Introduction: DORA Is Here

On January 17, 2025, the Digital Operational Resilience Act (DORA) became applicable across the European Union. For financial entities and their service providers, this means one critical requirement is now in effect: annual penetration testing under Article 24. If you haven't started planning your DORA pentesting program, the time is now.

This guide walks you through exactly what DORA requires, who must comply, what your testing must cover, and how to implement an effective pentesting program without breaking your budget or diverting security resources.

What Is DORA and Why Does It Matter?

DORA stands for the Digital Operational Resilience Act. It's an EU regulation that sets mandatory ICT (Information and Communications Technology) security testing and incident reporting requirements for financial entities. The regulation applies to:

  • Banks and credit institutions
  • Investment firms and asset managers
  • Insurance and reinsurance undertakings
  • Payment institutions and e-money institutions
  • Cryptocurrency exchange providers
  • Central counterparties and trading venues
  • ICT third-party service providers supporting critical or important functions for the above

In simple terms: if you provide financial services in the EU or support critical ICT functions for financial entities, DORA applies to you.

DORA Article 24: Annual Penetration Testing Requirements

Article 24 is the core penetration testing requirement under DORA. It mandates that all in-scope financial entities must conduct at least one penetration test annually. Here's what you need to know:

The Baseline Requirement

Article 24 requires financial entities to conduct advanced, independent penetration testing on at least an annual basis. The test must be:

  • Comprehensive - covering your entire ICT estate, infrastructure, and critical systems
  • Realistic - simulating genuine attack scenarios and advanced threat techniques
  • Independent - conducted by external testers or internal teams without conflict of interest
  • Documented - with detailed findings, proof of concept demonstrations, and remediation guidance

Scope and Coverage

Your annual pentesting must cover:

  • All critical ICT systems and infrastructure
  • Internet-facing applications and APIs
  • Internal systems and lateral movement paths
  • Endpoints, servers, and network infrastructure
  • Third-party integrations and dependencies
  • Authentication mechanisms and credential handling
  • Business logic and application-level vulnerabilities

The test should not be limited to simple vulnerability scanning. It must include real exploitation attempts to verify that vulnerabilities can actually be exploited in your environment.

Timing and Frequency

DORA Article 24 specifies that testing must be conducted at least annually. However, many financial entities are moving toward more frequent testing (quarterly or even monthly) for their most critical systems to maintain continuous security awareness and catch issues earlier.

What SQUR Covers: Web Application and API Pentesting

Important: Scope and Limitations

SQUR is a web application and API pentesting platform. We support DORA Article 24 annual penetration testing for your web-facing applications, APIs, and browser-accessible services. This includes testing for OWASP Top 10, business logic flaws, authentication bypass, injection attacks, and other application-layer vulnerabilities.

What SQUR does not cover: Internal network pentesting, endpoint security testing, physical security assessments, social engineering campaigns, and TLPT (Targeted Legitimate Penetration Testing) under Articles 26-27. If your DORA compliance program requires these additional testing types, you will need to complement SQUR with other providers.

For most financial entities, web applications and APIs represent the largest external attack surface and the most common entry point for attackers. SQUR covers this critical layer comprehensively and cost-effectively.

Who Must Comply With DORA Article 24?

DORA Article 24 pentesting requirements apply to:

In-Scope Financial Entities

All financial entities regulated under DORA must conduct annual pentesting. This includes:

  • Banks (large and small)
  • Investment firms and portfolio managers
  • Insurance companies (direct insurers and reinsurers)
  • Payment service providers
  • E-money institutions
  • Crypto asset service providers
  • Trading venues and market operators

ICT Third-Party Service Providers

If you're a service provider (cloud provider, software vendor, managed security services provider, etc.) that handles critical or important ICT functions for a financial entity, DORA applies to you as well. You may be contractually obligated by your financial institution customers to meet DORA requirements, including annual pentesting.

