Skip to main content

DORA Business Continuity and Disaster Recovery: Articles 11-12 Guide for 2026

Practical 2026 guide to DORA Articles 11 and 12 BCDR: ICT continuity policy, backup, restoration, RTO and RPO, testing, suppliers and supervisory evidence.

In this article
  1. DORA BCDR in one table
  2. What Article 11 requires
  3. What Article 12 requires
  4. Where BCDR sits in DORA
  5. Critical or important functions
  6. Evidence checklist
  7. Testing scenarios
  8. Incident reporting connection
  9. Third-party BCDR
  10. Microenterprises and proportionality
  11. Common mistakes
  12. 90-day BCDR cleanup plan
  13. FAQ
  14. How does DORA BCDR differ from traditional BCDR?
  15. Does every financial entity need TLPT?
  16. How often should BCDR be tested?
  17. Is ISO 27001 enough for DORA BCDR?
  18. Related reading
  19. Primary sources

Last reviewed: 29 April 2026

DORA business continuity and disaster recovery is not only an IT recovery topic.

Under DORA, BCDR is part of the financial entity's digital operational resilience framework. It should connect to:

  • critical or important functions;
  • ICT risk management;
  • incident response;
  • resilience testing;
  • ICT third-party risk;
  • management-body oversight.

In 2026, the supervisory question is simple:

Can the financial entity prove that critical or important services can be restored, not just that a continuity policy exists?

DORA BCDR in one table

DORA areaWhat it means for BCDREvidence to maintain
Article 11ICT business continuity policy, response and recovery proceduresApproved BCP, crisis procedures, recovery playbooks
Article 11Plans tested at least yearly and after material changesTest calendar, scenario records, after-action reports
Article 12Backup policies and proceduresBackup scope, retention, segregation and protection evidence
Article 12Restoration and recovery procedures and methodsRestore test reports, RTO/RPO measurements, integrity checks
Article 12Redundant ICT capacities and secondary site where applicableArchitecture evidence, failover results, site assumptions
Article 25Digital operational resilience testing programmeRisk-based test plan, results and remediation tracker
Article 26TLPT for entities identified by competent authoritiesTLPT scope, report and remediation where applicable
Articles 17-19Incident management and reportingIncident records, classification logs, reporting evidence
Article 28-30ICT third-party risk and contractsSupplier resilience evidence, Article 30 clauses, exit plans

What Article 11 requires

Article 11 focuses on response and recovery. The financial entity must have an ICT business continuity policy as part of the overall business continuity policy. The policy should cover the continuity of critical or important functions and the procedures for response, recovery and restoration.

Article 11 topicPractical implementation
ICT business continuity policyScope, roles, critical functions, activation criteria and review cadence
Response proceduresContainment, escalation, crisis decision-making and communications
Recovery proceduresService restoration sequence and dependencies
Crisis communicationInternal, customer, provider, authority and management communication paths
TestingAnnual tests, tests after material changes and tests after significant incidents
Lessons learnedFindings, owners, remediation and management reporting

The common gap is that the BCP exists but has never been tested against a realistic ICT disruption involving technology, operations, compliance and a critical provider.

What Article 12 requires

Article 12 focuses on backup, restoration and recovery. The entity needs backup policies and procedures, restoration and recovery procedures and methods, and appropriate ICT capacities to meet business needs.

Article 12 topicEvidence
Backup scopeWhich systems and data are backed up and why
Backup frequencyFrequency aligned to criticality and data sensitivity
RetentionRetention schedule and deletion/expiry logic
SegregationLogical or physical separation from source systems
IntegrityBackup integrity and restoration validation
RTO/RPORecovery time and recovery point objectives by service
Secondary site / capacityRedundancy and geographic assumptions where applicable

The test is not "did the backup run?"

The test is:

Can the service be restored within the required objective and with data integrity intact?

Where BCDR sits in DORA

BCDR sits across several DORA pillars:

DORA pillarBCDR connection
ICT risk managementDefines critical functions, recovery objectives and control ownership
Incident managementActivates response, escalation and reporting
Resilience testingProves restoration and service-chain resilience
ICT third-party riskExtends continuity requirements to outsourced services
Management-body oversightEnsures risks, failures and remediation are visible

This is why BCDR should not be maintained as a standalone IT document. It should be part of the ICT risk operating model.

Critical or important functions

DORA BCDR should start with critical or important functions, not with a generic server list.

Mapping layerExample question
Business serviceWhich regulated service would create material harm if unavailable?
Critical or important functionWhich function supports that service?
ICT assetWhich systems, databases, APIs and integrations support the function?
Data dependencyWhat data must be available, accurate and restorable?
Third-party dependencyWhich providers are required to operate or recover the function?
Recovery objectiveWhat RTO and RPO are realistic and tested?

For any critical or important function, the entity should be able to trace the chain:

  1. business impact analysis;
  2. asset inventory;
  3. supplier dependency;
  4. recovery plan;
  5. test result;
  6. management report.

Evidence checklist

Evidence itemWhat good looks like
BIACritical or important functions identified and reviewed
BCPVersion-controlled, approved and tied to ICT risk
DR runbookStep-by-step recovery procedure for key services
RTO/RPO registerObjectives documented and tested
Restore test reportActual restoration evidence, not just backup success
Scenario test recordSevere-but-plausible scenario, decisions and gaps
Supplier resilience evidenceCritical provider recovery and incident support validated
Remediation trackerFindings assigned, dated and closed
Board reportMaterial BCDR risks and failed assumptions visible

Testing scenarios

DORA testing should be risk-based and proportionate. For BCDR, the best scenarios are service-chain scenarios.

