building-ransomware-playbook-with-cisa-framework
Builds a structured ransomware incident response playbook aligned with the CISA StopRansomware Guide and NIST Cybersecurity Framework. Covers preparation, detection, containment, eradication, recovery, and post-incident phases with actionable checklists. Activates for requests involving ransomware response planning, CISA compliance, incident response playbook creation, or ransomware preparedness assessment.
Best use case
building-ransomware-playbook-with-cisa-framework is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Builds a structured ransomware incident response playbook aligned with the CISA StopRansomware Guide and NIST Cybersecurity Framework. Covers preparation, detection, containment, eradication, recovery, and post-incident phases with actionable checklists. Activates for requests involving ransomware response planning, CISA compliance, incident response playbook creation, or ransomware preparedness assessment.
Teams using building-ransomware-playbook-with-cisa-framework should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/building-ransomware-playbook-with-cisa-framework/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How building-ransomware-playbook-with-cisa-framework Compares
| Feature / Agent | building-ransomware-playbook-with-cisa-framework | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Builds a structured ransomware incident response playbook aligned with the CISA StopRansomware Guide and NIST Cybersecurity Framework. Covers preparation, detection, containment, eradication, recovery, and post-incident phases with actionable checklists. Activates for requests involving ransomware response planning, CISA compliance, incident response playbook creation, or ransomware preparedness assessment.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
Best AI Skills for ChatGPT
Find the best AI skills to adapt into ChatGPT workflows for research, writing, summarization, planning, and repeatable assistant tasks.
Top AI Agents for Productivity
See the top AI agent skills for productivity, workflow automation, operational systems, documentation, and everyday task execution.
SKILL.md Source
# Building Ransomware Playbook with CISA Framework ## When to Use - An organization needs to create or update its ransomware incident response playbook following CISA guidelines - A security team is conducting a ransomware readiness assessment against the CISA StopRansomware framework - Compliance requires documenting ransomware response procedures aligned with NIST CSF and CISA recommendations - During tabletop exercises to validate that the organization's ransomware response steps match industry best practices - After a ransomware incident to update the playbook with lessons learned and close identified gaps **Do not use** as a substitute for legal counsel regarding ransom payment decisions, breach notification timelines, or regulatory obligations specific to your jurisdiction. ## Prerequisites - Familiarity with the CISA StopRansomware Guide (cisa.gov/stopransomware/ransomware-guide) - NIST Cybersecurity Framework (CSF) understanding (Identify, Protect, Detect, Respond, Recover) - Inventory of critical assets, backup infrastructure, and communication channels - Defined roles and responsibilities for incident response team members - Python 3.8+ for playbook generation and compliance checking automation - Access to organization's asset inventory and backup configuration documentation ## Workflow ### Step 1: Preparation Phase (CISA Part 1 - Prevention) Establish ransomware-specific defenses before an incident: ``` CISA Preparation Checklist: ━━━━━━━━━━━━━━━━━━━━━━━━━━ [ ] Maintain offline, encrypted backups tested for restoration [ ] Create and exercise a cyber incident response plan (IRP) [ ] Implement network segmentation between IT and OT networks [ ] Enable MFA on all remote access and privileged accounts [ ] Deploy endpoint detection and response (EDR) on all endpoints [ ] Disable or restrict RDP; require VPN for remote access [ ] Maintain a software/hardware asset inventory [ ] Apply patches within 48 hours for internet-facing systems [ ] Configure email filtering and disable macro execution by default [ ] Conduct regular phishing awareness training [ ] Implement application allowlisting (AppLocker/WDAC) [ ] Test backup restoration quarterly and document RTO/RPO ``` ### Step 2: Detection and Analysis Phase Identify ransomware indicators and assess scope: ``` Detection Indicators: ━━━━━━━━━━━━━━━━━━━━ - Mass file rename operations with new extensions (.locked, .encrypted) - Ransom notes appearing in directories (README.txt, DECRYPT.html) - Volume Shadow Copy deletion (vssadmin delete shadows) - Abnormal CPU usage from encryption processes - EDR/AV alerts for known ransomware signatures - Network