I
Impetora

DORA and AI vendor outsourcing: what financial entities have to do

By Impetora -

The Digital Operational Resilience Act, Regulation (EU) 2022/2554 (DORA), entered into application on 17 January 2025 and binds roughly 22,000 financial entities across the EU to a uniform ICT risk-management regime. AI systems supplied by third parties are squarely in scope as ICT services, which means model providers, hosting platforms and AI consultancies that touch in-scope financial workloads inherit DORA-grade due diligence, contract, exit and incident-reporting obligations [1].

2025-01-17
DORA application date
EUR-Lex
5
ICT risk-management pillars in DORA
EBA
22,000+
EU financial entities in scope
ESMA
Art 28-30
third-party ICT risk articles
EUR-Lex

What does DORA actually cover and why does it apply to AI vendors?

DORA is the EU's first horizontal regulation on operational resilience for the financial sector. It consolidates and replaces a patchwork of EBA, EIOPA and ESMA guidelines on outsourcing and ICT risk into one binding text with five pillars: ICT risk management (Articles 5-16), ICT-related incident reporting (Articles 17-23), digital operational resilience testing (Articles 24-27), third-party ICT risk management (Articles 28-30) and information sharing (Article 45) [1].

AI services - whether a foundation-model API, a hosted classifier, an agentic workflow platform or a custom-built model managed by an AI consultancy - are treated as "ICT services" under Article 3(21). That means every AI vendor providing services that support critical or important functions of a financial entity falls inside the third-party ICT risk regime. There is no AI carve-out, no de minimis threshold, and no exception for "non-cloud" AI services.

Scope covers credit institutions, payment institutions, e-money institutions, investment firms, AIFMs, UCITS managers, central counterparties, trade repositories, crypto-asset service providers, insurance and reinsurance undertakings, and a long tail of other regulated entities. The European Supervisory Authorities estimate roughly 22,000 entities are directly bound, plus their entire ICT supply chain by contractual flow-down [2].

What do Articles 28 to 30 require for AI vendor contracts?

Articles 28 to 30 are the heart of the third-party regime. Article 28 sets out general principles: financial entities remain fully responsible for compliance even when they outsource, must integrate ICT third-party risk into their overall risk-management framework, and must maintain a register of information on all contractual arrangements for ICT services. The register is reportable annually to competent authorities under the Implementing Technical Standards.

Article 29 imposes a pre-contractual due-diligence requirement: assess whether the arrangement covers a critical or important function, evaluate the provider's suitability, identify concentration risk and account for sub-contracting chains. Article 30 sets the mandatory contractual provisions, which include description of services and locations of data processing, service-level agreements with measurable targets, audit and access rights for the financial entity and the competent authority, incident-reporting cooperation, exit strategy and transition support, and insolvency safeguards.

Articles 28-30
third-party ICT risk regime in DORA
EUR-Lex

For AI vendors, the practical impact is that standard SaaS-style click-through terms do not satisfy DORA. Contracts must give the financial entity (and its supervisor) on-site audit rights, data-location commitments, sub-processor controls and a documented exit plan that lets the entity migrate the workload to an alternative provider without prohibitive switching costs [3].

What is the Critical Third-Party Provider regime and which AI vendors fall in?

DORA introduces a new direct supervisory regime for ICT providers designated as Critical Third-Party Providers (CTPPs). The European Supervisory Authorities, jointly via the Joint Examination Teams led by the lead overseer, publish the criticality criteria and the list of designated CTPPs. Designation criteria include systemic impact, sector concentration, substitutability of the service, and the entity's network of clients in the financial sector.

CTPPs are subject to direct oversight powers including general investigations, on-site inspections, recommendations and, in extremis, financial penalties of up to 1% of average daily worldwide turnover. The first CTPP designations are expected during 2026, and large hyperscale cloud providers and several systemic AI infrastructure providers are widely anticipated to be in the first cohort. Even AI vendors that are not designated CTPPs feel the impact through their hyperscale dependencies, since financial entities must trace and document the sub-contracting chain.

The practical consequence for buyers: when scoping an AI engagement, it is no longer enough to know who the immediate AI vendor is. The financial entity must document the upstream model provider, the hosting region, the operational support locations and the realistic migration path to a substitute provider.

How do the RTS on threat-led penetration testing and incident reporting affect AI?

DORA is supplemented by a body of Level 2 measures - Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) developed by the ESAs. The RTS on threat-led penetration testing (TLPT) sets out the requirements for advanced testing of critical ICT systems, modelled on the TIBER-EU framework. Financial entities must run TLPT at least every three years on systems supporting critical or important functions, which can include AI inference pipelines and decision-support systems used in customer-facing or risk-management workflows.

The RTS on classification of ICT-related incidents and the ITS on incident reporting impose tight notification timelines: an initial notification within 4 hours of classification as major, an intermediate report within 72 hours, and a final root-cause report within one month. AI-specific incidents - model outages, severe accuracy degradation, prompt-injection breaches affecting integrity, training-data leaks - all qualify when they affect a critical function, and the incident report must include the third-party provider involved.

Pooled testing arrangements are permitted, which means multiple financial entities can test a shared CTPP jointly. Buyers should confirm in vendor selection whether the AI provider supports pooled TLPT participation, since the cost and disruption of running fully bilateral tests is otherwise borne entirely by the financial entity [4].

How does DORA stack with the EU AI Act for financial services AI?

