Which IT regulations apply to my financial institution?

Overview of DORA, MaRisk, BAIT & Co.

Regulation, resilience, responsibility: Why IT security is becoming a management task in the financial sector.

DORA, MaRisk, BAIT, BSI Act – IT regulation in the financial sector has long been a reality for companies. The requirements are increasing, but not only on a technical level: IT security becomes a strategic management taskBecause digital attacks are no longer an exception – they are part of everyday operations.

What you will learn in this article:

  • Which rules really apply to your company – and why two seemingly similar banks have very different obligations.
  • How to use an orientation matrix Be able to assess your regulatory situation.
  • Why traditional audits are no longer sufficient – and how simulation-based tests such as TLPT and Red Teaming deliver real added value.
  • What decision-makers can learn from the current BSI situation assessment.
  • Where you Decision-making aids for selecting the appropriate test form or for regulatory assignment finding.
 

Resilience is not an IT goal – it is a management goal. And it begins with clarity.
This article provides you with the overview you need to make informed decisions – and withstand not only the next audit, but also a real attack.

Am I affected? – 3 questions for self-assessment

Many companies underestimate how much they are already – or will soon be – affected by regulatory IT requirements. Check it out for yourself:

Then BAIT, MaRisk or DORA may apply – regardless of whether you are directly regulated or “only” outsourced tasks.

Internal IT units, outsourcing partners or specialized providers are also becoming the focus of supervision.

Such developments can change your regulatory classification – and trigger new audit obligations.

If you answer at least one question with “Yes”, it is worth taking a look at our compact Executive Summary: Which IT requirements apply – and why.

Including Orientation matrix for typical company profiles.

Table of Contents

Why are IT regulations in the financial sector increasing?

The increasing density of regulation in the financial sector is not a bureaucratic overreaction—it is a response to real threats. Anyone involved with IT security in the financial world knows that attempted attacks are no longer the exception, but part of everyday life.

The threat situation in numbers

According to the report Threat Landscape: Finance Sector (2025) ENISA (European Union Agency for Cybersecurity) were carried out between January 2023 and June 2024 488 publicly reported cyber incidents registered in the European financial sector. Particularly alarming: Ransomware attacks and targeted attacks on third parties are among the fastest growing threat categories.

ENISA Threat Landscape Finance: Observed cyber incidents per month in the European financial sector.
The ENISA Threat Landscape: Finance Sector 2025 report shows that the threat level posed by cyberattacks in the European financial sector remains alarming. 18 cyber incidents were publicly reported over a period of 488 months.

The BSI Status Report 2024 describes the IT security situation in Germany as still tense. The increasing professionalization and specialization of cybercriminals is particularly worrying. The cybercriminal shadow economy has become more differentiated, with a clear division of labor between ransomware operators, their partners (affiliates), and so-called access brokers. The latter specialize in gaining access to compromised corporate systems and reselling this access for profit on underground platforms.

This development allows criminals to carry out their attacks more efficiently and more specifically – while simultaneously lowering the barriers to entry. Ransomware-as-a-Service now makes it possible to book complete extortion campaigns as a finished product – including malware, instructions, support, and profit sharing. Anyone who wants to attack no longer has to be a hacker, but merely a "user" with criminal intent.

The European Central Bank highlights in her Financial Stability Review (05/2025) reiterates the risks to financial stability – including information and communication technology (ICT) risks, ongoing geopolitical uncertainty, and the increasing dependence on digital infrastructures. systemic impact of cyberattacks on critical service providers, potential Spillover effects on third-party service providers and the growing importance of Resilience to operational shocks.

More than reaction: A European paradigm shift

That regulations such as DORA, NIS2 or updated national guidelines such as MaRisk are necessary is not just a narrative from regulators – it is a factual consequence.

Und: Many decision-makers in the financial sector welcome this development Indeed, uniform standards like DORA ensure clear requirements, comparable security levels, and fair competition – especially in an increasingly interconnected European financial market. Instead of a regulatory patchwork, a common framework is created that offers planning security and better safeguards investments in resilience.

Our view as a Trusted Advisor

What we know from numerous customer projects in the regulated sector:
Many companies are not faced with the question, ob they have to act – but how concrete.

Because the challenge lies not in insight, but in implementation:

  • What regulations apply to your setup?
  • Which requirements apply specifically – and where is there room for interpretation?
  • What steps have others successfully implemented?
 

As a partner familiar with both the technical depth and regulatory expectations, we help our clients To make commitments tangible and derive realistic measures from them – understandable, practical and compliance-safe.

Our role doesn't end with a report—it often begins right there. As a trusted hacking advisor, we guide our clients through complex regulatory requirements and translate them into concrete, realistic measures.

