πŸ“’ RTS on Incident Reporting

Commission Delegated Regulation (EU) 2025/301

Digital Operational Resilience Act (DORA)

Regulation Number: Commission Delegated Regulation (EU) 2025/301

Adoption Date: October 23, 2024

Publication Date: February 20, 2025 (Official Journal)

Application Date: January 17, 2025

Official Source: EUR-Lex (eur-lex.europa.eu/eli/reg_del/2025/301)

Supplement: ITS 2025/302 (notification templates)

πŸ“‹ Executive Summary

Objective: This RTS defines the precise content and timelines for notification of major ICT incidents to supervisory authorities, as well as the voluntary notification process for significant cyber threats.

Key Principle: Fast, progressive and structured notification in 3 stages:

⏱️ The 3 Reporting Timelines (Article 5)

⚠️ WARNING: Deadlines are MAXIMUMS and NON-NEGOTIABLE

Failure to meet deadlines constitutes a DORA violation subject to penalties of up to 2% of annual worldwide turnover.

⏰ T+4 Hours: Initial Report

Deadline: Maximum 4 hours after classifying the incident as "major"

Objective: Alert the supervisor that a major incident is ongoing

Minimum mandatory content:

  • βœ… Date and time of detection
  • βœ… Nature of incident (outage, cyberattack, failure, etc.)
  • βœ… Current status (ongoing, contained, resolved)
  • βœ… Affected services/systems
  • βœ… Preliminary estimate of number of impacted clients
  • βœ… Geographic extent
  • βœ… Classification according to RTS 2024/1772 criteria
  • βœ… Immediate actions taken
  • βœ… 24/7 contact point

⚠️ Information NOT required at this stage:

  • Detailed root cause (often unknown at T+4h)
  • Precise quantification of economic losses
  • Complete remediation plan

πŸ’‘ Tip: Prepare a pre-filled template with static information (entity identification, contacts, etc.) to save time during emergency notification.

⏰ T+72 Hours: Interim Report

Deadline: Maximum 72 hours (3 days) after initial detection

Objective: Provide a detailed update on the situation and impact

Mandatory content:

  • βœ… Update of all initial report elements
  • βœ… Quantified impact:
    • Exact number of affected clients/users
    • Precise duration of interruption
    • Failed or lost transactions
  • βœ… Preliminary analysis:
    • Probable causes (if identified)
    • Attack vector (if cyber incident)
    • Failed systems and components
  • βœ… Remediation status:
    • Corrective measures applied
    • Services restored (partially or fully)
    • Estimated timeline for complete resolution
  • βœ… Economic estimate:
    • Incident response costs
    • Revenue losses
    • Fraud or direct financial losses
  • βœ… Indication if incident also notified to other authorities (GDPR DPA, CERT, etc.)

πŸ’‘ Important note: If the incident is not resolved at T+72h, the interim report must include an action plan with expected timeline.

⏰ T+1 Month: Final Report

Deadline: Maximum 1 month (30 calendar days) after initial detection

Objective: Provide comprehensive post-incident analysis and preventive measures

Mandatory content:

  • βœ… Complete Root Cause Analysis (RCA):
    • Detailed timeline of events
    • Technical root cause identified
    • Control failures that allowed the incident
    • Investigation methodology used
  • βœ… Final quantified impact:
    • Total costs (IT, consultants, customer compensation, fines)
    • Definitive revenue losses
    • Total number of affected clients/transactions
  • βœ… Immediate corrective actions:
    • Corrections already applied
    • Security patches deployed
    • Configurations modified
  • βœ… Medium/long-term remediation plan:
    • Control improvements
    • Planned technology investments
    • Staff training
    • Process reviews
    • Timeline with deadlines
  • βœ… Lessons learned:
    • What worked well
    • What needs improvement
    • Recommendations to prevent recurrence
  • βœ… Confirmation that the incident is closed

πŸ“ Detailed Report Content (Articles 2-4)

Section 1: Entity Identification

Field Description Mandatory?
Full legal name Official corporate name YES
LEI Code Legal Entity Identifier (20 characters) YES
Entity type Bank, insurance, PSP, investment, etc. YES
Country of registration EU Member State of primary authorization YES
Supervisory authority Name of competent supervisor YES
Incident contact point Name, role, email, 24/7 phone YES

Section 2: Incident Characteristics

Field Description Required T+4h Required T+72h Required T+1 month
Detection date/time Precise timestamp (UTC) βœ… βœ… βœ…
Start date/time When incident actually began (may be before detection) Estimated βœ… βœ…
Incident type β€’ Cyberattack (specify: ransomware, DDoS, phishing...)
β€’ System failure
β€’ Human error
β€’ Natural disaster
β€’ Third-party provider failure
βœ… βœ… βœ…
Classification RTS 2024/1772 criteria triggered (check all applicable) βœ… βœ… βœ…
Affected systems List of impacted applications, servers, networks Partial βœ… βœ…
Impacted business functions Payments, trading, customer service, etc. βœ… βœ… βœ…
Status Ongoing / Contained / Resolved βœ… βœ… βœ…

