
As of 17 January 2025, the EU's Digital Operational Resilience Act (DORA) is fully enforceable. For banks, insurers, investment firms, payment processors, and hundreds of other financial entities operating in the EU, the era of self-certification on digital resilience is over.
DORA introduces binding, specific requirements for ICT risk management, incident classification and reporting, digital operational resilience testing, and third-party risk management. Non-compliance exposes firms to supervisory action, significant fines, and β critically β personal liability for senior management.
Dark web monitoring is not mentioned by name in DORA. But when you read what DORA actually requires, it becomes clear that continuous dark web threat intelligence is one of the most direct technical controls available to meet the regulation's core obligations.
This guide explains exactly how.
What Is DORA and Who Does It Apply To?
The Digital Operational Resilience Act (Regulation EU 2022/2554) establishes a unified framework for digital operational resilience across the EU financial sector. Unlike a directive (which must be transposed into national law), DORA is a regulation β it applies directly and uniformly across all EU member states.
DORA applies to:
- Credit institutions (banks)
- Payment institutions and e-money institutions
- Investment firms
- Crypto-asset service providers (CASPs)
- Insurance and reinsurance undertakings
- Pension funds and asset managers
- Credit rating agencies
- Audit firms
- ICT third-party service providers designated as "critical" by regulators
If your organisation provides services to any of the above, you may also be subject to DORA requirements either directly or through contractual obligations imposed by your clients.
DORA's Five Pillars and Where Dark Web Monitoring Fits
Pillar 1: ICT Risk Management (Articles 5β16)
DORA requires financial entities to implement a comprehensive ICT risk management framework that includes:
- Continuous identification of all ICT-related risks
- Protection and prevention measures proportionate to identified risks
- Detection capabilities to identify anomalous activities
- Response and recovery procedures with defined RPOs and RTOs
- Learning and evolving β updating threat assessments based on new intelligence
Dark web monitoring supports this pillar directly. The regulation requires firms to implement processes for detecting ICT-related incidents, including "anomalous ICT activities." Credentials appearing on dark web markets, threat actors discussing your firm's infrastructure, or stealer logs revealing compromised employee sessions are exactly the type of pre-incident signals that DORA's detection requirements are designed to catch.
Under Article 10, firms must have the capability to detect anomalous activities "as rapidly as possible." Real-time dark web monitoring β with alerts firing within minutes of a new finding β is one of the few technical controls that gives you this capability for externally-sourced threats.
Pillar 2: ICT-Related Incident Management, Classification and Reporting (Articles 17β23)
This is where DORA gets operationally demanding. Firms must:
- Classify incidents as "major" or non-major using DORA's defined criteria
- Report major incidents to competent authorities within tight timeframes
- Issue initial notifications within 4 hours of classification, intermediate reports within 72 hours, and final reports within 1 month
The classification criteria include factors like the number of clients affected, data criticality, service disruption duration, and reputational damage. A credential breach that gives attackers access to client accounts would almost certainly qualify as a major incident.
Dark web monitoring supports early incident classification. Discovering that employee credentials are actively being sold on a dark web forum β before any system access is detected β gives your incident response team early warning to investigate, classify, and prepare reporting before a full-blown breach occurs.
The 4-hour reporting clock starts at classification, not discovery. Earlier discovery means better-prepared reporting.
Pillar 3: Digital Operational Resilience Testing (Articles 24β27)
DORA requires regular testing of digital operational resilience, including vulnerability assessments, penetration tests, and β for significant entities β advanced Threat-Led Penetration Testing (TLPT).
TLPT is a structured threat intelligence-based approach (based on the TIBER-EU framework) where the threat intelligence phase involves researching what real threat actors know about and are actively targeting in your organisation.
Dark web monitoring provides the intelligence layer for TLPT. Understanding what credentials, documents, and infrastructure information about your firm is currently available on the dark web is a foundational input to the Targeted Threat Intelligence (TTI) component of any TIBER/TLPT exercise.
Pillar 4: ICT Third-Party Risk Management (Articles 28β44)
DORA places significant obligations on how financial firms manage relationships with ICT third-party providers. Firms must:
Is your company exposed on the dark web right now?
Scan dark web forums, breach dumps, stealer logs & 50,000+ threat sources. Results in seconds, completely free.
- Maintain a complete register of all ICT contractual arrangements
- Conduct due diligence on new and existing ICT providers
- Include specific contractual provisions covering data access, security standards, audit rights, and incident notification
- Monitor and assess ICT third-party risk on an ongoing basis
Supply chain exposure is a dark web monitoring use case. When a vendor or ICT service provider your firm relies on appears in a breach, credential leak, or dark web forum discussion, that's a third-party risk event that DORA requires you to assess and respond to.
DarkVault monitors third-party and supply chain exposures β alerting you when a firm you depend on surfaces in a dark web leak, before that exposure becomes your problem.
