§ DORA BRIEFING

DORA Article 9 — ICT Risk Protection and Prevention for Financial Entities

The Article 9 controls every DORA-scope financial entity must run continuously.

Summary

DORA Article 9 is the protection-and-prevention pillar of the ICT risk-management framework for financial entities. It is continuous: every row uses continuous tense — monitor, deploy, design and procure and implement, maintain, use, minimise, prevent. Annual reviews and one-off purchases do not satisfy it.

The article fixes four data properties — availability, authenticity, integrity, confidentiality — and three data states — at rest, in use, in transit. An entity that protects data at rest but not in use is not Article 9-compliant. Article 9 should be read together with Article 4: the proportionality principle in Article 4 calibrates "appropriate" in Article 9 to entity size and risk.

Who this applies to
Financial entities in scope of DORA — banks, investment firms, insurers, crypto-asset service providers, and others — applying the protection-and-prevention pillar of the ICT risk-management framework.
Compliance deadline
None
§ Detail

In depth

DORA Article 9 (Regulation (EU) 2022/2554) sets out the protection-and-prevention pillar of the ICT risk-management framework that financial entities must run. It binds "financial entities" — banks, investment firms, insurers, crypto-asset service providers, and the rest of the DORA scope. The obligation rows do not record a separate deadline; DORA has applied since 17 January 2025, and Article 9 has applied alongside the rest.

What Article 9 requires

The article moves from continuous monitoring to specific data-state protections to risk-minimising solution selection. There is no single "do this once" duty in Article 9 — every row is continuous.

Obligation breakdown

Continuous monitoring of ICT systems

"Financial entities shall continuously monitor and control the security and functioning of ICT systems and tools." The action verb is monitor, and "continuously" is doing real work — point-in-time annual reviews do not satisfy this row.

Minimise ICT risk impact

"Financial entities shall minimise the impact of ICT risk on ICT systems through the deployment of appropriate ICT security tools, policies and procedures." The verb is deploy: tools, policies and procedures, all three. A policy without tooling — or tooling without procedure — is a partial deployment.

Implement resilience policies

"Financial entities shall design, procure and implement ICT security policies, procedures, protocols and tools that aim to ensure the resilience, continuity and availability of ICT systems." Three lifecycle steps are named: design, procure, implement. Buying alone is not implementation.

Maintain availability, authenticity, integrity, confidentiality

"Financial entities shall maintain high standards of availability, authenticity, integrity and confidentiality of data, whether at rest, in use or in transit." Three data states are explicitly listed; an entity that protects data at rest but not in use is not Article 9-compliant.

Secure transfer of data

"Financial entities shall use ICT solutions and processes that are appropriate in accordance with Article 4 to ensure the security of the means of transfer of data." Article 4 carries the proportionality principle into Article 9: "appropriate" is calibrated to the entity's size and risk profile, not absolute.

Minimise corruption, loss, unauthorised access

"Financial entities shall use ICT solutions and processes that minimise the risk of corruption or loss of data, unauthorised access and technical flaws that may hinder business activity." Three risk categories are listed cumulatively; the row does not let an entity trade off one against another.

Prevent unavailability and confidentiality breach

"Financial entities shall use ICT solutions and processes that prevent the lack of availability, the impairment of the authenticity and integrity, the breaches of confidentiality and the loss of data." This is the closing prevention clause — the same four data properties as the maintenance row, restated as a prevention duty.

What this means in practice

The seven rows interlock. Continuous monitoring (row 1) feeds the risk-minimisation deployment (row 2); the deployment is then framed by resilience policies (row 3) and tested against the four data properties (rows 4 and 7). Articles 4 and 9 should be read together — Article 4 sets the proportionality lens through which "appropriate" in Article 9 is judged. For overlap with the AI Act: where a financial entity also deploys a high-risk AI system, AI Act Article 17 (provider QMS) and DORA Article 9 (operational ICT-risk controls) sit in different directions, but a credit-scoring deployment touches both.

Related Fontvera pages

§ What Fontvera found

Documents in our corpus

enisa EU Fetched 2026-04
§ Cross-references

Related Fontvera intelligence

Need a cross-border briefing on this?
Search Fontvera ↵ Run the AI Act diagnostic
AI Act enforcement
90 days
until 2026-08-02, when most AI Act provisions begin to apply.