Webinar: Database audits taking weeks? See how Liquibase Secure makes you audit-ready from day one.

DORA Compliance for Financial Services: Database Change Management Best Practices

Guide

Table of contents

Understanding DORA Compliance

The Digital Operational Resilience Act (DORA) establishes a comprehensive framework for digital operational resilience across EU financial entities. DORA requires organizations to implement robust ICT risk management, maintain secure digital operations, and oversee third-party service providers.

DORA applies from January 17, 2025 to banks, investment firms, insurance companies, payment service providers, and other financial entities within the EU, plus ICT service providers supporting their operations. Non-compliance can result in penalties up to 2% of total annual worldwide turnover for natural persons or €5 million (whichever is higher), and up to 1% or €1 million for legal persons, depending on the severity and nature of the breach.

Core DORA Requirements:

  • ICT risk management frameworks (Article 6)
  • Incident classification and reporting (Articles 17-20)
  • Digital operational resilience testing (Articles 24-27)
  • Third-party ICT risk management (Articles 28-30)
  • Information sharing arrangements (Article 45)

Database-Specific Requirements and Liquibase Secure Support

1. ICT Change Management (Article 8, paragraph 4)

Requirement: Financial entities must maintain policies and procedures for ICT change management, including changes to software, hardware, and components of ICT systems. All changes must be recorded, tested, assessed for potential impact, authorized, and deployed in a controlled manner.

How Liquibase Secure Supports This: Liquibase Secure embeds change governance directly into database delivery pipelines. Every database modification is tracked through version-controlled changelogs that serve as formal change records. Policy Checks validate changes against organizational standards before deployment. Flows automate approval workflows, ensuring changes follow documented procedures and receive proper authorization before reaching production environments.

2. Risk Assessment and Testing (Article 8, paragraph 5)

Requirement: All changes must be tested and assessed for risk in accordance with the ICT risk management framework. Changes to production environments require proper evaluation of operational impact and security implications.

How Liquibase Secure Supports This: Policy Checks assess database changes against security rules before deployment, identifying operations that could compromise system availability or confidentiality (such as privilege escalation, dropping tables, or disabling constraints). Flows enforce quality gates that require testing completion and stakeholder approval before production deployment. Drift Detection validates that deployed changes match intended configurations, confirming test results transferred correctly to production.

3. ICT Risk Management Framework (Article 6)

Requirement: Financial entities must establish a comprehensive ICT risk management framework covering identification, protection, detection, response, and recovery capabilities. The framework must address all ICT systems supporting critical or important functions.

How Liquibase Secure Supports This: Liquibase Secure addresses the five functional pillars for database environments. Structured Logging and audit trails support risk identification by documenting all change activity. Policy Checks provide protection by preventing unauthorized or risky modifications. Drift Detection enables continuous monitoring to detect unauthorized changes. Comprehensive audit logs support incident response and investigation. Rollback capabilities built into version-controlled change management enable recovery from failed or problematic changes.

4. ICT-Related Incident Management (Articles 17-20)

Requirement: Organizations must establish processes to monitor, log, categorize, and classify ICT-related incidents. Major incidents must be reported to competent authorities according to defined timelines, with initial notification, intermediate reports, and final reports containing root cause analysis.

How Liquibase Secure Supports This: Structured Logging captures detailed records of all database changes, including failed deployments and unauthorized modifications detected through Drift Detection. Audit trails document who initiated changes, when they occurred, what systems were affected, and what approvals were obtained. This forensic information supports incident classification, root cause analysis, and regulatory reporting. Exportable reports can be generated for regulatory submission, providing the evidence documentation authorities require.

5. Digital Operational Resilience Testing (Articles 24-27)

Requirement: Financial entities must conduct regular testing of ICT systems, including vulnerability assessments, scenario-based testing, and advanced testing programs for entities identified as significant by regulators. Testing must validate both preventive measures and recovery capabilities.

How Liquibase Secure Supports This: Version-controlled change management enables reliable testing of database recovery procedures. Teams can validate rollback capabilities by reverting changes in test environments. Drift Detection identifies configuration discrepancies between environments during resilience testing, ensuring test environments accurately reflect production configurations. Complete change history supports scenario-based testing by documenting system states before and after modifications.

6. Third-Party ICT Risk Management (Articles 28-30)

Requirement: Organizations must implement contractual arrangements, oversight mechanisms, and exit strategies for third-party ICT service providers. This includes ensuring third parties maintain appropriate security standards and provide necessary audit documentation.

