# DORA Article 9: Why Credential Management Is Now a Financial Regulation Requirement
The European Union's Digital Operational Resilience Act (DORA) fundamentally shifts how financial institutions approach cybersecurity. Unlike previous regulations that treated security as a best practice, DORA codifies operational resilience as a legal obligation—and Article 9 makes authentication and access control the foundation of that requirement.
For financial entities operating across the EU, this isn't optional. Non-compliance carries significant penalties, and security failures in credential management can trigger regulatory investigations, substantial fines, and reputational damage. Yet many organizations still treat password policies and access controls as IT hygiene rather than risk governance.
## What Is DORA and Why It Matters
The Digital Operational Resilience Act, which entered force on December 16, 2022, and applies across all EU27 member states plus EEA countries, represents the most comprehensive operational resilience mandate in financial regulation to date. It applies to all financial entities—banks, investment firms, insurance companies, credit unions, and even fintech platforms—with assets above certain thresholds.
DORA's core philosophy is straightforward: operational resilience failures cascade into systemic financial risk. When a bank's authentication system fails, customer accounts are compromised. When access controls are weak, insider threats materialize. When credential compromise goes undetected, entire enterprise networks become vulnerable.
The regulation sets three foundational pillars:
Article 9 sits squarely in the first pillar, establishing that authentication and access control are not discretionary security features—they are mandatory risk controls.
## Article 9: The Regulatory Requirements
Article 9 mandates that financial entities implement and maintain comprehensive policies and procedures for:
| Requirement | Scope | Key Obligation |
|-------------|-------|-----------------|
| Multi-factor authentication (MFA) | All privileged access, remote access, critical operations | No single-factor authentication for sensitive functions |
| Encryption of credentials | At rest and in transit | No plaintext storage or transmission |
| Access control frameworks | Role-based, segregation of duties | Principle of least privilege mandatory |
| Credential lifecycle management | Creation, rotation, revocation, audit | Documented procedures for all phases |
| Password policies | Minimum standards for complexity and rotation | Compliance with NIST or equivalent frameworks |
| Monitoring and logging | All authentication events, unauthorized access attempts | Real-time alerting for anomalies |
The regulation applies regardless of organization size. A regional credit union faces the same Article 9 requirements as a major bank—though the implementation may scale differently.
Critically, DORA doesn't specify *how* organizations must implement these controls. Instead, it sets outcomes: financial entities must demonstrate that authentication and access control are effective, monitored, and subject to continuous improvement.
## Technical Realities of Credential Management Failures
When credential management breaks down—and DORA investigations have documented numerous failures—the consequences are measurable and severe.
### Common Failure Patterns
Weak authentication defaults: Many organizations deploy systems with default or easily-guessable administrative credentials, then fail to change them during deployment. Attackers routinely scan financial sector networks for open management interfaces running default credentials. Once inside, they pivot laterally using harvested credentials from compromised workstations.
Credential reuse across systems: A single compromised employee password becomes a skeleton key to multiple systems. Without segregated credentials for different systems, a breach of one resource cascades into full infrastructure compromise.
Missing MFA on critical functions: Even with strong passwords, accounts without MFA remain vulnerable to phishing and credential stuffing attacks. Financial regulations increasingly recognize this—DORA Article 9 effectively mandates MFA for any access that could facilitate unauthorized transactions or data exfiltration.
Insufficient credential rotation: Credentials that persist for months or years represent extended exposure windows. If a password is compromised and never rotated, attackers maintain persistent access across multiple quarters.
Inadequate logging and alerting: Many organizations log authentication events but never analyze them. Hundreds of failed login attempts might be recorded but never reviewed. An attacker conducting reconnaissance generates observable patterns—if anyone is looking.
### A Real-World Scenario
Consider a European investment firm that suffered a credential-based breach in 2024:
Regulatory outcome: The firm faced a €2.8 million administrative fine, mandatory security remediation, and a six-month period of enhanced supervision. Under DORA, a similar incident today could result in substantially higher penalties and mandatory disclosure to customers.
## DORA Enforcement and Compliance Verification
The European Banking Authority (EBA), European Securities and Markets Authority (ESMA), and European Insurance and Occupational Pensions Authority (EIOPA) oversee DORA compliance. These regulators increasingly conduct on-site examinations that specifically audit credential management practices:
Non-compliance findings result in corrective action orders with specific timelines. Violations can lead to:
## Implications for Financial Organizations
DORA Article 9 has three immediate implications:
1. Credential management is now a governance issue, not just a technical issue. Financial institutions must document their authentication and access control policies at the board level. This elevates credential management from IT operations into risk governance conversations where compliance, audit, and business leadership have visibility.
2. Legacy systems require urgent modernization. Many financial platforms—particularly core banking systems deployed 10+ years ago—lack modern authentication controls. Patching these systems to meet DORA requirements often requires significant investment and planning.
3. Third-party suppliers become regulatory exposure. If a financial institution relies on external vendors for critical systems, DORA's supplier rules (Article 28-30) extend credential management requirements to those vendors. A weak authentication system at a payment processor or cloud provider becomes the financial institution's compliance problem.
## Practical Recommendations
Organizations should prioritize:
## Conclusion
DORA Article 9 transforms credential management from a technical implementation detail into a financial regulation compliance requirement. The EU is signaling that operational resilience depends fundamentally on controlling who has access to what, and financial regulators will increasingly verify this through examination and enforcement.
For organizations still treating authentication as a checkbox exercise rather than a risk control, DORA creates both urgency and clarity: credential management failures now carry regulatory and financial consequences measurable in millions of euros, enhanced supervision, and reputational damage.
The competitive advantage—and the compliance path forward—belongs to organizations that embed strong authentication into their operational resilience strategy today.