The DORA Pentesting Timeline

Here's what you need to know about timing:

  • Applicable Since: January 17, 2025
  • First Test Due: By January 17, 2026 (annual requirement starting from the date of applicability)
  • Ongoing Requirement: At least annually thereafter
  • Documentation: Results must be documented and available for regulatory review

If you haven't conducted your first DORA Article 24 pentest yet, you're in the window now. Planning and executing your annual test before the end of 2026 is essential to demonstrate compliance with regulators.

What Should Your DORA Pentesting Process Look Like?

Step 1: Define Scope and Objectives

Before your pentest begins, clearly define:

  • Which systems and infrastructure must be tested (critical ICT systems)
  • Which systems are out of scope (regulatory, security, business reasons)
  • Specific objectives (identify vulnerabilities, test incident response, validate controls)
  • Testing parameters (destructiveness, timing, access levels)

Step 2: Conduct Comprehensive Testing

Your pentest should include:

  • External testing (internet-facing assets, email phishing, physical security)
  • Internal testing (lateral movement, privilege escalation, data exfiltration)
  • Application testing (OWASP Top 10, business logic flaws, authentication bypass)
  • Infrastructure testing (network segmentation, cloud misconfigurations, supply chain risks)
  • Social engineering assessment (phishing, pretexting, physical access)

Step 3: Document Findings Thoroughly

DORA requires detailed documentation of:

  • All vulnerabilities discovered, with severity ratings
  • Proof of concept demonstrations showing successful exploitation
  • Business impact assessment for each finding
  • Recommended remediation actions
  • Timeline for fixes

Step 4: Remediate and Retest

After the initial test:

  • Prioritize vulnerabilities by severity and exploitability
  • Develop remediation plans with clear ownership and deadlines
  • Implement fixes
  • Conduct retesting to verify vulnerabilities have been resolved
  • Document all remediation efforts

Step 5: Report and Archive

Create compliance-ready reports that include:

  • Executive summary for board/leadership review
  • Detailed technical findings with mapped severity
  • DORA-specific compliance statements
  • Remediation status and timelines
  • Recommendations for ongoing security improvements

How Autonomous Pentesting Simplifies DORA Compliance

Speed and Efficiency

Traditional pentesting for DORA compliance can take 3 - 6 weeks of manual work, requiring coordination across your security teams and external testers. Autonomous pentesting platforms can deliver comprehensive Article 24 assessments in 24 hours, allowing you to:

  • Conduct testing on your schedule without lengthy vendor coordination
  • Test more frequently throughout the year to maintain security posture
  • Retest faster after fixes are implemented
  • Meet regulatory deadlines with confidence

Cost Reduction

Manual pentesting for DORA Article 24 can cost €10,000 - €30,000+ per test. Autonomous platforms reduce this cost by 80% or more, making regular security assessments financially feasible for mid-market and smaller financial institutions. This means you can afford:

  • Multiple tests per year instead of just meeting the minimum annual requirement
  • Comprehensive coverage of your web applications and APIs
  • Unlimited retesting after fixes without additional costs

Deep Web and API Coverage

SQUR uses a multi-agent AI architecture to systematically explore your web applications and APIs. It doesn't rely on manual testers' time or judgment, so it can:

  • Test all your web applications and API endpoints comprehensively
  • Perform real exploitation (not just vulnerability detection)
  • Identify complex vulnerabilities like business logic flaws, authentication bypass, injection attacks, IDOR, SSRF, and privilege escalation
  • Cover the OWASP Top 10 and beyond with advanced attack techniques

Compliance-Ready Reporting

Autonomous pentesting platforms deliver reports specifically designed for regulatory review, including:

  • DORA-specific compliance statements
  • Findings mapped to regulatory requirements
  • Executive reports for board review
  • Detailed technical reports for remediation teams
  • Evidence of testing for audit and regulatory files

Key Differences: DORA Article 24 vs. TLPT (Articles 26 - 27)

It's important to understand that DORA includes two distinct pentesting requirements. Here's how they differ:

Requirement Article 24 (Annual Testing) TLPT (Articles 26 - 27)
Applies To All financial entities in scope Large financial entities only
Frequency Minimum annually Biennial (every 2 years), with annual updates
Testing Type Penetration testing of ICT systems Testing of security measures, incident response, and crisis management
Authority Approval No prior notification required Requires prior notification and approval from competent authorities
Coordination Can be conducted independently Coordinated with regulators and authorities
SQUR Support ✓ Fully supported ✗ Not currently supported

Important Note: SQUR supports Article 24 annual penetration testing for web applications and APIs. For internal network testing, infrastructure pentesting, or TLPT under Articles 26 - 27, please contact us to discuss your specific needs or consider complementing SQUR with additional providers.

