DORA Compliance for IT Leaders: Technical Requirements and Azure Implementation Guide
A technical guide to implementing the Digital Operational Resilience Act (DORA) on Azure, covering ICT risk management, incident reporting, resilience testing, and third-party oversight.
The Digital Operational Resilience Act represents the most significant regulatory shift in financial services IT since GDPR. Unlike previous regulations that focused primarily on data privacy, DORA targets the operational resilience of digital infrastructure itself. For IT leaders in financial services, this is not a checkbox exercise — it demands fundamental changes to how you architect, monitor, test, and govern your cloud environments.
This guide breaks DORA into its five pillars, maps each to concrete Azure implementation patterns, and provides a realistic timeline for achieving compliance.
Understanding DORA's Five Pillars
DORA is structured around five interconnected pillars. Each requires specific technical controls that must be demonstrable to regulators.
Pillar 1: ICT Risk Management Framework
DORA mandates a comprehensive ICT risk management framework that is integrated into the overall risk management system. This is not a separate document — it must be embedded in operational processes.
Key requirements:
- Identify and classify all ICT assets, systems, and dependencies
- Conduct continuous risk assessments of ICT systems supporting critical or important functions
- Implement protection and prevention measures proportionate to risk
- Establish detection mechanisms for anomalous activities
- Maintain business continuity and disaster recovery plans specific to ICT disruptions
Azure implementation:
The foundation is a complete asset inventory. Azure Resource Graph provides queryable metadata across all subscriptions. Combine this with Microsoft Defender for Cloud's asset inventory to get a security-enriched view.
// Azure Resource Graph query — all resources with security state
Resources
| where type != "microsoft.resources/subscriptions"
| join kind=leftouter (
securityresources
| where type == "microsoft.security/assessments"
| extend resourceId = tostring(properties.resourceDetails.Id)
) on $left.id == $right.resourceId
| project name, type, location, subscriptionId, riskLevel=properties1.status.codeFor continuous risk assessment, enable Microsoft Defender for Cloud with the Defender CSPM plan. Configure the governance rules to assign remediation ownership automatically:
- Critical findings: 7-day remediation SLA
- High findings: 14-day remediation SLA
- Medium findings: 30-day remediation SLA
Map each critical business function to its supporting Azure resources using Azure Service Map and Application Insights dependency tracking. This gives you the dependency chain regulators will ask for.
Pillar 2: ICT-Related Incident Management
DORA requires a structured incident management process with specific classification criteria, escalation procedures, and mandatory reporting to competent authorities within strict timelines.
Key requirements:
- Classify incidents using DORA's criteria: number of clients affected, geographic spread, data loss, criticality of services affected, economic impact, duration
- Submit initial notification to the competent authority within 4 hours of classifying a major ICT-related incident
- Submit an intermediate report within 72 hours
- Submit a final report within one month
Azure implementation:
Microsoft Sentinel is the anchor for DORA incident management. Build a dedicated DORA incident classification workbook that automatically scores incidents against DORA criteria.
Configure Sentinel analytics rules to detect and classify incidents:
- Automation rules that trigger when specific conditions match DORA major incident thresholds
- Playbooks (Logic Apps) that pre-populate incident reports and route them to the compliance team
- Watchlists containing DORA classification thresholds and competent authority contact details
The reporting chain should be automated as far as possible:
Build the classification logic as a Sentinel analytics rule that evaluates: number of affected clients (from identity logs), geographic spread (from geo-IP enrichment), data loss indicators (from DLP alerts), and service criticality (from your CMDB integration).
Pillar 3: Digital Operational Resilience Testing
This pillar requires regular testing of your ICT systems, ranging from basic testing to advanced threat-led penetration testing (TLPT) for significant financial entities.
Key requirements:
- Basic testing at least annually: vulnerability scanning, network security assessments, gap analyses, software composition analysis, performance testing
- Advanced TLPT for significant entities at least every three years, conducted by qualified external testers using frameworks like TIBER-EU
- Test results must feed back into the risk management framework
Azure implementation:
For basic testing, build a continuous testing pipeline:
- Vulnerability scanning: Microsoft Defender for Cloud's integrated Qualys scanner for VMs, Defender for Containers for container images, and Defender for SQL for database vulnerabilities
- Network security assessment: Azure Network Watcher's NSG flow log analysis combined with Defender for Cloud's network topology view
- Software composition analysis: GitHub Advanced Security or Azure DevOps with dependency scanning enabled in every pipeline
For resilience testing specifically, Azure Chaos Studio provides controlled fault injection:
{
"type": "Microsoft.Chaos/experiments",
"properties": {
"selectors": [
{
"type": "List",
"id": "selector1",
"targets": [
{
"id": "/subscriptions/{sub}/resourceGroups/{rg}/providers/Microsoft.Compute/virtualMachines/{vm}/providers/Microsoft.Chaos/targets/microsoft-agent",
"type": "ChaosTarget"
}
]
}
],
"steps": [
{
"name": "Step1",
"branches": [
{
"name": "Branch1",
"actions": [
{
"type": "continuous",
"name": "urn:csci:microsoft:agent:cpuPressure/1.0",
"duration": "PT10M",
"parameters": [
{ "key": "pressureLevel", "value": "95" }
],
"selectorId": "selector1"
}
]
}
]
}
]
}
}Run chaos experiments monthly against non-production and quarterly against production (during maintenance windows). Document every experiment with hypothesis, execution evidence, and remediation actions.
