DORA and Credential Management: What Article 9 Demands Now

DORA credential – DORA’s Article 9 makes strong authentication and least-privilege credential controls a legal requirement for EU financial firms—so compliance is now about proof, not promises.
When attackers log in with real credentials, they don’t look like intruders—they look like staff.
For EU financial institutions, that reality is now baked into law.. DORA’s Article 9, in force since January 17, 2025, treats credential security as a binding financial risk control.. The focus keyphrase for readers is clear: **DORA credential management**—because under DORA. it’s not enough to “have MFA.” You also need tight access limits. proper authentication mechanisms. cryptographic key protection. and audit evidence you can produce quickly.
Article 9 sits inside DORA’s ICT risk framework (connected to Article 6) and explicitly targets “Protection and Prevention.” In practical terms. it pushes institutions to interrupt the most common path attackers use to gain a foothold: stolen usernames and passwords.. Credential-based access is often the start of a long, quiet intrusion rather than an immediate, noisy breach.. That matters because operational resilience is measured by continuity—how long a threat can stay active without being identified. and whether it can expand before you even recognize the problem.
Several current breach patterns underline why Article 9 is so strict about identity and access.. Stolen credentials remain a major initial access vector across industries. and financial institutions face some of the highest costs per incident—especially when attackers linger. move laterally. and elevate privileges while appearing legitimate.. The operational timeline described in breach analyses—long dwell times before detection and additional delay before containment—translates directly into resilience risk.. DORA is designed for that exact scenario: the threat that keeps functioning under the radar until it disrupts systems and workflows.
DORA’s wording turns that security reality into enforceable requirements.. Article 9(4)(c) requires policies that limit logical access to information and ICT assets strictly to what is needed for approved functions.. That is least-privilege access in legal language.. Article 9(4)(d) requires strong authentication mechanisms based on relevant standards. backed by dedicated control systems. plus protection measures for cryptographic keys aligned with approved classification and ICT risk assessments.. MFA is therefore not a “nice to have”—it is part of the compliance backbone.
What “strong authentication” means operationally is where many institutions still stumble.. If you rely on SMS or TOTP-only one-time passwords. you may meet a baseline expectation for some internal policies—but DORA’s intent is to reduce success rates from modern credential and phishing workflows.. Phishing-resistant approaches such as FIDO2/WebAuthn are widely deployed as a way to blunt real-time credential capture and adversary-in-the-middle techniques.. The key point for **DORA credential management** is that authentication strength must match today’s attack tooling. not last year’s checklists.
DORA also pushes institutions to treat privileged access as a resilience issue, not merely an IT concern.. Article 9 doesn’t name privileged access management tools directly. but its requirements map neatly to the functions those tools provide—reducing standing privileges. tightening access workflows. and ensuring that sensitive accounts are protected and monitored.. Just-in-time provisioning. privileged credential vaulting. and session controls all help convert credential theft from a broad operational threat into a constrained. faster-to-detect event.
The operational-resilience lens is also why credential compromise is different from a typical “security incident” narrative.. When credentials are stolen, the attacker doesn’t need to exploit a vulnerability.. They can operate as a legitimate user—probing systems, escalating privileges, and mapping critical infrastructure over time.. That invisibility is the reason identity controls sit at the center of resilience planning.. DORA’s approach is essentially a shift from reacting to disruptions toward preventing sustained access that keeps business systems functioning for the attacker.
There’s also a third-party reality that financial firms can’t ignore.. DORA places obligations on ICT third-party risk, which means a vendor’s weak authentication posture can become your compliance problem.. If a critical provider suffers a credential-based breach and those credentials are used to reach downstream systems. the pathway into your environment may never start with an exploit against your own network.. Instead, the “breach” begins in someone else’s identity layer.
This is where evidence matters as much as controls.. DORA doesn’t just require implementation—it creates supervisory expectations around documentation and provable governance.. Under DORA’s incident reporting framework, certain events trigger strict timelines, including early notifications and follow-up reporting.. If credential controls aren’t measurable and auditable. a delayed or incomplete response can turn an avoidable access-control failure into a regulated reporting burden.
A compliant **DORA credential management** program is typically built around four pillars that reinforce each other: phishing-resistant MFA. least-privilege access (including rapid offboarding and reduced standing privileges). secure credential vaulting for passwords and sensitive tokens. and continuous monitoring that can spot suspicious patterns early.. Each pillar reduces the chance of unauthorized access. but the bigger win is operational: shrinking dwell time and limiting lateral movement once credentials are compromised.
The remaining question for many institutions is execution—how you centralize credential storage. enforce authentication consistently. manage access at scale. and produce audit logs that survive scrutiny.. For teams navigating DORA’s Article 9 expectations. the practical demand is straightforward: controls must be demonstrable. not theoretical. and they must work across the identity surfaces where credentials live—service accounts. shared administrative credentials. and privileged workflows.
Passwork positions itself around that evidence-and-execution gap by offering a self-hosted credential management approach designed to keep credential data within an institution’s own infrastructure.. It also emphasizes MFA support for enterprise environments. role-based access and least-privilege controls tied to directory groups. structured credential inventory and controlled sharing. and tamper-evident audit logs that can support compliance documentation and integrations into security monitoring workflows.. For regulated organizations, this is the difference between “we have a policy” and “we can export proof quickly.”
DORA has effectively reframed credential management as a financial resilience requirement.. Article 9(4)(c) and Article 9(4)(d) convert common identity best practices into legal expectations—especially around least privilege. strong authentication. and cryptographic key protection.. The best time to validate your controls is before the audit question becomes a regulator’s question.. And under DORA. being ready is not only technical—it’s also about having the right documentation on hand. ready to show.