DORA Compliance for Container-Based Workloads: What Financial Sector Engineers Need to Know

By
Debra Hopper
April 17, 2026

The Digital Operational Resilience Act (DORA), or Regulation (EU) 2022/2554, came into effect on 17 January 2025. Unlike a directive, it required no national transposition: it applies directly, uniformly, and is already being enforced. Financial entities across the EU have structured their compliance programmes around DORA's five well-known pillars. What's received less attention is how DORA compliance applies to containerised infrastructure.

Container images are Information and Communications Technology (ICT) assets under DORA. The open-source libraries inside them are third-party software components that the regulation explicitly requires you to track. Your CVE posture is auditable evidence of whether your ICT risk management obligations are being met. Most container estates aren't ready for that level of scrutiny.

This guide is written for two audiences that both have skin in this game. First, platform and DevSecOps engineers at financial entities who need to understand what DORA requires of their container infrastructure. Second, engineers at ICT vendors who are building and shipping software into the financial sector, where DORA compliance is increasingly a contractual precondition for doing business.

DORA vs NIS2: What's the Difference?

DORA and NIS2 are often mentioned in the same breath; both are EU regulations addressing cybersecurity resilience, and many organisations fall under the scope of both. The key difference is scope and depth. 

NIS2 is a broad directive covering critical sectors including energy, transport, and financial infrastructure, setting baseline requirements for incident reporting and supply chain security. DORA applies directly and uniformly across all EU member states without national transposition and, while narrower in sector scope (financial entities only) is significantly more prescriptive in its technical requirements.

For container infrastructure, DORA sets the higher bar. Where NIS2 establishes general cybersecurity obligations, DORA specifies exactly how financial entities must manage ICT risk, test operational resilience, and govern third-party technology providers. If your organisation is subject to both, meeting DORA's requirements will generally satisfy the overlapping NIS2 obligations as well.

DORA's Five Pillars, As They Apply to Containers

DORA organises its requirements into five areas. Three of them have direct implications for container security:

  • ICT risk management framework (Articles 5–13). The core obligation: identify, protect, detect, respond to, and recover from ICT risks. This is where asset inventory, vulnerability management, and patch currency live.
  • Digital operational resilience testing (Articles 24–27). Mandatory vulnerability assessments, open-source analysis, and software security reviews. What's in your images, and what CVEs remain, is directly in scope.
  • ICT third-party risk management (Articles 28–44). Financial entities must only contract with ICT providers that meet DORA's security standards. For ICT vendors, this is the clause that makes security posture a commercial requirement, not just a best practice.

The other two pillars, DORA incident reporting and information sharing, are less directly shaped by container image hygiene; though a well-maintained container estate makes incident scoping and response significantly faster.

Containers are ICT assets, and DORA treats them that way.

DORA defines an ICT asset as any "software or hardware asset in the network and information systems" used by a financial entity. Container images are software assets by that definition. Every image running in your production environment is an ICT asset that falls inside DORA's compliance scope.

This has practical consequences that most container security conversations don't address:

Article 8 Requires Continuous Asset Inventory

Article 8 mandates that financial entities "identify, classify and adequately document all ICT assets" and maintain inventories that are "updated periodically and every time any major change occurs." That's not an annual spreadsheet exercise. For container workloads, it means knowing exactly what images are running, what packages they contain, and when that inventory last changed.

The RTS Calls Out Open-Source Libraries Explicitly

The Regulatory Technical Standards published under DORA go further than the regulation text itself. They explicitly require financial entities to "track the usage of third-party libraries, including open source, used by ICT services supporting critical or important functions" and to monitor version changes and available updates.

The packages inside your base images are open-source third-party libraries. Every Python package, every C library, every utility bundled into that image is a component the RTS expects you to know about and track over time. Without a package-level inventory of your images, meeting this requirement is not possible.

"Continuous Basis" Means Ongoing, Not Periodic

Article 8(2) uses the phrase "on a continuous basis" when describing the obligation to identify cyber threats and ICT vulnerabilities. This is deliberate. A quarterly vulnerability scan doesn't satisfy DORA. New CVEs are disclosed daily; a container image that was clean on Monday may have a known exploited vulnerability by Thursday. Continuous risk identification means the gap between a CVE disclosure and your awareness of its impact on your image estate needs to be measured in minutes, not weeks.

