CyberDrill · Infrastructure & IT

The Infra Team's CyberDrill Guide: Technical Readiness Beyond Tabletop

CreativeCyber ResearchMay 202614 min readCERT-In · SEBI CSCRF · DR / BCP

CISOs run the tabletop. Auditors read the report. But when a real incident hits at 2 AM, it is the infrastructure team that runs the actual commands. This guide covers what infra teams must test, prove, and fix — before a drill makes it a finding.

180 days
Log retention mandate — CERT-In 2022
13
Log source types CERT-In mandates
43%
Teams destroy volatile evidence before capture
<30 min
Target for RAM dump + containment sequence

Why Infra Teams Are the Bottleneck in Every Drill

Tabletop exercises are designed by security teams and facilitated for management. The infrastructure team typically attends, agrees to action items, and then discovers during the next real incident that none of the technical sequencing was actually tested. The containment took 4 hours because the isolation procedure was never rehearsed. The DR failover took 90 minutes because the runbook hadn't been updated since last year's infrastructure migration. The volatile forensic evidence was gone because nobody had practised the RAM capture sequence before isolating the compromised host.

The infra team's obligation in a CyberDrill is not passive. It is to test, document, and prove technical readiness against three hard requirements: CERT-In's 13-log-source retention obligation, the sub-6-hour isolation and evidence preservation sequence, and the DR invocation RTO that appears in your SEBI CSCRF posture.

The Three Technical Tests That Must Happen in Every Drill

The first is log availability and extraction. Can your team extract 30 days of logs across all 13 CERT-In-mandated source types within 2 hours of an incident declaration? This is a hard technical test — not a policy question. The answer must be demonstrated in the drill, not assumed.

The second is evidence preservation before isolation. The sequence is: RAM dump, active session capture, then network isolation. Reversing this order destroys volatile evidence that is irreplaceable. The drill must include an explicit inject forcing this decision under time pressure, because under real pressure the team defaults to isolation first.

The third is DR failover to documented RTO. Not "DR is available" but "DR was activated and the target service was accessible within the documented RTO." The difference between a theoretical RTO and a tested RTO is typically 40–80 minutes of additional downtime in a real incident.

CERT-In Technical Obligations: The 13 Log Sources

CERT-In's April 2022 Directions require organisations to maintain logs from 13 specific source types for 180 days, in a format that can be produced to CERT-In on demand. Most infra teams are aware of this requirement at a policy level. Fewer have actually tested whether they can produce a 30-day extract from all 13 sources within the time pressure of an active incident.

Log SourceRetentionCommon GapDrill Test
Firewall / NGFW180 daysLog rotation configured shorterExtract 30-day sample in <15 min
Active Directory / LDAP180 daysAudit logging not enabled for all eventsConfirm privileged access events logged
Web Proxy / DLP180 daysLarge volume purged at 90 daysStorage capacity verified?
Email Gateway (MTA)180 daysOnly delivery logs — attachment logs missingTest attachment content logging
SIEM Aggregator180 daysHot storage 30 days, cold archived separatelyCold archive retrieval tested?
VPN / Remote Access180 daysAuth logs retained, session logs overwrittenSession duration and data volume logged?
Endpoint (EDR/AV)180 daysAgent offline events not captured centrallyOffline endpoint gap is a common CERT-In finding
Database Audit180 daysEnabled only on production — not DRDR DB audit logging tested?
Web Application (WAF)180 daysWAF logs in vendor cloud, not on-prem SIEMEgress and retrieval process tested?
DNS Resolver180 daysRecursive query logs disabled for performanceDNS logging is frequently absent
NTP Server180 daysNTP sync logs not forwarded to SIEMTimestamp consistency across all sources?
Cloud Infrastructure (if any)180 daysCloudTrail / Azure Monitor exported?Cross-cloud log centralisation tested?
Physical Access / CCTV Metadata180 daysSeparate system, no SIEM integrationManual retrieval process documented?
ℹ️
Drill design tip for infra teams: Run the log extraction test before the tabletop. 72 hours before the drill, have one infra engineer attempt to extract 30-day logs from all 13 sources in a 2-hour window. The gaps they find become the most valuable technical findings of the drill — without interrupting the exercise itself.

Evidence Preservation: The Sequence That Most Teams Get Wrong

Under pressure, infra teams isolate compromised systems first. This is the natural instinct — stop the bleeding. It is also the action that destroys the volatile forensic evidence needed to understand what happened, confirm scope, and satisfy CERT-In's technical evidence requirements.

The correct sequence for a compromised host is non-negotiable: capture first, isolate second. This must be practised under drill conditions because instinct will reverse it in a real incident.

Evidence Preservation Sequence — Practise This in the Drill
Execute in this exact order. Each step has a time target. Drill until all are consistently met.
1. RAM dump (before isolation)
Target: <10 min
2. Active session capture
Target: <5 min
3. Network traffic snapshot
Target: <5 min
4. Disk image initiation
Target: <15 min
5. Network isolation (only now)
Target: <5 min after above
6. Chain of custody documentation
Target: within 30 min total
# Drill checklist — evidence capture before isolation
# 1. RAM dump — winpmem (Windows) or LiME (Linux)
winpmem_mini.exe memory.raw
# or: sudo insmod lime.ko "path=/mnt/secure/memory.lime format=lime"

# 2. Active sessions
netstat -ano > connections_T0.txt
tasklist /v > processes_T0.txt
who -a > sessions_T0.txt    # Linux

# 3. Network capture (60-second window)
tcpdump -i eth0 -w capture_T0.pcap -G 60 -W 1

# 4. Isolate ONLY after above complete
# [firewall rule / VLAN change / physical disconnect]

DR Failover: Testing the RTO You've Promised SEBI

SEBI CSCRF requires Qualified Regulated Entities to maintain documented Recovery Time Objectives for Tier 1 systems — and to demonstrate those RTOs are achievable. "Achievable" means tested. An untested RTO is not an RTO; it is an aspiration.