Especially in our collaboration with IT management and technical teams, we consciously focus on Knowledge transfer, direct communication and genuine partnershipInstead of anonymous PDF reports, we deliver comprehensible results, provide technical feedback at eye level, and transparently demonstrate how risks arise – and how they can be remedied.

 

The goal: Our customers should not only survive – but emerge stronger from the project.

IT regulations: Benefits for IT managers, CISOs and management with ProSec as a partner
Your advantages in complying with IT regulations in the financial sector with ProSec as your partner.

In the next section We show which regulations currently apply – and why similar companies sometimes have to meet very different requirements.

DORA, MaRisk or BSI Act – Which IT regulations apply to my company?

With the introduction of the EU Regulation DORA and the ongoing updating of national regulations such as MaRisk, BAIT or the BSI Act, many companies in the financial sector are faced with a complex question: Which regulatory requirements are binding for my company – and why don’t they apply equally to everyone?

In fact, the scope of many regulations does not depend solely on the industry, but on the specific Corporate structure, business activities and relevance for financial market stabilityTwo companies with similar offerings may therefore be subject to completely different obligations.

An example: A large payment service provider with a Europe-wide infrastructure is directly subject to the DORA Regulation and, starting in 2025, must, among other things, demonstrate comprehensive ICT risk management and conduct regular resilience tests. A small regional provider without critical interfaces, on the other hand, may (initially) only be subject to national requirements such as the BAIT or the BSI Act.

Another example: Two credit institutions may face different requirements in the context of MaRisk and BAIT due to different IT outsourcing and customer segments – for example, with regard to emergency management, reporting obligations or risk aggregation.

These differences make it clear: a blanket classification is hardly possible.

An overview of the most important regulations, typical company forms and concrete implementation priorities can be found in our Executive Summary on regulatory requirements in the financial sector.

From MaRisk to DORA: Development of IT regulation in the financial sector

Many regulations in financial supervision follow a gradual development process: from individual national requirements to uniform European frameworks. This is particularly evident Change using the example of IT-related requirements for banks and financial institutions. while the B.A.I.T. (Banking supervisory requirements for IT) based on the MaRisk (Minimum requirements for risk management) in Germany has long served as a central orientation, is now established with DORA (Digital Operational Resilience Act) is now a uniform standard across Europe – binding for everyone.

Related regulations such as VAIT, KAIT and ZAIT also follow the same principle: They are national derivatives of the BAIT for specific types of companies and are becoming increasingly less relevant with the full implementation of DORA. Nevertheless, they formally remain in place – most of them until the end of 2026 – and continue to shape the design of many ICT security measures.

What is important here is that DORA does not radically replace these guidelines, but rather builds on them in terms of content. Existing structures and implementations were not in vain – on the contrary: they often form the foundation for an efficient implementation of the new requirements. DORA is not a theoretical set of rules from the drawing board, but rather a practical development of existing standards. Those who have already dealt with BAIT & Co. don't have to start from scratch – they can build on existing measures.

The following overview shows the most important milestones in the development of regulatory IT security requirements:

Development of regulatory requirements for IT in the financial sector and outlook.
From MaRisk to DORA: Increasing standardization of risk management and resilience in IT in the financial sector.

The developments of the last 20 years make one thing clear: expectations of digital resilience are rising – and with DORA they are becoming binding.

DORA ushers in a new era of traceability – it is no longer just a question of ob Measures exist, but whether they work in an emergency.

What this means in concrete terms is shown by the current look at practice – and at the level of maturity of implementation.

Resilience test instead of checklist:
How financial regulators assess IT security today

Cyber incidents are no longer hypothetical threats – they are part of everyday life in the financial industry. The supervisory authority’s reaction: Tests should not only document, but also prove that protective mechanisms also work under real pressure. practical resilience tests in focus – with realistic attack simulations instead of theoretical simulation games and a focus on the Interaction of technology, processes and people.

A look at the current BSI 2024 status report shows that although many critical infrastructure companies in the financial and insurance sectors have already documented information security systems (ISMS), the maturity levels make it clear that there is often a lack of regular effectiveness testing and targeted further development.

Less than half of the assessed financial companies achieve maturity level 4 or 5 in the ISMS area – the area where not only documentation takes place, but also real-world testing and improvement takes place. The path from maturity level 3 to 4 is not a formal step, but rather a strategic shift: from theory to a lived security culture.

ISMS maturity levels of critical infrastructure companies in the financial and insurance sectors. Source: BSI 2024 Management Report.
ISMS maturity levels in the financial sector: Many are on the right track, but less than half of KRITIS companies conduct regular audits.

