Companion Note / Framework & Concepts · Regulations & Compliance

Propagated Controls — Managing Controls Over Event Chains

A companion note to TLCTC v2.0 that lifts the Propagated PR mechanism out of the glossary, names its four sources — regulatory, contractual, BCM, internal policy — and works through GDPR/NIS2 and BCM examples that share the same structure.

BK
Bernhard Kreinz
Loading read time...
Status & Audience

Status: Companion note to TLCTC v2.0 (formalizes a v2.0 glossary concept and generalizes it beyond compliance).

Audience: CISOs, IR designers, BCM/operational-risk owners, GRC architects.

TL;DR

A single incident produces a chain of eventsSRE → DRE → BRE₁ → … → BREₙ. Each event has its own NIST CSF container (ID, PR, DE, RS, RC, GV). But the obligation to satisfy a downstream Protection Requirement (PR) usually fires earlier in the chain — the GDPR notification clock for a future BRE starts at the DRE; a continuity-plan invocation for a future business-disruption BRE starts at the SRE. TLCTC models this with a single, generic mechanism: propagation of PR controls backward into the RS (Respond) container of an upstream event.

RS Container — canonical formula
RS(Eₙ) = { Response } ∪ { Propagated PR(Eₙ₊₁) } ∪ … ∪ { Propagated PR(Eₙ₊ₓ) }

This document lifts that mechanism out of the glossary, names the sources of propagation (regulatory, contractual, BCM, internal policy), and works through two examples — one compliance, one BCM — that share the same structure.

Click to Enlarge
Propagated PR — Backward Propagation Up the Event Chain A PR control for Eₙ₊ₓ executes inside RS(Eᵢ) — the earliest event whose classification suffices to trigger it causes causes CYBER RISK EVENT E₁ (SRE) System Compromise PR PROTECT MFA, EDR, Segmentation DE DETECT SIEM, Anomaly Detection RS RESPOND (host) Native: containment, eradication, forensics + Propagated PR(BRE_NIS2 / BRE_disruption) Notify CSIRT (24h) · Invoke BCP (RTO) Declare alternate site · crisis-comms + Propagated PR(BRE_internal-policy) Board notification (severity ≥ S2) Legal-hold trigger RC RECOVER System Restoration DATA RISK EVENT E₂ (DRE) Data Risk Event [C/I/Ac] PR PROTECT DLP, Access Controls, Encryption DE DETECT DLP alerting, exfiltration detection RS RESPOND (host) Native: breach assessment, evidence preservation + Propagated PR(BRE_GDPR) Notify DPA within 72h Affected-individual communication Customer-comms SLA (contractual) RC RECOVER Remediation, control improvements BUSINESS RISK EVENT E₃ (BRE) Downstream Consequence PR PROTECT (source) Native: deadline tracking, auto-triggers Actions execute earlier in chain — ↖ propagates to RS(DRE) (e.g. GDPR-style) ↖ propagates to RS(SRE) (e.g. NIS2 / BCM) ↖ propagates to RS(SRE) (e.g. internal-policy) Rule: earliest event whose classification triggers obligation DE DETECT Regulatory-deadline monitor RS RESPOND Regulatory comms, legal response RC RECOVER Post-event audit, lessons learned propagation to RS(DRE) propagation to RS(SRE) — reaches the earliest event that already triggers the obligation — FOUR SOURCES OF PROPAGATED CONTROLS All four behave identically: PR of a downstream BRE executes as RS-step of an upstream event. Source determines authority & trigger definition only. REGULATORY GDPR Art. 33 · NIS2 Art. 23 DORA · SEC 8-K · HIPAA Host: DRE or SRE Timing: hours to days Most visible source CONTRACTUAL Customer SLA notification Cyber-insurance triggers Host: DRE or SRE Timing: minutes to hours Bilateral obligations BCM / BIA BCP invocation · Failover Alternate site · Crisis comms Host: SRE or DRE Timing: minutes (RTO) Same mechanism — no regulator INTERNAL POLICY Board notification thresholds Legal hold · Ethics referral Host: SRE, DRE, or BRE Timing: hours Org-internal governance
Figure 1: The propagation mechanism. A PR control for a downstream BRE (green box, right) does not execute at BRE time — it is hosted in the RS container of an upstream event (orange "host" boxes). Backward propagation arrows show where each obligation lands, with the four sources colored at the bottom.

1. The mechanism

The Bow-Tie consequence chain (see glossary: Event Chain, Business Risk Event) is causally directional: an SRE may cause a DRE, which may cause one or more BREs. Controls in the NIST CSF sense are normally placed at the event they protectPR(BRE_GDPR-violation) would be "do the things that prevent a GDPR violation".

But many of those PR controls only make sense as actions taken earlier in the chain:

  • Notify the supervisory authority within 72h prevents the GDPR-violation BRE, but the action is part of responding to the DRE.
  • Invoke the continuity plan prevents the prolonged-outage BRE, but the action is part of responding to the SRE.
  • Activate the customer-communication SLA prevents the contractual-breach BRE, but the action is part of responding to the DRE.

