Skip to content

P3: Resilience Testing

  • DORA: Articles 24–27 (Chapter IV)
  • RTS: 2025/1190 (TLPT – entry into force 08.07.2025)
  • Framework: TIBER-EU (Threat Intelligence-based Ethical Red Teaming)

Two Test Categories

Baseline Tests (Art. 25) – Mandatory for All

All financial entities must establish a test programme as an integral part of the ICT risk management framework:

Test TypeDescriptionFrequency
Vulnerability scansAutomated scans for known vulnerabilitiesAt least annually
Open-source analysesReview of deployed OSS componentsAt least annually
Network security assessmentsNetwork architecture and segmentationAt least annually
Gap analysesComparison of target vs. actual security postureAt least annually
Physical security reviewsAccess control, environmental securityRisk-based
Source code reviewsStatic and dynamic code analysisFor critical systems
Scenario-based testsBusiness continuity, disaster recoveryAt least annually
Compatibility testsSoftware/hardware interoperabilityUpon changes
Performance testsLoad and stress testsAt least annually
End-to-end testsComplete process chain testingRisk-based
Penetration testsActive exploitation of vulnerabilitiesAt least annually

Advanced Tests – TLPT (Art. 26–27)

Threat Led Penetration Tests are only required for systemically important financial entities with a high ICT maturity level.

AspectRequirement
WhoOnly systemically important financial entities (designated by supervisor)
FrequencyEvery 3 years
FrameworkTIBER-EU methodology
Phases8 phases, 9–14 months execution
TeamsRed team (external), blue team (internal), white team (coordination)
BudgetTypically EUR 150,000–500,000
ProvidersMust meet TLPT certification criteria
DeadlineFirst TLPT before 17.01.2028

BAUER GROUP Relevance

BAUER GROUP as an ICT service provider is not directly subject to TLPT obligations, but must:

  • Participate in and fully cooperate with TLPT tests of clients (Art. 26(4))
  • Be able to demonstrate own baseline tests (contractual requirement)
  • Make test results available to the client

Test Programme – Minimum for ICT Service Providers

Automatable Baseline Test Programme

yaml
# dora-test-schedule.yaml
test_program:
  vulnerability_scanning:
    tool: "OpenVAS/Vulnerability Scanner"
    frequency: "weekly"
    scope: "all_production_systems"
    automated: true

  dependency_scanning:
    tool: "Container Scanner"
    frequency: "daily"
    scope: "all_containers_and_packages"
    automated: true

  sast_scanning:
    tool: "SAST-Tool"
    frequency: "on_commit"
    scope: "all_repositories"
    automated: true

  penetration_testing:
    provider: "external"
    frequency: "annually"
    scope: "critical_systems"
    automated: false

  bcp_dr_testing:
    frequency: "annually"
    scope: "all_critical_services"
    automated: false
    last_test: null
    next_test: null

  network_assessment:
    tool: "Nmap/custom"
    frequency: "quarterly"
    scope: "all_network_segments"
    automated: true

  performance_testing:
    tool: "k6/Locust"
    frequency: "quarterly"
    scope: "customer_facing_services"
    automated: true

Evidence Collection

Each test must be documented with:

  • Test date, scope, methodology
  • Findings (categorised by criticality)
  • Remediation plan with deadlines
  • Proof of remediation (retest)
  • Management sign-off

→ See Audit Trail & Evidence for automated evidence collection.

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT