Article 3Note: This article is based on the final draft from the ESAs and is not yet adopted. TCT and TLPT Test Managers
-
A TLPT(threat-led penetration testing) a framework that mimics the tactics, techniques and procedures of real-life threat actors perceived as posing a genuine cyber threat, that delivers a controlled, bespoke, intelligence-led (red team) test of the financial entity’s critical live production systems authority shall assign the responsibility for coordinating TLPT-related activities to a TCT. A TCT shall include test managers that are assigned to oversee an individual TLPT(threat-led penetration testing) a framework that mimics the tactics, techniques and procedures of real-life threat actors perceived as posing a genuine cyber threat, that delivers a controlled, bespoke, intelligence-led (red team) test of the financial entity’s critical live production systems.
-
For each test, a test manager and at least one alternate shall be designated.
-
The test managers shall monitor and ensure that the requirements laid out in this Regulation are complied with.
-
The contact details of the TCT shall be communicated to the financial entity through the notification referred to in Article 8(1).
-
The TLPT(threat-led penetration testing) a framework that mimics the tactics, techniques and procedures of real-life threat actors perceived as posing a genuine cyber threat, that delivers a controlled, bespoke, intelligence-led (red team) test of the financial entity’s critical live production systems authority shall participate to all the phases of the TLPT(threat-led penetration testing) a framework that mimics the tactics, techniques and procedures of real-life threat actors perceived as posing a genuine cyber threat, that delivers a controlled, bespoke, intelligence-led (red team) test of the financial entity’s critical live production systems and shall endeavour to provide feedback, validations or approvals in a period of time adequate to expediently carry out the TLPT(threat-led penetration testing) a framework that mimics the tactics, techniques and procedures of real-life threat actors perceived as posing a genuine cyber threat, that delivers a controlled, bespoke, intelligence-led (red team) test of the financial entity’s critical live production systems.