Author: Sean O’Dowd
The implementation of the European Union’s Digital Operational Resilience Act (DORA) marks a pivotal shift in financial regulation. As of January 17, 2025, the focus for financial entities and critical information and communication technology (ICT) providers moves beyond traditional cybersecurity prevention to comprehensive Operational Resilience. DORA represents a significant evolution in the EU regulatory framework, elevating operational resilience to a level of importance comparable-within its domain-to the role that financial resilience reforms such as the Dodd-Frank Act played for systemically important institutions.
This regulatory evolution is not limited to the EU; it mirrors a global convergence of standards, from the UK’s FCA requirements to new guidelines in the US and APAC (eg. Australia and Singapore), that prioritizes the ability to withstand, recover, and learn from ICT disruptions.
For executives and IT leaders, this requires a fundamental architectural rethink; a transformational opportunity. Compliance strategies must now account for concentration risk, portability, and rigorous incident reporting.
This paper outlines how the Nutanix Cloud Platform (NCP) can support financial institutions in addressing the technical and operational aspects of these resilience mandates.
When the EU originally proposed DORA in September 2020, it signaled a new era for the importance of operational resilience.
As a cornerstone of the EU digital finance strategy, DORA is designed to “consolidate and upgrade information and communication technology (ICT) risk requirements” across BFSI entities to facilitate firms' alignment with “a common set of standards to mitigate ICT risks.”
DORA applies to a comprehensive range of over 20 types of financial entities, spanning banking, payments, investment services, insurance, and crypto-assets, as well as market infrastructures (such as trading venues and central counterparties). Crucially, the regulation also extends to ICT third-party service providers (including cloud platforms.) For the exhaustive list of regulated entities, see Article 2(1) of DORA.
DORA is the most comprehensive operational resilience regime currently in force, but it is not the only one. Comparable requirements addressing third-party risk, incident reporting, and business continuity have been issued or are under development by regulators in the United Kingdom, the United States, Canada, and across Asia-Pacific. For multinational financial institutions, the challenge is no longer complying with regional rules in isolation, but architecting a resilient infrastructure standard that can satisfy expectations across jurisdictions.
Regulators worldwide are aligning on a core principle: preventing attacks is no longer sufficient; institutions must demonstrate the ability to withstand and recover from them. This shift is reshaping industry priorities.
According to a LSEG’s From regulation to resilience: How financial firms are evolving their cloud strategies executive global research, 84% of firms have modified their cloud strategies in response to data privacy, security and sovereignty regulations, with 28% making extensive changes. Operational resilience has emerged as a shared priority for both firms and regulators: 47% of institutions now cite resilience and security as a key performance indicator for evaluating their cloud strategies, particularly as 30% experienced cloud-related operational disruptions in the past year.
DORA does not operate in isolation. It sits within a layered European framework where cross-sector and sector-specific regimes interact, and where adjacent developments shape the broader compliance environment.
It is important to distinguish between DORA’s core mandates and the broader foundation and adjacent regimes that influence digital strategy.
Foundation Layer: Cross-Sector Requirements
While DORA is the primary focus for financial entities, it sits atop a broader European resilience architecture:
Adjacent Developments to Monitor
Beyond DORA's core scope, two further regimes affect infrastructure and operational decisions for financial institutions and warrant tracking alongside DORA implementation rather than as part of it:
In the EMEA region, 95% of financial institutions rate operational resilience as very important or critical when selecting cloud providers, reflecting the maturity of the regulatory framework.
Although specific frameworks vary, major financial markets are converging on requirements that mirror DORA’s focus on third-party risk and business continuity:
United Kingdom Financial Conduct Authority (FCA) and Prudential Regulation Authority (PRA): Post-Brexit frameworks have remained closely aligned with EU standards, though through two distinct regimes that should not be conflated. The first is the UK’s existing operational resilience framework, set out in FCA PS21/3 and the PRA's supervisory statement on impact tolerances. The transition period for firms to demonstrate they could remain within impact tolerances for severe but plausible disruptions ended on March 31, 2025. This regime emphasizes that firms must be capable of terminating outsourcing arrangements without compromising service continuity, a direct parallel to DORA's cloud exit strategy focus.
