Cookies Notice
This site uses cookies to deliver services and to analyze traffic.
📣 Guardian Agent: Guard AI-generated code
Most engineering leaders hear “DORA” and think deployment frequency and lead time, but the EU’s Digital Operational Resilience Act (DORA) carries far higher stakes than a DevOps scorecard.
The EU DORA regulation (Regulation (EU) 2022/2554) took effect in January 2025. It requires financial entities to prove they can withstand and recover from ICT disruptions. In it, board members are personally liable, reporting timelines are measured in hours, and third-party providers fall under the same accountability umbrella.
For security and risk teams, this changes the operating model. Speed metrics alone no longer signal engineering health. Regulators want to see resilience, including asset inventories, incident detection capabilities, tested recovery plans, and full supply chain visibility. Teams that treat compliance as a one-time audit are already behind.
Under EU DORA, resilience is measured across five structured pillars. Explore how traditional software delivery performance metrics miss critical signals and how security and risk leaders adapt accordingly.
Let’s start by establishing there are two DORAs in the industry, and the naming convention causes real confusion.
The first is DevOps Research and Assessment (DORA), a set of DORA metrics that measure engineering maturity, including:
Teams use these to benchmark how fast and how reliably they ship code.
The second is the EU regulations, a legally binding regulation that evaluates whether financial entities can survive operational disruption and prove it to regulators.
While they share an acronym, they share almost nothing else in common.
The EU regulation requires demonstrating asset inventory completeness, incident detection and classification capabilities, tested recovery processes with defined time objectives, documented third-party risk management, and supply chain transparency down to the component level.
A team can score “Elite” on every DevOps DORA KPI and still be dangerously exposed under the EU regulation. High deployment frequency tells you nothing about whether those deployments carry unpatched vulnerabilities, bypass security controls, or introduce ungoverned third-party dependencies.
That’s because the EU regulation forces a harder question: are the changes you’re shipping actually safe?
The EU DORA framework is built on five pillars. Together, they define what regulators expect from financial entities when it comes to ICT resilience. Each one carries specific obligations that touch security, risk, and engineering teams directly.
The regulation puts ICT risk management at the board level. Under Article 5, senior leadership is personally liable for overseeing the framework.
Entities must maintain a detailed inventory of all ICT assets, map dependencies across systems, and identify critical functions whose failure could threaten business viability.
The framework requires annual review and immediate updates after major incidents.
DORA harmonizes incident reporting across the EU with strict timelines.
Initial notification must happen within four hours of classification. An intermediate report follows within 72 hours. A final report with root cause analysis is due within one month.
The regulation also introduces “significant cyber threats” as a reportable category, covering threats that haven’t materialized yet.
All financial entities must run annual testing programs on critical systems, including vulnerability assessments, open-source code analysis, and scenario-based simulations.
Significant institutions face a higher bar: Threat-Led Penetration Testing (TLPT), conducted by independent external testers following real-world attack scenarios.
Financial entities are legally liable for the resilience of their outsourced services under Article 28. The regulation requires a “Register of Information” cataloging all third-party contractual arrangements.
It also pushes organizations toward maintaining Software Bills of Materials (SBOMs) for full supply chain transparency.
The fifth pillar encourages financial entities to share threat intelligence and Indicators of Compromise (IoCs) within trusted communities.
The goal is reducing mean time to detect (MTTD) and time to remediate across the sector, building collective defense against systemic attacks.
DevOps DORA software metrics were designed to measure delivery performance. They do that well. What they don’t measure is whether the code being delivered is safe.
A team shipping multiple deployments per day with a low change failure rate looks healthy on paper. But those deployments might carry unpatched vulnerabilities, expose sensitive data through new APIs, or introduce ungoverned dependencies. The metrics won’t flag any of it.
There’s also a gaming problem. Developers can inflate deployment frequency by splitting a single feature into micro-deployments. The numbers go up, but actual resilience doesn’t.
Under EU DORA, regulators care about the integrity of what’s being shipped. That means engineering teams need qualitative signals alongside their velocity metrics, including:
These are the DORA KPIs that connect delivery performance to operational resilience, and the ones regulators increasingly expect to see evidence of.