connections to known C2 infrastructure - Unusual lateral movement via SMB or PsExec - Sysmon Event ID 11 (file creation) spikes Initial Analysis Steps (CISA): 1. Take system images and memory captures of affected devices 2. Identify patient zero and initial access vector 3. Determine the ransomware family (ID Ransomware, ransom note analysis) 4. Assess encryption scope: which systems, shares, and data are affected 5. Check if data exfiltration occurred (double extortion indicator) ``` ### Step 3: Containment Phase Stop the spread and preserve evidence: ``` Immediate Containment (First 1-4 hours): ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 1. Isolate affected systems from the network (disable NICs, VLAN quarantine) 2. If unable to disconnect, power down affected systems 3. Disable shared drives to prevent encryption spread 4. Reset credentials for compromised accounts (especially admin/service accounts) 5. Block known ransomware IOCs at firewall/proxy (C2 domains, IPs) 6. Preserve forensic evidence (memory dumps, disk images, logs) 7. Engage legal counsel and prepare breach notification if data exfiltrated Extended Containment: - Identify and patch the initial access vector (phishing, RDP, VPN vuln) - Audit all Active Directory accounts for persistence (scheduled tasks, services) - Check for backdoors or additional malware beyond the ransomware payload ``` ### Step 4: Eradication and Recovery Phase Remove the threat and restore operations: ``` CISA Recovery Steps: ━━━━━━━━━━━━━━━━━━━ 1. Rebuild affected systems from known-clean images (do NOT decrypt in place) 2. Restore data from offline backups (verify backup integrity first) 3. Reset ALL passwords including service accounts, krbtgt (twice, 12h apart) 4. Scan restored systems with updated AV/EDR before reconnecting to network 5. Re-enable services in priority order based on business criticality 6. Monitor restored systems intensively for 72 hours for reinfection Recovery Priority Matrix: P1 (0-4h): Domain controllers, DNS, authentication infrastructure P2 (4-24h): Email, critical business applications, databases P3 (1-3d): File servers, departmental applications P4 (3-7d): Non-critical systems, development environments ``` ### Step 5: Post-Incident Activity Document lessons learned and improve defenses: ``` Post-Incident Report Template: ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 1. Executive summary: What happened, impact, resolution 2. Timeline: Detection to full recovery with timestamps 3. Root cause analysis: Initial access vector and propagation path 4. Scope: Number of systems, data volumes, business impact in hours/dollars 5. Response effectiveness: What worked, what failed, what was missing 6. Recommendations: Specific technical and procedural improvements 7. Compliance actions: Notification timeline, regulatory obligations met 8. Updated playbook: Revisions based on lessons learned ``` ## Verification - Validate playbook completeness against CISA StopRansomware checklist items - Conduct tabletop exercise using the playbook with all stakeholders - Verify backup restoration procedures work within documented RTO targets - Test communication plans including out-of-band channels - Confirm legal and regulatory notification procedures are current - Review and update the playbook at least annually or after any incident ## Key Concepts | Term | Definition | |------|------------| | **CISA StopRansomware Guide** | Joint CISA/MS-ISAC/NSA/FBI guide providing ransomware prevention best practices and response checklists | | **RTO/RPO** | Recovery Time Objective (max downtime) and Recovery Point Objective (max data loss); critical metrics for backup planning | | **Double Extortion** | Ransomware tactic where attackers both encrypt data and threaten to publish stolen data unless paid | | **Patient Zero** | The first system compromised in an incident; identifying it reveals the initial access vector | | **Tabletop Exercise** | Simulated incident scenario walked through by the response team to validate the playbook without live systems | ## Tools & Systems - **CISA StopRansomware Guide**: Primary framework for ransomware response planning and prevention - **NIST CSF**: Cybersecurity Framework providing the Identify/Protect/Detect/Respond/Recover structure - **ID Ransomware**: Service for identifying ransomware families from encrypted files and ransom notes - **MITRE ATT&CK**: Technique framework for mapping ransomware TTPs to detection opportunities - **Velociraptor**: Endpoint visibility tool for rapid triage and forensic artifact collection during incidents
Related Skills
triaging-vulnerabilities-with-ssvc-framework
Triage and prioritize vulnerabilities using CISA's Stakeholder-Specific Vulnerability Categorization (SSVC) decision tree framework to produce actionable remediation priorities.
