
Creator: Eirik Salmi, Device Analyst at Passwork
When a risk actor walks into your community the usage of a sound username and password, which keep watch over stops them?
For most monetary establishments, the truthful solution is: not anything catches it right away. The attacker looks as if an permitted consumer. They transfer laterally, escalate privileges, and map essential methods for a mean of 186 days sooner than the breach is even known — and an extra 55 days to comprise it — in line with IBM’s Price of a Information Breach File (2025).
By means of then, the operational injury is completed, and the regulatory clock has already began.
On January 17, 2025, the Virtual Operational Resilience Act (DORA) entered into utility around the EU. Article 9 of the law makes credential safety a binding monetary chance keep watch over, with supervisory penalties for establishments that fall quick.
The query is now not whether or not your authentication posture meets easiest apply. It’s whether or not it meets the regulation — and whether or not you’ll be able to turn out it.
This text lines the particular Article 9 necessities that govern credential control, explains why a compromised password is an operational resilience failure underneath DORA’s framework, and descriptions the sensible controls that shut the space.
The risk that DORA used to be constructed to counter
Stolen credentials are the only greatest preliminary entry vector in 2025, accounting for 22% of all knowledge breaches, in keeping with Verizon’s Information Breach Investigations File. For monetary establishments, the sector-specific value of that publicity averages $5.56 million in keeping with incident, in line with IBM’s Price of a Information Breach File — down from $6.08 million in 2024, but nonetheless the second-highest of any trade globally.
The availability facet of credential robbery has been absolutely industrialised. Preliminary Get admission to Agents promote verified company community entry for a mean of $2,700, with 71% of listings together with privileged credentials — pre-packaged entry that calls for no technical ability to milk, in line with Rapid7 analysis.
Infostealers equivalent to Lumma, RisePro, StealC, Vidar, and RedLine automate credential harvesting at scale. IBM X-Drive knowledge displays their supply by the use of phishing higher 84% year-on-year in 2024, with 2025 knowledge pointing to a good steeper trajectory.
DORA’s Article 9 exists exactly to break this chain. The law displays a documented, ongoing risk to the operational continuity of Eu monetary markets.
DORA Article 9 calls for sturdy authentication, least-privilege entry, and documented controls.
Passwork delivers all 3 — self-hosted, ISO 27001 qualified, with complete audit logs your compliance group can export on call for.
Check out Passwork Unfastened
What DORA Article 9 in truth calls for
Article 9 of DORA — titled “Coverage and Prevention” — sits throughout the ICT chance control framework mandated by means of Article 6. It units out particular technical and procedural responsibilities that monetary entities should put in force.
Two provisions are at once related to credential control.
-
Article 9(4)(c) calls for monetary entities to “put in force insurance policies that restrict the bodily or logical entry to data belongings and ICT belongings to what’s required for legit and authorized purposes and actions most effective.” That is the least-privilege concept, mentioned as a prison legal responsibility.
-
Article 9(4)(d) is going additional, requiring entities to “put in force insurance policies and protocols for sturdy authentication mechanisms, in line with related requirements and devoted keep watch over methods, and coverage measures of cryptographic keys wherein knowledge is encrypted in line with result of authorized knowledge classification and ICT chance evaluate processes.”
Unpacking that language in operational phrases: MFA is necessary. The connection with “related requirements” issues at once to FIDO2/WebAuthn — probably the most broadly deployed authentication usual lately proof against Adversary-in-the-Heart (AiTM) phishing kits, which is able to bypass SMS and TOTP-based MFA in actual time. Cryptographic key control is a regulatory requirement.
Privileged entry control (PAM) equipment aren’t named explicitly within the law — however the controls they ship map at once onto Article 9’s necessities. Consultation recording, just-in-time (JIT) entry provisioning, and privileged credential vaulting are exactly the “devoted keep watch over methods” the law describes.
Establishments that experience now not deployed those controls face a compliance hole that supervisors can act on.
The Eu Banking Authority (EBA) and ESMA’s Regulatory Technical Requirements underneath DORA supply further specificity on ICT chance control necessities, reinforcing the Article 9 baseline with sector-specific implementation steering.
Credential compromise as an operational resilience failure
DORA’s mentioned function is to verify monetary entities can face up to, reply to, and recuperate from ICT disruptions. A credential compromise appears to be like completely other thru that lens than it does thru a safety incident lens.
With a mean reside time of 186 days, a compromised credential does now not produce a discrete safety tournament. It produces a sustained, invisible risk to operational continuity — an attacker shifting laterally, escalating privileges, and mapping essential methods whilst showing as a sound consumer. It’s an instantaneous risk to the operational continuity DORA is designed to offer protection to.
The breach of France’s nationwide financial institution registry in January 2026 made the mechanics concrete. A risk actor got the credentials of a unmarried civil servant with entry to Ficoba — the interministerial database conserving data on each checking account opened in France.
The usage of most effective that one account, the attacker accessed and extracted knowledge on 1.2 million financial institution accounts, together with IBANs, account holder names and addresses, and tax identity numbers.
The affected device used to be taken offline, operations on the registry had been disrupted, and the incident used to be reported to France’s knowledge coverage authority, CNIL. The assault required no technical sophistication.
