Blog / Regulations & Compliance

TLCTC vs. Existing Standards & Regulations

A strategic gap analysis comparing the TLCTC framework with ISO, NIST, and EU Regulations. Why "Cyber" in the name doesn't ensure a unified risk taxonomy.

BK
Bernhard Kreinz
15 min read
The Strategic Challenge

The cybersecurity landscape is fragmented. While standards like ISO 27001 and NIST CSF provide governance, they often lack a consistent, root-cause-oriented cyber threat taxonomy. This analysis highlights where TLCTC fills the "Taxonomy Gap" to enable comparable risk assessments.

Comparative Analysis Approach

This comparison evaluates major frameworks against TLCTC's core principles using a checklist approach. We specifically look for these structural elements:

  • 1. Cyber Risk Definition Explicit definition centered on a specific event (like TLCTC's "Loss of Control").
  • 2. Cause-Oriented Threat Explicit definition based on the root cause (generic vulnerabilities), separating cause from impact.
  • 3. Structured Categorization A systematic taxonomy based on these definitions (e.g., the 10 Clusters).
  • 4. Attack Path Notation Standardized way to describe sequences using these categories.
Aligned / Explicit
Not Aligned / Missing
Implicit / Partial
N/A Not Applicable
Standard / Org Cyber Focus? Risk Def (Event)? Threat Def (Cause)? Taxonomy? Strategic View? Control Map? Attack Path? Why TLCTC Helps Here
TLCTC Framework Designed for Cyber Loss of Control Generic Vuln 10 Clusters Strategic (Proposed) Notation Directly addresses gaps: Designed specifically to provide consistent taxonomy, enable path description, and link strategy/operations.
ISO/IEC 27001:2022 'Cyber' in name Generic Risk Generic Threat Control focused ISMS focus Via Risk Assess None Provides the missing cause-oriented threat/risk structures to inform the 27001 risk assessment (Clause 6.1.2) and treatment.
ISO/IEC 27005:2022 'Cyber' in name Generic Generic Process focused Process view Selects controls Scenarios Provides the specific cause-oriented threat taxonomy and event-centric risk definition as structured inputs for the ISO 27005 assessment process.
NIST CSF 2.0 'Cyber' in name Outcome focused External Function taxonomy Program view Maps Outcomes None Provides the foundational threat/risk definitions & cause-oriented taxonomy that CSF lacks. Critical for the 'Identify' Function.
NIST SP 800-30 Rev 1 'Cyber' in desc Likelihood x Impact Circumstance Examples only Process view Considers impact Scenarios Provides structured, cause-oriented cyber threat taxonomy and event-centric risk definition as clearer input for the SP 800-30 assessment process.
NIST SP 800-53 Rev 5 Implied Control focused External Control families Control view Baselines None Provides the foundational cause-oriented threat/risk structures missing from SP 800-53. Helps understand the *threat context* for selecting controls.
FedRAMP Implied NIST RMF NIST RMF Control families Auth process Auth baselines None Provides the cause-oriented threat taxonomy & event-centric risk view missing from FedRAMP. Helps CSPs understand threats behind mandated controls.
MITRE ATT&CK Implied N/ATTP focus Technique def Behavioral Tactical view Maps TTPs Implicit Provides the strategic, cause-oriented threat categorization to link specific ATT&CK TTPs to. Offers standardized path notation.
MITRE CWE Supports Cyber N/AWeakness Weakness types Weakness types N/ADetailed view Mitigations N/ANone Provides the strategic *threat context* (cause) for *how* specific CWEs are exploited. Links cause (TLCTC cluster) to vulnerability (CWE).
STRIDE Violation focus Violation types Security property Attack types Attack types Implicit None Offers a consistent, cause-oriented threat categorization and event-centric risk view, complementing STRIDE's focus on violated security properties.
OWASP Top 10 Web App focus App Risk Vuln lists Ranked list Tactical Mitigations None Provides a stable, universal taxonomy, separating *how* an exploit works (cause) from the specific vulnerability listed in the Top 10.
Cyber Kill Chain 'Cyber' in name Lifecycle focus Steps taken Temporal phases Lifecycle view Courses of Action Chain implied Populates the CKC phases with specific content. TLCTC defines *how* a phase is executed (e.g., 'Delivery' via #9 or #10).
BSI (General) Supports Cyber InfoSec Risk Catalogue Structure varies Varies Maps threats None Offers clear derivation, consistent structure, better separation of cyber concepts compared to BSI's current approach.
CIS RAM Implied Standard Def Circumstance None None None None Provides the cause-oriented threat categorization layer to link risk assessment inputs to CIS Controls.
CIS Controls v8 Implied Implicit Defense focus None None Maps to ATT&CK None Provides the threat context for *why* specific CIS Controls are critical; helps map controls to specific risk causes.
CMMC 2.0 'Cyber' in name Implicit None None None Implicit None Provides threat context for CMMC controls. Helps prioritize implementation beyond pure compliance.
IEC 62443 (ICS) Implied ICS Risk Vectors/Scenarios Supports cat. SLs view Implicit (SLs) Supports paths Offers a universal threat taxonomy to standardize threat identification in 62443 assessments. Provides standard path notation.
ISO/SAE 21434 'Cyber' in name Likelihood/Impact Threat Scenarios TARA process System level Mandates trace Supports trees Provides a universal top-level threat taxonomy to complement ISO 21434's TARA process, enabling cross-project comparison.
GDPR / UK DPA Privacy focus N/APrivacy Risk N/ANone N/ANone N/ANone N/ANone N/ANone Provides cyber threat context for selecting technical/organizational measures (Art. 32). Links cyber threats to privacy risks.
SOC 2 (AICPA TSC) Audit focus Entity assessed Entity assessed Control criteria None Criteria vs Ctl None Provides threat taxonomy to inform entity's internal risk assessment (input to SOC 2). Helps users interpret SOC 2 reports.
ISAE 3402 Audit focus Audit std Entity assessed None None Objectives None Provides threat taxonomy to inform service organization's control design & user entities' interpretation of reports.
ETSI (General) Supports Cyber Standard defs Varies Varies None Varies STIX support Offers the missing universal, consistent threat taxonomy and path notation.
FAIR Quant. focus Quantified Risk Event Freq. Analysis tax. None Control impact Scenarios Provides structured threat categorization as input for FAIR's Threat Event Frequency analysis. Links loss to specific threat types.
VERIS Incident focus N/AIncident N/AActions/Assets Incident details None N/ANone Post-incident Provides pre-incident threat categorization, complementing VERIS's incident focus. Links incident actions back to root threat types.
Cyber Resilience Act 'Cyber' in name Product risk Implicit None None Requirements None Could provide threat taxonomy to inform CRA risk assessments and requirement applicability.
NIS2 Directive 'Cyber' implied Network risk Event-centric None None Measures None Could provide the needed taxonomy for risk assessments and guiding measure selection under NIS2.
DORA Implied ICT risk 'Cyber threat' None None Framework TLPT implied Provides threat taxonomy missing from DORA, standardizes path description (useful for TLPT context).
Cybersecurity Act 'Cyber' in name N/ACert focus 'Cyber threat' None None Schemes None Could provide underlying threat taxonomy for developing certification requirements.
TIBER-EU Implied Implied risks Ext. TI None None Tests ctl Implicit Provides structured threat categorization & path notation to standardize inputs/outputs for TIBER-style testing.
COBIT 2019 Gov focus I&T Risk Acknowledged Gov Objectives Gov view Practices None Provides cyber threat taxonomy as input for COBIT's risk objective (APO12). Links governance to specific cyber threat management.
CSA CCM v4 Implied Control matrix Control matrix Control domains None Controls -> Stds None Provides threat context for *why* specific CCM controls are needed. Helps prioritize CCM implementation based on cloud threat vectors.
PCI DSS v4.0 Payment focus Risk to CHD Implied Control reqs None Objectives None Provides threat taxonomy to link PCI controls to specific threat types. Helps prioritize based on broader threat landscape.
Scroll horizontally to view full comparison of all standards

