Have You Heard About the TIBER-EU?An exemplary initiative to evaluate and protect systems
Back in 1988, some European countries decided to create an economic union that would allow the free movement of capital between them and would have a shared authority and a single monetary policy. Years later, they defined and adopted a common currency, the euro, which emerged along with the euro area, which now includes 19 of the 27 member states of the European Union (EU). Today, the institution governing that currency is the European Central Bank (ECB). It is about an initiative related to cybersecurity within this organization that we will discuss in this blog post.
Apart from helping to maintain prices stable in the euro area, the ECB makes significant efforts to contribute to the security of European banking. Since 2014, they have been monitoring the soundness and resilience of banks in the area, requiring them to make adjustments whenever any irregularities appear. In the digital context, the ECB is firmly seeking to protect users' money from cyber threats and acts preventively with the financial community. Specifically, they test their entities' security and cyber resilience. As they say, "Cyber resilience refers to the ability to protect electronic data and systems from cyber attacks, as well as to resume business operations quickly in case of a successful attack." They test it with the help of ethical hackers. These procedures are based on the TIBER-EU.
What is the TIBER-EU and how does it work?
The TIBER-EU (Threat Intelligence-based Ethical Red Teaming)
is a common framework
developed by the EU national central banks and the ECB,
published in 2018.
It guides authorities,
and threat intelligence (TI)
and red teaming (RT) providers
in controlled cyberattacks
and in improving the entities' cyber resilience.
Following the approach of a red team,
their tests seek to mimic malicious attackers' tactics,
techniques and procedures.
They intend to simulate real attacks
on their entities' systems,
especially on their critical operations,
to determine their weaknesses and strengths
and thus drive their growth in their cybersecurity maturity level.
(This reminds us of the OWASP SAMM,
which you can employ,
to assess the maturity
of your security tests.)
Several teams are involved in the TIBER-EU tests. On the side of the entity (generally from the financial sector) to be evaluated are the blue and white teams. The former is the one that is unaware that it's going to be the target of simulated attacks aimed at assessing its prevention, detection and response capabilities. The latter is a narrow group of people that knows about the procedure and contributes to its execution. On the other hand, there are TI and RT providers. The first company analyzes the spectrum of potential threats and conducts a reconnaissance of the entity. The second company is in charge of ethical hacking or well-meaning attacks against the entity's systems and their critical operations. Lastly, there is the TIBER cyber team. This group belongs to the authority and is responsible for the supervision of the test to ensure compliance with the framework's requirements.
The TIBER-EU also manages requirements for TI and RT providers. The entity to be tested must verify they are met before working with these companies. These are selection standards we will talk about in a future post. For the time being, let's gain some insight into the testing procedure. The authorities in European nations, in discussion with the entities under their responsibility, determine in which cases and when to carry it out. To be recognized as a TIBER-EU test, this process must be performed by independent external providers and not by the entities' internal teams. The framework stipulates that this test must be divided into three phases: preparation, testing and closure.
Image taken from ecb.europa.eu.
Before the preparation phase, TIBER-EU offers an optional one: the generic threat landscape phase. This step is to conduct "a generic assessment of the national financial sector threat landscape." It involves mapping the entity's role and identifying current high-end threat actors for the sector along with their methods against this kind of entity. In the preparation phase, the teams responsible for the test are defined along with the scope of the test. The authority validates the above, and the entity hires the TI and RT providers.
In the testing phase, the TI company elaborates a "Targeted Threat Intelligence Report," presenting threat scenarios and relevant information about the entity. (The generic threat landscape from the optional phase would serve as the basis for this stage.) The RT company uses all this to develop attack scenarios and execute controlled attacks against "specified critical live production systems, people and processes that underpin the entity's critical functions."
In the closure phase, the RT provider offers a "Red Team Test Report" with details of the employed methods, as well as the findings and evidence from the test. On a case-by-case basis, this report may include recommendations for the tested entity to improve in areas such as policies, operations, controls or awareness. Key stakeholders review and discuss the test and the issues discovered. Then the entity, which receives detailed technical evidence on its weaknesses or vulnerabilities, agrees to and completes a "Remediation Plan."
For everyone involved, it should be clear that TIBER-EU tests carry risks. For example, testing can result in data loss, alteration and disclosure, system downtime and damage, and denial-of-service cases. This is why the TIBER-EU framework is strict and prioritizes the establishment of solid risk management controls to be employed throughout the process. The framework states that for testing to be secure, the roles and responsibilities of all stakeholders must be adequately defined and understood. In addition, in line with what we mentioned earlier, and which we will discuss later, TI and RT vendors must comply with specific requirements. It is expected "to ensure that only the best and most qualified personnel conduct such sensitive tests on critical functions."
that this sophisticated and robust initiative does
is to contribute "To provide an appropriate level of assurance
that key financial services assets and systems are protected
against technically competent,
resourced and persistent adversary attacks."
European authorities rely on TI and RT providers' methodologies
to assess their entities' security and reduce risks.
Why is it that so many organizations are still engrossed
in relying solely on less-than-accurate automated scanning tools?
We've said it before:
To stay one step ahead of the malicious hacker,
you need someone who thinks like them.
You require ethical hackers.
Would you like to count on the assistance of
Fluid Attacks' ethical hackers?
Ready to try Continuous Hacking?
Discover the benefits of our comprehensive Continuous Hacking solution, which hundreds of organizations are already enjoying.