Annex V Content of the red team test report (Article 12(2))


The red team test report shall contain information on at least all of the following:

  1. information on the performed attack, including:

    1. the targeted critical or important functions means a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law; and identified ICT systems, processes and technologies supporting the critical or important function means a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;, as identified in the red team test plan;

    2. summary of each scenario;

    3. flags reached and not reached;

    4. attack paths followed successfully and unsuccessfully;

    5. tactics, techniques and procedures used successfully and unsuccessfully;

    6. deviations from the red team test plan, if any;

    7. leg-ups granted, if any;

  2. all actions that the testers are aware of that were performed by the blue team to reconstruct the attack and to mitigate its effects;

  3. discovered vulnerabilities means a weakness, susceptibility or flaw of a product with digital elements that can be exploited by a cyber threat; and other findings, including:

    1. vulnerability means a weakness, susceptibility or flaw of a product with digital elements that can be exploited by a cyber threat; and other finding description including their criticality;

    2. root cause analysis of successful attacks;

    3. recommendations for remediation including indication of the remediation priority.

We're continuously improving our platform to serve you better.

Your feedback matters! Let us know how we can improve.

Found a bug?

Springflod is a Swedish boutique consultancy firm specialising in cyber security within the financial services sector.

We offer professional services concerning information security governance, risk and compliance.

Crafted with ❤️ by Springflod