Send a Fun Security Reminder to Your Team
Share a meme or tip about phishing, MFA, or passwords in Slack/email.
🪴 Level 0 – The Courtyard of Curiosity
10
0
Update Your Own Passwords
Walk the talk—rotate your own creds in a secure password manager.
🪴 Level 0 – The Courtyard of Curiosity
10
0
Review One Outdated Policy
Pick any dusty doc, review it for accuracy, and mark it for future updates.
🪴 Level 0 – The Courtyard of Curiosity
15
0
Watch a 10-Minute Security Training Video
Stay sharp—watch something relevant from YouTube or a vendor library.
🪴 Level 0 – The Courtyard of Curiosity
10
0
Log in to Your SIEM or Dashboard (Just to Check)
Visibility matters. Even a casual look helps keep the village safe.
🪴 Level 0 – The Courtyard of Curiosity
10
0
Identify a Shadow IT Tool
Find something your team is using that isn’t in your asset inventory
🪴 Level 0 – The Courtyard of Curiosity
15
0
Add Two New Risks to Your Risk Register
Think creativity - what’s a risk no one’s thought of yet?
🪴 Level 0 – The Courtyard of Curiosity
20
0
Share an Awareness Resource Internally
Post a checklist, blog or infographic that helps others get smarter
🪴 Level 0 – The Courtyard of Curiosity
15
0
Host a “Lightning Talk” on a Security Topic
10-minute meeting or huddle. Get nerdy, be helpful
🪴 Level 0 – The Courtyard of Curiosity
25
0
Create a Personal Security Cheatsheet
Draft a 1-pager with your own security best practices, bookmarks, or tools.
🪴 Level 0 – The Courtyard of Curiosity
30
0
Clean Up an Old Shared Drive Folder
Delete/archive that dusty directory no one touches but everyone fears
🪴 Level 0 – The Courtyard of Curiosity
10
0
Review MFA Settings for Your Main Accounts
Log into key accounts and verify that MFA is enabled and functioning.
🪴 Level 0 – The Courtyard of Curiosity
20
0
Test Restoring a File from Backup
Grab a file from backup and walk through the restore process to confirm it's usable.
🪴 Level 0 – The Courtyard of Curiosity
10
10
Draft a “Security 101” doc for new hires
Write a simple internal doc or Notion page with onboarding security basics.
🪴 Level 0 – The Courtyard of Curiosity
45
45
Draft Acceptable Use Policy
Define the boundaries of technology use across the kingdom. From coffee shop Wi-Fi to forbidden torrent magic, lay the law of the land.
🏕️ Level 1 – Forest of Foundational Policies
30
30
Publish Password & Authentication Policy
Craft a sacred scroll that binds all users to secure credentials. Bonus points if it slays the ancient beast known as “Password123.”
🏕️ Level 1 – Forest of Foundational Policies
30
30
Create a Security Policy Approval Process
Document the path every new policy must follow to gain the royal seal of approval. Who reviews it? Who signs it? Where is it stored? Without this process, your scrolls of power may never become official doctrine. Establish the ritual.
🏕️ Level 1 – Forest of Foundational Policies
10
0
Create Remote Work & BYOD Policy
Establish the rules for mages and merchants working from afar, including what personal artifacts (devices) may access the realm.
🏕️ Level 1 – Forest of Foundational Policies
25
0
Document Data Classification & Handling Policy
Identify the kingdom’s crown jewels—and specify how they're to be guarded, handled, and never left in unlocked carriages (or USBs).
🏕️ Level 1 – Forest of Foundational Policies
Data Protection & Privacy
40
0
Define Roles & Responsibilities (RACI) for Security
Clarify who defends what part of the realm. Define the sentinels, scribes, and spellcasters responsible for each control domain.
🏕️ Level 1 – Forest of Foundational Policies
25
0
Conduct Asset Inventory (Hardware & Software)
Map all magical items and cursed relics (aka devices and applications) under your domain. If it connects, it gets cataloged.
🌾 Level 2 – Plains of Risk & Inventory
40
0
Draft Data Classification Policy
Define the types of data that flow through your kingdom—public, internal, confidential, restricted—and how each should be handled, protected, and enchanted. This quest ensures every scroll, crystal, and magical message receives the correct level of protection across the realm.
🌾 Level 2 – Plains of Risk & Inventory
Data Protection & Privacy
15
0
Create Risk Register with Top 10 Risks
Chronicle the most fearsome threats facing the realm—from phishing banshees to shadow IT spirits—and assign them risk ratings.