Mapping DORA Regulation Requirements to Container Security Controls

The table below maps the DORA articles most relevant to container workloads to specific security controls required for DORA compliance. This is the framework auditors will implicitly apply when reviewing your ICT risk management posture.

DORA Article Requirement Container Security Control
Art. 8: ICT Asset Identification & Inventory Identify, classify, and maintain a continuous inventory of all ICT assets, including software components Signed SBOMs providing package-level inventory of every image, continuously updated
Art. 8(2): Continuous Risk Identification On a continuous basis, identify cyber threats and vulnerabilities relevant to ICT assets Real-time CVE feeds with exploitability-based prioritization and alerts when an image is newly affected
Art. 9: Protection & Prevention Documented patch and update policies and protection of ICT assets against threats Continuously rebuilt images keep packages current without manual intervention, while minimal images reduce exploitable surface area
Art. 25: Resilience Testing Vulnerability assessments, open-source analysis, and software security reviews as part of the resilience testing programme Hardened images with benchmark attestations provide audit-ready evidence of security posture, and near-zero CVE counts simplify testing scope
Art. 28: Third-Party ICT Risk Financial entities may only contract with ICT providers meeting DORA security standards Hardened images, signed SBOMs, and CIS/NIST compliance reports are the artefacts financial sector clients require from ICT vendors

The sections below expand on each requirement and what meeting it actually looks like in a containerised environment:

DORA Article 8: Asset Identification

A container image is not a single ICT asset; it's a collection of ICT assets. The image itself, every OS package it contains, every runtime dependency, every third-party library: all of these are software components that exist inside your production infrastructure. DORA's asset management requirement reaches all the way down.

A Software Bill of Materials (SBOM) is the mechanism for meeting this requirement. An SBOM is a machine-readable inventory of every component inside an image, including package names, versions, provenance, and dependency relationships. 

Under DORA, SBOMs are not a best practice borrowed from software supply chain guidance; they are the artefact that makes Article 8 compliance demonstrable. Without them, you cannot prove to an auditor that you know what's in your ICT asset inventory.

DORA Article 8(2): Continuous Risk Identification

Identifying vulnerabilities is one requirement; staying current with new disclosures is another. A CVE published today against a library in one of your images represents an ICT risk that Article 8(2) expects you to know about, continuously. The challenge with containers is that a single base image change can affect dozens of downstream services simultaneously.

The practical requirement here is a CVE intelligence feed that maps new disclosures against your actual image inventory in real time, and that prioritises by exploitability rather than raw severity score. A CVSS 9.8 vulnerability with no known exploit and no reachable attack path in your environment is less urgent than a CVSS 7.2 with active exploitation in the wild. DORA's risk-based framing supports exactly this kind of prioritisation.

DORA Article 9: Protection and Prevention

Article 9 requires documented patch and update policies as part of the ICT protection framework. For container workloads, this translates to two complementary controls:

  • Patch currency through continuous rebuilds: Images that are built once and left running accumulate CVE debt as new vulnerabilities are disclosed against their component packages. A patch policy that relies on manual rebuild triggers or periodic schedules will always have exposure windows. Images that are rebuilt automatically whenever an upstream package changes maintain currency without those gaps.
  • Attack surface reduction through minimal images: Standard public registry images include shells, package managers, build tools, and OS utilities that production workloads never use, but which represent real attack surface. Minimal images remove everything non-essential. If a package isn't present, it can't be the vector for a compromise that you then have to report under DORA's incident management requirements.

DORA Article 25: Resilience Testing

DORA's resilience testing framework requires vulnerability assessments, open-source analysis, and software security reviews at a minimum. For financial entities running containerised workloads, the CVE profile of your images is a direct input to that testing programme.

An image estate with hundreds of known CVEs across hundreds of images creates a testing programme that is expensive to scope, slow to remediate, and difficult to report on clearly. An image estate built on hardened, minimal images with near-zero CVEs and benchmark attestations already in place substantially reduces that burden and produces cleaner, more defensible test results. Benchmark alignment against recognised standards like CIS Controls and NIST also provides the security review documentation the testing programme requires and strengthens your overall DORA compliance posture.

DORA Article 28: Third-Party ICT Risk 

This is the article with the most direct commercial implication for ICT vendors building software that runs in financial sector environments. Article 28 states that financial entities "shall manage ICT third-party risk as an integral component of ICT risk" and may only engage ICT service providers that meet appropriate security standards.

