Code Red Scenario: Web Hosting Company Crisis
Code Red Scenario: Web Hosting Company Crisis
Planning Resources
Scenario Details for IMs
Hook
Initial Symptoms to Present:
Key Discovery Paths:
Detective Investigation Leads:
Protector System Analysis:
Tracker Network Investigation:
Communicator Stakeholder Interviews:
Mid-Scenario Pressure Points:
- Hour 1: Major e-commerce client threatens contract termination due to website defacement during peak sales period
- Hour 2: ISP contacts company about malicious scanning traffic violating terms of service
- Hour 3: Security community reports company’s servers participating in coordinated DDoS attack preparation
- Hour 4: News media reports widespread internet worm affecting web hosting providers
Evolution Triggers:
- If response takes longer than 6 hours, infected servers participate in massive coordinated DDoS attack
- If patch deployment is delayed, worm continues spreading to additional client websites
- If network isolation fails, company infrastructure continues contributing to internet-wide attacks
Resolution Pathways:
Technical Success Indicators:
- Emergency patch deployment stops worm propagation across server infrastructure
- Network isolation prevents further participation in coordinated internet attacks
- Server restart and patching removes memory-only infection while maintaining client services
Business Success Indicators:
- Client relationships maintained through rapid response and transparent communication
- Business operations restored with minimal impact on hosting service availability
- Company reputation protected through professional incident management and coordinated response
Learning Success Indicators:
- Team understands internet-scale worm propagation and infrastructure targeting
- Participants recognize shared responsibility for internet security and coordinated defense
- Group demonstrates crisis management balancing business continuity with infrastructure security
Common IM Facilitation Challenges:
Success Metrics for Session:
Template Compatibility
Quick Demo (35-40 min)
- Rounds: 1
- Actions per Player: 1
- Investigation: Guided
- Response: Pre-defined
- Focus: Use the “Hook” and “Initial Symptoms” to quickly establish web hosting crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and internet infrastructure responsibility.
Lunch & Learn (75-90 min)
- Rounds: 2
- Actions per Player: 2
- Investigation: Guided
- Response: Pre-defined
- Focus: This template allows for deeper exploration of web hosting cybersecurity challenges. Use the full set of NPCs to create realistic client service pressures. The two rounds allow Code Red to spread to more clients and begin coordinated attacks, raising stakes. Debrief can explore balance between business operations and internet security responsibility.
Full Game (120-140 min)
- Rounds: 3
- Actions per Player: 2
- Investigation: Open
- Response: Creative
- Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing client website availability, business reputation, internet infrastructure stability, and coordinated attack participation. The three rounds allow for full narrative arc including worm’s internet-scale propagation and DDoS attack coordination.
Advanced Challenge (150-170 min)
- Rounds: 3
- Actions per Player: 2
- Investigation: Open
- Response: Creative
- Complexity: Add red herrings (e.g., legitimate IIS updates causing unrelated client website issues). Make containment ambiguous, requiring players to justify client-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and web hosting security principles.
Quick Demo Materials (35-40 min)
Guided Investigation Clues
Pre-Defined Response Options
Option A: Emergency IIS Patching & Internet Isolation
Option B: Prioritized Client Restoration & Service Focus
Option C: Mass Server Reboot & Infrastructure Coordination
Lunch & Learn Materials (75-90 min, 2 rounds)
Round 1: Discovery & Identification (30-35 min)
Investigation Clues:
Response Options:
- Option A: Emergency Infrastructure Reboot - Immediately reboot all infected hosting servers to clear memory-only worm, restore client websites from backups, delay comprehensive patching until after peak season.
- Pros: Fastest path to client website restoration; minimal e-commerce disruption; maintains client business continuity.
- Cons: Doesn’t patch underlying IIS vulnerability; servers will be reinfected within hours; continues internet attack participation risk.
- Type Effectiveness: Partially effective – clears current infection but leaves reinfection vector open.
- Option B: Tiered Client Patching - Patch hosting servers for high-revenue clients first (enterprise accounts), quarantine remaining infected infrastructure, restore services in revenue-prioritized order.
- Pros: Protects highest-revenue relationships; balances security with business needs; enables controlled restoration.
- Cons: Small business clients remain compromised; differential treatment damages platform trust; partial attack participation continues.
- Type Effectiveness: Moderately effective – stops propagation in patched systems but worm remains active in others.
- Option C: Platform Isolation & Emergency Hosting - Isolate entire hosting infrastructure from internet to stop attack participation, migrate critical clients to temporary clean servers, defer full remediation to post-peak season.
