You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
FORTRESS is an interactive web-based platform designed to help security professionals understand and implement defense-in-depth strategies using NIST SP 800-53 security controls. The platform provides hands-on learning through simulations, scenario-based training, and practical exercises to build a robust security architecture.
✨ Key Features
🏢 6 Interactive Modules
Module
Focus
Description
01 — Control Matrix
Taxonomy
Interactive matrix of 6 control types × 3 implementation functions
02 — Attack Simulation
Practical Testing
Toggle controls on/off and see how defense-in-depth stops real attacks
03 — Scenario Lab
Decision Training
8 realistic scenarios to test your control selection knowledge
04 — Encyclopedia
Reference
50+ security controls with descriptions, examples, and tags
05 — Defense Builder
Architecture
Build your defense stack and see real-time coverage scores
06 — Knowledge Quiz
Assessment
12-question quiz with detailed explanations
📊 Module 01: Control Matrix
6 Control Types × 3 Implementation Functions
Control Type
Color
Description
Example
Preventive
🟦#00d4ff
Stop threats BEFORE they occur
Firewalls, MFA, Encryption
Detective
🟨#ffb300
Identify threats that ARE occurring
SIEM, IDS, UEBA, Log Monitoring
Corrective
🟩#00e676
Reduce impact of threats that HAVE occurred
IR Plans, System Reimaging, Account Lockout
Deterrent
🟪#e040fb
Discourage attackers from ATTEMPTING
Warning Banners, Visible Cameras, Security Signs
Recovery
🟦#1de9b6
Restore systems AFTER successful attack
Backups, DR Plans, High Availability
Compensating
🔵#448aff
Alternative when primary controls can't be implemented
Legacy system isolation, Manual approvals
Implementation Functions
Technical — Implemented through hardware and software
Administrative — Implemented through policies and human processes
Physical — Implemented through tangible security measures
Matrix Features 📋
Interactive cells — Click any cell to see all controls in that category
Control chips — 3 sample controls shown per cell
Count indicators — Number of controls in each category
Expandable detail — Full control descriptions with examples
⚡ Module 02: Attack Simulation
3 Attack Scenarios 🎯
Scenario
Type
Difficulty
Attack Vector
Email-Delivered Ransomware
Phishing / Ransomware
🔴 HIGH
Malicious Excel attachment → SMB lateral movement
Malicious Employee Data Theft
Insider Threat
🟡 MEDIUM
Departing admin exfiltrating 50K customer records
SQL Injection → Data Breach
Web Application Attack
🟡 MEDIUM
SQLi dumping user credentials database
Attack Path Visualization 🗺️
Each scenario shows a 5-step attack progression:
Initial Recon / Phishing Email / Notice Given
User Clicks / Data Access / SQLi Exploit
Malware Dropper / Mass Download / DB Dumped
Lateral Movement / Cloud Upload / Creds Cracked
Ransomware Encrypts / Data Exfiltrated / Full Access
Interactive Controls 🎮
Toggle controls ON/OFF — See which layers stop the attack
Real-time status — STANDBY → UNDER ATTACK → BLOCKING / BREACHED
Step-by-step animation — Watch the attack progress through layers
Detailed results — "ATTACK STOPPED — Email security gateway blocked the phishing email" or "BREACH — 50,000 records exfiltrated"
Defense Layers 🛡️
Each scenario includes 4 defense layers with 8-12 total controls:
Network Segmentation — Segmentation, Least privilege
Recovery Controls — Immutable backups, IR Plan
🎯 Module 03: Scenario Lab
8 Analyst Scenarios 👨💻
#
Scenario Title
Control Type Focus
01
Preventing Brute Force
✅ Preventive
02
Ransomware Response
✅ Recovery
03
Detecting the Insider
✅ Detective
04
Legacy System Vulnerability
✅ Compensating
05
Post-Breach Notification
✅ Corrective
06
Discouraging Opportunists
✅ Deterrent
07
Account Compromise Recovery
Multiple (Corrective → Detective → Preventive)
08
Critical Infrastructure Protection
✅ Recovery
Scenario Features 📝
Realistic incident briefs with context and evidence
Multiple-choice decisions (A/B/C/D)
Immediate feedback explaining WHY each choice is correct/incorrect
Score tracking (X/8 correct)
Scenario status indicators (○ Not started / ✓ Correct / ✗ Incorrect)
Sample Scenario
SCENARIO 01 — Preventing Brute Force
An attacker is running an automated password spraying attack against your
organization's Office 365 login page, trying common passwords across thousands of accounts.
Which control type DIRECTLY prevents this type of attack from succeeding?
[A] Preventive — implement account lockout policy and MFA
[B] Detective — set up SIEM alerting
[C] Corrective — reset all compromised passwords after the attack
[D] Recovery — restore from backup once accounts are compromised
✓ CORRECT — Preventive controls are the first choice. Account lockout stops
brute force by disabling accounts after failed attempts, while MFA makes the
attack completely ineffective even if the password is guessed.
🏰 FORTRESS — Master Security Controls Through Simulation 🏰
Last updated: March 2025
About
FORTRESS is an interactive security control simulation platform designed for security architects, analysts, and students to understand the full spectrum of security controls. Featuring a comprehensive NIST SP 800-53 aligned control matrix, interactive attack simulations, scenario-based training, a 50+ control encyclopedia, defense builder👨🏿💻🔒.