DORA: New requirements for ICT security in finance – here's what you need to know

Henrik Skalmerud

May 23, 2025

The finance sector is increasingly dependent on digital systems and external IT providers. When something fails – whether due to technical error, cyber attack, or human error – the consequences can be significant. Therefore, the EU has introduced the DORA regulation (Digital Operational Resilience Act), which aims to strengthen digital resilience across the financial industry. DORA sets requirements for how businesses plan, prevent, detect, handle, and learn from ICT-related incidents. The goal is to ensure continuity, protect customer data, and reduce the risk of operational disruptions in a sector that is critical to society.

The regulation applies from January 2025 and includes banks, insurance companies, fund managers, payment institutions – and also many of their ICT providers. For many businesses, this means stricter requirements for oversight, documentation, and access control. It's not just about having good systems, but being able to show that you have control through insight into your own data.

How Bsure helps businesses meet the requirements

Bsure connects to Microsoft Entra ID and provides an updated and user-friendly overview of that part of your IT environment. Several of our features directly support the requirements in DORA's articles on ICT risk management, access control, and third-party management.

1. Users and access

DORA requirement: Access management should be based on the principles of least access and documented control.

  • Who has access to your systems

  • Users without enabled multi-factor authentication (MFA)

  • Inactive or outdated accounts

  • Guest users and external access

  • Users with administrative rights

  • Service accounts and applications – including what rights they have and where they log in from

Many think they have good control over user access and MFA because the policy states that all new accounts should have MFA, but often don't consider that the old on-prem AD is often synchronized up to the cloud – with old accounts, unused groups, and service accounts created before this policy came into effect. How do you catch that? It creates an unclear and vulnerable starting point.

2. Applications and license usage

DORA requirement: Businesses must have an overview of system usage and ensure that ICT resources are used in a controlled manner.

  • Which applications are in use

  • Who uses them – and how

  • Misused or unused licenses

Many businesses have far more applications integrated into Entra ID than they think – including third-party apps that employees have added themselves with their own rights. It is often unclear what data these apps have access to – or who actually uses them and where data is processed.

3. Devices

DORA requirement: All devices connected to the business's network should be monitored and controlled as part of ICT risk management.

  • Which devices are in use and who uses them

  • Operating systems and last usage time

  • Outdated or potentially vulnerable devices

Devices that have once connected to Entra ID often remain as "active" in the overview – even if they haven't been used for many months. This gives a false picture of the security status and can hide real vulnerabilities.

4. Documentation and follow-up

DORA requirement: Risk management and security measures should be documented and verifiable.

  • Document access management and security status

  • Identify and follow up on risks

  • Share relevant insights with management, audit, and supervisory authorities

It is easy to assume that documentation is in place as long as the measures are "described," but often the link to actual implementation and ongoing follow-up is missing. Without continuous insight and verification, security work becomes difficult to verify.

What Bsure covers – and what you still need to solve yourself

Bsure Insights is a practical solution for gaining control at the user, device, and application level, which is an important part of DORA. But to comply with the entire regulation, other measures and systems are also required. Here are some areas where you still need to supplement:

  • Incident reporting to authorities (requires own reporting systems and routines)

  • Testing of operational resilience (e.g., penetration tests from approved actors)

  • Continuity plans and recovery (backup, failover, crisis plans, etc.)

  • Management of contracts and agreements with ICT providers (e.g., SLAs, contract content)

  • Secure sharing of threat information (platforms for collaboration between actors)

DORA is a comprehensive regulation, but it doesn't have to be complicated to get started. Bsure helps you with the basics: gaining insight, cleaning up, and reducing risk in your business's digital infrastructure – in a practical and efficient way.

How Bsure supports specific requirements in DORA

Bsure contributes to compliance with several of the requirements in DORA, including these articles:

  • Articles 5–15: ICT risk management - Bsure provides ongoing insight into user access, inactive accounts, and devices - Contributes to monitoring and documentation of critical components

  • Article 16: Reporting of ICT incidents - Bsure provides basic data for identifying and following up on incidents

  • Articles 23–30: Third-party risk - Bsure provides insight into applications and associated rights from external parties

  • Articles 6 and 9: Access control and documentation - Bsure helps identify weaknesses in access management and provides a basis for audit and supervision

In summary – what Bsure covers and doesn't cover

Bsure helps you with:

  • Overview of users, access, roles, and MFA status

  • Insight into active and inactive devices

  • Applications and integrations connected to the business's Entra ID

  • Documentation of security status and improvement areas

  • Identifying risks related to old accounts and shadow IT

You still need to solve with other measures:

  • Reporting of serious ICT incidents to authorities

  • Crisis and continuity plans with backup and failover

  • Advanced penetration testing and technical resilience testing

  • Detailed contract and supplier follow-up

  • Sharing of threat information between businesses


© 2025 Bsure AS All Rights Reserved.

Contact us

Bsure AS

Torvveien 19



1383 Asker

Norway

+47 64 80 82 22

ID: 929 419 766

Contact us

Bsure AS

Torvveien 19



1383 Asker

Norway

+47 64 80 82 22

ID: 929 419 766

2025 Bsure AS All Rights Reserved.

© 2025 Bsure AS All Rights Reserved.

Contact us

Bsure AS

Torvveien 19



1383 Asker

Norway

+47 64 80 82 22

ID: 929 419 766