The good news: The transition from maturity level 3 to 4 is challenging – but an advanced level targeted resilience tests achievable. Many companies remain mediocre – but those who want true resilience need realistic tests. They close the crucial gap between theory and practice – and start exactly where many still stall today.

What exactly characterizes resilience tests?

Testing in compliance with regulations –
but please with a sense of reality.
Our experts develop realistic attack scenarios,
conduct simulation-based tests and deliver
analyzable results for your management.
Plan resilience tests with ProSec

Resilience tests in practice –
why they achieve more than traditional audits

Audits are based on checklists, documents, and rules. They check whether processes, guidelines, and configurations have been formally implemented correctly.

Resilience tests go one step further:
They simulate real attacks, emergency scenarios or critical disruptions – and thus test systems, processes and teams under real conditionsThe aim is not only to ensure compliance with the rules, but Resilience in practice to prove.

Typical test forms:

  • Penetration test: Controlled attack on systems or applications
  • TLPT (Threat-Led Penetration Testing): Realistic attack simulations based on current threat scenarios – mandatory from 2026 for particularly critical companies according to DORA
  • Red Teaming: Holistic attack simulation with the aim of remaining undetected
  • Tabletop Exercises: Role-playing crisis simulation for decision-makers and incident teams
 

A structured overview of the differences, requirements and possible applications of penetration tests and TLPT can be found in our Whitepaper Penetration Testing vs. TLPT.

Whether it is a technical attack, human error or process failure – resilience tests reveal what traditional audits often do not show: How well an organization really functions in an emergency.

And that is exactly why Regulatory authorities in Europe are increasingly relying on these testing formats. While audits primarily document, MaRisk, BAIT and DORA today require proof of effectiveness – under real conditions.

Why resilience testing is becoming the new standard

A clear trend is emerging in financial supervision: from reactive control framework to active resilience strategy. The reason:

  • Growing attack surface through hybrid infrastructures, third-party providers and cloud solutions
  • Increasing complexity in supply chains and regulatory responsibility
  • Frequency and professionalism real cyber attacks
 

Evidence from current regulations:

  • MaRisk amendment (2023) requires institutions to regularly test their emergency plans and protective measures and evaluate their effectiveness.
  • BAIT (2023) calls for regular, independent effectiveness tests of protective measures
  • DORA (since 2025) makes TLPT mandatory for certain companies
  • VAIT, KAIT, ZAIT contain similar requirements – tailored to the respective industry
  • BSI Act (Section 8a BSIG) obliges KRITIS companies to use and monitor attack detection systems
 

The common goal: Demonstrate resilience under real conditions – not just on paper.

What companies in the financial sector should know now:
Reality check instead of security illusion

What many companies underestimate: Cyberattacks do not comply with compliance requirements.
They target human errors, organizational weaknesses, and technical gaps in day-to-day business – not perfect documentation.

Resilience tests offer:

  • A realistic picture of the current security situation
  • Prioritization of vulnerabilities according to actual risk potential
  • Early warning of regulatory deficiencies before official review
  • Strategic insights to strengthen operational continuity


The ability to put yourself in the perspective of an attacker becomes a strategic asset.
Those who identify and test vulnerabilities early on, is not only compliant – but prepared.

What happens in the event of IT compliance violations?
Risks for banks, insurers & FinTechs

For companies in the financial sector, adhering to regulatory requirements in IT security is no longer a mere compliance exercise. Those who ignore the requirements or merely process them formally risk significantly more than a fine. Regulatory failures can develop into real threats for the entire company – with consequences for Reputation, business relationships, operational continuity and ultimately the Continuation of the business model.

The sanctions: fines, measures, reputational risks

Although the legal framework differs depending on the regulation – for example DORA, MaRisk, BAIT, VAIT, KAIT, ZAIT, the BSI Act or the GDPR – but they have one thing in common: non-compliance can lead to serious consequences.

  • DORA (EU 2022/2554, Art. 17 & 50): Violations of reporting obligations or testing requirements can lead to severe measures – up to and including public disclosure by the supervisory authority. This is particularly explosive for critical companies.
  • MaRisk & BAIT: Inadequate IT risk management may result in regulatory measures – up to and including the dismissal of managing directors (Section 25a, Section 36 KWG).
  • VAIT / KAIT / ZAITThese industry-specific requirements for insurance companies, asset management companies, and payment service providers follow the same principle as the BAIT. Here, too, the following applies: Failure to comply with the requirements risks regulatory action.
  • BSI Act (Section 8a BSIG): Operators of critical infrastructures that do not implement appropriate protective measures or attack detection systems must expect official orders and fines – and risk being perceived as an unsafe partner.
  • EU DSGVOIT security gaps and inadequate protection of personal data can result in fines amounting to millions of euros – in addition to a massive loss of trust and high-profile media coverage.
 

