DORA and IT Mapping: Obligations for the Financial Sector in 2026
The DORA regulation imposes new digital resilience obligations on the financial sector. Discover how IT mapping helps you achieve compliance.
Frédéric Le Bris
CEO & Co-founder
DORA and IT Mapping: Obligations for the Financial Sector in 2026
The Digital Operational Resilience Act (DORA) -- Regulation (EU) 2022/2554 -- has been in full force since January 17, 2025. For financial entities across the European Union, this is no longer a future obligation. It is current law, and supervisory authorities are actively assessing compliance.
Yet many small and mid-sized financial institutions -- regional banks, insurance brokers, asset managers, payment service providers, and fintech companies -- remain underprepared. The common thread among organizations struggling with DORA compliance is not a lack of intent but a lack of structural visibility into their own IT landscapes.
DORA does not explicitly require "IT mapping." But virtually every obligation it imposes -- ICT risk management, incident reporting, third-party oversight, operational resilience testing -- depends on having an accurate, current, and comprehensive understanding of your information systems. IT mapping is not a DORA requirement in name; it is a DORA requirement in practice.
This article explains exactly what DORA demands, how IT mapping provides the foundation for compliance, and what financial sector SMEs should prioritize in 2026.
What DORA Requires: The Key Obligations
Scope: Who Is Affected?
DORA applies to virtually all regulated financial entities in the EU, including:
- Credit institutions (banks of all sizes)
- Investment firms
- Insurance and reinsurance undertakings
- Insurance intermediaries
- Payment institutions and electronic money institutions
- Account information service providers
- Crypto-asset service providers
- Central securities depositories
- Trading venues
- Trade repositories
- Management companies and alternative investment fund managers
- Data reporting service providers
- Crowdfunding service providers
- ICT third-party service providers designated as critical
The scope is deliberately broad. If your organization holds a financial services license in the EU, DORA almost certainly applies to you. The regulation applies a proportionality principle -- smaller entities face lighter requirements -- but the core obligations are universal.
The Five Pillars of DORA
DORA is structured around five pillars. Each one requires IT mapping capabilities, whether explicitly or implicitly.
Pillar 1: ICT Risk Management (Articles 5-16)
Financial entities must establish a comprehensive ICT risk management framework that includes:
- Identification of all ICT assets, systems, and processes
- Protection through security policies, access controls, and encryption
- Detection of anomalous activities and ICT-related incidents
- Response and recovery through business continuity and disaster recovery plans
- Learning and evolving through post-incident reviews and continuous improvement
The identification requirement is where IT mapping becomes indispensable. Article 8 specifically requires entities to identify and document:
- All ICT-supported business functions
- Information assets supporting those functions
- ICT assets, including hardware, software, and network components
- Dependencies and interconnections between these elements
- Configurations and links between ICT assets
This is, in essence, a mandate for IT mapping.
Pillar 2: ICT-Related Incident Management (Articles 17-23)
Entities must classify, report, and learn from ICT-related incidents. Significant incidents must be reported to competent authorities within strict timelines:
- Initial notification: Within 4 hours of classification (no later than 24 hours after detection)
- Intermediate report: Within 72 hours
- Final report: Within one month
To classify and report incidents effectively, you need to know which systems were affected, which business functions depend on those systems, what data was at risk, and how many customers were impacted. Without an IT map linking systems to business functions and data flows, incident classification becomes guesswork.
Pillar 3: Digital Operational Resilience Testing (Articles 24-27)
Entities must conduct regular testing of their ICT systems, including:
- Vulnerability assessments and scans
- Network security assessments
- Gap analyses
- Physical security reviews
- Compatibility testing
- Performance testing
- End-to-end testing of processes
- Penetration testing (for significant entities, including threat-led penetration testing -- TLPT)
Designing meaningful tests requires knowing what to test. An IT map that documents critical systems, their dependencies, and their supporting infrastructure is the starting point for any testing program.
Pillar 4: ICT Third-Party Risk Management (Articles 28-44)
This pillar is arguably the most operationally demanding. Entities must:
- Maintain a register of all ICT third-party service providers and the services they provide
- Assess and manage the concentration risk of relying on specific providers
- Ensure contracts include specific DORA-mandated clauses (audit rights, exit strategies, data location, incident notification)
- Monitor third-party performance and risk on an ongoing basis
- Have exit strategies for critical or important functions supported by third parties
The register of third-party providers must include:
- The name and identification of the third-party provider
- The ICT services provided
- The business functions supported by those services
- The locations where data is processed or stored
- Whether the service supports critical or important functions
- The contract start and end dates
This register is a subset of a comprehensive IT map. Organizations that already maintain an IT map covering applications, services, and their providers can extract this register directly. Organizations without a map must build one from scratch under regulatory pressure.
