Skip to main content
FORTISEU
ReferenceNIS2DORAGDPR

What Is Compliance Reporting? A Detailed Guide

12 minUpdated 2026-03-18

Detailed guide to compliance reporting covering report types (internal, regulatory, board-level), EU reporting requirements under NIS2, DORA, and GDPR, dashboard design, KPI selection, and reporting automation strategies.

Key Takeaways
  1. 1

    Compliance reporting serves three audiences — operational teams, regulators, and the management body — and each requires a different report design with appropriate granularity and frequency.

  2. 2

    DORA's 4-hour initial incident notification is the tightest EU reporting timeline. Build reporting capability to this standard, and NIS2 and GDPR timelines will be satisfied automatically.

  3. 3

    Select KPIs that measure compliance outcomes (control effectiveness rate, remediation cycle time) rather than activities (number of policies reviewed, controls tested).

  4. 4

    Automate evidence collection before automating report generation. The reliability of the evidence pipeline determines the trustworthiness of every downstream report.

  5. 5

    Establish reporting governance with defined ownership, data quality validation, and immutable archival to ensure reports serve as reliable regulatory evidence over time.

1. What Is Compliance Reporting?

Compliance reporting is the structured process of collecting, analysing, and communicating information about an organisation's adherence to applicable laws, regulations, standards, and internal policies. It serves three interconnected purposes: demonstrating compliance status to regulators and auditors, informing management decision-making about compliance investments and risk acceptance, and providing operational visibility to compliance teams managing day-to-day obligations. In the EU regulatory landscape, compliance reporting has evolved from a periodic audit-preparation exercise into a continuous function driven by real-time data.

The scope of compliance reporting extends beyond simply documenting whether controls exist. Effective reporting communicates the operational effectiveness of those controls, identifies trends in compliance posture over time, highlights emerging risks from regulatory changes or operational shifts, and quantifies the residual risk that management has implicitly accepted. For organisations subject to multiple EU frameworks, reporting must also communicate the interaction between frameworks — a control gap that affects NIS2, DORA, and GDPR simultaneously carries compounded risk that single-framework reporting would obscure.

Compliance reporting quality directly affects supervisory outcomes. When competent authorities examine an organisation under NIS2 Articles 32-33 or DORA Article 50, they assess not only the existence of compliance measures but the organisation's ability to demonstrate and explain those measures. Organisations with mature compliance reporting can respond to supervisory requests rapidly and accurately, which builds regulatory confidence. Organisations that scramble to compile evidence in response to examination requests signal systemic weakness in their compliance management — even if the underlying controls are adequate.

Compliance reporting quality directly affects supervisory outcomes. Organisations that can respond to regulatory examination requests rapidly and accurately build confidence with competent authorities — those that scramble to compile evidence signal systemic weakness.

2. Types of Compliance Reports

Compliance reports fall into three primary categories, each serving a distinct audience and purpose. Internal operational reports provide compliance teams and control owners with the detailed data they need to manage compliance activities. These include control testing results, exception logs, remediation tracking, evidence collection status, and policy review schedules. Operational reports are granular, frequent (weekly or continuous), and action-oriented — they drive the day-to-day work of maintaining compliance. The key design principle for operational reports is actionability: every data point should connect to a responsible owner and a defined workflow.

Regulatory reports are formal submissions to competent authorities, supervisory bodies, or designated CSIRTs as required by law. Under NIS2, these include the incident notifications mandated by Article 23 (early warning within 24 hours, incident notification within 72 hours, final report within one month) and any evidence submissions requested during supervisory examinations under Articles 32-33. Under DORA, regulatory reports include the register of information for ICT third-party arrangements (Article 28(3)), major ICT-related incident reports (Article 19), and resilience testing results where required by competent authorities. GDPR requires data breach notifications to supervisory authorities within 72 hours under Article 33, data protection impact assessment results where processing is high-risk (Article 35), and records of processing activities available on request (Article 30). Each regulatory report has prescribed content, format, and timeline requirements that your reporting process must meet precisely.

Board-level reports provide the management body with the strategic compliance picture needed to fulfil their oversight obligations. Under NIS2 Article 20, the management body must oversee cybersecurity risk-management measures — this requires regular reporting on compliance posture, material risks, incident trends, and remediation progress. Under DORA Article 5(2), the management body defines, approves, and oversees the ICT risk management framework — which requires reporting on framework effectiveness, ICT risk exposure, and third-party risk posture. Board-level reports must balance comprehensiveness with conciseness: directors need enough information to exercise meaningful oversight without being overwhelmed by operational detail.

