Backdoors & Breaches

Summary

Backdoors & Breaches is a tabletop card game that simulates a cyber attack, designed to train and improve the incident response skills of cybersecurity teams.

Inspired by role-playing games like Dungeons & Dragons, it offers a fun and conversational approach to a tabletop exercise.

Yes, there are multiple open-source and free online versions of the Backdoors & Breaches card game. While the original physical card deck is sold by Black Hills Information Security, the company supports and promotes the use of open-source projects for playing the game remotely

OnAir Post: Backdoors & Breaches

About

How the Game Works

  • Roles: One player acts as the “Incident Master” (IM), creating a scenario based on a secret set of attack cards. The remaining players are the “Defenders,” working as the incident response team.
  • Attack cards: The Incident Master secretly chooses one card from each of four categories to define the attack scenario:
    • Initial Compromise: How the attackers first gained access.
    • Pivot and Escalate: How the attackers moved through the network and escalated privileges.
    • Persistence: How the attackers maintained their access over time.
    • C2 and Exfil: How the attackers communicated with their systems and exfiltrated data.
  • Procedure cards: The Defenders have a set of Procedure cards representing potential actions they can take to investigate the incident.
  • Gameplay: On their turn, a Defender rolls a 20-sided die to determine if their chosen procedure is successful. A successful roll can lead to the Incident Master revealing one of the hidden attack cards, helping the Defenders uncover the full attack path.
  • Goal: The game ends when the Defenders successfully reveal all the attack cards (a win) or when they fail to do so within a set number of rounds (a loss). After the game, teams discuss their successes and failures to improve their real-world incident response plans.

Source: Gemini AI Overview – 10/23/2025

Who should play?

The game is suitable for security professionals of all experience levels, from beginners to seasoned veterans. It is used by universities, government agencies, and Fortune 500 companies to help teams identify and fill gaps in their security programs and knowledge.

Source:

Open-source versions

Backdoors & Breaches is available as both a physical card deck and a free, open-source online version, making it accessible to both in-person and distributed teams.

Source: Gemini AI Overview – 10/23/2025

Web Links

Discuss

Here is where members can discuss, give feedback, and present their ideas within the “Backdoors & Breaches” post. OnAir membership is required to participate.

The lead moderator for the discussions is Cyber Curators. We enforce civil, honest, and respectful discourse across our network of hubs. For more information on commenting and giving feedback, see our Community Guidelines.

    Skip to toolbar