for identifying, protecting against, detecting, responding to, and recovering from ICT risks, with explicit management body responsibility.
  2. ICT-Related Incident Reporting (Articles 17-23): Classification and reporting of major ICT-related incidents to competent authorities on defined timelines.
  3. Digital Operational Resilience Testing (Articles 24-27): Basic testing for all entities and threat-led penetration testing (TLPT) for systemically important entities.
  4. ICT Third-Party Risk Management (Articles 28-44): Contractual requirements for ICT service providers, a register of all ICT arrangements, and an oversight framework for critical ICT third-party providers.
  5. Information Sharing (Article 45): Voluntary exchange of cyber threat intelligence among financial entities.

For fund managers specifically, see our guide on DORA compliance for fund managers.

Legal Form

DORA is a regulation — directly applicable in all Member States without transposition. This means uniform requirements across the EU, without the implementation variations that characterise directives.

NIS2: Overview

Scope

NIS2 applies to entities operating in sectors listed in its Annexes I and II. Annex I ("sectors of high criticality") includes banking, financial market infrastructure, energy, transport, health, drinking water, digital infrastructure, ICT service management, public administration, and space. Annex II ("other critical sectors") includes postal services, waste management, chemicals, food, manufacturing, and digital providers.

Within these sectors, NIS2 distinguishes between essential entities and important entities based on size thresholds and criticality. Under Article 3, essential entities generally include large enterprises in Annex I sectors. Important entities include medium-sized enterprises in Annex I sectors and medium and large enterprises in Annex II sectors.

For the financial sector, credit institutions, operators of trading venues, and central counterparties are explicitly listed in Annex I. This means these entities fall within NIS2's scope as entities in a sector of high criticality.

Key Obligations

NIS2 imposes on in-scope entities:

  • Cybersecurity risk management measures (Article 21): Policies on risk analysis and information system security, incident handling, business continuity, supply chain security, security in network and information systems acquisition, asset management, access control policies, cryptography, human resources security, and multi-factor authentication.
  • Incident reporting (Article 23): Notification to the national CSIRT or competent authority of significant incidents on specified timelines.
  • Management body accountability (Article 20): Senior management must approve cybersecurity risk management measures and undergo cybersecurity training.
  • Supply chain security (Article 21(2)(d)): Entities must address cybersecurity risks in their supply chains and supplier relationships.

Legal Form

NIS2 is a directive. Member States were required to transpose it into national law by 17 October 2024. Implementation varies by jurisdiction — the Cyberbeveiligingswet in the Netherlands, the NIS-2-Umsetzungsgesetz in Germany, and equivalent legislation in other Member States. This creates a more heterogeneous compliance landscape than DORA.

The Lex Specialis Relationship

This is the critical legal point. Article 4 of NIS2 states:

Where sector-specific Union legal acts require essential or important entities to adopt cybersecurity risk management measures or to notify significant incidents, and where those requirements are at least equivalent in effect to the obligations laid down in this Directive, the relevant provisions of this Directive shall not apply to such entities.

Recital 28 of DORA explicitly references this principle:

This Regulation constitutes lex specialis to [NIS2] with regard to the financial sector. It is essential to maintain a strong relationship between the financial sector and the Union horizontal cybersecurity framework as currently laid out in [NIS2].

The legal consequence is clear: for financial entities in scope of DORA, DORA takes precedence over NIS2 on matters that DORA addresses. Financial entities do not need to comply with NIS2's provisions on cybersecurity risk management and incident reporting to the extent that DORA already covers those obligations with equivalent or greater specificity.

This is not an exemption from NIS2. It is a lex specialis carve-out — DORA displaces NIS2 on overlapping matters because DORA's requirements are more specific and at least equivalent in effect. On matters that DORA does not address, NIS2 may still apply.

