Skip to main content

DORA Crosswalk

The Digital Operational Resilience Act (DORA — EU Regulation 2022/2554) entered application on 17 January 2025. It establishes a harmonised framework for ICT risk management across EU financial entities, replacing a patchwork of sector-specific ICT guidance with binding, directly applicable requirements.
DORA application date: 17 January 2025. This is not a future deadline — DORA is in force now. Trustees of schemes that fall within DORA’s scope should have assessed their ICT risk management framework, ICT incident management procedures, and ICT third-party risk management arrangements. If this assessment has not been completed, it should be treated as a priority governance matter under IORP II Article 21.

DORA Applicability to Pension Schemes

DORA Article 2 defines “financial entities” in scope. Institutions for Occupational Retirement Provision (IORPs) are explicitly included in the scope of DORA, subject to the following: Full scope: IORPs with more than 15 members are subject to the full DORA framework. Proportionate regime: IORPs with 15 members or fewer benefit from a simplified regime under Article 16 — proportionate requirements for ICT risk management. The Pensions Authority is the competent authority for IORPs in Ireland for DORA purposes, consistent with its role as the IORP II supervisory authority.
PensionPortal.ai as an ICT third-party service provider: PensionPortal.ai provides ICT services to Irish pension schemes. Depending on the materiality of those services, PensionPortal.ai may qualify as a critical ICT third-party service provider (CTPP) subject to direct oversight by the European Supervisory Authorities (ESAs) under DORA Chapter V. We monitor CTPP designation criteria and will notify affected customers of any change in status.

DORA’s Five Pillars: PensionPortal.ai Coverage

Pillar 1: ICT Risk Management (Articles 5–16)

The ICT risk management framework (ICTRM) must be documented, board-approved, and integrated into the scheme’s overall risk management system (IORP II Article 22). It must cover: ICT risk identification, protection, detection, response, and recovery.PensionPortal.ai support: The Risk module provides a dedicated ICT risk register. The ORA module incorporates ICT risk as a sub-category of operational risk for Article 28 purposes. The Operations module hosts the ICT continuity plan with documented RTO/RPO.

Pillar 2: ICT-Related Incident Management (Articles 17–23)

Financial entities must establish and maintain ICT incident management processes, including: incident detection and classification, escalation procedures, and notification of major ICT incidents to the competent authority (Pensions Authority) within prescribed timeframes.Major incident classification: Article 18 defines major ICT incidents requiring regulatory notification. Criteria include: number of affected clients, duration of service disruption, geographic spread, data loss, criticality of disrupted services, and economic impact.PensionPortal.ai support: Incident detection and alerting; severity classification aligned to DORA Article 18 criteria; Pensions Authority notification workflow; post-incident reporting templates aligned to DORA Article 19 requirements.

Pillar 3: Digital Operational Resilience Testing (Articles 24–27)

Financial entities must maintain a digital operational resilience testing programme covering: basic testing (vulnerability assessments, network security assessments, gap analyses, software testing), and for significant entities, threat-led penetration testing (TLPT) under Article 26.PensionPortal.ai support: Annual independent penetration testing; quarterly vulnerability scanning; automated SAST in CI/CD; application security scanning. Test results and remediation evidence available to trustees as part of the platform security documentation pack.

Pillar 4: ICT Third-Party Risk Management (Articles 28–44)

Financial entities must maintain a register of all ICT third-party service providers, assess the risk of each provider, and ensure written contractual arrangements include mandatory provisions under Article 30 (including: service description, data locations, security standards, incident notification obligations, audit rights, exit provisions).PensionPortal.ai support: The Outsourcing Register supports documentation of ICT third-party providers. PensionPortal.ai’s own contractual terms with customers include all Article 30 mandatory provisions. Sub-processor list maintained with security assessments.

Pillar 5: Information and Intelligence Sharing (Article 45)

DORA encourages (but does not mandate) participation in cyber threat intelligence sharing arrangements among financial entities.PensionPortal.ai approach: We monitor relevant threat intelligence channels including ENISA advisories, NCSC-IE feeds, and financial sector ISACs. Material threat intelligence relevant to platform security or customer risk is shared via platform security advisories.

