Skip to content

Runbook: DDoS Attack

Security SpecialistOperations & StrategyDevops

This is an example runbook. Review and customize for your protocol before use. Add your specific CDN/WAF provider commands and escalation contacts.

Quick Reference

FieldValue
Typical SeverityP2-P3
Primary ResponderInfrastructure SME
Last Updated[Date]
Owner[Name]

Identification

Symptoms

  • Website/API unresponsive or slow
  • Monitoring shows traffic spike
  • CDN/hosting alerts
  • Error rate increase
  • Legitimate requests timing out

Differentiation

SymptomLikely Cause
Traffic spike + slow responseDDoS
Traffic normal + slow responseApplication issue
Single endpoint affectedTargeted attack or bug
All traffic from few IPsSimple attack, easy to block
Distributed trafficSophisticated DDoS

Immediate Actions

Step 1: Confirm DDoS

Why: Distinguish from application issues

  • Check CDN/WAF dashboards
  • Review traffic patterns
  • Check if specific endpoints targeted

Step 2: Enable DDoS Protection

Why: Use provider-level mitigation

For Cloudflare:

[Document your Cloudflare mitigation steps]

For AWS:

[Document your AWS Shield steps]

Step 3: Assess Impact

  • Which services affected?
  • Are critical functions available?
  • User impact level?

Investigation

Key Questions

  • Attack type (volumetric, protocol, application layer)?
  • Targeted endpoints?
  • Attack source patterns?
  • Why now? (retaliation, extortion, distraction?)

Data to Collect

DataSource
Traffic volumeCDN/hosting dashboard
Request patternsAccess logs
Source IPsWAF/firewall logs
Targeted pathsApplication logs

Mitigation

CDN/WAF Level

  1. Enable "Under Attack" mode if available
  2. Increase security level
  3. Add rate limiting rules
  4. Block obvious attack patterns
  5. Enable bot protection

Application Level

  1. Enable rate limiting
  2. Add CAPTCHA to affected endpoints
  3. Cache aggressively
  4. Disable non-essential features temporarily

DNS Level

  1. Reduce TTL for flexibility
  2. Consider geo-blocking if attack is regional
  3. Failover to backup if available

Escalation


Recovery

Attack Subsiding

  1. Monitor traffic patterns
  2. Gradually reduce protection levels
  3. Watch for resurgence
  4. Keep enhanced monitoring for 24-48 hours

Post-Attack

  • Review logs for attack details
  • Update protection rules
  • Document attack patterns
  • Consider permanent mitigations

Communication

Internal

  • Status updates every 30 min during active attack
  • Clear when degraded vs. fully down

External (if needed)

We're experiencing elevated traffic that's affecting site performance. We're actively mitigating and will provide updates.

Usually not needed for brief DDoS attacks. Avoid drawing attention.


Prevention

After resolving, consider:

  • Always-on DDoS protection
  • Rate limiting by default
  • Geographic restrictions if appropriate
  • Improved caching
  • Backup/failover infrastructure

Related