So the PR for the downstream event is hosted in the RS container of the upstream event. This is propagation backward up the chain. It is purely a placement rule — the control is still semantically a PR for Eₙ₊ₓ; it just executes during RS(Eₙ).

1.1 Why this matters

Without naming the mechanism, IR playbooks degenerate into "reporting checklists" — flat lists of obligations bolted onto the response procedure with no causal grounding. With it, every propagated control has:

  1. A source event (which downstream BRE this PR belongs to).
  2. A host event (which upstream RS container is the right place to execute it).
  3. A timeline anchored to the host event clock, not the source.
  4. A trigger condition based on the host event's classification.

Two propagated controls can sit in the same RS container with completely different clocks and authorities (see §3.1).

2. Sources of propagated controls

Compliance is the most visible source of propagation, but not the only one. Four sources cover the practical cases:

Source Examples Typical host event Typical timing
Regulatory GDPR Art. 33, NIS2 Art. 23, DORA, SEC 8-K cyber, HIPAA breach notice DRE or SRE Hours to days
Contractual Customer SLA notification, partner-disclosure clauses, cyber-insurance trigger conditions DRE or SRE Minutes to hours
BCM / BIA Continuity-plan invocation, failover decision, alternate-site activation, crisis-comms playbook SRE or DRE Minutes
Internal policy Board notification thresholds, internal legal-hold triggers, ethics-committee referral SRE, DRE, or BRE Hours

All four behave identically: they are PR controls of a downstream BRE that execute as RS steps of an upstream event. The framework is source-agnostic; the source only changes who owns the obligation and what defines "trigger".

3. Worked example A — Compliance (GDPR vs NIS2)

Companion blog: GDPR vs NIS2: Different Trigger Points for Compliance Events — full visual treatment of the example below.

A ransomware incident affects a NIS2-scoped operator whose data includes PII.

Event chain — ransomware affecting NIS2 + GDPR scope
SRE (System Compromise)
  └─ DRE [C] (PII confidentiality loss)
        ├─ BRE_GDPR  (notification obligation, Art. 33, 72h)
        └─ BRE_NIS2  (incident report, Art. 23, 24h early warning + 72h report)

Trigger placement:

Regulation Triggers at Propagated PR hosted in Timeline
GDPR Art. 33 DRE (PII confirmed) RS(DRE) 72h after awareness
NIS2 Art. 23 SRE (significant incident classified) RS(SRE) 24h early warning + 72h notification

In notation:

RS containers for SRE and DRE
RS(SRE) = { containment, eradication, forensics }
        ∪ { Propagated PR(BRE_NIS2):  notify CSIRT within 24h }

RS(DRE) = { breach assessment, evidence preservation }
        ∪ { Propagated PR(BRE_GDPR): notify DPA within 72h }
Common failure mode

The two propagated controls sit in different RS containers and have different clocks. Confusing them — putting GDPR in RS(SRE) or NIS2 in RS(DRE) — is the standard failure mode of generic "incident reporting checklists".

4. Worked example B — BCM (business disruption)

Compliance is the visible propagation case. The same mechanism — without any regulator involved — is the BCM/BIA control set.

A ransomware-driven outage of a payment-processing platform:

Event chain — payment platform ransomware outage
SRE (System Compromise)
  └─ DRE [Ac] (data present but encrypted, application data inaccessible)
        └─ BRE_disruption  (payment platform unavailable > RTO)
              └─ BRE_revenue_loss / BRE_contract_breach

BRE_disruption has its own PR set — the business continuity controls: failover capability, alternate-site readiness, RTO/RPO targets, manual-process playbooks, customer-communication SLAs. But none of those execute at BRE time. They execute earlier, propagated backward:

RS containers carrying BCM continuity controls
RS(SRE) = { containment, eradication, forensics }
        ∪ { Propagated PR(BRE_disruption): invoke BCP, declare alternate site,
                                            engage crisis-comms within RTO clock }

RS(DRE) = { restore from clean backup, validate data integrity,
            verify application state }
        ∪ { Propagated PR(BRE_disruption): activate manual processing,
                                            execute customer-comms SLA }

The IR playbook for the SRE is the BCM invocation point. The continuity controls that protect the disruption-BRE live inside RS(SRE) and RS(DRE) — exactly the same pattern as GDPR/NIS2, but driven by a BIA rather than a regulation.

This is why mature IR runbooks have BCM hand-off steps baked in: those steps are propagated PR controls in TLCTC terms. The BCM team's RTO/RPO is the timeline; the IR team's SRE/DRE classification is the trigger.

4.1 Control objectives per event — system, data, disaster recovery

The mechanism becomes most natural when you read it from the control-objective side: each event in the chain owns its own recovery objective, and those objectives are typically held by different organizational units. Propagation is what happens at the seams between them.