Beyond Definitions: The Risk Management Challenge

While the comparison table highlights differing definitions and coverage, a deeper analysis reveals a more fundamental challenge: a widespread lack of a consistent, structured foundation for cyber risk management. This inconsistency hinders effective and comparable risk assessment across organizations and sectors.

1. The Event-Centric Nature

Many frameworks focus heavily on the adverse event (like 'data breach') or its consequences (impact). While important, this blurs the lines between the initial cause (the threat exploiting a vulnerability) and the ultimate effect. Without a clear, cause-oriented starting point, consistently identifying why specific risks arise and mapping them to preventive controls becomes difficult.

2. Overlooking the Event Chain

Cyberattacks are rarely isolated incidents; they often follow predictable sequences or "event chains" where one compromise enables the next (e.g., #9 Social Engineering#3 Client Exploit#7 Malware). Frameworks that treat TTPs in isolation, without a structured way to represent these sequences, miss the dynamic nature of real-world attacks.

3. Conflating System Compromise and Data Impact

A critical distinction, central to the TLCTC model, is often missed: the difference between the initial System Risk Event (the 'Loss of Control') and the subsequent Data Risk Events (Loss of CIA). Failing to separate these leads to inconsistent mapping of preventive controls versus detective/reactive controls.

Conclusion: The Value of a Unified Threat Language

The TLCTC framework acts as a "Rosetta Stone" – a simple, logically derived, and universally applicable taxonomy of the 10 fundamental ways cyber threats manifest. By adopting TLCTC, organizations can:

  • Improve Communication: Use a consistent language for threats across strategic and operational teams.
  • Enhance Risk Assessment: Ensure all primary threat vectors are considered systematically.
  • Strengthen Control Mapping: Understand why certain controls (from NIST 800-53 or CIS) are necessary by linking them to the TLCTC clusters they mitigate.