logo
Purple team
Playbook development examples
  • Red team
  • Green team
  • Blue team
  • Indigo team
  • Contact
Initializing search
      • Facilitating choreographies
      • Threat modelling & preparation
      • Risk management & assessment
      • Audits and assessments
      • Knowledge transfer and IR playbook development
        • Overview and basics
        • Moving beyond manuals that nobody reads
        • Playbooks that actually work
        • Playbook development examples
          • Ransomware response playbook (NGO, 20 staff)
          • Phishing campaign response playbook (SME, 50-250 staff)
          • Compromised AWS credentials playbook (development environment)
        • Playbook development examples
          • Ransomware response playbook (NGO, 20 staff)
          • Phishing campaign response playbook (SME, 50-250 staff)
          • Compromised AWS credentials playbook (development environment)
        • Dashboards that actually get used
        • Workflows that get followed
      • Integrated security operations
      • Colourful teaming
      • Playground

    Playbook development examples¶

    A stick figure is writing on a giant scroll labeled 'Incident Playbook'. Another stick figure is erasing a step and writing a better one. A third stick figure is adding a 'Post-Mortem Lesson' sticky note to the margin. The playbook is shown as a messy, evolving document, not a pristine book.

    Turn lessons from exercises and incidents into playbooks.

    • Ransomware response playbook (NGO, 20 staff)
    • Phishing campaign response playbook (SME, 50-250 staff)
    • Compromised AWS credentials playbook (development environment)
    See something you like? Let’s create your custom playbook.
    2025-11-26 16:33
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7