The second is a new reporting regime. On March 18, 2026, the FCA and PRA published final policy statements PS2/26 and PS7/26, establishing a unified approach to operational incident and material third-party reporting. These rules take effect on March 18, 2027, and introduce a single reporting portal (FCA Connect) with a streamlined template aligned with both DORA and the FSB's FIRE framework, an illustration of the global regulatory convergence underway.
North America
United States: Banking regulators (Federal Reserve, Office of the Comptroller of the Currency (OCC), and Federal Deposit Insurance Corporation (FDIC)) have issued joint guidance strengthening expectations for operational resilience, particularly regarding third-party relationships.
Canada - Office of the Superintendent of Financial Institutions (OSFI): Canadian regulators have taken a comprehensive, phased approach, issuing three major guidelines: Third-Party Risk Management (April 2023), Integrity and Security (January 2024), and Operational Risk Management and Resilience (August 2024). This systematic approach has resulted in 96% of Canadian banks making moderate or extensive changes to their cloud strategies.
Asia-Pacific
The Asia-Pacific region is responding to high cloud-related disruption rates (38% in the past 12 months according to LSEG research).
Regulators in Singapore (Monetary Authority of Singapore, MAS), Hong Kong (Hong Kong Monetary Authority, HKMA), Australia (Australian Prudential Regulation Authority, APRA), and India (under the Digital Personal Data Protection Act, 2023) have updated guidelines to mandate stricter business continuity management.
Notably, in November 2024, eight jurisdictions conducted a joint crisis management exercise with global cloud providers, signaling a new level of cross-border regulatory coordination.
This global convergence signals that operational resilience, third-party risk management, and digital sovereignty are no longer regional compliance tasks but global strategic imperatives. Financial institutions that treat these regulations as a unified architectural challenge, rather than a checklist of local rules, can build a "future-proof" foundation that supports business agility across all jurisdictions.
The Digital Operational Resilience Act (DORA) is structured around five key pillars designed to strengthen the financial sector's defense against ICT disruptions. Together, these pillars establish a comprehensive framework covering how financial entities govern ICT risk, manage and report incidents, test their resilience, oversee third-party providers, and share intelligence on emerging threats:
While DORA comprises a broad set of governance rules, its successful implementation relies heavily on the underlying technical infrastructure. The figure below illustrates how DORA structures its requirements across five distinct, comprehensive chapters that are widely recognized as its core pillars. These five pillars, and the framework that follows maps DORA's core requirements to specific Nutanix Cloud Platform capabilities, demonstrating how infrastructure choices can support broader compliance objectives.
The following framework maps DORA’s core requirements to specific Nutanix Cloud Platform capabilities, demonstrating how infrastructure choices can support broader compliance objectives.
The Regulatory Goal: Establish a comprehensive framework for the management of ICT risk, including resilient systems, protection mechanisms, and the segregation of critical functions.
DORA Focus Area (The Regulation) | Nutanix Capability (Solution) |
|
(Article 6): Unified management of all physical and digital infrastructure (On-prem/Cloud). Article. 28(3): Comprehensive inventory of ICT third-party arrangements supporting ongoing register maintenance and the annual reporting cycle. Per Article 6(8), the ICT risk management framework must include “all relevant physical components and infrastructures, such as premises, datacenters, and sensitive designated areas.” | Unified Control Plane: To help support these requirements, the Nutanix Cloud Manager (NCM) solution offers a centralized interface designed to assist teams in maintaining visibility across disparate environments. |
Technological Resilience (Article 7) Systems must demonstrate reliability and data integrity. | Self-Healing Architecture: The Nutanix Acropolis Operating System (AOS) utilizes distributed consistency algorithms to help protect data availability against hardware or node failures. |
Protection & Prevention (Article 9, Article 10, Article 11) Implement prevention and protection tools, detection mechanisms, and robust response, recovery, and business continuity plans for ICT systems. | Integrated Defense: Native capabilities such as Nutanix Data Lens (ransomware detection) and Nutanix Flow Network Security (microsegmentation) can support a defense-in-depth security posture aligned with regulatory expectations. Nutanix's ecosystem of partner companies offers multiple prevention, protection, detection, and response capabilities. |
System Segregation (Article 12) ICT systems should be logically or physically segregated to mitigate the risk of lateral movement and corruption. Per Article 12, ICT systems: “shall be securely protected from any unauthorized access or ICT corruption and allow for the timely restoration of services, making use of data and system backups as necessary.” | Zero Trust Segmentation: Flow Network Security can be used to implement microsegmentation strategies that can help isolate critical applications. Hybrid Multicloud Portability: Nutanix Cloud Clusters (NC2) enables organizations to create isolated recovery environments, which can support resilience and recovery strategies in multiple public clouds, at the edge and on-premise. Application Resilience: Nutanix Kubernetes Platform (NKP) extends segmentation to the containerized layer using standard Kubernetes network policies. NKP also offers hybrid multicloud multitenancy with dedicated or shared Kubernetes clusters to support deployment models that may help address certain regulatory and operational requirements. |
The Regulatory Goal: Financial entities must demonstrate the ability to detect anomalies rapidly, report incidents within prescribed timelines, and continuously test systems without disrupting production. These pillars cover continuous monitoring, timely detection and classification of ICT incidents, structured reporting to regulators, and regular testing of systems to validate resilience under both normal and stressed conditions, including obligations under Article 10 (detection) and Articles 17 through 23 (incident management, classification, and reporting).
The Nutanix capabilities described below can assist institutions in addressing certain technical aspects of these obligations, for example, by generating evidence and supporting workflows that contribute to incident detection and reporting processes.
The Regulatory Goal: Reduce concentration risk and support sound "exit strategies" for critical third-party ICT providers (e.g., cloud hyperscalers).
This regulatory requirement is no longer hypothetical. In November 2025, European Supervisory Authorities (ESAs) designated the first group of Critical ICT Third-Party Providers (CTPPs) under the DORA Article 31. The designated providers, which include major hyperscalers and infrastructure firms, are now subject to direct regulatory oversight, including risk assessments and inspections by Joint Examination Teams. For financial entities utilizing these designated providers, Nutanix Cloud Clusters (NC2) and the Nutanix Move solution can support workload portability and concentration risk mitigation strategies.
DORA Third-Party Exit Strategy Requirements
Under DORA Article 28(8), financial entities must have exit strategies in place for ICT services supporting critical or important functions. These requirements apply to all ICT third-party service providers, including cloud service providers, and align with prior European Banking Authority (EBA) Guidelines on Outsourcing Arrangements (EBA/GL/2019/02, paragraphs 105–106). For cloud-based services, this requirement carries particular operational weight given concentration risk and portability challenges.
The Regulatory Goal: Facilitate the exchange of cyber threat information and intelligence among financial entities.
The Nutanix platform is designed to assist financial institutions in enhancing, hardening, and protecting their environments. By integrating security and resilience directly into the infrastructure stack, Nutanix supports a "Secure by Design" approach that aligns with key regulatory principles, including those reflected in DORA.
Regulators increasingly emphasize the ability to move critical workloads as part of concentration risk mitigation strategies. The Nutanix capabilities below can assist institutions in addressing certain technical aspects of workload portability:
Nutanix is purpose-built to support infrastructure resilience across diverse environments, including core datacenters, edge locations, and public clouds. This architecture allows organizations to apply consistent security and business continuity policies across all endpoints, supporting a comprehensive resilience posture. To further harden these environments, Nutanix incorporates Zero Trust principles, such as microsegmentation and rigorous access controls, directly into the platform, enabling customers to implement controls aimed at restricting lateral movement and reducing the attack surface.
Hybrid cloud SecOps solutions
Ecosystem interoperability
To address the threat of data breaches and ransomware, Nutanix provides tools for lifecycle management of data backup and recovery.
Resilience requires visibility. Nutanix facilitates compliance adherence through unified management and a robust partner ecosystem.
Operational resilience requires more than just robust software; it demands a verifiable chain of trust. The Nutanix Cloud Platform is engineered with reference to widely recognized security and compliance standards used in the financial industry. This security posture is supported through extensive third-party audits and alignment with international frameworks, providing a platform that can assist financial institutions in addressing certain technical aspects of their assurance needs when hosting critical workloads.
