Skip to main content
DORA

DORA Incident Reporting: Your Guide to Initial, Intermediate, and Final ICT Reports (2025)

By December 13, 2025No Comments12 min read

Table of Contents

The Imperative of DORA Incident Reporting for Digital Resilience

In today’s hyper-connected financial landscape, the Digital Operational Resilience Act (DORA) is not just another regulation; it’s a fundamental shift towards ensuring the robustness and continuity of digital services. For financial entities and critical ICT service providers across the EU, understanding and implementing DORA’s stringent incident reporting requirements is paramount. Failure to comply can lead to severe penalties, reputational damage, and, most critically, disruptions that undermine customer trust and market stability. This guide delves into the intricacies of DORA’s three-stage incident reporting framework, empowering you to navigate the complexities of initial, intermediate, and final ICT reports with confidence.

DORA Fundamentals: Key Definitions and Scope

DORA Definition

The Digital Operational Resilience Act (DORA) establishes a comprehensive framework to enhance the digital operational resilience of the financial sector. It harmonizes rules on ICT risk management, incident reporting, resilience testing, third-party risk, and information sharing.

Major ICT Incident

A Major ICT Incident is defined as an ICT incident that has the potential to cause significant operational disruption or poses a substantial risk to the financial sector’s ability to operate. The classification criteria, detailed later, are crucial for determining the reporting obligations.

Significant Cyber Threat

A Significant Cyber Threat refers to a cyber threat that could potentially compromise the availability, integrity, or confidentiality of an entity’s ICT systems and data, and could lead to a Major ICT Incident.

Scope

DORA applies to a wide range of financial entities, including credit institutions, payment institutions, electronic money institutions, investment firms, crypto-asset service providers, and critical ICT third-party service providers that support these entities. Its scope is broad, aiming to cover the entire financial ecosystem.

The Three-Stage DORA Incident Reporting Framework

DORA mandates a structured, multi-stage approach to reporting ICT-related incidents. This framework ensures that competent authorities are informed promptly and progressively about the evolving nature and impact of significant incidents. The three stages are:

Overview

The reporting process is designed to provide authorities with timely and relevant information without overwhelming them with every minor event. It balances the need for prompt notification with the requirement for detailed analysis as the incident unfolds.

Initial Notification

This is the first alert to the relevant competent authority. It must be submitted as soon as the financial entity or ICT provider becomes aware of an ICT incident that is classified as “major.” This initial report serves as a critical alert, enabling authorities to assess potential systemic risks.

Intermediate Report

As the investigation into the incident progresses, an intermediate report is required. This report provides updated information on the incident’s impact, the ongoing mitigation efforts, and any newly identified complexities. It bridges the gap between the initial alert and the final assessment.

Final Report

Once the incident has been fully investigated, resolved, and its impact assessed, a final report is submitted. This report offers a comprehensive analysis, including root causes, lessons learned, and recommendations for preventing recurrence. It is the culmination of the incident reporting process.

Classifying “Major” Incidents: Criteria and Materiality Thresholds

Accurately classifying an ICT incident as “major” is a cornerstone of DORA compliance. The regulation outlines several key criteria to guide this assessment. Financial entities and ICT providers must have robust internal processes to evaluate incidents against these thresholds. Understanding these criteria is vital for timely and appropriate reporting.

Classification Requirements

The classification hinges on the potential or actual impact of the incident on the entity’s operations, its clients, and the broader financial system. A systematic approach ensures consistency and compliance.

Key Criteria: Affected Parties, Duration/Downtime, Geographical Spread, Data Losses, Criticality, Economic Impact

When assessing an incident, consider:

  • Affected Parties: The number of clients, users, or counterparties impacted.
  • Duration/Downtime: The length of time critical ICT services were unavailable or degraded.
  • Geographical Spread: The extent of the incident’s impact across different regions or countries.
  • Data Losses: The volume and sensitivity of any personal data, confidential information, or critical financial data compromised.
  • Criticality: The importance of the affected ICT service to the entity’s operations and the financial system.
  • Economic Impact: The quantifiable financial losses incurred by the entity or its clients.

