// Blue Team Doctrine

The Eight Iron Rules

Battle-tested principles that separate champions from competitors. These rules have been refined through years of competition and real-world enterprise security operations.

// Core Principles

Eight Rules for Victory

Master these principles and you will transform from a reactive defender to a proactive security operator.

01

Service Priority is Public

Every team member knows which services are Tier 0 (never die), Tier 1 (protect), and Tier 2 (sacrifice if needed).

Why This Matters

Without clear prioritization, teams waste resources on low-value targets while critical services fail.

Implementation

  • Create a visible priority board before competition starts
  • Assign primary and backup owners to each Tier 0 service
  • Review priorities with the entire team during kickoff
02

No Lone Wolf Changes

Any change affecting auth, network, AD, mail, or DB requires two-person confirmation. Most disasters are self-inflicted.

Why This Matters

Under pressure, individual mistakes become catastrophic. Dual verification prevents self-inflicted wounds.

Implementation

  • Establish change control board with Captain as final approver
  • Log all changes with timestamp, actor, and purpose
  • Require verbal confirmation before critical changes
03

Identity Over Surface

With limited time, don't make things look secure—control high-privilege accounts, unknown users, and management interfaces first.

Why This Matters

Red teams target identity first. Defending identity blocks the most damaging attack paths.

Implementation

  • Change all default and shared credentials within first 30 minutes
  • Disable unknown accounts immediately
  • Lock down administrative interfaces to known IPs
04

Logs Are Not Decoration

If you can't see it, it didn't happen. Centralize logs, protect them, and actually watch them.

Why This Matters

Without visibility, you're blind to attacks and unable to produce quality incident reports.

Implementation

  • Centralize logs to protected SIEM or log server
  • Enable verbose logging on authentication systems
  • Assign dedicated log watcher role
05

Every Anomaly Gets a Ticket

No documentation = no incident. In CCDC, incident reports can reduce penalties. Record everything.

Why This Matters

Quality IR reports reduce red team penalties and demonstrate professional security operations.

Implementation

  • Use standardized incident report templates
  • Record timestamps, affected systems, and actions taken
  • Submit reports promptly even if investigation is ongoing
06

Contain First, Explain Later

Don't wait for complete analysis. Stop the bleeding, isolate the threat, then investigate.

Why This Matters

Speed of containment determines blast radius. Analysis can happen after the threat is isolated.

Implementation

  • Disable compromised accounts immediately
  • Isolate affected systems from lateral movement paths
  • Document containment actions for later IR report
07

No Scorched Earth

Blocking everything breaks scoring engines. Use surgical containment, not carpet bombing.

Why This Matters

Overly aggressive firewall rules kill services. Red team damage is points lost; service downtime is also points lost.

Implementation

  • Test firewall rules before deploying
  • Whitelist scoring engine IPs
  • Use allowlists over denylists where possible
08

Injects Are Not Side Quests

Business tasks are half your score. They're not optional—they're the main event alongside services.

Why This Matters

Teams that treat injects as interruptions lose half their potential points.

Implementation

  • Assign dedicated inject lead with writing skills
  • Pre-build templates for common inject types
  • Track inject deadlines as seriously as service status
// Defense Strategy

Priority Model

When time is limited, focus on what matters most. This prioritization model has proven effective across multiple championship teams.

P1

Identity Security

Credential Access Defense

TA0006

High-privilege accounts, default passwords, unknown users, authentication systems

P2

Boundary & Segmentation

Lateral Movement Prevention

TA0008

Network segmentation, management interface lockdown, inter-VLAN controls

P3

Logging & Alerting

Visibility

Detection

Log centralization, time synchronization, anomaly detection, SIEM configuration

P4

Service Stability

Business Continuity

Scored service health, backup configurations, quick recovery procedures

P5

Documentation & Reporting

IR Quality

Incident reports, change logs, inject responses, evidence preservation

// Framework Integration

MITRE ATT&CK Mapping

Understanding how red team tactics map to blue team detection priorities.

TA0006

Credential Access

Abnormal logins, failed auth spikes

TA0008

Lateral Movement

Cross-host access pattern changes

TA0021

Remote Services

Admin interface anomalies

TA0003

Persistence

Config changes, new accounts

TA0010

Exfiltration

Unusual outbound traffic

TA0040

Impact

Service disruption attempts

// Defensive Framework

MITRE D3FEND Integration

Structured defensive techniques organized by objective.

Harden

  • Application Hardening
  • Credential Hardening
  • Platform Hardening

Detect

  • Network Analysis
  • Process Analysis
  • User Behavior Analysis

Isolate

  • Network Isolation
  • Execution Isolation

Deceive

  • Honeypots
  • Decoy Files

Evict

  • Credential Revocation
  • Process Termination
  • File Removal