DORA Compliance Threat Intelligence ICT Risk Management EU Regulatory

How managed threat intelligence satisfies DORA's ICT risk management requirements

DORA's January 2025 application date has passed. The regulation is live. Yet the majority of in-scope financial entities are still operating threat intelligence programmes that were designed for a pre-DORA world — ones that generate volume but cannot demonstrate the specific evidence of proactive monitoring that EU regulators will demand at examination.

The Digital Operational Resilience Act is not a cybersecurity standard. It is an operational resilience regulation and the distinction matters enormously for how threat intelligence is designed, documented, and reported. Generic commercial threat feeds, even well-integrated ones, do not satisfy DORA's requirements for structured, entity-specific threat monitoring with demonstrable evidence of ongoing capability. This guide explains what does.

It is written for CISOs and compliance officers at financial entities in scope — credit institutions, investment firms, payment institutions, insurance undertakings, and third-party ICT service providers subject to DORA's oversight framework. If you are currently mapping your threat intelligence programme to DORA requirements, or preparing for supervisory examination, this is the technical reference you need.

Understanding DORA's threat intelligence architecture across Chapter II

DORA's threat intelligence requirements are not contained in a single article. They are distributed across the ICT risk management framework in Chapter II, from initial identification through detection, response, and the ongoing learning cycle. Articles 8 through 13 each carry specific obligations that a mature threat intelligence programme must address. The common mistake is treating threat feeds as the answer to Article 10 (Detection) in isolation, while failing to satisfy the identification, learning, and communication requirements that sit around it.

The six articles below constitute the threat intelligence architecture that DORA implicitly mandates. Each maps to a distinct operational capability — not a policy document.

Art. 8Identification

Financial entities must identify and classify ICT assets and map information flows. For threat intelligence, this means understanding which assets represent the highest-value targets for known threat actors — not just what you own, but what adversaries want.

Art. 9Protection and prevention

Policies and controls must be proportionate to identified threats. This creates a direct dependency on threat intelligence: protection measures that cannot be traced back to an assessed threat profile cannot be demonstrated as proportionate to a regulator.

Art. 10Detection

Entities must deploy mechanisms to promptly detect anomalous activities. DORA requires these mechanisms to be based on threat intelligence — the detection capability must demonstrably reflect the current threat landscape facing the entity and its sector.

Art. 11Response and recovery

Response plans must be based on documented threat scenarios. Threat intelligence feeds directly into the scenario development that underpins incident response, business continuity, and recovery time objectives for critical functions.

Art. 13Learning and evolving

Post-incident reviews must feed back into the risk management framework. Threat intelligence closes the learning loop — connecting what happened externally (sector incidents, new TTPs, emerging actor campaigns) to internal control improvements.

Art. 14Communication

Crisis communication plans must address ICT-related incidents and material vulnerabilities. Threat intelligence informs the severity classification, stakeholder notification decisions, and timing of disclosures — both internally and to competent authorities.

The regulatory test

A competent authority examining your DORA compliance will not ask to see your threat feed subscription invoice. They will ask how your threat intelligence programme maps to each of these articles — what specific outputs it produces, how those outputs are documented, how they have modified your controls, and how you can demonstrate that your monitoring is proactive rather than reactive. Generic feeds do not answer those questions.

Article 10 in depth — what 'proactive' threat monitoring actually means to a regulator

Article 10 is the most operationally demanding of DORA's threat intelligence requirements. It mandates that financial entities deploy mechanisms "to promptly detect anomalous activities, including ICT network performance issues and ICT-related incidents." The critical regulatory interpretation sits in the word anomalous — which the European Supervisory Authorities have signalled should be understood in relation to a documented, current understanding of what adversarial behaviour looks like for your entity and sector.

This is not a passive requirement. A SIEM that fires alerts is not, by itself, evidence of proactive threat monitoring under DORA. Proactive monitoring requires a documented threat picture that informs what you are looking for, updated on a frequency that reflects how quickly the threat landscape evolves, and producing outputs that can be demonstrated to a regulator as evidence of ongoing, structured vigilance.

The seven data points regulators will look for

Threat data category
What the evidence must demonstrate
DORA ref.
Sector-specific threat actor profiling
Documented identification of threat actors known to target your sector, with assessed TTPs, typical initial access vectors, and campaign history. Updated at minimum quarterly or upon significant new intelligence.
Art. 8 / 10
Entity-specific exposure assessment
Evidence that your threat monitoring reflects your specific attack surface — domains, exposed infrastructure, credential exposure, supply chain dependencies — not just generic sector indicators.
Art. 8 / 10
MITRE ATT&CK TTP coverage mapping
Mapping of monitored techniques to the TTPs of identified threat actors. Demonstrates that detection capability is informed by specific adversary behaviour rather than generic signatures.
Art. 10
Dark web and credential monitoring
Documented monitoring of paste sites, criminal forums, and breach databases for entity-specific credential exposure, data leakage, and pre-attack reconnaissance activity.
Art. 10
Third-party and supply chain intelligence
Threat monitoring that extends to critical ICT third-party providers — evidence that third-party risk is tracked as a live threat surface, not only assessed at onboarding.
Art. 9 / 10
Threat scenario documentation
Structured threat scenarios — specific adversary simulations grounded in intelligence — used to underpin ICT business continuity and response planning. Traceable to identified threat actors.
Art. 11 / 13
Intelligence cycle records
Documented evidence of the intelligence production process: collection, analysis, grading, distribution, and feedback. Demonstrates that your intelligence is assessed, not merely aggregated.
Art. 13 / 14
The documentation requirement that catches most organisations

