Understand how Threat Led Penetration Testing (TLPT) establishes a foundation for DORA compliance Watch the video›

Achieving DORA Threat-Led Penetration Testing Requirements

Gain in-depth view into DORA’s threat-led penetration testing framework with practical guidance on how to integrate offensive security services.

The EU's Digital Operational Resilience Act (DORA) took effect in January 2025, financial institutions and their ICT providers must prepare to meet the regulation’s stringent Threat-Led Penetration Testing (TLPT) requirements.

We provide an in-depth overview of DORA’s TLPT framework, offering practical guidance on how to integrate offensive security services to meet regulatory demands and ensure resilience against cyber threats through penetration testing.

You will gain a clear roadmap for achieving DORA compliance through a strategic approach to testing, threat intelligence, and vulnerability remediation. 

Key Lessons Learned 

What is the Digital Operational Resilience Act (DORA) 

  • DORA’s goal is to address a critical gap in EU financial regulation and to create a more resilient financial ecosystem and safeguard against information and communication technology (ICT)-related incidents. It went into effect on January 17, 2025.
  • DORA applies to any financial institution doing business in the EU, along with entities designated by the European Supervisory Authority (ESA) as “critical” third-party providers (CTPP) – i.e. any ICT provider whose services are deemed essential to the operation and resilience of an entity.

Penalties

  • Failure to comply will result in swift penalties
  • However, as Trevin Edgeworth said, “The real cost of noncompliance is [the potential] reduction of your security posture and the resulting potential security incidents.”

Managing Third-Party Risk

  • Start by performing a gap analysis and risk assessment on your organization and every third party that you work with.
  • A tabletop discussion with key stakeholders and senior management, though not specifically required by DORA, is a great way to play out various scenarios and prioritize risks based on impact.
  • Great questions to ask:
    • What would be the outcome if this provider is either not available or is compromised?
    • What is our exit strategy? Do we have alternative vendors identified? DORA recognizes this kind of redundancy as a contributor to resilience.
    • Do we have data portability to move to another provider if needed?

Digital Operations Resilience Testing (DORT)

  • DORT is the overarching framework encompassing all the DORA testing requirements.
  • These must be completed annually, at a minimum. This includes things you may already be doing, such as vulnerability assessments, scenario-based testing, and pentesting.

Threat-Led Penetration Testing (TLPT)

  • TLPT is a rigorous, advanced form of pentesting under the umbrella of DORT.
  • At its core, it is objective-based, adversary emulation. Think of it as synonymous with red teaming.
  • Unlike other traditional red teaming, TLPT starts with attack objectives: Can I pull off an unauthorized wire transfer? Can I delete a mortgage? Can I jackpot an ATM and cause it to start spitting out cash? This allows you to not only test the technology but also consider other vulnerabilities (i.e. paper-based system, picking locks, social engineering).
  • The red team will map to a specific attacker profile and use architecture and attack graphing to simulate realistic attack scenarios based on the attacker's tactics, techniques, and procedures (TTP).
  • DORA requires one TLPT every three years. At least every third test must be done by an external entity. However, given how quickly environments change, we recommend one red team per line of business per year.
  • TIBER-EU (Threat Intelligence-Based Ethical Red Teaming) is a framework that can be used to fulfill DORA’s TLPT requirements, alternating red and purple teaming to continuously learn and improve.

DORA is a thick regulation but one that will benefit your organization and help you meet other regulations as well, such as NIS2 and TIBER-EU. It is important to start early and understand the full requirements. Dive deeper into DORA and engage with Bishop Fox to help you meet the DORT and TLPT requirements.


Trevin Edgeworth

About the speaker, Trevin Edgeworth

Red Team Practice Director

Trevin Edgeworth is the Red Team Practice Director at Bishop Fox, where he focuses on building and leading best-in-class adversary emulation services to help customers of all sizes and industries strengthen their defenses against current and emerging threats.

Trevin has over 20 years of security experience; he has built and overseen red team programs for several Fortune 500 companies, including American Express, Capital One Financial, and Symantec Corporation. Other accomplishments include leading a security organization as Chief Security Officer (CSO) for a major security company. Trevin has led a variety of security functions in his career, including cyber threat intelligence, hunt, deception, insider threat, and others.

Trevin is an active member of the security community. He has presented at several industry conferences and been interviewed by leading publications on topics such as red teaming and threat intelligence.

More by Trevin

Rob Ragan

About the speaker, Rob Ragan

Principal Technology Strategist

Rob Ragan is a Principal Researcher at Bishop Fox. Rob focuses on pragmatic solutions for clients and technology. He oversees strategy for continuous security automation. Rob has presented at Black Hat, DEF CON, and RSA. He is also a contributing author to Hacking Exposed Web Applications 3rd Edition. His writing has appeared in Dark Reading and he has been quoted in publications such as Wired.

Rob has more than a decade of security experience and once worked as a Software Engineer at Hewlett-Packard's Application Security Center. Rob was also with SPI Dynamics where he was a software engineer on the dynamic analysis engine for WebInspect and the static analysis engine for DevInspect.

More by Rob

Matt Twells

About the speaker, Matt Twells

Former Senior Solutions Architect

Matthew Twells was a Senior Solutions Architect at Bishop Fox focused on technical scoping of client engagements, training and development, and sales enablement. He graduated from the University of Reading in Reading, England with a B.A. (Hons) in Economics, and has spent time working in the British Army as a Secure Communications Engineer, working with the National Health Service as part of the Cyber Defense Operations Center (CDOC) team during the COVID-19 pandemic and subsequently in a variety of cybersecurity consulting, technical project management, internal audit, and penetration testing roles over the last 7 years.

More by Matt

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.