On 3 March 2025, the Malta Financial Services Authority (“MFSA”) issued an update to its Circular regarding the Digital Operational Resilience Act (“DORA”), confirming that key regulatory and implementing technical standards have now been published in the EU Official Journal, marking yet another step towards operationalising DORA across the financial sector. These standards further cement DORA’s framework, providing captured financial entities with clearer and enforceable obligations on ICT-Related incident reporting and oversight conditions, and further reinforcing the European Union’s (“EU”) commitment to a harmonised cybersecurity and ICT risk management framework.
From a broader perspective, this development underscores the EU’s ongoing regulatory drive toward financial stability and cyber resilience, aligning DORA with existing legislative frameworks such as the NIS2 Directive and even the GDPR. Simultaneously, these standards contribute to a more structured, coordinated approach to digital risk management across the Union.
Following the interinstitutional drafting process led by the European Supervisory Authorities (“ESAs”), three key Regulatory Technical Standards and Implementing Technical Standards have been formally adopted and published. This section aims to revisit some salient features:
Article 1 Designation Process
A key aspect of this regulation is the designation process for ICT third-party service providers, where such service providers that support critical financial functions may submit detailed applications demonstrating their criticality. Interestingly, this demonstration of criticality consists of a self-assessment with regards to market presence, number of known competitors and their relation to any proprietary technology/ specific features.
Article 5 Subcontracting Governance
Critical ICT third-party service providers which are required to share information to the Lead Overseer with regards to subcontracting arrangements, have been provided with an adopted template present within the Annex. Chief among which, such ICT service providers must disclose, inter alia, the subcontractors’ risk profiles and their compliance with data protection laws, business continuity measures and information pertaining to the frequency of audits to be conducted.
Article 5: Three-Stage Reporting Framework
The regulation introduces a three-stage reporting process for major ICT-related incidents. The stages comprise of:
Article 6: Voluntary Notification of Significant Cyber Threats
In addition to mandatory reporting of major ICT-related incidents, the regulation also reaffirms voluntary notification for significant cyber threats, as was originally comprised within Article 18(2) of DORA. This mechanism thus allows financial entities to proactively inform regulators about emerging cyber threats which are relevant to the financial system, even if they have not yet materialised into full-scale ICT-related incidents.
Article 7: Aggregated Reporting
A notable feature of this regulation is the ability to aggregate reports when multiple financial entities are impacted by a common ICT incident originating from the same third-party provider.
As such, as provided under Article 19(5) of DORA, third-party service providers to whom the reporting obligations of a financial entity have been outsourced, may issue a single report on behalf of all impacted financial entities, providing these conditions are met:
For captured financial entities, these regulations clarify ‘how’ and ‘when’ major ICT-related incidents shall be reported. This standardisation of reporting formats and oversight conditions aim to reduce fragmentation in view of streamlining compliance efforts, purporting enhanced coordination across the European Union.
Captured entities should review these newly published regulations to impact on their ICT risk management and incident reporting frameworks.
----
In the meantime, if you require any help complying with DORA, GTG is here to assist. For more information, assistance or clarification, kindly contact us at info@gtg.com.mt
Author: J.J. Galea
DORA Negotiations: Key Contractual Content in ICT Contracts
DORA: Drafting and Reviewing ICT Services AgreementsDORA and ICT Service Providers: Navigating the Boundaries of Applicability