- Pros: Stops company’s attack participation immediately; maintains service for critical clients; allows systematic patching.
- Cons: Most clients experience downtime; emergency migration complex for websites; revenue impact during peak season.
- Type Effectiveness: Moderately effective – contains threat but sacrifices revenue for security.
Round 2: Scope Assessment & Response (30-35 min)
Investigation Clues:
Response Options:
- Option A: Emergency Full Patching with Client Compensation - Deploy comprehensive IIS patching across entire hosting infrastructure, coordinate simultaneous client website restoration, offer service credits to affected clients, issue proactive data exposure notification.
- Pros: Completely eliminates worm; demonstrates client partnership through compensation; meets regulatory requirements; protects long-term platform trust.
- Cons: Brief downtime affects remaining peak season revenue; compensation is expensive; acknowledges infrastructure security failure.
- Type Effectiveness: Super effective against Worm type – eliminates vulnerability and infection completely.
- Option B: Peak Season Containment with Post-Season Remediation - Maintain current containment state through peak e-commerce period, implement enhanced monitoring, schedule comprehensive patching for after season ends.
- Pros: Maximizes peak season revenue recovery; allows systematic thorough patching; minimizes immediate client disruption.
- Cons: Extended vulnerability window; continued limited attack participation; delayed breach notification may violate regulations.
- Type Effectiveness: Moderately effective – maintains containment but delays complete remediation.
- Option C: Third-Party Infrastructure Support - Engage external hosting security consultants, implement parallel backup hosting for critical clients, conduct comprehensive forensic analysis of client data exposure while maintaining operations.
- Pros: Expert assistance accelerates response; business continuity for major clients; thorough data exposure assessment.
- Cons: Expensive external support during peak season; potential client data exposure to consultants; admission of insufficient internal capability.
- Type Effectiveness: Moderately effective – improves response quality but extends timeline and increases cost.
Round Transition Narrative
Full Game Materials (120-140 min, 3 rounds)
Round 1: Initial Web Hosting Worm Outbreak (30 min)
Round 1→2 Transition
Round 2: Client Revenue Crisis & Infrastructure Responsibility (35 min)
Round 2→3 Transition
Round 3: Long-Term Hosting Security & Client Recovery (35 min)
Victory Conditions
- Worm eliminated across all hosting infrastructure with comprehensive server patching
- Client website restoration completed with SLA compliance assessment
- Internet community responsibility demonstrated through ISP and infrastructure coordination
- Hosting infrastructure security architecture redesigned with client isolation
Debrief Focus (Full Game)
- How shared infrastructure models (hosting, cloud, SaaS) create blast radius where a single vulnerability affects thousands of organizations
- The tension between infrastructure cost efficiency (shared servers) and security isolation (dedicated environments)
- Why hosting providers bear internet citizenship responsibilities beyond their client obligations
- How ISP-level enforcement (null-routing, disconnection threats) creates external pressure that overrides internal remediation timelines
- Long-term business model viability when security infrastructure investment fundamentally changes the economics of shared hosting
Advanced Challenge Materials (150-170 min, 3+ rounds)
Red Herrings & Misdirection
- Legitimate traffic spike – summer e-commerce peak creates server performance patterns similar to worm scanning, delaying correct identification of malicious traffic
- Client website errors – several clients recently deployed updates with bugs that cause display issues, creating confusion about which website problems are worm-related
- Routine server maintenance – scheduled overnight server updates coincide with worm spread, initially masking the infection as planned activity
- DDoS attack speculation – some clients assume a competitor is DDoS-attacking their websites, misdirecting from the worm’s autonomous propagation
Removed Resources & Constraints
- No infrastructure segmentation – flat network architecture means there’s no way to isolate infected servers without affecting the entire client base
- Backup restoration bottleneck – tape-based backup system restores one server at a time, creating a multi-day queue for all client websites
- Night shift skeleton crew – attack detected during evening shift with minimal staff; full response team unavailable until morning
- No client communication platform – bulk client notification system runs on the same infrastructure affected by the worm, preventing automated breach communication
Enhanced Pressure
Ethical Dilemmas
Advanced Debrief Topics
- How shared infrastructure economics create systematic underinvestment in security isolation when cost savings are visible but security risks are invisible until exploitation
- The ethics of service prioritization during infrastructure outages when all clients are affected but harm is distributed unequally
- Why hosting provider internet citizenship obligations (stopping attacks from your infrastructure) can override client service obligations
- How ISP-level enforcement mechanisms create external accountability for hosting security that market forces alone don’t provide
- Balancing business model viability (shared hosting price points) against security architecture requirements (isolation, segmentation, monitoring)