TrailBlaze Adventures · CISSP Domain 7 Case

Security Operations

A classroom and workshop case about monitoring, incident response, forensics, threat intelligence, recovery, and operational resilience in a global adventure travel company.

Scenario — TrailBlaze Adventures Global Incident Response Breakdown

TrailBlaze Adventures has grown into a global, always-on travel platform, but its security operations capability has not matured at the same speed.

During a busy holiday travel period, the company experiences several suspicious events at the same time. Support agents report account takeover complaints, guides in Peru report delayed GPS updates, the SOC receives alerts from cloud systems in Europe, and the social platform moderation team notices phishing links being sent through private messages.

Current operations concerns

  • Logs exist across cloud, mobile, API, support, and social systems, but correlation is limited.
  • The SOC receives many alerts, but analysts lack clear prioritization and playbooks.
  • Incident response procedures exist, but regional teams interpret them differently.
  • Evidence collection is inconsistent, especially for mobile devices and field equipment.
  • Backup and recovery processes exist, but not all critical systems have recently tested recovery procedures.

Operational pressure

  • Expeditions are currently active in remote areas, so availability and safety are critical.
  • Management wants fast public communication, but legal and security teams want verified facts first.
  • Support teams need guidance on whether to lock accounts, reset credentials, or escalate cases.
  • Marketing worries that visible platform restrictions will damage customer trust.
  • Security leadership wants to understand whether this is one coordinated incident or several unrelated events.
Management request: “Stabilize operations, determine what is happening, protect customers and guides, preserve evidence, and restore confidence without disrupting active expeditions.”

Student assignment

1

Investigate the case

Analyze the TrailBlaze scenario and identify key challenges related to security operations.

  • Which events should be treated as possible security incidents?
  • Which logs and evidence sources are needed to understand what happened?
  • Which response actions should happen first to protect customers and active expeditions?
  • How should the SOC prioritize alerts and coordinate with support, legal, operations, and management?
  • What recovery, communication, and lessons-learned activities are needed after containment?
2

Identify Domain 7 challenges

Group your findings under monitoring, alert triage, incident response, digital forensics, evidence handling, threat intelligence, recovery, and operational resilience.

3

Link challenges to Domain 7 concepts

Connect each identified challenge to CISSP Domain 7 concepts and explain why that concept is relevant for security operations at TrailBlaze.

Deliverable: A structured list of at least 10 security operations challenges, each linked to one or more Domain 7 concepts.

Domain 7 challenges to investigate

SOC Monitoring and Alert Triage

  • Alerts arrive from multiple systems without consistent prioritization.
  • Cloud, API, mobile, support, and social logs are not fully correlated.
  • Analysts cannot quickly determine whether events are related.

Incident Response Coordination

  • Regional teams interpret incident procedures differently.
  • Support, legal, operations, marketing, and security teams need coordinated decisions.
  • There is uncertainty about when to contain, communicate, or escalate.

Digital Forensics and Evidence

  • Mobile guide devices and GPS trackers may contain important evidence.
  • Evidence collection is inconsistent and could damage forensic reliability.
  • Chain of custody is not clearly defined for field equipment.

Threat Intelligence and Detection

  • Phishing links and fake guide profiles may indicate an organized fraud campaign.
  • Indicators of compromise need to be identified and shared across systems.
  • Threat intelligence could help distinguish automated abuse from targeted attacks.

Recovery and Operational Resilience

  • Active expeditions depend on GPS, emergency alerts, and guide communication.
  • Recovery processes are not recently tested for all critical systems.
  • Containment actions may reduce platform availability or field safety.

Documentation and Continuous Improvement

  • Incident documentation differs by region and team.
  • Lessons learned are not consistently converted into improved playbooks.
  • Metrics such as detection and response time are not used systematically.

Link challenges to Domain 7 concepts

Students must connect each identified challenge to CISSP Domain 7 concepts.

ChallengeDomain 7 ConceptExplanation
Many alerts arrive from different systems without prioritizationSOC / SIEM / Security AlertA SOC needs correlation, prioritization, and triage processes to turn raw alerts into actionable incidents.
Cloud, API, mobile, and social logs are difficult to connectLog Management / Event CorrelationCentralized logging and correlation help analysts identify patterns across distributed systems.
Unclear whether events are coordinatedThreat Investigation / Threat IntelligenceThreat intelligence and investigation help determine whether multiple events represent one campaign or unrelated issues.
Support staff do not know when to escalate account takeover reportsIncident Escalation / Incident ClassificationClear classification and escalation rules ensure serious incidents reach the correct responders quickly.
Regional teams apply different response proceduresIncident Response Plan / Security PlaybookStandardized playbooks help teams respond consistently during high-pressure incidents.
Guide devices and GPS trackers may contain evidenceDigital Forensics / Evidence CollectionPotential evidence must be collected carefully to support investigation without altering important data.
Evidence handling is inconsistent in remote locationsChain of CustodyChain of custody records who handled evidence and preserves reliability for legal or disciplinary use.
Phishing links spread through social messagingThreat Detection / Indicators of CompromiseIndicators such as URLs, accounts, and message patterns can be used to detect and block further abuse.
Emergency services must continue during containmentOperational Resilience / Service AvailabilityResponse actions must protect safety-critical services and avoid unnecessary disruption to active expeditions.
Recovery procedures have not been recently testedDisaster Recovery Testing / Backup ManagementRecovery capability must be tested before incidents to ensure systems and data can actually be restored.
Incident documentation differs by regionSecurity Incident Report / Operational LoggingConsistent documentation supports analysis, compliance, communication, and lessons learned.
No consistent improvement after incidentsLessons Learned / Continuous ImprovementPost-incident reviews should update controls, playbooks, monitoring rules, and training.

Learning outcomes

Outcome 1

Analyze operations

Identify security events, incidents, logs, evidence sources, and operational dependencies in a global environment.

Outcome 2

Coordinate response

Apply incident response, escalation, containment, recovery, and communication principles to realistic events.

Outcome 3

Preserve evidence

Explain how forensics, evidence collection, and chain of custody support reliable investigations.

Outcome 4

Improve resilience

Evaluate backups, recovery, service availability, and continuous improvement for safety-critical operations.

Instructor tip

Use this case in three phases:

Phase 1

Triage

Students classify events, prioritize alerts, and decide what requires immediate escalation.

Phase 2

Respond

Students define containment, communication, evidence collection, and recovery actions.

Phase 3

Improve

Students write lessons learned and propose improvements to monitoring, playbooks, and resilience.