Audit & Supervision · Updated 2026

DORA Audit: Requirements, Checklist & How to Prepare

Everything financial entities need on DORA audits — supervisory inspections, the mandatory internal audit of the ICT risk framework, audit scope by pillar, the evidence supervisors demand and how to be ready before they knock.

3 types
Supervisory · Internal · Readiness
Art. 6(6)
Internal audit mandate
60-70%
Inspected entities with findings
2% / €1M
Max penalty exposure

What Is a DORA Audit?

A DORA audit is any structured review of a financial entity's compliance with the Digital Operational Resilience Act — Regulation (EU) 2022/2554 — and its 13 supplementing Regulatory and Implementing Technical Standards. The word "audit" is used loosely across the industry, and the first step to preparing properly is to recognise that it refers to three quite different exercises with different owners, triggers and consequences.

What they share is the reference standard: every DORA audit measures the entity against the same body of binding rules — the 64 articles of DORA plus the RTS/ITS. What differs is who runs the review, whether participation is mandatory, and what happens when a gap is found. A gap discovered by your own internal audit becomes a remediation action. The same gap discovered by a competent authority during a supervisory inspection becomes a formal finding — with potential capital, enforcement and reputational consequences attached.

That asymmetry is the single most important idea on this page. It is why mature institutions invest in audit readiness: the cheapest place to find a DORA gap is in a review you commissioned yourself.

The Three Types of DORA Audit

1. Supervisory inspection

Run by the competent authority (ECB, BaFin, ACPR, DNB, Banca d'Italia, CSSF and others). Mandatory, scheduled by the supervisor, often part of the SREP cycle for banks. Produces formal findings and can drive enforcement.

2. Internal audit

Required by Art. 6(6). The ICT risk management framework must be independently reviewed by auditors with ICT expertise, following the entity's audit plan. Findings go to the management body for formal follow-up.

3. Readiness assessment

Voluntary. Commissioned by the entity — internally or via a specialist firm — to find and fix gaps before a supervisor does. Mirrors the supervisory scope but produces a remediation plan, not an enforcement notice.

External financial audit note: DORA does not create a separate statutory "DORA opinion" within the annual financial-statement audit. However, statutory auditors increasingly consider ICT and operational resilience risk as part of going-concern and operational risk assessment, and audit committees now routinely add DORA to the internal audit universe.

Internal Audit Requirements Under DORA Art. 6(6)

Article 6(6) is the explicit DORA mandate for internal audit. It states that the ICT risk management framework must be subject to internal audit by auditors "on a regular basis in line with the financial entity's audit plan", and that those auditors must possess "sufficient knowledge, skills and expertise in ICT risk, as well as appropriate independence".

Three obligations flow from this short sentence, and supervisors test each of them:

Competence

The auditors must genuinely understand ICT risk — not just financial or process auditing. A generalist internal audit function that ticks "ICT framework reviewed" without the technical depth to challenge encryption design, network segmentation, recovery testing or sub-outsourcing chains will itself become a finding. Many institutions co-source the technical depth: internal audit owns the plan and the opinion, a specialist firm supplies the ICT expertise.

Independence

The auditor cannot review a function they help operate or design. Internal audit sits in the third line of defence; the ICT risk function and the CISO sit in the second and first. The reporting line of internal audit must run to the audit committee / management body, not to the CIO. Supervisors check the organisational chart and the reporting lines, not just the policy.

Follow-up by the management body

Article 6(6) is not satisfied by producing a report. The management body must formally receive audit findings, decide on remediation, allocate resources and track closure. Board minutes must evidence this loop. An audit finding that sits open for three cycles with no documented management response is, in supervisory eyes, worse than the original gap — it signals a governance failure under Article 5 accountability.

Frequency

DORA sets no fixed interval — it is risk-based, governed by the audit plan. In practice: significant institutions and critical or important functions are reviewed at least annually; lower-risk areas on a 2-3 year rotation so that the whole ICT risk framework is covered within a defined cycle. The audit plan itself, and its risk-based rationale, is something supervisors will ask to see.

Supervisory Inspections: How They Work

Supervisory review under DORA is exercised by national competent authorities and, for SSM-significant banks, by the ECB Joint Supervisory Teams. It takes two forms: off-site review (analysis of submitted documentation — the Register of Information, incident reports, the resilience testing programme) and on-site inspection (a supervisory team physically reviewing controls, interviewing staff, sampling evidence).

Triggers

Powers

Under Articles 50 and related provisions, supervisors can require information, conduct on-site inspections, demand remediation within deadlines, impose administrative penalties (up to 2% of total annual worldwide turnover for entities, EUR 1 million for natural persons), issue public censure, and apply qualitative measures. For designated Critical ICT Third-Party Providers, the Lead Overseer regime adds direct ESA oversight (see third-party risk).

