DORA-Art25-P1

Article
25 (1)
Pillar
Digital Operational Resilience Testing
Regulation Ref
Regulation (EU) 2022/2554, Article 25(1)
Last Reviewed
2026-01-15

The digital operational resilience testing programme shall provide for the execution of appropriate tests, such as vulnerability assessments and scans, open source analyses, network security assessments, gap analyses, physical security reviews, questionnaires and scanning software solutions, source code reviews, scenario-based tests, compatibility testing, performance testing, end-to-end testing and penetration testing.

Evidence Profiles

Vulnerability Assessment Report COMMON

Report documenting the results of vulnerability assessments and scans, including identified vulnerabilities, severity ratings, affected systems, and remediation recommendations as required by DORA Article 25.

Formats
PDF JSON
Evidence Class
vulnerability-assessment-report
Availability
COMMON
Update Frequency
quarterly
Typical Author
Security Testing Lead
Approval Chain
Security Testing Lead → CISO

Content Sections

Expected Fields

Common Quality Issues

Penetration Test Report COMMON

Report documenting the results of penetration testing activities, including attack scenarios, findings, exploitation evidence, and remediation recommendations.

Formats
PDF
Evidence Class
penetration-test-report
Availability
COMMON
Update Frequency
annual
Typical Author
External Penetration Testing Firm
Approval Chain
Security Testing Lead → CISO

Content Sections

Expected Fields

Common Quality Issues

Network Security Assessment Results PARTIAL

JSON-structured results of network security assessments including firewall rule reviews, network segmentation validation, and traffic analysis findings.

Formats
JSON
Evidence Class
network-security-assessment
Availability
PARTIAL
Update Frequency
semi-annual
Typical Author
Network Security Engineer
Approval Chain
Network Security Engineer → CISO

Content Sections

Expected Fields

Common Quality Issues

Resilience Testing Gap Analysis PARTIAL

CSV-structured gap analysis identifying areas where the institution's resilience testing programme falls short of DORA requirements, including coverage gaps and capability deficiencies.

Formats
CSV
Evidence Class
gap-analysis-report
Availability
PARTIAL
Update Frequency
annual
Typical Author
Compliance Officer
Approval Chain
Compliance Officer → CISO

Content Sections

Expected Fields

Common Quality Issues

Fact Schemas

vulnerability_assessment_status

Schema ID
fs-vulnerability-assessment
Control
DORA-Art25-P1

Valid Ranges

assessment_date
within last 3 months for quarterly assessments
critical_count
should be 0 for compliant posture after remediation

Related Schemas

JSON Schema

{
  "properties": {
    "assessment_date": {
      "format": "date",
      "type": "string"
    },
    "critical_count": {
      "minimum": 0,
      "type": "integer"
    },
    "high_count": {
      "minimum": 0,
      "type": "integer"
    },
    "low_count": {
      "minimum": 0,
      "type": "integer"
    },
    "medium_count": {
      "minimum": 0,
      "type": "integer"
    },
    "next_assessment_date": {
      "format": "date",
      "type": "string"
    },
    "remediated_count": {
      "minimum": 0,
      "type": "integer"
    },
    "remediation_in_progress": {
      "type": "boolean"
    },
    "total_vulnerabilities": {
      "minimum": 0,
      "type": "integer"
    }
  },
  "required": [
    "assessment_date",
    "total_vulnerabilities",
    "critical_count",
    "high_count",
    "remediation_in_progress"
  ],
  "type": "object"
}

penetration_test_results

Schema ID
fs-penetration-test-results
Control
DORA-Art25-P1

Valid Ranges

test_date
within last 12 months
critical_findings
should be 0 after remediation and retesting

Related Schemas

JSON Schema

{
  "properties": {
    "critical_findings": {
      "minimum": 0,
      "type": "integer"
    },
    "findings_count": {
      "minimum": 0,
      "type": "integer"
    },
    "high_findings": {
      "minimum": 0,
      "type": "integer"
    },
    "remediation_verified": {
      "type": "boolean"
    },
    "retesting_completed": {
      "type": "boolean"
    },
    "test_date": {
      "format": "date",
      "type": "string"
    },
    "test_passed": {
      "type": "boolean"
    },
    "tester_organisation": {
      "minLength": 1,
      "type": "string"
    }
  },
  "required": [
    "test_date",
    "tester_organisation",
    "findings_count",
    "critical_findings",
    "test_passed"
  ],
  "type": "object"
}

basic_testing_coverage_status

Schema ID
fs-basic-testing-coverage
Control
DORA-Art25-P1

Valid Ranges

reporting_period_end
within last 12 months
vulnerability_assessments_performed
at least 1 per year
penetration_tests_performed
at least 1 per year

Related Schemas

JSON Schema

{
  "properties": {
    "all_required_test_types_covered": {
      "type": "boolean"
    },
    "gap_analyses_performed": {
      "minimum": 0,
      "type": "integer"
    },
    "network_assessments_performed": {
      "minimum": 0,
      "type": "integer"
    },
    "penetration_tests_performed": {
      "minimum": 0,
      "type": "integer"
    },
    "reporting_period_end": {
      "format": "date",
      "type": "string"
    },
    "scenario_based_tests_performed": {
      "minimum": 0,
      "type": "integer"
    },
    "source_code_reviews_performed": {
      "minimum": 0,
      "type": "integer"
    },
    "vulnerability_assessments_performed": {
      "minimum": 0,
      "type": "integer"
    }
  },
  "required": [
    "reporting_period_end",
    "vulnerability_assessments_performed",
    "penetration_tests_performed",
    "network_assessments_performed"
  ],
  "type": "object"
}