Pillar 5: Information Sharing Arrangements (Article 45)
DORA encourages financial entities to participate in threat intelligence sharing arrangements. Firms that participate in ISACs (Information Sharing and Analysis Centers) or sector-specific intelligence communities benefit from broader threat awareness and may receive preferential treatment from supervisors.
Operationalised threat intelligence from dark web monitoring feeds directly into information sharing programmes. The specific, contextual intelligence from dark web sources β new campaigns, credential leaks, threat actor discussions β is exactly what information sharing communities are designed to exchange.
DORA's Threat Intelligence Requirements: Reading Between the Lines
Article 13 of DORA specifically requires financial entities to have processes for:
"Collecting information on vulnerabilities and cyber threats, and analysing them to understand how they may affect the ICT systems of the financial entity."
This is as close to a direct dark web monitoring requirement as regulatory language gets without naming a specific technology. The dark web is where vulnerabilities in your systems are discussed, where credentials extracted from those systems are sold, and where threat actors announce their intentions.
A firm that monitors only its internal telemetry and ignores externally available threat intelligence is not fulfilling this requirement.
Practical DORA Compliance with DarkVault
Here's how DarkVault maps to DORA's technical requirements:
| DORA Requirement | DarkVault Capability |
|---|---|
| Continuous ICT risk identification | Real-time monitoring of 10,000+ sources |
| Anomalous activity detection | Instant alerts on new credential leaks and threat actor activity |
| Early incident classification inputs | Pre-breach signals from dark web before system access is detected |
| Third-party risk monitoring | Supply chain exposure monitoring |
| TLPT threat intelligence input | Dark web search across 2.8B+ indexed records |
| Evidence of proactive threat monitoring | Automated weekly intelligence reports suitable for regulatory evidence |
What Supervisors Will Look For
European financial supervisors (ECB, EBA, national competent authorities) conducting DORA inspections will examine evidence that firms have:
- Implemented continuous ICT risk monitoring processes
- Can demonstrate early detection of cyber threats
- Have documented third-party risk assessments
- Conduct regular operational resilience testing informed by current threat intelligence
Dark web monitoring reports, alert logs, and documented response procedures provide exactly this type of evidence. Firms with well-documented monitoring programmes are significantly better positioned in supervisory reviews.
Getting Started: Your DORA Dark Web Monitoring Checklist
Before your next supervisory review, confirm you have:
- β Continuous monitoring of dark web credential markets and forums
- β Stealer log detection for employee device compromise
- β Real-time alerts with documented response procedures
- β Third-party and supply chain monitoring coverage
- β Automated reporting for evidence and board-level visibility
- β Integration with your incident management workflow
See your current dark web exposure in 60 seconds. Run a free domain scan β no registration required β to understand your baseline before your next DORA assessment. Then start a 14-day trial with full platform access to build the continuous monitoring capability DORA requires.
Frequently Asked Questions
Is DORA already in effect? Yes. DORA became fully enforceable on 17 January 2025. All in-scope financial entities should already have their compliance programmes operational.
Does DORA require dark web monitoring specifically? Not by name. But DORA's requirements for continuous ICT risk identification, anomalous activity detection, and threat intelligence collection are most comprehensively met through dark web monitoring as a core technical control.
Who enforces DORA? National competent authorities (NCAs) of each EU member state, the European Central Bank (for significant credit institutions), and for critical ICT third-party providers, joint oversight teams comprising the ESAs (EBA, ESMA, EIOPA).
What are DORA's penalties for non-compliance? For financial entities, NCAs can impose supervisory measures, require specific remediation steps, and β for repeated failures β financial penalties. For critical ICT third-party providers, the Oversight Framework can impose periodic penalty payments of up to 1% of average daily worldwide turnover.
Is your company exposed on the dark web right now?
Scan dark web forums, breach dumps, stealer logs & 50,000+ threat sources. Results in seconds, completely free.
Get Your Free Dark Web Exposure Report
Find exposed credentials, mentions, and risky chatter tied to your brand β fast.
- Email & domain exposure insights
- Threat actors & forums mentioning your brand
- Practical next steps to mitigate risk
No credit card required. Quick turnaround. Trusted by security teams worldwide.

Related Articles

Remote Work and Dark Web Exposure β Protecting Distributed Teams
Remote work tripled your attack surface. Learn how to detect credential theft on the dark web and protect distributed teams from VPN and email compromise.
Read more
PCI DSS and Dark Web Monitoring β What Merchants and Payment Processors Must Know
PCI DSS v4.0 makes dark web monitoring essential for payment security. Learn how threat intelligence addresses compliance requirements and protects cardholde...
Read more
What to Do When Your Company Data Appears on the Dark Web
You just received an alert: your company's data is on the dark web. Here's exactly what to do in the next 72 hours to contain the breach, meet regulatory dea...
Read more