Skip to main content

DORA TLPT: 2026 Guide to Threat-Led Penetration Testing

DORA TLPT guide for 2026: who is in scope, how Article 26 works, what evidence to keep and how financial entities should prepare without overclaiming.

In this article
  1. Short answer
  2. TLPT at a glance
  3. DORA testing vs TLPT
  4. Who is in TLPT scope?
  5. What competent authorities look at
  6. TLPT roles and responsibilities
  7. TLPT lifecycle
  8. Evidence pack for TLPT readiness
  9. TLPT and ICT third-party providers
  10. What not to claim
  11. 30-day TLPT readiness plan
  12. FAQ
  13. Does every DORA entity need TLPT?
  14. How often is TLPT required?
  15. Can a normal penetration test replace TLPT?
  16. Should a small EMI prepare for TLPT?
  17. Who chooses the TLPT provider?
  18. Can ICT suppliers block TLPT?
  19. Related reading
  20. Primary sources
  21. Bottom line

Last reviewed: 1 May 2026

Short answer

Threat-led penetration testing (TLPT) under DORA is advanced resilience testing for financial entities identified by competent authorities. It is not mandatory for every financial entity.

Every DORA in-scope financial entity needs a proportionate digital operational resilience testing programme. Only selected entities need TLPT under Article 26.

The practical 2026 question is:

Has the entity confirmed whether TLPT applies, and if not, can it show a proportionate testing programme with evidence of remediation?

TLPT at a glance

QuestionPractical answer
Is TLPT required for every fintech?No. It applies to financial entities identified by competent authorities under DORA Article 26 and related criteria.
Is TLPT the same as a penetration test?No. TLPT is threat-led, intelligence-based, scoped around critical or important functions and run under a formal framework.
Is TLPT the same as annual DORA testing?No. Article 25 requires a broader risk-based testing programme. TLPT under Article 26 is advanced testing for identified entities.
How often does TLPT run?At least every three years for identified entities.
Who should own TLPT internally?Senior ICT risk / security owner with management-body oversight, legal/compliance support and technical service owners.
What should smaller firms do?Document why TLPT is not in scope, then maintain proportionate testing evidence: vulnerability testing, BCDR tests, tabletops and remediation.

DORA testing vs TLPT

DORA separates general digital operational resilience testing from threat-led penetration testing.

AreaArticle 25 testing programmeArticle 26 TLPT
Applies toAll financial entities in scope, proportionate to riskFinancial entities identified by competent authorities
PurposeTest resilience, controls, recovery and remediationTest live production resilience against realistic threat scenarios
FrequencyRegular risk-based programmeAt least every three years for identified entities
ScopeICT systems, tools, processes, controls and continuityCritical or important functions and supporting systems
MethodsVulnerability assessments, scans, open-source reviews, network security assessments, gap analysis, BCDR tests, source-code reviews, scenario tests and othersThreat intelligence, red team test, blue team interaction, control-team governance, closure
EvidenceTest plan, results, findings, remediation trackerTLPT scope, threat intelligence, test plan, reports, remediation and authority interaction
Common mistakeTreating annual testing as a checklistTreating TLPT as a normal pen test or claiming it applies to everyone

Who is in TLPT scope?

DORA Article 26 says financial entities identified by competent authorities must carry out TLPT. Identification is based on criteria set by the regulatory technical standards and applied by the competent authority.

That means a financial entity should not self-declare “TLPT required” only because it is important, regulated or cloud-dependent. The correct position is:

  • confirm whether the competent authority has identified the entity for TLPT;
  • keep a record of the scope decision;
  • monitor for supervisory communication or changes in scale, complexity or criticality;
  • maintain proportionate Article 25 testing evidence even if TLPT does not apply.
Entity situationTLPT stance
Small EMI with limited services and no authority identificationTLPT likely not required; maintain proportionate testing evidence
Payment institution with high transaction volume and critical infrastructure dependenciesConfirm competent-authority position and prepare a TLPT readiness file
CASP using custody / key-management infrastructureDo not assume TLPT; assess critical functions, authority expectations and advanced testing needs
Bank, trading venue or infrastructure provider with systemic impactMore likely to face TLPT identification; maintain readiness for formal TLPT
Outsourced technology providerNot the financial entity's TLPT owner, but may be in scope of the test as a supporting ICT provider

What competent authorities look at

The RTS on TLPT sets out criteria and methodology for identifying financial entities that must perform TLPT. The criteria focus on the entity's importance, ICT risk profile and potential systemic or market impact.

For implementation planning, the useful indicators are:

IndicatorWhy it matters
Critical or important functionsTLPT tests the resilience of functions that matter to the financial entity and market
Scale and complexityLarger or more complex entities are more likely to need advanced testing
ICT dependencyHigh dependency on digital channels, cloud, APIs or outsourced providers increases operational risk
Market or customer impactWider disruption potential raises supervisory interest
Cross-border activityMulti-jurisdiction service delivery can increase complexity
Previous incidents or control weaknessesIncident history may increase scrutiny
InterconnectednessDependencies on payment rails, market infrastructure or critical suppliers can matter

The entity should not turn this into a self-scoring game. Use it to prepare evidence and questions for the competent authority.

TLPT roles and responsibilities

TLPT involves more governance than a normal penetration test.

