Skip to content

Scenario Development

This section covers reasoning, designing, and implementing automated cyber scenarios using Steamfitter's orchestration capabilities.

Steamfitter enables you to create dynamic, responsive scenarios that adapt to participant actions and progress through predetermined timelines. As a Range Builder, your goal is to combine automation, decision points, and branching logic to create engaging, realistic training experiences.


Scenario Design Principles

Principle Description
Gradual Difficulty Begin with guided tasks, then layer complexity. Offer multiple approaches and stretch challenges for advanced users.
Realistic Timelines Align scenario flow with real-world operations: detection → investigation → response → recovery.
Adaptive Response Use branching logic: success leads forward, failure redirects to remediation or alternate routes.
Learning Resilience Build recovery mechanisms so participants can recover from common missteps and still complete the experience.

Scenario Architecture

Task Grouping

Organize activities into logical phases:

Phase Focus Example Tasks
1. Initial Detection Introduce the incident Automated alert, manual acknowledgment, initial assessment
2. Investigation Deepen analysis Evidence collection, threat classification, documentation
3. Response Drive participant action Containment, communication, remediation
4. Recovery Reinforce learning Restoration, lessons learned, final reporting

Task Relationships

Relationship Type Description Example
Sequential Tasks that must complete in order Run scan → analyze results
Parallel Tasks that can occur simultaneously Collect logs and review alerts concurrently
Conditional Triggered by specific outcomes Continue only if "analysis complete"
Recovery Activated when failure occurs Launch fallback evidence-collection task

Timing and Triggers

Example Description Timing Action Expected Outcome
Initial Compromise Simulate attacker scanning network 5 minutes into scenario Network scan executes Scan completes
Lateral Movement Triggered by previous success 15 minutes after compromise Lateral movement attempt Connection established

Human Decision Points

Decision Description Trigger Expected Outcome Time Limit
Incident Classification Team classifies incident severity Manual "High severity" response selected 30 minutes
Management Notification Notifies management if severity = high Conditional Notification sent None

Outcome Branching

Path Description Trigger Action Expected Result
Success Path Containment verified Success Run containment verification script "Contained"
Recovery Path Containment failed, escalate Failure Execute escalation procedure "Escalated"

Assessment Integration

Assessment Task Description Trigger Points
Evidence Collection Check Verify that evidence was gathered correctly Manual 25
Timeline Reconstruction Evaluate accuracy of event timeline Success 30

Common Scenario Patterns

Incident Response Scenario

Phase Task Description Trigger Notes
Detection IDS Alert Generation Generate initial alert Time-based (3 min in) Alert appears on SOC dashboard
Detection SOC Notification Display alert to analysts After IDS alert Confirms visibility
Investigation Initial Triage Analyst acknowledges alert Manual 10-min limit
Investigation Log Analysis Collect logs for review After triage Automated collection
Investigation Artifact Analysis Review artifacts for malware After log analysis 30-min limit

Red vs. Blue Team Exercise

Team Task Purpose Trigger Key Points
Red Team Initial Reconnaissance Identify targets via network scan Time-based (5 min) Foundational offensive stage
Red Team Initial Access Gain system foothold After reconnaissance Manual task, 1-hour window
Red Team Persistence Maintain access After initial access Confirms persistence
Blue Team Monitoring Alert Detects Red activity Triggered by Red success 10-min detection delay
Blue Team Threat Hunting Investigate alert Manual 40-min task

Penetration Testing Lab (Progressive Difficulty)

Level Task Description Trigger Difficulty Points Time Limit
Beginner Network Discovery Identify live hosts Immediate Beginner 10 None
Beginner Port Scanning Identify open services After discovery Beginner 15 None
Intermediate Vulnerability Assessment Identify vulnerabilities After scanning Intermediate 25
Advanced Exploit Development Develop custom exploit After assessment Advanced 50 1 hour

Advanced Scenario Techniques

Evolving Scenarios

Step Description Trigger Timing Expected Result
Phase 1 Completion Check Verify all initial tasks completed Time-based 30 min Phase 1 complete
Phase 2 Initialization Launch next phase After success Immediate Phase 2 initialized with new injects

Adaptive Difficulty

Step Description Trigger Frequency Adjustment
Performance Assessment Evaluate team progress Time-based Every 15 min Record performance
Difficulty Adjustment Modify scenario complexity After assessment As needed Increase complexity or provide hints

Cross-Team Interaction

Task Description Team Trigger Delay Outcome
Red Team: Network Compromise Red team compromises network segment Red Manual Network compromised
Blue Team: Alert Generation Alert triggered by Red activity Blue Red success 5 min Alert sent to SIEM

Best Practices

Focus Area Recommendations
Scenario Design Define learning objectives clearly; map each task to a skill; balance difficulty; include timing and recovery paths.
Task Organization Use descriptive names; group related tasks logically; handle errors gracefully; provide meaningful feedback; document logic.
Testing & Maintenance Test thoroughly before deployment; monitor live execution; collect feedback; revise scenarios after exercises; version control templates.

For deeper insights on assessment and scenario evaluation, see: Self-Assessment in Training and Exercise