What are you looking to achieve?
This is the question we ask upfront when working together with an organisation on a cyber security exercise. Doing an exercise to say you did one shouldn't be the actual goal. It should be about the insights they uncover, the learnings they provide, the capability they validate, the outcomes they deliver. The exercise is the vehicle to the destination. Fortunately, they are an incredibly versatile and dynamic vehicle, able to be leveraged in multiple ways to achieve a whole range of outcomes.
At Retrospect Labs, we live and breathe cyber security exercises, having delivered close to a thousand exercises since founding in 2019. Here are eight use cases we’ve come up with, many of them we’ve helped realised for organisations we’ve worked together with.
1. Answering the “what if…” questions
There may have been a recent public incident resulting in questions from the C-suite, or some new threat intelligence received about an adversary targeting your sector, or perhaps there is active exploitation of a newly discovered vulnerability in a product your company uses. Often something happens that triggers the thought of “what if”. What if our organisation was the victim instead, how would we fare? What if we had to isolate these hosts to contain a ransomware attack, could we still operate our critical services? What if this adversary was in our environment, do we have enough visibility to detect their tradecraft?
We sometimes see these questions answered in a subjective way, perhaps solely on gut feel. An incorrect assessment could lead to a false sense of security and inaction, even if the true risk faced is at an unacceptable level. Exercises can generate tangible evidence that can paint a better picture, enabling us to answer those questions more confidently and accurately.
Side note: the type of exercise chosen determines the quality of evidence you can collect, which in turn affects the accuracy with which you can answer these “what if” scenarios. Tabletop discussion-based exercises are good but functional live-play exercises where you discuss the response, as well as physically carry them out, yield the best evidence.
2. Testing plans and procedures
From our experience, testing of the cyber security incident response plan, communications plans, and playbooks ranks as the most common use case for doing exercises.
3. Validating invested capabilities
Periodic exercises to validate invested capabilities in the context of different incident types and Tactics, Techniques and Procedures (TTPs) will provide you more confidence that they will perform the way you expect them to when facing a real incident.
4. Developing [insert skill here]
Exercises are an ideal way to develop your incident response skills, whether it be forensics, incident management, communications, or something else. At Retrospect Labs, we create skills-based exercises that focus on a few aspects associated with a specific incident type being experienced by a fictional victim organisation. For example, we have a pack of exercises we call the “Forensic Files” that provides the opportunity for individuals to be exposed to and learn how to analyse a memory dump, or know what a brute force attack looks like from a log perspective.
Communications is another skill you can develop and nurture through exercises. Engaging in exercises that simulate incidents requiring coordination with diverse stakeholder groups enables individuals to refine their communication strategies.
5. Establishing an internal certification program for the Security Operations Centre
Cyber security exercises can serve as a cornerstone for establishing an internal certification program within a Security Operations Centre (SOC) by providing a structured, realistic environment for personnel to demonstrate and refine their capabilities.
Tailored to mirror the escalating complexity and responsibility characteristic of SOC analyst tiers, exercises enable analysts to showcase their competencies in scenarios that reflect their role's specific challenges.
For example, Level 1 analysts might tackle exercises focused on initial threat detection and alert triaging, while level 2 analysts might engage in deeper incident analysis and remediation strategies. Level 3 analysts could be tested on advanced threat hunting, forensic investigations, and strategic response planning. This stratified approach ensures that the certification process is aligned with the skill sets relevant to each tier and emphasise a hands-on demonstration of the analysts' abilities to confront cyber threats at their respective levels of expertise. Ongoing exercises will also ensure the team builds and maintains the muscle memory of best courses of actions when responding to incidents.
6. Identifying the candidates you should hire
If you are hiring to fill positions within your organisation’s cyber incident response team, consider leveraging exercises as part of the process. Exercises can be crafted to reveal which candidates have the requisite skills, or the aptitude to rapidly develop them, for the positions they seek. It's also beneficial for the candidates as the exercise can provide a more accurate portrayal of what the job entails.
7. Delivering engaging security awareness
8. Creating some friendly competition
Break from the routine and give running an exercise-based competition a go.
We hope this blog post has given you some ideas on how to leverage cyber security exercises in multiple ways. If you think of other use cases or innovative applications for exercises, please reach out to us. We’re keen to hear what you come up with!