office-scene-stock-image (1)

DORA Incident Response Governance: Enterprise Guide

  • DORA
  • Gabriel Few-Wiegratz
  • Published: 22nd May 2026

Share this

Highlights
  • DORA establishes a three-stage supervisory reporting chain for major ICT incidents: initial notification within 4 hours of classification (no later than 24 hours from first awareness), intermediate report within 72 hours, and final report within one month.
  • The governance decisions that determine whether those deadlines can be met must be made before an incident occurs: who holds classification authority, which body receives the management notification, and how multi-entity groups coordinate parallel obligations.
  • Article 17(3)(e) requires the incident management process to report major ICT-related incidents to relevant senior management and to inform the management body, explaining the impact, response and additional controls to be established. Both notifications must run in parallel with the external supervisory reporting chain, at or before the point of initial report submission.
Expert View

Matt Davies

Chief Product Officer, SureCloud

LinkedIn

What our experts say about DORA major incident response

“Technical incident teams know what is failing within the first hour. The question I ask every client is: who has authority to make the major incident declaration, and does that person know they have it? I have worked with institutions where the compliance function found out about a reportable incident at the same time as their board, because no one had built a structured handoff between the incident commander and the regulatory notification process. The institutions that handle this well have tested that handoff under pressure, before a real incident forces the issue.”

 

   KEY FACTS

  1. Initial notification: within 4 hours of major incident classification (no later than 24 hours from first awareness of the incident)

  2. Intermediate report: within 72 hours of initial notification, or sooner if the incident status changes materially
  3. Final report: within one month of initial notification, once root cause analysis is complete
  4. Management body notification: Article 17(3)(e) requires major ICT incidents to be reported to relevant senior management and to the management body, explaining impact, response and additional controls, in parallel with the supervisory notification chain.
  5. Classification criteria: set by Commission Delegated Regulation (EU) 2024/1772 (RTS on incident classification)
  6. DORA became applicable on 17 January 2025

 

The Regulatory Context for DORA Incident Response

DORA's incident management chapter, primarily Articles 17 to 23, creates a uniform framework for identifying, classifying, and reporting major ICT-related incidents across EU financial services. Before DORA, incident reporting obligations were fragmented: the Network and Information Security Directive (NIS) applied to some entities, sectoral rules applied to others, and national requirements varied significantly across member states. DORA replaced that patchwork for financial entities in scope with a single, consistent framework.

The regulatory technical standards (RTS) on incident classification, Commission Delegated Regulation (EU) 2024/1772, set out the criteria and thresholds for determining whether an ICT incident qualifies as major and therefore triggers reporting obligations. Article 18(1) and the RTS require evaluation across six dimensions: the number and relevance of clients or counterparties affected; the duration of disruption; geographic spread, particularly where more than two member states are affected; data losses affecting availability, authenticity, integrity or confidentiality; criticality of the services affected; and economic impact in both absolute and relative terms. Meeting materiality thresholds across these dimensions triggers the major incident classification and starts the reporting clock. For large organisations, that classification decision is itself a governance challenge.

The scale of DORA's incident reporting framework became apparent quickly after applicability. The EBA reported receiving more than 1,200 major ICT incident reports in the first four months of 2025 alone, affecting primarily IT systems, payment services, and online banking. ECB Banking Supervision data for the full year 2025 showed that 38% of major incidents reported by directly supervised banks had IT change (system updates, migrations, and configuration changes) as their root cause, underscoring that major incident classification is not limited to cyberattacks and that classification governance must be embedded in change management processes as well as crisis response procedures. 

Understanding What Triggers the Reporting Clock

The 4-hour initial notification deadline runs from the point at which an incident is classified as major, not from the point at which it is first detected. DORA Article 19 sets out the reporting obligation, with specific time limits established under Article 20 and the implementing technical standards. The deadline starts on classification. This distinction matters for governance design.

In practice, there is a period between incident detection and formal classification during which technical teams are assessing severity. The RTS classification criteria require an evaluation across multiple dimensions. A large institution's incident response procedure must define who has authority to make the major incident declaration, what evidence threshold is required, and what escalation path applies if that authority is unavailable. Delay in making the classification decision, because the authority is unclear or the assessment process is protracted, directly compresses the time available to prepare the initial notification.

The implication is that classification authority cannot sit exclusively with a technical team that has no sight of the regulatory reporting obligation. Equally, it cannot sit with a compliance team with no real-time access to the technical picture. Effective governance requires a defined handoff point: a structured moment at which the technical incident commander and the regulatory compliance function jointly confirm classification and trigger the notification chain.

