In our previous post, we have discussed the “transition” from TIBER to TLPT (Threat-Led Penetration Testing), highlighting some differences between the previous TIBER specification and the requirements as indicated by DORA. This is mostly just a change in terminology. We concluded however by stating that adopting TIBER-EU would help to fulfill DORA’s TLPT requirements and predicted a TIBER-EU 2.0 to be published for additional convergence. That day has come, so let’s take a look at the updated TIBER-EU framework, how it compares to the previous version, and how it incorporates the new regulatory requirements.
The 2018 version refers to “Critical Functions (CFs),” whereas the 2025 version uses “Critical or Important Functions (CIFs)”, as specified in DORA. What’s more interesting is the guidance on the number of CIF to be included in the scope: “a maximum number of 10 CIFs per tested entity is adequate” & “for each system in scope, the CT should set at least one “flag” to be captured during the test”.
The updated version provides a more extensive overview of the responsibilities of the different stakeholders, in particular for the TIBER Cyber Team (TCT) and Test Manager (TM), whose role is more prominent. In addition, the requirements and limitations for use of internal testers is also detailed, since this was a novel idea under DORA TLPT. There is also the recommendation to have at least an experienced external RT test manager join the internal testers to bring a fresh and independent perspective to the test.
Previous version already explained “cross-jurisdictional” testing for geographically dispersed entities that would include authorities from different jurisdictions in an exercise. This concept has not changed, although it is now referred to as “multi-jurisdictional” testing instead. Added to the new version is “multi-party” testing, in-line with DORA’s TLPT regulations for “pooled testing”, an exercise where the entity relies on common ICT infrastructure by a service provider. Guidance on this matter is fairly limited however.
With the new and improved version, we can see the reflection of DORA’s regulatory requirements, since the TIBER-EU testing process is detailed in greater depth, along with having specific milestones, deliverables, and timings/deadlines. Additional guidance documents are available as well, providing useful operational input.
In terms of scenario creation, we are seeing one of the biggest updates compared to the previous version of the TIBER-EU document, which did not provide specific input on the exact type or number of scenarios. The updated version requires a scenario shortlist consisting of at least three end-to-end threat scenarios for the threat profiles who exhibit the highest threat severity scores. They should all describe end-to-end attack paths (i.e. consisting of an IN, THROUGH, and OUT phase) and shall include, at least one scenario that includes, but is not limited to:
Optionally, it may also contain a scenario-X.
In terms of scenario selection for execution, a maximum of one scenario (out of the three selected scenarios) per TIBER test may be non-threat-led. This refers to the scenario-X, which allows for the investigation of future or otherwise relevant attack vectors. In case no separate scenario-X was specified, it’s allowed to “transform” one of the other selected scenario into a scenario-X during the red team execution phase, on condition that all involved stakeholders agree.
An interesting point to note is the potential “discrepancy” between the DORA TLPT RTS and the TIBER-EU specification w.r.t. CIFs and scoping:
As expected, purple teaming is now included as a mandatory step. The TIBER-EU framework document only covers purple teaming as part of the Closure Phase, to be performed after the replay workshop. However, the Purple Teaming Guidance document provides additional options and covers all your purple teaming needs. It distinguishes two options for purple teaming:
In addition, the guidance document provides considerations for both options and input on different types of purple teaming, making it a valuable resource.
What remains unclear is whether the limited purple teaming sufficiently covers the requirements or whether a purple team in the closure phase is needed nonetheless.
Unsurprisingly, the new TIBER-EU framework contains the required updates for convergence towards the DORA TLPT specifications. Even though minor open points remain, it is an additional guarantee that adopting TIBER is the way to perform a TLPT. This framework aims to be a handbook or set of detailed guidelines (i.e. the “HOW”) on completing DORA TLPT (i.e. the “WHAT”) in a qualitative, controlled and safe manner – one which is consistent and uniform throughout the EU. We can expect the national implementations to be updated as well in the near future to reflect these updates.
As a threat intelligence and red team provider, we are very much looking forward to put this into practice and help European entities improve their resilience!
Want to know how we can help you with TIBER or TLPT execution? Visit the ARES team website or reach out directly. Not only do we have vast experience running TIBER exercises, our red team managers can also support your internal testers to provide the missing piece of the puzzle.
Could you use some help as part of the Control Team? We have an experienced team ready to support with Control Team preparation and guidance to ease the burden.
Jonas Bauters
Jonas Bauters is a senior manager within NVISO, mainly providing cyber resiliency services with a focus on target-driven testing.
As the Belgian ARES (Adversarial Risk Emulation & Simulation) solution lead, his responsibilities include both technical and non-technical tasks. While occasionally still performing pass the hash (T1550.002) and pass the ticket (T1550.003), he also greatly enjoys passing the knowledge.