TLCTC Blog - 2025/02/21

Comparing TLCTC and CRF Threat Taxonomy Frameworks

A comparison of two threat taxonomies: The "Top Level Cyber Threat Clusters (TLCTC)" and the Cybersecurity Risk Foundation's "CRF - Threat Taxonomy (TT) 2024". These frameworks are analyzed for consistency and completeness, considering their stated goals and methodologies.

The Top Level Cyber Threat Clusters (TLCTC)

Reference: TLCTC (2025/04/18) - Top Level Cyber Threat Clusters

Goal

To create a universal, consistent taxonomy that bridges strategic risk management and operational security. It aims to be pragmatic and applicable across diverse IT systems and contexts. It explicitly separates threats from threat actors, vulnerabilities, and consequences.

Methodology

Thought Experiment

The TLCTC starts with a thought experiment, imagining IT as a single object with attack surfaces, then derives 10 threat clusters based on generic vulnerabilities.

Axioms

The framework is built upon explicit axioms, which are fundamental assumptions that must be accepted to validate the concept. These axioms enforce distinctions (e.g., threats vs. vulnerabilities) and define the scope.

Two-Tiered Approach

Distinguishes between a strategic management layer (high-level clusters) and an operational layer (sub-threats, TTPs).

Client-Server Model

Uses the client-server interaction model as a fundamental principle, even extending it to physical layer analysis.

Sequence Focus

Emphasizes attack sequences (attack paths) rather than just isolated threat events.

Integration

Demonstrates how the framework can integrate with existing standards and frameworks like NIST CSF, MITRE ATT&CK, STIX, and even FAIR.

Structure: 10 top-level threat clusters, each linked to a generic vulnerability

TLCTC ID Threat Cluster
TLCTC-01.00 Abuse of Functions
TLCTC-02.00 Exploiting Server
TLCTC-03.00 Exploiting Client
TLCTC-04.00 Identity Theft
TLCTC-05.00 Man in the Middle
TLCTC-06.00 Flooding Attack
TLCTC-07.00 Malware
TLCTC-08.00 Physical Attack
TLCTC-09.00 Social Engineering
TLCTC-10.00 Supply Chain Attack

Key Features

Generic Vulnerability Focus

Each cluster is tied to a root cause vulnerability, not a specific technology or attack technique.

Cause-Oriented

Threats are positioned on the "cause" side of a Bow-Tie risk model.

Non-Overlapping (Claimed)

The axioms and methodology are designed to create distinct, non-overlapping clusters.

Extensible

The operational layer allows for detailed sub-threats and TTPs.

Practical Application

Provides guidance for integration with SSDLC, secure coding practices, threat intelligence, and risk assessment.

Cybersecurity Risk Foundation's CRF - Threat Taxonomy (TT) 2024

Reference: https://crfsecure.org/research/crf-threat-taxonomy/ (2025/02/21) - CRF-TT

Goal

To provide a "structured framework to enhance the understanding and response to cyber risks." It aims to be a "practical guide aimed at empowering organizations to navigate the complexities of cybersecurity."

Methodology

Less explicitly defined than TLCTC. It mentions "extensive research and expert consensus," but the derivation process for the categories isn't detailed.

Structure: A three-part framework

Framework Section Components Focus
Threat Agents Hacktivists, Cybercriminals, Nation-States, etc. WHO - The actors behind threats
Threat Activities Physical Threats HOW/WHAT - Actions and vulnerabilities
Operational Threats
Technical Threats
Threats to an Organization Confidentiality, Integrity, Availability impacts EFFECT - Consequences of threats

Threat Ratings for agents, actions and impacts are given.

Key Features

Broad Categories

Uses high-level categories like "Physical Threats," "Operational Threats," and "Technical Threats."

Actor Focus

Includes a section dedicated to categorizing threat actors.

Impact Focus

Explicitly addresses the impact of threats on the organization.

Threat Ratings

Assigns numerical threat ratings to each category.

