office-scene-stock-image (1)

DORA ICT Risk Management Framework: Board Approval Guide

  • DORA
  • Gabriel Few-Wiegratz
  • Published: 19th May 2026

Share this

Highlights
  • Article 6 of DORA requires every in-scope financial entity to have a board-approved ICT risk management framework as part of its overall risk management system.
  • The framework is a governance document, legally distinct from the operational ICT risk management programme that the CISO and ICT function implement.
  • The management body must formally approve the framework and review it at least annually under Article 6(5). Additional reviews are required following major ICT-related incidents, supervisory instructions, or conclusions from digital operational resilience testing or audit processes.
  • The framework must address six areas covered across Chapter II: identification, protection, detection, response and recovery, learning, and communication.
  • Supervisors examine whether the board's ICT risk appetite statement is operationalised into measurable Key Risk Indicators that control owners report against.
Expert View

Matt Davies

Chief Product Officer, SureCloud

LinkedIn

What our experts say about DORA ICT risk management

"The frameworks that hold up in a supervisory examination are the ones where the board can actually answer for what they approved. I've sat in enough of these reviews to know that supervisors start with a simple question: does the risk appetite the board signed off on show up in the reporting they receive? When the appetite statement sits in the framework document and the quarterly reporting tracks a different set of metrics entirely, that's a structural problem. The accountability chain has to be visible end to end."

 

 

KEY FACTS

  1. DORA became applicable on 17 January 2025. All in-scope financial entities were required to have a board-approved ICT risk management framework in place from that date.
  2. Article 6(1) requires the framework to be sound, comprehensive, and well-documented as part of the entity's overall risk management system.
  3. Article 6(5) requires at minimum annual review of the framework, with formal board approval of any resulting changes.
  4. Article 16 provides for a simplified ICT risk management framework for a defined set of entity types, including small and non-interconnected investment firms and certain exempted payment, credit, and electronic money institutions. Eligibility turns on entity type under the applicable sectoral directive.
  5. Article 28 requires that ICT third-party risk management is integrated into the overall ICT risk management framework.
  6. Six operational areas, addressed across Chapter II Articles 8 to 14, must each be reflected in the approved framework: identification, protection, detection, response and recovery, learning, and communication.
  7. Article 6(6) requires the ICT risk management framework to be subject to internal audit on a regular basis in accordance with the entity's audit plan (for non-microenterprises). Internal audit findings must feed into the framework review cycle.
The Governance Layer vs the Implementation Layer

Before examining what Article 6 requires, the distinction between the ICT risk management framework and the ICT risk management programme must be clear, because confusing them is one of the most common governance failures in DORA preparation.

The ICT risk management framework is the board-level document. It defines the entity's approach to identifying, classifying, and managing ICT risk. It sets risk appetite and establishes governance structures, roles, and oversight mechanisms. The management body formally approves it, reviews it annually, and is accountable for it under Article 5(2)(a).

The ICT risk management programme is what the team implements. It is the operational translation of the framework: the specific controls, processes, tools, and workflows through which the framework's requirements are discharged. This is the CISO's domain.

A board that has approved a framework but has yet to demonstrate that the programme is operationally aligned to it has a governance gap. An entity with a mature security programme but without a formally approved framework document has a DORA compliance gap. Both matter for supervisors.

DORA entered into force on 16 January 2023 and became applicable on 17 January 2025. The ICT risk management framework requirements under Chapter II apply to all in-scope financial entities, with proportionality provisions for simplified frameworks under Article 16 for a defined list of entity types, including small and non-interconnected investment firms and certain exempted institutions. Eligibility turns on entity type under the applicable sectoral directive.

What Article 6 Requires: Framework Components

Article 6(1) establishes the foundational obligation: financial entities must have a sound, comprehensive, and well-documented ICT risk management framework as part of their overall risk management system.

Chapter II of DORA, covering Articles 8 through 14, details the minimum components the framework must address. They are enumerated requirements, each of which supervisors will examine.

Identification of ICT Risk Exposure

The framework must include a methodology for identifying and classifying the entity's ICT assets and associated risks. This means maintaining an up-to-date inventory of ICT assets, including hardware, software, data, and infrastructure, and mapping dependencies between those assets and the business functions they support. Article 8 separately addresses asset management requirements, but the framework document must establish the governance of that process.

Protection and Prevention

Article 9 requires the framework to address protection and prevention measures. This includes policies for access management, patch management, configuration management, and the controls through which the entity protects the confidentiality, integrity, and availability of its ICT systems. The framework sets the governance standard; specific control specifications sit in subordinate policy documents.

Detection

The framework must establish how the entity detects anomalies and unusual behaviour in its ICT environment. Article 10 addresses detection in more detail, but the framework must articulate the governance architecture: who is responsible for detection, what monitoring capabilities are required, and how detection findings are escalated.

