The Universal Cyber Threat Framework Bridging Strategy, Operations & Development
TLCTC is the Rosetta Stone for Cyber Risk.
10 logically‑derived, non‑overlapping cyber threat clusters that connect strategic cyber risk & -security management, operational security, and secure development into one common language.
TLCTC is a free & open framework. No paywalls, no certifications to buy, no consulting funnel. Built to be used, challenged, and evolved by the community.
Licensed under CC BY 4.0 · Attribution required, commercial use permitted.
The Bow-Tie Model
Cause → Incident → Consequence
The TLCTC Cyber Bow-Tie Event Chain
Full causal chain: 10 Threat Clusters → Risk Events → Business Impact
Control Matrix — 60 Control Objectives
10 Threat Clusters × 6 NIST CSF Functions · each cell holds Local + Umbrella controls (Whitepaper §8.1, §9)
Attack Paths — Three-Layer Model
Horizontal cause-side TLCTC sequence (SRE) · vertical escalation to DRE · further escalation to BRE
The “Detection Coverage Score”: A New Metric for the Board
Strategic KPI derived from Attack Velocity (Δt)
How do you tell the Board if you are secure? “We stopped 100 viruses” is a vanity metric. The Detection Coverage Score (DCS) is a strategic KPI derived from Attack Velocity.
You are faster than the adversary.
Winning
The adversary completes the step before you detect it.
Losing
If a Ransomware group moves from #4 Identity Theft to #1 Abuse of Functions (Admin Rights) in 10 minutes, and your SIEM alerts in 15 minutes:
You are systematically blind to this attack. No amount of “hard work” by analysts will fix this — you need automation.
The Logical Foundations of TLCTC
Why TLCTC is not a new logical model — but a domain-specific application of established scientific principles to a field that has stubbornly resisted formalization.
Regulators & Standards
Compliance & IndustryHarmonize reporting obligations and fix the “cyber in the name” taxonomy gap.
Strategic Leadership
CISO & Risk MgmtEnable board-level communication and link operational reality to strategic risk.
Opsec
SOC & Threat IntelligenceMap attacker techniques to root-cause clusters. Unify incident classification with a common threat language.
Development & Engineering
DevSecOps & Secure SDLCPrioritize weaknesses and design threats by root cause. Build security into every phase of development.