DORA Audit Scope by Pillar

Whether internal or supervisory, a DORA audit walks the five pillars. Use the table below as the backbone of an audit programme — each row is a testable control area with its article anchor.

PillarWhat the audit testsAnchor
ICT risk managementBoard-approved framework, ICT risk appetite, three-lines-of-defence model, asset classification, protection & detection controls, ICT business continuity policy, validated RTO/RPOArt. 5-16
Incident managementDetection, classification governance against RTS criteria, 4h/72h/1-month reporting, root-cause discipline, NCA portal readinessArt. 17-23
Resilience testingAnnual testing programme, independence of testers, coverage of critical functions, TLPT lifecycle and attestation where designatedArt. 24-27
Third-party riskRegister of Information completeness, Article 30 mandatory clauses, concentration risk, sub-outsourcing visibility, tested exit strategiesArt. 28-44
Information sharingParticipation arrangements, threat-intelligence handling, GDPR-compliant exchangeArt. 45

Run the free 45-point DORA compliance checklist to get a fast structured read across all five pillars before you scope a formal audit.

The Evidence a DORA Audit Demands

DORA audits are evidence-driven. A control that exists but is not documented is, in audit terms, a control that does not exist. Assemble and keep current the following audit file:

Audit tip: keep this file continuously, not at audit time. Supervisors increasingly run short-notice "dip checks" — if the Register of Information or incident log only reflects reality at the 30 April submission date, a mid-year check will surface the gap.

How to Prepare: DORA Audit Readiness

Audit readiness is a deliberate programme, not a scramble before the supervisor arrives. A proven sequence:

1. Scope and self-assess

Map your entity against all five pillars and the 13 RTS. The free DORA compliance checklist gives a fast structured baseline; a formal gap analysis turns it into a prioritised backlog with ownership and effort estimates.

2. Close the evidence gaps

For every control, ask "could I hand a supervisor the evidence today?" Where the answer is no, the gap is documentation, not control design — and that is the fastest category to fix.

3. Run a mock inspection

A readiness assessment that mirrors the supervisory scope, ideally run by people who have seen real inspections. It surfaces the findings a supervisor would raise — while they still cost only remediation effort.

4. Validate the recovery claims

The most common evidence failure is RTO/RPO that look fine on paper but were never tested end-to-end. Schedule and document the test before the audit, not during it.

5. Brief the management body

Article 5 accountability means the board must be able to speak to the ICT risk position. A pre-audit board briefing is a standard part of readiness work.

The 7 Most Common DORA Audit Findings

  1. Incomplete Register of InformationMissing LEIs, inconsistent service taxonomy, and almost universally weak sub-outsourcing data below Tier 2. The single most frequent finding in 2025 inspections.
  2. Incident classification governanceOutdated internal thresholds causing under-reporting of major incidents; no clear, empowered classification decision owner.
  3. Recovery objectives not validatedRTO/RPO documented but never tested end-to-end, or tested only in isolated components rather than full failover.
  4. Article 30 clauses missing from contractsLegacy vendor master agreements never re-papered with audit rights, exit, sub-outsourcing and data-location clauses.
  5. Superficial board oversightICT risk reaching the board as a status colour rather than quantitative KRIs; minutes that do not evidence real challenge or follow-up.
  6. Internal audit lacks ICT depthA generalist internal audit function reviewing the ICT framework without the competence to challenge it — a finding under Article 6(6) itself.
  7. Open findings left unremediatedPrior audit or inspection findings carried for multiple cycles with no documented management response — read by supervisors as a governance failure.
DORA Audit Support

Get Audit-Ready With Cryptaguard

This platform is operated by Cryptaguard, a specialist team focused exclusively on DORA, operational resilience and GRC for EU financial institutions. We help banks, insurers, investment firms and ICT providers walk into a supervisory inspection with a defensible, evidence-complete audit file — and we have run readiness work across institutions in more than 20 EU countries.

DORA Power Assessment

A 30-minute expert call plus a written compliance score and your top-5 audit-risk priorities, delivered within 48 hours. The fastest way to know where you stand.

€149

Audit Readiness Review

A mock inspection across the five pillars and 13 RTS — run by people who have seen real supervisory reviews. You receive a prioritised remediation backlog, not an enforcement notice.

from €990

Resiplan — continuous evidence

Our specialised SaaS keeps your Register of Information, incident log and audit evidence current and export-ready year-round — so a dip check or inspection is never a scramble.

14-day free trial

Independent of software vendors and testing firms. NDA on every engagement. ISO 27001-aligned handling of client material.