Side-by-Side Comparison

DimensionDORA (Regulation 2022/2554)NIS2 (Directive 2022/2555)
Legal instrumentRegulation (directly applicable)Directive (requires national transposition)
Application date17 January 202518 October 2024 (transposition deadline)
Scope21 categories of financial entities (Article 2)Entities in 18 critical and important sectors (Annexes I and II)
Financial sector coverageComprehensive: banks, insurers, investment firms, fund managers, payment institutions, CASPs, CSDs, CCPs, trading venuesLimited to credit institutions, trading venues, CCPs
Incident reportingInitial notification within 4 hours of classification / 24 hours of detection; intermediate report within 72 hours; final report within 1 month (Articles 17-19)Early warning within 24 hours; incident notification within 72 hours; final report within 1 month (Article 23)
TestingMandatory basic testing for all; TLPT for systemically important entities (Articles 24-27)No specific testing framework; general obligation to ensure effectiveness of measures
Third-party riskDetailed contractual requirements (Article 30); register of ICT arrangements (Article 28(3)); oversight framework for critical ICT providers (Articles 31-44)General supply chain security obligation (Article 21(2)(d)); no equivalent oversight framework
GovernanceManagement body bears ultimate responsibility for ICT risk; must define, approve, oversee, and be accountable for the ICT risk management framework (Article 5(2))Management body must approve and supervise cybersecurity risk management measures; personal liability for infringements (Article 20)
PenaltiesMember State competent authorities may impose administrative penalties; no harmonised maximum fines in the regulation itselfUp to EUR 10 million or 2% of global annual turnover for essential entities; up to EUR 7 million or 1.4% of turnover for important entities (Article 34)
SupervisionNational financial supervisors (ECB, BaFin, AFM, CSSF, etc.); ESA-led oversight for critical ICT providersNational cybersecurity authorities or CSIRTs

Where They Overlap

Both frameworks require:

  • Risk-based cybersecurity governance with management body accountability
  • Incident reporting to competent authorities, with multi-stage notification timelines
  • Business continuity and disaster recovery planning
  • Supply chain / third-party risk management as a core compliance obligation
  • Access control, encryption, and network security as baseline technical measures
  • Regular review and updating of policies and procedures

For a financial institution already compliant with DORA, much of NIS2's substantive content is already addressed — which is precisely why the lex specialis principle applies.

Where They Diverge

The differences are material and worth understanding:

1. Specificity of Requirements

DORA is prescriptive. It specifies detailed requirements for ICT risk management frameworks, incident classification criteria, testing methodologies, contractual clauses with ICT providers, and the format of registers. NIS2 sets objectives and principles but leaves significantly more discretion to entities and Member States on implementation.

2. Third-Party Oversight

DORA creates an entirely new regulatory mechanism: direct oversight of critical ICT third-party providers by Lead Overseers appointed from among the ESAs (Articles 31-44). This means that major cloud providers, core banking system vendors, and other critical ICT suppliers to the financial sector are subject to direct regulatory scrutiny. NIS2 has no equivalent mechanism. The supervisory feed for that designation comes from financial entities' own register of information requirements under Article 28(3) — the ESAs aggregate register data to identify which providers warrant CTPP designation.

3. Testing Requirements

DORA mandates specific testing obligations — vulnerability assessments, penetration testing, network security assessments, scenario-based testing — and requires threat-led penetration testing for certain entities (Article 26). NIS2 requires entities to evaluate the effectiveness of their cybersecurity risk management measures but does not prescribe specific testing methodologies.

4. Penalties

NIS2 sets harmonised maximum fines (Article 34): up to EUR 10 million or 2% of total worldwide annual turnover for essential entities. DORA does not set harmonised maximum fines at the EU level, leaving penalty frameworks to national competent authorities and existing financial services enforcement regimes.

Check which cybersecurity framework applies to your financial institution

Analyse your obligations →

Incident Reporting: A Detailed Comparison

Incident reporting timelines are one of the most operationally significant differences. Financial entities must understand which framework's timelines apply.

DORA Incident Reporting (Articles 17-19)

Under DORA, financial entities must:

  1. Classify ICT-related incidents based on criteria set out in Article 18 and the related RTS — including client impact, duration, geographical spread, data losses, criticality of services affected, and economic impact.
  2. Submit an initial notification to the competent authority within 4 hours of classifying an incident as major, and no later than 24 hours after detection.
  3. Submit an intermediate report within 72 hours of the initial notification, providing updates on severity, impact, and initial root cause analysis.
  4. Submit a final report within one month of the intermediate report, covering root cause, remediation actions, and lessons learned.

DORA also introduces voluntary notification of significant cyber threats (Article 19) and requires the ESAs to assess the feasibility of centralising incident reporting at EU level.

NIS2 Incident Reporting (Article 23)

Under NIS2, in-scope entities must:

  1. Submit an early warning within 24 hours of becoming aware of a significant incident, indicating whether it is suspected to be caused by unlawful or malicious acts or could have a cross-border impact.
  2. Submit an incident notification within 72 hours of becoming aware, updating the early warning and providing an initial assessment of severity and impact.
  3. Submit a final report within one month of the incident notification, including a detailed description, root cause, mitigation measures, and cross-border impact.

Key Differences

DORA's timelines are tighter: 4 hours for the initial notification (vs. 24 hours under NIS2). DORA also requires a more detailed classification framework — the RTS on incident classification provides quantitative thresholds that create a standardised classification methodology across the financial sector. NIS2's "significant incident" concept is broader and less granularly defined.

