Threat-Led Penetration Testing Under DORA: What Financial Institutions Need to Know

Published by:
SecAlliance
Published on:
February 19, 2026

With the European Union’s Digital Operational Resilience Act (DORA) now firmly embedded in the regulatory landscape, financial institutions across Europe are transitioning from regulatory interpretation to operational execution. While DORA has been extensively analysed since its adoption, many organisations are now facing a more practical challenge: how to implement its most demanding requirements in a way that strengthens real-world resilience rather than simply satisfies compliance expectations.

At its core, DORA, which applies from 17 January 2025, reshapes how financial institutions manage digital risk. It requires banks, insurers, trading venues, and other critical financial entities can withstand and quickly recover from ICT disruptions, whether caused by technical failures, cyber-attacks, or third-party incidents. For boards, CISOs, and risk leaders, this is more than regulatory compliance; it’s about protecting reputation, customer trust, and the stability of the financial system itself.

Among DORA’s advanced security requirements is Threat-Led Penetration Testing (TLPT), a step beyond traditional pen tests. In our experience TLPT uncovers operational risks that standard pen tests often miss. TLPT combines the rigor of red teaming with intelligence-driven scenarios, simulating realistic attacks against live production environments. Unlike standard vulnerability assessments or pen testing, Threat-Led Penetration Testing exposes institutions to the same threats they would face from sophisticated adversaries, testing not just defences but also detection, response, and recovery capabilities end-to-end.

With regulators expecting implementation on a strict timeline and reputational stakes higher than ever, the message for financial institutions is clear: now is the time to act. We’ve guided multiple institutions through early TLPT planning, and those that start now are far better prepared for both compliance and real-world threats.

Understanding Threat-Led Penetration Testing and preparing to integrate it into your operational resilience programme will be crucial for meeting DORA requirements and demonstrating that your organisation can survive, adapt, and respond to real-world cyber threats.

What is Threat-Led Penetration Testing under DORA?

Threat-Led Penetration Testing (TLPT) is an intelligence-driven red team exercise designed to test an organisation’s cybersecurity defences in the most realistic way possible. Unlike traditional penetration tests, which often focus on finding technical vulnerabilities in isolated systems, TLPT simulates how actual adversaries would attack your live production environment, including technology, critical business services, operational processes, and the people who operate and defend them.

The key difference between Threat-Led Penetration Testing and standard penetration testing or vulnerability assessments lies in depth, realism, and scope:

  • Depth: Threat-Led Penetration Testing goes beyond surface-level weaknesses, exploring complex attack chains and multi-step compromises.
  • Realism: By using up-to-date threat intelligence, TLPT emulates techniques, tactics, and procedures (TTPs) observed in real-world attacks. Executed in a controlled yet covert manner, the exercise tests not only technical defences but also the organisation’s ability to detect, escalate, and manage a live incident without prior operational warning.
  • Scope: TLPT examines end-to-end processes, critical functions, and even third-party dependencies, rather than testing isolated systems. Based on the defined threat intelligence profile, testing may also extend to people and physical security controls, reflecting how real adversaries exploit the full attack surface rather than isolated systems.

What makes TLPT uniquely powerful is its integration of threat intelligence and realistic attack scenarios. Testers follow end-to-end kill chains, mapping how relevant threat actors, whether cybercriminal groups, nation-state sponsored actors, or other adversaries aligned to the organisation’s threat landscape, might breach defences, move laterally, and impact critical services.

This approach exposes not only technical vulnerabilities but also gaps in detection, response, and recovery. This provides organisations with actionable insights to strengthen resilience before a real attack occurs.

tlpt analysis

Who must conduct TLPT under DORA and how often?

Under DORA, not every financial institution is required to perform Threat-Led Penetration Testing. The rules focus on those with the most significant impact on the EU financial system. Specifically, TLPT applies to:

  • Significant credit institutions: Those identified as global systemically important institutions (G-SIIs) or other systemically important institutions (O-SIIs).
  • Large payment and electronic money institutions: Those exceeding thresholds set by the European Banking Authority (EBA) or those considered systemically important.