DORA Audit FAQ

What is a DORA audit?
A DORA audit is any structured review of a financial entity's compliance with Regulation (EU) 2022/2554. The term covers three things: supervisory inspections by competent authorities, the mandatory internal audit of the ICT risk management framework under Article 6(6), and voluntary external readiness assessments. They share the same reference standard — DORA plus the 13 RTS/ITS — but differ in who runs them and the consequences.
Does DORA require an internal audit of ICT risk?
Yes. Article 6(6) requires the ICT risk management framework to be subject to internal audit by auditors with sufficient ICT risk knowledge, skills and expertise, on a regular basis in line with the entity's audit plan, and with appropriate independence from the function audited. The management body must formally follow up on every finding.
How often does a DORA audit have to take place?
There is no single fixed interval. Internal audit follows the entity's risk-based audit plan — typically a full cycle every 1 to 3 years with critical areas annually. Supervisory inspections are scheduled by the competent authority, often within the SREP cycle. Resilience testing is annual, and TLPT runs at least every 3 years for designated entities.
Who can perform a DORA internal audit?
Article 6(6) requires auditors with sufficient ICT risk knowledge and full independence from the ICT function audited. This can be the internal audit department if it has the technical competence, or a co-sourced/outsourced specialist firm. Many institutions combine both. The management body remains accountable for acting on findings.
What do supervisors check during a DORA inspection?
Supervisors focus on evidence: completeness and data quality of the Register of Information, incident classification governance, validated RTO/RPO, Article 30 contractual clauses, board-level ICT risk oversight with concrete minutes, and the resilience testing programme. Around 60-70% of inspected entities receive material findings on at least one of these.
What is a DORA audit readiness assessment?
A voluntary, pre-emptive audit run by the entity or a specialist firm to find and fix gaps before a supervisor does. It mirrors the supervisory scope across all five pillars and 13 RTS, and produces a prioritised remediation backlog rather than an enforcement notice — the lowest-cost way to manage audit risk.
What documents are needed for a DORA audit?
The board-approved ICT risk framework and BCP, the Register of Information, incident logs with classification rationale, the resilience testing programme and reports (including TLPT attestation), third-party contracts showing Article 30 clauses, board and committee minutes, RTO/RPO test results, and prior internal audit reports with management follow-up. Undocumented controls are treated as absent.
What are the consequences of a poor DORA audit?
A weak internal audit result is itself a governance finding. A poor supervisory inspection can trigger qualitative measures, Pillar 2 capital add-ons for SSM banks (25-100 bps), public censure and, in serious cases, activity restrictions. Article 50 fines reach 2% of worldwide turnover for entities and EUR 1 million for accountable individuals.
How much does a DORA audit or readiness assessment cost?
Cost scales with entity size and scope — from a focused half-day review of one pillar to a multi-day full five-pillar gap assessment. Fixed-fee formats start at a low-cost entry assessment. The cost of a readiness assessment is a fraction of the cost of a supervisory finding, which is why audit-readiness work has the strongest ROI of any DORA spend.
Does ISO 27001 certification satisfy a DORA audit?
No, but it helps. ISO 27001 controls overlap significantly with the RTS on ICT risk management framework — a certified entity typically meets 60-75% of control design. But DORA audits also test DORA-specific items ISO does not cover: incident classification thresholds, the Register of Information, Article 30 clauses, TLPT and the board accountability model. Auditors accept ISO 27001 as design evidence but verify the DORA-specific delta separately.

Related DORA Resources

What is DORA?

The complete plain-language guide to the regulation, its 5 pillars and scope.

DORA Compliance Checklist

Free interactive 45-point self-assessment across all 5 pillars.

RTS & ITS Standards

All 13 technical standards — the reference your audit is measured against.

Incident Reporting

Classification criteria and the 4h/72h/1-month reporting workflow.

Third-Party Risk

Register of Information and Article 30 clauses — a top audit finding area.

TLPT Guide

Threat-Led Penetration Testing — scope, phases and supervisory attestation.

Gap Analysis Tool

Identify compliance gaps against DORA requirements in under 15 minutes.

DORA Consulting Services

Expert audit-readiness and gap-assessment engagements.

🚀
Next Step · Automate It

Now You Know the Gaps — Close Them With Resiplan

Resiplan is the specialised SaaS for DORA, business continuity and GRC. Turn your one-off assessment into continuous compliance — automated register of information, incident tracking, vendor risk monitoring, real-time dashboards.

Automated RoI submission
Incident reporting workflow
Vendor risk scoring
Real-time compliance dashboard
Try Resiplan — Free Demo See Pricing →

14-day free trial · No credit card · Cancel anytime

How Compliant Is Your Institution?

Take our free 5-minute assessment and get an instant DORA compliance score with personalised recommendations.

Get Your Free DORA Score Join Free Monthly Webinar