3. EU Reporting Requirements Across Frameworks

Understanding the specific reporting obligations across NIS2, DORA, and GDPR is essential for designing a reporting process that satisfies all requirements without duplication. NIS2's reporting requirements centre on incident reporting (Article 23), registration with competent authorities (Article 27), and evidence production during supervisory examinations (Articles 32-33). The incident reporting cascade — 24-hour early warning, 72-hour notification, one-month final report — is the most operationally demanding obligation and requires pre-built templates, tested escalation procedures, and designated reporting personnel available outside business hours.

DORA's reporting requirements are more extensive. The register of information for ICT third-party arrangements under Article 28(3) must be maintained continuously and made available to competent authorities on request. The ESA Implementing Technical Standards prescribe the exact data fields, taxonomies, and format for this register — deviation from the prescribed format is non-compliant. DORA incident reporting under Article 19 follows a similar cascade to NIS2 but with a 4-hour initial notification window from classification (compared to NIS2's 24 hours from awareness), intermediate report within 72 hours, and final report within one month. For entities subject to both NIS2 and DORA, the DORA reporting obligations apply as lex specialis — but where NIS2 imposes additional obligations not covered by DORA, those NIS2 obligations remain.

GDPR reporting obligations operate on a different axis. The Article 33 breach notification to supervisory authorities requires notification within 72 hours of becoming aware of a personal data breach — unless the breach is unlikely to result in a risk to natural persons' rights and freedoms. Article 34 requires notification to affected data subjects without undue delay when the breach is likely to result in high risk. Beyond incident-triggered reporting, GDPR requires ongoing documentation through records of processing activities (Article 30), data protection impact assessments for high-risk processing (Article 35), and evidence of compliance with all GDPR principles available on request. Your reporting architecture must accommodate both event-driven reports (incidents, breaches) and continuous-state reports (processing records, compliance posture).

DORA's 4-hour initial incident notification window is significantly tighter than NIS2's 24-hour early warning. Entities subject to both frameworks must build reporting capability to the tighter DORA timeline — the NIS2 obligation will be satisfied automatically.

4. Dashboard Design and KPI Selection

Compliance dashboards translate raw compliance data into visual intelligence for decision-makers. Effective dashboard design starts with the audience: an operational dashboard for the compliance team prioritises completeness and drill-down capability, while a board-level dashboard prioritises trend visibility, risk heat mapping, and exception highlighting. Avoid the common mistake of presenting the same dashboard to all audiences — a dashboard that satisfies a compliance analyst will overwhelm a board member, and a dashboard that satisfies a board member will leave a compliance analyst without actionable detail.

Select KPIs that measure outcomes rather than activities. The number of policies reviewed is an activity metric; the percentage of policies reviewed on schedule is an outcome metric. The number of controls tested is an activity metric; the control effectiveness rate (percentage of controls that passed testing) is an outcome metric. For multi-framework environments, framework-specific compliance scores provide a structured view: what percentage of NIS2 Article 21 measures are fully implemented and tested, what percentage of DORA requirements across all five pillars are evidenced, what is the GDPR processing activity documentation coverage. Combine these framework scores with cross-cutting metrics: mean time to remediate control exceptions, percentage of evidence collected automatically versus manually, and trend in compliance posture over rolling quarters.

Design dashboards with a hierarchy: summary view, domain view, and detail view. The summary view shows aggregate compliance posture across all frameworks with red-amber-green indicators for each framework and for cross-cutting domains (incident management, access control, supply chain). The domain view allows drill-down into a specific framework or domain to see individual control statuses, exception counts, and remediation timelines. The detail view shows individual control evidence, test results, and ownership. This hierarchical design serves all audiences: board members stay at the summary level, the compliance officer works at the domain level, and control owners operate at the detail level. Ensure the dashboard refreshes from live data — stale dashboards erode trust faster than no dashboard at all.

5. Automation of Compliance Reporting

Manual compliance reporting does not scale. As regulatory obligations multiply and supervisory expectations tighten, organisations that rely on spreadsheet-based evidence collection and manual report compilation face escalating operational costs and declining report reliability. Automation addresses both problems: it reduces the labour required to produce compliance reports and it improves accuracy by eliminating manual data transcription errors and ensuring reports reflect current system states rather than point-in-time snapshots that may be weeks old by the time they are compiled.

Automate evidence collection first, as this produces the highest return on investment. Integrate your compliance management system with the source systems that generate compliance evidence: identity providers (for access review data), vulnerability scanners (for security posture data), SIEM platforms (for logging and monitoring evidence), HR systems (for training completion records), and change management tools (for change control evidence). Each integration replaces a manual evidence collection task with an automated feed, and the aggregated data powers both operational and board-level reporting without additional effort. Prioritise integrations by evidence volume — controls that require monthly or quarterly evidence collection across many systems benefit most from automation.