Most infra teams know their documented RTO. Fewer have activated the DR site and measured actual recovery time under conditions that simulate a real incident — where the production environment is unavailable, the failover runbook was last updated 18 months ago, and two key engineers are not available because it is 3 AM on a Saturday.

What a Functional DR Drill Looks Like

1
Define the test scope precisely
Not "activate DR" — specify: which Tier 1 application, which database, which user workloads, which API dependencies. Vague DR drills produce vague RTO measurements. Specific system scoping produces actionable findings.
2
Start the clock at DR invocation decision — not at "we started the test"
In a real incident, time is lost between "we think we need DR" and "DR is officially invoked." The authorisation chain, the approval process, the notification to exchange/regulator — all of this runs before the technical activation. The drill must include this overhead.
3
Verify end-to-end service, not server uptime
DR server up is not the same as DR application available to users. Run actual transactions, confirm API responses, validate database sync state, test authentication flows. Document what was verified and how.
4
Capture the delta between documented RTO and actual time
If documented RTO is 45 minutes and actual activation took 92 minutes, the 47-minute gap is the finding. Root cause it: was it authorisation delay? Runbook gap? Dependency failure? This is the remediation target before the next drill.
5
Test the failback too
Most DR drills end at failover. Production failback is equally high-risk and rarely tested. Include a partial failback verification in every second DR drill to ensure the return path is as well-understood as the activation path.

We had a documented RTO of 30 minutes. The drill took 78 minutes. The 48-minute gap came from three sources: the runbook referenced a backup server that was decommissioned 8 months ago, DNS cutover took 20 minutes because the TTL hadn't been pre-reduced, and the authorisation chain to invoke DR required the CTO to call the MD — who was unreachable for 15 minutes.

— Infrastructure Lead, Tier-2 Private Bank, Southern India

NTP Synchronisation: The Silent Compliance Failure

CERT-In's 2022 Directions explicitly require all ICT infrastructure to synchronise time with the National Informatics Centre (NIC) or NPL NTP servers. This requirement is overlooked by a surprisingly high proportion of BFSI infra teams — particularly for legacy systems, network devices, and recently-migrated cloud workloads.

The consequence is not merely regulatory: inconsistent timestamps across log sources make forensic reconstruction unreliable, correlation across SIEM impossible, and CERT-In evidence contestable. A 15-second timestamp discrepancy between your firewall and your Active Directory controller can obscure the entire attack sequence.

⚠️
Pre-drill NTP verification (run this 48 hours before any drill): Query the time difference between your 10 most critical log sources. Any delta above 2 seconds is a compliance gap. Any delta above 30 seconds makes your incident timeline unusable as forensic evidence. CERT-In Directions cite time.npl.res.in and samay1.nic.in as reference NTP servers.

The Infra Team's Pre-Drill Technical Checklist

Run this 72 hours before any CyberDrill to validate technical readiness. Every item that fails is a finding before the drill begins — which means it can be fixed before the SEBI ID.5 report records it as a gap.

CheckValidation MethodTarget
CERT-In portal credentials validTest login at incident.cert-in.org.inActive, MFA working
Log extraction <2 hours (all 13 sources)Timed extraction exercise<2 hours
NTP sync across all log sourcesntpq -p across 10 key hosts<2 seconds delta
RAM capture tool staged on IR jump serverVerify binary present and runnablewinpmem / LiME ready
DR runbook — version dated this quarterCheck document metadataReview if >90 days old
DR activation authorisation chain documentedCheck runbook Section 1Named individuals + alternates
Forensic storage target available + accessibleWrite test to secure share/SANWrite speed adequate for disk image
IR team contacts verified (mobile numbers)Call/SMS test at 8 PMAll reachable on first attempt
Backup integrity verified for last 3 snapshotsHash validation on backup setsAll hashes match
Network segmentation — isolation VLAN availableTest isolation rule push to firewallIsolation active in <5 min

What Infra Teams Must Produce for the SEBI ID.5 Drill Report

The drill report is owned by the CISO, but the technical evidence within it must come from the infra team. Specifically, the infra team must produce documentation of the following for each drill:

  • Log availability confirmation: Which sources were verified, extraction time, any gaps identified
  • Evidence preservation sequence adherence: Was the correct sequence followed? If not, what was the deviation and why?
  • DR activation time vs. documented RTO: Actual time measured from invocation to service availability
  • NTP compliance status: Timestamp delta across log sources at time of drill
  • Technical findings: Any configuration gaps, runbook inaccuracies, or tool failures identified during the drill
  • Action items: Named owner, remediation action, deadline — for each technical finding

Practitioner Toolkit · CyberDrill Module

Inject Scenarios Built for Infra Teams

The CyberDrill module includes technical inject scenarios specifically designed for infra teams — log extraction drills, DR invocation sequences, evidence preservation tests, and CERT-In portal simulation. The technical findings from each inject are automatically captured into the structured SEBI ID.5 drill report.

Open Practitioner Toolkit →
ℹ️
Pair this with the CyberDrill Scenario Designer: generate a regulator-ready 4-step drill pack for your next exercise — the Designer auto-generates inject sequences, role cards, and the SEBI ID.5 evidence checklist. Open the free tool →

    We use cookies and analytics (Google Analytics) to improve your experience. Under India's Digital Personal Data Protection Act, 2023, we require your consent before collecting any usage data. Privacy Policy