Back to Quest Board
📂

The Shattered Vault of Secrets

Accidental Data Exposure and Loss of UHNW Client Records
P1 — Critical

A catastrophic breach of the realm's most sacred vault has occurred — not through dark sorcery or siege, but through negligence within your own walls. A misconfigured cloud storage vessel has laid bare the personal records of your most prestigious patrons, while a misdirected enchanted scroll carrying sensitive client data has reached the hands of an unintended recipient. The Wardens of Data must act swiftly to seal the breach, notify the High Regulators, and restore the trust of those whose secrets were exposed.

50 minutes
DC 14
4 Injects
4–12 Players

Compliance Frameworks

GDPR Art.33-34 UK DPA 2018 FCA PRIN 2.1 ICO Guidance ISO 27001 A.18

🛡️ Roles & Party Members

War Chief Required
Incident Commander

Leads the incident response, coordinates containment and escalation, and drives decision-making across all workstreams

Warden of the Sacred Scrolls Required
Data Protection Officer

Advises on GDPR obligations, assesses personal data impact, determines notification requirements for the ICO and affected individuals

Loremaster Required
Legal Counsel

Advises on legal exposure, privilege, contractual obligations to clients, and regulatory engagement strategy

Arcane Engineer Required
IT Operations Lead

Provides technical context on cloud infrastructure, assesses misconfiguration scope, implements access controls and containment measures

Keeper of the Codex Optional
Compliance Officer

Assesses FCA notification obligations, ensures adherence to internal policies, and maintains the regulatory compliance audit trail

Town Crier Optional
Communications Lead

Drafts client notifications, manages media inquiries, and coordinates internal communications to staff

High Council Elder Optional
Senior Management

Provides executive-level decision authority, approves client notifications and regulatory submissions, manages board reporting

⚡ Inject Timeline

1
Initial Discovery — The Unsealed Vault
T+0 Minutes

It is 09:17 UTC on a Wednesday morning. The IT Security team receives an automated alert from the cloud security posture management (CSPM) tool indicating that an Amazon S3 bucket — s3://pb-client-d...

6 Discussion Prompts 1 Dice Events 4 Possible Complications
2
Breach Assessment & Containment — Sealing the Broken Wards
T+15 Minutes

The Arcane Engineer has confirmed the S3 bucket has been re-secured with private access controls. However, the Data Protection Officer has completed a preliminary data mapping exercise and the results...

6 Discussion Prompts 1 Dice Events 4 Possible Complications
3
Regulatory Notification — Dispatching the Raven to the High Regulators
T+30 Minutes

The DPO has completed the formal breach risk assessment and concluded that the breach is likely to result in a high risk to the rights and freedoms of affected individuals. The assessment identifies t...

6 Discussion Prompts 1 Dice Events 4 Possible Complications
4
Individual Notification & Remediation — Restoring the Broken Trust
T+45 Minutes

The ICO notification has been submitted and the focus now shifts to the obligation under GDPR Article 34 to notify affected individuals 'without undue delay' where the breach is likely to result in a ...

6 Discussion Prompts 1 Dice Events 4 Possible Complications

📋 Debrief Questions

Post-Battle Assessment — Lessons from the Shattered Vault
  1. Were GDPR Article 33 and 34 obligations correctly identified and met within the required timelines? What would you do differently to ensure faster notification?
  2. Was the ICO notification submitted promptly using the phased approach under Art.33(4), or did the team delay seeking complete information? How did this affect the regulatory outcome?
  3. How effective was the data classification and cloud security governance framework? Should client personal data have been stored in an S3 bucket, and what controls should have prevented the misconfiguration?
  4. Were the misdirected email and the cloud misconfiguration treated as separate incidents or a combined breach? What is the correct approach and why?
  5. How were the rights of affected individuals protected, including their right to be informed (Art.34), right of access (Art.15), and right to lodge a complaint with a supervisory authority (Art.77)?
  6. Was the decision-making process around differential VIP client notification appropriate? How should the principle of non-discrimination apply to breach notifications?
  7. What systemic improvements — including cloud access controls, email DLP rules, change management processes, and data classification policies — should be implemented to prevent recurrence?