triaging-security-incident-with-ir-playbook
Classify and prioritize security incidents using structured IR playbooks to determine severity, assign response teams, and initiate appropriate response procedures.
testing-ransomware-recovery-procedures
Test and validate ransomware recovery procedures including backup restore operations, RTO/RPO target verification, recovery sequencing, and clean restore validation to ensure organizational resilience against destructive ransomware attacks.
reverse-engineering-ransomware-encryption-routine
Reverse engineer ransomware encryption routines to identify cryptographic algorithms, key generation flaws, and potential decryption opportunities using static and dynamic analysis.
recovering-from-ransomware-attack
Executes structured recovery from a ransomware incident following NIST and CISA frameworks, including environment isolation, forensic evidence preservation, clean infrastructure rebuild, prioritized system restoration from verified backups, credential reset, and validation against re-infection. Covers Active Directory recovery, database restoration, and application stack rebuild in dependency order. Activates for requests involving ransomware recovery, post-encryption restoration, or disaster recovery from ransomware.
performing-ransomware-tabletop-exercise
Plans and facilitates tabletop exercises simulating ransomware incidents to test organizational readiness, decision-making, and communication procedures. Designs realistic scenarios based on current ransomware threat actors (LockBit, ALPHV/BlackCat, Cl0p), injects covering double extortion, backup destruction, and regulatory notification requirements. Evaluates participant responses against NIST CSF and CISA guidelines. Activates for requests involving ransomware tabletop, incident response exercise, or ransomware readiness drill.
performing-ransomware-response
Executes a structured ransomware incident response from initial detection through containment, forensic analysis, decryption assessment, recovery, and post-incident hardening. Addresses ransom negotiation considerations, backup integrity verification, and regulatory notification requirements. Activates for requests involving ransomware response, ransomware recovery, crypto-ransomware, data encryption attack, ransom payment decision, or ransomware containment.
investigating-ransomware-attack-artifacts
Identify, collect, and analyze ransomware attack artifacts to determine the variant, initial access vector, encryption scope, and recovery options.
implementing-soar-playbook-with-palo-alto-xsoar
Implement automated incident response playbooks in Cortex XSOAR to orchestrate security workflows across SOC tools and reduce manual response time.
implementing-soar-playbook-for-phishing
Automate phishing incident response using Splunk SOAR REST API to create containers, add artifacts, and trigger playbooks
implementing-ransomware-kill-switch-detection
Detects and exploits ransomware kill switch mechanisms including mutex-based execution guards, domain-based kill switches, and registry-based termination checks. Implements proactive mutex vaccination and kill switch domain monitoring to prevent ransomware from executing. Activates for requests involving ransomware kill switch analysis, mutex vaccination, WannaCry-style domain kill switches, or malware execution guard detection.
implementing-ransomware-backup-strategy
Designs and implements a ransomware-resilient backup strategy following the 3-2-1-1-0 methodology (3 copies, 2 media types, 1 offsite, 1 immutable/air-gapped, 0 errors on restore verification). Configures backup schedules aligned to RPO/RTO requirements, implements backup credential isolation to prevent ransomware from compromising backup infrastructure, and establishes automated restore testing. Activates for requests involving ransomware backup planning, backup resilience, air-gapped backup design, or backup recovery point objective configuration.