DORA and the EU AI Act (Regulation 2024/1689) are complementary, not overlapping. DORA governs the operational resilience of the system - availability, recoverability, third-party risk, incident reporting. The AI Act governs the AI-specific properties of the system - risk classification, training data, transparency, human oversight, accuracy and post-market monitoring. The same AI system in a bank's credit-scoring pipeline is subject to both regimes simultaneously: DORA for the ICT-resilience layer, AI Act Annex III high-risk obligations for the AI substantive layer.

For high-risk AI systems under the Act, Article 17's quality management system overlaps materially with DORA's ICT risk-management pillar. Enterprises that build a unified governance programme - one register that captures ICT contracts, AI Act technical documentation, and ISO/IEC 42001 management-system evidence - avoid duplicate work. Treating them as three separate streams typically triples the documentation burden without improving resilience.

How does Impetora support DORA-grade AI engagements?

Impetora's TRACE methodology was designed for AI systems that have to survive bank, insurer and asset-manager third-party risk reviews. Trust covers the contractual layer: data residency commitments, sub-processor disclosure, audit rights, exit and transition planning aligned with Article 30. Readiness produces the workflow and data audit that becomes the input to the financial entity's own register of information and risk-classification work. Architecture covers the production-grade design with logging, monitoring, recoverability and segregation that DORA's ICT risk-management pillar expects. Citations and Evidence covers the audit-trail layer that is reportable to competent authorities on request.

The practical path for a financial-services AI engagement: scope the system against the criticality criteria first, document sub-processor and hosting chain explicitly, draft exit and transition plans as part of the design (not as an afterthought), and structure incident-response runbooks that meet the 4-hour, 72-hour and one-month reporting windows.

Frequently asked questions

When did DORA become enforceable?
DORA entered into force on 16 January 2023 and became applicable on 17 January 2025. Competent authorities began supervising compliance on day one of application, and incident reporting obligations have been in effect since then. The first wave of CTPP designations is expected during 2026.
Does DORA apply to AI vendors based outside the EU?
It applies through the financial entity's contractual relationship. A US-headquartered AI vendor providing services to an EU bank is subject, by contract flow-down, to DORA's third-party requirements: the contract must include audit rights for the bank and its supervisor, data-location commitments, sub-processor controls and an exit plan. If the AI vendor is later designated as a Critical Third-Party Provider, it becomes subject to direct supervision by the lead overseer regardless of headquarters location.
What is the register of information and what does it require for AI services?
Article 28(3) requires every financial entity to maintain a register of all contractual arrangements for the use of ICT services. The Implementing Technical Standard sets a structured template covering provider identity, services rendered, criticality assessment, locations of data processing, sub-contracting chain, contract dates and termination terms. The register is reportable to the competent authority annually. AI services must be documented in the same register with the same level of granularity as any other ICT service.
Can a financial entity use a click-through SaaS AI service under DORA?
Not for critical or important functions. Article 30 lists mandatory contractual provisions including audit rights, data-location commitments, sub-processor controls, incident cooperation and exit support. Standard click-through SaaS terms do not satisfy these. For non-critical experimentation a click-through arrangement may be acceptable, but the moment the workload becomes part of a critical or important function the contract must be renegotiated to DORA standards or the workload must be migrated.
How does DORA interact with NIS2?
DORA is lex specialis for the financial sector. Article 1(2) provides that financial entities subject to DORA are not subject to NIS2 obligations on the same matters. NIS2 continues to govern other essential and important entities outside the financial-services scope. AI vendors selling into both regulated financial entities and non-financial critical infrastructure must therefore meet DORA contract requirements for the former and NIS2 obligations for the latter.
What are the penalties for DORA non-compliance?
National competent authorities can impose administrative penalties under their national framework. For Critical Third-Party Providers, the lead overseer can impose periodic penalty payments of up to 1% of average daily worldwide turnover until the recommendation is complied with, applicable for up to six months. Beyond fines, designation as non-compliant materially restricts a vendor's ability to serve EU financial-services customers, since their customers must demonstrate alternative arrangements or risk supervisory action themselves.
Impetora

Ready to scope your project? Submit a short brief and we reply within one business day.

Sources cited

Sources cited (6) - show
  1. Regulation (EU) 2022/2554 on digital operational resilience for the financial sector (DORA). European Union, Official Journal, 2022-12-14. https://eur-lex.europa.eu/eli/reg/2022/2554/oj
  2. Digital Operational Resilience Act (DORA) - supervisory landing page. European Banking Authority (EBA), 2025. https://www.eba.europa.eu/regulation-and-policy/digital-operational-resilience-act-dora
  3. Joint guidelines and RTS/ITS on third-party ICT risk under DORA. European Supervisory Authorities (EBA, EIOPA, ESMA), 2024. https://www.esma.europa.eu/esmas-activities/digital-finance-and-innovation/digital-operational-resilience-act-dora
  4. RTS on threat-led penetration testing under DORA. European Supervisory Authorities, 2024. https://www.eba.europa.eu/regulation-and-policy/digital-operational-resilience-act-dora
  5. Regulation (EU) 2024/1689 (Artificial Intelligence Act). European Union, Official Journal, 2024-07-12. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024R1689
  6. ISO/IEC 42001:2023 - AI management system. International Organization for Standardization, 2023-12. https://www.iso.org/standard/81230.html
About Impetora
Impetora designs, builds, and deploys custom AI systems for enterprises in regulated industries. We operate from Vilnius and Amsterdam and work in five languages.
Discovery call

Book a discovery call

Tell us what you would like to build. We reply within one business day.

30-minute call. Free of charge. No obligation.