🌾 Level 2 – Plains of Risk & Inventory
50
0
Review Vendor Data Processing Agreement (DPA)
Examine the DPA terms for privacy, security, and compliance obligations. Identify any gaps in vendor alignment with your control environment.
🌾 Level 2 – Plains of Risk & Inventory
10
0
Run First Risk Assessment Workshop
Gather the Council of Stakeholders to assess and align on top risks. May require coffee and charisma modifiers.
🌾 Level 2 – Plains of Risk & Inventory
60
0
Tag Crown Jewels (Critical Data/Systems)
Identify the realm’s most precious data vaults and enchanted systems. These require the strongest wards and attention.
🌾 Level 2 – Plains of Risk & Inventory
30
30
Define Risk Appetite & Scoring Methodology
Determine how much peril the kingdom is willing to tolerate before raising shields. Standardize how risk is scored across domains.
🌾 Level 2 – Plains of Risk & Inventory
40
40
Implement MFA for All Admin Accounts
Enchant all administrative accounts with multi-factor defenses. The stronger the spell, the harder it is for invaders to breach.
🏰 Level 3 – Enclave of Access Control
50
50
Review User Roles & Permissions (RBAC)
Ensure each adventurer has only the powers they need. Too much access, and they may accidentally unleash data dragons.
🏰 Level 3 – Enclave of Access Control
40
40
Create Access Control Policy
Define the sacred rules of access—who can enter which chamber, and what they may do within. No “Open All Doors” spell allowed.
🏰 Level 3 – Enclave of Access Control
30
0
Establish Account Termination Process
Build a ritual for revoking access when heroes leave the party (aka employee offboarding). Prevent ghost accounts from lingering.
🏰 Level 3 – Enclave of Access Control
25
0
Review Privileged Accounts & Add Alerts
Audit the kingdom’s highest-powered accounts and place magical tripwires to detect suspicious activity in real time.
🏰 Level 3 – Enclave of Access Control
45
0
Write Incident Response Plan
Forge a battle plan for digital war. Who fights, who speaks, and what scrolls must be summoned when an attack strikes.
☠️ Level 4 – Catacombs of Incident Response
70
0
Set Up IR Communication Matrix
Define how and to whom alerts are sent during an incident. Build a comms tree worthy of a royal decree.
☠️ Level 4 – Catacombs of Incident Response
30
0
Conduct Tabletop Exercise (Stimulated Attack)
Simulate a breach scenario. Practice what the team would do if the firewall fell and monsters got in. No actual screaming necessary.
☠️ Level 4 – Catacombs of Incident Response
80
0
Document Lessons Learned Playbook
After every battle, there are lessons. Document them, share them, and feed them to the lore library so others may be wiser.
☠️ Level 4 – Catacombs of Incident Response
40
0
Write Business Continuity Plan
Craft a sacred scroll outlining how your organization will survive major disruptions—be it dragon fire (natural disaster), warlocks of outage (downtime), or data storms (cyberattacks). The plan should define critical systems, RTOs/RPOs, team responsibilities, and recovery procedures. This is the cornerstone of true operational resilience.
☠️ Level 4 – Catacombs of Incident Response
20
0
Review Backup and Recovery Procedures
Summon your system recovery mages and examine the runes they’ve carved into your backup rituals. Is your data being preserved regularly? Can you restore it when calamity strikes? Identify gaps and improvements in your backup strategy—and test your power with a recovery drill.
☠️ Level 4 – Catacombs of Incident Response
15
0
Prepare Evidence Folder for SOC2 or ISO 27001
Gather your enchanted scrolls, annotated diagrams, and control artifacts into one mighty archive—ready to present to the Auditor Dragon.
🐉 Level 5 – The Audit Boss Fight
100
0
Map Controls to ISO 27001 Annex A
Review existing security controls and formally map them to ISO/IEC 27001 Annex A requirements. Note any deltas for corrective action planning.
🐉 Level 5 – The Audit Boss Fight
75
0
Document Framework Control Mappings
Chart a crosswalk between your security controls and the major frameworks (SOC 2, ISO 27001, NIST CSF, CIS). This master document proves your kingdom’s alignment and serves as the ultimate spellbook when fending off auditor dragons. Clarity here brings victory.
🐉 Level 5 – The Audit Boss Fight
CIS
NIST CSF
ISO 27001
SOC 2
25
0