Article 1 Definitions


For the purposes of this Regulation, the following definitions shall apply:

  1. control teammeans the team composed of staff of the tested financial entity and, where relevant in consideration of the scope of the TLPT, staff of its third-party service providers and any other party, who manages the test;’ means the team composed of staff of the tested financial entity and, where relevant in consideration of the scope of the TLPT, staff of its third-party service providers and any other party, who manages the test;

  2. control team leadmeans the staff member of the financial entity responsible for the conduct of all TLPT-related activities for the financial entity in the context of a given test;’ means the staff member of the financial entity responsible for the conduct of all TLPT-related activities for the financial entity in the context of a given test;

  3. blue teammeans the staff of the financial entity and, where relevant, staff of the financial entity’s third-party service providers and any other party deemed relevant in consideration of the scope of the TLPT, of the financial entity’s third-party service providers, that are defending a financial entity's use of network and information systems by maintaining its security posture against simulated or real attacks and that is not aware of the TLPT;’ means the staff of the financial entity and, where relevant, staff of the financial entity’s third-party service providers and any other party deemed relevant in consideration of the scope of the TLPT, of the financial entity’s third-party service providers, that are defending a financial entity's use of network and information systemsmeans a network and information system as defined in Article 6, point 1, of Directive (EU) 2022/2555; by maintaining its security posture against simulated or real attacks and that is not aware of the TLPT;

  4. blue team tasksmeans tasks that are typically carried out by the blue team such as security operation centre (SOC), ICT infrastructure services, helpdesk services, incident management services at operational level;’ means tasks that are typically carried out by the blue teammeans the staff of the financial entity and, where relevant, staff of the financial entity’s third-party service providers and any other party deemed relevant in consideration of the scope of the TLPT, of the financial entity’s third-party service providers, that are defending a financial entity's use of network and information systems by maintaining its security posture against simulated or real attacks and that is not aware of the TLPT; such as security operation centre (SOC), ICT infrastructure services, helpdesk services, incident management services at operational level;

  5. red teammeans the testers, internal or external, contracted for, or assigned to, a TLPT;’ means the testers, internal or external, contracted for, or assigned to, a TLPT;

  6. purple teamingmeans a collaborative testing activity that involves both the testers and the blue team;’ means a collaborative testing activity that involves both the testers and the blue teammeans the staff of the financial entity and, where relevant, staff of the financial entity’s third-party service providers and any other party deemed relevant in consideration of the scope of the TLPT, of the financial entity’s third-party service providers, that are defending a financial entity's use of network and information systems by maintaining its security posture against simulated or real attacks and that is not aware of the TLPT;;

  7. TLPT authoritymeans any of the following:the single public authority in the financial sector designated in accordance with Article 26(9) of Regulation (EU) 2022/2554;the authority in the financial sector to which the exercise of some or all of the tasks in relation to TLPT is delegated in accordance with Article 26(10) of Regulation (EU) 2022/2554;any of the competent authorities referred to in Article 46 of Regulation (EU) 2022/2554;’ means any of the following:

    1. the single public authoritymeans any government or other public administration entity, including national central banks. in the financial sector designated in accordance with Article 26(9) of Regulation (EU) 2022/2554;

    2. the authority in the financial sector to which the exercise of some or all of the tasks in relation to TLPT is delegated in accordance with Article 26(10) of Regulation (EU) 2022/2554;

    3. any of the competent authorities referred to in Article 46 of Regulation (EU) 2022/2554;

  8. TLPT Cyber Teamor ‘TCT’ means the staff within the TLPT authorities that is responsible for TLPT-related matters;’ or ‘TCT’ means the staff within the TLPT authoritiesmeans any of the following:the single public authority in the financial sector designated in accordance with Article 26(9) of Regulation (EU) 2022/2554;the authority in the financial sector to which the exercise of some or all of the tasks in relation to TLPT is delegated in accordance with Article 26(10) of Regulation (EU) 2022/2554;any of the competent authorities referred to in Article 46 of Regulation (EU) 2022/2554; that is responsible for TLPT-related matters;

  9. test managersmeans staff designated to lead the activities of the TLPT authority for a specific TLPT to monitor compliance with this Regulation;’ means staff designated to lead the activities of the TLPT authoritymeans any of the following:the single public authority in the financial sector designated in accordance with Article 26(9) of Regulation (EU) 2022/2554;the authority in the financial sector to which the exercise of some or all of the tasks in relation to TLPT is delegated in accordance with Article 26(10) of Regulation (EU) 2022/2554;any of the competent authorities referred to in Article 46 of Regulation (EU) 2022/2554; for a specific TLPT to monitor compliance with this Regulation;

