DORA2026-02-1814 min read

TLPT Under DORA: The Complete Guide to Threat-Led Penetration Testing

TLPT Under DORA: The Complete Guide to Threat-Led Penetration Testing

Introduction

In the realm of European financial regulation, DORA (Directive on operational resilience for financial institutions) has set a new bar for cybersecurity practices. Specifically, Article 24 of DORA mandates financial entities to conduct regular penetration testing to assess their ICT systems' resilience and security. A common misinterpretation among organizations is treating this requirement as a mere formality, merely checking off boxes to satisfy regulators. However, this approach not only fails to address the true intent of the regulation but also exposes financial institutions to substantial risks. This article delves into the intricacies of Threat-Led Penetration Testing (TLPT) under DORA, explaining why it matters, what's at stake, and the value of understanding this requirement thoroughly.

The stakes are high for European financial services. Non-compliance can result in fines up to 2% of global annual turnover, as per Article 34 of DORA, operational disruption, and, most importantly, damage to reputation. Reading this guide will provide financial institutions with a comprehensive understanding of TLPT, enabling them to navigate DORA compliance effectively and securely.

The Core Problem

Threat-Led Penetration Testing (TLPT) is a critical component of an organization's cybersecurity strategy. However, many organizations approach it as a routine task, not realizing its depth and importance. The core problem lies in the superficial execution of TLPT, which fails to identify and mitigate the specific threats that could cause severe harm to the institution.

The real costs of such an approach are significant. For instance, a 2021 study by the European Banking Authority (EBA) indicated that the average cost of a security breach in the financial sector was approximately EUR 7.5 million, not including the long-term reputational damage. Time wasted on ineffective testing cycles can delay the identification of vulnerabilities, prolonging the exposure to risks. Moreover, the failure to meet regulatory expectations can lead to hefty fines and demerits in audits.

What most organizations get wrong is the assumption that penetration testing is a one-size-fits-all approach. They often overlook the context-specific nature of TLPT, which should be tailored to the unique threats faced by their organization. This misalignment with the actual threats is a direct violation of DORA's intent, as Article 24 emphasizes the need for testing that is "proportional to the nature, scale, and complexity of the institution's activities."

To put this into perspective, consider a financial institution that conducts generic penetration testing without considering the specific attack vectors relevant to its operations. If this institution were to be audited, the findings might reveal that the testing did not adequately cover critical systems, leading to a failure in compliance. This not only results in a potential fine of millions of euros but also undermines the trust of clients and stakeholders.

Why This Is Urgent Now

The urgency of addressing TLPT correctly under DORA is accentuated by recent regulatory changes and enforcement actions. As European financial institutions continue to digitize their services, they become increasingly exposed to cyber threats. Regulators are aware of this and have been ramping up enforcement to ensure that financial entities are prepared for these threats.

In addition to regulatory pressures, market and customer demands are also driving the need for robust cybersecurity practices. Customers are increasingly demanding certifications and evidence of compliance, making it a competitive necessity for financial institutions to demonstrate their commitment to security. Non-compliance or poor execution of TLPT can put an institution at a significant competitive disadvantage.

The gap between where most organizations are and where they need to be is concerning. A 2022 survey by the Ponemon Institute found that only 39% of financial services organizations felt their penetration testing was effective in detecting vulnerabilities. This indicates a significant portion of the market is not meeting the standards set by DORA, leaving them exposed to potential legal and operational risks.

In conclusion, Threat-Led Penetration Testing under DORA is not just a compliance checkbox but a critical aspect of an organization's operational resilience. Understanding the nuances of TLPT, its alignment with the specific threats faced by the organization, and the potential consequences of non-compliance is essential for European financial institutions. The next sections of this guide will provide a detailed exploration of the TLPT process, the role of AI in enhancing penetration testing, and practical steps for compliance.

The Solution Framework

Threat-Led Penetration Testing (TLPT) under Directive on Operational Resilience (DORA) presents a structured approach for financial institutions to address ICT risks proactively. Compliance with DORA Article 24 TLPT is not a static exercise; it's a dynamic and continuous process that necessitates a step-by-step solution framework.

Step 1: Understanding the Requirements

The first step involves a comprehensive understanding of DORA Article 24, which requires financial entities to perform penetration testing, including threat-led penetration testing. This is not merely about checking a box but ensuring the entity's resilience against evolving threats. "Good" compliance here means aligning the testing with the entity's risk profile and threat landscape rather than conducting generic tests. Just "passing" would be meeting the minimum requirements without considering the specificities of the entity.

Step 2: Establishing the Scope

Once the requirements are clear, the scope of TLPT should be established. This includes defining the assets to be tested, the threats to be simulated, and the objectives of the tests. The scope should be aligned with DORA's expectations for ICT risk management frameworks as stated in Article 6(1), which emphasizes the importance of a risk-based approach. A "good" approach would involve tailoring the scope to the entity's specific risks, while "just passing" might involve a one-size-fits-all scope that lacks depth and relevance.

