QCecuring - Enterprise Security Solutions

DORA Compliance & Cryptographic Controls: What Financial Entities Must Implement

Standards & Compliance 11 May, 2026 · 05 Mins read

Implement DORA (Digital Operational Resilience Act) cryptographic requirements for financial entities. Covers encryption standards, key management, ICT risk management, certificate lifecycle, and third-party oversight.


DORA (Digital Operational Resilience Act) is the EU’s answer to a financial sector that runs on interconnected digital systems but lacks consistent operational resilience standards. Effective January 17, 2025, it applies to virtually every financial entity in the EU — banks, insurers, investment firms, payment providers, crypto-asset service providers, and critically, the ICT third-party providers that serve them.

For cryptography and certificate management teams, DORA introduces specific requirements around encryption, key management, data integrity, and the resilience of cryptographic systems. This isn’t another checkbox exercise — DORA has teeth, with supervisory authorities empowered to impose penalties and restrict operations.


Who DORA Applies To

Entity TypeExamplesApplies?
Credit institutionsBanks, building societiesYes
Investment firmsBrokers, asset managersYes
Insurance/reinsuranceInsurers, pension fundsYes
Payment institutionsPayment processors, PSPsYes
E-money institutionsDigital wallet providersYes
Crypto-asset service providersExchanges, custodiansYes
Central counterpartiesClearing housesYes
Trade repositoriesTransaction reportingYes
ICT third-party providersCloud providers, SaaS, managed servicesYes (oversight framework)
Credit rating agenciesRating agenciesYes

Key point: DORA applies to ICT third-party service providers that serve financial entities. If you provide cloud hosting, managed PKI, certificate management, or key management services to EU financial institutions, DORA’s oversight framework applies to you.


DORA’s Cryptographic Requirements

DORA doesn’t prescribe specific algorithms (unlike PCI DSS). Instead, it mandates outcomes — resilient, tested, documented cryptographic controls. The requirements are spread across several articles:

Article 9: ICT Risk Management Framework

Financial entities must implement cryptographic controls as part of their ICT risk management:

RequirementCryptographic Implication
Protect data in transit and at restTLS certificates on all systems, disk encryption
Ensure data integrityDigital signatures, MACs, hash verification
Maintain confidentialityEncryption key management, access controls
Implement access controlsCertificate-based authentication, mTLS
Detect anomalous activitiesCertificate monitoring, key usage auditing

Article 10: Detection

Flowchart showing top-down process flow

Article 11: Response and Recovery

RequirementCrypto Implementation
Activate response plans for ICT incidentsCertificate revocation procedures, key compromise response
Estimate impact of incidentsCryptographic asset inventory (CBOM) to assess blast radius
Communicate to stakeholdersDocumented key custodians and certificate owners
Restore ICT systemsKey backup/recovery, CA disaster recovery
Conduct post-incident reviewsRoot cause analysis for crypto-related incidents

Article 12: Backup and Restoration

RequirementCrypto Implementation
Backup ICT systems and dataEncrypted backups with managed keys
Test restoration regularlyKey recovery testing, CA rebuild procedures
Ensure backup integritySigned backups, hash verification
Separate backup from productionSeparate key management for backup encryption

Article 15: ICT Third-Party Risk

Financial entities must assess the cryptographic practices of their ICT providers:

  • What encryption does the provider use for data at rest and in transit?
  • How does the provider manage encryption keys?
  • What happens to encryption keys when the contract ends?
  • Can the entity access its data if the provider fails?
  • Does the provider use FIPS-validated cryptographic modules?

Implementing DORA Cryptographic Controls

1. Cryptographic Asset Inventory

DORA requires knowing what cryptographic assets you have. A Cryptographic Bill of Materials (CBOM) provides this:

# DORA-compliant cryptographic inventory structure
cryptographic_assets:
  certificates:
    - id: "cert-001"
      system: "Internet Banking Portal"
      type: "TLS Server"
      algorithm: "ECDSA P-256"
      ca: "DigiCert"
      expiry: "2026-08-15"
      owner: "Platform Team"
      criticality: "Critical"
      data_classification: "Customer PII"

  encryption_keys:
    - id: "key-001"
      system: "Core Banking Database"
      type: "AES-256-GCM (TDE)"
      kms: "AWS KMS"
      rotation_period: "365 days"
      last_rotated: "2026-02-01"
      owner: "Database Team"
      criticality: "Critical"

  signing_keys:
    - id: "sign-001"
      system: "Payment Processing"
      type: "RSA-4096"
      hsm: "Thales Luna"
      purpose: "Transaction signing"
      owner: "Payments Team"
      criticality: "Critical"

2. Key Management Lifecycle (NIST SP 800-57 Aligned)

DORA expects key management aligned with recognized standards:

Lifecycle StageDORA RequirementImplementation
GenerationSecure, auditable key generationHSM-based generation, ceremony documentation
StorageProtected key storageHSM, KMS, encrypted at rest
DistributionSecure key transportKey wrapping, TLS for transit, no plaintext
UseControlled, monitored usageRBAC, usage logging, anomaly detection
RotationRegular key rotationAutomated rotation per crypto period
ArchivalSecure long-term storageEncrypted archives, access controls
DestructionIrreversible destructionCryptographic erasure, documented

3. Certificate Lifecycle Automation

Flowchart showing top-down process flow

4. Resilience Testing (Article 26-27)

DORA requires regular testing of ICT systems, including cryptographic controls:

Test TypeCrypto FocusFrequency
Vulnerability scanningWeak ciphers, expired certs, protocol issuesContinuous
Penetration testingCertificate validation bypass, key extractionAnnual
Scenario testingCA compromise, mass certificate revocationAnnual
Threat-led testing (TLPT)Advanced attacks on crypto infrastructureEvery 3 years
Disaster recoveryCA rebuild, key recovery from backupSemi-annual

DORA vs Other Financial Regulations

AspectDORAPCI DSS 4.0SOXEBA Guidelines
ScopeAll EU financial entitiesCard payment processorsUS public companiesEU banks
Crypto specificityOutcome-basedPrescriptive (algorithms, key sizes)Controls-basedOutcome-based
Key managementRequired (no specific standard)NIST SP 800-57 referencedDocumented controlsRequired
TestingTLPT every 3 yearsQuarterly scans, annual pentestAnnual auditStress testing
Third-partyOversight frameworkVendor complianceSOC reportsOutsourcing guidelines
Incident reporting4-hour initial, 72-hour full72 hours (breach)Material weakness2-4 hours
PenaltiesUp to 1% of annual turnoverUp to $100K/monthCriminal liabilitySupervisory measures
EffectiveJanuary 2025March 20252002 (ongoing)Various

Compliance Checklist

#ControlEvidence RequiredTool/Process
1Cryptographic asset inventoryComplete list of all keys, certs, algorithmsCBOM / CLM platform
2Encryption of data in transitTLS configuration on all systemsCertificate monitoring
3Encryption of data at restKey management documentationKMS audit logs
4Key lifecycle managementRotation schedules, destruction recordsKMS/HSM audit trail
5Certificate lifecycle managementAutomated renewal, expiry monitoringCLM platform
6Access controls for crypto operationsRBAC, approval workflowsIAM + audit logs
7Incident response for crypto eventsRevocation procedures, key compromise playbookDocumented runbooks
8Third-party crypto assessmentVendor encryption practices documentedDue diligence records
9Resilience testingPentest results, DR test resultsTest reports
10Backup encryptionKey management for backupsSeparate KMS/key hierarchy

FAQ

Q: When does DORA enforcement begin?

DORA entered into force on January 16, 2023, with a compliance deadline of January 17, 2025. Financial entities should already be compliant. Regulatory Technical Standards (RTS) providing detailed implementation guidance were published throughout 2024.

Q: Does DORA require specific encryption algorithms?

No. Unlike PCI DSS, DORA doesn’t prescribe specific algorithms or key sizes. It requires “state of the art” cryptographic controls appropriate to the risk. In practice, this means following NIST or ENISA recommendations — AES-256, RSA-3072+, ECDSA P-256+, TLS 1.2+.

Q: How does DORA affect cloud service providers?

ICT third-party providers serving EU financial entities fall under DORA’s oversight framework. They must: (1) cooperate with supervisory authorities, (2) provide audit access, (3) maintain documented security practices including cryptography, (4) support data portability and exit strategies.

Q: What’s the penalty for DORA non-compliance?

Supervisory authorities can impose periodic penalty payments of up to 1% of average daily worldwide turnover. For critical ICT third-party providers, the Lead Overseer can impose fines up to €5 million (or 1% of turnover). Beyond fines, authorities can restrict operations or require remediation.

Q: Does DORA require a CBOM (Cryptographic Bill of Materials)?

Not explicitly by name, but Article 9’s requirement for ICT asset management and Article 11’s requirement to assess incident impact effectively mandate a cryptographic inventory. A CBOM is the structured way to satisfy these requirements.

Q: How does DORA interact with GDPR encryption requirements?

They’re complementary. GDPR Article 32 requires “appropriate technical measures” including encryption. DORA adds operational resilience requirements on top — not just “encrypt the data” but “ensure the encryption system is resilient, tested, and recoverable.” Meeting DORA’s crypto requirements generally satisfies GDPR’s encryption expectations.


Related Reading:

DORA Readiness Assessment

Evaluate your cryptographic controls against DORA requirements before the enforcement deadline.

Request Assessment

Related Insights

CLM

Best Certificate Lifecycle Management (CLM) Platforms 2026: Multi-Vendor Comparison

Compare the top CLM platforms for 2026 — Venafi, Keyfactor, AppViewX, DigiCert, Sectigo, QCecuring, and open-source alternatives. Covers features, architecture, pricing tiers, and selection criteria for every organization size.

By Sneha gupta

12 May, 2026 · 06 Mins read

CLMComparisonsEnterprise Security

SSH

Best SSH Key Management Tools 2026: Enterprise Comparison

Compare the best SSH key management tools for enterprise — Teleport, QCecuring SSH KLM, HashiCorp Vault, StrongDM, CyberArk, and open-source alternatives. Covers certificate-based SSH, key rotation, session recording, and compliance.

By Shivam sharma

12 May, 2026 · 05 Mins read

SSHComparisonsEnterprise Security

SSH

QCecuring vs Teleport: SSH Access & Key Management Compared (2026)

Compare QCecuring SSH KLM vs Teleport for enterprise SSH management. Covers certificate-based vs key-based access, architecture differences, audit capabilities, Kubernetes integration, and when to choose each approach.

By Shivam sharma

12 May, 2026 · 06 Mins read

SSHComparisonsEnterprise Security

Ready to Secure Your Enterprise?

Experience how our cryptographic solutions simplify, centralize, and automate identity management for your entire organization.

Stay ahead on cryptography & PKI

Get monthly insights on certificate management, post-quantum readiness, and enterprise security. No spam.

We respect your privacy. Unsubscribe anytime.