DORA just got a UK handshake: the EU – UK ICT oversight pact is a warning shot for third-party risk

If your business depends on a small set of shared providers like cloud, identity, payments, or data platforms, your operational resilience risk is no longer just a “your firm” issue. It’s a system wide dependency. Regulators are now shifting supervision to where that risk sits: at the provider level, not just inside each regulated company.…

Ava Kernan Avatar
European Union and United Kingdom flags waving in the wind against a blue sky

If your business depends on a small set of shared providers like cloud, identity, payments, or data platforms, your operational resilience risk is no longer just a “your firm” issue. It’s a system wide dependency. Regulators are now shifting supervision to where that risk sits: at the provider level, not just inside each1 regulated company.

On 14 January 2026, EU and UK authorities signed a Memorandum of Understanding (MoU) to cooperate and exchange information on oversight of critical Information and Communications Technology (ICT) third-party providers that sit across both jurisdictions.  

Translation: if a provider is “critical” to the EU under DORA law and also matters to UK financial stability under the UK’s CTP framework, supervision is meant to be more coordinated and less siloed. 

What is a Memorandum of Understanding (MoU)?

Quick point on the MoUs. They’re explicitly not legally binding, so it does not create new legal powers by itself. However, it still matters because it formalizes how supervisors coordinate, share information, and avoid the classic failure mode where everyone assumes “the other regulator has it covered.”2

“The MoU establishes clear principles and procedures for cooperation, information sharing and coordination of oversight activities.” 

EOPA 

EU’s DORA law and the UK’s CTP framework explained 

Now the context you need upfront.  

Under DORA, certain Information and Communications Technology (ICT) third-party service providers can be designated “Critical ICT Third-Party Service Providers” (CTPPs) and put under an EU oversight framework led by a “Lead Overseer.”  

Similarly, under the UK regime, HM Treasury can designate “critical third parties” (CTPs) where disruption could threaten UK financial stability or confidence, and UK regulators set resilience expectations for those providers.  

Different legal mechanics, same outcome: systemic ICT dependency cannot be managed firm-by-firm anymore.  

The effects of this EU UK ICT oversight pact in reality  

Why this matters is straightforward. When disruption hits, regulators increasingly do not care that your business had a policy, a contract clause, or an annual questionnaire.  

“This is not a box ticking exercise.” 

FCA 

Instead, they want to know about what you actually tested, what broke, who signed off on the risk, what evidence you can produce, and how fast you fixed the problem. 

That’s the shift we’re watching at CoreStream GRC: from third-party risk as procurement to third-party risk as operational accountability. In practice, this is where risk management tools and risk assessment software either prove their value or get exposed as box-ticking. 

“A fundamental reframing of third-party risk management; from a procurement and compliance function into an enterprise resilience capability.” 

Michael Rasmussen, GRC2020 Founder and Pundit 

What changes after this pact? 3 things tend to follow. 

  1. First, the same major provider will face more scrutiny from multiple regulators at once, with more pressure to align oversight, so providers cannot exploit gaps between jurisdictions. 
  1. Second, firms will be expected to show that their controls are consistent across regions. If your UK setup is tighter than your EU setup (or vice versa), that inconsistency becomes a governance problem, not a local preference. This is where strong governance, risk and compliance (GRC) platforms  matter, because you need one view of controls, testing, issues, and remediation across the business. 
  1. Third, there’s a bigger push toward provider-level resilience and concentration risk. The question is not only “are our internal controls good enough?” It’s “what happens to us, and to everyone else, if this one vendor goes down?”  

That puts vendor risk management software under pressure to show real operational insight: dependencies, testing evidence, failure scenarios, and tracked remediation, not just due diligence artifacts. 

DORA vs UK CTP oversight: same direction, stronger enforcement 

On the EU side, DORA’s oversight model is designed to get close to how the provider actually operates. Supervisors can request information, run investigations, carry out inspections, and issue recommendations that reach into subcontracting arrangements. In some cases, that can include asking a provider to pause new subcontracting deals until specific risks are addressed. This is a big shift for anyone relying on third party risk management software and a risk management system to monitor vendor controls, because the regulator’s lens is increasingly on the provider’s real-world setup, not just what the customer firm collects in due diligence. 

And DORA has real enforcement behind it. It allows for periodic penalty payments that can be imposed daily, up to a % of a provider’s average daily worldwide turnover within the limits set by the Regulation, to compel compliance by a critical ICT third-party provider.  

This is not “naming and shaming.” It is a lever designed for providers that ignore supervisory measures. That changes the stakes for risk and compliance software and compliance software more broadly, because evidence, issue tracking, and remediation timelines stop being internal hygiene and start being supervisory-grade expectations. 

On the UK side, the direction is similar, but it is framed through operational resilience standards for Critical Third Parties. UK supervisors have been clear that they want proof of resilience, not just written intent.  

That means scenario testing, incident simulations, and practiced response plans. If you are serious about this, incident management software and incident reporting software need to connect to business continuity planning in a way that produces clear evidence of what was tested, what failed, and what was fixed. 

