Skip to content
EU Regulation 2022/2554 · Enforcement active

DORA compliance,
structured and automated

The purpose-built platform for EU financial entities to manage ICT risk governance, incident reporting, resilience testing, and third-party oversight — in one structured system.

78%Compliance score
42Controls active
7Open risks
2Active incidents
Compliance
78%
Controls
42
Open Risks
7
Incidents
2
Pillar 1 · Governance
Pillar 2 · Risk Management
✓ 42 controls implemented
⊛ Bowtie analysis active
🇪🇺
DORA (EU) 2022/2554
📋
RTS 2024/1774
📊
ITS 2024/2956
🔒
ISO 27005 Aligned
Cloudflare Hosted
Built for EU financial entities
69
DORA requirements tracked
4
Compliance pillars covered
5×5
Risk matrix with Bowtie
<2wk
Average deployment time
// the challenge

DORA compliance shouldn't mean spreadsheet chaos

Financial entities face enforcement now — but most manage compliance with disconnected tools, manual processes, and no audit trail.

📉

Fragmented tracking

Risk registers in Excel, controls in SharePoint, incidents in email. No single source of truth for auditors or board reporting.

Manual effort at scale

69 regulatory requirements across Articles 5–14 alone. Tracking compliance status, gap analysis, and evidence collection by hand doesn't scale.

🔍

Audit readiness gaps

When the NCA comes knocking, you need timestamped audit trails, version-controlled documents, and traceable risk decisions — not a folder of PDFs.

// how it works

Up and running in days, not months

No consultants, no implementation projects. Three steps to structured DORA compliance.

1

Sign up & configure

Create your account, set up governance roles, and import your ICT asset inventory. Pre-loaded with all 69 DORA requirements.

2

Assess & document

Run gap analysis against each article, build your risk register with Bowtie analysis, and map critical function dependencies.

3

Monitor & report

Track compliance progress on the dashboard, manage incidents and tests, and export audit-ready reports with full traceability.

// complete coverage

All four DORA pillars in one platform

Structured coverage of every regulatory requirement — governance, incidents, testing, and third-party risk.

01
🏛

ICT Risk Governance

Management body roles, ICT risk framework with version control, critical function register, BIA, and dependency mapping.

Art. 5Art. 6Art. 7Art. 8
02

Incident & Risk Management

Risk register with Bowtie visualization, control library, incident classification, heat maps, trend analytics, and risk appetite decisions.

Art. 9Art. 10Art. 17Art. 19
03
🧪

Resilience Testing

Test programme, coverage matrix linked to CIFs and controls, finding tracking with remediation workflows, and TLPT phase management.

Art. 24Art. 25Art. 26
04
🤝

Third-Party Oversight

Provider register with CTPP classification, contract clause tracking, concentration risk analysis, and Register of Information.

Art. 28Art. 29Art. 30
// capabilities

Built for DORA, not retrofitted

Every feature maps directly to regulatory requirements — no generic GRC overhead.

Art. 5–14

69-Requirement Compliance Tracker

Every requirement from DORA Articles 5–14, pre-loaded with article references and gap analysis. Track assessment status across your entire regulatory surface.

  • Pre-mapped to DORA articles with RTS/ITS references
  • Compliant / Partial / Gap status per requirement
  • One-click task creation from identified gaps
  • Donut chart and article-level progress
ArticleRequirementStatus
Art. 5Management body approval of ICT risk frameworkCompliant
Art. 6Documented ICT risk management frameworkCompliant
Art. 8CIF identification and classificationPartial
Art. 9ICT risk identification and assessmentCompliant
Art. 11Business continuity policy and BIAGap
ISO 27005 · ISO 31000

Bowtie Risk Visualization

Visualize risk causes, preventive controls, risk events, recovery controls, and consequences in the industry-standard Bowtie diagram — linked to your control library.

  • SVG-rendered interactive Bowtie diagrams
  • 5 threat categories and 5 consequence categories
  • Barrier bars linked to Control Library entries
  • Quick-launch from any risk register row
Phishing attack Vendor failure Config error RISK Service outage Data breach Regulatory fine CAUSES PREVENTIVE RECOVERY CONSEQUENCES
Art. 9 · Risk Appetite

Risk Heat Map & Trend Analytics

5×5 risk heat map with configurable tolerance thresholds, automatic risk appetite decisions, and historical trend charts showing how your risk posture evolves.

  • Inherent and residual risk scoring (1–5 scale)
  • Auto-calculated Accept / Review / Escalate decisions
  • Tolerance breach alerts on the dashboard
  • Historical trend charts from risk snapshots
Likelihood × Impact
1
2
3
4
5
2
4
6
8
10
3
6
9
12
15
4
8
12
16
20
5
10
15
20
25
Accept Review Escalate
Cross-Platform

Task & Workflow Engine

Create remediation tasks from compliance gaps, risk treatments, incidents, and test findings. Track priority, assignees, due dates, and completion — all with full audit trail.

