Demo Mode

Every screen, flow, export, and remediation path is the real Veri-Guard product. The specific findings, scores, and runbooks shown are curated to illustrate a typical before/after story. Your tenant scan produces your own numbers.

Get started
Back to demo bundle viewer
Back to drill bundle
Live drill sessionVeri-VaultDemo · no tokens · no audit record

Ransomware encrypts production AND attempts to encrypt backup vault

Your Vault posture shows 30-day WORM and 28 days since last restore test. This scenario exercises the restore decision tree under time pressure with a sophisticated attacker.

Drill clock0:00

Hand out attendee links — no screen sharing required

At drill kickoff you hand out two URLs so every attendee can follow + participate live from their own device, no Teams call needed:

  • 1Spectator URL — read-only timer + current inject + delivery progress, refreshes every 3 seconds. For observers, security leadership, anyone watching but not participating. Works on a conference-room TV too.
  • 2Participant URL — each attendee picks their role from your org-shape roster and submits their own written answer per inject. Submissions stream onto your facilitator screen in real time, role-tagged. When you Drop the inject, their answers are locked into the evidence record next to the team’s consensus response — full attribution preserved in the auditor ZIP.

Demo note: only the spectator URL is wired in the demo. The participant flow requires real auth and your tenant’s org-shape roster, so it doesn’t run client-side.

Scenario

On a Sunday at 03:42 UTC, a ransomware operator with prior persistence in your environment triggers encryption across 4 file servers, 12 database hosts, and the M365 tenant's SharePoint sites. By 04:15 UTC, your monitoring tools page on-call. By 04:30, you've isolated the affected network segments. At 05:02, the attacker — who clearly knows you have Veri-Vault — attempts to authenticate against the Vault management plane using a stolen privileged identity. Your immutability window saves you: writes to existing backups are denied. But the attacker can attempt to *delete* the Vault if they reach a sufficiently privileged identity. They don't, today. Now you face the actual question: do you pay, or do you restore?

Threat actor + attack chain

Sophisticated ransomware operator (Conti-affiliate or similar). Goal: ransom payment. Has researched your Vault posture before encrypting.

  1. 1Pre-encryption recon: Attacker has had persistence for 11 days. Uses time to map Vault's protection model: WORM window, immutability period, who has delete rights.
  2. 2Encryption: Triggers encryption across production. Demands ransom: $4.2M in 48 hours; $8.4M after.
  3. 3Vault attack attempt: Attempts to authenticate to Vault management plane to delete or encrypt backups. WORM denies writes; delete-attempt requires privilege the attacker has not yet escalated to.
  4. 4Decision point: You have backups. They survive the attack. Question becomes: how fast can you actually restore, what data was post-last-backup, and is your restored environment safe to bring back online?

Timed injects

Each inject lists its scheduled trigger time. When the drill clock passes that time, the inject highlights amber as a hint — but YOU pace the drill: click Drop inject to mark it delivered (timestamp captured for the audit record), then capture the team’s response. The “Expected action” line is your facilitator-only debrief reference.

Scheduled · T+10 min

On-call engineer pages the IC at 04:15 UTC: 'Production is encrypted. We're seeing the ransom note. Backup status is unknown.' IC has 5 minutes to give first orders.

Expected action (facilitator-only): IC instructs: (1) network-segment isolation per IR plan, (2) Vault status check + lock down management plane, (3) executive escalation to CEO/legal/board per IR plan.

Participant submissions — none yet for inject 1

Share the participant URL to invite team input. Submissions reveal here as they land.

Scheduled · T+25 min

Vault admin reports: 'Someone tried to authenticate against the Vault management plane at 05:02 UTC from an unfamiliar IP. WORM denied writes. They didn't escalate to delete privileges. Vault is intact.' What's your move? Facilitator note (added in v1): if the team cannot answer within the inject window, the IR pre-built escalation tree applies — escalate to the named owner one tier above before the response runs over.