In terms of frequency, DORA mandates that TLPT be conducted at least once every three years. However, regulators have discretion to require more or less frequent testing if an institution’s risk profile, size, or systemic importance warrants it. This ensures that testing keeps pace with evolving threats and changing operational environments, reinforcing the EU’s emphasis on continuous digital operational resilience.

Key regulatory expectations for TLPT under DORA

DORA’s Regulatory Technical Standards (RTS) set clear expectations to enable Threat-Led Penetration Testing is robust, independent, and risk focused.

  • Risk-based selection and scope approval: Competent authorities identify in-scope institutions and approve the test scope, ensuring it targets the most critical or important functions.
  • Coverage of critical functions and key third parties: TLPT must assess functions whose disruption would materially impact the institution or the financial system, including relevant third-party ICT providers where they support those functions.
  • Experienced, independent testers: TLPT must be performed by qualified testers. G-SIIs and O-SIIs must use external providers, while other institutions may use internal testers if operationally independent from the blue team and systems under test. External providers must be engaged at least once every three tests to ensure objectivity.

These requirements ensure TLPT provides a credible, regulator-aligned assessment of an institution’s true operational resilience.

threat-led penetration testing reports

Inside a TLPT engagement: Phases and deliverables

A DORA-aligned Threat-Led Penetration Testing follows a structured lifecycle designed to deliver realism while maintaining control and regulatory oversight.

1.   Preparation

  • Regulatory notification and scope approval (where required)
  • Appointment of a control team with the financial institution
  • Scoping of critical or important functions, systems, and relevant third parties

This phase defines clear objectives and ensures operational risk is managed.

2.   Testing

  • Targeted threat intelligence to identify relevant adversaries
  • Development of tailored attack scenarios
  • Controlled red-team operations across live production systems lasting a minimum of 12 weeks

The goal is to test end-to-end detection, response, and containment, not just technical weaknesses.

3.   Closure

  • Detailed red-team report
  • Documented scenarios and attack paths
  • Prioritised remediation roadmap
  • Executive summary for senior management and supervisors
  • Mandatory purple team collaborative session with red and blue teams to maximise learning and strengthen defences

The role of the control team

The control team oversees risk, communications, and regulatory coordination throughout the exercise, ensuring the test remains controlled, aligned, and safe while preserving realism by maintaining secrecy around the exercise.

Strategic benefits for financial institutions

Threat-Led Penetration Testing delivers far more than technical findings. It provides a real-world test of operational resilience. By executing sophisticated, intelligence-led attacks, institutions gain an authentic assessment of their detection, response, and recovery capabilities against the types of adversaries most likely to target them. This moves testing beyond theoretical controls, ensuring that identifying and closing attack paths delivers measurable ROI and cost avoidance.

Threat-Led Penetration Testing outcomes also directly support broader DORA obligations. Findings feed into:

  • ICT risk management, by identifying weaknesses in controls and governance.
  • Incident detection and response, by testing escalation paths and coordination under pressure.
  • Third-party risk oversight, by exposing dependencies and vulnerabilities across critical suppliers.

At a business level, the benefits are equally compelling. Effective Threat-Led Penetration Testing reduces the likelihood of material cyber incidents, strengthens confidence among regulators, and reinforces customer trust in the institution’s ability to safeguard critical services.

Ultimately, it helps reduce systemic risk, positioning the organisation as resilient, credible, and prepared in an increasingly hostile threat landscape. While fostering a culture of continuous improvement in the face of evolving threats.

threat-led penetration testing financial

How SecAlliance delivers DORA-aligned TLPT

SecAlliance delivers intelligence-led, regulator-aligned Threat-Led Penetration Testing to financial institutions as part of a broader cyber threat intelligence and resilience offering. Our TLPT engagements are grounded in real-world threat analysis and tailored to the specific risks faced by EU financial entities under DORA.

