Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
14 views4 pages

Group Activity Day2

The document outlines a group activity focused on a cybersecurity incident at HealthOne, a hospital group facing suspicious network activity and compliance audits. Teams must develop a scanning strategy, assess compliance risks related to PCI-DSS and GDPR, and propose mitigation steps within a limited timeframe. Key tasks include identifying scanning methods, compliance violations, and creating a containment plan to address the security breach.

Uploaded by

d
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views4 pages

Group Activity Day2

The document outlines a group activity focused on a cybersecurity incident at HealthOne, a hospital group facing suspicious network activity and compliance audits. Teams must develop a scanning strategy, assess compliance risks related to PCI-DSS and GDPR, and propose mitigation steps within a limited timeframe. Key tasks include identifying scanning methods, compliance violations, and creating a containment plan to address the security breach.

Uploaded by

d
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

GROUP ACTIVITY: Zero Hour at HealthOne – Scan or Be Hacked

Time: 60 minutes
Team size: 4 students
Format: Scenario-based investigation + decision-making + group report
Objective: Apply vulnerability scanning methods, evaluate compliance risks (PCI-DSS,
GDPR), and recommend mitigation steps using CySA+ Lesson 5 principles.

SCENARIO
HealthOne, a private hospital group operating across Southeast Asia, just discovered
suspicious activity on its internal network.
 Billing systems were offline for 2 hours
 Unauthorized access was detected to patient records
 Unusual CPU spikes and traffic to unknown IPs were reported
 The company is undergoing a PCI-DSS and GDPR compliance audit
 Their infrastructure includes:
o SCADA-connected lab equipment
o Legacy Windows Server 2012 systems
o A partially migrated multi-cloud environment (AWS + Azure)
The CIO must testify before a government hearing in 90 minutes. Your team—the
Emergency Threat Assessment Unit—must deliver a credible, well-reasoned incident
analysis and scanning strategy within 60 minutes.

PHASE 1 – SCANNING STRATEGY (20 MINUTES)


Objective: Choose the right scanning approaches for the environment.
Given infrastructure:
 Legacy patient billing servers (Windows Server 2012)
 SCADA lab systems
 Multi-cloud patient data storage
 Endpoints with CPU spikes
 BYOD tablets used by doctors
 Network segmentation unknown
Your tasks (discuss and write your decisions):
1. Identify which scan types you would use for each asset group (credentialed,
non-credentialed, agent-based, passive, etc.)
2. Which systems must be scanned first (triage order)
3. Which systems must not be scanned with active tools, and why
Checkpoint Questions:
 Which scan type would expose unpatched SCADA vulnerabilities safely?
 How would you detect lateral movement to cloud resources?
 What scan method gives you visibility into BYOD device security?

PHASE 2 – COMPLIANCE IMPACT (15 MINUTES)


Objective: Identify how PCI-DSS and GDPR apply and what scanning or controls are
required to meet them.
Assume:
 3TB of patient data is stored across hybrid cloud
 Credit card info used in billing system
 Systems haven’t undergone a credentialed scan in 45 days
 There’s no record of patch baseline comparison in the last 60 days
 DNS logs show TXT record abuse to external IPs
Your tasks:
1. Identify which requirements of GDPR and PCI-DSS were likely violated
2. Match each to a specific scanning or logging gap
3. List 2 compliance artifacts you'd need to show auditors (e.g., vulnerability
reports, system hardening logs, etc.)
Checkpoint Questions:
 What does PCI-DSS say about patch timelines?
 Which scan outputs can help prove GDPR accountability?
 What control type (technical, operational, managerial) failed?
PHASE 3 – MITIGATION & REPORTING PLAN (20 MINUTES)
Objective: Propose a credible path to containment and recovery.
Assume:
 The attacker exploited a forgotten web application running on the same subnet
as billing
 SIEM logs were misconfigured and missed the early activity
 Antivirus failed to detect the reverse shell
 DNS exfiltration succeeded due to weak egress controls
Your tasks:
1. Create a step-by-step containment plan (for next 24 hours)
2. Recommend at least:
o One new scanning schedule or policy
o One hardening or patch baseline approach
o One technical control to reduce future attack surface
Checkpoint Questions:
 What scanning schedule should be applied to legacy servers?
 How would you baseline the lab network without risking device failure?
 What scanning limitation delayed detection in this case?

FINAL REPORT (5 MINUTES)


Prepare a 5-minute verbal or written debrief with:
 Your timeline of the attack
 The root cause
 3 scanning or control failures
 3 fixes you propose
 Which compliance requirements were at risk

OPTIONAL TWIST
One of the doctors' tablets was jailbroken and used to pivot into the SCADA subnet.
Prove whether this was the original entry point, or a distraction. Back it with scanning or
logging evidence you'd expect to see.

KEY LEARNING OUTCOMES


 Apply the right vulnerability scanning techniques
 Understand how compliance standards influence security controls
 Link technical symptoms to control and scanning failures
 Recommend realistic mitigation steps using CySA+ knowledge

You might also like