DORA Article-by-Article Crosswalk

DORA ArticleChapterRequirementPensionPortal.ai ApproachEvidence
Article 5ICT Risk ManagementGovernance and organisation: board responsibility for ICT risk strategy, oversight, and accountabilityICT risk section in Governance module; board-level ICT risk reporting templateBoard ICT risk report; governance documentation
Article 6ICT Risk ManagementICT risk management framework: documented, integrated with overall risk management; protection, detection, response, recoveryICT risk register in Risk module; integration with ORA moduleICT risk register export; ICTRM documentation
Article 7ICT Risk ManagementICT systems, protocols, and tools: inventory, lifecycle management, security classificationAsset inventory functionality; system classification documentationAsset register; classification matrix
Article 8ICT Risk ManagementIdentification: continuous identification, classification, and documentation of ICT-related risks and assetsContinuous vulnerability monitoring; CVE feed integrationVulnerability scan reports; risk identification records
Article 9ICT Risk ManagementProtection and prevention: access management, physical security, cryptography, data security, software securityRBAC, MFA, AES-256, WAF, SAST — all implementedSecurity configuration documentation; penetration test reports
Article 10ICT Risk ManagementDetection: anomaly detection, monitoring, loggingImmutable audit logs; Sentry error monitoring; anomaly alertingAudit log exports; alert configuration; monitoring dashboards
Article 11ICT Risk ManagementResponse and recovery: ICT business continuity policy, crisis management, RTO/RPOBusiness continuity plan with RTO 4h / RPO 1h; documented recovery proceduresBCM plan; DR test results; RTO/RPO validation
Article 12ICT Risk ManagementBackup and recovery: documented backup policy, regular backups, backup testing, immutable backupsDaily encrypted backups; immutable backup storage; quarterly restoration testsBackup configuration; restoration test records
Article 13ICT Risk ManagementLearning and evolving: post-incident reviews, threat-led improvements to ICTRMPost-incident review process; ICTRM annual review; improvement trackingPost-incident reports; ICTRM review records
Article 17Incident ManagementClassification of ICT incidents and cyber threats: major vs non-major classificationIncident severity classification aligned to DORA Article 18 criteriaIncident register with severity classifications
Article 18Incident ManagementMajor ICT incident criteria: client impact, duration, data loss, geographic spread, criticalityAutomated severity scoring against Article 18 criteria in incident moduleIncident assessment records
Article 19Incident ManagementReporting of major ICT incidents to competent authority: initial, intermediate, and final reportsPensions Authority notification workflow; report templates aligned to DORA Article 19(4)Notification records; Pensions Authority correspondence
Article 24Resilience TestingGeneral digital operational resilience testing programme: vulnerability assessments, network security assessments, gap analysesAnnual pen testing; quarterly vulnerability scanning; automated SASTPen test reports; vulnerability scan results; SAST reports
Article 26Resilience TestingAdvanced testing via TLPT (Threat-Led Penetration Testing): for significant IORPsTLPT programme in development for customers that require it; coordination with DORA-qualified testersTLPT reports (where applicable)
Article 28Third-Party RiskGeneral principles for ICT third-party risk management: risk-based assessment, registerOutsourcing register; third-party security assessment processOutsourcing register; security assessment records
Article 30Third-Party RiskContractual arrangements with ICT third-party providers: mandatory provisions including security standards, audit rights, incident notification, exit provisionsPensionPortal.ai DPA and Terms of Service include all Article 30 mandatory provisionsDPA; Terms of Service; sub-processor list
Article 45Intelligence SharingCyber threat information sharing arrangementsThreat intelligence monitoring; customer security advisoriesAdvisory publications; threat monitoring records

DORA and IORP II: The Relationship

DORA does not replace IORP II’s governance requirements — it supplements them with specific ICT risk requirements. The relationship:
IORP II ObligationDORA Supplement
Article 21 — System of governance (operational risk)DORA Articles 5-16 — detailed ICT risk management framework
Article 22 — Risk management systemDORA Article 6 — ICTRM as sub-system of overall risk framework
Article 28 — Own risk assessmentDORA Article 6(8) — ICT risk as explicit ORA sub-category
Article 30 — Continuity planningDORA Article 11 — ICT business continuity policy
Article 31 — OutsourcingDORA Articles 28-44 — ICT third-party risk management
For IORP II-compliant schemes, the most efficient approach is to treat DORA compliance as an extension of the existing IORP II governance framework — adding the ICT-specific requirements to the risk register, the ORA, the continuity plan, and the outsourcing register — rather than creating a parallel DORA compliance workstream. PensionPortal.ai’s integrated approach supports this.