Section 3: Quantified Impact

Metric Calculation Method T+4h T+72h T+1 month
Number of clients Count all clients/users unable to access the service Estimated Precise Final
Interruption duration Total time (cumulative if multiple outages) in hours Ongoing Current Total
Affected transactions Number of failed/lost/delayed transactions Estimated Precise Final
Economic losses Direct costs: consultants, overtime, compensation
Revenue losses: uncollected fees
Not required Estimated Final
Compromised data Type of data (sensitive/non-sensitive)
Number of affected individuals
Type of compromise (confidentiality/integrity/availability)
If known βœ… βœ…
Geographic extent Affected countries/regions, closed sites βœ… βœ… βœ…

Section 4: Response Actions

At T+4h (Initial Report):

At T+72h (Interim Report):

At T+1 month (Final Report):

πŸ”” Voluntary Notification of Cyber Threats (Article 6)

Principle: In addition to the obligation to notify major incidents, financial entities MAY voluntarily notify significant cyber threats they detect, even if no incident has (yet) occurred.

What is a "significant cyber threat"?

Why notify voluntarily?

Content of voluntary notification:

Information Description
Threat type Malware, phishing, DDoS, intrusion, vulnerability, etc.
Technical indicators β€’ Malicious file hashes (MD5, SHA256)
β€’ Source IP addresses
β€’ C2 (Command & Control) domains
β€’ Malicious URLs
β€’ Attack patterns
Attack vector Email, web, API, VPN, supply chain, etc.
Targeted systems Targeted applications, OS, network equipment
Sophistication level Low / Medium / High / APT
Defensive actions taken Blocks, isolations, patches, enhanced monitoring

⏰ Voluntary notification timeline:

No strict deadline imposed, but notification recommended as soon as possible to maximize the usefulness of the information for the sector.

πŸ’‘ Best practice: Notify within 24h of threat detection, even if analysis is not complete.

πŸ”„ Submission Process

Notification Portals by Supervisor

Country/Supervisor Portal Format
France - ACPR ROSA Portal (Operational Security and Activity Reporting) XML per ITS 2025/302 schema
Germany - BaFin BaFin MaCo Portal XML per ITS 2025/302 schema
Spain - Banco de EspaΓ±a Portal de SupervisiΓ³n XML per ITS 2025/302 schema
Italy - Banca d'Italia Portale INFOSTAT XML per ITS 2025/302 schema
ECB (significant institutions) ECB IMAS Portal XML per ITS 2025/302 schema

πŸ’‘ Standardized format: All supervisors accept the XML format defined in ITS 2025/302, ensuring interoperability.

Authentication: Qualified electronic certificates (eIDAS) required to submit reports.

Acknowledgment of receipt: The portal automatically generates an acknowledgment with unique incident number to retain.

⚠️ Penalties for Non-Compliance

Types of Violations and Potential Penalties

Violation Severity Penalty Type
Non-notification of major incident VERY SEVERE β€’ Fine up to 2% worldwide turnover
β€’ Public disclosure of penalty
β€’ Mandatory corrective measures
Notification beyond deadline (delay >24h) SEVERE β€’ Fine up to 1% worldwide turnover
β€’ Official warning
Incomplete or inaccurate information MODERATE β€’ Fine up to 0.5% worldwide turnover
β€’ Obligation to submit corrected report
β€’ Supervised audit
Intentional misclassification VERY SEVERE β€’ Fine up to 2% worldwide turnover
β€’ Individual sanctions on managers
β€’ In-depth audit

⚠️ Note: Penalties are proportionate to the severity, duration, and recurrence of the violation, as well as the degree of cooperation with authorities.

βœ… Compliance Checklist

Preparation (BEFORE any incident)

During a Major Incident

Timing Actions Responsible
T+0 to T+2h β€’ Detect and confirm incident
β€’ Activate crisis cell
β€’ Assess preliminary impact
β€’ Classify incident (major/minor)
SOC / CERT
CISO
T+2h to T+4h β€’ Fill initial report template
β€’ Validate with Legal/Compliance
β€’ Submit on supervisor portal
β€’ Inform Executive Management
Compliance
CEO
T+4h to T+72h β€’ Continue remediation
β€’ Collect impact metrics
β€’ Prepare preliminary analysis
IT / CISO
Risk Management
T+72h β€’ Submit interim report
β€’ Include all quantified impacts
Compliance
T+72h to T+1 month β€’ Finalize RCA (Root Cause Analysis)
β€’ Define remediation plan
β€’ Calculate total costs
IT / Risk / Finance
T+1 month β€’ Submit final report
β€’ Close incident
β€’ Archive documentation
Compliance
Archives

πŸ“š Additional Resources