Venvera
Learn

DORA SUPERVISORY ASSESSMENTS IN 2026: WHAT FINANCIAL INSTITUTIONS SHOULD EXPECT NOW THAT ENFORCEMENT IS LIVE

·Alexander Sverdlov

DORA Enforcement · March 2026

National Competent Authorities have started knocking. Here is exactly what the assessment process looks like, what supervisors are scrutinizing, and how to be ready when your institution is selected.

The Digital Operational Resilience Act became fully applicable on 17 January 2025. For the first twelve months, most National Competent Authorities operated in what the industry informally called "observation mode" - issuing guidance, collecting Register of Information submissions, and refining their supervisory frameworks. That grace period is over.

Beginning in Q1 2026, the ECB, BaFin, DNB, AMF, CSSF, and other NCAs across the EU have launched formal DORA supervisory assessments. These are not awareness exercises. They are structured, evidence-based reviews of your institution's ICT risk management framework, third-party arrangements, incident response capabilities, and resilience testing program - with real consequences for non-compliance.

This article walks you through the entire supervisory assessment lifecycle: who gets assessed first, what the process looks like in practice, what supervisors are specifically looking for, the penalty regime, and how different NCAs across Europe are approaching enforcement. Whether you have already received a notification letter or are preparing for the inevitable, this is the definitive guide to DORA enforcement in 2026.

Key Date: Q1 2026

The European Supervisory Authorities (EBA, ESMA, EIOPA) published their final Joint Guidelines on DORA supervisory review processes in December 2025. NCAs were required to integrate these into their national supervisory methodologies by 31 January 2026. Formal assessment cycles are now underway in at least 18 Member States.

🎯

Section 1

Who Gets Assessed First

NCAs do not assess every institution simultaneously. Under Articles 50-56 of DORA, supervisory authorities apply a risk-based prioritization model that determines the sequence and intensity of assessments. Understanding where your institution falls in this prioritization is critical for resource planning.

Risk-Based Selection Criteria

Systemic Importance

G-SIBs, O-SIIs, and entities classified as systemically important under CRD V are assessed in the first wave. The ECB's SSM institutions are already receiving notification letters.

ICT Incident History

Institutions that reported major ICT incidents under the ECB's cyber incident reporting framework or national schemes are flagged for priority assessment.

Third-Party Concentration

Entities with high dependency on a small number of critical ICT third-party providers - particularly those designated as CTPPs under Article 31 - are elevated in the queue.

Random & Thematic Selection

NCAs also conduct thematic reviews (e.g., cloud dependency in insurance) and random selections to ensure broad coverage across the supervised population.

The practical implication: if your institution has not been assessed yet, it does not mean you are exempt. It means you have time to prepare. NCAs have committed to reviewing the majority of significant institutions within the 2026-2027 supervisory cycle, with smaller entities following in subsequent waves based on the proportionality principle embedded in DORA's recitals.

"Supervisory authorities shall conduct their reviews in a manner that is proportionate to the size, complexity, and risk profile of the financial entity, while ensuring that all entities within scope are subject to adequate supervisory oversight."

- DORA Article 50(2), Supervisory Powers

🔍

Section 2

The Supervisory Assessment Process: A Detailed Walkthrough

DORA supervisory assessments follow a structured methodology that NCAs have refined over the past year. While specific timelines and procedures vary by jurisdiction, the core process follows five distinct phases. Understanding each phase allows you to allocate resources appropriately and avoid scrambling when the notification arrives.

Phase 1 - Notification & Scope Definition

The process begins with a formal notification letter from your NCA, typically sent 4-8 weeks before the assessment commences. This letter specifies the scope of the review (full DORA assessment or thematic focus), the anticipated timeline, and the initial document request list. The scope may cover your entire DORA compliance framework or focus on specific pillars - ICT risk management (Chapter II), incident reporting (Chapter III), resilience testing (Chapter IV), or third-party risk (Chapter V).

Typical timeline: 4-8 weeks advance notice. Response to initial document request: 2-3 weeks.

Phase 2 - Document Request & Desk Review

Supervisors request comprehensive documentary evidence before any on-site activity. This is where most institutions experience their first shock - the granularity far exceeds expectations. Typical requests include:

  • Complete Register of Information (Art. 28) with all ICT providers, contractual arrangements, and sub-outsourcing chains
  • ICT risk management framework documentation and approved policies (Art. 6-16)
  • Resilience testing program, including TLPT reports and vulnerability assessment results (Art. 24-27)
  • Incident classification procedures and historical incident reports filed (Art. 17-23)
  • Board-level ICT risk reports and management body approval records (Art. 5)
  • Business continuity and disaster recovery plans with evidence of testing
  • ICT third-party contracts, exit strategies, and concentration risk analyses
  • Training records demonstrating ICT risk awareness at all levels, including the management body

Phase 3 - On-Site Visits or Remote Assessments

Depending on risk profile, assessments involve on-site visits, remote deep-dives, or a combination. On-site visits typically last 3-5 days for significant institutions with a team of 3-6 specialist examiners. Remote assessments follow a similar structure via secure video conferencing with screen-sharing.