In practice, this means financial sector procurement teams are asking ICT vendors for evidence of security posture as a condition of contract, and increasingly, that evidence needs to be specific and auditable. Generic security questionnaires and SOC 2 reports are a starting point; what financial sector clients are increasingly asking for are:

  • SBOMs for the software components their vendor is shipping into their environment
  • CVE reports showing current vulnerability posture of container images
  • Evidence of alignment with recognised security benchmarks
  • Documentation of patching cadence and how quickly new CVEs are addressed

ICT vendors who can produce this evidence quickly (because it's generated automatically rather than assembled under audit pressure) have a meaningful competitive advantage in regulated markets.

The Open-Source Library Tracking Requirement: A Specific DORA Hook

The DORA RTS requirement to track open-source library usage is worth its own attention because it's specific, underappreciated, and directly actionable. The exact language requires tracking "the version and possible updates" of third-party libraries in ICT services supporting critical or important functions; this means not just knowing they exist, but monitoring them over time.

For containerised services, this means:

  • Every package in every image needs to be inventoried with version information
  • Changes to those packages (new versions, security updates, deprecations) need to be tracked
  • When a new CVE affects a package version you're running, that connection needs to surface automatically

A signed SBOM per image, continuously regenerated as images are rebuilt, is what this requirement looks like in practice. The SBOM is the inventory; continuous rebuilds keep it current; a CVE intelligence feed completes the loop by connecting new disclosures back to the SBOM data. Together, these three capabilities cover the open-source tracking requirement in a way that's audit-ready by default, not assembled retrospectively when an auditor asks.

What Auditors and Supervisory Authorities Will Look For

DORA enforcement sits with the European Supervisory Authorities: the EBA, ESMA, and EIOPA, as well as national competent authorities for each member state. Critical ICT Third-Party Providers face direct oversight from the ESAs. For container workloads, here is what that DORA compliance oversight looks like in practice.

For Financial Entities

  • ICT asset inventory completeness: Can you enumerate every image in production and its full component manifest? Is that inventory current, not a snapshot from last quarter?
  • Open-source library tracking evidence: For services supporting critical functions, can you demonstrate that you know which open-source packages are running, at which versions, and that you're monitoring for updates?
  • Patch currency documentation: When was each image last rebuilt? What known CVEs remain, and what is the documented rationale for their current remediation priority?
  • Benchmark alignment: Are your images built to recognised security standards? Can you provide a report demonstrating this, rather than simply asserting it?
  • Continuous monitoring evidence: How are you alerted when a new CVE affects a running image? What is your documented response time from disclosure to remediation?

For ICT Vendors

  • Security artefacts for due diligence: Financial entity clients will request SBOMs, CVE reports, and benchmark attestations during vendor assessment. The ability to produce these on demand is increasingly the difference between winning and losing regulated-sector contracts.
  • Contractual security requirements: Article 30 requires ICT contracts to include specific security provisions. Vendors who can point to specific, verifiable compliance controls satisfy these provisions far more convincingly than those relying on general security assurances.
  • Audit cooperation: Article 28 gives financial entities the right to audit their ICT providers. Having your security posture documented and accessible makes those audits faster and less disruptive.

How Minimus Addresses These Requirements

Minimus is purpose-built to solve the container security compliance problem and support DORA compliance by default. Whether you're a financial entity managing internal infrastructure or an ICT vendor demonstrating security posture to financial sector clients, Minimus's capabilities map directly to DORA's container-relevant requirements and produce the compliance artefacts auditors ask for as a matter of course, not as a manual effort.

Hardened Images with Near-Zero CVEs

Minimus provides hundreds of hardened, minimal container images built from source with the latest security patches. By removing everything not required by the workload (shells, package managers, build tools, unused OS packages) Minimus images address DORA's Article 9 protection requirements at the foundation. 

The result is a dramatically reduced attack surface and a CVE profile that makes both continuous risk monitoring and resilience testing substantially simpler. Customers achieve over 97% reduction in container CVEs compared to standard public registry images.

Signed SBOMs for Every Image

Every Minimus image comes with an automatically generated, cryptographically signed SBOM. The package-level inventory demanded by DORA's Article 8 asset management requirement and the RTS open-source tracking obligation is present by default for every image, without additional pipeline configuration. For financial entities, this is the audit artefact that proves ICT asset inventory depth. For ICT vendors, it's the document financial sector procurement teams are increasingly requesting as standard.

