CyberDrill · CISO Perspective

The CISO's CyberDrill Playbook: Moving from Compliance Theater to Command Readiness

CreativeCyber ResearchMay 202614 min readSEBI CSCRF · CERT-In · Command Readiness

Most CISOs run cyber drills to satisfy SEBI ID.5. The best CISOs run drills to find out where their command structure actually breaks. The difference between these two approaches shows up during a real incident at 2 AM.

76%
Drills produce no CISO-actionable findings
3 drills
Before significant response time improvement
₹3–8L
External facilitation cost per drill (avoidable)
45 min
Avg. delay in CERT-In clock recognition (first drill)

The Command Gap Problem No One Talks About

Every CISO has an incident response plan. Fewer have actually tested whether it works under pressure with incomplete information and a board member on the phone. The gap between the plan on paper and the command chain in practice is almost always larger than CISOs expect — and cyber drills are the only reliable way to measure it.

The problem is that most drills are designed to confirm the plan works, not to find out where it breaks. The scenario is familiar, the participants are the security team, the outcome is predetermined ("we handled it well"), and the report is written to satisfy SEBI's ID.5 checkbox. Nobody learns anything. The command gap remains unmeasured — until a real incident exposes it.

From analysis of drill reports across regulated BFSI entities, the most common command gaps exposed in well-designed drills are: CERT-In portal submission ownership (nobody knows whose credentials, whose authority), parallel regulator notification (CERT-In filed, RBI/IRDAI forgotten), MD/CEO escalation trigger (too late, too early, or unclear), and evidence preservation failure (systems isolated before forensic capture).

Command Gaps Most Commonly Exposed in First Structured Drill
CERT-In portal ownership unclear
82%
Parallel regulator notification missed
71%
MD/CEO escalation trigger ambiguous
68%
Volatile evidence destroyed on isolation
61%
DR invocation authorisation unclear
54%
Media spokesperson not pre-designated
49%

Designing Drills to Expose Gaps, Not Confirm Plans

The CISO's role in drill design is to resist the temptation to make it easy. A drill that confirms your IR plan works is worthless. A drill that surfaces three specific, fixable gaps is worth more than any gap assessment a consultant can deliver.

The Three Design Principles CISOs Must Own

The first principle is ambiguity by design. Real incidents don't arrive clearly labelled. In the first 30 minutes of a real ransomware attack, it will look like a storage issue, then a network problem, then something more serious. Your drill scenario must force this same progressive revelation — do not hand participants a scenario that says "a ransomware attack has occurred." Give them an alert, a symptom, and incomplete data.

The second principle is clock pressure that is real. If the CERT-In 6-hour clock doesn't feel real in the drill, it won't be respected in an actual incident. The facilitator must explicitly call out the clock: "T+2 hours. You have 4 hours remaining on the CERT-In deadline. Have you identified the reporting owner? Do you have portal access?" These moments are where the gaps surface.

The third principle is forcing decisions without your IRP. The participants should not have the incident response plan in front of them. The point of the drill is to test whether the plan is internalised — not whether they can read it under pressure.

The CISO's Pre-Drill Checklist

1
Confirm CERT-In portal access and credentials
Who has login access to incident.cert-in.org.in? What is the authentication method? Is it MFA? Who is the designated reporting officer? These must be confirmed before the drill — and tested during it.
2
Map your parallel regulator notification obligations
Create a one-page matrix: for each scenario type, which regulators must be notified, in what timeframe, via what channel. RBI ITSS portal, IRDAI board-attested report, SEBI SCORES, DPBI — each has a different form and deadline.
3
Pre-agree the MD/CEO escalation trigger
Define the explicit criteria that require escalating to MD/CEO. Not "significant impact" — that is meaningless under pressure. Use: systems affected count, customer data exposure threshold, service unavailability duration, regulatory deadline approaching.
4
Designate a drill Observer/Scribe who is not a participant
The CISO cannot facilitate and participate simultaneously. The observer captures: decisions made, by whom, at what time, and against which inject. This becomes the primary source for the SEBI ID.5 drill report.
5
Prepare the scenario WITHOUT showing it to participants
Scenario leakage destroys drill value. Write the full inject sequence, distribute to facilitator only. Participant pre-briefs should confirm role obligations only — not scenario details.
6
Ensure senior management presence is documented
SEBI inspectors look for this. MD/CEO or board member participation, even for the first and last inject only, is a significant differentiator in ID.5 evidence quality.

The drill told me what three years of assessments couldn't: nobody on my team had actually submitted a CERT-In report. They'd read the process document. They'd attended the training. But when the inject said 'file the CERT-In report now' — nobody moved. That silence was the most valuable finding I've had in a decade.