  10. threat intelligencemeans information that has been aggregated, transformed, analysed, interpreted or enriched to provide the necessary context for decision-making and to enable relevant and sufficient understanding in order to mitigate the impact of an ICT-related incident or of a cyber threat, including the technical details of a cyber-attack, those responsible for the attack and their modus operandi and motivations; provider’ means the experts, contracted by the financial entity for each TLPT, and external to the financial entity and to ICT intra-group service providersmeans an undertaking that is part of a financial group and that provides predominantly ICT services to financial entities within the same group or to financial entities belonging to the same institutional protection scheme, including to their parent undertakings, subsidiaries, branches or other entities that are under common ownership or control; if any, who collect and analyse targeted threat intelligencemeans information that has been aggregated, transformed, analysed, interpreted or enriched to provide the necessary context for decision-making and to enable relevant and sufficient understanding in order to mitigate the impact of an ICT-related incident or of a cyber threat, including the technical details of a cyber-attack, those responsible for the attack and their modus operandi and motivations; relevant for the financial entities in scope of a specific TLPT exercise and develop matching relevant and realistic threat scenarios;

  11. TLPT providersmeans testers and threat intelligence providers;’ means testers and threat intelligencemeans information that has been aggregated, transformed, analysed, interpreted or enriched to provide the necessary context for decision-making and to enable relevant and sufficient understanding in order to mitigate the impact of an ICT-related incident or of a cyber threat, including the technical details of a cyber-attack, those responsible for the attack and their modus operandi and motivations; providers;

  12. leg-upmeans the assistance or information provided by the control team to the testers to enable the testers to continue the execution of an attack path where they are not able to advance on their own, and where no other reasonable alternative exists, including for insufficient time or resources in a given TLPT;’ means the assistance or information provided by the control teammeans the team composed of staff of the tested financial entity and, where relevant in consideration of the scope of the TLPT, staff of its third-party service providers and any other party, who manages the test; to the testers to enable the testers to continue the execution of an attack pathmeans the route followed by testers during the active red team testing phase of the TLPT to reach the flags specified for that TLPT; where they are not able to advance on their own, and where no other reasonable alternative exists, including for insufficient time or resources in a given TLPT;

  13. attack pathmeans the route followed by testers during the active red team testing phase of the TLPT to reach the flags specified for that TLPT;’ means the route followed by testers during the active red teammeans the testers, internal or external, contracted for, or assigned to, a TLPT; testing phase of the TLPT to reach the flagsare key objectives in the ICT systems supporting critical or important functions of a financial entity that the testers try to achieve through the test; specified for that TLPT;

  14. flagsare key objectives in the ICT systems supporting critical or important functions of a financial entity that the testers try to achieve through the test;’ are key objectives in the ICT systems supporting critical or important functionsmeans a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law; of a financial entity that the testers try to achieve through the test;

  15. sensitive informationmeans information that can readily be leveraged to carry out attacks against the ICT systems of the financial entity, intellectual property, confidential business data, or personal data, that can directly or indirectly harm the financial entity and its ecosystem would it fall in the hands of malicious actors;’ means information that can readily be leveraged to carry out attacks against the ICT systems of the financial entity, intellectual property, confidential business data, or personal data, that can directly or indirectly harm the financial entity and its ecosystem would it fall in the hands of malicious actors;

  16. poolmeans all the financial entities participating in a pooled TLPT pursuant to Article 26(4) of Regulation (EU) 2022/2554;’ means all the financial entities participating in a pooled TLPT pursuant to Article 26(4) of Regulation (EU) 2022/2554;

  17. host Member Statemeans the host Member State in accordance with the Union sectoral law applicable to each financial entity;’ means the host Member Statemeans the host Member State in accordance with the Union sectoral law applicable to each financial entity; in accordance with the Union sectoral law applicable to each financial entity;

  18. joint TLPTmeans a TLPT, other than a pooled TLPT as referred to in Article 26(4) of Regulation (EU) 2022/2554, involving several financial entities using the same ICT intra-group service provider, or belonging to the same group and sharing ICT systems.’ means a TLPT, other than a pooled TLPT as referred to in Article 26(4) of Regulation (EU) 2022/2554, involving several financial entities using the same ICT intra-group service providermeans an undertaking that is part of a financial group and that provides predominantly ICT services to financial entities within the same group or to financial entities belonging to the same institutional protection scheme, including to their parent undertakings, subsidiaries, branches or other entities that are under common ownership or control;, or belonging to the same groupmeans a group as defined in Article 2, point (11), of Directive 2013/34/EU; and sharing ICT systems.

We're continuously improving our platform to serve you better.

Your feedback matters! Let us know how we can improve.

Found a bug?

Springflod is a Swedish boutique consultancy firm specialising in cyber security within the financial services sector.

We offer professional services concerning information security governance, risk and compliance.

Crafted with ❤️ by Springflod