Comparison: Consistency and Completeness

Aspect TLCTC Framework CRF Threat Taxonomy
Methodology Clear methodology based on thought experiment and explicit axioms. Transparent derivation process. Lacks explicit methodology. Mentions "expert consensus" but derivation process is not detailed.
Structure Consistent focus on generic vulnerabilities. Two-tiered approach with strategic and operational layers. Mixes different concepts: actors (WHO), actions (HOW), vulnerabilities (WHAT), and consequences (EFFECT).
Completeness Claims completeness within scope. Generic vulnerability focus likely covers fundamental attack surfaces. Extensible to new techniques. Harder to assess due to lack of methodology. Broad categories may lead to gaps or overlaps. Example: supply chain attacks don't fit neatly.
Separation of Concerns Strong emphasis on separating threats, actors, vulnerabilities, and consequences. Mixes these concepts, potentially leading to confusion.
Practical Application Detailed guidance with integration examples and applications across security disciplines. Less detailed focus on practical implementation.
Primary Focus Generic vulnerabilities and attack sequences Threat actors and broad threat categories
Categorization Basis Consistent basis (generic vulnerabilities) Mixed basis (actors, activities, impacts)

Methodology and Derivation

TLCTC

Wins on consistency due to its clearly defined methodology (thought experiment and axioms). This provides a logical basis for the categories and helps ensure they are distinct and non-overlapping. The derivation process is transparent.

CRF

Lacks a clear, explicit methodology. The derivation of the categories isn't explained, making it harder to assess their completeness or consistency.

Structure and Categorization

TLCTC

More consistent in its structure. It focuses on generic vulnerabilities as the basis for categorization, which provides a more fundamental and stable framework. The two-tiered approach allows for both strategic overview and operational detail.

CRF

Less consistent. It mixes different types of categories:

  • "Threat Agents" are actors (WHO).
  • "Threat Activities" are a mix of actions (HOW) and some underlying vulnerabilities (WHAT). The subcategories (Physical, Operational, Technical) are very broad and overlap. For example, "System Abuse by Authorized Personnel" could involve technical actions. "Social Engineering of Personnel" is an action, not a category of threats in the same way that "Physical Loss of Assets" is.
  • "Threats to an Organization (Impacts)" are consequences (EFFECT).

This mixing of actors, actions, and consequences makes the CRF taxonomy less logically coherent than the TLCTC.

Completeness

TLCTC

Claims completeness within its scope (defined by the axioms and thought experiment). The focus on generic vulnerabilities suggests a higher likelihood of covering the fundamental attack surfaces. The extensibility (sub-threats) allows for capturing new and evolving techniques. The document explicitly addresses the question of "oversimplification" and argues that the strategic level requires abstraction.

CRF

Completeness is harder to assess due to the lack of a clear methodology. The broad categories could lead to gaps or overlaps. For example, where would a supply chain attack involving compromised firmware fit? It's not purely "Physical," "Operational," or "Technical." The CRF taxonomy doesn't provide a clear home for it. The ratings system is subjective.

Separation of Concerns

TLCTC

Strong emphasis on separating threats, threat actors, vulnerabilities, and consequences. This is a key strength for risk management and control mapping.

CRF

Mixes these concepts, which can lead to confusion.

Practical Application

TLCTC

Provides detailed guidance and examples of how to apply. Integration and clear, practical examples.

CRF

Less focus on practical application.

Conclusion

The TLCTC framework is more consistent and likely more complete than the CRF taxonomy. Here's why:

Consistent Methodology

TLCTC's use of a thought experiment and axioms provides a strong, logical foundation for its categories. The CRF taxonomy lacks this clear methodological basis.

Clear Separation of Concerns

TLCTC rigorously separates threats, actors, vulnerabilities, and consequences. The CRF taxonomy mixes these, leading to overlaps and inconsistencies.

Generic Vulnerability Focus

TLCTC's focus on generic vulnerabilities makes it more adaptable to new technologies and attack techniques. The CRF taxonomy's broad categories are less precise.

Two-Tiered Structure

TLCTC's strategic and operational levels allow for both high-level risk management and detailed threat analysis.

Completeness by design

TLCTC uses a thought experiment to derive the clusters, and the axioms.

The CRF taxonomy provides a useful starting point, but its lack of a clear methodology, inconsistent categorization, and mixing of concepts make it less robust and less suitable for comprehensive cyber risk management than the TLCTC. The TLCTC provides practical examples to apply the concept.