  • Auto-generated TSK-NNN IDs with audit trail
  • Cross-page creation from gaps, risks, incidents, tests
  • Priority levels: Critical / High / Medium / Low
  • Overdue tracking and dashboard integration
TaskSourcePriorityStatus
TSK-001Art. 11 gapCriticalIn Progress
TSK-002Risk R-003HighOpen
TSK-003INC-2026-001CriticalDone
TSK-004Test findingsHighOpen
// and more

Everything else you need

📄

ICT Risk Framework

Three-level document hierarchy (L1 Policies → L2 Standards → L3 Procedures) with version control, ownership, approval tracking, and gap analysis.

🔗

CIF Dependency Map

Visualize how critical functions depend on business processes, ICT assets, and third-party providers. Interactive SVG map with drill-down.

📊

Business Impact Analysis

Wizard-driven BIA with MTPD, RTO, and RPO assessments. Auto-tiered criticality scoring across four impact dimensions.

🛡

Incident Classification

Step-by-step classification wizard aligned with ITS reporting templates. Severity assessment and regulatory reporting stage tracking.

📋

Full Audit Trail

Every action logged with timestamp, user, entity, and value. Audit log with search, filtering, and JSON export for regulatory review.

👥

Role-Based Access

Admin, analyst, and viewer roles with session-based authentication. User management, password policies, and activity attribution.

// pricing

Simple, transparent pricing

No per-user fees. No implementation consultants. One platform, one price.

Starter
€490/mo
For smaller financial entities getting started with DORA compliance.
  • Up to 5 users
  • All 4 DORA pillars
  • 69-requirement compliance tracker
  • Risk register & heat map
  • Incident register
  • Audit trail & export
Start Free Trial
Professional
€990/mo
For mid-market institutions needing the full platform.
  • Up to 20 users
  • Everything in Starter
  • Bowtie risk visualization
  • Business Impact Analysis
  • Task & Workflow engine
  • Risk trend analytics
  • TLPT phase management
  • Priority email support
Start Free Trial
Enterprise
Custom
For large institutions with complex requirements and dedicated support.
  • Unlimited users
  • Everything in Professional
  • Multi-framework mapping
  • Custom report templates
  • Dedicated instance
  • SSO / SAML integration
  • Onboarding & training
  • SLA with named support
Contact Sales
// questions

Frequently asked questions

DORA (EU Regulation 2022/2554) is EU legislation requiring financial entities to build end-to-end digital operational resilience. It covers ICT risk management, incident reporting, resilience testing, third-party risk oversight, and information sharing. Enforcement began January 17, 2025, applying to banks, insurers, investment firms, payment institutions, crypto-asset service providers, and their critical ICT providers.

DORA applies to virtually all regulated financial entities in the EU — credit institutions, insurance and reinsurance undertakings, investment firms, payment institutions, electronic money institutions, crypto-asset service providers, and critical ICT third-party service providers (CTPPs). The regulation covers over 22,000 entities across the EU.

DORA GRC is designed for rapid deployment. The platform comes pre-loaded with all 69 regulatory requirements, framework document templates, and risk categories. Most organizations can be operational within 1–2 weeks, with ongoing configuration as their compliance programme matures. No consultants or implementation partners required.

DORA GRC is hosted on Cloudflare's global edge network with data stored in Cloudflare D1 (SQLite-based). All data is encrypted in transit (TLS 1.3) and at rest. Session tokens use PBKDF2 with 100,000 iterations. The platform includes role-based access control, complete audit trails, and session expiry. No data is shared with third parties.

Yes. DORA GRC includes a full data export function that produces a timestamped JSON snapshot of all registers — governance roles, framework state, CIF functions, risks, controls, incidents, tests, providers, contracts, review tasks, and more. The audit log is also fully exportable with user attribution for every action.

The platform is currently purpose-built for DORA compliance. Multi-framework mapping (DORA ↔ ISO 27001 ↔ NIS2) is on our roadmap. However, the risk management, control library, and audit trail capabilities align with ISO 27005 and ISO 31000 methodology, so much of the work translates directly to other frameworks.

// get in touch

Talk to us

Have questions about DORA compliance or our platform? Send us a message.

How can we help?

Whether you're evaluating the platform, need help with DORA compliance, or want a tailored demo — we're here to help.

Typical response within 24 hours

Send a message

Ready to structure your DORA compliance?

Start with a free trial — no credit card, no consultants, no setup fees.

Start Free Trial →
🍪