Common Challenges and How to Address Them

Challenge: Limited In-House Security Resources

Solution: Use autonomous pentesting platforms that don't require specialized security expertise. Your team can configure tests and review results without needing a dedicated offensive security team.

Challenge: Testing Disruption to Production Systems

Solution: Autonomous platforms allow you to define precise scope boundaries, test timing, and impact levels. You can schedule tests during maintenance windows or test in staging environments that mirror production.

Challenge: Cost of Multiple Tests per Year

Solution: Autonomous pentesting is 80% cheaper than traditional methods, making quarterly or monthly testing financially feasible. This maintains better security posture than a single annual test.

Challenge: Keeping Up With Regulatory Changes

Solution: Work with vendors whose platforms are actively updated for regulatory requirements. SQUR maintains DORA compliance mapping and updates reporting templates as regulations evolve.

Getting Started With DORA Article 24 Pentesting

If you haven't started your DORA Article 24 pentesting program, here's your action plan:

Month 1: Planning Phase

  • Identify all systems in scope for DORA (critical ICT functions)
  • Determine testing approach: autonomous, manual, or hybrid
  • Define your testing schedule and frequency
  • Select a pentesting provider or solution

Month 2 - 3: Execution Phase

  • Configure scope and parameters
  • Conduct your first DORA Article 24 pentest
  • Review findings with your security and compliance teams
  • Develop remediation plans

Month 4 - 6: Remediation Phase

  • Implement fixes for identified vulnerabilities
  • Conduct retesting to verify remediation
  • Update your incident response procedures based on test results
  • Generate final compliance-ready report

Ongoing: Maintenance Phase

  • Schedule testing at least annually to maintain DORA compliance
  • Consider quarterly or monthly testing for critical systems
  • Update scope as your infrastructure changes
  • Archive reports for regulatory review and audit purposes

What to Look for in a DORA Pentesting Solution

When evaluating pentesting tools or services for DORA Article 24 compliance, prioritize:

Real Exploitation Capabilities

Not just vulnerability detection. The tool must be able to actually exploit vulnerabilities to prove they're real security risks in your environment.

Compliance-Ready Reporting

Reports should include DORA-specific compliance language, findings mapped to regulatory requirements, and executive summaries suitable for board review.

Scope Control

Granular control over what gets tested, how it's tested, and impact levels to prevent disruption to your production systems.

Retest Capabilities

Unlimited or affordable retesting so you can verify that vulnerabilities have been fixed without breaking your budget.

Speed and Cost-Effectiveness

Fast turnaround (days, not weeks) and affordable pricing that allows regular testing beyond the minimum annual requirement.

EU Data Residency and Privacy

For financial institutions handling sensitive customer data, ensure the solution complies with GDPR and keeps data within the EU.

Final Thoughts: DORA Article 24 Is Your Security Baseline

DORA Article 24 annual pentesting is no longer optional for European financial entities - it's a regulatory requirement. But rather than seeing it as a compliance checkbox, use it as an opportunity to systematically test and improve your security posture.

The most successful financial institutions are those that:

  • Test early and often (not just once per year)
  • Act quickly on findings to close vulnerabilities before attackers find them
  • Use testing results to inform security strategy and resource allocation
  • Maintain detailed audit trails for regulatory review

With autonomous pentesting platforms like SQUR handling your web application and API security testing, you can cover the most exposed part of your attack surface quickly and affordably. For a complete DORA Article 24 program, combine this with network and infrastructure testing from specialized providers to achieve full coverage.

Ready to implement your DORA Article 24 pentesting program? Explore how SQUR helps financial entities meet DORA requirements →