§ NIS2 · DORA COMPARISON

NIS2 vs DORA: which one applies to financial entities

DORA is lex specialis. NIS2 Article 4 carves financial entities out of NIS2 cybersecurity controls — but the carve-out is narrower than people think.

Summary

DORA is lex specialis for financial-entity cybersecurity. NIS2 Article 4 explicitly carves financial entities out of the NIS2 substantive cybersecurity and incident-reporting obligations where DORA covers the same ground. But the carve-out is narrower than commonly understood — DORA does not displace NIS2 entirely; it displaces NIS2 only on the matters it actually addresses.

In practice, this means a regulated financial entity follows DORA Article 6 ICT risk management instead of NIS2 Article 21, DORA Article 19 incident reporting instead of NIS2 Article 23, and DORA Article 28 third-party risk instead of NIS2's supply-chain article. But where NIS2 addresses something DORA does not — for example, certain incidents not classified as 'major ICT-related' under DORA — NIS2 may still bite.

The clean-up matters because national NIS2 authorities and financial supervisors are still aligning on which entity reports what to whom. The conservative approach: treat DORA as the primary regime, document the Article 4 lex specialis position, and maintain a watching brief on national-level guidance about edge-case incidents.

Who this applies to
Banks, investment firms, insurers, payment institutions, e-money institutions, CCPs, crypto-asset service providers, ICT third-party providers serving them, EBA, ESMA, EIOPA, national NIS2 authorities.
Compliance deadline
DORA: in force since 17 January 2025. NIS2: transposition deadline 17 October 2024; enforcement live in most Member States.
§ Key articles

What the law says

NIS2 Article 4
Sectoral acts — DORA prevails as lex specialis for financial-entity cybersecurity controls.
DORA Article 1
Subject matter — operational resilience for financial entities.
DORA Article 6
ICT risk-management framework.
DORA Article 19
Major ICT-related incident reporting.
DORA Article 28
ICT third-party risk management.
NIS2 Article 21
Cybersecurity risk-management measures (does not apply to scope-overlapping financial-entity controls).
NIS2 Article 23
Incident reporting — 24h early warning, 72h notification.
§ Detail

In depth

How NIS2 Article 4 actually works

NIS2 Article 4 is the lex specialis clause: where a sector-specific act imposes "at least equivalent" cybersecurity obligations, the sector act prevails. For financial entities, DORA is that sector act. The Commission has confirmed (in the explanatory memoranda and in EBA/ESMA/EIOPA joint guidance) that DORA Article 5–15 framework, Article 19 incident reporting, and Article 28 third-party risk are the equivalent provisions that displace NIS2 Articles 21 and 23.

What does not get displaced:

Side-by-side

DimensionNIS2DORA
Substantive controlsArticle 21 cybersecurity risk-management measures.Article 6 ICT risk-management framework + 24–26 testing.
Incident reporting24h early warning, 72h notification, 1-month final.4h initial after classification as major, 72h intermediate, 1-month final (per RTS).
Third-party riskArticle 21(2)(d) supply-chain controls.Article 28 + Article 30 contractual minima + Article 31 CTPP designation.
Maximum fineEUR 10M / 2% (essential entities); EUR 7M / 1.4% (important).National administrative penalties + ESA periodic penalty payments for CTPPs.
Lex specialisYields to DORA where the same matter is regulated.Prevails on covered matters per NIS2 Art 4.

What financial entities should report where

The CTPP and NIS2 question

An ICT third-party provider designated as a CTPP under DORA Article 31 is supervised at EU level by one of the ESAs. If that CTPP is also in scope of NIS2 (most major cloud and AI providers are), it remains an NIS2 entity for everything outside the DORA-covered scope. For example, a cloud provider's own corporate IT may be NIS2-governed while its services to financial entities are DORA-governed.

Practical compliance

§ Action items

Practical steps

01
Document the NIS2 Article 4 lex specialis position in writing for the entity's covered functions.
02
Maintain NIS2 registration even where DORA displaces the substantive controls.
03
Build an incident-classification matrix: event → regime → authority → clock.
04
Track national NIS2 authority guidance — the practical scope of the lex specialis differs in Member-State transposition.
05
Run parallel DORA Article 28 register and NIS2 supply-chain documentation for ICT third parties.
§ What Fontvera found

Documents in our corpus

ai_office EU Fetched 2026-04
ai_office EU Fetched 2026-04
ai_office EU Fetched 2026-04
§ Cross-references

Related Fontvera intelligence

Need a cross-border briefing on this?
Search Fontvera ↵ Run the AI Act diagnostic
AI Act enforcement
97 days
until 2026-08-02, when most AI Act provisions begin to apply.