This document provides a 7-step guide for organizations to survive a web attack. It begins with understanding the threat actor and developing a security response plan. The next steps involve locating all applications and servers, scanning them for vulnerabilities, and strengthening application, network, and endpoint security controls. The guide also provides tips for protecting against distributed denial of service attacks and application layer attacks. Overall, it aims to help organizations facing an impending web attack by providing a well-thought out strategy to identify risks and harden their defenses.