Recurring/Aggregated Incidents

DORA also emphasizes the importance of recognizing that multiple smaller incidents, when aggregated, can constitute a Major ICT Incident. Entities must monitor and assess cumulative impacts to avoid overlooking systemic issues.

DORA ICT Incident Report Timelines and Content

The specific timelines and required content for each reporting stage are critical. Adherence to these requirements ensures regulatory expectations are met and facilitates effective communication with competent authorities. The standardized approach aids in consistent data collection and analysis across the financial sector.

Initial Notification: Timeline, Content

  • Timeline: Within 24 hours of identifying an ICT incident as major.
  • Content: Basic information including type of incident, classification criteria met, impact on services, affected parties, and a preliminary assessment of the situation.

Intermediate Report: Timeline, Updates, Content

  • Timeline: At least every 24 hours after the initial notification, or as agreed with the competent authority.
  • Content: Updates on the incident’s evolution, status of mitigation and recovery actions, new findings, and any changes in impact assessment.

Final Report: Timeline, Content

  • Timeline: Within 24 hours after the incident is fully resolved and the full impact is assessed.
  • Content: A detailed root cause analysis, description of actions taken, lessons learned, proposed measures to prevent recurrence, and overall impact assessment.

Standardized Templates and Regulations

While DORA provides the framework, specific details regarding standardized templates and reporting mechanisms are often harmonized through implementing acts and guidelines from the European Supervisory Authorities (ESAs). Staying updated with these is crucial.

For more on the intricacies of regulation, refer to the EBA guidelines on ICT risk.

Building Your DORA-Compliant Internal Incident Reporting Process

Effective DORA compliance starts with a well-defined internal incident management process. This process should be integrated into the organization’s overall risk management and operational resilience framework. Having clear protocols ensures swift, accurate, and compliant reporting.

Incident Management

Establish a robust incident management system that includes detection, logging, classification, assessment, and resolution capabilities. This system should be regularly tested and updated.

Roles, Responsibilities, and Escalation

Clearly define roles and responsibilities for incident response and reporting. Ensure there is a defined escalation path for Major ICT Incidents to senior management and the designated reporting function.

Communication Plans

Develop internal and external communication plans. These should outline how information will be shared within the organization, with competent authorities, and with affected clients or stakeholders.

Documentation and Record Keeping

Maintain comprehensive documentation of all incidents, investigations, reports, and actions taken. This record-keeping is essential for audits and continuous improvement. A DORA compliant ICT risk register is a key component of this.

Post-Incident Analysis

Conduct thorough post-incident reviews to identify lessons learned and opportunities for enhancing ICT security and operational resilience. This analysis feeds into the final report and future risk mitigation strategies.

DORA Obligations for ICT Third-Party Service Providers

DORA extends its reach to critical ICT third-party service providers, recognizing their pivotal role in the financial ecosystem. These providers must also adhere to specific reporting requirements, ensuring that the resilience of the entire digital supply chain is maintained.

Direct Scope

Critical ICT third-party service providers are brought directly under DORA’s supervisory framework. This means they have direct obligations, including incident reporting, to designated competent authorities.

Reporting to Clients

While direct reporting to authorities is required for critical providers, they also have an obligation to inform their financial entity clients about any ICT incidents that could impact the services provided. This ensures their clients can fulfill their own reporting obligations.

Financial Entity Responsibility

Financial entities remain ultimately responsible for managing the ICT risks associated with their third-party providers. This includes ensuring their providers are compliant and that contractual agreements adequately address incident reporting and mitigation.

Key Contractual Provisions

Contracts with ICT third-party service providers must explicitly detail incident reporting procedures, notification timelines, data protection measures, and audit rights, aligning with DORA requirements.

Avoiding Common Pitfalls in DORA Incident Reporting

Navigating DORA incident reporting presents several challenges. Awareness of common mistakes can help organizations proactively build robust compliance strategies and avoid costly errors. Many organizations stumble over basic requirements, leading to non-compliance.

Missing Deadlines

The strict timelines for initial, intermediate, and final reports are non-negotiable. Failure to report within these windows is a common and serious compliance breach.

Inaccurate Classification

Misclassifying an incident as non-major when it meets the criteria, or vice versa, can lead to reporting failures or unnecessary administrative burdens.

