Skip to main content

Case Study: MiCA and DORA Readiness for a CASP

Anonymised CASP case study: how a MiCA authorisation aligns with DORA ICT risk, incident readiness, supplier oversight and board-ready evidence today in 2026.

In this article
  1. Short answer
  2. Client context
  3. The problem
  4. Work delivered
  5. Evidence produced
  6. What changed
  7. What was deliberately not claimed
  8. Lessons for CASPs
  9. Related reading
  10. Primary sources
  11. FAQ
  12. Can MiCA and DORA evidence be reused?
  13. Is this a public CASP authorisation result?
  14. What is the biggest risk for CASPs?
  15. What should the board see?
  16. Does DORA apply to every CASP?

Last reviewed: 5 May 2026

This is an anonymised engagement note. Client identity, jurisdiction, platform architecture and commercial details are withheld. The note describes the operating pattern, not a public regulatory outcome.

Short answer

A crypto-asset service provider needed to avoid running MiCA authorisation work and DORA operational-resilience work as disconnected projects.

The practical result was a shared evidence model:

Evidence areaMiCA relevanceDORA relevance
GovernanceManagement, policies and control ownershipManagement-body ICT risk oversight
ICT riskPlatform and operational risk narrativeICT risk framework and risk register
IncidentsClient, market and operational impact handlingICT incident classification and reporting
OutsourcingService-provider dependency and accountabilityICT third-party risk and Register of Information
ResilienceContinuity of critical crypto servicesTesting, BCDR and recovery evidence
Board reportingAuthorisation and control maturityRisk, remediation and decision evidence

The goal was not to merge MiCA and DORA. The goal was to avoid duplicate work where the same evidence could support both conversations.

Client context

The client was a CASP preparing for regulatory scrutiny while operating a lean technology and compliance function.

The main pressure points were:

  • MiCA authorisation expectations;
  • DORA ICT risk and operational resilience;
  • third-party technology and infrastructure dependencies;
  • incident escalation and management reporting;
  • board visibility over control gaps.

The client had several good artefacts, but they were not mapped into one coherent control story.

The problem

The risk was duplication.

MiCA work was being discussed through authorisation and compliance language. DORA work was being discussed through ICT risk, incidents and supplier evidence. Engineering saw both as additional documentation load.

That creates three problems:

  1. teams answer similar questions twice;
  2. board reporting becomes fragmented;
  3. evidence becomes inconsistent across regulatory workstreams.

Work delivered

The engagement focused on aligning evidence across the two regimes without overstating equivalence.

WorkstreamOutput
Scope mappingCASP services, DORA scope touchpoints, authority context
Control crosswalkMiCA/DORA evidence map for governance, ICT risk, incidents and outsourcing
ICT risk registerRisks linked to crypto services, systems, providers and controls
Incident workflowSingle intake with separate MiCA/DORA decision points where relevant
Supplier oversightICT provider map, criticality rationale and contract gap view
Board packCombined remediation and decision summary

Evidence produced

The useful evidence was operational, not decorative:

ArtefactWhat it answered
Regulatory scope mapWhich obligations apply to which entity and service
ICT risk registerWhat can disrupt critical crypto services
Incident classification matrixWhich events need management, customer, partner or authority escalation
Supplier dependency mapWhich providers support key services and data flows
Control evidence indexWhere supporting policies, records and approvals live
Board remediation viewWhich gaps need funding, ownership or risk acceptance

What changed

The client moved from parallel compliance tracks to one operating evidence model.

That meant:

  • fewer duplicated questionnaires and spreadsheets;
  • clearer ownership for ICT risk and supplier evidence;
  • better board visibility over remediation;
  • a single incident intake with documented classification paths;
  • stronger answers for partner and regulatory due diligence.

What was deliberately not claimed

This case study does not claim MiCA authorisation, supervisory approval or audit certification. Those outcomes depend on the entity, jurisdiction, legal work, NCA process and broader operating facts.

The claim is narrower: the engagement improved evidence quality and reduced fragmentation across MiCA and DORA readiness work.

Lessons for CASPs

LessonPractical implication
Do not treat MiCA and DORA as one lawKeep legal mappings separate
Do not run two evidence systemsReuse operational evidence where valid
Map suppliers earlyCrypto services are usually infrastructure-dependent
Test incident classificationProduct, client, ICT and security events can overlap
Give the board a single risk viewFragmented reporting weakens oversight

Primary sources

FAQ

Can MiCA and DORA evidence be reused?

Some evidence can be reused, especially governance, ICT risk, incident, outsourcing and resilience evidence. The legal analysis should remain separate because MiCA and DORA have different purposes and obligations.

Is this a public CASP authorisation result?

No. This is an anonymised readiness case study. It does not disclose or claim a public authorisation outcome.

What is the biggest risk for CASPs?

A common risk is fragmented evidence: MiCA materials, DORA artefacts, supplier reviews and board reports tell different stories. That makes review harder.

What should the board see?

The board should see the key operational risks, supplier dependencies, incident readiness, remediation priorities, risk acceptances and decisions needed for regulatory readiness.

Does DORA apply to every CASP?

DORA scope depends on the entity and regulatory status. CASPs authorised under MiCA are included in DORA's financial entity scope, but entity-specific scope and local authority context should be confirmed.