Pillar 5: Information Sharing (Article 45)
Entities are encouraged (but not mandated) to exchange cyber threat intelligence with other financial entities. While this pillar is less prescriptive, effective information sharing depends on understanding your own attack surface -- which, again, requires an IT map.
Why IT Mapping Is the Foundation of DORA Compliance
The Dependency Chain
Every DORA obligation depends on a chain of knowledge:
- You must know what you have. Systems, applications, infrastructure, data stores, third-party services.
- You must know how things connect. Dependencies, data flows, integration points.
- You must know what matters most. Which systems support critical business functions, which data is sensitive, which providers are irreplaceable.
- You must keep this knowledge current. Not a one-time inventory, but a living, maintained map.
IT mapping provides this knowledge in a structured, maintainable form. Without it, DORA compliance devolves into fragmented spreadsheets, tribal knowledge, and documentation that is outdated before it is published.
What Supervisory Authorities Expect
The European Supervisory Authorities (EBA, ESMA, EIOPA) have published Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) that operationalize DORA's requirements. Key expectations include:
- ICT asset inventories that are complete, accurate, and regularly updated
- Business impact analyses linking ICT systems to business functions and quantifying the impact of disruption
- Dependency mapping showing how systems rely on each other and on third-party services
- Data flow documentation showing where sensitive data is stored, processed, and transmitted
- The third-party register (ITS on the Register of Information) with specific fields and format requirements
These are not abstract requirements. Supervisory authorities will request this documentation during reviews, and the quality and currency of your documentation will directly influence their assessment of your operational resilience.
Practical Steps for Financial Sector SMEs in 2026
Step 1: Inventory Your ICT Landscape
Start with a comprehensive inventory of:
- Applications: Every software application used in the organization, including SaaS subscriptions, internal tools, and end-user computing (spreadsheets, databases, macros)
- Infrastructure: Servers, networks, cloud services, data centers, endpoints
- Data stores: Databases, file shares, cloud storage, backup systems
- Third-party services: Every external ICT service provider, from core banking platforms to email providers
- Interfaces and integrations: How systems connect and exchange data
Do not attempt perfection on the first pass. A complete-but-rough inventory is more valuable than a partial-but-detailed one. You can refine later.
Step 2: Map Dependencies and Business Criticality
For each system in your inventory, document:
- Business functions supported. Which business processes depend on this system?
- Upstream dependencies. What other systems or services does this system depend on?
- Downstream dependencies. What other systems depend on this system?
- Third-party dependencies. Which external providers support this system?
- Data classification. What type of data does this system process or store? Is it personal data, financial data, or regulatory data?
- Business criticality. What is the impact if this system is unavailable for 1 hour, 4 hours, 24 hours, or longer?
This is where IT mapping tools provide their greatest value. A structured tool enforces consistency, enables visualization, and makes dependency chains visible in ways that spreadsheets cannot.
Step 3: Build Your Third-Party Register
DORA's ITS on the Register of Information specifies exactly what fields must be included. Use your IT map as the source:
- For each third-party provider: name, LEI (Legal Entity Identifier), country of registration
- For each service: description, whether it supports critical or important functions
- For each contract: start date, end date, renewal terms, audit rights
- Data processing locations and sub-contracting arrangements
An IT map that already documents applications, their providers, and their business criticality can generate most of this register automatically.
Step 4: Assess and Document Risks
With your map in place, conduct risk assessments:
- Single points of failure. Systems or providers whose failure would disrupt critical functions with no alternative.
- Concentration risk. Over-reliance on a single provider for multiple critical services (e.g., one cloud provider hosting all critical applications).
- Technology obsolescence. Systems running on unsupported software or hardware.
- Data sovereignty gaps. Data processed or stored outside the EU without appropriate safeguards.
- Recovery capability gaps. Critical systems without tested backup and recovery procedures.
Document these risks and your mitigation plans. DORA requires not just risk identification but evidence of active risk management.
