There’s An Easier Way to Meet DORA ICT Third-Party Risk Requirements

Learn how continuous runtime monitoring simplifies DORA Chapter V compliance for banks, insurers, and other FSIs.

There’s An Easier Way to Meet DORA ICT Third-Party Risk Requirements

Joe Silva By Joe Silva Published on

Embedding third-party risk management into an ICT risk framework (as required by DORA Chapter 5 “Managing ICT Third-Party Risk”) is no small task. In one survey, 34% of EMEA financial services respondents named it the single most challenging DORA requirement, making it the top compliance hurdle overall.

The good news is that solutions now exist to make this process far more manageable.

Third-party risk management solutions, such as Spektion, help DORA-covered entities replace or augment periodic, labor-intensive risk monitoring with a real-time view of third-party risk from all their installed software.

In this article, we’ll show you the DORA third-party risk management options that firms like banks, insurance companies, payment providers, and other FSI companies have. Plus, why more financial institutions are using runtime visibility technology to assess and manage their third-party risks.

DORA-Governed Organizations Have Two Options for Third-Party Risk Management

The Digital Operational Resilience Act (DORA) came into effect on January 17, 2025, and applies to entities providing financial services in the European Union.

Since then, all covered entities (as defined in Article 2 and certain ICT third-party providers) must comply, to some extent, with the ICT third-party risk management requirements outlined in Chapter V (Articles 28–44).

DORA Chapter V outlines the procedures for assessing contracts, tracking ICT asset concentration, evaluating risks in new deployments, and reporting to regulators, among other obligations.

Currently, there are two potential paths to meet this requirement for understanding third-party risk.

Option 1 - Static DORA compliance

One way to approach third-party risk management is to treat it as a series of fixed checkpoints: SBOMs at onboarding and major releases, scheduled questionnaires, and occasional scans.

While this approach can satisfy requirements on paper, it has two major drawbacks:
a) gaps between “checkpoints” (e.g., when new software versions are released), and
b) high costs and labor demands, making it difficult to scale.

Option 2 - Continuous DORA compliance and third-party risk monitoring

Another, more efficient approach to third-party risk management is to adopt continuous monitoring of all installed software, giving DORA-governed FSI teams a live, always-current view of third-party software risk.

This approach utilizes runtime detection software, such as Spektion, to identify new versions and swapped components upon their release, so SBOM visibility stays accurate and no gaps form between review cycles.

Because the risk inventory and behavior context update in real time, there’s no need to rerun periodic, labor-intensive assessments to stay current.

Another significant DORA compliance advantage from a continuous approach is the evidence collected. As events happen, runtime evidence is automatically tied to vendors, assets, and timestamps, which makes period-wide proof simple to produce.

Findings flow into prioritized queues with clear next actions/configuration changes, compensating controls, or detections routed to SIEM/EDR. This shifts DORA from a static, snapshot-driven exercise into a real-time practice where visibility, mitigations, and reporting are always on.

The result: a far less labor-intensive and much more cost-effective way to manage third-party risk.

Live Software Visibility Is The Simple, Safe, and Scalable Solution For DORA Third-Party Risk Management

With the insights Spektion provides, financial entities can:

  • Tier risk proportionately (DORA Art. 28).
  • Identify concentration and subcontracting exposure (Art. 29).
  • Write, test, and police audits, SLA, location, incident, and exit clauses your contracts must contain (Art. 30).

Spektion’s Runtime Vulnerability Management (RVM) delivers runtime risk visibility that goes beyond CVEs—surfacing threats as they emerge in software behavior, not just after disclosure. It builds behavior baselines for software across your estate, including third-party and OEM tools that often fall outside traditional CMDBs or scanner coverage, or are only checked periodically.

Spektion dashboard showing third-party risk evidence

With Spektion, a DORA-covered entity can immediately discover all its installed software and:

  1. Produce and review live evidence trails that show what third-party software does before entering into a contract with a vendor.
  2. Create up-to-date asset/software inventories by finding shadow IT, unused tools, and unmanaged applications.
  3. Identify dependencies and plan transitions using real usage and risk data, rather than estimates, to minimize disruptions.
  4. Generate rich reports from security incidents to satisfy regular reporting requirements.
  5. Demonstrate (and use) an effective risk management strategy for software that cannot be patched or replaced easily.

These capabilities directly align with the ICT third-party risk requirements outlined in DORA Chapter V. The table below maps them, along with other DORA Article 28 requirements, to Spektion’s capabilities.

DORA Chapter V reference & requirementWhat auditors expect to seeWhat Spektion gives you
28(1) Responsibility & proportionalityRisk-tiering of third-party apps tied to control strength and review cadenceRisk understanding of all installed software based on runtime behavior + mapped control set and mitigation options
28(3) Contract register & yearly reportingUp-to-date register of all ICT contracts split by critical/important; supervisor report/exportLive software & service register from runtime discovery
28(4) Pre-contract checks & due diligenceDue diligence memo before signing; risk assessment, including concentration; conflicts logReal risk assessment of live software during POC before deployment beyond SBOM data
28(5) Security standards fitEvidence that a provider meets current security standards; cross-check of claimsActual evidence of secure or insecure software behavior.
28(6) Audit & inspection planRisk-based audit plan with frequency/scope; competent auditor capabilityAudit planner driven by actual risk observed during deployment
28(7) Termination triggersContractual trigger list tied to objective indicators; change logsChange-of-risk alerts, which show adherence to the contract or drift
28(8) Exit & transitionTested exit plan; transition records; data return stepsReal dependency map based on software interactions

DORA also mandates “appropriate” annual testing.

In most cases, Spektion’s runtime vulnerability management capabilities can significantly contribute to meeting this compliance requirement.

Where regulators demand further testing, such as a DORA-specified Threat-Led Penetration Test (TLPT), Spektion can enhance visibility and improve reporting by providing an added layer of runtime risk scoring.

See ALL Your Installed Software Risks (Including Third-Party Software)

The core advantage of runtime vulnerability management is its ability to show you risk across your environment without relying on CVEs.

While traditional vulnerability management solutions scan for applications and compare signatures to a database of known exploit risks, Spektion observes real-time application behavior to score the exploitability of software in your actual environment.

Here’s how Spektion works:

  1. A passive, lightweight agent observes live software behavior at runtime.
  2. New insecure behavior is flagged based on a proven and transparent runtime scoring system to indicate exploitability even without a CVE.
  3. Risks are presented and prioritized by runtime context and enriched where CVSS/Intel exists to produce a runtime risk score.
  4. You get actionable next steps that go beyond patching, such as configuration hardening, control-based mitigations, or detection rules for your SIEM/EDR.

Spektion overview dashboard of third-party risk at runtime

With Spektion, FSI companies can see risk at the macro level (i.e., throughout their environment, like the screenshot above) or examine the risk behavior of individual software assets with detailed logs and MITRE ATT&CK mappings.

Spektion Is A Continuous DORA Third-Party Risk Management Solution

Meeting DORA third-party risk management requirements is easier when you have visibility into the actual behaviour of third-party software running in your environment.

Spektion deploys in minutes and integrates with your existing security stack.

It gives you a real-time view of risk scores, mitigations, and reporting pathways to make DORA compliance far less stressful and costly than it otherwise would be.

Book a personalized Spektion demo, and we’ll walk you through exactly how it fits into your DORA third-party risk management workflow.