
Dr. Antje Winkler
DORA Resilience Testing
We are performing threat-led penetration tests in accordance with the DORA regulation and TIBER framework. These standards define various threat scenarios that portray different types of attackers. The respective scenario determines the starting point for the threat-led penetration test and outlines the means and methods of the simulated attacker:
This scenario describes threats posed by state-sponsored actors. These groups possess extensive resources, expertise, and technological capabilities to carry out targeted attacks on critical infrastructures, government institutions, or companies.
Nation State Groups often focus their attacks on strategic, political, and military objectives, particularly in critical infrastructure sectors. Key aspects of these attacks include not only targeted sabotage through malware and ransomware but also espionage, as well as access to sensitive communication channels and data. The attackers often attempt to remain undetected for as long as possible while maintaining their access to the target infrastructure.
The attacker scenario "Organized Crime Group" refers to threats posed by criminal organizations that often have economic motives and seek financial gains.
Criminal groups are known to employ various cyber attack methods. Some gain financial advantages through targeted manipulation of specific systems or by selling stolen data. Others use malware or ransomware to render business-critical systems inoperable, extorting ransom payments afterwards to restore inaccessible data and systems. Some groups sell the acquired access on relevant marketplaces to others, allowing the initial access and its exploitation to be carried out by different groups.
In this approach, we assume the role of an attacker who conducts cyber attacks from within a company. Insiders are malicious actors who belong to the organization itself or one of their service providers. They already have access to systems within the company.
The primary goal of malicious insiders is personal enrichment through fraudulent activities. This typically occurs through the misuse of the employee's or service provider's own permissions. Consequences include, among others, the creation of unauthorized accounts and payment transactions, unauthorized access and manipulation of legitimate accounts, or the application for and approval of unauthorized loans. To prepare the fraudulent scheme and identify lucrative targets, insiders often browse internal customer databases.
In addition to the scenarios described above, a specifically tailored scenario can also be developed based on the Threat Intelligence Report that is provided for the engagement.
The aim of the so-called "Scenario X" is to offer a means to define additional scenarios that are adapted to the current threat landscape, alongside the ones already defined. This is intended to ensure that the threat-led penetration test reflects the latest developments in the cyber security field.
The objective of the threat-led penetration test is to simulate the impact a cyber attack would have on the target company under real-world conditions. To minimize potential effects on business processes and IT systems, close coordination of the testing activities is of high importance.
The following roles are defined for carrying out the threat-led penetration test:
In accordance with DORA and TIBER, a threat-led penetration test comprises the following phases:
The detailed testing activities that are conducted in each phase follow our approach for red teaming campaigns.
There are many established methodologies and frameworks that guide threat-led penetration tests, ensuring that the results are consistent and compliant with regulations such as the Digital Operational Resilience Act (DORA):
Dr. Antje Winkler