Tabletop - Exercise Based On DDos Attack
Tabletop - Exercise Based On DDos Attack
-The goal of this tabletop exercise is to test the organization’s response to a Distributed
Denial of Service (DDoS) attack, focusing on coordination among IT security,
communications, legal, and business continuity teams.
Exercise Date
-14/09/2024
Participants
- Incident Commander: Leads the overall response, coordinates with all other teams,
and makes critical decisions.
-IT Security Lead: Responsible for detecting, mitigating, and preventing the DDoS
attack.
-Legal Advisor: Ensures compliance with relevant legal frameworks and assists with law
enforcement coordination.
-Business Continuity Lead: Ensures essential services remain operational during and
after the attack.
Scenario Summary
- This exercise simulates a downtime scenario where the online shopping system
experiences an outage. The teams must respond to customer inquiries, ensure
orders are not lost, and communicate updates.
2. Scenario Background
Scenario Introduction
Trigger Event
In-scope
IT infrastructure
Communications and public relations
Legal and compliance issues
Non-IT-related business operations
Incident Commander: Coordinates the response efforts. Decides when to escalate and
involves external parties such as law enforcement.
The Incident Commander initiates the exercise, briefing the participants about the
detected DDoS attack and its potential impact on the organization.
The IT Security Lead investigates and confirms that the attack is a DDoS, coming from
multiple regions.
The Business Continuity Lead reviews which services are disrupted and ensures backup
services are activated where possible.
The IT Security Lead escalates the incident to the Incident Commander. External DDoS
mitigation services are activated.
The Legal Advisor contacts relevant law enforcement agencies and advises on filing a
formal complaint under Section 66F of the IT Act, which deals with cyber terrorism.
A critical decision point arises: should the organization temporarily take down non-
essential services to focus on restoring core systems? The Incident Commander must
make the final call based on input from all team members.
The IT Security Lead works with external vendors to block malicious traffic.
The Communications Lead drafts a public statement, following Section 79 of the IT Act,
ensuring that the organization complies with intermediary liability protections.
The Communications Lead updates the media and clients, emphasizing the organization’s
commitment to resolving the issue, following the advice of the Legal Advisor to avoid
any legally compromising statements.
After-Action Review
- A formal review is scheduled to assess the effectiveness of the response plan and make
recommendations for future improvements.
7. Performance Metrics
Performance Evaluation
8. Follow-up Actions
Recommendations for Improvement
- We would like to extend our sincere gratitude to all participants for their valuable
contributions to this tabletop exercise. Your active involvement and collaboration were
essential in testing and refining our incident response plan for a DDoS attack scenario.
Next Steps
As we move forward, we will focus on the following actions based on today’s exercise: