Have You Heard About the TIBER-EU?

An exemplary initiative to evaluate and protect systems

Blog Have You Heard About the TIBER-EU?

| 4 min read

Contact us

Back in 1988, some European countries decided to create an economic union that would allow the free movement of capital between them and would have a shared authority and a single monetary policy. Years later, they defined and adopted a common currency, the euro, which emerged along with the euro area, which now includes 19 of the 27 member states of the European Union (EU). Today, the institution governing that currency is the European Central Bank (ECB). It is about an initiative related to cybersecurity within this organization that we will discuss in this blog post.

Apart from helping to maintain prices stable in the euro area, the ECB makes significant efforts to contribute to the security of European banking. Since 2014, they have been monitoring the soundness and resilience of banks in the area, requiring them to make adjustments whenever any irregularities appear. In the digital context, the ECB is firmly seeking to protect users' money from cyber threats and acts preventively with the financial community. Specifically, they test their entities' security and cyber resilience. As they say, "Cyber resilience refers to the ability to protect electronic data and systems from cyber attacks, as well as to resume business operations quickly in case of a successful attack." They test it with the help of ethical hackers. These procedures are based on the TIBER-EU.

What is the TIBER-EU and how does it work?

The TIBER-EU (Threat Intelligence-based Ethical Red Teaming) is a common framework developed by the EU national central banks and the ECB, published in 2018. It guides authorities, entities and threat intelligence (TI) and red teaming (RT) providers in controlled cyberattacks and in improving the entities' cyber resilience. Following the approach of a red team, such as Fluid Attacks, their tests seek to mimic malicious attackers' tactics, techniques and procedures. They intend to simulate real attacks on their entities' systems, especially on their critical operations, to determine their weaknesses and strengths and thus drive their growth in their cybersecurity maturity level. (This reminds us of the OWASP SAMM, which you can employ, for instance, to assess the maturity of your security tests.)

Several teams are involved in the TIBER-EU tests. On the side of the entity (generally from the financial sector) to be evaluated are the blue and white teams. The former is the one that is unaware that it's going to be the target of simulated attacks aimed at assessing its prevention, detection and response capabilities. The latter is a narrow group of people that knows about the procedure and contributes to its execution. On the other hand, there are TI and RT providers. The first company analyzes the spectrum of potential threats and conducts a reconnaissance of the entity. The second company is in charge of ethical hacking or well-meaning attacks against the entity's systems and their critical operations. Lastly, there is the TIBER cyber team. This group belongs to the authority and is responsible for the supervision of the test to ensure compliance with the framework's requirements.

Get started with Fluid Attacks' Red Teaming solution right now

The TIBER-EU also manages requirements for TI and RT providers. The entity to be tested must verify they are met before working with these companies. These are selection standards we will talk about in a future post. For the time being, let's gain some insight into the testing procedure. The authorities in European nations, in discussion with the entities under their responsibility, determine in which cases and when to carry it out. To be recognized as a TIBER-EU test, this process must be performed by independent external providers and not by the entities' internal teams. The framework stipulates that this test must be divided into three phases: preparation, testing and closure.

TIBER-EU Process

Image taken from ecb.europa.eu.

Before the preparation phase, TIBER-EU offers an optional one: the generic threat landscape phase. This step is to conduct "a generic assessment of the national financial sector threat landscape." It involves mapping the entity's role and identifying current high-end threat actors for the sector along with their methods against this kind of entity. In the preparation phase, the teams responsible for the test are defined along with the scope of the test. The authority validates the above, and the entity hires the TI and RT providers.

In the testing phase, the TI company elaborates a "Targeted Threat Intelligence Report," presenting threat scenarios and relevant information about the entity. (The generic threat landscape from the optional phase would serve as the basis for this stage.) The RT company uses all this to develop attack scenarios and execute controlled attacks against "specified critical live production systems, people and processes that underpin the entity's critical functions."

In the closure phase, the RT provider offers a "Red Team Test Report" with details of the employed methods, as well as the findings and evidence from the test. On a case-by-case basis, this report may include recommendations for the tested entity to improve in areas such as policies, operations, controls or awareness. Key stakeholders review and discuss the test and the issues discovered. Then the entity, which receives detailed technical evidence on its weaknesses or vulnerabilities, agrees to and completes a "Remediation Plan."

For everyone involved, it should be clear that TIBER-EU tests carry risks. For example, testing can result in data loss, alteration and disclosure, system downtime and damage, and denial-of-service cases. This is why the TIBER-EU framework is strict and prioritizes the establishment of solid risk management controls to be employed throughout the process. The framework states that for testing to be secure, the roles and responsibilities of all stakeholders must be adequately defined and understood. In addition, in line with what we mentioned earlier, and which we will discuss later, TI and RT vendors must comply with specific requirements. It is expected "to ensure that only the best and most qualified personnel conduct such sensitive tests on critical functions."

Something fundamental that this sophisticated and robust initiative does is to contribute "To provide an appropriate level of assurance that key financial services assets and systems are protected against technically competent, resourced and persistent adversary attacks." European authorities rely on TI and RT providers' methodologies to assess their entities' security and reduce risks. Why is it that so many organizations are still engrossed in relying solely on less-than-accurate automated scanning tools? We've said it before: To stay one step ahead of the malicious hacker, you need someone who thinks like them. You require ethical hackers. Would you like to count on the assistance of Fluid Attacks' ethical hackers? Contact us!

Subscribe to our blog

Sign up for Fluid Attacks' weekly newsletter.

Recommended blog posts

You might be interested in the following related posts.

Photo by Logan Weaver on Unsplash

Introduction to cybersecurity in the aviation sector

Photo by Maxim Hopman on Unsplash

Why measure cybersecurity risk with our CVSSF metric?

Photo by Jukan Tateisi on Unsplash

Our new testing architecture for software development

Photo by Clay Banks on Unsplash

Protecting your PoS systems from cyber threats

Photo by Charles Etoroma on Unsplash

Top seven successful cyberattacks against this industry

Photo by Anima Visual on Unsplash

Challenges, threats, and best practices for retailers

Photo by photo nic on Unsplash

Be more secure by increasing trust in your software

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.