Related Content: What is Application Vulnerability Correlation
“DORA compliant” is not a status you achieve and move on from. The regulation requires continuous, demonstrable resilience. An annual audit pass is the floor, not the finish line.
The regulation applies a proportionality principle. A global investment bank faces different expectations than a small crowdfunding platform. But no entity is exempt from the core requirements. Every financial entity must establish impact tolerance levels for ICT disruptions, maintain documented recovery objectives, and prove that processes exist for managing risk.
The gap shows up when teams treat metrics as proof of health without examining what’s behind them. A clean change failure rate means nothing if the changes being shipped carry unpatched vulnerabilities or bypass security controls. Low lead time is meaningless if there’s no audit trail connecting a code change to its approval, testing, and deployment.
Articles 9 and 17 make this concrete:
Engineering health under DORA means your delivery process produces safe, traceable, recoverable changes by default.
Metrics improve what they measure. The problem is when teams optimize for the number instead of the outcome. Deployment frequency goes up, but the deployments aren’t meaningful. Lead time drops, but code review gets skipped.
The EU DORA regulation provides a forcing function here. When regulators require audit trails, tested recovery plans, and documented change management, gaming the metrics becomes a liability.
Every risk, every component, and every remediation path needs a responsible owner. The regulation demands this at the board level through Pillar 1. Engineering teams need it at the repo level.
When ownership is clear and processes are automated, compliance becomes a byproduct of how you already work. Day-to-day engineering improvements directly strengthen the evidence you present during annual regulatory review.
Meeting EU DORA requirements means connecting delivery performance to actual risk. Most security tooling doesn’t do this well. SAST, DAST, and SCA tools generate findings in isolation, without the architectural context needed to determine what actually matters.
Application Security Posture Management (ASPM) platforms close this gap by correlating findings across the stack with real-time visibility into your software architecture. For teams operating under the DORA framework, three capabilities matter most:
The evolution of AppSec in the AI era is pushing teams toward this model. When risk context is embedded into the development process, compliance becomes a continuous outcome of how you build, not a quarterly exercise that slows everything down.
The EU DORA regulation raises the bar for what “healthy engineering” looks like in financial services. Delivery speed still matters, but regulators now expect proof that speed comes with resilience: asset visibility, incident readiness, tested recovery, supply chain accountability, and continuous risk management.
The teams that will operate well under this regulation are the ones that stop treating compliance as a separate workstream. When material change detection, risk-based prioritization, and code-to-runtime context are built into the development process, compliance evidence generates itself. Security debt gets managed in real time. And regulatory reviews become a confirmation of what you’re already doing, not a scramble to produce documentation.
Apiiro gives security and risk teams the architectural visibility and risk context needed to align engineering velocity with EU DORA requirements. From automated material change detection to full software architecture mapping, it connects delivery performance to the resilience outcomes regulators expect.
DevOps DORA metrics like Deployment Frequency and Lead Time are not named in the EU regulation. But they serve as practical evidence for compliance. Article 9 requires documented change management audit trails, and Article 17 requires demonstrable recovery capabilities. Teams use engineering metrics as early indicators that their systems can deliver the safe, stable changes the regulation demands.
Yes. The regulation applies a proportionality principle, offering a simplified ICT risk management framework for smaller entities. Small teams should focus on automating baseline measurements like system uptime and incident classification. Compliance for smaller firms is about proving that a defined process exists for managing risks and incidents, not replicating the infrastructure of a global bank.
Under the EU regulation, mean time to detect becomes a critical compliance metric. The four-hour reporting window for major incidents requires near-instant detection and automated classification workflows. High change failure rates are often flagged by regulators as evidence of quality control gaps in the deployment pipeline, which can trigger more frequent audits.
Organizations typically use a layered approach. ASPM tools track material changes and risk propagation at the code level. GRC platforms manage policy registries and third-party risk assessments. Observability platforms and incident management tools handle the stability and recovery metrics required under Pillar 2’s reporting mandates.
The regulation mandates an annual review of the ICT risk management framework, with immediate updates required after major incidents or significant infrastructure changes. From an engineering perspective, teams should review delivery and security metrics every sprint. This creates a continuous compliance loop where day-to-day improvements directly strengthen annual regulatory evidence.