Step 3: Developing a Testing Strategy

With the scope defined, the next step is to develop a testing strategy. This includes selecting the appropriate testing methods, tools, and techniques that align with the identified threats. As per DORA Article 6(1), the strategy must be part of the entity's overall ICT risk management framework. A "good" testing strategy will be adaptive, data-driven, and incorporate the latest threat intelligence, while "just passing" might involve a static approach that does not evolve with the threat landscape.

Step 4: Conducting the Tests

The actual conduct of the tests is a critical part of the solution framework. This includes executing the tests, documenting findings, and reporting on the results. DORA emphasizes the importance of testing the entity's capacity to prevent, detect, respond to, and recover from ICT incidents. A "good" testing process will be thorough, transparent, and provide actionable insights into vulnerabilities and potential mitigations. "Just passing" might involve minimal testing that does not uncover critical vulnerabilities or provide meaningful feedback.

Step 5: Implementing Remediation and Feedback Loop

After testing, the identified vulnerabilities must be addressed in a timely manner. This includes implementing remediation measures and incorporating feedback into the entity's ongoing risk management processes. Compliance with DORA Article 6(1) requires entities to have processes in place for the continuous improvement of their ICT risk management framework. A "good" approach will involve a robust incident response plan and a loop of continuous improvement, whereas "just passing" might involve a reactive approach with no systems in place for ongoing improvement.

Actionable Recommendations

  • Map your assets and systems to specific threats as identified by DORA Article 24.
  • Tailor your testing strategy to reflect the unique risk profile of your institution.
  • Ensure that your testing methods are aligned with the latest threat intelligence.
  • Develop a robust incident response plan that incorporates feedback from TLPT into your risk management processes.

Common Mistakes to Avoid

Based on real audit findings and compliance failures, here are the top mistakes financial institutions make when implementing TLPT under DORA:

Mistake 1: Lack of Tailored Approach

Organizations often make the mistake of not tailoring their TLPT approach to their specific risk profile. They may conduct generic tests that do not reflect the actual threats they face. This fails because DORA requires a risk-based approach to ICT risk management. Instead, institutions should map their assets to specific threats and conduct tests accordingly.

Mistake 2: Inadequate Reporting and Documentation

Another common mistake is inadequate reporting and documentation of TLPT findings. Some entities fail to document the details of the tests conducted, the vulnerabilities identified, and the remediation measures taken. This failure undermines the entity's ability to demonstrate compliance with DORA and to learn from its testing activities. Instead, institutions should maintain comprehensive records of their TLPT activities, including detailed reports and documentation.

Mistake 3: Lack of Integration with Risk Management

Financial institutions sometimes treat TLPT as a standalone exercise, separate from their broader ICT risk management framework. This approach fails because DORA emphasizes the need for an integrated approach to ICT risk management. Instead, entities should integrate their TLPT activities with their broader risk management processes, ensuring that the findings from TLPT inform their risk assessment and mitigation strategies.

What to Do Instead

  • Conduct a thorough risk assessment to identify the specific threats to your institution's ICT systems.
  • Tailor your TLPT approach to these identified threats.
  • Maintain comprehensive records of your TLPT activities, including detailed reports and documentation.
  • Integrate TLPT into your broader ICT risk management framework, ensuring that the findings from TLPT inform your risk assessment and mitigation strategies.

Tools and Approaches

When it comes to implementing TLPT, there are several tools and approaches that financial institutions can use:

Manual Approach

The manual approach to TLPT involves using manual techniques and tools to identify and test vulnerabilities. The pros of this approach include the ability to customize the testing to the entity's specific needs and the flexibility to adapt to new threats. However, the cons include the time and resource-intensive nature of manual testing and the potential for human error. This approach works best when the entity has a small number of systems to test and a skilled team to conduct the tests.

Spreadsheet/GRC Approach

Using spreadsheets or GRC (Governance, Risk, and Compliance) tools to manage TLPT can be effective for tracking and reporting on testing activities. However, the limitations of this approach include the potential for manual errors, the difficulty of integrating data from disparate sources, and the lack of real-time visibility into the entity's risk profile. This approach can be useful for managing the documentation and reporting aspects of TLPT, but it may not be sufficient for identifying and testing vulnerabilities in a dynamic threat landscape.

Automated Compliance Platforms

Automated compliance platforms, such as Matproof, can provide a more comprehensive and efficient approach to TLPT. These platforms offer several advantages, including the ability to automate the testing process, integrate data from disparate sources, and provide real-time visibility into the entity's risk profile. Matproof, for example, is built specifically for EU financial services and offers AI-powered policy generation in German and English, automated evidence collection from cloud providers, and an endpoint compliance agent for device monitoring. It also ensures 100% EU data residency, which is crucial for compliance with DORA's data protection requirements. However, while automation can help streamline the testing process and reduce the risk of human error, it is not a substitute for skilled human judgment. Automated platforms work best when combined with a skilled team that can interpret the results and make informed decisions about risk mitigation.