RoleResponsibility
Management bodyOversees risk appetite, approves material decisions and receives results at the right level
ICT risk / security ownerOwns TLPT readiness, internal coordination and remediation tracking
Control teamCoordinates the test, manages safety and preserves secrecy from the blue team where required
Threat intelligence providerProduces threat intelligence and realistic threat scenarios
Red team providerExecutes the controlled attack scenarios
Blue team / defendersDetects, responds and recovers during the test
Business function ownersConfirm critical services, impact tolerance and operational constraints
Legal / complianceSupports authority interaction, contractual boundaries and evidence retention
ICT third-party providersSupport testing where services, systems or dependencies are in scope

Smaller firms that are not identified for TLPT do not need to build this full structure. They should still use the role model to improve ordinary resilience testing.

TLPT lifecycle

PhaseOutput
Scope confirmationTLPT applicability decision and authority communication record
PreparationCritical function map, systems, providers, constraints and risk acceptance
Provider selectionThreat intelligence and red team provider due diligence
Threat intelligenceThreat profile and scenarios linked to the entity's services
Test planningApproved plan, rules of engagement, safety controls and escalation paths
ExecutionControlled red team activity and blue team response evidence
ClosureReports, findings, severity, remediation plan and lessons learned
Retest / remediationClosure evidence and management-body reporting

The lifecycle should be planned months in advance. A rushed TLPT is more likely to create operational risk and weak evidence.

Evidence pack for TLPT readiness

Even before an entity is formally identified, it can maintain a readiness pack.

Evidence artefactWhy it matters
TLPT scope decision recordShows the entity has assessed whether Article 26 applies
Critical or important function mapDefines what could be in test scope
ICT asset and service dependency mapConnects business functions to systems and providers
Testing programmeShows Article 25 testing is already operating
Prior penetration test / vulnerability resultsGives baseline technical findings and remediation history
BCDR and incident tabletop recordsShows recovery and response evidence
Supplier contract clausesConfirms whether providers can support advanced testing
Authority contact routeShows who handles supervisory communication
Remediation trackerShows findings are owned and closed
Board reporting recordShows management-body oversight of testing and resilience

This pack is useful even when TLPT is not required. It proves that the entity treats testing as an operating discipline.

TLPT and ICT third-party providers

Many financial entities cannot test critical functions without touching ICT providers: cloud, core banking, payment processing, KYC, fraud tools, custody infrastructure, managed security or SaaS platforms.

Provider issueWhat to check
Contract permissionDoes the contract allow security testing or coordinated TLPT activity?
Notification rulesDoes the provider require advance notice or approval?
SubcontractorsCould testing affect subcontracted systems or shared infrastructure?
Safety constraintsWhat systems, times, data or techniques are prohibited?
Logging and evidenceWill the provider share logs, alerts and response evidence?
Incident confusionHow will the provider distinguish test activity from real incidents?
Exit / concentrationCould findings expose dependency or concentration risk?

If contracts do not support testing, that is itself a DORA third-party risk issue.

What not to claim

TLPT language is easy to overstate. Avoid these claims:

Unsafe claimSafer wording
“All DORA firms must do TLPT.”“All DORA firms need proportionate resilience testing; TLPT applies to entities identified by competent authorities.”
“A penetration test satisfies TLPT.”“Penetration tests may support the testing programme, but TLPT is a specific threat-led framework.”
“TLPT is only a technical red-team exercise.”“TLPT includes governance, threat intelligence, scoped execution, safety controls, reporting and remediation.”
“The provider owns TLPT compliance.”“External providers can perform parts of TLPT, but responsibility remains with the financial entity.”
“If TLPT is not required, testing is optional.”“Article 25 testing still applies proportionately even when TLPT does not.”

This is important for SEO and sales copy as well as compliance. Overclaiming TLPT may make the content look more dramatic, but it is factually weaker.

30-day TLPT readiness plan

WeekActionOutput
Week 1Confirm DORA Article 26 position and authority routeTLPT applicability note
Week 1Map critical or important functionsFunction and service map
Week 2Map systems and ICT third-party providers supporting those functionsDependency map
Week 2Review testing history and current Article 25 programmeTesting evidence gap list
Week 3Review supplier testing permissions and notification constraintsContract gap tracker
Week 3Define internal TLPT governance roles if ever identifiedRole and escalation map
Week 4Update board reportingTLPT status, testing plan and remediation overview
Week 4Build readiness evidence indexOwner, location, review cadence and next action

This plan does not mean every entity needs TLPT. It means every entity should be able to explain the testing model and TLPT applicability position.

FAQ

Does every DORA entity need TLPT?

No. Every DORA entity needs proportionate digital operational resilience testing. TLPT under Article 26 applies to financial entities identified by competent authorities.

How often is TLPT required?

For identified entities, DORA Article 26 requires TLPT at least every three years.

Can a normal penetration test replace TLPT?

No. A normal penetration test can support the broader Article 25 testing programme, but TLPT has a specific threat-led methodology, scope, governance and reporting model.

Should a small EMI prepare for TLPT?

It should not overbuild a TLPT programme unless identified. It should keep a clear TLPT applicability note and maintain proportionate testing evidence: BCDR tests, incident tabletops, vulnerability assessments, supplier testing and remediation records.

Who chooses the TLPT provider?

The financial entity is responsible for provider selection and governance, subject to the TLPT framework, authority expectations and independence / quality requirements.

Can ICT suppliers block TLPT?

Supplier constraints can affect scope and safety, but they should be managed through contracts and planning. If a critical supplier cannot support testing, that is a third-party risk and resilience issue.

Primary sources

Bottom line

TLPT is one of the most misunderstood parts of DORA.

The correct 2026 position is simple: all in-scope financial entities need proportionate resilience testing, but TLPT is for entities identified by competent authorities. A smaller fintech should not claim TLPT readiness unless the scope is clear. It should be able to show why TLPT does or does not apply, what testing it does perform and how findings are remediated.