Lack of Processes

Absence of documented, tested incident management and reporting procedures is a fundamental weakness. Understanding DORA compliance requires detailed internal processes.

Inconsistent Documentation

Incomplete or inconsistent records hinder investigations and make it difficult to demonstrate compliance to regulators. Proper documentation is key.

Ignoring Templates

Failure to utilize any standardized templates or formats provided by competent authorities can lead to rejection of reports or delays.

Neglecting Third-Party Oversight

Not effectively managing and monitoring ICT third-party providers’ incident reporting capabilities is a significant oversight, especially for critical providers.

Fragmented Approach

Treating incident reporting as an isolated task rather than part of a holistic operational resilience strategy can lead to gaps and inefficiencies.

Insufficient Visibility/Testing

Without adequate monitoring tools and regular testing of incident response plans, organizations may be unaware of incidents or unable to respond effectively.

Inadequate Training

Staff not being adequately trained on DORA reporting requirements and internal procedures is a recipe for errors.

Weak Communication

Poor internal communication during an incident can lead to delays in classification and reporting. Clear channels are essential.

Underutilizing Technology

Failing to leverage security information and event management (SIEM) systems, incident response platforms, and other technologies can hinder efficiency and accuracy.

To avoid these issues, consider the common DORA compliance mistakes.

Where and How to Submit DORA ICT Incident Reports

Understanding the submission channels and authorities responsible for receiving DORA incident reports is crucial for timely compliance. The process involves national competent authorities (NCAs), with ongoing harmonization efforts.

NCA Submissions

Reports are typically submitted to the National Competent Authority (NCA) designated for your specific financial sector within each EU member state. This might be the central bank or a specific financial supervisory authority.

Harmonized Templates and National Pathways

While DORA aims for harmonization, the exact pathways for submission may vary by country. ESAs are developing standardized templates to ensure consistency in the information submitted, making it easier for authorities to process and analyze data.

Future Centralization

The long-term vision for DORA includes further centralization of reporting and supervisory functions, aiming to create a more unified and efficient regulatory landscape across the EU. This will likely involve enhanced digital reporting platforms.

DORA Incident Reporting: Frequently Asked Questions (FAQs)

What is considered a “Major” ICT Incident under DORA?

A Major ICT Incident is one that causes significant operational disruption or poses a substantial risk, assessed against criteria like affected parties, duration, geographical spread, data loss, criticality, and economic impact.

How quickly do I need to submit an Initial Notification?

You must submit the Initial Notification within 24 hours of identifying an ICT incident as major.

What information is required in a Final Report?

The Final Report requires a detailed root cause analysis, a description of all actions taken, lessons learned, recommendations for prevention, and the overall impact assessment.

Do ICT third-party service providers have direct reporting obligations?

Yes, critical ICT third-party service providers have direct reporting obligations to their designated competent authorities. They also have obligations to inform their financial entity clients.

Can I use my existing incident response plan?

Your existing incident response plan must be reviewed and updated to ensure it meets DORA’s specific requirements for classification, timelines, and content. Many existing plans will need enhancement.

What happens if I miss a reporting deadline?

Missing reporting deadlines can lead to significant penalties, including fines, and can impact your regulatory standing. Proactive planning and robust internal processes are key to avoiding this.

Conclusion: Ensuring DORA Operational Resilience / How CyAdviso Helps

Mastering DORA incident reporting is a critical undertaking for any financial entity or ICT provider operating within the EU. It demands a strategic approach, meticulous planning, and a robust internal framework. By understanding the three-stage reporting process, accurately classifying incidents, adhering to timelines, and diligently documenting all activities, organizations can not only achieve compliance but also significantly enhance their digital operational resilience.

Navigating the complexities of DORA can be challenging. CyAdviso offers DORA compliance services designed to guide your organization through every step of the process. From developing tailored incident reporting frameworks and conducting readiness assessments to providing expert advice on classification and documentation, our team of seasoned professionals ensures you meet regulatory obligations effectively.

Our comprehensive DORA compliance guide and specialized advisory services, including our expert vCISO services, are tailored to address the unique needs of FinTech businesses. Partner with CyAdviso to build a resilient operational framework that not only meets DORA requirements but also strengthens your overall cybersecurity posture and fosters trust with your clients and regulators.