For TLPT, Azure supports the TIBER-EU framework. Provide the external testing team with a dedicated subscription scoped with the minimum access required. Use Azure Lighthouse for controlled cross-tenant access if the testers operate from their own tenant.
Pillar 4: Third-Party ICT Risk Management
DORA imposes direct obligations on how financial entities manage their ICT third-party providers, including contractual requirements, concentration risk analysis, and exit strategies.
Key requirements:
- Maintain a register of all ICT third-party arrangements
- Conduct due diligence and risk assessments before entering arrangements
- Include mandatory contractual provisions (data location, audit rights, exit strategies, subcontracting chains)
- Monitor concentration risk at entity and sector level
- Maintain viable exit strategies for all critical ICT providers
Azure implementation:
For Microsoft Azure itself as a third-party provider, document the shared responsibility model explicitly. Microsoft publishes DORA-specific compliance documentation — download and integrate it into your third-party register.
For the broader third-party register, build a structured dataset:
- Use Azure API Management's API catalog to inventory all external API dependencies
- Use Azure DevOps or GitHub dependency graphs to map software supply chain providers
- Maintain a SharePoint-based or database-backed register with fields mandated by DORA: provider name, services provided, criticality assessment, data locations, contract expiry, exit plan status
Monitor concentration risk by tagging each Azure resource with the ictProvider tag. Run regular reports to identify over-reliance on single providers for critical functions.
Pillar 5: Information Sharing
DORA encourages (but does not mandate for most entities) participation in threat intelligence sharing arrangements.
Azure implementation:
- Connect Sentinel to the Microsoft Threat Intelligence community
- Subscribe to sector-specific ISAC feeds and ingest them into Sentinel's Threat Intelligence blade
- Use Sentinel's Threat Intelligence workbook to track indicator volumes and detection rates
- Establish a formal information sharing agreement with peer institutions
Implementation Timeline
A realistic DORA implementation timeline for an organisation starting from a moderate maturity level:
Months 1-2: Assessment and gap analysis
- Inventory all ICT assets and third-party arrangements
- Assess current state against each DORA pillar
- Identify gaps and prioritise by regulatory risk
Months 3-4: Foundation
- Deploy Defender for Cloud across all subscriptions with Defender CSPM
- Enable Sentinel with DORA-specific analytics rules
- Establish the incident classification and reporting workflow
- Begin third-party register population
Months 5-8: Build-out
- Implement resilience testing programme (Chaos Studio experiments)
- Build automated compliance reporting dashboards
- Configure governance rules with remediation SLAs
- Conduct first round of vulnerability assessments and remediate critical findings
Months 9-10: Testing and validation
- Run full incident response exercises simulating DORA major incidents
- Execute chaos experiments against production
- Validate reporting timelines (4-hour, 72-hour, 1-month)
- Conduct third-party exit strategy tabletop exercises
Months 11-12: Steady state and audit readiness
- Compile evidence packs for each pillar
- Run internal audit against DORA requirements
- Address findings and enter continuous monitoring mode
- Engage external assessors if required
Azure Policy for Continuous Compliance
Define a custom Azure Policy initiative that encodes your DORA control requirements. This provides continuous compliance scoring and prevents drift.
Key policies to include:
- Defender for Cloud must be enabled on all subscriptions
- Diagnostic settings must be configured for all critical resources, sending to your central Log Analytics workspace
- Network Security Groups must not allow unrestricted inbound access on management ports
- Storage accounts must enforce encryption with customer-managed keys for data classified as critical
- Key Vault must have soft-delete and purge protection enabled
- SQL databases must have auditing enabled
- Container registries must not allow anonymous pull
Assign the initiative at the management group level and configure auto-remediation for policies that support it.
Common Pitfalls
Treating DORA as a documentation exercise. Regulators will ask for evidence of operational controls, not just policies. Every control must have monitoring, alerting, and evidence of execution.
Ignoring the ICT third-party register. Many organisations underestimate the scope. Every SaaS tool, API integration, and managed service provider counts. Start the inventory early.
Underestimating the 4-hour initial notification window. Four hours from classification (not from detection) to notification is tight. Without automation, you will miss it. Build and test the automated reporting chain before you need it.
Neglecting exit strategies. DORA requires viable exit plans for all critical ICT providers. This means you need to demonstrate that you can migrate away from Azure (or any critical provider) within a reasonable timeframe. Document the plan, estimate the cost, and test at least the data export portion.
Conclusion
DORA compliance is not a one-time project. It requires sustained operational discipline, continuous monitoring, and regular testing. The Azure platform provides strong native tooling for each pillar, but the tooling alone is not compliance — you need the processes, governance, and culture to make it work.
If you are navigating DORA compliance and need experienced guidance on architecture, tooling, and regulatory strategy, reach out to us at mbrahim@conceptualise.de. We help financial institutions build resilient, compliant cloud environments that satisfy regulators without sacrificing operational velocity.
Topics