Build automated report generation for recurring regulatory submissions. DORA's register of information, for example, must be maintained continuously and produced on demand in the ESA-prescribed format. Automating the register's compilation from your vendor management and contract management systems ensures it is always current and format-compliant. NIS2 incident reporting templates can be pre-populated with system data (affected assets, user counts, service impact assessments) so that the reporting officer completes only the narrative elements during an actual incident. GDPR breach notification templates can pull processing activity records and affected data subject counts from your data mapping tools. The goal is not to eliminate human judgment from compliance reporting — it is to eliminate human data entry so that judgment is applied to analysis and decision-making rather than to copy-pasting numbers between systems.

Automate evidence collection before automating report generation. Automated reports built on manually collected evidence still contain stale or inaccurate data — the evidence pipeline must be reliable before the reporting layer can be trusted.

6. Reporting Governance and Quality Assurance

Compliance reports inform critical decisions — supervisory responses, board risk acceptance, resource allocation — and therefore require governance over their production quality and reliability. Establish a reporting governance framework that defines report ownership (who is accountable for each report's accuracy), review and approval workflows (who validates the data before distribution), distribution rules (who receives which reports and at what classification), and retention policies (how long reports are stored and how they are protected).

Data quality is the foundation of reporting credibility. Implement validation checks at each stage of the reporting pipeline: automated data completeness checks when evidence is collected (does the evidence cover all required controls?), consistency checks when data is aggregated (do the numbers reconcile across source systems?), and reasonableness checks when reports are generated (does a 100% compliance score genuinely reflect reality, or does it indicate a testing gap?). The most dangerous compliance report is one that presents a false positive — an artificially clean picture that leads the management body to believe compliance is achieved when it is not. Build quality assurance into the process, including periodic independent validation of reported metrics against source data.

Archive all compliance reports with immutable timestamps and version control. Regulatory examinations may request historical reports to assess compliance trajectory over time. Board minutes should reference specific report versions. Audit trails should show who produced, reviewed, and approved each report. This archival discipline transforms compliance reports from disposable documents into part of the organisation's regulatory evidence base — and demonstrates the systematic, ongoing nature of your compliance programme to supervisory authorities who will assess whether your compliance is a sustained capability or an episodic effort.

Frequently Asked Questions

How frequently should compliance reports be produced?

Frequency depends on the report type and audience. Operational reports should be continuous or weekly, providing compliance teams with current data to manage day-to-day activities. Management reports should be monthly, summarising compliance posture, exception trends, and remediation progress. Board-level reports should be quarterly at minimum to satisfy NIS2 Article 20 and DORA Article 5(2) oversight obligations — though material incidents or significant compliance changes should trigger ad-hoc board reporting outside the regular cadence. Regulatory reports follow prescribed timelines: NIS2 incident reports within 24 hours/72 hours/1 month, DORA incident reports within 4 hours/72 hours/1 month, GDPR breach notifications within 72 hours.

What are the essential KPIs for EU compliance reporting?

Essential KPIs include: framework compliance scores (percentage of requirements fully implemented and tested per framework), control effectiveness rate (percentage of controls passing testing), mean time to remediate exceptions (average days from exception identification to closure), evidence automation rate (percentage of evidence collected automatically versus manually), policy review completion rate (percentage of policies reviewed on schedule), and incident response time (time from detection to initial regulatory notification). These KPIs should be tracked as trends over rolling quarters to demonstrate continuous improvement — a static high score is less convincing to supervisors than a rising trajectory from a lower starting point.

How do we handle conflicting reporting timelines across NIS2, DORA, and GDPR?

Build your reporting process to the tightest applicable timeline and you will satisfy all less stringent requirements automatically. For incident reporting, DORA's 4-hour classification-to-notification window is the most demanding — an organisation that can meet this timeline will easily satisfy NIS2's 24-hour and GDPR's 72-hour windows. For ongoing compliance reporting, align your cadence to the most frequent requirement across frameworks and produce framework-specific views from the common data set. The DORA register of information requires continuous maintenance; NIS2 evidence must be available on supervisory demand; GDPR records must be current on request. A unified compliance management system that maintains current data satisfies all three requirements simultaneously.

What level of detail should board-level compliance reports contain?

Board-level reports should provide strategic visibility without operational granularity. Include: aggregate compliance posture per framework (with trend arrows showing trajectory), material exceptions and their remediation status, significant incidents and regulatory interactions since the last report, emerging regulatory changes and their expected impact, and resource or investment needs for compliance programme evolution. Limit board reports to 3-5 pages or a single dashboard view with supporting detail available on request. The management body's obligation is to oversee and challenge, not to manage — reports should enable oversight-level engagement, not replace the compliance team's operational management.

Ready to Operationalise This?

Turn this guide into working compliance workflows. Create an account or schedule a personalised demo.