Nutanix maintains a comprehensive portfolio of security validations that support global regulatory compliance efforts.
NCP enables a unified, layered approach to cybersecurity across its platform, data, networks, and applications. Together, this helps build strong cyber resilience in the face of constant threats. Aligned to the NIST Cybersecurity Framework (NIST CSF), NCP provides built-in capabilities.
Resilience is a team sport. Rather than displacing existing security investments, Nutanix integrates with an extensive ecosystem of certified "Nutanix Ready" security and data protection partners spanning the full defense-in-depth stack: endpoint detection and response, network security and microsegmentation, data protection and backup, identity and access management, SIEM and observability, and cloud workload protection. This allows financial institutions to operationalize their existing security tooling directly within the infrastructure layer, preserving prior investments while extending coverage uniformly across virtual and multi-cloud environments. A current list of certified partners is maintained in the Nutanix Ready partner directory.
Our hybrid multicloud platform supports a wide array of business use cases. Nutanix balances workload placement, resilience, performance, costs, and control factors for modern and business-critical applications such as core banking, risk management, OMS/EMS, and SWIFT. Nutanix can support a BFSI's microservices management to give developers and IT simplified IaaS (Infrastructure as a Service) choices.
DORA elevates ICT risk management to a sustained board-level priority, and it is not alone. The convergence underway across the United Kingdom, United States, Canada, and Asia-Pacific means that financial institutions are no longer responding to a single regulation but to a unifying set of expectations on operational resilience, third-party risk management, and digital sovereignty. What began as a regional compliance exercise is becoming a global architectural conversation.
For multinational institutions, this shift changes the calculus. Building one resilience posture per jurisdiction is neither sustainable nor strategic. The institutions that fare best will be those that treat resilience, portability, and observability as platform-level properties, applied consistently across geographies, providers, and workload types, rather than as point solutions bolted onto each new regulatory deadline.
Addressing these requirements is not a one-time exercise but a continuous journey of modernization. Financial institutions need infrastructure that offers inherent resilience without stifling innovation, and that can flex as regulations evolve and business needs change.
By standardizing on the Nutanix Cloud Platform, BFSIs are better positioned to:
Support strategies aimed at mitigating concentration risk: Leverage portable licensing and workloads to move data and applications between on-premises environments and public clouds, supporting the exit-strategy expectations now common across DORA, UK FCA/PRA guidance, US joint regulator guidance, and OSFI's third-party risk framework.
Enhance operational continuity capabilities: Utilize built-in redundancy and automated disaster recovery to help maintain critical functions during disruptions, regardless of where workloads run.
Support centralized visibility and reporting processes: Centralize visibility across hybrid environments to assist institutions in addressing the transparency, monitoring, and information-sharing themes shared across DORA and the converging global regimes.
Nutanix offers a pragmatic path forward, helping financial institutions modernize their digital estates to meet today's resilience standards under DORA and the converging global frameworks that surround it, while preparing for the regulatory demands of tomorrow.
This document is provided for informational purposes only. Nutanix provides the underlying infrastructure, platforms, and technical tools designed to facilitate a resilient digital environment; however, Nutanix does not provide legal, regulatory, or compliance advice.While the Nutanix Cloud Platform (NCP) includes features that can support certain technical and operational aspects of regulatory requirements, including the Digital Operational Resilience Act (DORA), customers remain responsible for assessing and ensuring that their specific implementation meets applicable legal and regulatory requirements. In particular, customers are responsible for:
Specific Note on DORA and Global Mandates
The implementation of DORA marks a shift toward comprehensive Operational Resilience. While Nutanix provides technical capabilities like workload portability (via NC2) and microsegmentation (via Flow Network Security) that can help mitigate certain ICT risks, these are components of a broader compliance strategy that extends beyond underlying infrastructure and must be implemented and managed by the financial institution. Compliance with DORA requires financial institutions to implement governance, oversight, testing, documentation, incident classification and reporting, and third-party risk management processes.Accordingly, references in this document to "alignment" or "support" relate to technical capabilities only and should be evaluated by the customer in the context of its overall legal and regulatory obligations. Nothing in this document should be construed as a representation or warranty of regulatory compliance.