Build and transform technology landscapes to support evolving business strategies and operationalize innovation.
Learn moreMaximize market potential through a partner program offering LeanIX solutions tailored to your business model.
Learn moreTake your capabilities to the next level and arm yourself with the knowledge you need
See all resourcesMaster DORA-compliant incident reporting with a step-by-step guide on detection, escalation, and reporting workflows for ICT-related disruptions.
Third-party risk management is a critical requirement under the Digital Operational Resilience Act (DORA), ensuring financial institutions and ICT providers identify, monitor, and mitigate risks associated with their external vendors.
Outlined in Articles 28–33, this requirement addresses the need for robust oversight of third-party ICT service providers to maintain operational resilience and compliance with regulatory standards.
This requirement complements the other core pillars of DORA:
Together, these requirements provide a comprehensive framework for ensuring digital operational resilience across the financial sector. This guide focuses on the third-party risk management aspect, detailing practical steps, tools, and strategies to align with DORA’s expectations.
📚 Related: The Digital Operational Resilience Act (DORA) - Regulation (EU) 2022/2554
Third-party risk management involves identifying, assessing, and mitigating risks that arise from dependencies on external service providers. For financial institutions, these providers can include cloud service providers, cybersecurity vendors, data hosting companies, and other ICT services integral to their operations.
Under DORA, third-party risks are explicitly regulated to ensure financial institutions remain resilient even when critical services are outsourced.
📚 Related: Official DORA Journal of the EU
DORA outlines clear requirements for third-party risk management to ensure financial institutions remain resilient even when outsourcing critical services. These include:
📚 Related: DORA Maturity Assessment
The first step in third-party risk management is to identify vendors whose services are integral to the organization’s operations.
These critical relationships often include cloud providers, cybersecurity vendors, and payment processors. DORA mandates that organizations focus their risk management efforts on these high-impact third parties.
Organizations typically begin by mapping their vendor ecosystem to identify critical dependencies. Enterprise architecture tools help visualize how third-party services integrate into the broader ICT landscape, such as showing how a cloud provider supports a core banking platform.
Institutions assess vendors based on factors such as the volume of data processed, service criticality, and potential business impact of disruptions.
Key Activities:
The outcome is a comprehensive understanding of third-party relationships, enabling organizations to focus on the most critical risks.
Risk assessments evaluate a vendor’s ability to meet operational, security, and compliance requirements. These assessments identify vulnerabilities that could threaten the organization’s resilience.
Risk assessments often involve reviewing vendor security policies, incident response plans, and compliance certifications, such as ISO 27001 or SOC 2. Organizations also evaluate the vendor’s financial health, geographic location, and data protection measures.
For example, assessing a data hosting provider might include testing its backup protocols and reviewing its disaster recovery plans.
Key Activities:
The outcome is a detailed risk profile for each critical vendor, guiding decisions about collaboration and risk mitigation.
DORA requires organizations to define clear resilience and compliance obligations in contracts with third-party providers. Contracts ensure vendors are accountable for their role in operational stability.
Organizations work with legal teams to draft contracts that align with DORA requirements. These contracts typically mandate regular security audits, compliance with international standards, and participation in resilience tests, such as Threat-Led Penetration Testing (TLPT).
For instance, a contract with a cloud provider might include SLAs specifying recovery time objectives (RTOs) during outages and penalties for non-compliance.
Key Activities:
The outcome is legally enforceable agreements that hold vendors accountable for resilience and compliance.
Continuous monitoring ensures vendors consistently meet the agreed-upon resilience and compliance standards. This ongoing process helps organizations identify and address emerging risks promptly.
Organizations leverage tools like SIEM platforms and governance dashboards to monitor third-party systems in real time. These tools provide visibility into performance metrics, such as uptime, response times, and security incidents. Regular audits and periodic reviews ensure that vendors remain compliant with regulatory requirements.
For example, a financial institution might conduct quarterly reviews of its payment processor’s incident response logs to verify adherence to agreed-upon protocols.
Key Activities:
The outcome is a proactive risk management approach, ensuring third-party compliance and operational continuity.
DORA requires third-party providers to integrate with the organization’s incident response plans, ensuring coordinated efforts during disruptions.
Organizations establish joint incident response protocols with critical vendors, defining roles, responsibilities, and communication workflows. For example, a ransomware attack on a cloud provider hosting customer data would trigger coordinated efforts between the vendor and the institution to mitigate the breach and inform regulators. These protocols are tested regularly through simulations to ensure effectiveness.
Key Activities:
The outcome is a cohesive incident management strategy that incorporates third-party actions, minimizing the impact of vendor-related disruptions.
Transparency and accountability are key to DORA compliance. Organizations must document their third-party risk management activities and provide detailed reports during regulatory audits.
Compliance teams maintain detailed records of vendor assessments, contracts, and performance audits. BPM tools streamline the reporting process, ensuring all required information is documented and readily available for regulatory reviews.
For instance, during a regulatory audit, an institution might provide evidence of how a vendor participated in resilience testing or met SLA targets.
Key Activities:
The outcome is robust documentation that demonstrates compliance with DORA’s third-party risk management requirements.
📚 Related: The Role of Enterprise Architecture in DORA Compliance
Embedding these practices into long-term strategies, supported by robust tools and clear contractual obligations, helps institutions build secure, reliable partnerships that adapt to the changing digital landscape.
Free White Paper
What is third-party risk management?
Third-party risk management involves identifying, assessing, and mitigating risks associated with external vendors that provide critical services to an organization. It ensures these vendors maintain security, compliance, and resilience to avoid disruptions or regulatory breaches.
What is enterprise third-party risk management?
Enterprise third-party risk management focuses on managing vendor risks at an organizational level, particularly for large institutions. This involves implementing frameworks, policies, and tools to oversee the performance, security, and compliance of all third-party providers, ensuring alignment with enterprise objectives and regulatory requirements.
What does DORA mean for third parties?
DORA imposes specific obligations on third-party ICT providers serving financial institutions. These include participating in resilience testing, maintaining robust risk management practices, and complying with contractual obligations that align with operational resilience and regulatory standards.
How do you monitor third-party risk?
Monitoring third-party risk involves using tools like governance dashboards, SIEM systems, and performance trackers to oversee vendor activities in real time. Organizations conduct periodic reviews, audits, and testing to ensure vendors meet contractual and regulatory requirements while identifying emerging risks.