What Is Threat-Led Pen Testing?
Threat-Led Penetration Testing (TLPT) is a threat-intelligence-led red team exercise designed to assess the resilience of Critical or Important Business Services (CIFs/CIBS).
This blog series explores the value of threat-led penetration testing for security leaders, how to scope an effective TLPT to DORA requirements, the critical role of threat intelligence and how to use TLPT to demonstrate operational resilience.
How Does a TLPT Work in Practice?
The technical execution of TLPT remains adversarial and adaptive. Detection pressure, dwell time and attacker experimentation are inherent to the exercise and consistent with mature red team delivery.
What differentiates TLPT is how red-team activity is framed by threat intelligence, aligned to critical services and governed to produce defensible assurance outcomes.
The Value of TLPT Outcomes
TLPT is designed to answer a fundamental question for senior security and resilience leaders: Are our most critical services resilient to the most credible cyber threats we face today?
When executed correctly, a TLPT enables organizations to evidence:
- Whether critical or important business services can be materially impacted by credible, intelligence-led threat scenarios, rather than theoretical or generic attack paths
- Whether controls, processes and decision-making protect those services under sustained adversarial pressure
- Whether detection, escalation and response capabilities are sufficient to preserve service continuity when critical services are at risk
- Where governance, ownership or cross-functional coordination degrades under realistic attack conditions
By grounding the exercise in current threat intelligence, TLPT ensures testing effort is prioritised against the highest-risk and most relevant attacker behaviours observed in the sector. As threat actor tactics, techniques and access paths evolve, TLPT provides a structured mechanism to validate that defensive capabilities remain effective against current and emerging risks, rather than historical attack patterns.
In this way, TLPT supports a practical and evidence-based view of operational resilience, rather than a static assessment of security controls.
TLPT – Red Teaming Anchored to Critical Services
Traditional red team engagements are commonly driven by technically defined objectives such as privileged access, persistence, data exfiltration or ransomware-style impact. In these engagements, business impact is typically assessed during reporting, based on the technical outcomes achieved.
In a TLPT, red-team objectives are defined upfront in business terms and explicitly mapped to CIBS and the systems that support them. The exercise remains technically rigorous, but outcomes are assessed by whether attacker activity can credibly threaten the availability, integrity or continuity of those services.
This alignment ensures red-team activity directly supports the resilience outcomes described above.
Threat Intelligence as the Foundation of a TLPT
In a TLPT, threat intelligence defines the threat scenario the organization is testing against.
It establishes the relevant threat actors, their motivations and objectives, the critical or important business services most likely to be targeted, and the access patterns and attack paths that are realistic for those actors. This intelligence is produced and validated before any offensive activity begins and defines the conditions, constraints and objectives of the exercise.
By doing so, TLPT ensures that testing effort is focused on the most credible real-world risks, rather than on generic or opportunistic techniques. This intelligence-led framing is central to maintaining the relevance of the exercise as the threat landscape continues to change.


