DORA Microenterprise Requirements: Everything You Need to Know

DORA Microenterprise Requirements

Microenterprises are in scope of the Digital Operational Resilience Act (DORA), but they benefit from reduced requirements in many areas of DORA and are excluded altogether from others. 

This is thanks to DORA’s “principle of proportionality.” DORA tries to avoid putting disproportionately high burdens on smaller entities while still ensuring a baseline of cyber maturity across the entire EU financial sector.

The rest of this blog post lists the (lighter touch) DORA requirements that apply to microenterprises. We also show you which requirements do not apply to microenterprises at all. 


How Does DORA Define “Microenterprise”? 

DORA defines a “microenterprise” as:

“A financial entity, other than a trading venue, a central counterparty, a trade repository or a central securities depository, which employs fewer than 10 persons and has an annual turnover and/or annual balance sheet total that does not exceed EUR 2 million.” 


DORA’s Proportionality Principle

DORA tries to consider an organisation's size and management structure. Its authors know that smaller entities are likely to struggle to meet requirements designed for enterprises. 

For example, in a 10-person IT team where 2-3 people are in management, it is impossible to keep ICT risk management independent of other roles. Smaller companies will have a lot more shared responsibilities than larger organisations.

The same goes for technology. A smaller organisation's technology stack is more concentrated. Critical functions will be harder to isolate from the rest of the environment. Comprehensive testing of critical functions effectively means testing everything in these cases.

That’s why DORA adopts the “principle of proportionality.”

So long as organisations cover DORA fundamentals at a level adequate for their particular risk profile, they can be DORA compliant.

For example, microenterprises are completely exempt from certain DORA requirements like advanced threat-led penetration testing (Article 26) and formal yearly internal ICT audits (Article 6(6)). 

Where DORA exempts microenterprises from particular obligations, it usually does so by stating “financial entities, other than microenterprises, shall …” or by placing microenterprises (alongside certain other small entities) into a separate simplified framework (Article 16).

Ultimately, DORA (in some cases) is designed to protect small organisations from overly onerous security burdens while giving them the push needed to do better at securing their environments.


Microenterprises Are Excluded from The Following Requirements 

The following DORA requirements do not apply to microenterprises. 

Here’s a quick table summary (with more details below). 

DORA Microenterprise Requirements- Everything You Need to Know_Chart

ICT risk management 

Article 5. Governance and organisation

Microenterprises are exempt from the requirement of having someone in their organisation (or assigning a senior manager) to oversee ICT third-party arrangements, specifically to oversee the related risk exposure and relevant documentation. Article 5(3). 

Article 6. ICT risk management framework 

Microenterprises are exempt from the requirement to:

Article 8. Identification 

Microenterprises are not required to:

Article 11. Response and recovery 

Microenterprises:

Article 13. Learning and evolving 

All financial entities (including microenterprises) must conduct post‐incident reviews whenever a major ICT‐related incident disrupts their core activities. However, microenterprises are not required to communicate the changes they have implemented following such a post‐incident review to competent authorities Article 13(2). 

Microenterprises are not required to continuously monitor relevant technological developments. Article 13(7). 

Digital operational resilience testing 

Article 24. General requirements for the performance of digital operational resilience testing 

Microenterprises do not have to establish, maintain and review a digital operational resilience testing program. Article 24 (1). 

Article 26. Advanced testing of ICT tools, systems and processes based on TLPT

Microenterprises are exempt from advanced threat-led penetration testing (TLPT). Article 26(1). 

Managing of ICT third-party risk

Article 28. General principles 

Microenterprises are exempt from establishing a separate, formal strategy on third-party risk. Article 28(2). 


Reduced Requirements for Microenterprises 

The following DORA requirements are reduced for microenterprises. 

Here’s a quick table summary (with more details below). 

DORA Microenterprise Requirements- Everything You Need to Know_Chart 2

ICT risk management 

Article 6. ICT risk management framework 

Whereas financial entities must document and review their ICT risk management framework at least once a year, microenterprises may do so only “periodically,” reflecting lower complexity and fewer resources. 

However, like financial institutions, microenterprises must review their framework after a major ICT-related incident and following supervisory instructions or conclusions derived from relevant testing or audit processes. Article 6(5) 

Article 11. Response and recovery

All financial entities, including microenterprises, must perform some testing (namely, an annual test of continuity/response/recovery plans) in line with the overall proportionate approach under DORA.

However, microenterprises do not have to expand the testing to include advanced scenario-based exercises (e.g. cyber-attack scenarios, testing switchover from primary to backup ICT systems, etc.). Article 11(2) 

Article 12. Backup policies and procedures, restoration, and recovery procedures and methods 

Non‐micro entities “shall maintain redundant ICT capacities,” whereas microenterprises only have to assess the need for redundancy based on their risk profile. Article 12(4)

Digital operational resilience testing 

Article 25. Testing of ICT tools and systems

Like financial entities, microenterprises also have to test their ICT systems, but they can do so using a simpler, “risk‐based” strategy and accounting for the limited staff and resources they may have. 

They can pick which tests to do (e.g., vulnerability assessments and scans, physical security reviews, penetration testing, etc.) based on the urgency, risk type, and importance of their systems or data.

Essentially, microenterprises don’t need the same breadth of testing as larger financial entities as long as they remain proportionate to their scale and risk levels. Article 25(3).

Managing ICT third-party risk

Article 30. Key contractual provisions 

Financial entities normally have a direct right to audit and inspect an ICT third‐party service provider. But microenterprises can delegate that audit/inspection right to an independent third party (chosen by the ICT provider). Even with that arrangement, the microenterprise can always ask the third party for any information or assurances it needs about the ICT provider’s performance. Article 3(3) 


Need Help Complying with DORA? SECFORCE Can Help

Whether you’re a micro-entity or another organisation that needs help with DORA compliance, talk to us. We’re a DORA consultancy firm with vast experience helping financial service entities and businesses navigate complex compliance journeys.

Contact us today to learn more.

You may also be interested in...

Are You Ready for Purple Team Testing?
Oct. 29, 2025

Are You Ready for Purple Team Testing?

When is an organisation ready for purple team testing? Have a look at the exact situations where purple teaming will deliver the most value, purple team testing timelines, and what happens after a purple teaming exercise is done.

See more
6 Things To Do After Receiving Pen Test Results
June 3, 2025

6 Things To Do After Receiving Pen Test Results

It’s not as simple as “just fixing things". This article is our advice on how to go from pen test results (and recommendations) to successful post-test remediation.

See more