Step 5: Establish Ongoing Governance
DORA compliance is not a project with an end date. It is an ongoing obligation. Establish processes for:
- Regular map updates. At minimum quarterly, ideally triggered by change events (new deployments, vendor changes, infrastructure modifications).
- Periodic review. Annual comprehensive review of the IT map with business stakeholders to validate accuracy.
- Incident integration. After every ICT incident, update the map with lessons learned (new dependencies discovered, risk ratings adjusted).
- Third-party monitoring. Regular review of third-party risk assessments and contract compliance.
How UrbaHive Supports DORA Compliance
UrbaHive was designed with regulatory compliance as a core capability, not an afterthought. For financial sector SMEs facing DORA obligations, the platform provides:
Pre-Configured DORA Compliance Views
Rather than requiring you to configure custom views and reports, UrbaHive provides pre-built DORA-aligned views that map directly to the regulation's requirements:
- ICT asset inventory aligned with Article 8 requirements
- Business function to system mapping showing critical dependencies
- Third-party service register formatted for regulatory reporting
- Risk assessment dashboards highlighting concentration risk, obsolescence, and single points of failure
Audit-Ready Documentation
- Audit trail showing when each element was last reviewed, by whom, and what changed
- Export capabilities for producing documentation in formats expected by supervisory authorities
- Version history demonstrating that the map is maintained as a living document, not a one-time exercise
Collaborative Maintenance
DORA compliance requires input from across the organization:
- IT operations knows the infrastructure details
- Business units know which processes are critical
- Procurement knows the contract terms with third parties
- Risk and compliance needs to assess and document risks
- Management must oversee and take responsibility
UrbaHive's collaborative platform enables all these stakeholders to contribute to a single, authoritative map -- eliminating the fragmentation, inconsistency, and staleness that plague spreadsheet-based approaches.
Rapid Deployment
For financial SMEs under regulatory pressure, time matters. UrbaHive's typical deployment timeline of 1-4 weeks means you can go from zero to a compliance-relevant IT map in time frames that matter for regulatory deadlines -- not the 3-6 months that enterprise EA platforms require.
Common Pitfalls to Avoid
Treating DORA as a Documentation Exercise
DORA is not satisfied by producing a static document and filing it. Supervisory authorities expect living, maintained documentation that reflects current reality. An IT map that was accurate six months ago but has not been updated is a compliance liability, not an asset.
Underestimating Third-Party Risk Obligations
Pillar 4 (ICT Third-Party Risk Management) is the most operationally demanding aspect of DORA for many SMEs. The register requirements are specific and detailed. The concentration risk assessment requires genuine analysis, not checkbox compliance. Start here if you are prioritizing.
Relying on Spreadsheets
Excel is not an IT mapping tool. Spreadsheets lack referential integrity (a changed system name does not propagate through dependencies), have no audit trail, cannot enforce data quality, and collapse under the weight of complex relationships. For DORA compliance, you need a structured tool -- not a spreadsheet.
Waiting for Supervisory Action
Some organizations are taking a wait-and-see approach, expecting supervisory authorities to provide more guidance or delay enforcement. This is a gamble. The regulation is in force. The RTS and ITS have been published. Supervisory authorities are conducting reviews. Waiting increases the cost and urgency of eventual compliance.
Ignoring Proportionality
DORA applies proportionality -- smaller, less complex entities face lighter requirements. Understand where your organization sits on the proportionality spectrum. You may not need threat-led penetration testing (TLPT), but you do need the foundational ICT risk management framework, incident management processes, and third-party register.
Conclusion
DORA represents the most comprehensive regulatory framework for digital operational resilience in the financial sector. Its obligations are real, enforceable, and in effect today. For financial sector SMEs, the path to compliance runs through IT mapping.
An accurate, current, comprehensive IT map provides the structural foundation for every DORA obligation: ICT risk management, incident classification, resilience testing, and third-party oversight. Without this foundation, compliance efforts are fragmented, inefficient, and ultimately unconvincing to supervisory authorities.
The organizations that will navigate DORA most effectively are those that treat IT mapping not as a compliance burden but as an operational capability -- a living, collaborative representation of their IT landscape that serves decision-making, risk management, and regulatory reporting simultaneously.
Start building your DORA-compliant IT map with UrbaHive. Purpose-built for financial sector SMEs, with pre-configured compliance views, collaborative maintenance, and rapid deployment. Begin your free trial today.