Response and Recovery

Articles 11 and 12 address ICT-related incident response, recovery, and backup. At the framework level, the board is approving the entity's approach: governance of incident classification, escalation, response coordination, and recovery priorities. The operational incident response playbook sits below the framework layer.

Learning and Evolving

Article 13 reflects a principle that runs through DORA: the framework must address how the entity learns from incidents and evolves its approach over time. Post-incident reviews, lessons-learned integration, and threat intelligence feeds all fall under this component. The framework must establish that this learning loop exists as a governed process.

Communication

The framework must address internal and external communication in the context of ICT risk and incidents. This includes the escalation path to the management body, communication with competent authorities under Article 19 major incident reporting obligations, and communication with ICT third-party providers under contractual and regulatory requirements.

The ICT Risk Appetite Statement: What Boards Must Define

Risk appetite for ICT risk is a board-level construct. The management body sets the business context within which technical risk thresholds make sense, and the risk and ICT functions translate that context into measurable operational metrics.

A credible ICT risk appetite statement, suitable for board approval and supervisory review, should address:

  1. Availability: what levels of service disruption are acceptable for which business functions? What recovery time objectives (RTOs) and recovery point objectives (RPOs) does the board consider tolerable for critical operations?
  2. Confidentiality: what is the board's appetite for data exposure risk, across customer data, proprietary information, and regulated data categories?
  3. Integrity: what tolerance exists for data corruption or manipulation events?
  4. Third-party concentration: what is the acceptable level of dependency on any single ICT third-party provider, particularly for critical or important functions?
  5. Residual risk: what level of residual ICT risk, after controls are applied, is the board willing to accept?

Appetite statements expressed only in qualitative terms have limited supervisory value. Statements that connect to measurable thresholds, such as incident frequency, RTO metrics, and third-party concentration ratios, give the board a basis for monitoring and give supervisors a basis for examination.

Once the board approves the appetite statement, the ICT risk team must translate it into operational tolerances and Key Risk Indicators (KRIs) that control owners can act against. This operationalisation is the link between the governance layer and the implementation layer.

How to Structure the Framework Document

There is no DORA-mandated template for the ICT risk management framework document. Supervisors expect a document that is coherent, internally consistent, and clearly aligned to Article 6. A workable structure:

  1. Scope and Purpose. Define the entities covered, the regulatory basis (DORA Article 6), and the relationship of this framework to the entity's overall risk management framework.
  2. Governance and Ownership. Define the management body's role under Article 5, the three lines of defence model as it applies to ICT risk, and the ownership and review responsibilities for this document.
  3. ICT Risk Appetite Statement. The board-approved appetite statement, with quantitative thresholds where possible. This section must be clearly distinguishable as board-owned content.
  4. ICT Risk Identification and Classification. Methodology for asset identification, dependency mapping, and risk classification. Reference to the asset management policy and register.
  5. Protection and Prevention Standards. High-level standards for access management, vulnerability management, configuration control, and data protection. Detailed specifications are in subordinate policies.
  6. Detection and Monitoring. Governance of detection capabilities: required monitoring coverage, anomaly detection standards, and escalation thresholds.
  7. Response and Recovery. Framework for incident classification, escalation to the management body, business continuity governance, and recovery prioritisation. Connection to business continuity and incident response plans.
  8. Learning and Continuous Improvement. Process for post-incident review, lessons-learned integration, and annual framework review.
  9. Communication. Escalation to the management body; major incident reporting under Article 19; third-party communication requirements.
  10. Review and Approval. Review frequency (at minimum annual, per Article 6(5)), approval authority (management body), and version control.
  11. Internal Audit. Per Article 6(6), the framework is subject to regular internal audit. Include the audit schedule, the mechanism for feeding audit conclusions into the review cycle, and the ownership of any remediation actions.
What Supervisors Look For in a Framework Review

Supervisory examination of the ICT risk management framework, including by the FCA in the UK and National Competent Authorities across the EU, focuses on evidence of genuine governance, assessed through what the board can demonstrate rather than what the document states.

Governance Substance

Can board members explain the framework and articulate the entity's ICT risk appetite? Minutes showing board approval without evidence of substantive discussion will attract scrutiny.

Framework-to-Programme Alignment

Is the operational ICT risk programme demonstrably aligned to the framework? Supervisors will follow the chain from framework principles to operational controls, looking for gaps.

Risk Appetite Operationalisation

Is the board's appetite statement translated into measurable KRIs? Are control owners aware of and reporting against those indicators? A gap here suggests the framework is a paper exercise.

Annual Review Evidence

Has the framework been reviewed annually as Article 6(5) requires? Is there evidence of substantive review, with documented conclusions and updated sections where warranted?

