Academy

Module 4 · Breach Response Tabletop 🔒

Manish Garg
Manish Garg Associate CISSP · RingSafe
April 19, 2026
14 min read

It’s 2:47 AM on a Tuesday. Your PagerDuty wakes you up. A customer has tweeted a screenshot of what looks like your production database on a Telegram channel. Your heart rate spikes. You have approximately 72 hours before the Data Protection Board of India expects to hear from you.

This module is about what happens between that 2:47 AM page and the Board notification filed 65 hours later. It is the most operationally consequential module of the DPDP Practitioner path. By the end, you will have:

  • A role-by-role map of who does what in the first 2 hours, 24 hours, and 72 hours
  • The exact contents the Board will expect in your notification
  • A tabletop scenario you can run with your team next week
  • A checklist of the 12 pre-breach controls that reduce both the probability of a breach and the penalty range if one occurs

Why tabletop exercises matter

Every organisation has an incident-response plan on paper. Very few have tested it. The first time a team runs their plan for real — at 2:47 AM, with stakeholders panicking, with partial information, with evidence being destroyed in real-time — is the worst possible moment to discover that the plan has holes.

Tabletop exercises are the discipline of rehearsing the plan in a low-stakes setting: a conference room, a fictional scenario, a few hours, your actual team. They reliably surface three classes of gap:

  1. Gaps in the plan itself — steps that are under-specified, decisions without owners, escalation paths that dead-end
  2. Gaps in capabilities — “we’d need to pull X from Sentry” — but can we actually? Who has access? What if Sentry is down?
  3. Gaps in alignment — different team members have different assumptions about what “notify the Board” means, or who signs off on customer communication

A 3-hour tabletop surfaces gaps that would take weeks to discover during a real incident. For an SDF, regular tabletops are essentially required — for a smaller organisation, they are the single best investment in compliance readiness.

What counts as a breach under DPDP

Section 2(u) defines “personal data breach” as unauthorised processing of personal data, accidental disclosure, acquisition, sharing, use, alteration, destruction, or loss of access to personal data that compromises the confidentiality, integrity, or availability of the data. In practical terms:

  • External attacker exfiltrates your user database — breach
  • Insider (employee or vendor) downloads customer data without authorisation — breach
  • S3 bucket is misconfigured and personal data becomes publicly accessible — breach (even if you don’t know anyone actually accessed it)
  • Laptop with unencrypted exports is lost — breach
  • Accidental mass email CC leak — breach
  • Ransomware encrypts your database (availability compromised) — breach even without exfiltration
  • Support agent emails a different customer’s data to the wrong person — breach (small-scale but still reportable)
  • A third-party SaaS you use has a breach affecting your data — breach (cascading)

What is NOT a breach: a security incident that was contained before any personal data was accessed (e.g. an attempted SQL injection that your WAF blocked); a deliberate data-sharing flow the user consented to; a routine system outage with no confidentiality/integrity/availability impact on personal data.

🔐 Intermediate Module · Basic Tier

Continue reading with Basic tier (₹499/month)

You've read 27% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
16 more sections locked below