ScenarioWhat it tests
Cloud region outageFailover, provider escalation, service restoration
Core payment processor disruptionSupplier dependency, customer impact, workaround
Ransomware affecting operational systemsBackup integrity, segregation and restoration sequence
Database corruptionRPO, data integrity and reconciliation
Identity provider outageAccess dependency and emergency access process
Critical SaaS provider breachThird-party incident intake and continuity workaround
Payment API degradationMonitoring, escalation and customer communication

Each scenario should produce findings, owners and retest dates. A tabletop without actions is weak evidence.

Incident reporting connection

BCDR and incident reporting should be connected. A disruption that activates continuity or recovery procedures may also require DORA incident classification.

BCDR eventIncident reporting implication
Critical service unavailableAssess major ICT-related incident criteria
Provider outageCapture third-party facts and impact
Recovery objective missedRecord impact and management escalation
Data integrity affectedAssess data-loss classification criteria
Customer impact materialInclude client/counterparty impact in classification

For major ICT-related incidents, the current DORA technical standards use staged reporting:

  • initial notification within 4 hours after classification as major and no later than 24 hours after detection or awareness;
  • intermediate report no later than 72 hours from the initial notification;
  • final report no later than 1 month from the latest intermediate report.

See DORA Incident Reporting 2026 for the detailed timeline.

Third-party BCDR

Outsourced ICT services must be part of BCDR planning. A financial entity cannot show resilience if a critical provider is absent from tests, contracts and exit assumptions.

Third-party BCDR controlEvidence
Criticality assessmentProvider linked to critical or important function
Contractual supportIncident, recovery, audit and assistance clauses
Recovery commitmentsService levels, RTO/RPO support and continuity obligations
Subcontractor visibilityMaterial subcontractors and notification process
Test participationProvider included in exercises where relevant
Exit planningTransition plan and fallback options
Register of InformationProvider arrangement recorded and maintained

The Register of Information should not be separate from BCDR. It should help identify which providers support critical functions and what recovery assumptions depend on them.

Microenterprises and proportionality

Proportionality changes depth, not the need for resilience. Smaller entities may use lighter artefacts, but they still need credible continuity, recovery and evidence.

AreaSmaller entityLarger/complex entity
BIAShort list of critical services and dependenciesFormal BIA across business lines
BCPConcise playbooks and contact pathsDetailed crisis management framework
TestingOne or two realistic annual scenariosMulti-scenario testing programme
Supplier continuityCritical providers onlyTiered third-party resilience framework
ReportingSimple board/risk packFormal committee and board dashboards

Common mistakes

MistakeWhy it mattersFix
Backup success treated as recovery proofBackup completion does not prove service restorationRun restore tests and record RTO/RPO
BIA not mapped to ICT assetsRecovery plans miss dependenciesLink functions, systems, data and providers
Suppliers excluded from scenariosReal outages often start at providersInclude critical providers in tabletop or evidence review
TLPT treated as universalArticle 26 applies to selected entitiesKeep TLPT separate from general testing programme
Incident reporting disconnected from BCDRContinuity activation may require classificationAdd classification checkpoint to BCDR activation
Board sees only test completionOversight misses failed assumptionsReport findings, decisions and remediation

90-day BCDR cleanup plan

PeriodWorkOutput
Days 1-15Map critical or important functionsFunction-to-asset-to-provider map
Days 16-30Review BCP/DR runbooksUpdated playbooks and owner map
Days 31-45Validate backup and restore evidenceRestore test or remediation plan
Days 46-60Review critical provider continuitySupplier resilience evidence and gaps
Days 61-75Run one service-chain scenarioTabletop/test report with actions
Days 76-90Report to management bodyBCDR risk pack and next-quarter plan

FAQ

How does DORA BCDR differ from traditional BCDR?

DORA ties BCDR to ICT risk management, critical or important functions, incident reporting, resilience testing and ICT third-party risk. The evidence standard is operational: the entity must show plans were tested and findings were closed.

Does every financial entity need TLPT?

No. Threat-led penetration testing under Article 26 applies to financial entities identified by competent authorities under the relevant criteria. All entities need proportionate resilience testing, but TLPT is not universal.

For scope, roles and evidence, see DORA TLPT: 2026 Guide to Threat-Led Penetration Testing.

How often should BCDR be tested?

ICT business continuity and response/recovery plans should be tested at least yearly and after material changes or significant incidents. The test programme should be proportionate to the entity's risk profile.

Is ISO 27001 enough for DORA BCDR?

No. ISO 27001 can support the control environment, but DORA-specific evidence is still needed: critical-function mapping, DORA incident classification, Article 30 provider controls, Register of Information links and DORA resilience testing.

DORA by competent authority

DORA applies as EU law, but day-to-day reporting, evidence and supervisory dialogue runs through your National Competent Authority (NCA). Pick the jurisdiction-specific guide that matches your authorisation:

JurisdictionDORA competent authorityGuide
CyprusCBCCyprus guide →
DenmarkFinanstilsynetDenmark guide →
EstoniaFinantsinspektsioonEstonia guide →
FranceACPRFrance guide →
GermanyBaFinGermany guide →
IrelandCentral Bank of IrelandIreland guide →
ItalyBanca d'ItaliaItaly guide →
LatviaLatvijas BankaLatvia guide →
LithuaniaLietuvos bankasLithuania guide →
LuxembourgCSSFLuxembourg guide →
MaltaMFSAMalta guide →
NetherlandsDNBNetherlands guide →
SpainBanco de EspañaSpain guide →
SwedenFinansinspektionenSweden guide →

See the DORA National Competent Authorities selected-jurisdictions hub for the full directory and the difference between NCAs and the EU ESAs (EBA, ESMA, EIOPA).

Primary sources