March 3, 2025

SEBI – CSCRF Simulation and TableTop Exercise program implementation

By venkat

Annexure-E: Scenario-based Cyber Resilience Testing

This is a sample template for Stock Exchange. REs are encouraged to make their scenarios in consultation with their IT Committee for REs. Sample scenarios that are targeted to cover in Cyber Response plan as well as Cyber Resiliency Testing
(Types of Attack × Potential Targeted Time intervals- On Core Systems):

WHY THIS HAS BEEN GROUPED INTO TIME ZONES

Timing and context is KEY and dictates what are the investigation steps the kind of response and restoration activities that needs to be done.

Cyber
Attack->

Time
Interval
DDoSMalware/ Malicious
Code Attack
Application
Level
Attacks
(SaaS Model)
DNS
Based
Attacks
(Internal &
Internet)
Brute
Force/Authentication
based attack
AD
attack
Pre-open
Sessions
Before
BOD/early
Morning

Before 9:00
hrs

B/W 9:00
9:15 hrs
Regular
Trading
Sessions
09:15 –
15:30 hrs
Closing
Session
15:30 -16:00
hrs

Post 16:00
hrs

You need to continuously build Cybersecurity incident recovery plan scenarios and run them as Table Top Simulation exercises. But to the core is your Cyber Crisis Management Plan (CCMP).

Attack Scenario Category Types of attacks ImpactResponse & Recovery
DDOSService
Unavailability
DDOS Protection services for auto mitigation.
Malware AttacksRansomware


Spyware
Trojans
Bots
Worms
Service
Unavailability, Data
Corruption, Data
exfiltration, Website
Defacement
1. Isolate and contain the infected systems
from overall network. Block IOCs, DNS traffic.

2. Restrict administrative and system access.

3. Monitor network traffic.

4. Restore OS, application and data from existing backups.
Application Level AttacksInjection

Broken Authentication
& Session
Management

Cross-Site
Scripting/request
forgery
Service
Unavailability,
Website
Defacement
1. Monitor network traffic and logs.

2. Disable suspected user accounts and
change access credentials.

3. Apply patches/changes for vulnerability.
DNS Based AttacksDNS Spoofing/Cache
Poisoning

DNS Flood Attack

DNS Encoding
Service
Unavailability
1. Analyse the traffic requests.

2. Restore DNS entries

3. Monitor the DNS requests and responses
Social Engineering AttacksPhishing, QRishingIt is a method, It
may lead to any of
the other attack
Spam filtering policy should be configured in
available tools as a precaution.
Watering holeTargeted individuals,
organization, group of
people
Website infection,
Service
Unavailability
Coordination with respective
agency/website owner.

Isolation of affected systems.

Clean/replace the affected system.
Brute ForceTrial and Error
approach

Authentication Based
Attack
Service
Unavailability,
Unauthorized
Access
1 Proper account locking mechanism.

2. Monitoring
Active Directory AttackInappropriate accessData Confidentiality,
compromised user
accounts, new user
creation
1.Review default security settings.

2.Least privilege in AD roles.

FlexibleIR Approach and Playbooks
Our detailed After Action Reports – To get better after each Tabletop