For financial entities, DORA's incident reporting regime is the applicable one under the lex specialis principle. Meeting DORA's tighter timelines will, by definition, satisfy NIS2's requirements. For the full incident classification criteria, see our DORA incident classification guide and incident reporting timeline.

Third-Party ICT Risk: DORA's Oversight Framework vs NIS2's Supply Chain Provisions

Third-party ICT risk management is where DORA is most distinctive.

DORA (Articles 28-44)

DORA requires financial entities to:

  • Maintain a complete register of all ICT third-party arrangements (Article 28(3)), in a format prescribed by the ITS, available to supervisors on request.
  • Include specific contractual provisions in agreements with ICT providers (Article 30): service level descriptions, data processing locations, availability guarantees, access and audit rights for the entity and its competent authority, termination rights with transition periods, and provider cooperation during ICT incidents.
  • Assess ICT concentration risk — evaluating whether critical business functions depend excessively on a single provider or a small group of providers.
  • Conduct a pre-contractual assessment before entering into ICT arrangements, considering risks including substitutability and concentration.

Beyond entity-level requirements, DORA establishes an oversight framework for critical ICT third-party service providers (Articles 31-44). The ESAs can designate ICT providers as "critical" based on the systemic importance of the financial entities they serve, the degree of dependence, and the substitutability of the provider. Critical ICT providers are then subject to direct oversight by a Lead Overseer — one of the three ESAs — who can conduct inspections, issue recommendations, and impose penalty payments for non-compliance.

NIS2 (Article 21(2)(d))

NIS2 requires entities to address "supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers." Article 21(3) allows the European Commission to adopt implementing acts specifying technical and methodological requirements, but the level of prescriptive detail is significantly lower than DORA.

NIS2 does not create:

  • A register of third-party arrangements
  • Mandatory contractual clauses for ICT providers
  • A direct oversight mechanism for critical suppliers
  • An ICT concentration risk assessment framework

For financial entities, DORA's third-party risk framework is substantially more demanding — and is the one that must be implemented.

Practical Implications: Dual Compliance Strategies

Which Framework to Prioritise

If you are a financial entity in scope of DORA (Article 2(1)), prioritise DORA. The lex specialis relationship means DORA is your primary compliance framework for cybersecurity and digital operational resilience. Compliance with DORA should satisfy the equivalent NIS2 obligations.

However, do not ignore NIS2 entirely:

  • National transposition may create additional requirements. Member States have some flexibility in how they transpose NIS2, and some may impose obligations on financial entities that go beyond or are adjacent to DORA's scope.
  • Group-level compliance. If your group includes non-financial entities (e.g., a holding company, a technology subsidiary), those entities may be in scope of NIS2 independently. A unified group cybersecurity framework should account for both.
  • Supervisory coordination. NIS2 requires cooperation between cybersecurity authorities and financial supervisors (Article 32(10)). Financial entities may receive requests or inquiries related to NIS2 compliance even where DORA is the primary framework.

A Practical Compliance Approach

  1. Map your entities against both frameworks. Determine which group entities fall under DORA, which under NIS2, and which under both.
  2. Implement DORA as the baseline. For financial entities, DORA's requirements are more prescriptive and, if fully implemented, will cover NIS2's substantive obligations.
  3. Conduct a gap analysis against NIS2 national transposition. Review the relevant national law in each jurisdiction where you operate to identify any obligations that DORA does not address.
  4. Align incident reporting procedures. Ensure your incident response process meets DORA's tighter timelines (4 hours for initial notification). This will also satisfy NIS2.
  5. Coordinate across supervisors. Be prepared for engagement from both financial supervisors (under DORA) and national cybersecurity authorities (under NIS2). Ensure your compliance function can respond to both.
  6. Document the lex specialis analysis. Maintain an internal record of your assessment that DORA displaces NIS2 on specific obligations. This demonstrates regulatory awareness and supports your position in supervisory discussions.

Penalties and Enforcement

DORA

DORA does not set harmonised maximum fines at the EU level. Article 50 empowers Member State competent authorities to impose administrative penalties and remedial measures in accordance with national law. In practice, this means penalties are determined by existing national financial supervisory frameworks — which in many jurisdictions already include significant sanction powers.

For critical ICT third-party providers, the oversight framework allows Lead Overseers to impose periodic penalty payments of up to 1% of the provider's average daily worldwide turnover for each day of non-compliance, for a maximum of six months (Article 35(8)).

