Blog / Strategy & Governance

The Logical Impossibility of Control-First Regulation

Why Every Cybersecurity Regulation Contains an Unspoken Contradiction

BK
Bernhard Kreinz
Loading read time...
Abstract

Modern cybersecurity regulations like NIS2 and DORA operate on a control-first premise that contradicts the very standards they cite. By mandating controls without identifying specific threats, they create a logical gap that makes proportionality impossible. This article identifies two missing dimensions in all 30+ major regulations examined—and shows how a cause-oriented taxonomy resolves the paradox.

Illustration depicting the logical trap.
Conceptual Model: The Regulatory Logic Snake

The Premise Every Regulator Claims

Open any cybersecurity regulation—NIS2, DORA, GDPR Article 32, PCI-DSS, HIPAA Security Rule, or sector-specific frameworks from financial services to critical infrastructure—and you will find the same foundational claim: "These requirements are based on internationally recognized standards."

The standards they reference—ISO/IEC 27001, NIST Cybersecurity Framework, and their derivatives—share a core principle so fundamental it appears in their opening chapters:

Identify Threats
Assess Risks
Select Controls

This is not merely a recommendation. It is the logical structure that makes control selection defensible. A control exists to address a threat. Without knowing what threat you're addressing, control selection becomes arbitrary.

The Regulatory Reality

Now examine what those same regulations actually require. They mandate specific controls: "Implement encryption." "Establish access controls." "Maintain audit logs." "Conduct penetration testing." "Implement multi-factor authentication."

Notice what is missing. The regulation never states: "Encryption is required because it mitigates Threat X." It never identifies which threat each control addresses. It simply mandates the control and moves on.

The Two Missing Dimensions

This creates not one, but two logical impossibilities. When a regulator mandates Control X as obligatory, they implicitly claim:

  1. There exists a Threat Y that Control X addresses
  2. Threat Y is relevant to the regulated entities
  3. The risk from Threat Y justifies the cost of Control X
  4. Control X operates at the right point in the attack chain

Yet regulations never state what Threat Y is, nor do they clarify where in the causal chain the control operates. This reveals two missing dimensions:

The Kreinz Thesis

Cybersecurity regulations claim to follow risk-based standards but are missing two essential dimensions that those standards require:

Dimension Missing Question TLCTC Answer
Horizontal Which generic vulnerability / threat? The 10 Clusters (#1–#10)
Vertical Where in the causal chain? Bow-Tie: Cause-side vs Consequence-side

Without these two dimensions, regulated entities face impossible questions:

  • They cannot verify the logic. They cannot confirm whether Control X actually addresses a threat relevant to their environment.
  • Proportionality becomes impossible. Risk-based thinking requires knowing what risk you're addressing.
  • Control architecture is incoherent. Preventive and mitigating controls are mixed without acknowledging they serve fundamentally different purposes.
  • Compliance replaces security. When you cannot trace a control to a threat, you implement the control to satisfy the auditor and regulator and your compliance risk, not to reduce your cyber risk.
Click to Enlarge
THE STANDARD LOGIC (ISO/NIST) Identify Threats Assess Risks Select Controls THE REGULATORY REALITY Skipped / Hidden ? Logical Gap Mandate Controls Contradiction
Figure 1: The Logical Gap. Standards require threat ID to derive controls; regulations skip the threat ID but mandate the controls anyway.

Universal Validation: 30 Regulations, Zero Exceptions

To test whether this was a selective observation or a universal pattern, I examined 30 cybersecurity regulations and standards across four jurisdictions (US, UK, EU, Switzerland) and multiple sectors. The result: every single regulation fails both dimensions.