The Enterprise Escalation Chain: Who Owns What at Each Stage

The table below maps the four DORA reporting stages to ownership, triggers, and required outputs within a large financial institution. The EBA joint technical standards on major incident reporting confirm the time limits: initial notification no later than 4 hours from classification (24 hours from first awareness), intermediate report within 72 hours, and final report within one month. 

Timeframe

Trigger

Who Owns It

Output Required

0 to 4 hours

ICT incident classified as 'major' under preliminary assessment

CISO / Head of Technology Risk (with input from incident commander)

Internal 'major incident declaration' document; management body notification triggered; competent authority notification prepared

4 to 24 hours

Initial notification due to competent authority

Group Compliance / Regulatory Affairs (co-ordinated by CISO)

Initial notification filed via national competent authority reporting channel; internal incident log updated; group entities notified

Within 72 hours

Intermediate report due to competent authority

Regulatory Affairs, supported by technology forensics team

Intermediate report submitted; cause analysis underway; external communications aligned; any material developments escalated to management body

By 1 month

Final report due to competent authority

Group Regulatory Affairs (reviewed and signed off by management body)

Final report with root cause analysis, containment measures, and forward remediation plan submitted; lessons-learned process initiated

 

The Board Notification Obligation

DORA Article 17(1) requires financial entities to have in place an ICT-related incident management process. Article 5(2) requires the management body to approve and oversee the entity's ICT risk management framework. Under Article 17(3)(e), the incident management process must 'inform the management body of at least major ICT-related incidents, explaining the impact, response and additional controls to be established as a result of such ICT-related incidents.' In practical terms, this means the management body notification must happen in parallel with, or immediately prior to, the initial supervisory notification. It is not a post-incident debrief obligation.

Article 17(3)(e) establishes a two-tier internal notification obligation: major incidents must first be reported to relevant senior management, and the management body must separately be informed. For large institutions with executive committees sitting below board level, the governance design must define both notification steps before an incident occurs: who constitutes relevant senior management for this purpose, and which body constitutes the management body under Article 5. The two steps are distinct governance obligations and must each be documented separately in the incident response procedure.

For large institutions with board committees and delegated risk oversight structures, the governance question is: which body receives the initial notification, the full board, the risk committee, or an executive subcommittee? The answer depends on each entity's governance framework, but DORA's management body obligation under Article 5 refers to the body with ultimate responsibility for the ICT risk management framework. Briefing only an executive committee where the board has not delegated ICT risk oversight would not satisfy the obligation. Legal and governance advisers should clarify the structure before a major incident occurs.

Multi-Entity and Cross-Jurisdictional Incidents

For financial groups operating multiple entities across EU member states, or operating in both the EU and the UK, a single ICT incident affecting shared infrastructure creates parallel reporting obligations that are not synchronised by DORA. Each legal entity with its own competent authority has its own 4-hour notification deadline from the point that entity classifies the incident as major. The entity-level obligation does not pause to await group-level coordination.

This creates three governance challenges for large groups:

  1. Multiple entities may classify the same underlying incident at different times, creating staggered notification deadlines that run concurrently across different competent authorities.
  2. Competent authorities in different member states may have different preferred notification formats or supplementary requirements, requiring parallel document preparation under time pressure.
  3. Internal communication between entities, particularly where legal entity boundaries restrict information sharing, must be planned in advance and not improvised during an active incident.

The practical solution is a group incident management protocol that defines a 'major incident trigger point' applicable to the group as a whole, initiates entity-level classification assessments simultaneously, and runs parallel notification preparation tracks under central coordination. The group compliance function coordinates but does not absorb entity-level notification responsibility.

Internal Communication During Supervisory Notification

The period between major incident classification and submission of the final report, which may span one month, is the period during which the institution is most exposed to reputational, regulatory, and operational risk simultaneously. Internal communication governance during this window is frequently underplanned.

What the Management Body Needs at Each Stage

The information provided to the management body at initial notification (within 4 hours of classification) will necessarily be incomplete. DORA does not require the institution to have a full root cause analysis at that stage. The supervisory framework acknowledges that initial assessments are provisional. The management body briefing must, however, include:

  1. Confirmation that the incident has been classified as major and the classification basis
  2. The ICT services and functions affected
  3. A preliminary assessment of client, counterparty, or market impact
  4. The incident response actions underway and the identity of the incident commander
  5. The regulatory notification timeline and who owns each stage

The intermediate report (within 72 hours) provides an opportunity to update the management body with a more developed picture. Board-level remediation discussion is the work of the final report stage (within one month); during the acute incident phase, executive focus should remain on containment and continuity.