RC(SRE)
System Recovery

Restore the technical system to a clean, known-good state — reimage, patch, rejoin, validate.

Owner: IT operations / IR
Handover to BCM if classification ≥ threshold
RC(DRE)
Data Recovery

Restore data integrity, confidentiality, or accessibility — clean-backup restore, integrity validation.

Owner: Data/application owner + IR
Handover to BCM emergency org (typically mandatory)
RC(BRE)
Disaster Recovery

Restore business operations end-to-end — failover, alternate site, manual processing, crisis-comms.

Owner: BCM / Crisis management
Escalate to executive crisis committee / board

The DRE is where propagation becomes operationally visible. When data is encrypted by ransomware or known to be exfiltrated, the data-recovery team alone cannot complete the recovery objective — their RS plan must hand the baton over to the overarching emergency organization that owns the BCP/DR machinery. That handover is not a courtesy step; it is the moment where the PR control belonging to BRE_disruption (held by the BCM org) executes as an RS-step inside RS(DRE).

RS(DRE) decomposed by control objective
RS(DRE) = { Data-recovery response:
              restore from clean backup, validate integrity, verify state }
        ∪ { Propagated PR(BRE_disruption):
              HANDOVER to BCM emergency org, declare disaster,
              activate DR plan, execute customer-comms SLA }

The handover step belongs, conceptually, to the BCM org — their job is to prevent the disruption-BRE, so any control that does so is their PR. But the handover executes inside the data-event response plan, because RS(DRE) is the earliest point where the data-recovery team can determine that local recovery is insufficient and escalation is warranted. Two organizations, two control objectives, one container.

The same pattern plays out at the SRE level for severe incidents: the IR team's response plan must include an early handover to BCM if the incident classification crosses the threshold — which is exactly the NIS2-style propagation from §3. This is why mature IR runbooks have a step labelled something like "Escalate to BCM / DR organization" near the top: that step is the BCM org's propagated PR control, sitting in the IR team's RS container, gated by a classification threshold.

Read this way, propagation is the formal name for organizational handover. The question "which container does this control belong in?" becomes the question "which org owns the objective this control serves, and which org's RS plan executes it?" — and those two answers do not have to match.

5. Placement rule

Where does a propagated control belong?

Rule of Propagation: A PR control for event Eₙ₊ₓ is hosted in RS(Eᵢ) where Eᵢ is the earliest event in the chain whose classification suffices to trigger the obligation.

Two practical consequences:

  1. GDPR-Art-33-style obligations propagate to the DRE, because they require PII (i.e., a DRE-C classification) to fire — the SRE alone is not enough.
  2. NIS2-Art-23-style or BCM-RTO-style obligations propagate all the way back to the SRE, because an incident classification of sufficient severity is the trigger — no downstream event is needed.

Earlier placement = longer reaction time but also more uncertainty (you may invoke obligations that turn out not to apply). The classification quality at each event determines how aggressively propagation can reach upstream.

6. Relationship to existing v2.0 concepts

Already in the glossary:

  • Propagated PR (V2.0) — line 1073 of tlctc-glossary.md. Defined for regulatory use. This document generalizes the source to four categories without changing the definition.
  • RS Container (Respond Container) (V2.0) — line 1205. The formula RS(Eₙ) = { Response } ∪ { Propagated PR(Eₙ₊₁) } ∪ { Propagated PR(Eₙ₊ₓ) } is the canonical statement.
  • Eₙ Event Notation (Regulatory) (V2.0) — line 528. The subscript notation (E3a, E3b) generalizes naturally to non-regulatory branches.
  • Event Chain — line 560. The SRE → DRE → BRE₁ → BREₙ chain is the substrate of all propagation.

This document does not introduce new notation, axioms, or classification rules. It is a clarification of where existing v2.0 mechanics apply.

7. Open questions

  • JSON representation. Layer 3 attack paths currently model PR/DE/RS/RC controls indirectly. A future schema extension could carry an explicit propagated_controls[] array on each event node, with fields { source_event, source_type (regulatory|contractual|bcm|policy), authority, clock_start, deadline }. Not in scope here.
  • Layer 2 registry. A reference list of common propagated controls per source type (a "propagation registry") would let organizations stamp their IR playbooks without reinventing the mapping each time.
  • TLCTC+ alignment. The TLCTC+ NCSC/CERT proposal (documentation/tlctc-plus-ncsc-proposal.md) defines a + [BRE: ...] annotation. A propagated control is operationally adjacent — they may or may not warrant explicit linkage. Deferred.

References

About the Methodology

The mechanism described here is a v2.0 glossary concept (Propagated PR) lifted out of the regulatory context and generalized to four sources. The SRE → DRE → BRE notation represents the three-stage consequence chain: System Risk Event, Data Risk Event, Business Risk Event. NIST CSF function abbreviations (ID, PR, DE, RS, RC, GV) follow CSF 2.0. For more on the framework, see tlctc.net.