Jurisdiction Regulation Controls Mandated Has Threat Taxonomy? Distinguishes Chain Position?
General Cybersecurity Legislation
EUNIS2 Directive10+ (Art. 21) incl. MFA, encryption
EUGDPR Article 32Encryption, pseudonymisation, CIA+R
EUCyber Resilience Act15+ product security (Annex I)
EUAI Act (Art. 15)Robustness & cybersecurity for high-risk AIPartial
EURadio Equipment DirectiveNetwork protection, privacy, fraud
USFISMA / NIST 800-531,000+ controls
USEO 14028MFA, Zero Trust, EDR, SBOM
USCISA BOD 22-01 (KEV)Specific CVE patching
UKNIS Regulations 2018Outcome-based
UKUK GDPR Article 32Examples only
CHnDSG Article 8Protection goals
Financial Sector Regulations
EUDORA50+ across 11 articles
EU/UKPSD2 RTS on SCAStrong Customer Auth (2FA)
USNY DFS Part 500MFA, encryption, access controls
USGLBA Safeguards RuleMFA, encryption, access controls
USSEC Regulation S-PIncident response, access controls
USFFIEC CATAssessment-based
UKFCA PS21/3Outcome-based resilience
UKPRA SS1/21Outcome-based resilience
CHFINMA Circular 2023/1References ISO 27001
Critical Infrastructure
USNERC CIP45+ requirements across CIP-002–014
USTSA Pipeline DirectiveSegmentation, MFA, patching
USHIPAA Security RuleTechnical safeguards
USCMMC 2.0110+ practices (Level 2)
CHSKI StrategyReferences ISO 27001
Industry Standards
GlobalPCI-DSS v4.0250+ requirements
GlobalISO 27001:202293 controls (Annex A)
GlobalNIST CSF 2.0Process-basedProcess only
GlobalSOC 2Trust criteria
TOTAL: 30 Regulations Examined 0 / 30 0 / 30

The pattern is universal. Not a single regulation examined provides a threat taxonomy that would allow controls to be traced to specific threats, and not a single regulation distinguishes between controls that prevent compromise versus controls that limit damage after compromise.

Why Both Dimensions Matter: The MFA vs. Encryption Example

Consider two controls that regulations frequently mandate together: Multi-Factor Authentication (MFA) and Encryption at Rest. Most regulations list them side by side as if they were equivalent security measures. They are not.

Control Which Threat? (Horizontal) Chain Position (Vertical) Purpose
MFA #4 Identity Theft CAUSE-SIDE (Preventive) Prevents credential compromise from succeeding
Encryption at Rest Data Protection CONSEQUENCE-SIDE (Mitigating) Protects data IF system is already compromised

Without the horizontal dimension, you cannot answer: "Which threat does this control address?" Without the vertical dimension, you cannot answer: "Does this control prevent compromise or limit damage after compromise?" Regulations that conflate these produce incoherent security architectures.

The TLCTC Solution: A Two-Dimensional Framework

The Top Level Cyber Threat Clusters (TLCTC) framework provides exactly the two-dimensional structure that regulations lack, through its Bow-Tie model:

HORIZONTAL: 10 THREAT CLUSTERS (#1 – #10) VERTICAL: Preventive Controls DATA RISK EVENTS (C / I / A) VERTICAL: Mitigating Controls SYSTEM COMPROMISE DETECTION CAUSE SIDE CONSEQUENCE SIDE
Figure 2: The TLCTC Bow-Tie Model — integrating both the horizontal dimension (which threat cluster?) and vertical dimension (cause-side vs consequence-side).

The 10 Threat Clusters (Horizontal Dimension)

TLCTC classifies threats by the generic vulnerability they exploit, not by outcomes:

Cluster Generic Vulnerability
#1 Abuse of FunctionsDesigned features enabling unintended actions
#2 Exploiting ServerServer-side implementation flaws
#3 Exploiting ClientClient-side implementation flaws
#4 Identity TheftWeak identity/credential management
#5 Man in the MiddleUnprotected communication paths
#6 Flooding AttackFinite capacity resources
#7 Malware ExecutionDesigned execution capability
#8 Physical AttackPhysical accessibility
#9 Social EngineeringHuman psychological factors
#10 Supply Chain AttackThird-party trust dependencies