Internal Audit Coverage

Article 6(6) requires the ICT risk management framework to be audited internally on a regular basis, consistent with the entity's audit plan. Supervisors will expect to see that internal audit has reviewed the framework, that findings have been documented, and that the framework review cycle takes audit conclusions into account. Supervisors look for evidence of internal audit coverage and a clear mechanism for feeding audit conclusions into the review cycle.

Third-Party Integration

Does the framework address ICT third-party risk in a way that reflects the entity's actual dependency profile? Article 28 requires that ICT third-party risk management is integrated into the overall ICT risk management framework.

Incident-Driven Updates

Has the framework been updated following material ICT incidents? Static frameworks that predate significant incidents are a supervisory concern.

Operationalising Risk Appetite Down to Control Owners

The governance layer's value is only realised when it connects to operational practice. The management body approves the ICT risk appetite statement; the ICT risk and compliance functions must translate that into something control owners can act against.

The translation chain runs: board appetite statement defines the outer bounds of acceptable risk. The ICT risk management programme interprets appetite into risk tolerance thresholds for specific risk domains. Key Risk Indicators are measurable metrics assigned to control owners, reported upward through the risk function to the management body reporting cycle. Control effectiveness reporting provides periodic reporting to the board on whether KRIs are within appetite, with escalation when thresholds are breached.

This chain is what makes the framework document more than a compliance artefact. Firms using SureCloud's Continuous Controls Monitoring (CCM) capability report significant reductions in audit preparation time, because the evidence is continuously captured rather than assembled retrospectively before each review cycle.

See a Board-Ready DORA Framework in Practice

Book a demo with SureCloud to see how board approval workflows, ICT risk appetite reporting, Continuous Controls Monitoring, and framework review processes connect in a DORA-compliant governance environment. Explore how management bodies operationalise Article 6 obligations with measurable KRIs, audit-ready evidence, and integrated oversight across ICT risk, resilience, and third-party governance.
Recommended Resources
  • DORA
  • Compliance

The Complete DORA Self-Assessment

  • DORA
  • Compliance

Complete Guide to DORA Compliance in 2025

  • Compliance
  • DORA

The 5 Pillars of DORA Explained – Building Digital Resilience in Financial Services

FAQ’s

What is the ICT risk management framework under DORA Article 6?

DORA Article 6 requires every in-scope financial entity to maintain a comprehensive, documented ICT risk management framework covering risk identification, protection, detection, response and recovery, learning, and communication. The framework must be formally approved by the management body and reviewed at least annually under Article 6(5).

What is the difference between the ICT risk management framework and the ICT risk management programme?

The ICT risk management framework is the governance document the board approves. It defines the entity's approach to ICT risk, sets risk appetite, and establishes governance structures. The ICT risk management programme is the operational translation of the framework: the controls, processes, and tools through which the CISO and ICT function implement it. Both are necessary and each serves a distinct governance function.

What is the difference between the ICT risk management framework and the ICT risk management programme?

The ICT risk management framework is the governance document the board approves. It defines the entity's approach to ICT risk, sets risk appetite, and establishes governance structures. The ICT risk management programme is the operational translation of the framework: the controls, processes, and tools through which the CISO and ICT function implement it. Both are necessary and each serves a distinct governance function.

What must an ICT risk appetite statement include under DORA?

DORA does not prescribe the content of a risk appetite statement, but supervisors expect statements that address availability disruption tolerance, data confidentiality and integrity events, third-party concentration risk, and residual risk levels after controls are applied. Statements that connect to measurable thresholds and KRIs are materially stronger than qualitative-only statements.

How often must the ICT risk management framework be reviewed?

Article 6(5) requires financial entities to review their ICT risk management framework at least annually (or periodically in the case of microenterprises). Additional reviews are required upon the occurrence of major ICT-related incidents, following supervisory instructions, or following conclusions derived from relevant digital operational resilience testing or audit processes. Each review must be documented, and any resulting changes to the framework must be formally approved by the management body.

What are the minimum framework components required under DORA?

DORA requires the ICT risk management framework to address: identification and classification of ICT assets and risks; protection and prevention measures; detection of anomalies and incidents; response and recovery capabilities; learning and continuous improvement processes; and communication arrangements. These six operational areas are covered across Chapter II, Articles 8 through 14. Separately, Article 6(8) requires the framework to include a digital operational resilience strategy covering how the framework supports the entity's business objectives, its risk tolerance, ICT security objectives, reference architecture, and communication approach. Both layers must be present in a compliant framework document.

What will supervisors look for when examining an ICT risk management framework?

Supervisors will assess whether the framework reflects genuine governance. Examination covers: whether the management body can demonstrate understanding; whether risk appetite is operationalised into measurable KRIs; whether the framework has been substantively reviewed annually; whether it integrates ICT third-party risk per Article 28; and whether it has been updated following material incidents.