DORA does not simply require you to do these things. It requires you to be able to demonstrate that you have done them with records that can withstand supervisory scrutiny. A threat intelligence programme that operates without documented processes, graded outputs, and an auditable feedback loop into your risk management framework is not DORA-compliant, regardless of the quality of its underlying analysis.


DORA Article-to-ThreatInsights capability mapping

The table below maps each relevant DORA article to the specific operational requirement it creates for your threat intelligence programme, and to the ThreatInsights service module that satisfies it. This is the compliance-to-capability structure that allows a CISO to walk a regulator through their threat intelligence programme article by article.

DORA article
Regulatory requirement
ThreatInsights capability
Article 8
Identification — ICT asset & threat mapping
Identify and document ICT assets; map information flows; classify assets by criticality; identify cyber threats and ICT vulnerabilities relevant to those assets
Attack Surface Intelligence
Continuous external attack surface enumeration, asset discovery, and threat actor targeting assessment mapped to your specific infrastructure and critical functions
Article 9
Protection — controls proportionate to threats
Implement controls proportionate to the identified risk; protect ICT systems from intrusion and data misuse; detect anomalous activities in access controls and network traffic
Threat Actor Profiling
Quarterly assessed threat actor reports for your sector and entity, providing the evidential basis for proportionality of controls to an identified and documented adversary set
Article 10
Detection — proactive threat monitoring
Deploy mechanisms to promptly detect anomalous activities; use threat intelligence to inform detection; produce ICT-related incident alerts with sufficient granularity
Managed Detection Intelligence
Continuous dark web, credential, and sector threat monitoring producing graded, entity-specific alerts with MITRE ATT&CK TTP mapping and documented intelligence grading
Article 11
Response — intelligence-led scenario planning
ICT business continuity plans must be based on documented threat scenarios; response plans must address the specific threat landscape; recovery objectives informed by threat analysis
Threat Scenario Development
Structured adversary simulation scenarios grounded in assessed intelligence, formatted for direct use in BCM planning, tabletop exercises, and regulatory documentation
Article 13
Learning — post-incident intelligence integration
Review ICT-related incidents; analyse root causes; implement improvements; track sector-wide incidents for lessons applicable to own risk posture; demonstrate continuous improvement
Sector Intelligence & PIR Support
Post-incident intelligence briefings on sector events, with structured lessons-learned integration and documented control improvement recommendations traceable to specific intelligence
Article 14
Communication — intelligence-informed disclosure
Crisis communication plans for ICT incidents and material vulnerabilities; responsible disclosure framework for clients and counterparts; severity classification for notification decisions
Executive Threat Reporting
Board-ready threat intelligence products, severity classification aligned to DORA incident taxonomy, and notification decision support for Article 19 major incident reporting obligations
Article 26
TLPT — Threat-led penetration testing
Advanced testing for in-scope entities every three years using threat-led methodology; requires accredited TISP to produce Targeted Threat Intelligence Report prior to red team exercise
TIBER-EU / TLPT Intelligence
Accredited Threat Intelligence Service Provider (TISP) function: Generic Threat Landscape Report and Targeted Threat Intelligence Report production for TIBER-EU and DORA TLPT engagements

DORA-compliant CTI vs traditional threat feeds — why standard feeds fail the regulatory test

The commercial threat intelligence market is mature and well-supplied. ISAC feeds, commercial threat platforms, and vendor-bundled CTI have become standard infrastructure in financial sector security operations. None of them, by default, satisfy DORA's requirements, not because the underlying data is poor, but because DORA requires something that commercial feeds are not designed to produce: a documented, entity-specific, auditable intelligence programme with demonstrable outputs and a feedback loop into the ICT risk management framework.

The distinction is not about data quality. It is about analytical process, documentation, and regulatory posture.

Dimension
Traditional threat feed
Commercial · Generic · Undocumented process
DORA-compliant managed CTI
Entity-specific · Assessed · Auditable
Scope of coverage
Sector-wide or global indicators, not entity-specific
Tailored to your attack surface, critical functions, and known adversary set
Intelligence grading
No source grading — confidence is algorithmic or vendor-asserted
Structured grading (NATO / 3x5x2) with explicit source quality and confidence levels
Regulatory evidence
Cannot produce auditable record of intelligence process for supervisory examination
Full intelligence cycle documented — collection, analysis, distribution, feedback — examination-ready
Article 10 alignment
Detection inputs are generic; cannot demonstrate threat-informed detection proportionate to identified adversaries
Detection use cases linked to specific TTP profiles; MITRE ATT&CK coverage traceable to assessed threat actors
Article 11 integration
Threat scenarios in BCM plans not traceable to intelligence; often based on industry templates
Scenario documentation grounded in assessed intelligence; directly usable in regulatory submissions and TLPT
Article 13 (learning)
No structured mechanism to feed external threat developments into post-incident review or control improvement
Sector incident intelligence integrated into PIR process; control improvement recommendations documented
TLPT / Article 26
Not applicable — commercial feeds cannot produce the Targeted Threat Intelligence Report required for TIBER-EU
Accredited TISP function — produces GTLR and TTIR to TIBER-EU specification for DORA TLPT engagements
Third-party coverage
Rarely extends to monitoring specific ICT third-party providers; coverage is infrastructure-level at best
Named third-party monitoring for critical ICT service providers; supply chain intelligence integrated into risk posture
Board reporting
Raw feeds not translatable to board-level risk language; gap between operational data and governance reporting
Executive intelligence products in financial risk language; Article 14 communication support for incident disclosure

Building a DORA-defensible threat intelligence programme — the evidence framework

Regulatory examination under DORA will not be satisfied by a policy that describes your threat intelligence intentions. It will require evidence that the programme operates as described with outputs that can be traced from intelligence collection through to risk management decisions. The following seven evidence components constitute a defensible threat intelligence programme under DORA's Chapter II framework.

1
Threat Intelligence Programme Charter

A documented policy that defines the scope, objectives, roles, collection sources, grading methodology, distribution framework, and feedback mechanisms of your CTI programme. This is the governance document that demonstrates programme maturity to a regulator.

Art. 6 / 13
2
Entity-Specific Threat Landscape Report (quarterly minimum)

A structured, analyst-produced report covering the threat actors assessed to pose risk to your entity, their current TTP profile, recent campaign activity in your sector, and specific indicators relevant to your infrastructure. Dated, graded, and version-controlled.

Art. 8 / 10
3
Detection Coverage Map (MITRE ATT&CK aligned)

A mapping of your detection use cases to the MITRE ATT&CK techniques associated with your identified threat actors. Demonstrates that your detection capability is informed by specific adversary behaviour and has measurable, traceable coverage against known TTPs.

Art. 10
4
Intelligence-Informed Threat Scenarios (BCM integration)

At minimum three documented threat scenarios, each traceable to an identified threat actor and current intelligence, used to underpin ICT business continuity planning, response playbooks, and recovery time objectives for critical functions.

Art. 11
5
Third-Party Threat Monitoring Records

Documented monitoring of critical ICT third-party providers for threat activity, vulnerability disclosure, incident history, and sector exposure. Evidence that third-party risk is treated as a live threat surface under DORA Chapter V, not only managed at contract stage.

Art. 9 / 28
6
Intelligence Feedback and Control Improvement Log

A documented record connecting specific intelligence outputs to control changes, detection rule modifications, or risk appetite decisions. Demonstrates the learning cycle mandated by Article 13, that intelligence is consumed and acted upon, not merely received.

Art. 13
7
Executive Threat Intelligence Reporting Record

A record of threat intelligence products delivered to senior management and the management body, demonstrating that the board receives regular, structured threat intelligence in compliance with DORA's governance requirements under Article 5 and communication obligations under Article 14.

Art. 5 / 14
The gap most organisations discover too late

Items 3 and 6 are consistently absent in organisations that believe they are DORA-compliant. A detection coverage map that cannot be traced to specific threat actor TTPs, and a control improvement process with no documented intelligence inputs, are the two evidence gaps most likely to produce adverse supervisory findings under DORA's ICT risk management framework.


What a DORA-ready threat intelligence engagement delivers

DORA compliance in threat intelligence is not achieved by procurement. It is achieved by programme design, building a CTI function that is structured around the evidence framework regulators will examine, not around the threat feed that was easiest to integrate. For most financial entities, that requires external expertise: not because the internal security team is inadequate, but because DORA's requirements extend into regulatory documentation, intelligence tradecraft, and evidence management that sits outside the typical scope of a commercial CTI programme.

A ThreatInsights DORA advisory engagement delivers a fully mapped, documented, and regulator-ready threat intelligence programme — one that satisfies each of the Chapter II articles above with traceable, examination-grade evidence. For entities approaching TLPT or supervisory examination, it also provides the accredited TISP function required under Article 26. The engagement is scoped to your regulatory timeline and risk profile, with outputs formatted for direct submission to your competent authority.

DORA Readiness Assessment

Start with a gap analysis. ThreatInsights offers a structured DORA threat intelligence readiness assessment that maps your current programme against the seven evidence components above, identifies critical gaps, and produces a prioritised remediation plan with regulatory timeline alignment. Engagements are available for Tier 1 and Tier 2 in-scope entities — contact ThreatInsights to discuss scope and timing relative to your supervisory calendar.

Leave A Comment

Name*
Message*

Download the course syllabus