Pool Re Risk case study download

The wider trend looking beyond the UK 

The wider trend is obvious once you look past the first contract. The hard problems sit in the subcontracting chain and fourth parties, where services are layered, accountability gets blurry, and the blast radius of an outage expands fast.  

Supervisors globally have been signaling this for years, especially on cloud concentration and third-party dependency risk. This is exactly where vendor risk management software and third-party risk management software either gives you real visibility, or it just stores PDFs. 

A quick reality check across other regions shows the same trajectory.  

In the US, regulators have pushed a lifecycle model for third-party relationships: planning, due diligence, contract negotiation, ongoing monitoring, and termination, with clear board and senior management accountability throughout.  

In the Middle East, outsourcing regimes often set strong baselines too, including minimum standards, auditability, and the principle that risk ownership stays with the regulated entity, for example through UAE Central Bank outsourcing requirements and SAMA outsourcing rules.  

Different labels, same direction: outsourced tech is treated as core risk, not admin. That is why a risk management system, audit management system, and compliance management software increasingly need to work together, because oversight is moving from paperwork to provable operational control. 

What resilience and third-party leaders should do now 

If you want this to land as a practical close, keep it tight and specific: 

  • Map critical services to providers at service-impact level, not just vendor registers. 
  • Treat fourth parties as first-class citizens: require visibility, controls, and exit thinking. 
  • Build an evidence model (tests run, outcomes, decisions, remediation trails), not a document library. 
  • Assume “one provider, multiple regulators”: define internal owners and response playbooks now. 
  • Move from annual reviews to continuous oversight for truly critical dependencies. 

As EU and UK supervisors start comparing notes, the bar is getting brutally simple: show how a critical service stays up, how you know, and what you changed when it did not.  

The teams that cope will be the ones who can pull evidence fast, clearly, and consistently across regions: who own the dependency, what was tested, what failed, what was fixed, and when. That level of proof is hard to run from documents and spreadsheets once you have dozens of critical third parties and constant change.  

CoreStream GRC is built for that reality, keeping ownership, controls, testing evidence, and remediation history in one place so you can answer the question regulators actually ask, not the one your policy was written for.

 

FAQ on the EU UK ICT MoU, DORA and third party risk

What is the EU–UK ICT oversight Memorandum of Understanding (MoU)?

The EU–UK ICT oversight MoU is an agreement between EU supervisory authorities and UK financial regulators to cooperate and share information on oversight of critical ICT third-party providers. It focuses on coordination, especially during incidents such as cyber attacks or major service outages, rather than creating new legal powers.

Is the EU–UK ICT MoU legally binding?

No. The MoU is not legally binding and does not create new regulatory powers. Its importance lies in how it formalizes cooperation between regulators, reduces supervisory gaps, and supports coordinated oversight of providers that are critical across both jurisdictions.

How does this MoU relate to DORA?

Under DORA, certain ICT third-party providers can be designated as Critical ICT Third-Party Service Providers and placed under EU-level oversight. The MoU supports cooperation between EU and UK authorities when a provider falls within both DORA’s scope and the UK’s critical third-party framework.

What is the UK Critical Third Party (CTP) regime?

The UK CTP regime allows HM Treasury to designate third-party providers whose disruption could threaten UK financial stability or confidence. Regulators then set operational resilience expectations for those providers, focusing on real-world testing, incident response, and service continuity.

Why does fourth-party risk matter more now?

Fourth-party risk increases complexity and obscures accountability. Services are often layered through subcontractors, meaning a single outage can cascade across multiple providers. Regulators increasingly expect firms to understand and manage these downstream dependencies, not just direct vendors.

Further reading and references

  1.  Global regulators tighten rules on banks outsourcing services | Reuters  ↩︎
  2. see full MoU:  
    https://www.fca.org.uk/publication/mou/mou-fca-boe-pra-esa-critical-third-parties.pdf   ↩︎
  • From compliance to confidence: a practical guide to a proactive always on data privacy program

    From compliance to confidence: a practical guide to a proactive always on data privacy program

    Most large organizations say they have privacy covered. And on paper, they do. In practice, privacy often lives as disconnected work: documents, templates, and one-off reviews that prove something happened once, not a system that controls what happens next. That gap matters because privacy risk is created by change. A new analytics use case. A…

  • DORA just got a UK handshake: the EU – UK ICT oversight pact is a warning shot for third-party risk

    DORA just got a UK handshake: the EU – UK ICT oversight pact is a warning shot for third-party risk

    If your business depends on a small set of shared providers like cloud, identity, payments, or data platforms, your operational resilience risk is no longer just a “your firm” issue. It’s a system wide dependency. Regulators are now shifting supervision to where that risk sits: at the provider level, not just inside each regulated company.…

  • Beyond the checkbox: A value‑based guide to enterprise conflict of interest management

    Beyond the checkbox: A value‑based guide to enterprise conflict of interest management

    The conflict-of-interest wake-up call Most organizations do have a conflict of interest (COI) policy.  What they actually have, in practice, is this:  Legacy GRC will tell you that’s “good coverage.” It isn’t. It’s paperwork.  Conflicts of interest rarely blow up because they were hidden. They blow up because they were normalized, misunderstood, or never escalated until after a decision was made and challenged.  If you’re trying to run effective value-based…