Communication Security and Audit Trail

Internal communications about a major ICT incident, particularly communications with the management body, will be subject to supervisory review if the competent authority conducts a post-incident examination. DORA Article 20 establishes the harmonisation framework for incident reporting, with competent authorities using incident reports as inputs to supervisory oversight. Institutions should ensure that board briefings and internal escalation communications are documented, version-controlled, and retained in a way that demonstrates the governance chain operated correctly. This is evidence that the management body fulfilled its obligations under Article 17.

Common Governance Failures in Large Institutions

Based on the design of DORA's incident management framework, and the governance challenges organisations faced implementing equivalent obligations under the EBA Guidelines on ICT and Security Risk Management before DORA, several failure patterns are predictable in large institutions:

  1. Classification authority is unclear: technical incident commanders do not know they have the power to make the major incident declaration, and await escalation from management while the notification clock runs.
  2. Compliance and technology functions operate on different incident management platforms with no real-time integration, creating information lag between the technical picture and the regulatory notification.
  3. Board notification procedures assume working hours. Major incidents do not, and the 4-hour window does not accommodate an overnight delay pending a board meeting.
  4. Multi-entity groups have entity-level procedures but no overarching group protocol, meaning parallel notification obligations are discovered reactively rather than managed proactively.
  5. Notification templates are drafted for the competent authority audience rather than the management body. The internal briefing document and the supervisory notification should be different artefacts with different levels of technical detail.

See SureCloud's Incident Management and Compliance Workflow

SureCloud's Gracie AI Agents with Personas and Skills supports DORA major incident governance, from classification through to final report submission, with structured escalation workflows, audit trail management, and multi-entity co-ordination. The platform's Personas provide role-based authority and context at each escalation stage; its Skills encode the regulatory requirements so compliance teams and technology functions are working from the same picture in real time. Request a demo to see how the platform supports the internal governance chain that large institutions need to run alongside their supervisory notification obligations.
Recommended Resources
  • DORA
  • Compliance

The Complete DORA Self-Assessment

  • DORA
  • Compliance

Complete Guide to DORA Compliance in 2025

  • DORA
  • Compliance

What DORA Means for Banks, Fintechs & Insurers in 2026

FAQ’s

When does DORA's 4-hour notification deadline start?

The 4-hour deadline for the initial notification to the competent authority starts from the point at which the financial entity classifies the incident as major, with a backstop of no later than 24 hours from first awareness. DORA Article 19 sets out the reporting obligation, with the specific time limits established under Article 20 and the implementing technical standards. The RTS on incident classification (Commission Delegated Regulation (EU) 2024/1772) sets out the classification criteria under Article 18(1): the number and relevance of clients or counterparties affected; the duration of disruption; geographic spread, particularly where more than two member states are affected; data losses affecting availability, authenticity, integrity or confidentiality; criticality of the services affected; and economic impact in both absolute and relative terms. For large organisations, the governance design must ensure the classification decision itself can be made quickly and by the right authority.

Is the management body notification a separate obligation from the supervisory notification?

Article 17(3)(e) establishes two distinct internal notification obligations: major ICT incidents must be reported to relevant senior management, and the management body must separately be informed, 'explaining the impact, response and additional controls to be established.' Both are independent of the external supervisory reporting chain. All three notifications (to senior management, the management body, and the competent authority) must be coordinated so that internal stakeholders are informed at or before the point of initial supervisory report submission.

What should the initial supervisory notification include?

The initial notification is a preliminary report: DORA Article 19(4)(a) acknowledges it will be incomplete at that stage. It must include the date and time of the incident, a description of the affected ICT services and functions, a preliminary impact assessment, and the classification basis. The intermediate report (within 72 hours) and the final report (within one month) provide progressively more complete information, with format requirements specified by the EBA joint technical standards on major incident reporting.

How should multi-entity financial groups handle parallel notification obligations?

Each legal entity in scope of DORA has its own notification obligation to its own national competent authority, and a group incident affecting shared infrastructure creates parallel entity-level obligations that may run on staggered timelines. Groups should design a central incident management protocol that initiates entity-level classification assessments simultaneously, runs parallel notification preparation tracks, and maintains a consolidated incident log across entities. Central coordination supports entity-level compliance without absorbing it. Further analysis from TechLaw.ie on cross-jurisdictional notification obligations provides additional context.

What happens if the competent authority's notification channels are unavailable during a major incident?

DORA Article 19 requires financial entities to use the reporting channels specified by their national competent authority. Where those channels are unavailable, entities should have a documented fallback procedure, which will ordinarily involve direct contact with the competent authority's supervisory team and contemporaneous documentation of the attempted notification. The regulatory expectation is reasonable effort and good faith, supported by evidence. Competent authorities have published guidance on notification procedures that should be incorporated into incident management documentation before an incident occurs.