Supervisors will request live demonstrations of your ICT risk management tools, incident escalation workflows, and Register of Information systems. They want to see that your processes are operational, not merely documented.

Phase 4 - Interviews with Key Personnel

A distinctive feature of DORA assessments is the emphasis on management body accountability under Article 5. Supervisors conduct structured interviews with:

  • Board members / management body: Demonstrating that ICT risk is a standing agenda item, that the board has approved the ICT risk management framework, and that members have received adequate training
  • CTO / CIO: Technical architecture, resilience testing outcomes, change management processes
  • CISO: Incident classification procedures, threat landscape assessments, security operations
  • Chief Risk Officer: Integration of ICT risk into the overall risk management framework
  • Compliance / DPO: Regulatory reporting processes, cross-regulation alignment (DORA-GDPR-NIS2)
  • Third-party risk managers: Vendor assessment processes, contract monitoring, exit plan testing

These are not perfunctory conversations. Supervisors are trained to identify inconsistencies between documented policies and actual understanding at the operational level.

Phase 5 - Assessment Report & Findings

The NCA issues a formal assessment report within 6-12 weeks, categorizing findings by severity (critical, major, minor, observation) with remediation timelines. Institutions can respond to draft findings before finalization. Critical findings may trigger immediate remediation orders under Article 50(2)(f), while lesser findings allow 3-12 months for resolution.

The final report becomes part of your supervisory record and informs future supervisory intensity decisions - a poor assessment leads to more frequent and intrusive follow-up reviews.

📈

Section 3

What Supervisors Are Looking For: Assessment Criteria

Based on the ESA Joint Guidelines and early NCA assessment frameworks, the following table maps what supervisors evaluate and what separates a satisfactory assessment from one that generates findings.

Assessment Area DORA Reference Satisfactory ("Good") Insufficient (Finding Issued)
Management body oversight Art. 5 Board formally approves ICT risk framework; standing agenda item with quarterly reporting; members have documented ICT training No evidence of board-level ICT risk discussions; framework approved by IT without board sign-off; no training records
ICT risk management framework Art. 6-16 Documented framework with clear ownership, risk appetite statements, regular review cycles; integrated with enterprise risk management Generic IT policies rebranded as "DORA framework"; no ICT risk appetite; policies not reviewed since pre-DORA era
Register of Information Art. 28(3) Complete, accurate RoI covering all ICT third-party providers; contractual arrangements mapped to business functions; maintained in exportable ESA format Incomplete provider inventory; missing sub-outsourcing chains; unable to produce ESA-format export; data quality issues (missing LEIs, wrong entity codes)
Incident classification & reporting Art. 17-23 DORA-specific taxonomy implemented; classification thresholds defined and tested; reporting timelines met (4h/24h/72h); root cause analysis documented Pre-DORA process not updated; classification based on subjective judgment; late or missing NCA notifications
Resilience testing program Art. 24-27 Risk-based testing covering critical ICT systems; TLPT performed where required; findings tracked to remediation; lessons fed back into risk assessments Testing limited to annual pen test; no TLPT for entities meeting threshold; results not linked to risk management; prior findings unaddressed
Third-party risk management Art. 28-30 Due diligence for ICT providers; concentration risk analysed; exit strategies documented and tested; contracts aligned with Art. 30 No exit strategies; contracts missing DORA clauses (audit rights, data location, subcontracting); concentration risk not assessed
Business continuity & DR Art. 11-12 BCP/DRP covers all critical functions; tested annually with documented results; RPO/RTO defined and validated; lessons incorporated Plans exist on paper but untested; RPO/RTO not defined; last DR test over 12 months ago; test failures not addressed
ICT change management Art. 9(4)(e) Formal process with risk assessment, testing, rollback procedures; emergency change process defined; audit trail maintained Informal or inconsistent processes; no pre-deployment risk assessment; emergency changes bypass all controls
Information sharing Art. 45 Participation in threat intelligence sharing; process for acting on shared intelligence; documented decision if not participating No awareness of sharing obligations; no participation or rationale for non-participation
ICT asset management & classification Art. 8 Complete ICT asset inventory; classification by criticality; dependencies mapped; assets supporting critical functions identified Incomplete inventory; no criticality classification; dependencies unknown; shadow IT not addressed

Assessment Scoring Note

Most NCAs are using a maturity-based scoring model with four levels: non-existent (no evidence of compliance), initial (ad-hoc processes), defined (documented and implemented), and managed (actively monitored and continuously improved). Institutions scoring "non-existent" or "initial" on any core domain should expect critical or major findings requiring remediation within 3-6 months.