At the core of SecAlliance’s approach is the provision of actionable, intelligence-led insights that shape red team testing, ensuring realistic, regulator-aligned Threat-Led Penetration Testing. Before any simulated attack, they conduct structured threat and targeting assessments to identify credible adversaries, relevant TTPs, and realistic attack paths based on the institution’s sector, technology environment, geography, and critical functions. These intelligence products then directly shape the TLPT scenarios and testing strategy.

SecAlliance’s differentiators include:

  • Experienced in regulated frameworks: SecAlliance has a strong track record with intelligence-led red team frameworks, positioning them to deliver TLPT that aligns with DORA’s expectations and fits within broader regulatory testing paradigms.
  • Intelligence-first methodology: Our threat assessments and bespoke scenarios ensure tests reflect real, current threats rather than generic or hypothetical ones.
  • Comprehensive stakeholder support: SecAlliance works with all programme stakeholders, from internal control teams to central banks and competent authorities, providing clarity and coaching throughout the engagement.
  • Threat intelligence leadership: As a dedicated cyber threat intelligence provider with a multinational team and strong analytical capability, SecAlliance delivers managed CTI, threat intelligence assessments, consulting, intelligence sharing, and physical intelligence services. These services support resilience planning that extends beyond Threat-Led Penetration Testing.

This combination of intelligence depth, regulatory awareness, and operational insight means SecAlliance’s Threat-Led Penetration Testing services help institutions not only meet DORA requirements but also strengthen their overall cyber resilience posture.

Practical next steps for DORA TLPT readiness

DORA’s Threat-Led Penetration Testing requirement is not a distant compliance milestone; it is a strategic resilience obligation that demands action now. From our experience, institutions that start by mapping critical functions, systems, and key third-party dependencies gain the clearest path to actionable TLPT planning.

Financial institutions should begin by confirming whether they fall within scope and gaining clarity on supervisory expectations. From there, mapping critical or important functions, including the ICT systems and key third-party providers that support them, is essential.

An honest assessment of current security maturity should focus on SOC capabilities, detection coverage, and incident response procedures, as well as the readiness of the control team to coordinate with stakeholders, establish independent oversight, and provide clarity on critical processes, systems, and their dependencies. This baseline enables organisations to plan TLPT that is realistic, effective, and aligned with DORA’s intent.

Looking ahead, financial institutions should embed TLPT within a structured ICT resilience testing programme, ensuring it informs risk management, incident response, and third-party oversight rather than sitting in isolation. To get started, organisations should ask themselves:

  • Am I in scope? Which functions, systems, and third-party dependencies fall under DORA?
  • What are my critical functions? Are all ICT systems that support them clearly mapped and understood?
  • Is my blue team ready? Can detection and response teams identify and respond to a motivated adversary?
  • Are my third-party dependencies resilient? Could a disruption from a critical supplier impact my operations?
  • Is the control team prepared? Can they coordinate stakeholders, maintain independent oversight, and ensure secrecy while preserving realism?

Answering these questions provides a clear baseline for operational resilience and TLPT readiness. The faster gaps are identified, the sooner institutions can move from theory to practice, ensuring compliance, improving resilience, and reducing risk before a real incident occurs.

Organisations that approach TLPT as a strategic opportunity rather than a regulatory burden will be better equipped to withstand sophisticated attacks, reduce the likelihood of material incidents, and demonstrate confidence to supervisors, boards, and customers. This methodology has also proven highly valuable for non-regulated organisations and industries beyond financial services, where SecAlliance has successfully applied intelligence-led testing to enhance operational resilience.

If you would like to assess your readiness or begin planning your first DORA-aligned Threat-Led Penetration Test, speak with SecAlliance. An intelligence-led, regulator-aligned approach today will position your institution for resilience tomorrow.