— CISO, Large Private Sector Bank, Mumbai

What SEBI ID.5 Actually Evaluates — and How CISOs Miss It

SEBI CSCRF ID.5 requires cyber drill evidence — but the quality of evidence is what distinguishes a mature entity from a compliant one. SEBI inspectors are looking for three things that most drill reports fail to provide:

  • Specific findings: Not "communication needs improvement" but "CERT-In notification was delayed 85 minutes because portal credentials were not maintained by the IR team lead." Named, specific, traceable.
  • Drill-over-drill improvement: The second and third drill reports must reference findings from the prior drill and demonstrate closure. Entities that conduct annual drills with no visible improvement across cycles are a red flag.
  • Cross-functional participation evidence: An attendance register showing only the security team tells an inspector the entity is running a security team exercise — not an organisational preparedness exercise. MD/CEO attendance, even for one inject, changes the signal dramatically.

SEBI-Deficient Drill Evidence

  • Annual drill — only security team
  • Generic findings with no specifics
  • No action items with owners
  • No comparison to prior drill
  • No senior management present
  • Report signed by CISO only
  • One-page summary document

SEBI ID.5 Inspection-Grade Evidence

  • Semi-annual drills — cross-functional
  • Named findings with root cause
  • Action items: owner + deadline + status
  • Improvement mapped to prior findings
  • MD/CEO present, documented
  • Signed by CISO + MD/CEO
  • Full structured report with all injects

The CERT-In 6-Hour Clock: Testing What Most CISOs Assume Is Working

The most common assumption CISOs carry into their first structured drill is that CERT-In reporting will work because there is a process document. The drill almost universally proves this wrong.

The failure points are consistent: the portal credentials belong to someone who left 6 months ago; the 9-field prescribed format has never been practiced; nobody has tested partial report submission (filing when scope is unknown, then updating); and the parallel RBI/IRDAI/SEBI notifications are not mapped to anyone's responsibility.

The CISO's job is to design the inject that breaks this assumption — and then to fix the gaps the inject exposes. A drill inject at T+3 hours that says "file the CERT-In report right now — who submits, with what credentials, and what are the 9 fields?" will surface every one of these gaps in 10 minutes.

⚠️
CERT-In Drill Design Principle: Never tell participants the CERT-In submission must happen — let the clock pressure force them to recognise it. The delta between when the clock starts and when the team first mentions CERT-In reporting is one of the most valuable measurements a CISO can capture from a drill. Industry average: 90 minutes. Best-in-class: under 20 minutes.

Building the Annual CyberDrill Program — Not Just a Single Exercise

SEBI ID.5 requires a drill program, not a single exercise. The distinction matters: a program has a multi-year improvement arc, varying scenario complexity, expanding participant scope, and measurable maturity progression. A single exercise is a compliance event.

The Three-Drill Program Structure

1
Drill 1 — Baseline Assessment (Q1)
Ransomware or DDoS scenario. Core IR team + Legal + Business Unit Head. Objective: establish baseline measurement. Clock compliance, escalation speed, CERT-In submission drill. Expect significant gaps. That is the point.
2
Drill 2 — Gap-Targeted Exercise (Q3)
Scenario selected to specifically probe the top 3 gaps from Drill 1. Expanded participant group — add MD/CEO, Comms, DPO. More complex inject sequence with media attention and parallel regulatory notifications. Measure improvement against Drill 1 baselines.
3
Drill 3+ — Maturity Validation (following year)
Data exfiltration or supply chain scenario. Full cross-functional team. Functional elements: simulate actual CERT-In portal submission (test environment), actual RBI ITSS form completion, actual DPO notification template review. Evidence is produced for SEBI ID.5 cycle.

CISO Investment Case: In-House vs. External Facilitation

External facilitation (per drill)₹3–8 lakh
In-house structured drill (Practitioner Toolkit)₹50K–1.5L
Response time improvement after 3 structured drills35–50% faster
SEBI ID.5 non-compliance risk (inspection finding)Remediation order
ROI at improved response in one real incident10–50x

The Post-Drill CISO Action: Turning Findings Into Fixes

The drill report is not the outcome — it is the input. The CISO's job after the drill is to convert every finding into a dated, owned remediation action and track it to closure before the next drill. This is what SEBI inspectors mean by "demonstrating improvement over successive drill cycles."

Practical mechanics: within 48 hours of the drill, hold a findings review with all participants. Categorise each finding as P1 (fix before next incident), P2 (fix before next drill), or P3 (systematic improvement). Assign each finding to a named individual — not a team. Verify closure, not just "action taken." The next drill's inject sequence should specifically probe the P1 findings to confirm they are resolved.

RiskSage AI · Cyber Risk Brain

Connect Drill Findings to Quantified Cyber Risk

RiskSage AI ingests drill findings and feeds them into FAIR-based risk scenarios — turning compliance evidence into board-ready ALE figures and prioritised remediation backlogs.

Open RiskSage AI →
ℹ️
Pair this with the CyberDrill Scenario Designer: generate a regulator-ready 4-step drill pack (scenario, injects, role cards, evidence checklist) for your next exercise. Open the free tool →

    We use cookies and analytics (Google Analytics) to improve your experience. Under India's Digital Personal Data Protection Act, 2023, we require your consent before collecting any usage data. Privacy Policy