Digital Operational Resilience Testing under DORA
Complete guide to the TIBER-EU framework
Threat-Led Penetration Testing (TLPT) is an advanced cybersecurity test that simulates real attacks conducted by sophisticated malicious actors (APT - Advanced Persistent Threats).
🎯 Objective: Assess the financial entity's ability to detect, respond to and recover from a targeted and sophisticated cyberattack.
| Aspect | Traditional Pentest | TLPT / TIBER-EU |
|---|---|---|
| Objective | Find technical vulnerabilities | Test resilience against targeted real-world attacks |
| Approach | Standardized test checklist | Scenarios based on real threat intelligence |
| Scope | Technical (IT/network/apps) | Holistic (IT + personnel + physical + processes) |
| Duration | 1-4 weeks | 6-12 months (preparation + test + analysis) |
| Teams | Pentesters | Red Team (attackers) + Blue Team (defenders) + White Team (arbiters) |
| Intelligence | General vulnerability knowledge | Threat Intelligence specific to financial sector |
| Detection | Declared tests, Blue Team informed | Blue Team not informed, "blind" test |
| Cost | €10k - €50k | €100k - €500k+ |
⚠️ TLPT IS NOT MANDATORY FOR ALL ENTITIES
Only entities identified as "significant" by their supervisor are subject to the mandatory TLPT every 3 years.
| Criterion | Indicative Threshold | Sector |
|---|---|---|
| Size | Total assets > €30 billion | Banks |
| Interconnection | Market infrastructures (CCP, CSD, etc.) | All |
| Systemic Importance | G-SIBs, O-SIIs | Banks |
| Cross-border Activity | Operations in ≥ 5 Member States | All |
| Activity Volume |
• Banks: >500k retail clients • Insurance: >1M policyholders • PSP: >10M transactions/year |
Variable |
💡 For others: TLPT remains highly recommended as best practice, but not legally mandatory.
Threat Intelligence-Based Ethical Red-Teaming
European Central Bank Framework
TIBER-EU is the framework developed by the ECB that defines the standardized methodology for conducting TLPT tests in the European financial sector.
Advantages of TIBER-EU:
Responsible: Financial entity + Supervisory authority
Actions:
Responsible: Financial entity
Actions:
💡 Indicative costs:
Responsible: White Team + External Providers
Actions:
Responsible: Threat Intelligence Provider
Actions:
Example Threat Intelligence Scenario:
Scenario: APT group "FIN7" (sophisticated cybercriminal)
Objective: Customer data theft and fraudulent transfers
Initial vector: Spear-phishing targeting finance employees
Tools: Custom malware + RDP exploitation
TTPs: Lateral movement via Active Directory, privilege escalation, exfiltration via encrypted channels
Responsible: Red Team
Actions:
Responsible: Red Team (attack) vs. Blue Team (defense)
⚠️ CRITICAL PHASE - "Blind" test
Red Team Actions:
Blue Team Role (SOC/CERT):
💡 The Blue Team does NOT know a test is ongoing! They must react as to a real incident.
White Team Role (Arbiters):
Responsible: White Team + Red Team + Blue Team
Actions:
Responsible: White Team + External Providers
Actions:
| Aspect Evaluated | Good (✅) | Medium (⚠️) | Weak (🚫) |
|---|---|---|---|
| Detection time | < 24 hours | 24h - 7 days | > 7 days |
| Detection rate | > 80% of actions | 50-80% | < 50% |
| Response time | < 4 hours | 4h - 24h | > 24 hours |
| Containment effectiveness | Attack stopped before critical systems | Attack slowed but not stopped | Full access achieved |
| Crisis communication | Management informed quickly, DORA process activated | Delays in escalation | Failed communication |
| Recovery | Critical services restored in <RTO | Recovery >RTO | Unable to recover |
TLPT does NOT only test technology, but:
⏰ DORA Obligation: TLPT minimum every 3 years
First deadline for significant entities: Before January 17, 2028 (3 years after DORA entry into force)
| Phase | Duration | Cumulative Timeline |
|---|---|---|
| 1. Preparation | 2-4 weeks | Month 1 |
| 2. Provider selection | 6-8 weeks | Months 1-3 |
| 3. Scoping | 4-6 weeks | Months 3-4 |
| 4. Threat Intelligence | 6-8 weeks | Months 4-6 |
| 5. Red Team Preparation | 4-6 weeks | Months 6-7 |
| 6. Red Team Test | 8-12 weeks | Months 7-10 |
| 7. Closure | 2-4 weeks | Months 10-11 |
| 8. Reporting | 4-8 weeks | Months 11-12 |
| TOTAL | 9-14 months | ~1 year |
💡 Recommendation: Start planning at least 18 months before the deadline to have a margin in case of delays or need to redo phases.
| Expense Item | Low Range | High Range | Notes |
|---|---|---|---|
| Threat Intelligence Provider | €30,000 | €80,000 | TI Report + scoping assistance |
| Red Team Provider | €80,000 | €300,000 | Varies by scope and test duration |
| Internal White Team | €20,000 | €100,000 | Staff time (PM, security, legal) |
| External consultants (optional) | €0 | €50,000 | White Team support |
| Temporary infrastructure | €10,000 | €30,000 | Test environments, additional monitoring |
| Post-test remediation | €50,000 | €500,000+ | Identified fixes (highly variable) |
| TOTAL (excluding remediation) | €140,000 | €560,000 |
💡 Cost influencing factors:
→ The test loses all its value if defenders know they are being tested. Only the White Team (3-5 people max) should be aware.
→ Excluding systems out of fear creates blind spots. A real attacker will exclude nothing.
→ Letting the Red Team go all the way (within RoE limits) reveals the true level of resilience.
→ Identifying flaws is useless if no budget/timeline for correction is planned.
→ TLPT is an immense learning opportunity. Organizations that benefit most are those that integrate it into a continuous improvement approach.