Honest Assessment

Automation can significantly help streamline TLPT processes, but it is not a silver bullet. It is most effective when used in conjunction with a skilled team that can interpret the results and make informed decisions about risk mitigation. While automation can reduce the time and resources required for TLPT, it cannot replace the need for a thorough understanding of the entity's specific risk profile and a well-designed testing strategy.

Getting Started: Your Next Steps

Now that you understand the importance and process of Threat-Led Penetration Testing (TLPT) under DORA, it’s time to translate knowledge into action. Here’s a five-step action plan to get you started this week:

  1. Assess Your Current Security Posture: Before diving into TLPT, you need to know your starting point. Conduct a preliminary risk assessment of your ICT systems. DORA Article 6(1) requires you to understand your ICT risks.

  2. Formulate a Security Testing Strategy: Based on your risk assessment, create a plan for your penetration testing. Identify the critical assets to be tested and the potential threats they face. DORA Article 24 emphasizes the need to simulate attacks to protect against them.

  3. Develop or Update Your Incident Response Plan: While performing TLPT, you’ll likely uncover vulnerabilities. Ensure you have a robust incident response plan in place to address any findings promptly. DORA Article 15 requires you to have a plan for ICT security incidents.

  4. Train Your Staff: Ensure your staff understands the importance of cybersecurity and their role in maintaining it. Training should cover the basics of threat-led penetration testing and its implications for the organization. DORA Article 11(1) requires awareness and training on ICT risks.

  5. Execute Your First TLPT: With everything in place, it’s time to conduct your first TLPT. Start with a small, less critical system to gain experience and confidence. As you grow more comfortable, expand your testing to more significant systems.

Resource Recommendations: For deeper insights, refer to official EU and BaFin publications, such as DORA itself, the European Banking Authority’s (EBA) guidelines on ICT risk, and BaFin’s circular on cybersecurity. These resources provide authoritative guidance on meeting regulatory requirements.

External Help vs. In-House: If you’re new to TLPT or lack the necessary expertise, consider hiring external consultants. They can provide valuable insights and help navigate the complexities of TLPT. However, if you have a strong in-house IT security team, performing TLPT in-house can provide valuable hands-on experience and control over the process.

Quick Win in 24 Hours: Start by reviewing your incident response plan. Ensure it aligns with DORA’s requirements and is up-to-date with the latest threat intelligence. This quick review can significantly enhance your readiness to respond to any vulnerabilities discovered during TLPT.

Frequently Asked Questions

  1. Q: How often should we conduct TLPT under DORA?

    A: DORA does not specify a frequency for TLPT. However, considering the evolving nature of threats, it’s recommended to conduct penetration testing at least annually, with more frequent testing for high-risk systems. DORA Article 24 emphasizes simulating attacks to protect against them, implying a need for regular testing.

  2. Q: Can we use the results of a penetration test for compliance with other regulations like GDPR or NIS2?

    A: Yes, the results of a TLPT can be used to demonstrate compliance with other regulations like GDPR (Article 32) and NIS2, which also require security testing and risk assessments. However, ensure the scope and depth of the testing meet the specific requirements of each regulation.

  3. Q: How do we ensure our TLPT is effective without revealing sensitive information to testers?

    A: Effective TLPT requires a balance between providing enough information for the testers and protecting sensitive data. Start with a limited scope and gradually expand it as trust and processes mature. DORA Article 24 emphasizes the need for protective measures, which includes safeguarding sensitive information during testing.

  4. Q: What are the consequences of failing to comply with DORA’s TLPT requirements?

    A: Non-compliance with DORA can lead to significant fines. Article 39 of DORA allows for penalties of up to 6% of the total annual turnover or up to €20 million for institutions that fail to meet their ICT risk management requirements, including TLPT.

  5. Q: How do we train our staff to understand and support TLPT without causing panic or confusion?

    A: Training should focus on the importance of TLPT for the organization’s security and its role in maintaining it. Use practical examples and scenarios to illustrate the process and its benefits. DORA Article 11(1) requires that staff are made aware of ICT risks, which can be achieved through tailored training programs.

Key Takeaways

  • Threat-Led Penetration Testing (TLPT) is a critical component of meeting DORA’s ICT risk management requirements.
  • Regular TLPT helps simulate and prepare for real-world attacks, enhancing your organization’s security posture.
  • Effective TLPT requires a balance between providing enough information for the testers and protecting sensitive data.
  • Non-compliance with DORA’s TLPT requirements can lead to significant fines.
  • Matproof, a compliance automation platform built specifically for EU financial services, can help automate the process of TLPT and other compliance tasks, making them more efficient and effective.

For a free assessment of your current security posture and how Matproof can help automate your compliance efforts, visit https://matproof.com/contact.

TLPTthreat-led penetration testingDORA TLPTDORA Article 24 TLPT

Ready to simplify compliance?

Get audit-ready in weeks, not months. See Matproof in action.

Request a demo