How Liquibase Secure Supports This: When database changes involve third-party service providers, Liquibase Secure's audit trails document all modifications regardless of source. Policy Checks apply consistently to vendor-delivered changes, ensuring third-party modifications meet the same governance standards as internal changes. This provides the visibility and control needed for third-party oversight and supports contractual compliance verification.

Control Objective Matrix


DORA Control Objective
Liquibase Secure Capability
Evidence Output
Documented change procedures
Version-controlled changelogs + Flows
Change history logs, workflow records
Risk assessment before production
Policy Checks + quality gates
Policy violation reports, approval records
Incident detection and logging
Drift Detection + Structured Logging
Drift alerts, comprehensive audit trails
Recovery capability validation
Rollback + version control
Rollback test records, restoration logs
Third-party oversight
Audit trails + Policy enforcement
Vendor change logs, policy compliance reports
Continuous monitoring
Drift Detection + observability
Real-time monitoring data, drift reports

Best Practice Evidence Checklist for Auditors

Liquibase Secure provides auditors with exportable documentation:

  • Complete audit trail of database changes (who, what, when, where)
  • Policy enforcement logs demonstrating preventive controls
  • Approval workflow records showing authorization chains
  • Drift detection reports identifying unauthorized changes
  • Rollback execution logs validating recovery capabilities
  • Failed deployment records for incident investigation
  • Third-party change documentation for vendor oversight
  • Integration logs with SIEM or GRC platforms

Benefits Liquibase Secure Brings to DORA Compliance

Automated Governance and Documentation

DORA requires documented change management processes. Liquibase Secure automates documentation through version-controlled changelogs, structured audit trails, and policy enforcement logs. This reduces manual documentation burden while providing audit-grade evidence.

Integrated Operational Resilience

Rather than treating database changes as isolated technical tasks, Liquibase Secure integrates database governance into enterprise ICT risk management frameworks. This unified approach simplifies DORA compliance and improves overall operational resilience.

Accelerated Incident Response

Complete audit trails enable rapid investigation of database-related incidents. Teams can quickly determine what changed, who authorized modifications, and which systems were affected. This supports both incident response requirements and regulatory reporting obligations.

Preventive Risk Controls

Policy Checks enforce organizational standards before deployment, and Drift Detection continuously monitors for unauthorized changes. This proactive approach prevents many database-related operational incidents before they occur, aligning with DORA's emphasis on resilience over reactive response.

Third-Party Risk Visibility

Financial institutions working with third-party technology providers can extend governance controls to vendor-delivered database changes. This capability addresses DORA's third-party oversight requirements and reduces concentration risk in ICT service provider relationships.

Reduced Compliance Complexity

Liquibase Secure automates key DORA requirements related to database change management. This reduces manual compliance effort while improving control effectiveness and auditability.

DORA and the Future of Financial Services Technology

DORA reflects the EU's recognition that digital operational resilience is foundational to financial stability in modern financial institutions. As organizations accelerate digital transformation, robust ICT governance becomes essential for both regulatory compliance and business continuity.

Liquibase Secure supports this transformation by:

  • Enabling cloud adoption: Governance extends consistently across on-premises and cloud database environments
  • Removing delivery bottlenecks: Automated compliance checks accelerate safe database deployments
  • Reducing operational risk: Proactive controls prevent incidents rather than reacting to failures
  • Simplifying regulatory alignment: Automated evidence generation satisfies DORA documentation requirements

Integration with Other Financial Services Regulations

Financial institutions typically face multiple compliance requirements simultaneously. Liquibase Secure's governance capabilities support DORA alongside other regulatory frameworks:

  • EBA Guidelines on ICT and Security Risk Management: Supporting European Banking Authority requirements for operational resilience
  • PSD2 and PSD3: Strong customer authentication and secure communication for payment services
  • MiFID II: Transaction reporting and record-keeping for investment services
  • Basel III Principles for Operational Resilience: Supporting operational risk management frameworks
  • National regulations: UK Operational Resilience requirements, German BAIT, and other jurisdiction-specific mandates

Conclusion

DORA compliance requires comprehensive ICT change management, risk assessment, incident reporting, and resilience testing capabilities. Liquibase Secure embeds these requirements directly into database delivery pipelines, enabling financial institutions to satisfy regulatory obligations while maintaining delivery velocity.

By treating database change as a critical control point, organizations build the digital operational resilience that DORA mandates and modern financial services require. The result is not just regulatory compliance, but improved operational stability, faster incident response, and reduced risk across database operations.

Ready to achieve DORA compliance while accelerating database delivery? Learn how Liquibase Secure provides the governance, documentation, and resilience capabilities financial institutions need.

Get a Demo