DORA-Art26-P1

Article
26 (1)
Pillar
Digital Operational Resilience Testing
Regulation Ref
Regulation (EU) 2022/2554, Article 26(1)
Last Reviewed
2026-01-15

Financial entities identified in accordance with Article 6(1) of this Regulation shall carry out at least every 3 years advanced testing by means of threat-led penetration testing (TLPT).

Evidence Profiles

TLPT Scope and Planning Document RARE

Document defining the scope, objectives, and planning for threat-led penetration testing (TLPT) as required by DORA Article 26, including threat intelligence phase, red team scope, and critical function coverage.

Formats
DOCX PDF
Evidence Class
tlpt-scope-document
Availability
RARE
Update Frequency
every 3 years
Typical Author
CISO
Approval Chain
CISO → CRO → Board Risk Committee

Content Sections

Expected Fields

Common Quality Issues

TLPT Execution Report RARE

Report documenting the execution and results of threat-led penetration testing, including attack scenarios executed, findings, impact assessment, and remediation requirements as required by DORA Articles 26-27.

Formats
PDF
Evidence Class
tlpt-execution-report
Availability
RARE
Update Frequency
every 3 years
Typical Author
External TLPT Provider
Approval Chain
CISO → CRO → Board Risk Committee → Competent Authority

Content Sections

Expected Fields

Common Quality Issues

TLPT Remediation Plan RARE

XML-structured remediation plan addressing findings from threat-led penetration testing, including prioritised actions, responsible owners, timelines, and validation criteria.

Formats
XML
Evidence Class
tlpt-remediation-plan
Availability
RARE
Update Frequency
event-driven
Typical Author
CISO
Approval Chain
CISO → CRO

Content Sections

Expected Fields

Common Quality Issues

Fact Schemas

tlpt_execution_status

Schema ID
fs-tlpt-execution-status
Control
DORA-Art26-P1

Valid Ranges

tlpt_date
within last 3 years
next_tlpt_due_date
within 3 years of last TLPT

Related Schemas

JSON Schema

{
  "properties": {
    "competent_authority_notified": {
      "type": "boolean"
    },
    "covers_critical_functions": {
      "type": "boolean"
    },
    "critical_findings": {
      "minimum": 0,
      "type": "integer"
    },
    "defence_detection_rate_percent": {
      "maximum": 100,
      "minimum": 0,
      "type": "number"
    },
    "findings_count": {
      "minimum": 0,
      "type": "integer"
    },
    "next_tlpt_due_date": {
      "format": "date",
      "type": "string"
    },
    "threat_intelligence_used": {
      "type": "boolean"
    },
    "tlpt_date": {
      "format": "date",
      "type": "string"
    },
    "tlpt_performed": {
      "type": "boolean"
    }
  },
  "required": [
    "tlpt_date",
    "tlpt_performed",
    "covers_critical_functions",
    "findings_count"
  ],
  "type": "object"
}

tlpt_findings

Schema ID
fs-tlpt-findings
Control
DORA-Art26-P1

Valid Ranges

remediation_completed_count
should equal remediation_actions_count for full remediation
target_completion_date
within 12 months of TLPT completion

Related Schemas

JSON Schema

{
  "properties": {
    "critical_findings": {
      "minimum": 0,
      "type": "integer"
    },
    "high_findings": {
      "minimum": 0,
      "type": "integer"
    },
    "remediation_actions_count": {
      "minimum": 0,
      "type": "integer"
    },
    "remediation_completed_count": {
      "minimum": 0,
      "type": "integer"
    },
    "remediation_plan_exists": {
      "type": "boolean"
    },
    "target_completion_date": {
      "format": "date",
      "type": "string"
    },
    "tlpt_id": {
      "minLength": 1,
      "type": "string"
    },
    "total_findings": {
      "minimum": 0,
      "type": "integer"
    }
  },
  "required": [
    "tlpt_id",
    "total_findings",
    "critical_findings",
    "remediation_plan_exists"
  ],
  "type": "object"
}