Expected action (facilitator-only): Team confirms: (a) revoke all Vault management-plane sessions, (b) rotate admin credentials, (c) enable additional MFA challenge on Vault delete operations if not already, (d) document timeline.

Scheduled · T+40 min

Infrastructure lead delivers the bad news: 'We restored a sample database from Vault — it took 6 hours wall-clock. Multiply by 12 hosts, plus the file servers, that's 36-48 hours minimum if we go serial.' Customer SLA is 24 hours.

Expected action (facilitator-only): Team discusses: (a) parallel restore capacity, (b) priority order (which apps must come back first), (c) interim communications with customers about extended outage, (d) pay-vs-restore reconsideration in light of restore timeline.

Scheduled · T+55 min

CFO + legal + insurance broker join. CFO: 'Ransom is $4.2M. Restore costs maybe $400K but we breach SLA on multiple customers, possibly $2M in penalties. Insurance covers ransom but with conditions. Recommend?' Decision required by T+70.

Expected action (facilitator-only): Team walks through: (a) does insurance condition payment on FBI notification?, (b) what's the chance the decryption key works at all?, (c) what's the moral/policy stance — does company pay?, (d) make a documented decision with named decision-maker and full reasoning.

Scheduled · T+75 min

Comms lead: 'When do we tell customers? Employees? Regulators?' If healthcare data restored from Vault contains PHI, the §164.402 4-factor applies — even though attacker didn't exfiltrate (or did they?).

Expected action (facilitator-only): Team documents the cascade: customer-first or employee-first? Regulator timing per HIPAA §164.404 (60 days) or GDPR (72 hours) or state breach laws (varies). Identifies whether this is a notification event at all (depends on data exfiltration evidence).

Scheduled · T+90 min

Wrap-up + rubric scoring + remediation list.

Expected action (facilitator-only): Top items: (1) restore drill schedule + tooling for parallel restores, (2) documented pay-vs-restore decision tree, (3) Vault delete-permissions audit + 4-eyes enforcement, (4) per-app RTO validation, (5) customer communications template.

Scoring rubric

0.00 / 5running average

Rate the team’s performance on each criterion (1 = poor, 5 = excellent). Notes are optional facilitator commentary.

Restore time validation (recency)

weight: 20
Threshold reference
5:
Full restore drill within last 30 days; RTO measured
4:
Restore drill within 90 days
3:
Restore drill within 180 days (current state: 28 days)
2:
Restore drill within 365 days
1:
>365 days or never

Vault delete-attack survivability

weight: 20
Threshold reference
5:
WORM + 4-eyes + JIT on delete + alert on attempt
4:
WORM + 4-eyes + alert on attempt
3:
WORM + alert (current state)
2:
WORM only
1:
No immutability

Pay-vs-restore decision tree maturity

weight: 15
Threshold reference
5:
Documented tree with criteria, named decision-maker, insurance pre-aligned
4:
Documented tree, named decision-maker
3:
Decision-maker known, criteria informal
2:
Decision ad-hoc
1:
No process

Per-app RTO validation

weight: 15
Threshold reference
5:
All critical apps have measured RTO + matches commitment
4:
Most apps validated
3:
Some apps validated
2:
RTO documented, not measured
1:
No RTO commitments

Restore validation procedure

weight: 15
Threshold reference
5:
Hash verification + known-clean checkpoint + isolated restore environment
4:
Hash verification + isolated environment
3:
Restore validated by application functional test
2:
Restore validated by 'looks right'
1:
No validation

Communications cascade

weight: 15
Threshold reference
5:
Cascade documented per audience with timing + owner
4:
Cascade discussed, owners identified
3:
Audiences identified, timing ambiguous
2:
Some audiences considered
1:
No cascade

Lock & save

Locking the session writes an immutable, SHA-256-checksummed evidence record into Veri-Vault. Once locked, this session cannot be edited — it becomes the auditor-grade record of the drill alongside the source bundle.

All criteria must be scored before lock — currently scored 0 of 6.