Beneath DORA, an incident of that scale at a monetary entity would cause necessary reporting responsibilities underneath Article 19 — an preliminary notification inside 4 hours of classification (and no later than 24 hours after detection), an intermediate record inside 72 hours, and a last record inside one month.
The third-party measurement: Supplier credentials are your credentials
DORA’s Bankruptcy V puts particular responsibilities on monetary entities referring to ICT third-party chance. The compliance perimeter does now not forestall on the establishment’s personal methods.
The Santander breach in Might 2024 is the Eu reference level. Attackers used credentials stolen from staff of Snowflake to entry a database containing buyer and worker knowledge throughout Spain, Chile, and Uruguay.
The credentials have been harvested months previous by means of infostealer malware infecting contractor workstations. Not one of the compromised Snowflake accounts had multi-factor authentication enabled.
The access level used to be now not inside of Santander. It used to be a supplier’s vulnerable authentication posture — and it uncovered knowledge belonging to one in all Europe’s greatest banks with no unmarried exploit being written.
Beneath DORA, a monetary establishment whose essential ICT supplier suffers a credential-based breach faces direct regulatory publicity. Establishments should contractually require identical authentication requirements from their distributors and audit compliance towards the ones necessities.
A supplier’s password coverage hole isn’t the seller’s drawback on my own — it’s the monetary entity’s regulatory legal responsibility.
Development a DORA-compliant credential control
Assembly Article 9’s necessities calls for a structured programme throughout 4 spaces.
-
Deploy phishing-resistant MFA first. FIDO2/WebAuthn-based authentication — {hardware} safety keys, passkeys, platform authenticators. SMS and TOTP-based one-time passwords aren’t good enough towards present assault ways. Implement phishing-resistant MFA for all customers, with explicit rigour on privileged accounts and faraway entry paths.
-
Implement least-privilege entry. JIT provisioning — granting increased entry most effective all through a selected job — removes the status privileges that make credential robbery so destructive. Deactivate accounts right away on offboarding. Dormant accounts are a number of the maximum commonplace and maximum avoidable assault vectors.
-
Vault all credentials. Provider account passwords, API keys, and privileged credentials should be saved in an encrypted, access-controlled credential vault. Guide credential control at scale is operationally unworkable and produces no audit path. A trade password supervisor Passwork — deployed on-premise throughout the establishment’s personal infrastructure — supplies the encrypted vaulting, granular entry controls, and whole job historical past that Article 9 calls for.
-
Track often. Anomalous login behaviour — atypical geolocations, off-hours entry, lateral motion patterns — should cause automatic signals. Lowering that 186-day reasonable reside time is the only best lever for slicing each monetary publicity and DORA incident reporting responsibilities.
All 4 controls rely at the similar basis: how credentials are saved, shared, accessed, and monitored. With out construction at that layer, even well-designed insurance policies fail at execution.
How Passwork helps DORA compliance in apply
Passwork is a company password supervisor qualified to ISO/IEC 27001 and to be had as a self-hosted deployment — that means your credential knowledge by no means leaves your individual infrastructure.
For monetary entities navigating DORA’s Bankruptcy V provide chain responsibilities, that difference issues: a third-party SaaS credential retailer introduces precisely the type of ICT dependency the law calls for you to control.
For establishments running during the 4 controls above, Passwork addresses the credential control measurement of every.
-
MFA enforcement around the credential layer. Passwork helps biometric, passkey, and safety key MFA natively, with SAML SSO and LDAP integration for endeavor environments.
-
Position-based entry keep watch over and least privilege. Permissions are assigned at vault and folder degree, inherited from AD or LDAP teams, and up to date routinely on listing adjustments. Offboarding revokes entry to shared credentials in one operation — logged and timestamped, generating the proof an investigator will request underneath Article 9(4)(c).
-
Privileged account stock and protected sharing. Passwork supplies a structured, searchable repository of all organisational credentials, together with shared administrative accounts. Encrypted vault sharing replaces casual channels that go away no audit path and can’t be revoked.
-
Audit logs for compliance documentation. Each credential entry, permission alternate, password reset, and sharing tournament is recorded in a tamper-evident log, exportable for compliance reporting and integrable with SIEM methods. A structured job historical past is a substantively more potent reaction to a regulator than a coverage report on my own.
DORA compliance is as a lot an explanation drawback as a technical one. The establishments that navigate enforcement maximum successfully are the ones that may produce documentation on call for.
Act sooner than the audit
DORA has transformed credential control from a safety easiest apply right into a binding monetary chance keep watch over. Articles 9(4)(c) and 9(4)(d) are particular: least-privilege entry, sturdy authentication, and cryptographic key coverage are prison responsibilities for each monetary entity working within the EU.
Operational resilience starts with identification — and identification starts with controlling who holds the keys.
Audit your credential controls towards Article 9, report the findings, and feature the proof in a position sooner than a regulator asks. Beneath DORA, the absence of documentation is itself a discovering.
Passwork is designed for precisely this case: a self-hosted password supervisor that assists in keeping credential knowledge inside of your individual infrastructure, enforces MFA throughout each entry level, and generates the tamper-evident audit logs that flip a compliance dialog from a legal responsibility into an indication. ISO/IEC 27001 qualified, with LDAP and SAML SSO integration for endeavor environments.
Get started your loose Passwork trial — complete capability, no barriers.
Backed and written by means of Passwork.