CIS and NIST Benchmark Compliance with Native Reporting

Minimus images are built and validated against CIS Controls and NIST standards. Compliance posture is visible directly in the Minimus web console, with native reporting that makes benchmark alignment demonstrable in seconds. For DORA's Article 25 resilience testing requirements, this is the difference between having to assemble security review documentation under audit pressure and having it available on demand. The reporting is built in, no manual evidence collection required.

Continuously Rebuilt from Source

Minimus images are rebuilt from source automatically whenever an upstream package changes. This is not a scheduled process; it's continuous. When a package receives a security update, the image is rebuilt, the SBOM is regenerated, and the updated image is available. For DORA's Article 9 patch and update policy requirements, this is patch currency implemented at the infrastructure level rather than as an operational process that depends on someone remembering to trigger a rebuild. The CVE debt that accumulates in manually maintained image estates simply doesn't build up.

Real-Time CVE Intelligence with Exploitability Prioritisation

Minimus maintains a real-time feed of CVEs and automatically alerts you when a new vulnerability affects one of your images. CVEs are prioritised by exploitability, not just CVSS score, so the remediation queue reflects actual risk rather than raw severity counts. For DORA's Article 8(2) continuous risk identification requirement, this closes the loop between CVE disclosure and operator awareness. The documented response timeline that auditors ask for is a natural output of a system that tracks which CVEs affected which images and when.

The ICT Vendor Advantage

For ICT vendors building software that runs inside financial institutions, Minimus's compliance artefacts, including signed SBOMs, CIS/NIST benchmark reports, exploitability-prioritised CVE dashboards, are precisely what financial sector security assessments require. Being able to produce this evidence at the start of a procurement conversation, rather than scrambling to assemble it during vendor due diligence, is a meaningful differentiator in markets where DORA cybersecurity standards apply.

Getting DORA-Ready for Containers: Where to Start

Whether you're working through internal compliance or preparing for financial sector client scrutiny, meeting DORA regulation requirements for container infrastructure requires following the same steps:

  1. Audit your current image estate: Inventory what images are running, where they come from, and when they were last updated. Run a CVE scan across the estate. For most organisations, the results are a compelling argument for action.
  2. Ensure SBOMs are available for all images: Package-level inventory is the foundation of DORA's asset management and open-source tracking requirements. Every image in a production environment,especially those supporting critical or important functions,needs an up-to-date, signed SBOM.
  3. Replace public registry images with hardened alternatives: Switching base images is the highest-leverage action available. It eliminates the majority of CVEs at source, reduces the open-source tracking burden, and produces a testing baseline that is far easier to defend under audit.
  4. Establish continuous patch currency: Images that were built clean will drift as new CVEs are disclosed. Continuous rebuilds from source eliminate that drift. A fixed-schedule rebuild process will always have exposure windows; DORA's 'continuous basis' language doesn't accommodate them.
  5. Implement exploitability-based CVE triage: The volume of CVEs across a typical container estate makes raw severity-based triage unworkable. A prioritisation system that surfaces actively exploited CVEs affecting your specific images gives your team a manageable, risk-appropriate workload.
  6. Build your audit evidence now, not when asked: Compliance reports, benchmark alignments, SBOM archives, and CVE response records should be a live, continuously maintained output of your security tooling. Assembling them retrospectively under audit pressure is both stressful and unconvincing.

DORA Compliance Starts at the Container Layer

For financial entities, the DORA’s requirements for continuous ICT asset inventory, open-source library tracking, patch currency, and vulnerability management all reach directly into the container layer. For ICT vendors, the same requirements shape what financial sector clients need to see before they’ll sign contracts and what auditors will ask for once they have.

The container security gap is one of the most addressable parts of a DORA compliance programme. Hardened images, automated SBOMs, continuous rebuilds, and real-time CVE intelligence are the specific controls that close it, and they produce the audit artefacts that make compliance demonstrable, not merely asserted.

Get Started with DORA-Ready Container Security

Minimus reduces container CVEs by over 97% and delivers the signed SBOMs, benchmark attestations, and real-time CVE intelligence your DORA compliance programme requires, making compliance easier to achieve, demonstrate, and maintain for financial entities and the ICT vendors who serve them. Explore how this approach works in practice by scheduling a demo.

Debra Hopper
Marketing
Sign up for minimus

Avoid over 97% of container CVEs

Access hundreds of hardened images, secure Helm charts, the Minimus custom image builder, and more.