Note on terminology: on this site, « CIF » denotes a business service flagged critical under DORA Art. 3(22) — not an abstract function. Why service-level mapping →
Operational Reference · Updated 2026

DORA Incident Reporting Requirements

The complete reference for DORA reporting obligations: classification, 4h / 72h / 1-month timelines, harmonised templates from RTS 2025/301, threat notifications and Register of Information submissions.

Article 17-23 + RTS 2024/1772 + RTS 2025/301 14 min read May 2026

TL;DR

DORA imposes three reporting streams: (1) major ICT-related incidents — initial notification within 4h of classification, intermediate within 72h, final within 1 month; (2) significant cyber threats — voluntary notification under Article 19(2); (3) the Register of Information — annual submission by 30 April. Templates are harmonised by RTS 2025/301 and ITS 2024/2956. Failure to report on time is a sanctionable breach of Article 19.

Major Incident Reporting Timeline

Once an ICT-related incident is classified as major (per RTS 2024/1772), the financial entity must follow this three-stage reporting path with the competent authority. The clock starts at the moment of classification, not at detection.

1
4 hours after classification

Initial notification

Notify the competent authority that a major incident has occurred. The notification must use the harmonised template from RTS 2025/301 Annex II and contain the basic facts: when, where, type, services affected, preliminary impact, contact point. Classification must itself be done without undue delay — in practice within 24 hours of detection.

2
72 hours after classification

Intermediate report

Submit detailed information on the incident's evolution: root cause analysis (preliminary), business and operational impact (clients, transactions, services, third parties involved), measures taken to contain/recover, and forward-looking actions. May be sent earlier if the situation is stable.

3
Within 1 month of the intermediate report

Final report

Provide the full root-cause analysis, total quantitative and qualitative impact, lessons learned, and a description of the corrective/preventive actions implemented. The competent authority then forwards aggregated information to ESAs, ECB and ENISA per Article 19(6).

The 7 Classification Criteria (RTS 2024/1772)

Commission Delegated Regulation (EU) 2024/1772 sets out the criteria, thresholds and approach for classifying ICT-related incidents and significant cyber threats. An incident is major if it meets at least 2 primary criteria or 1 primary criterion plus the economic-impact threshold.

1

Clients, counterparts & transactions

Number affected, percentage of total, presence of relevant clients (e.g. central counterparties).

2

Reputational impact

Media coverage, repeated complaints, loss of clients, regulatory enforcement, contagion risk.

3

Duration & service downtime

Duration of the incident vs. recovery time objective; downtime of services supporting Critical or Important Functions.

4

Geographical spread

Number of Member States affected; cross-border services or third-country impact.

5

Data losses

Confidentiality, integrity or availability impact on personal data, sensitive financial data, or business-critical data.

6

Criticality of services affected

Impact on Critical or Important Functions (CIFs) or services delegated to ICT third-party providers.

7

Economic impact

Gross direct and indirect costs and losses — threshold of EUR 100 000 triggers the economic criterion.

Three Reporting Streams under DORA

StreamTriggerTemplate / FormatDeadline
Major ICT incident Art. 19 Classification per RTS 2024/1772 RTS 2025/301 Annex II (initial / intermediate / final) 4h / 72h / 1 month
Significant cyber threat Art. 19(2) Voluntary — institution judges threat is relevant RTS 2025/301 Annex III (threat notification template) As soon as practicable
Register of Information Art. 28(3) All ICT third-party arrangements ITS 2024/2956 (xBRL-CSV harmonised template) Annually, by 30 April
Operational/Security PSP incidents PSD2 art. 96 Payment institutions only — consolidated under DORA from 17 Jan 2025 RTS 2025/301 (single channel with DORA) Aligned with major-incident timeline

Single channel: per Article 19(1), each Member State designates one competent authority as the entry point. Reports may be transmitted via national portals or the ESAs' joint platform once operational.

Operational Tool

Automate the 4h / 72h / 1m clock with Resiplan

Resiplan triggers the reporting workflow the moment an incident is classified as major: pre-filled RTS 2025/301 templates, automatic deadline countdown, evidence chain, multi-stakeholder approval, and direct submission to the competent authority. Built for EU financial institutions.

See the incident workflow

Common Pitfalls to Avoid

Related DORA References

How Compliant Is Your Institution?

Take our free 5-minute assessment and get an instant DORA compliance score with personalised recommendations.

Get Your Free DORA Score Join Free Monthly Webinar