Build and transform technology landscapes to support evolving business strategies and operationalize innovation.
Learn moreMaximize market potential through a partner program offering LeanIX solutions tailored to your business model.
Learn moreTake your capabilities to the next level and arm yourself with the knowledge you need
See all resourcesLearn how information sharing under DORA enhances collective resilience by enabling secure, collaborative exchanges of threat intelligence and best practices.
Information sharing is a critical requirement of the Digital Operational Resilience Act (DORA), designed to foster collaboration, transparency, and collective resilience across the financial sector.
Outlined in Articles 19–21, information sharing ensures that financial institutions, ICT providers, and regulatory bodies exchange actionable intelligence to strengthen defenses against cyber threats and operational risks.
This requirement complements the other core pillars of DORA:
Together, these elements provide a comprehensive framework for digital operational resilience, ensuring financial institutions can maintain stability and compliance in an evolving risk landscape.
This guide explores the information-sharing component in detail, offering insights into its implementation and benefits.
📚 Related: The Digital Operational Resilience Act (DORA) - Regulation (EU) 2022/2554
Information sharing under DORA refers to the exchange of cybersecurity and ICT risk-related data between financial institutions, ICT providers, regulatory bodies, and other stakeholders.
The goal is to strengthen collective defenses against cyber threats, reduce duplication of effort, and improve the overall resilience of the financial ecosystem.
DORA mandates that information sharing must be conducted securely, ensuring the protection of sensitive data and compliance with privacy regulations.
📚 Related: Official DORA Journal of the EU
DORA mandates that financial institutions establish systems and processes to facilitate secure and efficient information sharing. Key requirements include:
📚 Related: DORA Maturity Assessment
Creating secure channels for information sharing is the first step in meeting DORA’s requirements. Financial institutions must implement systems that ensure the safe exchange of data, maintaining confidentiality, integrity, and availability.
Organizations often rely on Threat Intelligence Platforms (TIPs) or other encrypted communication tools to facilitate secure data exchanges. These platforms streamline the process by integrating various data sources, providing a unified system for analyzing and disseminating threat intelligence. For example, a bank using a TIP can automatically share Indicators of Compromise (IoCs) from a detected phishing attack with peers, enabling them to strengthen their defenses proactively.
Key Activities:
The outcome of implementing secure mechanisms is a trusted, scalable, and efficient framework for exchanging actionable intelligence, reducing risks across the ecosystem while maintaining compliance.
DORA encourages organizations to actively participate in structured information-sharing arrangements, such as industry forums, threat intelligence networks, or public-private partnerships.
For instance, a financial institution might join an EU-wide threat intelligence forum, where members share real-time updates on malware trends, regulatory developments, or potential vulnerabilities in common technologies. This collaboration ensures that participants benefit from the collective expertise of the group while aligning with DORA’s requirements for active engagement.
Key Activities:
The outcome is improved situational awareness, faster response times to sector-wide threats, and stronger coordination between public and private entities, ultimately enhancing the resilience of the entire financial ecosystem.
Accurate, timely, and relevant data is essential for effective information sharing. Organizations must validate the data they share and ensure it is actionable for recipients.
For example, an organization reporting a ransomware attack might include detailed IoCs, such as the hash of the malicious file and the IP address of the command-and-control server, alongside mitigation strategies. Standardization through formats like STIX ensures that recipients can seamlessly integrate the shared data into their security systems for immediate action.
Key Activities:
The outcome of prioritizing data quality is the dissemination of reliable intelligence that recipients can use effectively to enhance their security posture and respond swiftly to potential threats.
While transparency is critical for effective information sharing, organizations must also safeguard sensitive data to ensure compliance with privacy and security regulations.
Financial institutions often anonymize data before sharing it, especially when it involves customer information or proprietary details. For instance, sharing aggregated data on the volume and frequency of phishing attempts across the sector provides valuable insights without revealing specifics about any individual organization. Organizations must also establish and enforce policies defining what information can be shared and the safeguards required to protect it during and after transmission.
Key Activities:
The outcome is a responsible and compliant approach to information sharing that ensures actionable intelligence is available to stakeholders without compromising data privacy or security. This builds trust within the network and enhances the collective ability to respond to threats effectively.
📚 Related: The Role of Enterprise Architecture in DORA Compliance
Information sharing under DORA enhances collective resilience by enabling organizations to collaborate effectively against ICT risks and cyber threats. By implementing secure systems, engaging in industry networks, and adhering to privacy regulations, financial institutions can foster a culture of transparency and cooperation while maintaining compliance.
Free White Paper
What is information sharing in DORA?
Information sharing in DORA refers to the secure and collaborative exchange of threat intelligence, best practices, and incident data among financial institutions, ICT providers, and regulatory bodies. Its goal is to strengthen the collective resilience of the financial sector by fostering transparency and improving response strategies against ICT risks.
What is Article 45 of DORA?
Article 45 of DORA addresses the specific obligations of critical third-party ICT providers, emphasizing the need for comprehensive reporting and oversight mechanisms. It ensures these providers contribute to the operational resilience of the financial institutions they serve, including participating in information-sharing frameworks when required.
What are the reporting requirements for DORA?
DORA mandates that significant ICT-related incidents be reported to regulatory authorities within strict timelines. Reports must include the nature of the incident, its impact, root cause, and mitigation steps. Organizations must also document all incidents, including minor ones, for audit purposes and continuous improvement.
What is the function of information sharing?
The primary function of information sharing is to enhance collective defenses by enabling organizations to share actionable insights, such as threat intelligence, vulnerability updates, and best practices. This fosters collaboration, reduces duplication of effort, and improves the sector’s ability to detect and respond to emerging threats effectively.