Reputational and market consequences: More than just a regulatory debate

For financial companies, a security incident, including regulatory failures, can cost them market access:

  • Customers lose trust. Trust is the most important asset, especially in the B2B environment of the financial world. A single incident can be enough to permanently lose partnerships or tenders.
  • Rating agencies react. Weaknesses in cyber and compliance strategies are increasingly influencing ESG assessments and financial ratings – with direct consequences for financing and investor confidence.
  • The market passes by. While other companies see cybersecurity as a strategic asset, regulatory minimums threaten to become a brake on innovation.

Proactive resilience instead of reactive damage limitation

What all these risks have in common is that they often only become apparent in an emergency. Those who only meet the minimum legally required remain in damage limitation mode.

However, anyone who recognizes that regulatory requirements such as DORA, MaRisk, BAIT, VAIT, KAIT or the BSI Act are practical levers for sustainable resilience, can actively use them – as an impulse for stronger security processes, better decision-making bases and resilient crisis capability.

An in-depth analysis of the DORA regulation – including concrete implementation requirements, strategic opportunities and a comparison of classic penetration tests vs. TLPT – can be found in our Deep dive into DORA implementation 2025.

Resilience is not just an IT goal – it is a management goal.

FAQ

While MaRisk and BAIT primarily focus on IT risk management and organizational requirements, DORA goes much further: for the first time, it calls for uniform, Europe-wide standards for security incidents, third-party risks, and simulation-based resilience tests (e.g., TLPT).

DORA applies to virtually all regulated financial institutions—banks, insurers, and FinTechs. However, simulation-based tests such as TLPT are only mandatory for "critical" institutions. The precise classification is determined by the supervisory authority. An early gap analysis is crucial.

These industry-specific requirements complement MaRisk but are regulated nationally. DORA is intended to largely replace them – by the end of 2025 at the latest. BaFin plans to repeal or harmonize them in phases. Proactive companies are already adapting.

The era of checklists is over. Regulators evaluate effectiveness, not just documentation. What's required are risk-based protection measures, meaningful tests, and robust evidence—ideally through independent penetration tests or simulations.

 

The range extends from fines to the dismissal of managing directors (Section 25 of the German Banking Act). Particularly critical are violations of DORA reporting obligations or failure to detect attacks under Section 8a of the German Federal Banking Act (BSIG). In addition, there are reputational damages, ESG downgrades, and market losses.

Internal assessments often only capture known risks or are based on formalistic specifications. Our external tests follow real-world attack scenarios and deliver more than just technical findings: They reveal where regulatory gaps exist – and how they can be closed. Instead of mere audit reports, companies receive implementable action plans that combine technical reality with compliance requirements. This creates reliable evidence for regulators, protects against audits – and sustainably increases resilience.

Relevant terms related to IT regulation in the financial sector

Digital Operational Resilience Act – EU regulation on digital resilience in the financial sector

Minimum requirements for risk management for banks (BaFin circular)

Industry-specific IT requirements for banks, insurers, asset management companies, payment service providers

Obligation to detect attacks for KRITIS companies in the BSI Act

 

Threat-Led Penetration Testing – simulation-based resilience testing with an attacker perspective

Risks from information and communication technology – in the focus of DORA, MaRisk, etc.

Analysis of whether internal processes already meet regulatory requirements

Resilience begins with a
Conversation at eye level
Would you like to know how your IT security can be strategically effective?
We help you plan the right measures – and develop your team into your most important resource when it comes to resilience.
Get non-binding advice now
Newsletter Form

Become a Cyber ​​Security Insider

Get early access and exclusive content!


OTHER CONTRIBUTIONS
watchguard-firebox-exploit
Critical firewall vulnerability CVE-2025-9242

The warning issued by the US agency CISA regarding the vulnerability CVE-2025-9242 in WatchGuard fireware systems once again highlights the dangers of a connected world. Businesses are potentially vulnerable to attack, even without authentication. This risk impacts overall business stability and trust. A proactive approach to addressing security vulnerabilities is urgently needed.

Read more "

Table of Contents

Do you have any questions or additions? bring it on!
Write a comment and we will reply as soon as possible!

Your email address will not be published. Required fields are marked with *.

Share your feedback and help us improve our services!

Share your feedback and help us improve our services!

Take 1 minute to give us some feedback. This way we can ensure that our IT security solutions meet your exact needs.

PSN_KU_Cover
NewsLetter Form Pop Up New

Become a Cyber ​​Security Insider

Subscribe to our knowledge base and get:

Early access to new blog posts
Exclusive content
Regular updates on industry trends and best practices


Please accept the cookies at the bottom of this page to be able to submit the form!