{% block extra_head %} {% endblock %}
{% block content %} {% endblock %}It is also possible to establish other objectives aligned with the needs.
These objectives will guide all the definitions made during the design.
This definition may include one or more types of threats in relation to the objectives of the exercise. This may be defined by risk management, or cyber threat intelligence reports (internal, external, or aligned with the sector to which the organization belongs).
Thetype of threats will serve as the primary guide for the various tactics, techniques, and procedures selected in the next stage. The most common types are: Ransomware, Denial of Service, Insider Attackers, Information Leakage, Social Engineering, Supply Chain Attack, and Physical Disruption.
Consider regulations, standards or frameworks applicable to the organization that may contain application requirements related to the exercise.
These may add value to the definitions made during design.
Define which assets will be involved in the scenario, and the business processes they support will be key to design a scenario aligned to the objectives.
Among others we can find:
This definition will help us to generate injects oriented to the different participants according to their roles and responsibilities.
Completely through messaging channels, with scheduled meeting intervals or constantly grouped by the different areas can be some of the interaction modalities.
Remember that one of the main objectives of TTX is about communication. Consider these channels from the design of the injects.
Based on the objectives and scope of the exercise, we can determine if the exercise will contain detailed technical elements or if it is not necessary.