⚖️

Section 4

Penalties, Remediation Orders, and Consequences

DORA gives NCAs significant enforcement powers under Articles 50-56. Unlike some regulations where penalties are a distant theoretical threat, DORA's enforcement framework was designed with teeth from the outset. The consequences of a poor supervisory assessment extend far beyond financial penalties.

Administrative Penalties

Member States have transposed penalty provisions with varying maximums. Some jurisdictions have set fines at €5 million or 1% of average daily turnover, with personal director liability up to €500,000. Penalties apply for inadequate ICT risk management, late incident reporting, and non-compliant third-party arrangements.

Public Censure

Under Article 54, NCAs may publish penalty decisions including the institution's identity. Clients, counterparties, and investors will see your institution failed a DORA assessment. For listed entities, this can directly impact share price and credit ratings.

Remediation Orders

NCAs can require specific remedial actions: cessation of non-compliant practices, appointment of qualified ICT risk officers, renegotiation of non-compliant contracts, and enhanced supervisory reporting during remediation.

Board Reporting Obligations

Assessment findings must be reported to the management body. In several jurisdictions, NCAs require written confirmation that the board has been briefed on findings within 30 days. For critical findings, supervisors may require the board to submit a remediation plan directly, elevating the issue beyond management to governance level.

Cascading Impact

A critical finding in one assessment domain often triggers expanded scrutiny in related areas. For example, an insufficient Register of Information signals potential weaknesses in third-party risk management, which in turn raises questions about concentration risk and exit planning. Supervisors are trained to follow these threads - a single critical finding can widen the scope and duration of the assessment significantly.

🌎

Section 5

How Different NCAs Are Approaching DORA Enforcement

DORA is a regulation (not a directive), meaning it is directly applicable across all Member States. However, supervisory approach and enforcement intensity vary significantly by jurisdiction. The following comparison reflects published NCA communications and industry intelligence as of early 2026.

NCA Jurisdiction Enforcement Posture Approach & Focus Areas Key Observations
ECB (SSM) Euro Area Aggressive Integrated DORA assessments into SREP methodology; ICT risk now a dedicated SREP module. Focus on RoI completeness, TLPT for significant institutions, third-party concentration. First wave began January 2026 for ~113 directly supervised banks. Findings feed into Pillar 2 capital requirements.
BaFin Germany Aggressive Building on established BAIT/VAIT/KAIT framework. BaFin views DORA as a strengthening of existing requirements. Emphasis on operational testing, outsourcing supervision, and incident reporting quality. Published supervisory expectations Q4 2025. On-site assessments began February 2026. Known for short remediation timelines.
DNB Netherlands Structured Phased approach starting with a self-assessment questionnaire, followed by risk-based selection for deep-dive reviews. Strong focus on cloud concentration risk and cross-border ICT dependencies. Issued DORA readiness questionnaire Q4 2025. Results inform 2026 assessment scheduling. Collaborative tone but firm on deadlines.
AMF / ACPR France Structured ACPR coordinating with AMF for cross-sectoral consistency. Emphasis on incident reporting processes and information sharing participation. Thematic review on cloud outsourcing planned for H2 2026. Vocal about expectations via industry circulars. First formal assessments targeting large banks and insurers Q1-Q2 2026.
CSSF Luxembourg Phased Proportionality-focused approach given Luxembourg's large fund management sector. Initial focus on significant credit institutions and payment service providers. Asset managers and fund administrators in second wave. Published DORA FAQs for the fund industry. Recognizes smaller fund managers need more time to build capabilities.
CBI Ireland Structured Strong operational resilience focus, building on existing Cross Industry Guidance. Particular attention to global technology firms providing ICT services to Irish-regulated entities. Emphasis on board accountability. Integrated DORA into existing PRISM framework. Significant institutions assessed from Q1 2026. Known for enforcement follow-through.

Cross-Border Implications

For institutions supervised across multiple jurisdictions, assessment timing and methodology may differ. The ECB coordinates with national NCAs through Joint Supervisory Teams, but less significant entities may face varying approaches. Divergence in enforcement intensity is expected throughout 2026 as NCAs build capabilities at different speeds.

Section 6

Preparing for a Supervisory Assessment: The Practical Checklist

Preparation is everything. Institutions that scramble to compile evidence after receiving a notification letter consistently receive worse assessment outcomes than those with standing readiness. The following checklist represents the minimum level of preparation you should have in place before an NCA comes knocking.

Assessment Readiness Checklist

1. Register of Information

Complete RoI with all providers, contractual arrangements, business function mappings, sub-outsourcing chains, and LEIs. Verify ESA-format export. Cross-reference against procurement records to identify missing providers.

2. ICT Risk Management Framework Documentation

Board-approved ICT risk management framework with all supporting policies (information security, access control, change management, BCP, incident management). Evidence of annual review with dates and signatories.

3. Board-Level Evidence Pack

Board minutes showing quarterly ICT risk discussions. Board-approved risk appetite statement. Management body training records. Board-level ICT risk dashboards.

4. Incident Response Readiness

DORA-specific classification matrix with quantitative thresholds. Documented NCA reporting workflow with escalation paths. Historical incident log with root cause analyses. Evidence of tabletop exercises.

5. Resilience Testing Evidence

Testing program aligned to Art. 24-27. TLPT results (if applicable). Vulnerability assessment reports with remediation tracking. BCP/DR test results with lessons learned fed back into risk assessments.

6. Third-Party Contracts & Exit Plans

All contracts reviewed for Art. 30 compliance (audit rights, data location, subcontracting, termination). Exit strategies for critical providers. Concentration risk analysis current.

7. Gap Assessment & Remediation Tracker

Internal gap assessment completed and documented. Remediation plan with owners, deadlines, and progress tracking. Demonstrating you know your gaps and have a plan to close them is often more valuable than claiming you have none.

8. Staff Readiness

Designated assessment coordinator. Pre-briefed CTO, CISO, CRO, and board members on their roles. Interview preparation for key personnel. Central document repository accessible to the assessment team.

"The institutions that perform best in supervisory assessments are not the ones with perfect compliance - they are the ones that can demonstrate they understand their own gaps, have a credible remediation plan, and can retrieve evidence quickly and completely. Supervisors recognize that DORA is still maturing. What they will not accept is ignorance or inaction."

- Former ECB supervisory examiner, speaking at a 2025 industry conference

🛡️

Section 7

How Venvera Makes You Assessment-Ready

Venvera was purpose-built for this moment. Every feature was designed with the understanding that compliance is about being able to demonstrate it to a supervisor sitting across the table, asking pointed questions, and expecting evidence.

Complete Register of Information

Full RoI module with ICT providers, contractual arrangements, business functions, and sub-outsourcing chains. One-click ESA-format CSV and XBRL export - exactly what your NCA expects. No scrambling to compile spreadsheets.

Gap Assessment with Scores

Built-in gap assessment across all five DORA pillars with article-level scoring. Know exactly where you stand before a supervisor does. Exportable gap reports demonstrate self-awareness and remediation planning.

Board-Ready Reporting

Board-level ICT risk reports satisfying Article 5 requirements. Dashboards showing risk posture, open findings, remediation progress, and incident trends - ready to present to supervisors as evidence of active board engagement.

Evidence Management

Centralized evidence repository with version control, audit trails, and encrypted storage. Retrieve BCP testing results or incident classification matrices in seconds, not days. Every document is timestamped, attributed, and immutable.

Incident Management & Classification

DORA-specific classification with Article 18 severity criteria and built-in NCA reporting timelines (4h/24h/72h). Full incident lifecycle from detection through root cause analysis - demonstrating an operational process, not a theoretical one.

Third-Party Risk & Concentration Analysis

Provider risk assessments, concentration risk dashboards, exit plans, and Art. 30 contract compliance tracking. When a supervisor asks "what if your cloud provider fails?", you have a documented, tested answer.

Audit Trail: Your Secret Weapon

Every action in Venvera is logged in an append-only audit trail - who changed what, when, and why. This is not just a compliance feature; it is a supervisory assessment feature. When an NCA examiner asks "when was this policy last reviewed and by whom?", Venvera provides an irrefutable, timestamped answer. Institutions that can demonstrate this level of traceability consistently receive better assessment outcomes.

DORA enforcement is no longer a future concern. It is happening now. NCAs across Europe are issuing notification letters, dispatching assessment teams, and building the supervisory track records that will define how they engage with your institution for years to come. The first assessments will set precedents - both for what supervisors expect and for how the industry responds.

The question is not whether your institution will be assessed, but when. And when that letter arrives, you want to be reaching for your evidence pack, not starting to build one.

Be Assessment-Ready Before the Letter Arrives

Venvera gives your compliance team a complete DORA platform with gap assessments, RoI management, board reporting, and audit-ready evidence exports - everything an NCA will ask for, ready to go.

Book a Demo →

Related Reading

Published March 2026 · Venvera Compliance Platform · venvera.com

This article is for informational purposes and does not constitute legal or regulatory advice. Consult your legal counsel for institution-specific guidance.

AS

Alexander Sverdlov

CEO & Founder

Alexander is the CEO and founder of Venvera, leading the development of multi-framework compliance solutions for European regulated entities.

RELATED POSTS