The Causal Chain (Vertical Dimension)

The Bow-Tie model separates controls by their position in the attack chain:

Position Purpose Example Controls NIST CSF
Cause-Side (Preventive) Prevent system compromise MFA, patching, input validation, access controls IDENTIFY, PROTECT
Central Event Detect compromise occurred SIEM alerts, anomaly detection, EDR DETECT
Consequence-Side (Mitigating) Limit damage after compromise Encryption at rest, backup/recovery, segmentation RESPOND, RECOVER

What Coherent Regulation Would Look Like

With this two-dimensional structure, a regulatory requirement could finally be stated coherently:

"Organizations shall implement controls addressing #4 Identity Theft, specifically multi-factor authentication for privileged access, because weak credential management enables unauthorized system access. This is a cause-side preventive control."

This statement identifies the threat (#4), names the generic vulnerability (weak credential management), specifies the control (MFA for privileged access), explains the causal relationship, and positions the control in the attack chain. It can be verified, challenged, and proportionally assessed.

Conclusion

The logical flaw in cybersecurity regulation is not subtle. It is a structural contradiction between what the referenced standards require (identification-first, chain-aware) and what the regulations themselves do (control-first without identification or chain positioning).

This contradiction cannot be resolved by writing more detailed control requirements. It can only be resolved by doing what the standards have always demanded: identifying threats first across both dimensions—which threat and where in the chain—then deriving control requirements from that identification.

The TLCTC framework provides the missing structure. It's available under CC BY 4.0 at tlctc.net.


Appendix: Detailed Regulation Analysis

This appendix provides detailed analysis of selected regulations, demonstrating how each conflates cause-side and consequence-side controls in flat lists without threat taxonomy.

EU GDPR Article 32 — Security of Processing

Structure: (a) pseudonymisation and encryption; (b) CIA of systems; (c) restore availability; (d) testing.

RequirementChain PositionProtects Against
(a) PseudonymisationConsequence-sideData exposure AFTER compromise
(a) EncryptionMixedTransit=cause-side, Rest=consequence-side
(b) CIA of systemsCause-sideSystem compromise
(c) Restore availabilityConsequence-sideAfter incident
(d) TestingMeta-controlBoth

Verdict: Flat list mixing cause-side and consequence-side controls without distinction.

US HIPAA Security Rule — §164.312 Technical Safeguards

Structure: (1) Access Control, (2) Audit Controls, (3) Integrity, (4) Authentication, (5) Transmission Security.

SafeguardChain PositionPurpose
Unique user IDCause-sidePrevent unauthorized access
Automatic logoffCause-sideLimit exposure window
Encryption/decryptionConsequence-sideProtect data if accessed
Audit controlsDetectionIdentify compromise
Person authenticationCause-sidePrevent Identity Theft (#4)
Transmission encryptionCause-sidePrevent interception (#5)

The Conflation: "Encryption and decryption" is listed under "Access Control" alongside "Unique user identification"—but User ID prevents unauthorized system access; Encryption protects data IF unauthorized access occurs.

Verdict: Flat list with superficial categorization. No cause-consequence distinction.

US NIST 800-53 Rev 5

Structure: 20 control families, 1,000+ controls.

FamilyControlsChain Position
AC (Access Control)25 controlsMostly cause-side
AU (Audit & Accountability)16 controlsDetection
CP (Contingency Planning)13 controlsConsequence-side
IR (Incident Response)10 controlsConsequence-side
SC (System & Communications)51 controlsMixed

The Problem with SC (System & Communications): SC-8 (Transmission Confidentiality) is cause-side; SC-28 (Protection at Rest) is consequence-side. Both in same family with no distinction.

Verdict: Extensive controls, no chain positioning. Baselines based on impact levels, not on whether controls prevent compromise vs. protect data after compromise.

Research conducted December 2025 across US, UK, EU, and Swiss jurisdictions.