TIBER-EU Framework

TIBER-EU Framework

One-liner: The European framework for conducting controlled, intelligence-led adversary emulation tests on critical live production systems.

🎯 What Is It?

TIBER-EU (Threat Intelligence-based Ethical Red Teaming) is a standardized framework developed by the European Central Bank to test and improve the cyber resilience of financial institutions and critical infrastructure. It combines threat intelligence with Red Teaming to simulate realistic attacks on live systems.

Key Distinction: Unlike traditional pentests, TIBER-EU tests are:

πŸ€” Why It Matters

πŸ”¬ How It Works

The Three Phases

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                    TIBER-EU PROCESS                          β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  PREPARATION    β”‚    TESTING      β”‚       CLOSURE           β”‚
β”‚                 β”‚                 β”‚                         β”‚
β”‚ β€’ Scope Define  β”‚ β€’ Threat Intel  β”‚ β€’ Red Team Report       β”‚
β”‚ β€’ Team Setup    β”‚   Report        β”‚ β€’ Blue Team Report      β”‚
β”‚ β€’ Procurement   β”‚ β€’ Red Team      β”‚ β€’ Replay Workshop       β”‚
β”‚ β€’ Approval      β”‚   Execution     β”‚ β€’ Remediation Plan      β”‚
β”‚                 β”‚ β€’ Blue Team     β”‚ β€’ Test Summary          β”‚
β”‚                 β”‚   Detection     β”‚                         β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Phase 1: Preparation

Activity Description
Scope Definition Define critical functions to test
Team Establishment Set up white team (internal oversight)
Procurement Engage threat intel and red team providers
Launch Approval Management sign-off on test parameters

Phase 2: Testing

Activity Description
Targeted Threat Intelligence Custom report on threats to the specific entity
Attack Scenarios Red team develops plans based on TI report
Red Team Execution Live attack simulation using real TTPs
Blue Team Response Defensive team attempts to detect and respond

Phase 3: Closure

Activity Description
Red Team Report Detailed findings, techniques used, access achieved
Blue Team Report What was detected, what was missed, timeline
Replay Workshop Red + Blue teams walk through attack together
Remediation Plan Prioritized fixes for identified gaps
Test Summary Executive summary for leadership/regulators

πŸ›οΈ Governance Structure

Role Responsibility
White Team Internal oversight, knows test is occurring
Blue Team Defensive team, NOT informed (realistic response)
Red Team External provider executing attack scenarios
Threat Intel Provider Creates bespoke intelligence report
Authority Regulatory body overseeing the test

🌍 Adoption

TIBER-EU has been adopted (with local variations) across:

🎀 Interview Angles

Common Questions

STAR Story

Situation: Financial institution needed to meet regulatory expectations for resilience testing but had never done intelligence-led testing.
Task: Coordinate TIBER-aligned assessment as white team lead.
Action: Engaged external threat intel provider for bespoke report, procured red team, established communication protocols, maintained operational secrecy from blue team. Facilitated replay workshop post-test.
Result: Red team achieved domain admin without detection. Replay identified 6 critical detection gaps. Remediation reduced detection time from 72 hours to 4 hours in follow-up test.

βœ… Best Practices

❌ Common Misconceptions

πŸ“š References