NIS2

NIS2 sets explicit maximum fines (Article 34):

  • Essential entities: Up to EUR 10,000,000 or 2% of total worldwide annual turnover, whichever is higher.
  • Important entities: Up to EUR 7,000,000 or 1.4% of total worldwide annual turnover, whichever is higher.

NIS2 also introduces personal accountability: Article 20(1) requires Member States to ensure that management bodies of essential and important entities can be held liable for infringements. Some Member States have transposed this with provisions allowing temporary management bans.

Practical Impact

For financial entities, the enforcement landscape is primarily shaped by DORA and existing financial supervisory powers. NIS2's penalty provisions are most relevant for non-financial entities in the group or for financial entities that are in scope of NIS2 but not DORA (an unlikely scenario for most financial institutions, but possible for entities at the boundary).

How financialregulations.eu Can Help

Navigating the DORA-NIS2 intersection requires precise regulatory analysis. Our platform provides:

  • Full-text search and analysis of both DORA and NIS2, including recitals, articles, and technical standards
  • Cross-reference queries — ask how a specific DORA obligation relates to NIS2 provisions, and get an answer grounded in the regulatory text
  • Compliance gap analysis — upload your current cybersecurity framework and get it assessed against DORA requirements
  • Regulatory monitoring — track ESA guidance, RTS/ITS updates, and national transposition developments

Try financialregulations.eu — start with 5 free regulatory queries. No credit card required.

Start Analysing — Free


Frequently Asked Questions

Does NIS2 apply to banks and financial institutions?

Technically, yes. Credit institutions, operators of trading venues, and central counterparties are listed in NIS2 Annex I as entities in the banking and financial market infrastructure sectors. However, under the lex specialis principle in Article 4 of NIS2, DORA's requirements take precedence where they are at least equivalent in effect. In practice, financial institutions should implement DORA as their primary framework, which will satisfy the corresponding NIS2 obligations.

Can a financial entity be sanctioned under both DORA and NIS2?

The lex specialis relationship is designed to prevent double regulation on the same subject matter. Where DORA addresses an obligation (e.g., incident reporting, risk management), NIS2's provisions do not apply to that entity on that matter. However, if a financial entity fails to comply with an obligation that falls outside DORA's scope but within NIS2's, national cybersecurity authorities could theoretically take enforcement action under NIS2 national transposition laws.

Which incident reporting timeline applies to financial institutions — DORA or NIS2?

DORA's incident reporting regime applies. Financial entities must report major ICT-related incidents under Articles 17-19 of DORA: initial notification within 4 hours of classification (or 24 hours of detection), intermediate report within 72 hours, and final report within one month. These timelines are tighter than NIS2's 24-hour early warning and 72-hour notification requirements and are considered at least equivalent in effect.

Do financial entities need to register under NIS2?

NIS2 requires certain entities to register with the competent authority or CSIRT (Article 3(3)). Whether financial entities already supervised under DORA need to separately register under NIS2 depends on national transposition. In most Member States, financial supervisors share relevant information with cybersecurity authorities, and separate registration may not be required. Check the specific national transposition in your jurisdiction.

How does NIS2 affect ICT third-party providers serving financial institutions?

ICT third-party providers that serve financial institutions may themselves be in scope of NIS2 — particularly if they qualify as providers of managed ICT services (Annex I) or digital service providers (Annex II). This means they face their own NIS2 obligations (cybersecurity risk management, incident reporting) independently of their clients' DORA obligations. Under DORA, critical ICT third-party providers are also subject to the ESA-led oversight framework (Articles 31-44). The two regimes operate in parallel: NIS2 applies to the provider as an entity; DORA applies to the provider through the oversight framework and through contractual requirements imposed by their financial entity clients.

Should I implement DORA and NIS2 as separate compliance workstreams?

No. For financial entities, the most efficient approach is to implement DORA as the comprehensive framework and then conduct a targeted gap analysis against NIS2 national transposition requirements. Creating parallel compliance workstreams leads to duplication, inconsistency, and unnecessary cost. A single cybersecurity governance framework that meets DORA's prescriptive requirements will, in most cases, satisfy NIS2's equivalent obligations. Document your lex specialis analysis and maintain it as a living record.


Related DORA Guides

Need to check your DORA compliance?

Try free analysis →
FR

FinancialRegulations.EU Team

Regulatory Intelligence

Expert analysis of EU financial regulation — covering MiCAR, DORA, AIFMD, SFDR, and 15+ regulatory frameworks across 7 jurisdictions.

Query DORA obligations instantly

AI-powered analysis of EU financial regulations. No credit card required.

Start Free →

Get EU regulatory insights in your inbox

Weekly updates on MiCAR, DORA, SFDR and more. Unsubscribe anytime.

Related Articles