Skip to main content

Case Study: 90-Day DORA Gap Analysis for an EU-Licensed EMI

Anonymised DORA case study for an EU-licensed EMI: gap analysis, ICT risk framework, incident workflow, supplier evidence and board-ready remediation plan.

In this article
  1. Short answer
  2. Client context
  3. The problem
  4. Work delivered
  5. Evidence produced
  6. What changed
  7. What was deliberately not claimed
  8. Reusable lessons
  9. Related reading
  10. FAQ
  11. Is this a named client case study?
  12. What was the main DORA outcome?
  13. Did this replace a formal audit?
  14. Why is an evidence index important?
  15. Can a smaller EMI run this without a full-time CISO?

Last reviewed: 5 May 2026

This is an anonymised engagement note. Client names, jurisdictions, systems and commercial details are withheld under engagement confidentiality. The structure reflects the type of work CyAdviso performs for EU-licensed fintechs; it should not be read as a public audit opinion or legal advice.

Short answer

An EU-licensed electronic money institution needed to move from scattered DORA preparation to a defensible operating model.

The useful outcome was not a longer policy set. The useful outcome was a review-ready evidence baseline:

AreaBeforeAfter
ScopeDORA applicability understood informallyEntity, licence, NCA and critical-function scope note
ICT riskRisks spread across tickets and documentsICT risk register with owners, residual risk and actions
IncidentsEscalation known by people, not evidencedClassification workflow, timestamps and reporting decision tree
Third partiesSupplier list existed, DORA mapping incompleteRegister of Information starter and supplier criticality map
GovernanceBoard updates were high-levelManagement-body pack with risks, decisions and remediation
EvidenceDocuments existed but were hard to reviewEvidence index with owners, status and review dates

Client context

The client was a regulated EMI operating with a lean security and compliance team. The company had already started DORA preparation, but the work was distributed across compliance documents, engineering tickets, supplier folders and board materials.

The management question was simple:

If a supervisor, partner bank or auditor asked for DORA evidence next month, could the team show a coherent operating model?

The initial answer was: partially, but with too much manual reconstruction.

The problem

The client did not lack effort. It lacked an evidence architecture.

Common gaps included:

  • no single DORA scope note linking licence, services, NCA and critical functions;
  • ICT risks written at different levels of detail;
  • incident response documentation that did not preserve classification timestamps;
  • supplier reviews not mapped to critical or important functions;
  • contract gaps not visible in one tracker;
  • board materials that did not show risk movement, decisions or overdue remediation.

These are typical fintech SMB problems. They do not mean the firm is careless. They mean DORA evidence has not yet been turned into an operating cadence.

Work delivered

The engagement was structured as a focused 90-day programme.

PhaseWorkstreamOutput
Days 1-15Scope and evidence baselineDORA scope note, evidence inventory, initial gap view
Days 16-30ICT risk modelRisk register structure, scoring method, owner map
Days 31-60Incident and supplier evidenceIncident workflow, supplier criticality map, Register of Information starter
Days 61-90Governance and remediationBoard pack, remediation tracker, evidence index

The work was designed for a small internal team. The client team reviewed decisions and approved artefacts; CyAdviso structured the evidence, challenged weak assumptions and converted scattered inputs into reviewable records.

Evidence produced

The final evidence pack included:

Evidence artefactPurpose
DORA scope noteShows why the entity is in scope and which services matter
Critical-function mapLinks regulated services to systems and suppliers
ICT risk registerShows top ICT risks, controls, residual risk and owners
Incident classification workflowPreserves detection, classification, approval and reporting decisions
Register of Information starterCreates the ICT third-party inventory baseline
Supplier criticality assessmentIdentifies providers supporting important services
Article 30 contract gap trackerShows supplier contract remediation priorities
Board reporting packGives the management body a risk and decision view
Evidence indexGives reviewers one route into the evidence set

What changed

The main change was reviewability.

Before the engagement, the client could answer many DORA questions, but answers depended on the memory of specific people. After the engagement, core answers had evidence:

  • who owns ICT risk;
  • which systems support critical or important functions;
  • which suppliers matter most;
  • how incidents are classified;
  • which contract gaps remain open;
  • what the management body has reviewed;
  • which remediation actions are overdue.

That is the practical difference between "DORA project in progress" and "DORA operating model under control".

What was deliberately not claimed

This engagement did not produce an external audit opinion. It did not replace legal advice. It did not guarantee a future supervisory outcome.

The goal was narrower and more useful: make the current DORA posture understandable, evidenced and manageable.

Reusable lessons

LessonWhy it matters
Start with scopeWithout scope, evidence becomes generic
Keep incident timestampsDORA reporting depends on facts and timing
Link suppliers to functionsA vendor list is not a resilience map
Give the board decisions"Noted" is weaker than recorded challenge
Maintain an evidence indexReviewers need a map, not a document dump

FAQ

Is this a named client case study?

No. It is anonymised. Client names, jurisdictions, systems and commercial details are withheld under confidentiality.

What was the main DORA outcome?

The main outcome was a review-ready evidence baseline: scope, ICT risks, incident workflow, supplier mapping, board pack, remediation tracker and evidence index.

Did this replace a formal audit?

No. The engagement supported DORA readiness and evidence quality. It did not produce an external audit opinion or legal advice.

Why is an evidence index important?

An evidence index helps supervisors, partner banks, auditors and internal reviewers understand the operating model without searching through disconnected folders.

Can a smaller EMI run this without a full-time CISO?

Yes, if internal owners are available for decisions and approvals. The vCISO role structures the work, challenges assumptions and produces evidence; the regulated entity remains accountable.